qemu_hotplug.c 138.0 KB
Newer Older
1
/*
2
 * qemu_hotplug.c: QEMU device hotplug management
3
 *
4
 * Copyright (C) 2006-2016 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
20 21 22 23 24 25 26 27
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */


#include <config.h>

#include "qemu_hotplug.h"
28
#include "qemu_hotplugpriv.h"
29
#include "qemu_alias.h"
30 31
#include "qemu_capabilities.h"
#include "qemu_domain.h"
32
#include "qemu_domain_address.h"
33 34
#include "qemu_command.h"
#include "qemu_hostdev.h"
35
#include "qemu_interface.h"
36
#include "qemu_process.h"
37
#include "domain_audit.h"
38
#include "netdev_bandwidth_conf.h"
39
#include "domain_nwfilter.h"
40
#include "virlog.h"
41
#include "datatypes.h"
42
#include "virerror.h"
43
#include "viralloc.h"
44
#include "virpci.h"
E
Eric Blake 已提交
45
#include "virfile.h"
46
#include "virprocess.h"
47
#include "qemu_cgroup.h"
48
#include "locking/domain_lock.h"
49
#include "network/bridge_driver.h"
50 51
#include "virnetdev.h"
#include "virnetdevbridge.h"
A
Ansis Atteka 已提交
52
#include "virnetdevtap.h"
53
#include "virnetdevopenvswitch.h"
54
#include "virnetdevmidonet.h"
55
#include "device_conf.h"
56
#include "virstoragefile.h"
57
#include "virstring.h"
58
#include "virtime.h"
59
#include "storage/storage_driver.h"
60 61

#define VIR_FROM_THIS VIR_FROM_QEMU
62 63 64

VIR_LOG_INIT("qemu.qemu_hotplug");

65
#define CHANGE_MEDIA_TIMEOUT 5000
66

67 68 69 70
/* Wait up to 5 seconds for device removal to finish. */
unsigned long long qemuDomainRemoveDeviceWaitTime = 1000ull * 5;


71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147
/**
 * qemuDomainPrepareDisk:
 * @driver: qemu driver struct
 * @vm: domain object
 * @disk: disk to prepare
 * @overridesrc: Source different than @disk->src when necessary
 * @teardown: Teardown the disk instead of adding it to a vm
 *
 * Setup the locks, cgroups and security permissions on a disk of a VM.
 * If @overridesrc is specified the source struct is used instead of the
 * one present in @disk. If @teardown is true, then the labels and cgroups
 * are removed instead.
 *
 * Returns 0 on success and -1 on error. Reports libvirt error.
 */
static int
qemuDomainPrepareDisk(virQEMUDriverPtr driver,
                      virDomainObjPtr vm,
                      virDomainDiskDefPtr disk,
                      virStorageSourcePtr overridesrc,
                      bool teardown)
{
    virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
    int ret = -1;
    virStorageSourcePtr origsrc = NULL;

    if (overridesrc) {
        origsrc = disk->src;
        disk->src = overridesrc;
    }

    /* just tear down the disk access */
    if (teardown) {
        ret = 0;
        goto rollback_cgroup;
    }

    if (virDomainLockDiskAttach(driver->lockManager, cfg->uri,
                                vm, disk) < 0)
        goto cleanup;

    if (virSecurityManagerSetDiskLabel(driver->securityManager,
                                       vm->def, disk) < 0)
        goto rollback_lock;

    if (qemuSetupDiskCgroup(vm, disk) < 0)
        goto rollback_label;

    ret = 0;
    goto cleanup;

 rollback_cgroup:
    if (qemuTeardownDiskCgroup(vm, disk) < 0)
        VIR_WARN("Unable to tear down cgroup access on %s",
                 virDomainDiskGetSource(disk));

 rollback_label:
    if (virSecurityManagerRestoreDiskLabel(driver->securityManager,
                                           vm->def, disk) < 0)
        VIR_WARN("Unable to restore security label on %s",
                 virDomainDiskGetSource(disk));

 rollback_lock:
    if (virDomainLockDiskDetach(driver->lockManager, vm, disk) < 0)
        VIR_WARN("Unable to release lock on %s",
                 virDomainDiskGetSource(disk));

 cleanup:
    if (origsrc)
        disk->src = origsrc;

    virObjectUnref(cfg);

    return ret;
}


148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165
static int
qemuHotplugWaitForTrayEject(virQEMUDriverPtr driver,
                            virDomainObjPtr vm,
                            virDomainDiskDefPtr disk,
                            const char *driveAlias,
                            bool force)
{
    unsigned long long now;
    int rc;

    if (virTimeMillisNow(&now) < 0)
        return -1;

    while (disk->tray_status != VIR_DOMAIN_DISK_TRAY_OPEN) {
        if ((rc = virDomainObjWaitUntil(vm, now + CHANGE_MEDIA_TIMEOUT)) < 0)
            return -1;

        if (rc > 0) {
166 167 168 169 170 171
            /* the caller called qemuMonitorEjectMedia which usually reports an
             * error. Report the failure in an off-chance that it didn't. */
            if (!virGetLastError()) {
                virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                               _("timed out waiting for disk tray status update"));
            }
172 173 174 175 176 177 178 179 180 181 182 183 184 185
            return -1;
        }
    }

    /* re-issue ejection command to pop out the media */
    qemuDomainObjEnterMonitor(driver, vm);
    rc = qemuMonitorEjectMedia(qemuDomainGetMonitor(vm), driveAlias, force);
    if (qemuDomainObjExitMonitor(driver, vm) < 0 || rc < 0)
        return -1;

    return 0;
}


186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206
/**
 * qemuDomainChangeEjectableMedia:
 * @driver: qemu driver structure
 * @vm: domain definition
 * @disk: disk definition to change the source of
 * @newsrc: new disk source to change to
 * @force: force the change of media
 *
 * Change the media in an ejectable device to the one described by
 * @newsrc. This function also removes the old source from the
 * shared device table if appropriate. Note that newsrc is consumed
 * on success and the old source is freed on success.
 *
 * Returns 0 on success, -1 on error and reports libvirt error
 */
int
qemuDomainChangeEjectableMedia(virQEMUDriverPtr driver,
                               virDomainObjPtr vm,
                               virDomainDiskDefPtr disk,
                               virStorageSourcePtr newsrc,
                               bool force)
207
{
208
    int ret = -1, rc;
209
    char *driveAlias = NULL;
210
    qemuDomainObjPrivatePtr priv = vm->privateData;
211
    const char *format = NULL;
212
    char *sourcestr = NULL;
213

214
    if (!disk->info.alias) {
215
        virReportError(VIR_ERR_INTERNAL_ERROR,
216
                       _("missing disk device alias name for %s"), disk->dst);
217
        goto cleanup;
218 219
    }

220 221
    if (disk->device != VIR_DOMAIN_DISK_DEVICE_FLOPPY &&
        disk->device != VIR_DOMAIN_DISK_DEVICE_CDROM) {
222 223
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Removable media not supported for %s device"),
224
                       virDomainDiskDeviceTypeToString(disk->device));
225
        goto cleanup;
226 227
    }

228
    if (qemuDomainPrepareDisk(driver, vm, disk, newsrc, false) < 0)
229
        goto cleanup;
230

231
    if (!(driveAlias = qemuDeviceDriveHostAlias(disk)))
232 233
        goto error;

234 235 236 237
    qemuDomainObjEnterMonitor(driver, vm);
    rc = qemuMonitorEjectMedia(priv->mon, driveAlias, force);
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;
238

239 240 241
    /* If the tray change event is supported wait for it to open. */
    if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_DEVICE_TRAY_MOVED)) {
        if (qemuHotplugWaitForTrayEject(driver, vm, disk, driveAlias, force) < 0)
242
            goto error;
243 244 245 246 247
    } else  {
        /* otherwise report possible errors from the attempt to eject the media*/
        if (rc < 0)
            goto error;
    }
248

249
    if (!virStorageSourceIsEmpty(newsrc)) {
250 251 252
        qemuDomainDiskPrivatePtr diskPriv = QEMU_DOMAIN_DISK_PRIVATE(disk);

        if (qemuGetDriveSourceString(newsrc, diskPriv->secinfo, &sourcestr) < 0)
253 254
            goto error;

255 256 257
        if (virStorageSourceGetActualType(newsrc) != VIR_STORAGE_TYPE_DIR) {
            if (newsrc->format > 0) {
                format = virStorageFileFormatTypeToString(newsrc->format);
258
            } else {
259 260
                if (disk->src->format > 0)
                    format = virStorageFileFormatTypeToString(disk->src->format);
261
            }
262
        }
263
        qemuDomainObjEnterMonitor(driver, vm);
264 265 266 267 268
        rc = qemuMonitorChangeMedia(priv->mon,
                                    driveAlias,
                                    sourcestr,
                                    format);
        if (qemuDomainObjExitMonitor(driver, vm) < 0)
269
            goto cleanup;
270
    }
271

272
    virDomainAuditDisk(vm, disk->src, newsrc, "update", rc >= 0);
273

274
    if (rc < 0)
275 276
        goto error;

277 278
    /* remove the old source from shared device list */
    ignore_value(qemuRemoveSharedDisk(driver, disk, vm->def->name));
279
    ignore_value(qemuDomainPrepareDisk(driver, vm, disk, NULL, true));
280

281 282 283
    virStorageSourceFree(disk->src);
    disk->src = newsrc;
    newsrc = NULL;
284
    ret = 0;
285

286
 cleanup:
287
    VIR_FREE(driveAlias);
288
    VIR_FREE(sourcestr);
289 290
    return ret;

291
 error:
292 293
    virDomainAuditDisk(vm, disk->src, newsrc, "update", false);
    ignore_value(qemuDomainPrepareDisk(driver, vm, disk, newsrc, true));
294
    goto cleanup;
295 296
}

297

298 299 300 301 302
static int
qemuDomainAttachVirtioDiskDevice(virConnectPtr conn,
                                 virQEMUDriverPtr driver,
                                 virDomainObjPtr vm,
                                 virDomainDiskDefPtr disk)
303
{
304
    int ret = -1;
305
    qemuDomainObjPrivatePtr priv = vm->privateData;
306
    virErrorPtr orig_err;
307 308
    char *devstr = NULL;
    char *drivestr = NULL;
309
    char *drivealias = NULL;
310
    bool releaseaddr = false;
311
    virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
312
    const char *src = virDomainDiskGetSource(disk);
313

314
    if (!disk->info.type) {
315
        if (qemuDomainMachineIsS390CCW(vm->def) &&
316 317 318 319
            virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_VIRTIO_CCW))
            disk->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW;
        else if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_VIRTIO_S390))
            disk->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_S390;
320 321 322 323
    } else {
        if (!qemuCheckCCWS390AddressSupport(vm->def, disk->info, priv->qemuCaps,
                                            disk->dst))
            goto cleanup;
324 325
    }

326
    if (qemuDomainPrepareDisk(driver, vm, disk, NULL, false) < 0)
327
        goto cleanup;
328

329 330 331
    if (disk->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW) {
        if (virDomainCCWAddressAssign(&disk->info, priv->ccwaddrs,
                                      !disk->info.addr.ccw.assigned) < 0)
332
            goto error;
333 334 335
    } else if (!disk->info.type ||
                disk->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
        if (virDomainPCIAddressEnsureAddr(priv->pciaddrs, &disk->info) < 0)
336
            goto error;
337 338 339 340
    }
    releaseaddr = true;
    if (qemuAssignDeviceDiskAlias(vm->def, disk, priv->qemuCaps) < 0)
        goto error;
341

J
John Ferlan 已提交
342
    if (qemuDomainSecretDiskPrepare(conn, priv, disk) < 0)
343 344 345
        goto error;

    if (!(drivestr = qemuBuildDriveStr(disk, false, priv->qemuCaps)))
346
        goto error;
347

348
    if (!(drivealias = qemuDeviceDriveHostAlias(disk)))
349 350 351 352
        goto error;

    if (!(devstr = qemuBuildDriveDevStr(vm->def, disk, 0, priv->qemuCaps)))
        goto error;
353

354
    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0)
355 356
        goto error;

357
    /* Attach the device - 2 step process */
358
    qemuDomainObjEnterMonitor(driver, vm);
359 360 361 362 363 364 365

    if (qemuMonitorAddDrive(priv->mon, drivestr) < 0)
        goto failadddrive;

    if (qemuMonitorAddDevice(priv->mon, devstr) < 0)
        goto failadddevice;

366 367
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        releaseaddr = false;
368
        goto failexitmonitor;
369
    }
370

371
    virDomainAuditDisk(vm, NULL, disk->src, "attach", true);
372 373

    virDomainDiskInsertPreAlloced(vm->def, disk);
374
    ret = 0;
375

376
 cleanup:
377
    qemuDomainSecretDiskDestroy(disk);
378 379
    VIR_FREE(devstr);
    VIR_FREE(drivestr);
380
    VIR_FREE(drivealias);
381 382
    virObjectUnref(cfg);
    return ret;
383

384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401
 failadddevice:
    orig_err = virSaveLastError();
    if (qemuMonitorDriveDel(priv->mon, drivealias) < 0) {
        VIR_WARN("Unable to remove drive %s (%s) after failed "
                 "qemuMonitorAddDevice", drivealias, drivestr);
    }
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }

 failadddrive:
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        releaseaddr = false;

 failexitmonitor:
    virDomainAuditDisk(vm, NULL, disk->src, "attach", false);

402
 error:
403
    if (releaseaddr)
404
        qemuDomainReleaseDeviceAddress(vm, &disk->info, src);
405

406
    ignore_value(qemuDomainPrepareDisk(driver, vm, disk, NULL, true));
407
    goto cleanup;
408 409 410
}


411 412 413
int qemuDomainAttachControllerDevice(virQEMUDriverPtr driver,
                                     virDomainObjPtr vm,
                                     virDomainControllerDefPtr controller)
414 415 416 417 418
{
    int ret = -1;
    const char* type = virDomainControllerTypeToString(controller->type);
    char *devstr = NULL;
    qemuDomainObjPrivatePtr priv = vm->privateData;
419
    bool releaseaddr = false;
420

421 422 423 424 425 426 427
    if (controller->type != VIR_DOMAIN_CONTROLLER_TYPE_SCSI) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("'%s' controller cannot be hot plugged."),
                       virDomainControllerTypeToString(controller->type));
        return -1;
    }

428
    if (virDomainControllerFind(vm->def, controller->type, controller->idx) >= 0) {
429 430 431 432
        virReportError(VIR_ERR_OPERATION_FAILED,
                       _("target %s:%d already exists"),
                       type, controller->idx);
        return -1;
433 434
    }

435 436 437 438 439 440 441 442 443
    if (controller->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) {
        if (qemuDomainMachineIsS390CCW(vm->def) &&
            virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_VIRTIO_CCW))
            controller->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW;
        else if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_VIRTIO_S390))
            controller->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_S390;
    } else {
        if (!qemuCheckCCWS390AddressSupport(vm->def, controller->info,
                                            priv->qemuCaps, "controller"))
444
            goto cleanup;
445
    }
446

447 448 449 450 451 452 453
    if (controller->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE ||
        controller->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
        if (virDomainPCIAddressEnsureAddr(priv->pciaddrs, &controller->info) < 0)
            goto cleanup;
    } else if (controller->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW) {
        if (virDomainCCWAddressAssign(&controller->info, priv->ccwaddrs,
                                      !controller->info.addr.ccw.assigned) < 0)
454 455
            goto cleanup;
    }
456 457 458 459 460 461
    releaseaddr = true;
    if (qemuAssignDeviceControllerAlias(vm->def, priv->qemuCaps, controller) < 0)
        goto cleanup;

    if (!(devstr = qemuBuildControllerDevStr(vm->def, controller, priv->qemuCaps, NULL)))
        goto cleanup;
462

463
    if (VIR_REALLOC_N(vm->def->controllers, vm->def->ncontrollers+1) < 0)
464 465
        goto cleanup;

466
    qemuDomainObjEnterMonitor(driver, vm);
467
    ret = qemuMonitorAddDevice(priv->mon, devstr);
468 469 470 471 472
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        releaseaddr = false;
        ret = -1;
        goto cleanup;
    }
473 474

    if (ret == 0) {
475 476
        if (controller->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE)
            controller->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
477 478 479
        virDomainControllerInsertPreAlloced(vm->def, controller);
    }

480
 cleanup:
481 482
    if (ret != 0 && releaseaddr)
        qemuDomainReleaseDeviceAddress(vm, &controller->info, NULL);
483 484 485 486 487 488

    VIR_FREE(devstr);
    return ret;
}

static virDomainControllerDefPtr
489
qemuDomainFindOrCreateSCSIDiskController(virQEMUDriverPtr driver,
490
                                         virDomainObjPtr vm,
491
                                         int controller)
492
{
493
    size_t i;
494
    virDomainControllerDefPtr cont;
495

496
    for (i = 0; i < vm->def->ncontrollers; i++) {
497 498 499 500 501 502 503 504 505 506 507
        cont = vm->def->controllers[i];

        if (cont->type != VIR_DOMAIN_CONTROLLER_TYPE_SCSI)
            continue;

        if (cont->idx == controller)
            return cont;
    }

    /* No SCSI controller present, for backward compatibility we
     * now hotplug a controller */
508
    if (VIR_ALLOC(cont) < 0)
509 510
        return NULL;
    cont->type = VIR_DOMAIN_CONTROLLER_TYPE_SCSI;
511
    cont->idx = controller;
512 513
    cont->model = -1;

514
    VIR_INFO("No SCSI controller present, hotplugging one");
515 516
    if (qemuDomainAttachControllerDevice(driver,
                                         vm, cont) < 0) {
517 518 519 520 521
        VIR_FREE(cont);
        return NULL;
    }

    if (!virDomainObjIsActive(vm)) {
522 523
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("guest unexpectedly quit"));
524 525 526 527 528 529 530 531 532
        /* cont doesn't need freeing here, since the reference
         * now held in def->controllers */
        return NULL;
    }

    return cont;
}


533 534 535 536 537
static int
qemuDomainAttachSCSIDisk(virConnectPtr conn,
                         virQEMUDriverPtr driver,
                         virDomainObjPtr vm,
                         virDomainDiskDefPtr disk)
538 539 540 541 542
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    char *drivestr = NULL;
    char *devstr = NULL;
    int ret = -1;
543
    virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
544

545
    if (qemuDomainPrepareDisk(driver, vm, disk, NULL, false) < 0)
546
        goto cleanup;
547 548 549

    /* We should have an address already, so make sure */
    if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE) {
550 551 552
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("unexpected disk address type %s"),
                       virDomainDeviceAddressTypeToString(disk->info.type));
553 554 555
        goto error;
    }

556 557
    if (qemuAssignDeviceDiskAlias(vm->def, disk, priv->qemuCaps) < 0)
        goto error;
558

J
John Ferlan 已提交
559
    if (qemuDomainSecretDiskPrepare(conn, priv, disk) < 0)
560 561
        goto error;

562 563
    if (!(devstr = qemuBuildDriveDevStr(vm->def, disk, 0, priv->qemuCaps)))
        goto error;
564

565
    if (!(drivestr = qemuBuildDriveStr(disk, false, priv->qemuCaps)))
566 567
        goto error;

568
    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0)
569 570
        goto error;

571
    /* Attach the device - 2 step process */
572
    qemuDomainObjEnterMonitor(driver, vm);
573

574 575
    if (qemuMonitorAddDrive(priv->mon, drivestr) < 0)
        goto failadddrive;
576

577 578
    if (qemuMonitorAddDevice(priv->mon, devstr) < 0)
        goto failadddevice;
579

580 581
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto failexitmonitor;
582

583
    virDomainAuditDisk(vm, NULL, disk->src, "attach", true);
584 585

    virDomainDiskInsertPreAlloced(vm->def, disk);
586
    ret = 0;
587

588
 cleanup:
589
    qemuDomainSecretDiskDestroy(disk);
590 591
    VIR_FREE(devstr);
    VIR_FREE(drivestr);
592 593
    virObjectUnref(cfg);
    return ret;
594

595 596 597 598 599 600 601 602 603 604
 failadddevice:
    /* XXX should call 'drive_del' on error but this does not exist yet */
    VIR_WARN("qemuMonitorAddDevice failed on %s (%s)", drivestr, devstr);

 failadddrive:
    ignore_value(qemuDomainObjExitMonitor(driver, vm));

 failexitmonitor:
    virDomainAuditDisk(vm, NULL, disk->src, "attach", false);

605
 error:
606
    ignore_value(qemuDomainPrepareDisk(driver, vm, disk, NULL, true));
607
    goto cleanup;
608 609 610
}


611
static int
612
qemuDomainAttachUSBMassStorageDevice(virQEMUDriverPtr driver,
613 614
                                     virDomainObjPtr vm,
                                     virDomainDiskDefPtr disk)
615 616
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
617
    int ret = -1;
618 619
    char *drivestr = NULL;
    char *devstr = NULL;
620
    virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
621
    const char *src = virDomainDiskGetSource(disk);
622

623
    if (qemuDomainPrepareDisk(driver, vm, disk, NULL, false) < 0)
624
        goto cleanup;
625

626
    /* XXX not correct once we allow attaching a USB CDROM */
627
    if (!src) {
628 629
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("disk source path is missing"));
630 631 632
        goto error;
    }

633 634
    if (qemuAssignDeviceDiskAlias(vm->def, disk, priv->qemuCaps) < 0)
        goto error;
635
    if (!(drivestr = qemuBuildDriveStr(disk, false, priv->qemuCaps)))
636 637 638
        goto error;
    if (!(devstr = qemuBuildDriveDevStr(vm->def, disk, 0, priv->qemuCaps)))
        goto error;
639

640
    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0)
641 642
        goto error;

643
    qemuDomainObjEnterMonitor(driver, vm);
644 645 646 647 648 649 650 651
    ret = qemuMonitorAddDrive(priv->mon, drivestr);
    if (ret == 0) {
        ret = qemuMonitorAddDevice(priv->mon, devstr);
        if (ret < 0) {
            VIR_WARN("qemuMonitorAddDevice failed on %s (%s)",
                     drivestr, devstr);
            /* XXX should call 'drive_del' on error but this does not
               exist yet */
652 653
        }
    }
654 655 656 657
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        ret = -1;
        goto error;
    }
658

659
    virDomainAuditDisk(vm, NULL, disk->src, "attach", ret >= 0);
660 661 662 663 664 665

    if (ret < 0)
        goto error;

    virDomainDiskInsertPreAlloced(vm->def, disk);

666
 cleanup:
667 668
    VIR_FREE(devstr);
    VIR_FREE(drivestr);
669 670
    virObjectUnref(cfg);
    return ret;
671

672
 error:
673
    ignore_value(qemuDomainPrepareDisk(driver, vm, disk, NULL, true));
674
    goto cleanup;
675 676 677
}


678 679 680 681 682 683
int
qemuDomainAttachDeviceDiskLive(virConnectPtr conn,
                               virQEMUDriverPtr driver,
                               virDomainObjPtr vm,
                               virDomainDeviceDefPtr dev)
{
684
    size_t i;
685 686 687
    virDomainDiskDefPtr disk = dev->data.disk;
    virDomainDiskDefPtr orig_disk = NULL;
    int ret = -1;
688
    const char *src = virDomainDiskGetSource(disk);
689

690
    if (STRNEQ_NULLABLE(virDomainDiskGetDriver(disk), "qemu")) {
691 692
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("unsupported driver name '%s' for disk '%s'"),
693
                       virDomainDiskGetDriver(disk), src);
694
        goto cleanup;
695 696
    }

697
    if (virStorageTranslateDiskSourcePool(conn, disk) < 0)
698
        goto cleanup;
699 700

    if (qemuAddSharedDevice(driver, dev, vm->def->name) < 0)
701
        goto cleanup;
702 703

    if (qemuSetUnprivSGIO(dev) < 0)
704
        goto cleanup;
705

706
    if (qemuDomainDetermineDiskChain(driver, vm, disk, false, true) < 0)
707
        goto cleanup;
708

709
    switch ((virDomainDiskDevice) disk->device)  {
710 711 712 713 714
    case VIR_DOMAIN_DISK_DEVICE_CDROM:
    case VIR_DOMAIN_DISK_DEVICE_FLOPPY:
        if (!(orig_disk = virDomainDiskFindByBusAndDst(vm->def,
                                                       disk->bus, disk->dst))) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
715 716 717
                           _("No device with bus '%s' and target '%s'. "
                             "cdrom and floppy device hotplug isn't supported "
                             "by libvirt"),
718 719
                           virDomainDiskBusTypeToString(disk->bus),
                           disk->dst);
720
            goto cleanup;
721 722
        }

723
        if (qemuDomainChangeEjectableMedia(driver, vm, orig_disk,
724
                                           disk->src, false) < 0)
725
            goto cleanup;
726

727
        disk->src = NULL;
728
        ret = 0;
729
        break;
730

731 732
    case VIR_DOMAIN_DISK_DEVICE_DISK:
    case VIR_DOMAIN_DISK_DEVICE_LUN:
733
        for (i = 0; i < vm->def->ndisks; i++) {
734 735
            if (virDomainDiskDefCheckDuplicateInfo(vm->def->disks[i], disk) < 0)
                goto cleanup;
736 737
        }

738 739
        switch ((virDomainDiskBus) disk->bus) {
        case VIR_DOMAIN_DISK_BUS_USB:
740 741 742 743 744
            if (disk->device == VIR_DOMAIN_DISK_DEVICE_LUN) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("disk device='lun' is not supported for usb bus"));
                break;
            }
745
            ret = qemuDomainAttachUSBMassStorageDevice(driver, vm, disk);
746 747 748
            break;

        case VIR_DOMAIN_DISK_BUS_VIRTIO:
749
            ret = qemuDomainAttachVirtioDiskDevice(conn, driver, vm, disk);
750 751 752
            break;

        case VIR_DOMAIN_DISK_BUS_SCSI:
753
            ret = qemuDomainAttachSCSIDisk(conn, driver, vm, disk);
754 755 756 757 758 759 760 761 762
            break;

        case VIR_DOMAIN_DISK_BUS_IDE:
        case VIR_DOMAIN_DISK_BUS_FDC:
        case VIR_DOMAIN_DISK_BUS_XEN:
        case VIR_DOMAIN_DISK_BUS_UML:
        case VIR_DOMAIN_DISK_BUS_SATA:
        case VIR_DOMAIN_DISK_BUS_SD:
        case VIR_DOMAIN_DISK_BUS_LAST:
763 764 765 766 767
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                           _("disk bus '%s' cannot be hotplugged."),
                           virDomainDiskBusTypeToString(disk->bus));
        }
        break;
768 769

    case VIR_DOMAIN_DISK_DEVICE_LAST:
770 771 772
        break;
    }

773
 cleanup:
774 775 776 777 778 779
    if (ret != 0)
        ignore_value(qemuRemoveSharedDevice(driver, dev, vm->def->name));
    return ret;
}


780 781 782 783
int
qemuDomainAttachNetDevice(virQEMUDriverPtr driver,
                          virDomainObjPtr vm,
                          virDomainNetDefPtr net)
784 785
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
786 787
    char **tapfdName = NULL;
    int *tapfd = NULL;
788
    size_t tapfdSize = 0;
789 790
    char **vhostfdName = NULL;
    int *vhostfd = NULL;
791
    size_t vhostfdSize = 0;
792 793
    char *nicstr = NULL;
    char *netstr = NULL;
A
Ansis Atteka 已提交
794
    virNetDevVPortProfilePtr vport = NULL;
795 796
    int ret = -1;
    int vlan;
797
    bool releaseaddr = false;
798 799
    bool iface_connected = false;
    int actualType;
800
    virNetDevBandwidthPtr actualBandwidth;
801
    virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
802
    size_t i;
803

804
    /* preallocate new slot for device */
805
    if (VIR_REALLOC_N(vm->def->nets, vm->def->nnets + 1) < 0)
806
        goto cleanup;
807

808 809 810 811
    /* If appropriate, grab a physical device from the configured
     * network's pool of devices, or resolve bridge device name
     * to the one defined in the network definition.
     */
812
    if (networkAllocateActualDevice(vm->def, net) < 0)
813
        goto cleanup;
814 815

    actualType = virDomainNetGetActualType(net);
816 817 818 819 820 821

    if (actualType == VIR_DOMAIN_NET_TYPE_HOSTDEV) {
        /* This is really a "smart hostdev", so it should be attached
         * as a hostdev (the hostdev code will reach over into the
         * netdev-specific code as appropriate), then also added to
         * the nets list (see cleanup:) if successful.
822 823 824
         *
         * qemuDomainAttachHostDevice uses a connection to resolve
         * a SCSI hostdev secret, which is not this case, so pass NULL.
825
         */
826
        ret = qemuDomainAttachHostDevice(NULL, driver, vm,
827 828 829 830
                                         virDomainNetGetActualHostdev(net));
        goto cleanup;
    }

831
    /* Currently only TAP/macvtap devices supports multiqueue. */
832 833
    if (net->driver.virtio.queues > 0 &&
        !(actualType == VIR_DOMAIN_NET_TYPE_NETWORK ||
834
          actualType == VIR_DOMAIN_NET_TYPE_BRIDGE ||
835 836
          actualType == VIR_DOMAIN_NET_TYPE_DIRECT ||
          actualType == VIR_DOMAIN_NET_TYPE_ETHERNET)) {
837 838 839 840 841 842
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Multiqueue network is not supported for: %s"),
                       virDomainNetTypeToString(actualType));
        return -1;
    }

843 844 845
    /* and only TAP devices support nwfilter rules */
    if (net->filter &&
        !(actualType == VIR_DOMAIN_NET_TYPE_NETWORK ||
846 847
          actualType == VIR_DOMAIN_NET_TYPE_BRIDGE ||
          actualType == VIR_DOMAIN_NET_TYPE_ETHERNET)) {
848 849 850 851 852 853 854
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("filterref is not supported for "
                         "network interfaces of type %s"),
                       virDomainNetTypeToString(actualType));
        return -1;
    }

855 856
    if (actualType == VIR_DOMAIN_NET_TYPE_BRIDGE ||
        actualType == VIR_DOMAIN_NET_TYPE_NETWORK) {
857 858 859
        tapfdSize = vhostfdSize = net->driver.virtio.queues;
        if (!tapfdSize)
            tapfdSize = vhostfdSize = 1;
860
        if (VIR_ALLOC_N(tapfd, tapfdSize) < 0)
861
            goto cleanup;
862 863 864 865
        memset(tapfd, -1, sizeof(*tapfd) * tapfdSize);
        if (VIR_ALLOC_N(vhostfd, vhostfdSize) < 0)
            goto cleanup;
        memset(vhostfd, -1, sizeof(*vhostfd) * vhostfdSize);
866 867
        if (qemuInterfaceBridgeConnect(vm->def, driver, net,
                                       tapfd, &tapfdSize) < 0)
868 869
            goto cleanup;
        iface_connected = true;
870 871
        if (qemuInterfaceOpenVhostNet(vm->def, net, priv->qemuCaps,
                                      vhostfd, &vhostfdSize) < 0)
872
            goto cleanup;
873
    } else if (actualType == VIR_DOMAIN_NET_TYPE_DIRECT) {
874 875 876 877
        tapfdSize = vhostfdSize = net->driver.virtio.queues;
        if (!tapfdSize)
            tapfdSize = vhostfdSize = 1;
        if (VIR_ALLOC_N(tapfd, tapfdSize) < 0)
878
            goto cleanup;
879 880
        memset(tapfd, -1, sizeof(*tapfd) * tapfdSize);
        if (VIR_ALLOC_N(vhostfd, vhostfdSize) < 0)
881
            goto cleanup;
882
        memset(vhostfd, -1, sizeof(*vhostfd) * vhostfdSize);
883 884 885
        if (qemuInterfaceDirectConnect(vm->def, driver, net,
                                       tapfd, tapfdSize,
                                       VIR_NETDEV_VPORT_PROFILE_OP_CREATE) < 0)
886 887
            goto cleanup;
        iface_connected = true;
888 889
        if (qemuInterfaceOpenVhostNet(vm->def, net, priv->qemuCaps,
                                      vhostfd, &vhostfdSize) < 0)
890
            goto cleanup;
891
    } else if (actualType == VIR_DOMAIN_NET_TYPE_ETHERNET) {
892 893 894 895
        tapfdSize = vhostfdSize = net->driver.virtio.queues;
        if (!tapfdSize)
            tapfdSize = vhostfdSize = 1;
        if (VIR_ALLOC_N(tapfd, tapfdSize) < 0)
896
            goto cleanup;
897 898 899 900 901 902 903 904
        memset(tapfd, -1, sizeof(*tapfd) * tapfdSize);
        if (VIR_ALLOC_N(vhostfd, vhostfdSize) < 0)
            goto cleanup;
        memset(vhostfd, -1, sizeof(*vhostfd) * vhostfdSize);
        if (qemuInterfaceEthernetConnect(vm->def, driver, net,
                                       tapfd, tapfdSize) < 0)
            goto cleanup;
        iface_connected = true;
905 906
        if (qemuInterfaceOpenVhostNet(vm->def, net, priv->qemuCaps,
                                      vhostfd, &vhostfdSize) < 0)
907
            goto cleanup;
908 909
    }

910 911
    /* Set device online immediately */
    if (qemuInterfaceStartDevice(net) < 0)
912
        goto cleanup;
913

914 915 916 917 918 919 920 921 922 923 924 925
    /* Set bandwidth or warn if requested and not supported. */
    actualBandwidth = virDomainNetGetActualBandwidth(net);
    if (actualBandwidth) {
        if (virNetDevSupportBandwidth(actualType)) {
            if (virNetDevBandwidthSet(net->ifname, actualBandwidth, false) < 0)
                goto cleanup;
        } else {
            VIR_WARN("setting bandwidth on interfaces of "
                     "type '%s' is not implemented yet",
                     virDomainNetTypeToString(actualType));
        }
    }
926

M
Michal Privoznik 已提交
927 928 929 930 931 932
    for (i = 0; i < tapfdSize; i++) {
        if (virSecurityManagerSetTapFDLabel(driver->securityManager,
                                            vm->def, tapfd[i]) < 0)
            goto cleanup;
    }

933 934
    if (qemuAssignDeviceNetAlias(vm->def, net, -1) < 0)
        goto cleanup;
935

936
    if (qemuDomainMachineIsS390CCW(vm->def) &&
937 938
        virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_VIRTIO_CCW)) {
        net->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW;
J
Ján Tomko 已提交
939 940
        if (virDomainCCWAddressAssign(&net->info, priv->ccwaddrs,
                                      !net->info.addr.ccw.assigned) < 0)
941
            goto cleanup;
942
    } else if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_VIRTIO_S390)) {
943
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
944 945
                       _("virtio-s390 net device cannot be hotplugged."));
        goto cleanup;
946
    } else if (virDomainPCIAddressEnsureAddr(priv->pciaddrs, &net->info) < 0) {
947 948
        goto cleanup;
    }
949

950 951
    releaseaddr = true;

952
    if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_NETDEV)) {
953 954 955 956 957
        vlan = -1;
    } else {
        vlan = qemuDomainNetVLAN(net);

        if (vlan < 0) {
958 959
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Unable to attach network devices without vlan"));
960 961 962 963
            goto cleanup;
        }
    }

964
    if (VIR_ALLOC_N(tapfdName, tapfdSize) < 0 ||
965
        VIR_ALLOC_N(vhostfdName, vhostfdSize) < 0)
966 967 968
        goto cleanup;

    for (i = 0; i < tapfdSize; i++) {
969
        if (virAsprintf(&tapfdName[i], "fd-%s%zu", net->info.alias, i) < 0)
970
            goto cleanup;
971 972
    }

973
    for (i = 0; i < vhostfdSize; i++) {
974
        if (virAsprintf(&vhostfdName[i], "vhostfd-%s%zu", net->info.alias, i) < 0)
975
            goto cleanup;
976 977
    }

978
    if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_NETDEV)) {
979
        if (!(netstr = qemuBuildHostNetStr(net, driver,
980 981 982
                                           ',', -1,
                                           tapfdName, tapfdSize,
                                           vhostfdName, vhostfdSize)))
983
            goto cleanup;
984
    } else {
985
        if (!(netstr = qemuBuildHostNetStr(net, driver,
986 987 988
                                           ' ', vlan,
                                           tapfdName, tapfdSize,
                                           vhostfdName, vhostfdSize)))
989
            goto cleanup;
990 991
    }

992
    qemuDomainObjEnterMonitor(driver, vm);
993
    if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_NETDEV)) {
994 995 996
        if (qemuMonitorAddNetdev(priv->mon, netstr,
                                 tapfd, tapfdName, tapfdSize,
                                 vhostfd, vhostfdName, vhostfdSize) < 0) {
997
            ignore_value(qemuDomainObjExitMonitor(driver, vm));
998
            virDomainAuditNet(vm, NULL, net, "attach", false);
999
            goto cleanup;
1000 1001
        }
    } else {
1002 1003 1004
        if (qemuMonitorAddHostNetwork(priv->mon, netstr,
                                      tapfd, tapfdName, tapfdSize,
                                      vhostfd, vhostfdName, vhostfdSize) < 0) {
1005
            ignore_value(qemuDomainObjExitMonitor(driver, vm));
1006
            virDomainAuditNet(vm, NULL, net, "attach", false);
1007
            goto cleanup;
1008 1009
        }
    }
1010 1011
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;
1012

1013 1014 1015 1016
    for (i = 0; i < tapfdSize; i++)
        VIR_FORCE_CLOSE(tapfd[i]);
    for (i = 0; i < vhostfdSize; i++)
        VIR_FORCE_CLOSE(vhostfd[i]);
1017

1018 1019 1020
    if (!(nicstr = qemuBuildNicDevStr(vm->def, net, vlan, 0,
                                      vhostfdSize, priv->qemuCaps)))
        goto try_remove;
1021

1022
    qemuDomainObjEnterMonitor(driver, vm);
1023 1024 1025 1026
    if (qemuMonitorAddDevice(priv->mon, nicstr) < 0) {
        ignore_value(qemuDomainObjExitMonitor(driver, vm));
        virDomainAuditNet(vm, NULL, net, "attach", false);
        goto try_remove;
1027
    }
1028 1029
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;
1030

1031 1032 1033
    /* set link state */
    if (net->linkstate == VIR_DOMAIN_NET_INTERFACE_LINK_STATE_DOWN) {
        if (!net->info.alias) {
1034 1035
            virReportError(VIR_ERR_OPERATION_FAILED, "%s",
                           _("device alias not found: cannot set link state to down"));
1036
        } else {
1037
            qemuDomainObjEnterMonitor(driver, vm);
1038

1039
            if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_NETDEV)) {
1040
                if (qemuMonitorSetLink(priv->mon, net->info.alias, VIR_DOMAIN_NET_INTERFACE_LINK_STATE_DOWN) < 0) {
1041
                    ignore_value(qemuDomainObjExitMonitor(driver, vm));
1042 1043 1044 1045
                    virDomainAuditNet(vm, NULL, net, "attach", false);
                    goto try_remove;
                }
            } else {
1046
                virReportError(VIR_ERR_OPERATION_FAILED, "%s",
1047
                               _("setting of link state not supported: Link is up"));
1048 1049
            }

1050 1051
            if (qemuDomainObjExitMonitor(driver, vm) < 0)
                goto cleanup;
1052 1053 1054 1055
        }
        /* link set to down */
    }

1056
    virDomainAuditNet(vm, NULL, net, "attach", true);
1057 1058 1059

    ret = 0;

1060
 cleanup:
1061 1062 1063
    if (!ret) {
        vm->def->nets[vm->def->nnets++] = net;
    } else {
1064 1065
        if (releaseaddr)
            qemuDomainReleaseDeviceAddress(vm, &net->info, NULL);
1066

1067
        if (iface_connected) {
1068
            virDomainConfNWFilterTeardown(net);
1069

1070 1071 1072 1073 1074 1075 1076 1077 1078
            if (virDomainNetGetActualType(net) == VIR_DOMAIN_NET_TYPE_DIRECT) {
                ignore_value(virNetDevMacVLanDeleteWithVPortProfile(
                                 net->ifname, &net->mac,
                                 virDomainNetGetActualDirectDev(net),
                                 virDomainNetGetActualDirectMode(net),
                                 virDomainNetGetActualVirtPortProfile(net),
                                 cfg->stateDir));
            }

1079
            vport = virDomainNetGetActualVirtPortProfile(net);
1080 1081 1082 1083 1084 1085 1086 1087 1088
            if (vport) {
                if (vport->virtPortType == VIR_NETDEV_VPORT_PROFILE_MIDONET) {
                    ignore_value(virNetDevMidonetUnbindPort(vport));
                } else if (vport->virtPortType == VIR_NETDEV_VPORT_PROFILE_OPENVSWITCH) {
                    ignore_value(virNetDevOpenvswitchRemovePort(
                                     virDomainNetGetActualBridgeName(net),
                                     net->ifname));
                }
            }
1089
        }
A
Ansis Atteka 已提交
1090

1091 1092
        virDomainNetRemoveHostdev(vm->def, net);

1093
        networkReleaseActualDevice(vm->def, net);
1094
    }
1095 1096 1097

    VIR_FREE(nicstr);
    VIR_FREE(netstr);
1098
    for (i = 0; tapfd && i < tapfdSize; i++) {
1099
        VIR_FORCE_CLOSE(tapfd[i]);
1100 1101
        if (tapfdName)
            VIR_FREE(tapfdName[i]);
1102 1103 1104
    }
    VIR_FREE(tapfd);
    VIR_FREE(tapfdName);
1105
    for (i = 0; vhostfd && i < vhostfdSize; i++) {
1106
        VIR_FORCE_CLOSE(vhostfd[i]);
1107 1108
        if (vhostfdName)
            VIR_FREE(vhostfdName[i]);
1109 1110 1111
    }
    VIR_FREE(vhostfd);
    VIR_FREE(vhostfdName);
1112
    virObjectUnref(cfg);
1113 1114 1115

    return ret;

1116
 try_remove:
1117 1118 1119 1120
    if (!virDomainObjIsActive(vm))
        goto cleanup;

    if (vlan < 0) {
1121
        if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_NETDEV)) {
1122 1123
            char *netdev_name;
            if (virAsprintf(&netdev_name, "host%s", net->info.alias) < 0)
1124
                goto cleanup;
1125
            qemuDomainObjEnterMonitor(driver, vm);
1126 1127 1128
            if (qemuMonitorRemoveNetdev(priv->mon, netdev_name) < 0)
                VIR_WARN("Failed to remove network backend for netdev %s",
                         netdev_name);
1129
            ignore_value(qemuDomainObjExitMonitor(driver, vm));
1130 1131
            VIR_FREE(netdev_name);
        } else {
1132
            VIR_WARN("Unable to remove network backend");
1133 1134 1135 1136
        }
    } else {
        char *hostnet_name;
        if (virAsprintf(&hostnet_name, "host%s", net->info.alias) < 0)
1137
            goto cleanup;
1138
        qemuDomainObjEnterMonitor(driver, vm);
1139 1140 1141
        if (qemuMonitorRemoveHostNetwork(priv->mon, vlan, hostnet_name) < 0)
            VIR_WARN("Failed to remove network backend for vlan %d, net %s",
                     vlan, hostnet_name);
1142
        ignore_value(qemuDomainObjExitMonitor(driver, vm));
1143 1144 1145 1146 1147 1148
        VIR_FREE(hostnet_name);
    }
    goto cleanup;
}


1149
static int
1150
qemuDomainAttachHostPCIDevice(virQEMUDriverPtr driver,
1151 1152
                              virDomainObjPtr vm,
                              virDomainHostdevDefPtr hostdev)
1153 1154 1155 1156 1157 1158
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    int ret;
    char *devstr = NULL;
    int configfd = -1;
    char *configfd_name = NULL;
1159
    bool releaseaddr = false;
1160
    bool teardowncgroup = false;
1161
    bool teardownlabel = false;
1162
    int backend;
1163 1164
    virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
    unsigned int flags = 0;
1165

1166
    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs + 1) < 0)
1167 1168
        return -1;

1169 1170
    if (!cfg->relaxedACS)
        flags |= VIR_HOSTDEV_STRICT_ACS_CHECK;
1171
    if (qemuHostdevPreparePCIDevices(driver, vm->def->name, vm->def->uuid,
1172 1173
                                     &hostdev, 1, priv->qemuCaps, flags) < 0)
        goto cleanup;
1174

1175
    /* this could have been changed by qemuHostdevPreparePCIDevices */
1176 1177
    backend = hostdev->source.subsys.u.pci.backend;

1178
    switch ((virDomainHostdevSubsysPCIBackendType) backend) {
1179
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO:
1180 1181 1182 1183 1184 1185
        if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_DEVICE_VFIO_PCI)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("VFIO PCI device assignment is not "
                             "supported by this version of qemu"));
            goto error;
        }
1186 1187
        break;

1188 1189 1190 1191 1192 1193 1194 1195 1196 1197
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_DEFAULT:
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_KVM:
        break;

    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_XEN:
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_TYPE_LAST:
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("QEMU does not support device assignment mode '%s'"),
                       virDomainHostdevSubsysPCIBackendTypeToString(backend));
        goto error;
1198
        break;
1199 1200
    }

1201
    /* Temporarily add the hostdev to the domain definition. This is needed
1202 1203 1204 1205
     * because qemuDomainAdjustMaxMemLock() requires the hostdev to be already
     * part of the domain definition, but other functions like
     * qemuAssignDeviceHostdevAlias() used below expect it *not* to be there.
     * A better way to handle this would be nice */
1206
    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;
1207 1208 1209
    if (qemuDomainAdjustMaxMemLock(vm) < 0) {
        vm->def->hostdevs[--(vm->def->nhostdevs)] = NULL;
        goto error;
1210 1211 1212
    }
    vm->def->hostdevs[--(vm->def->nhostdevs)] = NULL;

1213
    if (qemuSetupHostdevCgroup(vm, hostdev) < 0)
1214 1215 1216
        goto error;
    teardowncgroup = true;

1217 1218 1219
    if (virSecurityManagerSetHostdevLabel(driver->securityManager,
                                          vm->def, hostdev, NULL) < 0)
        goto error;
1220 1221
    if (backend != VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO)
        teardownlabel = true;
1222

1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234
    if (qemuAssignDeviceHostdevAlias(vm->def, &hostdev->info->alias, -1) < 0)
        goto error;
    if (virDomainPCIAddressEnsureAddr(priv->pciaddrs, hostdev->info) < 0)
        goto error;
    releaseaddr = true;
    if (backend != VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO &&
        virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_PCI_CONFIGFD)) {
        configfd = qemuOpenPCIConfig(hostdev);
        if (configfd >= 0) {
            if (virAsprintf(&configfd_name, "fd-%s",
                            hostdev->info->alias) < 0)
                goto error;
1235
        }
1236
    }
1237

1238 1239 1240 1241 1242
    if (!virDomainObjIsActive(vm)) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("guest unexpectedly quit during hotplug"));
        goto error;
    }
1243

1244 1245 1246
    if (!(devstr = qemuBuildPCIHostdevDevStr(vm->def, hostdev, 0,
                                             configfd_name, priv->qemuCaps)))
        goto error;
1247

1248 1249 1250 1251 1252
    qemuDomainObjEnterMonitor(driver, vm);
    ret = qemuMonitorAddDeviceWithFd(priv->mon, devstr,
                                     configfd, configfd_name);
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto error;
1253

1254
    virDomainAuditHostdev(vm, hostdev, "attach", ret == 0);
1255 1256 1257 1258 1259 1260 1261 1262
    if (ret < 0)
        goto error;

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;

    VIR_FREE(devstr);
    VIR_FREE(configfd_name);
    VIR_FORCE_CLOSE(configfd);
1263
    virObjectUnref(cfg);
1264 1265 1266

    return 0;

1267
 error:
1268 1269
    if (teardowncgroup && qemuTeardownHostdevCgroup(vm, hostdev) < 0)
        VIR_WARN("Unable to remove host device cgroup ACL on hotplug fail");
1270 1271 1272 1273
    if (teardownlabel &&
        virSecurityManagerRestoreHostdevLabel(driver->securityManager,
                                              vm->def, hostdev, NULL) < 0)
        VIR_WARN("Unable to restore host device labelling on hotplug fail");
1274

1275 1276
    if (releaseaddr)
        qemuDomainReleaseDeviceAddress(vm, hostdev->info, NULL);
1277

1278
    qemuHostdevReAttachPCIDevices(driver, vm->def->name, &hostdev, 1);
1279 1280 1281 1282 1283

    VIR_FREE(devstr);
    VIR_FREE(configfd_name);
    VIR_FORCE_CLOSE(configfd);

1284
 cleanup:
1285
    virObjectUnref(cfg);
1286 1287 1288 1289
    return -1;
}


1290
int qemuDomainAttachRedirdevDevice(virQEMUDriverPtr driver,
1291 1292 1293
                                   virDomainObjPtr vm,
                                   virDomainRedirdevDefPtr redirdev)
{
1294
    int ret = -1;
1295
    qemuDomainObjPrivatePtr priv = vm->privateData;
1296
    virDomainDefPtr def = vm->def;
1297
    char *charAlias = NULL;
1298 1299
    char *devstr = NULL;

1300
    if (qemuAssignDeviceRedirdevAlias(vm->def, redirdev, -1) < 0)
1301 1302 1303 1304 1305
        goto cleanup;

    if (virAsprintf(&charAlias, "char%s", redirdev->info.alias) < 0)
        goto cleanup;

1306
    if (!(devstr = qemuBuildRedirdevDevStr(def, redirdev, priv->qemuCaps)))
1307
        goto cleanup;
1308

1309
    if (VIR_REALLOC_N(vm->def->redirdevs, vm->def->nredirdevs+1) < 0)
1310
        goto cleanup;
1311

1312
    qemuDomainObjEnterMonitor(driver, vm);
1313 1314 1315 1316 1317 1318
    if (qemuMonitorAttachCharDev(priv->mon,
                                 charAlias,
                                 &(redirdev->source.chr)) < 0) {
        ignore_value(qemuDomainObjExitMonitor(driver, vm));
        goto audit;
    }
1319

1320 1321 1322 1323 1324 1325
    if (qemuMonitorAddDevice(priv->mon, devstr) < 0) {
        /* detach associated chardev on error */
        qemuMonitorDetachCharDev(priv->mon, charAlias);
        ignore_value(qemuDomainObjExitMonitor(driver, vm));
        goto audit;
    }
1326

1327 1328
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto audit;
1329 1330

    vm->def->redirdevs[vm->def->nredirdevs++] = redirdev;
1331 1332 1333 1334 1335
    ret = 0;
 audit:
    virDomainAuditRedirdev(vm, redirdev, "attach", ret == 0);
 cleanup:
    VIR_FREE(charAlias);
1336
    VIR_FREE(devstr);
1337
    return ret;
1338 1339
}

1340 1341 1342
static int
qemuDomainChrPreInsert(virDomainDefPtr vmdef,
                       virDomainChrDefPtr chr)
1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356
{
    if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE &&
        chr->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                       _("attaching serial console is not supported"));
        return -1;
    }

    if (virDomainChrFind(vmdef, chr)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("chardev already exists"));
        return -1;
    }

1357
    if (virDomainChrPreAlloc(vmdef, chr) < 0)
1358 1359 1360 1361 1362
        return -1;

    /* Due to some crazy backcompat stuff, the first serial device is an alias
     * to the first console too. If this is the case, the definition must be
     * duplicated as first console device. */
1363 1364 1365 1366 1367 1368 1369
    if (vmdef->nserials == 0 && vmdef->nconsoles == 0 &&
        chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL) {
        if (!vmdef->consoles && VIR_ALLOC(vmdef->consoles) < 0)
            return -1;

        if (VIR_ALLOC(vmdef->consoles[0]) < 0) {
            VIR_FREE(vmdef->consoles);
1370 1371
            return -1;
        }
1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383
        vmdef->nconsoles++;
    }
    return 0;
}

static void
qemuDomainChrInsertPreAlloced(virDomainDefPtr vmdef,
                              virDomainChrDefPtr chr)
{
    virDomainChrInsertPreAlloced(vmdef, chr);
    if (vmdef->nserials == 1 && vmdef->nconsoles == 0 &&
        chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL) {
1384 1385 1386 1387 1388 1389
        vmdef->nconsoles = 1;

        /* Create an console alias for the serial port */
        vmdef->consoles[0]->deviceType = VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE;
        vmdef->consoles[0]->targetType = VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL;
    }
1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403
}

static void
qemuDomainChrInsertPreAllocCleanup(virDomainDefPtr vmdef,
                                   virDomainChrDefPtr chr)
{
    /* Remove the stub console added by qemuDomainChrPreInsert */
    if (vmdef->nserials == 0 && vmdef->nconsoles == 1 &&
        chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL) {
        VIR_FREE(vmdef->consoles[0]);
        VIR_FREE(vmdef->consoles);
        vmdef->nconsoles = 0;
    }
}
1404

1405 1406 1407 1408 1409 1410 1411 1412 1413
int
qemuDomainChrInsert(virDomainDefPtr vmdef,
                    virDomainChrDefPtr chr)
{
    if (qemuDomainChrPreInsert(vmdef, chr) < 0) {
        qemuDomainChrInsertPreAllocCleanup(vmdef, chr);
        return -1;
    }
    qemuDomainChrInsertPreAlloced(vmdef, chr);
1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449
    return 0;
}

virDomainChrDefPtr
qemuDomainChrRemove(virDomainDefPtr vmdef,
                    virDomainChrDefPtr chr)
{
    virDomainChrDefPtr ret;
    bool removeCompat;

    if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE &&
        chr->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("detaching serial console is not supported"));
        return NULL;
    }

    /* Due to some crazy backcompat stuff, the first serial device is an alias
     * to the first console too. If this is the case, the definition must be
     * duplicated as first console device. */
    removeCompat = vmdef->nserials && vmdef->nconsoles &&
        vmdef->consoles[0]->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE &&
        vmdef->consoles[0]->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL &&
        virDomainChrEquals(vmdef->serials[0], chr);

    if (!(ret = virDomainChrRemove(vmdef, chr))) {
        virReportError(VIR_ERR_INVALID_ARG, "%s",
                       _("device not present in domain configuration"));
            return NULL;
    }

    if (removeCompat)
        VIR_DELETE_ELEMENT(vmdef->consoles, 0, vmdef->nconsoles);

    return ret;
}
1450

1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485
static int
qemuDomainAttachChrDeviceAssignAddr(qemuDomainObjPrivatePtr priv,
                                    virDomainChrDefPtr chr)
{
    if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE &&
        chr->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_VIRTIO) {
        if (virDomainVirtioSerialAddrAutoAssign(NULL, priv->vioserialaddrs,
                                                &chr->info, true) < 0)
            return -1;
        return 1;

    } else if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL &&
               chr->targetType == VIR_DOMAIN_CHR_SERIAL_TARGET_TYPE_PCI) {
        if (virDomainPCIAddressEnsureAddr(priv->pciaddrs, &chr->info) < 0)
            return -1;
        return 1;

    } else if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CHANNEL &&
               chr->targetType == VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_VIRTIO) {
        if (virDomainVirtioSerialAddrAutoAssign(NULL, priv->vioserialaddrs,
                                                &chr->info, false) < 0)
            return -1;
        return 1;
    }

    if (chr->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_SERIAL ||
        chr->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Unsupported address type for character device"));
        return -1;
    }

    return 0;
}

1486 1487 1488 1489
int qemuDomainAttachChrDevice(virQEMUDriverPtr driver,
                              virDomainObjPtr vm,
                              virDomainChrDefPtr chr)
{
1490
    int ret = -1, rc;
1491 1492 1493 1494
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainDefPtr vmdef = vm->def;
    char *devstr = NULL;
    char *charAlias = NULL;
1495
    bool need_release = false;
1496 1497

    if (qemuAssignDeviceChrAlias(vmdef, chr, -1) < 0)
1498
        goto cleanup;
1499

J
John Ferlan 已提交
1500
    if ((rc = qemuDomainAttachChrDeviceAssignAddr(priv, chr)) < 0)
1501 1502 1503
        goto cleanup;
    if (rc == 1)
        need_release = true;
1504

1505
    if (qemuBuildChrDeviceStr(&devstr, vm->def, chr, priv->qemuCaps) < 0)
1506
        goto cleanup;
1507

J
Ján Tomko 已提交
1508
    if (virAsprintf(&charAlias, "char%s", chr->info.alias) < 0)
1509 1510
        goto cleanup;

1511
    if (qemuDomainChrPreInsert(vmdef, chr) < 0)
1512 1513 1514 1515
        goto cleanup;

    qemuDomainObjEnterMonitor(driver, vm);
    if (qemuMonitorAttachCharDev(priv->mon, charAlias, &chr->source) < 0) {
1516
        ignore_value(qemuDomainObjExitMonitor(driver, vm));
1517
        goto audit;
1518 1519 1520 1521 1522
    }

    if (devstr && qemuMonitorAddDevice(priv->mon, devstr) < 0) {
        /* detach associated chardev on error */
        qemuMonitorDetachCharDev(priv->mon, charAlias);
1523
        ignore_value(qemuDomainObjExitMonitor(driver, vm));
1524
        goto audit;
1525
    }
1526 1527
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto audit;
1528

1529
    qemuDomainChrInsertPreAlloced(vm->def, chr);
1530
    ret = 0;
1531 1532
 audit:
    virDomainAuditChardev(vm, NULL, chr, "attach", ret == 0);
1533
 cleanup:
1534 1535
    if (ret < 0 && virDomainObjIsActive(vm))
        qemuDomainChrInsertPreAllocCleanup(vm->def, chr);
1536 1537
    if (ret < 0 && need_release)
        qemuDomainReleaseDeviceAddress(vm, &chr->info, NULL);
1538 1539 1540 1541 1542
    VIR_FREE(charAlias);
    VIR_FREE(devstr);
    return ret;
}

1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556

int
qemuDomainAttachRNGDevice(virQEMUDriverPtr driver,
                          virDomainObjPtr vm,
                          virDomainRNGDefPtr rng)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    char *devstr = NULL;
    char *charAlias = NULL;
    char *objAlias = NULL;
    virJSONValuePtr props = NULL;
    const char *type;
    int ret = -1;

1557
    if (qemuAssignDeviceRNGAlias(vm->def, rng) < 0)
1558 1559 1560 1561 1562 1563 1564
        return -1;

    /* preallocate space for the device definition */
    if (VIR_REALLOC_N(vm->def->rngs, vm->def->nrngs + 1) < 0)
        return -1;

    if (rng->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) {
1565
        if (qemuDomainMachineIsS390CCW(vm->def) &&
1566 1567 1568 1569 1570
            virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_VIRTIO_CCW)) {
            rng->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW;
        } else if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_VIRTIO_S390)) {
            rng->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_S390;
        }
1571 1572 1573 1574
    } else {
        if (!qemuCheckCCWS390AddressSupport(vm->def, rng->info, priv->qemuCaps,
                                            rng->source.file))
            return -1;
1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609
    }

    if (rng->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE ||
        rng->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
        if (virDomainPCIAddressEnsureAddr(priv->pciaddrs, &rng->info) < 0)
            return -1;
    } else if (rng->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW) {
        if (virDomainCCWAddressAssign(&rng->info, priv->ccwaddrs,
                                      !rng->info.addr.ccw.assigned) < 0)
            return -1;
    }

    /* build required metadata */
    if (!(devstr = qemuBuildRNGDevStr(vm->def, rng, priv->qemuCaps)))
        goto cleanup;

    if (qemuBuildRNGBackendProps(rng, priv->qemuCaps, &type, &props) < 0)
        goto cleanup;

    if (virAsprintf(&objAlias, "obj%s", rng->info.alias) < 0)
        goto cleanup;

    if (virAsprintf(&charAlias, "char%s", rng->info.alias) < 0)
        goto cleanup;

    /* attach the device - up to a 3 stage process */
    qemuDomainObjEnterMonitor(driver, vm);

    if (rng->backend == VIR_DOMAIN_RNG_BACKEND_EGD &&
        qemuMonitorAttachCharDev(priv->mon, charAlias,
                                 rng->source.chardev) < 0)
        goto failchardev;

    if (qemuMonitorAddObject(priv->mon, type, objAlias, props) < 0)
        goto failbackend;
1610
    props = NULL;
1611 1612 1613 1614 1615 1616 1617 1618 1619

    if (qemuMonitorAddDevice(priv->mon, devstr) < 0)
        goto failfrontend;

    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        vm = NULL;
        goto cleanup;
    }

1620
    VIR_APPEND_ELEMENT_INPLACE(vm->def->rngs, vm->def->nrngs, rng);
1621 1622 1623 1624 1625 1626

    ret = 0;

 audit:
    virDomainAuditRNG(vm, NULL, rng, "attach", ret == 0);
 cleanup:
1627
    virJSONValueFree(props);
1628
    if (ret < 0 && vm)
1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640
        qemuDomainReleaseDeviceAddress(vm, &rng->info, NULL);
    VIR_FREE(charAlias);
    VIR_FREE(objAlias);
    VIR_FREE(devstr);
    return ret;

    /* rollback */
 failfrontend:
    ignore_value(qemuMonitorDelObject(priv->mon, objAlias));
 failbackend:
    if (rng->backend == VIR_DOMAIN_RNG_BACKEND_EGD)
        ignore_value(qemuMonitorDetachCharDev(priv->mon, charAlias));
1641
    props = NULL;  /* qemuMonitorAddObject consumes on failure */
1642 1643 1644 1645 1646 1647 1648 1649 1650 1651
 failchardev:
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        vm = NULL;
        goto cleanup;
    }

    goto audit;
}


1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668
/**
 * qemuDomainAttachMemory:
 * @driver: qemu driver data
 * @vm: VM object
 * @mem: Definition of the memory device to be attached. @mem is always consumed
 *
 * Attaches memory device described by @mem to domain @vm.
 *
 * Returns 0 on success -1 on error.
 */
int
qemuDomainAttachMemory(virQEMUDriverPtr driver,
                       virDomainObjPtr vm,
                       virDomainMemoryDefPtr mem)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
1669
    unsigned long long oldmem = virDomainDefGetMemoryActual(vm->def);
1670
    unsigned long long newmem = oldmem + mem->size;
1671 1672 1673 1674
    char *devstr = NULL;
    char *objalias = NULL;
    const char *backendType;
    virJSONValuePtr props = NULL;
1675
    virObjectEventPtr event;
1676 1677 1678
    int id;
    int ret = -1;

1679 1680 1681
    qemuDomainMemoryDeviceAlignSize(vm->def, mem);

    if (qemuDomainDefValidateMemoryHotplug(vm->def, priv->qemuCaps, mem) < 0)
1682 1683
        goto cleanup;

1684
    if (qemuAssignDeviceMemoryAlias(vm->def, mem) < 0)
1685 1686 1687 1688 1689
        goto cleanup;

    if (virAsprintf(&objalias, "mem%s", mem->info.alias) < 0)
        goto cleanup;

1690
    if (!(devstr = qemuBuildMemoryDeviceStr(mem)))
1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703
        goto cleanup;

    if (qemuBuildMemoryBackendStr(mem->size, mem->pagesize,
                                  mem->targetNode, mem->sourceNodes, NULL,
                                  vm->def, priv->qemuCaps, cfg,
                                  &backendType, &props, true) < 0)
        goto cleanup;

    if (virDomainMemoryInsert(vm->def, mem) < 0) {
        virJSONValueFree(props);
        goto cleanup;
    }

1704
    if (qemuDomainAdjustMaxMemLock(vm) < 0) {
1705 1706 1707 1708
        virJSONValueFree(props);
        goto removedef;
    }

1709 1710
    qemuDomainObjEnterMonitor(driver, vm);
    if (qemuMonitorAddObject(priv->mon, backendType, objalias, props) < 0)
1711
        goto exit_monitor;
1712 1713 1714 1715 1716 1717

    if (qemuMonitorAddDevice(priv->mon, devstr) < 0) {
        virErrorPtr err = virSaveLastError();
        ignore_value(qemuMonitorDelObject(priv->mon, objalias));
        virSetError(err);
        virFreeError(err);
1718
        goto exit_monitor;
1719 1720 1721 1722 1723
    }

    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        /* we shouldn't touch mem now, as the def might be freed */
        mem = NULL;
1724
        goto audit;
1725 1726
    }

1727
    event = virDomainEventDeviceAddedNewFromObj(vm, objalias);
1728
    qemuDomainEventQueue(driver, event);
1729

1730 1731
    /* fix the balloon size */
    ignore_value(qemuProcessRefreshBalloonState(driver, vm, QEMU_ASYNC_JOB_NONE));
1732

1733 1734 1735 1736 1737 1738 1739 1740 1741
    /* mem is consumed by vm->def */
    mem = NULL;

    /* this step is best effort, removing the device would be so much trouble */
    ignore_value(qemuDomainUpdateMemoryDeviceInfo(driver, vm,
                                                  QEMU_ASYNC_JOB_NONE));

    ret = 0;

1742 1743
 audit:
    virDomainAuditMemory(vm, oldmem, newmem, "update", ret == 0);
1744 1745 1746 1747 1748 1749 1750
 cleanup:
    virObjectUnref(cfg);
    VIR_FREE(devstr);
    VIR_FREE(objalias);
    virDomainMemoryDefFree(mem);
    return ret;

1751
 exit_monitor:
1752 1753
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        mem = NULL;
1754
        goto audit;
1755 1756
    }

1757
 removedef:
1758 1759 1760 1761 1762
    if ((id = virDomainMemoryFindByDef(vm->def, mem)) >= 0)
        mem = virDomainMemoryRemove(vm->def, id);
    else
        mem = NULL;

1763
    /* reset the mlock limit */
1764 1765 1766 1767
    virErrorPtr err = virSaveLastError();
    ignore_value(qemuDomainAdjustMaxMemLock(vm));
    virSetError(err);
    virFreeError(err);
1768

1769
    goto audit;
1770 1771 1772
}


1773
static int
1774
qemuDomainAttachHostUSBDevice(virQEMUDriverPtr driver,
1775 1776
                              virDomainObjPtr vm,
                              virDomainHostdevDefPtr hostdev)
1777 1778 1779
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    char *devstr = NULL;
1780
    bool added = false;
1781
    bool teardowncgroup = false;
1782
    bool teardownlabel = false;
1783 1784
    int ret = -1;

1785
    if (qemuHostdevPrepareUSBDevices(driver, vm->def->name, &hostdev, 1, 0) < 0)
1786 1787 1788
        goto cleanup;

    added = true;
1789

1790
    if (qemuSetupHostdevCgroup(vm, hostdev) < 0)
1791 1792 1793
        goto cleanup;
    teardowncgroup = true;

1794 1795 1796 1797 1798
    if (virSecurityManagerSetHostdevLabel(driver->securityManager,
                                          vm->def, hostdev, NULL) < 0)
        goto cleanup;
    teardownlabel = true;

1799 1800 1801 1802
    if (qemuAssignDeviceHostdevAlias(vm->def, &hostdev->info->alias, -1) < 0)
        goto cleanup;
    if (!(devstr = qemuBuildUSBHostdevDevStr(vm->def, hostdev, priv->qemuCaps)))
        goto cleanup;
1803

1804
    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs+1) < 0)
1805
        goto cleanup;
1806

1807
    qemuDomainObjEnterMonitor(driver, vm);
1808
    ret = qemuMonitorAddDevice(priv->mon, devstr);
1809 1810 1811 1812
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        ret = -1;
        goto cleanup;
    }
1813
    virDomainAuditHostdev(vm, hostdev, "attach", ret == 0);
1814
    if (ret < 0)
1815
        goto cleanup;
1816 1817 1818

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;

1819
    ret = 0;
1820
 cleanup:
1821 1822 1823 1824 1825 1826 1827
    if (ret < 0) {
        if (teardowncgroup && qemuTeardownHostdevCgroup(vm, hostdev) < 0)
            VIR_WARN("Unable to remove host device cgroup ACL on hotplug fail");
        if (teardownlabel &&
            virSecurityManagerRestoreHostdevLabel(driver->securityManager,
                                                  vm->def, hostdev, NULL) < 0)
            VIR_WARN("Unable to restore host device labelling on hotplug fail");
1828
        if (added)
1829
            qemuHostdevReAttachUSBDevices(driver, vm->def->name, &hostdev, 1);
1830
    }
1831
    VIR_FREE(devstr);
1832
    return ret;
1833 1834
}

1835

1836
static int
1837 1838
qemuDomainAttachHostSCSIDevice(virConnectPtr conn,
                               virQEMUDriverPtr driver,
1839 1840 1841 1842 1843
                               virDomainObjPtr vm,
                               virDomainHostdevDefPtr hostdev)
{
    int ret = -1;
    qemuDomainObjPrivatePtr priv = vm->privateData;
1844
    virErrorPtr orig_err;
1845
    virDomainControllerDefPtr cont = NULL;
1846 1847
    char *devstr = NULL;
    char *drvstr = NULL;
1848
    bool teardowncgroup = false;
1849
    bool teardownlabel = false;
1850

1851
    if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_DEVICE_SCSI_GENERIC)) {
1852 1853 1854 1855 1856
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("SCSI passthrough is not supported by this version of qemu"));
        return -1;
    }

1857 1858 1859 1860
    cont = qemuDomainFindOrCreateSCSIDiskController(driver, vm, hostdev->info->addr.drive.controller);
    if (!cont)
        return -1;

1861
    if (qemuHostdevPrepareSCSIDevices(driver, vm->def->name,
1862
                                      &hostdev, 1)) {
1863
        virDomainHostdevSubsysSCSIPtr scsisrc = &hostdev->source.subsys.u.scsi;
1864 1865 1866 1867 1868 1869 1870 1871
        if (scsisrc->protocol == VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI) {
            virDomainHostdevSubsysSCSIiSCSIPtr iscsisrc = &scsisrc->u.iscsi;
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unable to prepare scsi hostdev for iSCSI: %s"),
                           iscsisrc->path);
        } else {
            virDomainHostdevSubsysSCSIHostPtr scsihostsrc = &scsisrc->u.host;
            virReportError(VIR_ERR_INTERNAL_ERROR,
1872
                           _("Unable to prepare scsi hostdev: %s:%u:%u:%llu"),
1873 1874 1875
                           scsihostsrc->adapter, scsihostsrc->bus,
                           scsihostsrc->target, scsihostsrc->unit);
        }
1876 1877 1878
        return -1;
    }

1879
    if (qemuSetupHostdevCgroup(vm, hostdev) < 0)
1880 1881 1882
        goto cleanup;
    teardowncgroup = true;

1883 1884 1885 1886 1887
    if (virSecurityManagerSetHostdevLabel(driver->securityManager,
                                          vm->def, hostdev, NULL) < 0)
        goto cleanup;
    teardownlabel = true;

1888
    if (qemuAssignDeviceHostdevAlias(vm->def, &hostdev->info->alias, -1) < 0)
1889 1890
        goto cleanup;

J
John Ferlan 已提交
1891
    if (qemuDomainSecretHostdevPrepare(conn, priv, hostdev) < 0)
1892 1893
        goto cleanup;

1894
    if (!(drvstr = qemuBuildSCSIHostdevDrvStr(hostdev)))
1895 1896 1897 1898 1899
        goto cleanup;

    if (!(devstr = qemuBuildSCSIHostdevDevStr(vm->def, hostdev, priv->qemuCaps)))
        goto cleanup;

1900
    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs + 1) < 0)
1901 1902
        goto cleanup;

1903
    /* Attach the device - 2 step process */
1904 1905
    qemuDomainObjEnterMonitor(driver, vm);

1906 1907 1908 1909 1910 1911 1912 1913 1914 1915
    if (qemuMonitorAddDrive(priv->mon, drvstr) < 0)
        goto failadddrive;

    if (qemuMonitorAddDevice(priv->mon, devstr) < 0)
        goto failadddevice;

    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto failexitmonitor;

    virDomainAuditHostdev(vm, hostdev, "attach", true);
1916 1917 1918 1919

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;

    ret = 0;
1920

1921
 cleanup:
1922
    qemuDomainSecretHostdevDestroy(hostdev);
1923
    if (ret < 0) {
1924
        qemuHostdevReAttachSCSIDevices(driver, vm->def->name, &hostdev, 1);
1925 1926
        if (teardowncgroup && qemuTeardownHostdevCgroup(vm, hostdev) < 0)
            VIR_WARN("Unable to remove host device cgroup ACL on hotplug fail");
1927 1928 1929 1930
        if (teardownlabel &&
            virSecurityManagerRestoreHostdevLabel(driver->securityManager,
                                                  vm->def, hostdev, NULL) < 0)
            VIR_WARN("Unable to restore host device labelling on hotplug fail");
1931
    }
1932 1933 1934
    VIR_FREE(drvstr);
    VIR_FREE(devstr);
    return ret;
1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953

 failadddevice:
    orig_err = virSaveLastError();
    if (qemuMonitorDriveDel(priv->mon, drvstr) < 0)
        VIR_WARN("Unable to remove drive %s (%s) after failed "
                 "qemuMonitorAddDevice",
                 drvstr, devstr);
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }

 failadddrive:
    ignore_value(qemuDomainObjExitMonitor(driver, vm));

 failexitmonitor:
    virDomainAuditHostdev(vm, hostdev, "attach", false);

    goto cleanup;
1954 1955
}

1956 1957 1958 1959 1960 1961

int
qemuDomainAttachHostDevice(virConnectPtr conn,
                           virQEMUDriverPtr driver,
                           virDomainObjPtr vm,
                           virDomainHostdevDefPtr hostdev)
1962 1963
{
    if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS) {
1964 1965 1966
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("hostdev mode '%s' not supported"),
                       virDomainHostdevModeTypeToString(hostdev->mode));
1967 1968 1969 1970 1971
        return -1;
    }

    switch (hostdev->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
1972
        if (qemuDomainAttachHostPCIDevice(driver, vm,
1973
                                          hostdev) < 0)
1974 1975 1976 1977
            goto error;
        break;

    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
1978
        if (qemuDomainAttachHostUSBDevice(driver, vm,
1979
                                          hostdev) < 0)
1980 1981 1982
            goto error;
        break;

1983
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI:
1984
        if (qemuDomainAttachHostSCSIDevice(conn, driver, vm,
1985 1986 1987 1988
                                           hostdev) < 0)
            goto error;
        break;

1989
    default:
1990 1991 1992
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("hostdev subsys type '%s' not supported"),
                       virDomainHostdevSubsysTypeToString(hostdev->source.subsys.type));
1993 1994 1995 1996 1997
        goto error;
    }

    return 0;

1998
 error:
1999 2000 2001
    return -1;
}

2002
static int
2003
qemuDomainChangeNetBridge(virDomainObjPtr vm,
2004 2005
                          virDomainNetDefPtr olddev,
                          virDomainNetDefPtr newdev)
2006 2007
{
    int ret = -1;
2008 2009
    const char *oldbridge = virDomainNetGetActualBridgeName(olddev);
    const char *newbridge = virDomainNetGetActualBridgeName(newdev);
2010

2011 2012
    if (!oldbridge || !newbridge) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s", _("Missing bridge name"));
2013
        goto cleanup;
2014
    }
2015 2016 2017 2018 2019

    VIR_DEBUG("Change bridge for interface %s: %s -> %s",
              olddev->ifname, oldbridge, newbridge);

    if (virNetDevExists(newbridge) != 1) {
2020 2021
        virReportError(VIR_ERR_OPERATION_FAILED,
                       _("bridge %s doesn't exist"), newbridge);
2022
        goto cleanup;
2023 2024 2025 2026 2027
    }

    if (oldbridge) {
        ret = virNetDevBridgeRemovePort(oldbridge, olddev->ifname);
        virDomainAuditNet(vm, olddev, NULL, "detach", ret == 0);
2028 2029 2030 2031 2032 2033 2034 2035
        if (ret < 0) {
            /* warn but continue - possibly the old network
             * had been destroyed and reconstructed, leaving the
             * tap device orphaned.
             */
            VIR_WARN("Unable to detach device %s from bridge %s",
                     olddev->ifname, oldbridge);
        }
2036 2037 2038
    }

    ret = virNetDevBridgeAddPort(newbridge, olddev->ifname);
2039
    virDomainAuditNet(vm, NULL, newdev, "attach", ret == 0);
2040 2041 2042 2043
    if (ret < 0) {
        ret = virNetDevBridgeAddPort(oldbridge, olddev->ifname);
        virDomainAuditNet(vm, NULL, olddev, "attach", ret == 0);
        if (ret < 0) {
2044
            virReportError(VIR_ERR_OPERATION_FAILED,
2045
                           _("unable to recover former state by adding port "
2046
                             "to bridge %s"), oldbridge);
2047
        }
2048
        goto cleanup;
2049
    }
2050 2051
    /* caller will replace entire olddev with newdev in domain nets list */
    ret = 0;
2052
 cleanup:
2053
    return ret;
2054 2055
}

2056
static int
2057
qemuDomainChangeNetFilter(virDomainObjPtr vm,
2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075
                          virDomainNetDefPtr olddev,
                          virDomainNetDefPtr newdev)
{
    /* make sure this type of device supports filters. */
    switch (virDomainNetGetActualType(newdev)) {
    case VIR_DOMAIN_NET_TYPE_ETHERNET:
    case VIR_DOMAIN_NET_TYPE_BRIDGE:
    case VIR_DOMAIN_NET_TYPE_NETWORK:
        break;
    default:
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("filters not supported on interfaces of type %s"),
                       virDomainNetTypeToString(virDomainNetGetActualType(newdev)));
        return -1;
    }

    virDomainConfNWFilterTeardown(olddev);

2076
    if (newdev->filter &&
2077
        virDomainConfNWFilterInstantiate(vm->def->uuid, newdev) < 0) {
2078 2079 2080 2081 2082 2083 2084
        virErrorPtr errobj;

        virReportError(VIR_ERR_OPERATION_FAILED,
                       _("failed to add new filter rules to '%s' "
                         "- attempting to restore old rules"),
                       olddev->ifname);
        errobj = virSaveLastError();
2085
        ignore_value(virDomainConfNWFilterInstantiate(vm->def->uuid, olddev));
2086 2087 2088 2089 2090 2091 2092
        virSetError(errobj);
        virFreeError(errobj);
        return -1;
    }
    return 0;
}

2093
int qemuDomainChangeNetLinkState(virQEMUDriverPtr driver,
2094 2095 2096 2097 2098 2099 2100 2101
                                 virDomainObjPtr vm,
                                 virDomainNetDefPtr dev,
                                 int linkstate)
{
    int ret = -1;
    qemuDomainObjPrivatePtr priv = vm->privateData;

    if (!dev->info.alias) {
2102 2103
        virReportError(VIR_ERR_OPERATION_FAILED, "%s",
                       _("can't change link state: device alias not found"));
2104 2105 2106
        return -1;
    }

2107 2108
    VIR_DEBUG("dev: %s, state: %d", dev->info.alias, linkstate);

2109
    qemuDomainObjEnterMonitor(driver, vm);
2110 2111 2112 2113 2114

    ret = qemuMonitorSetLink(priv->mon, dev->info.alias, linkstate);
    if (ret < 0)
        goto cleanup;

2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 2128 2129
    if (virDomainNetGetActualType(dev) == VIR_DOMAIN_NET_TYPE_ETHERNET) {
        switch (linkstate) {
            case VIR_DOMAIN_NET_INTERFACE_LINK_STATE_UP:
            case VIR_DOMAIN_NET_INTERFACE_LINK_STATE_DEFAULT:
                if ((ret = virNetDevSetOnline(dev->ifname, true)) < 0)
                    goto cleanup;
                break;

            case VIR_DOMAIN_NET_INTERFACE_LINK_STATE_DOWN:
                if ((ret = virNetDevSetOnline(dev->ifname, false)) < 0)
                    goto cleanup;
                break;
            }
    }

2130 2131 2132
    /* modify the device configuration */
    dev->linkstate = linkstate;

2133
 cleanup:
2134 2135
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        return -1;
2136 2137 2138 2139

    return ret;
}

2140
int
2141
qemuDomainChangeNet(virQEMUDriverPtr driver,
2142 2143
                    virDomainObjPtr vm,
                    virDomainDeviceDefPtr dev)
2144
{
2145
    virDomainNetDefPtr newdev = dev->data.net;
2146
    virDomainNetDefPtr *devslot = NULL;
2147 2148 2149 2150
    virDomainNetDefPtr olddev;
    int oldType, newType;
    bool needReconnect = false;
    bool needBridgeChange = false;
2151
    bool needFilterChange = false;
2152 2153
    bool needLinkStateChange = false;
    bool needReplaceDevDef = false;
2154
    bool needBandwidthSet = false;
2155
    int ret = -1;
2156 2157 2158 2159 2160
    int changeidx = -1;

    if ((changeidx = virDomainNetFindIdx(vm->def, newdev)) < 0)
        goto cleanup;
    devslot = &vm->def->nets[changeidx];
2161

2162
    if (!(olddev = *devslot)) {
2163
        virReportError(VIR_ERR_OPERATION_FAILED, "%s",
2164
                       _("cannot find existing network device to modify"));
2165 2166 2167 2168 2169 2170
        goto cleanup;
    }

    oldType = virDomainNetGetActualType(olddev);
    if (oldType == VIR_DOMAIN_NET_TYPE_HOSTDEV) {
        /* no changes are possible to a type='hostdev' interface */
2171
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193
                       _("cannot change config of '%s' network type"),
                       virDomainNetTypeToString(oldType));
        goto cleanup;
    }

    /* Check individual attributes for changes that can't be done to a
     * live netdev. These checks *mostly* go in order of the
     * declarations in virDomainNetDef in order to assure nothing is
     * omitted. (exceptiong where noted in comments - in particular,
     * some things require that a new "actual device" be allocated
     * from the network driver first, but we delay doing that until
     * after we've made as many other checks as possible)
     */

    /* type: this can change (with some restrictions), but the actual
     * type of the new device connection isn't known until after we
     * allocate the "actual" device.
     */

    if (virMacAddrCmp(&olddev->mac, &newdev->mac)) {
        char oldmac[VIR_MAC_STRING_BUFLEN], newmac[VIR_MAC_STRING_BUFLEN];

2194
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
2195 2196 2197 2198 2199 2200 2201 2202
                       _("cannot change network interface mac address "
                         "from %s to %s"),
                       virMacAddrFormat(&olddev->mac, oldmac),
                       virMacAddrFormat(&newdev->mac, newmac));
        goto cleanup;
    }

    if (STRNEQ_NULLABLE(olddev->model, newdev->model)) {
2203
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
2204 2205 2206 2207
                       _("cannot modify network device model from %s to %s"),
                       olddev->model ? olddev->model : "(default)",
                       newdev->model ? newdev->model : "(default)");
        goto cleanup;
2208 2209
    }

2210 2211 2212 2213
    if (olddev->model && STREQ(olddev->model, "virtio") &&
        (olddev->driver.virtio.name != newdev->driver.virtio.name ||
         olddev->driver.virtio.txmode != newdev->driver.virtio.txmode ||
         olddev->driver.virtio.ioeventfd != newdev->driver.virtio.ioeventfd ||
2214
         olddev->driver.virtio.event_idx != newdev->driver.virtio.event_idx ||
2215 2216 2217 2218 2219 2220 2221
         olddev->driver.virtio.queues != newdev->driver.virtio.queues ||
         olddev->driver.virtio.host.csum != newdev->driver.virtio.host.csum ||
         olddev->driver.virtio.host.gso != newdev->driver.virtio.host.gso ||
         olddev->driver.virtio.host.tso4 != newdev->driver.virtio.host.tso4 ||
         olddev->driver.virtio.host.tso6 != newdev->driver.virtio.host.tso6 ||
         olddev->driver.virtio.host.ecn != newdev->driver.virtio.host.ecn ||
         olddev->driver.virtio.host.ufo != newdev->driver.virtio.host.ufo ||
J
Ján Tomko 已提交
2222
         olddev->driver.virtio.host.mrg_rxbuf != newdev->driver.virtio.host.mrg_rxbuf ||
2223 2224 2225 2226 2227
         olddev->driver.virtio.guest.csum != newdev->driver.virtio.guest.csum ||
         olddev->driver.virtio.guest.tso4 != newdev->driver.virtio.guest.tso4 ||
         olddev->driver.virtio.guest.tso6 != newdev->driver.virtio.guest.tso6 ||
         olddev->driver.virtio.guest.ecn != newdev->driver.virtio.guest.ecn ||
         olddev->driver.virtio.guest.ufo != newdev->driver.virtio.guest.ufo)) {
2228
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
2229 2230 2231 2232 2233 2234 2235 2236 2237 2238
                       _("cannot modify virtio network device driver attributes"));
        goto cleanup;
    }

    /* data: this union will be examined later, after allocating new actualdev */
    /* virtPortProfile: will be examined later, after allocating new actualdev */

    if (olddev->tune.sndbuf_specified != newdev->tune.sndbuf_specified ||
        olddev->tune.sndbuf != newdev->tune.sndbuf) {
        needReconnect = true;
2239 2240
    }

2241
    if (STRNEQ_NULLABLE(olddev->script, newdev->script)) {
2242
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
2243 2244
                       _("cannot modify network device script attribute"));
        goto cleanup;
2245 2246
    }

2247
    /* ifname: check if it's set in newdev. If not, retain the autogenerated one */
2248
    if (!newdev->ifname && VIR_STRDUP(newdev->ifname, olddev->ifname) < 0)
2249 2250
        goto cleanup;
    if (STRNEQ_NULLABLE(olddev->ifname, newdev->ifname)) {
2251
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
2252 2253 2254
                       _("cannot modify network device tap name"));
        goto cleanup;
    }
2255

2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266
    /* info: if newdev->info is empty, fill it in from olddev,
     * otherwise verify that it matches - nothing is allowed to
     * change. (There is no helper function to do this, so
     * individually check the few feidls of virDomainDeviceInfo that
     * are relevant in this case).
     */
    if (!virDomainDeviceAddressIsValid(&newdev->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        virDomainDeviceInfoCopy(&newdev->info, &olddev->info) < 0) {
        goto cleanup;
    }
2267
    if (!virPCIDeviceAddressEqual(&olddev->info.addr.pci,
2268
                                  &newdev->info.addr.pci)) {
2269
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
2270 2271 2272 2273
                       _("cannot modify network device guest PCI address"));
        goto cleanup;
    }
    /* grab alias from olddev if not set in newdev */
2274 2275
    if (!newdev->info.alias &&
        VIR_STRDUP(newdev->info.alias, olddev->info.alias) < 0)
2276 2277
        goto cleanup;
    if (STRNEQ_NULLABLE(olddev->info.alias, newdev->info.alias)) {
2278
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
2279 2280 2281 2282
                       _("cannot modify network device alias"));
        goto cleanup;
    }
    if (olddev->info.rombar != newdev->info.rombar) {
2283
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
2284 2285 2286 2287
                       _("cannot modify network device rom bar setting"));
        goto cleanup;
    }
    if (STRNEQ_NULLABLE(olddev->info.romfile, newdev->info.romfile)) {
2288
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
2289 2290 2291 2292
                       _("cannot modify network rom file"));
        goto cleanup;
    }
    if (olddev->info.bootIndex != newdev->info.bootIndex) {
2293
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
2294 2295 2296 2297
                       _("cannot modify network device boot index setting"));
        goto cleanup;
    }
    /* (end of device info checks) */
2298

2299 2300 2301 2302
    if (STRNEQ_NULLABLE(olddev->filter, newdev->filter) ||
        !virNWFilterHashTableEqual(olddev->filterparams, newdev->filterparams)) {
        needFilterChange = true;
    }
2303

2304 2305 2306 2307 2308 2309 2310 2311
    /* bandwidth can be modified, and will be checked later */
    /* vlan can be modified, and will be checked later */
    /* linkstate can be modified */

    /* allocate new actual device to compare to old - we will need to
     * free it if we fail for any reason
     */
    if (newdev->type == VIR_DOMAIN_NET_TYPE_NETWORK &&
2312
        networkAllocateActualDevice(vm->def, newdev) < 0) {
2313 2314 2315 2316 2317 2318 2319
        goto cleanup;
    }

    newType = virDomainNetGetActualType(newdev);

    if (newType == VIR_DOMAIN_NET_TYPE_HOSTDEV) {
        /* can't turn it into a type='hostdev' interface */
2320
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
2321 2322 2323 2324 2325 2326
                       _("cannot change network interface type to '%s'"),
                       virDomainNetTypeToString(newType));
        goto cleanup;
    }

    if (olddev->type == newdev->type && oldType == newType) {
2327

2328 2329 2330 2331 2332 2333 2334
        /* if type hasn't changed, check the relevant fields for the type */
        switch (newdev->type) {
        case VIR_DOMAIN_NET_TYPE_USER:
            break;

        case VIR_DOMAIN_NET_TYPE_ETHERNET:
            if (STRNEQ_NULLABLE(olddev->data.ethernet.dev,
2335
                                newdev->data.ethernet.dev)) {
2336 2337
                needReconnect = true;
            }
2338 2339
        break;

2340 2341 2342
        case VIR_DOMAIN_NET_TYPE_SERVER:
        case VIR_DOMAIN_NET_TYPE_CLIENT:
        case VIR_DOMAIN_NET_TYPE_MCAST:
2343
        case VIR_DOMAIN_NET_TYPE_UDP:
2344 2345 2346 2347 2348 2349 2350 2351 2352 2353 2354 2355 2356 2357 2358 2359 2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376
            if (STRNEQ_NULLABLE(olddev->data.socket.address,
                                newdev->data.socket.address) ||
                olddev->data.socket.port != newdev->data.socket.port) {
                needReconnect = true;
            }
            break;

        case VIR_DOMAIN_NET_TYPE_NETWORK:
            if (STRNEQ(olddev->data.network.name, newdev->data.network.name)) {
                if (virDomainNetGetActualVirtPortProfile(newdev))
                    needReconnect = true;
                else
                    needBridgeChange = true;
            }
            /* other things handled in common code directly below this switch */
            break;

        case VIR_DOMAIN_NET_TYPE_BRIDGE:
            /* all handled in bridge name checked in common code below */
            break;

        case VIR_DOMAIN_NET_TYPE_INTERNAL:
            if (STRNEQ_NULLABLE(olddev->data.internal.name,
                                newdev->data.internal.name)) {
                needReconnect = true;
            }
            break;

        case VIR_DOMAIN_NET_TYPE_DIRECT:
            /* all handled in common code directly below this switch */
            break;

        default:
2377
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
2378 2379 2380
                           _("unable to change config on '%s' network type"),
                           virDomainNetTypeToString(newdev->type));
            break;
2381

2382
        }
2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406 2407 2408 2409 2410 2411 2412 2413
    } else {
        /* interface type has changed. There are a few special cases
         * where this can only require a minor (or even no) change,
         * but in most cases we need to do a full reconnection.
         *
         * If we switch (in either direction) between type='bridge'
         * and type='network' (for a traditional managed virtual
         * network that uses a host bridge, i.e. forward
         * mode='route|nat'), we just need to change the bridge.
         */
        if ((oldType == VIR_DOMAIN_NET_TYPE_NETWORK &&
             newType == VIR_DOMAIN_NET_TYPE_BRIDGE) ||
            (oldType == VIR_DOMAIN_NET_TYPE_BRIDGE &&
             newType == VIR_DOMAIN_NET_TYPE_NETWORK)) {

            needBridgeChange = true;

        } else if (oldType == VIR_DOMAIN_NET_TYPE_DIRECT &&
                   newType == VIR_DOMAIN_NET_TYPE_DIRECT) {

            /* this is the case of switching from type='direct' to
             * type='network' for a network that itself uses direct
             * (macvtap) devices. If the physical device and mode are
             * the same, this doesn't require any actual setup
             * change. If the physical device or mode *does* change,
             * that will be caught in the common section below */

        } else {

            /* for all other combinations, we'll need a full reconnect */
            needReconnect = true;
2414 2415

        }
2416
    }
2417

2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428
    /* now several things that are in multiple (but not all)
     * different types, and can be safely compared even for those
     * cases where they don't apply to a particular type.
     */
    if (STRNEQ_NULLABLE(virDomainNetGetActualBridgeName(olddev),
                        virDomainNetGetActualBridgeName(newdev))) {
        if (virDomainNetGetActualVirtPortProfile(newdev))
            needReconnect = true;
        else
            needBridgeChange = true;
    }
2429

2430 2431 2432 2433 2434 2435 2436 2437
    if (STRNEQ_NULLABLE(virDomainNetGetActualDirectDev(olddev),
                        virDomainNetGetActualDirectDev(newdev)) ||
        virDomainNetGetActualDirectMode(olddev) != virDomainNetGetActualDirectMode(olddev) ||
        !virNetDevVPortProfileEqual(virDomainNetGetActualVirtPortProfile(olddev),
                                    virDomainNetGetActualVirtPortProfile(newdev)) ||
        !virNetDevVlanEqual(virDomainNetGetActualVlan(olddev),
                            virDomainNetGetActualVlan(newdev))) {
        needReconnect = true;
2438 2439
    }

2440 2441 2442
    if (olddev->linkstate != newdev->linkstate)
        needLinkStateChange = true;

2443 2444 2445 2446
    if (!virNetDevBandwidthEqual(virDomainNetGetActualBandwidth(olddev),
                                 virDomainNetGetActualBandwidth(newdev)))
        needBandwidthSet = true;

2447 2448 2449
    /* FINALLY - actually perform the required actions */

    if (needReconnect) {
2450
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
2451 2452 2453
                       _("unable to change config on '%s' network type"),
                       virDomainNetTypeToString(newdev->type));
        goto cleanup;
2454 2455
    }

2456 2457 2458
    if (needBandwidthSet) {
        if (virNetDevBandwidthSet(newdev->ifname,
                                  virDomainNetGetActualBandwidth(newdev),
2459
                                  false) < 0)
2460 2461 2462 2463
            goto cleanup;
        needReplaceDevDef = true;
    }

2464
    if (needBridgeChange) {
2465
        if (qemuDomainChangeNetBridge(vm, olddev, newdev) < 0)
2466 2467 2468
            goto cleanup;
        /* we successfully switched to the new bridge, and we've
         * determined that the rest of newdev is equivalent to olddev,
2469 2470 2471 2472 2473
         * so move newdev into place */
        needReplaceDevDef = true;
    }

    if (needFilterChange) {
2474
        if (qemuDomainChangeNetFilter(vm, olddev, newdev) < 0)
2475 2476 2477 2478
            goto cleanup;
        /* we successfully switched to the new filter, and we've
         * determined that the rest of newdev is equivalent to olddev,
         * so move newdev into place */
2479
        needReplaceDevDef = true;
2480 2481
    }

2482 2483 2484
    if (needLinkStateChange &&
        qemuDomainChangeNetLinkState(driver, vm, olddev, newdev->linkstate) < 0) {
        goto cleanup;
2485 2486
    }

2487 2488 2489 2490
    if (needReplaceDevDef) {
        /* the changes above warrant replacing olddev with newdev in
         * the domain's nets list.
         */
2491 2492 2493

        /* this function doesn't work with HOSTDEV networks yet, thus
         * no need to change the pointer in the hostdev structure */
2494
        networkReleaseActualDevice(vm->def, olddev);
2495 2496 2497 2498 2499 2500 2501 2502
        virDomainNetDefFree(olddev);
        /* move newdev into the nets list, and NULL it out from the
         * virDomainDeviceDef that we were given so that the caller
         * won't delete it on return.
         */
        *devslot = newdev;
        newdev = dev->data.net = NULL;
        dev->type = VIR_DOMAIN_DEVICE_NONE;
2503 2504
    }

2505
    ret = 0;
2506
 cleanup:
2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525
    /* When we get here, we will be in one of these two states:
     *
     * 1) newdev has been moved into the domain's list of nets and
     *    newdev set to NULL, and dev->data.net will be NULL (and
     *    dev->type is NONE). olddev will have been completely
     *    released and freed. (aka success) In this case no extra
     *    cleanup is needed.
     *
     * 2) newdev has *not* been moved into the domain's list of nets,
     *    and dev->data.net == newdev (and dev->type == NET). In this *
     *    case, we need to at least release the "actual device" from *
     *    newdev (the caller will free dev->data.net a.k.a. newdev, and
     *    the original olddev is still in used)
     *
     * Note that case (2) isn't necessarily a failure. It may just be
     * that the changes were minor enough that we didn't need to
     * replace the entire device object.
     */
    if (newdev)
2526
        networkReleaseActualDevice(vm->def, newdev);
2527

2528 2529 2530
    return ret;
}

2531 2532 2533
static virDomainGraphicsDefPtr
qemuDomainFindGraphics(virDomainObjPtr vm,
                       virDomainGraphicsDefPtr dev)
2534
{
2535
    size_t i;
2536

2537
    for (i = 0; i < vm->def->ngraphics; i++) {
2538 2539 2540 2541 2542 2543 2544
        if (vm->def->graphics[i]->type == dev->type)
            return vm->def->graphics[i];
    }

    return NULL;
}

2545 2546 2547 2548 2549 2550 2551 2552 2553 2554 2555 2556 2557 2558
int
qemuDomainFindGraphicsIndex(virDomainDefPtr def,
                            virDomainGraphicsDefPtr dev)
{
    size_t i;

    for (i = 0; i < def->ngraphics; i++) {
        if (def->graphics[i]->type == dev->type)
            return i;
    }

    return -1;
}

2559
int
2560
qemuDomainChangeGraphics(virQEMUDriverPtr driver,
2561 2562 2563 2564
                         virDomainObjPtr vm,
                         virDomainGraphicsDefPtr dev)
{
    virDomainGraphicsDefPtr olddev = qemuDomainFindGraphics(vm, dev);
2565
    virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
2566
    const char *type = virDomainGraphicsTypeToString(dev->type);
2567
    size_t i;
2568
    int ret = -1;
2569 2570

    if (!olddev) {
2571 2572
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("cannot find existing graphics device to modify"));
2573
        goto cleanup;
2574 2575
    }

2576
    if (dev->nListens != olddev->nListens) {
2577 2578 2579
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("cannot change the number of listen addresses "
                         "on '%s' graphics"), type);
2580 2581 2582 2583
        goto cleanup;
    }

    for (i = 0; i < dev->nListens; i++) {
J
Jim Fehlig 已提交
2584
        virDomainGraphicsListenDefPtr newlisten = &dev->listens[i];
2585 2586
        virDomainGraphicsListenDefPtr oldlisten = &olddev->listens[i];

J
Jim Fehlig 已提交
2587
        if (newlisten->type != oldlisten->type) {
2588 2589 2590
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                           _("cannot change the type of listen address "
                             "on '%s' graphics"), type);
2591 2592 2593
            goto cleanup;
        }

2594
        switch (newlisten->type) {
2595
        case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_ADDRESS:
J
Jim Fehlig 已提交
2596
            if (STRNEQ_NULLABLE(newlisten->address, oldlisten->address)) {
2597 2598 2599
                virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                               _("cannot change listen address setting "
                                 "on '%s' graphics"), type);
2600 2601
                goto cleanup;
            }
2602

2603 2604 2605
            break;

        case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_NETWORK:
J
Jim Fehlig 已提交
2606
            if (STRNEQ_NULLABLE(newlisten->network, oldlisten->network)) {
2607 2608 2609
                virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                               _("cannot change listen address setting "
                                 "on '%s' graphics"), type);
2610 2611
                goto cleanup;
            }
2612

2613 2614 2615 2616 2617 2618 2619 2620
            break;

        case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_NONE:
        case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_LAST:
            /* nada */
            break;
        }
    }
2621

2622 2623
    switch (dev->type) {
    case VIR_DOMAIN_GRAPHICS_TYPE_VNC:
2624 2625 2626
        if ((olddev->data.vnc.autoport != dev->data.vnc.autoport) ||
            (!dev->data.vnc.autoport &&
             (olddev->data.vnc.port != dev->data.vnc.port))) {
2627
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
2628
                           _("cannot change port settings on vnc graphics"));
2629
            goto cleanup;
2630 2631
        }
        if (STRNEQ_NULLABLE(olddev->data.vnc.keymap, dev->data.vnc.keymap)) {
2632
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
2633
                           _("cannot change keymap setting on vnc graphics"));
2634
            goto cleanup;
2635 2636
        }

2637 2638 2639
        /* If a password lifetime was, or is set, or action if connected has
         * changed, then we must always run, even if new password matches
         * old password */
2640 2641
        if (olddev->data.vnc.auth.expires ||
            dev->data.vnc.auth.expires ||
2642
            olddev->data.vnc.auth.connected != dev->data.vnc.auth.connected ||
E
Eric Blake 已提交
2643 2644 2645
            STRNEQ_NULLABLE(olddev->data.vnc.auth.passwd,
                            dev->data.vnc.auth.passwd)) {
            VIR_DEBUG("Updating password on VNC server %p %p",
2646
                      dev->data.vnc.auth.passwd, cfg->vncPassword);
E
Eric Blake 已提交
2647 2648 2649
            ret = qemuDomainChangeGraphicsPasswords(driver, vm,
                                                    VIR_DOMAIN_GRAPHICS_TYPE_VNC,
                                                    &dev->data.vnc.auth,
2650 2651
                                                    cfg->vncPassword,
                                                    QEMU_ASYNC_JOB_NONE);
2652
            if (ret < 0)
2653
                goto cleanup;
2654 2655 2656 2657 2658

            /* Steal the new dev's  char * reference */
            VIR_FREE(olddev->data.vnc.auth.passwd);
            olddev->data.vnc.auth.passwd = dev->data.vnc.auth.passwd;
            dev->data.vnc.auth.passwd = NULL;
2659 2660
            olddev->data.vnc.auth.validTo = dev->data.vnc.auth.validTo;
            olddev->data.vnc.auth.expires = dev->data.vnc.auth.expires;
2661
            olddev->data.vnc.auth.connected = dev->data.vnc.auth.connected;
2662 2663 2664 2665 2666
        } else {
            ret = 0;
        }
        break;

2667
    case VIR_DOMAIN_GRAPHICS_TYPE_SPICE:
2668 2669 2670 2671 2672
        if ((olddev->data.spice.autoport != dev->data.spice.autoport) ||
            (!dev->data.spice.autoport &&
             (olddev->data.spice.port != dev->data.spice.port)) ||
            (!dev->data.spice.autoport &&
             (olddev->data.spice.tlsPort != dev->data.spice.tlsPort))) {
2673
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
2674
                           _("cannot change port settings on spice graphics"));
2675
            goto cleanup;
2676
        }
E
Eric Blake 已提交
2677 2678
        if (STRNEQ_NULLABLE(olddev->data.spice.keymap,
                            dev->data.spice.keymap)) {
2679
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
2680
                            _("cannot change keymap setting on spice graphics"));
2681
            goto cleanup;
2682 2683
        }

2684 2685 2686 2687 2688
        /* We must reset the password if it has changed but also if:
         * - password lifetime is or was set
         * - the requested action has changed
         * - the action is "disconnect"
         */
2689 2690
        if (olddev->data.spice.auth.expires ||
            dev->data.spice.auth.expires ||
2691
            olddev->data.spice.auth.connected != dev->data.spice.auth.connected ||
2692 2693
            dev->data.spice.auth.connected ==
            VIR_DOMAIN_GRAPHICS_AUTH_CONNECTED_DISCONNECT ||
E
Eric Blake 已提交
2694 2695 2696
            STRNEQ_NULLABLE(olddev->data.spice.auth.passwd,
                            dev->data.spice.auth.passwd)) {
            VIR_DEBUG("Updating password on SPICE server %p %p",
2697
                      dev->data.spice.auth.passwd, cfg->spicePassword);
E
Eric Blake 已提交
2698 2699 2700
            ret = qemuDomainChangeGraphicsPasswords(driver, vm,
                                                    VIR_DOMAIN_GRAPHICS_TYPE_SPICE,
                                                    &dev->data.spice.auth,
2701 2702
                                                    cfg->spicePassword,
                                                    QEMU_ASYNC_JOB_NONE);
E
Eric Blake 已提交
2703

2704
            if (ret < 0)
2705
                goto cleanup;
2706

E
Eric Blake 已提交
2707
            /* Steal the new dev's char * reference */
2708 2709 2710 2711 2712
            VIR_FREE(olddev->data.spice.auth.passwd);
            olddev->data.spice.auth.passwd = dev->data.spice.auth.passwd;
            dev->data.spice.auth.passwd = NULL;
            olddev->data.spice.auth.validTo = dev->data.spice.auth.validTo;
            olddev->data.spice.auth.expires = dev->data.spice.auth.expires;
2713
            olddev->data.spice.auth.connected = dev->data.spice.auth.connected;
2714
        } else {
2715
            VIR_DEBUG("Not updating since password didn't change");
2716 2717
            ret = 0;
        }
E
Eric Blake 已提交
2718
        break;
2719

2720
    default:
2721
        virReportError(VIR_ERR_INTERNAL_ERROR,
2722
                       _("unable to change config on '%s' graphics type"), type);
2723 2724 2725
        break;
    }

2726
 cleanup:
2727
    virObjectUnref(cfg);
2728 2729 2730 2731
    return ret;
}


2732
static int qemuComparePCIDevice(virDomainDefPtr def ATTRIBUTE_UNUSED,
2733
                                virDomainDeviceDefPtr device ATTRIBUTE_UNUSED,
2734
                                virDomainDeviceInfoPtr info1,
2735 2736
                                void *opaque)
{
2737
    virDomainDeviceInfoPtr info2 = opaque;
2738

2739 2740
    if (info1->type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI ||
        info2->type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)
2741 2742
        return 0;

2743 2744 2745
    if (info1->addr.pci.domain == info2->addr.pci.domain &&
        info1->addr.pci.bus == info2->addr.pci.bus &&
        info1->addr.pci.slot == info2->addr.pci.slot &&
2746
        info1->addr.pci.function != info2->addr.pci.function)
2747 2748 2749 2750 2751 2752 2753 2754 2755 2756 2757 2758
        return -1;
    return 0;
}

static bool qemuIsMultiFunctionDevice(virDomainDefPtr def,
                                      virDomainDeviceInfoPtr dev)
{
    if (virDomainDeviceInfoIterate(def, qemuComparePCIDevice, dev) < 0)
        return true;
    return false;
}

2759

2760
static int
2761 2762 2763 2764 2765
qemuDomainRemoveDiskDevice(virQEMUDriverPtr driver,
                           virDomainObjPtr vm,
                           virDomainDiskDefPtr disk)
{
    virDomainDeviceDef dev;
2766
    virObjectEventPtr event;
2767
    size_t i;
2768
    const char *src = virDomainDiskGetSource(disk);
2769 2770
    qemuDomainObjPrivatePtr priv = vm->privateData;
    char *drivestr;
2771 2772 2773 2774

    VIR_DEBUG("Removing disk %s from domain %p %s",
              disk->info.alias, vm, vm->def->name);

2775 2776 2777 2778 2779 2780 2781 2782 2783
    /* build the actual drive id string as the disk->info.alias doesn't
     * contain the QEMU_DRIVE_HOST_PREFIX that is passed to qemu */
    if (virAsprintf(&drivestr, "%s%s",
                    QEMU_DRIVE_HOST_PREFIX, disk->info.alias) < 0)
        return -1;

    qemuDomainObjEnterMonitor(driver, vm);
    qemuMonitorDriveDel(priv->mon, drivestr);
    VIR_FREE(drivestr);
2784 2785
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        return -1;
2786

2787
    virDomainAuditDisk(vm, disk->src, NULL, "detach", true);
2788

2789
    event = virDomainEventDeviceRemovedNewFromObj(vm, disk->info.alias);
2790
    qemuDomainEventQueue(driver, event);
2791

2792 2793 2794 2795 2796 2797 2798
    for (i = 0; i < vm->def->ndisks; i++) {
        if (vm->def->disks[i] == disk) {
            virDomainDiskRemove(vm->def, i);
            break;
        }
    }

2799
    qemuDomainReleaseDeviceAddress(vm, &disk->info, src);
2800

2801 2802
    if (virSecurityManagerRestoreDiskLabel(driver->securityManager,
                                           vm->def, disk) < 0)
2803
        VIR_WARN("Unable to restore security label on %s", src);
2804 2805

    if (qemuTeardownDiskCgroup(vm, disk) < 0)
2806
        VIR_WARN("Failed to tear down cgroup for disk path %s", src);
2807 2808

    if (virDomainLockDiskDetach(driver->lockManager, vm, disk) < 0)
2809
        VIR_WARN("Unable to release lock on %s", src);
2810 2811 2812 2813 2814 2815

    dev.type = VIR_DOMAIN_DEVICE_DISK;
    dev.data.disk = disk;
    ignore_value(qemuRemoveSharedDevice(driver, &dev, vm->def->name));

    virDomainDiskDefFree(disk);
2816
    return 0;
2817 2818 2819
}


2820
static int
2821
qemuDomainRemoveControllerDevice(virQEMUDriverPtr driver,
2822 2823 2824
                                 virDomainObjPtr vm,
                                 virDomainControllerDefPtr controller)
{
2825
    virObjectEventPtr event;
2826 2827 2828 2829 2830
    size_t i;

    VIR_DEBUG("Removing controller %s from domain %p %s",
              controller->info.alias, vm, vm->def->name);

2831
    event = virDomainEventDeviceRemovedNewFromObj(vm, controller->info.alias);
2832
    qemuDomainEventQueue(driver, event);
2833

2834 2835 2836 2837 2838 2839 2840 2841 2842
    for (i = 0; i < vm->def->ncontrollers; i++) {
        if (vm->def->controllers[i] == controller) {
            virDomainControllerRemove(vm->def, i);
            break;
        }
    }

    qemuDomainReleaseDeviceAddress(vm, &controller->info, NULL);
    virDomainControllerDefFree(controller);
2843
    return 0;
2844 2845 2846
}


2847 2848 2849 2850 2851 2852
static int
qemuDomainRemoveMemoryDevice(virQEMUDriverPtr driver,
                             virDomainObjPtr vm,
                             virDomainMemoryDefPtr mem)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
2853
    unsigned long long oldmem = virDomainDefGetMemoryActual(vm->def);
2854
    unsigned long long newmem = oldmem - mem->size;
2855 2856 2857 2858 2859 2860 2861 2862
    virObjectEventPtr event;
    char *backendAlias = NULL;
    int rc;
    int idx;

    VIR_DEBUG("Removing memory device %s from domain %p %s",
              mem->info.alias, vm, vm->def->name);

2863 2864
    event = virDomainEventDeviceRemovedNewFromObj(vm, mem->info.alias);
    qemuDomainEventQueue(driver, event);
2865 2866

    if (virAsprintf(&backendAlias, "mem%s", mem->info.alias) < 0)
2867
        return -1;
2868 2869 2870

    qemuDomainObjEnterMonitor(driver, vm);
    rc = qemuMonitorDelObject(priv->mon, backendAlias);
2871 2872 2873 2874 2875 2876 2877 2878
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        rc = -1;

    VIR_FREE(backendAlias);

    virDomainAuditMemory(vm, oldmem, newmem, "update", rc == 0);
    if (rc < 0)
        return -1;
2879 2880 2881 2882 2883

    if ((idx = virDomainMemoryFindByDef(vm->def, mem)) >= 0)
        virDomainMemoryRemove(vm->def, idx);

    virDomainMemoryDefFree(mem);
2884

2885 2886 2887
    /* fix the balloon size */
    ignore_value(qemuProcessRefreshBalloonState(driver, vm, QEMU_ASYNC_JOB_NONE));

2888
    /* decrease the mlock limit after memory unplug if necessary */
2889
    ignore_value(qemuDomainAdjustMaxMemLock(vm));
2890

2891
    return 0;
2892 2893 2894
}


2895 2896 2897 2898 2899
static void
qemuDomainRemovePCIHostDevice(virQEMUDriverPtr driver,
                              virDomainObjPtr vm,
                              virDomainHostdevDefPtr hostdev)
{
2900
    qemuHostdevReAttachPCIDevices(driver, vm->def->name, &hostdev, 1);
2901 2902 2903 2904 2905
    qemuDomainReleaseDeviceAddress(vm, hostdev->info, NULL);
}

static void
qemuDomainRemoveUSBHostDevice(virQEMUDriverPtr driver,
2906
                              virDomainObjPtr vm,
2907 2908
                              virDomainHostdevDefPtr hostdev)
{
2909
    qemuHostdevReAttachUSBDevices(driver, vm->def->name, &hostdev, 1);
2910 2911 2912 2913 2914 2915 2916
}

static void
qemuDomainRemoveSCSIHostDevice(virQEMUDriverPtr driver,
                               virDomainObjPtr vm,
                               virDomainHostdevDefPtr hostdev)
{
2917
    qemuHostdevReAttachSCSIDevices(driver, vm->def->name, &hostdev, 1);
2918 2919
}

2920
static int
2921 2922 2923 2924
qemuDomainRemoveHostDevice(virQEMUDriverPtr driver,
                           virDomainObjPtr vm,
                           virDomainHostdevDefPtr hostdev)
{
2925
    virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
2926
    virDomainNetDefPtr net = NULL;
2927
    virObjectEventPtr event;
2928
    size_t i;
2929 2930 2931
    int ret = -1;
    qemuDomainObjPrivatePtr priv = vm->privateData;
    char *drivestr = NULL;
2932 2933 2934 2935

    VIR_DEBUG("Removing host device %s from domain %p %s",
              hostdev->info->alias, vm, vm->def->name);

2936 2937 2938 2939 2940 2941 2942 2943 2944 2945
    if (hostdev->source.subsys.type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI) {
        /* build the actual drive id string as generated during
         * qemuBuildSCSIHostdevDrvStr that is passed to qemu */
        if (virAsprintf(&drivestr, "%s-%s",
                        virDomainDeviceAddressTypeToString(hostdev->info->type),
                        hostdev->info->alias) < 0)
            goto cleanup;

        qemuDomainObjEnterMonitor(driver, vm);
        qemuMonitorDriveDel(priv->mon, drivestr);
2946 2947
        if (qemuDomainObjExitMonitor(driver, vm) < 0)
            goto cleanup;
2948 2949
    }

2950
    event = virDomainEventDeviceRemovedNewFromObj(vm, hostdev->info->alias);
2951
    qemuDomainEventQueue(driver, event);
2952

2953 2954 2955 2956 2957 2958 2959 2960 2961 2962 2963 2964 2965 2966 2967 2968 2969 2970 2971 2972
    if (hostdev->parent.type == VIR_DOMAIN_DEVICE_NET) {
        net = hostdev->parent.data.net;

        for (i = 0; i < vm->def->nnets; i++) {
            if (vm->def->nets[i] == net) {
                virDomainNetRemove(vm->def, i);
                break;
            }
        }
    }

    for (i = 0; i < vm->def->nhostdevs; i++) {
        if (vm->def->hostdevs[i] == hostdev) {
            virDomainHostdevRemove(vm->def, i);
            break;
        }
    }

    virDomainAuditHostdev(vm, hostdev, "detach", true);

2973 2974 2975 2976 2977 2978 2979 2980
    if (hostdev->source.subsys.type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI &&
        hostdev->source.subsys.u.pci.backend !=
        VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO) {
        if (virSecurityManagerRestoreHostdevLabel(driver->securityManager,
                                                  vm->def, hostdev, NULL) < 0)
            VIR_WARN("Failed to restore host device labelling");
    }

2981 2982 2983
    if (qemuTeardownHostdevCgroup(vm, hostdev) < 0)
        VIR_WARN("Failed to remove host device cgroup ACL");

2984
    switch ((virDomainHostdevSubsysType) hostdev->source.subsys.type) {
2985 2986
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
        qemuDomainRemovePCIHostDevice(driver, vm, hostdev);
2987 2988 2989 2990
        /* QEMU might no longer need to lock as much memory, eg. we just
         * detached the last VFIO device, so adjust the limit here */
        if (qemuDomainAdjustMaxMemLock(vm) < 0)
            VIR_WARN("Failed to adjust locked memory limit");
2991 2992 2993 2994 2995 2996 2997 2998 2999 3000 3001 3002 3003 3004
        break;
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
        qemuDomainRemoveUSBHostDevice(driver, vm, hostdev);
        break;
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI:
        qemuDomainRemoveSCSIHostDevice(driver, vm, hostdev);
        break;
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_LAST:
        break;
    }

    virDomainHostdevDefFree(hostdev);

    if (net) {
3005
        networkReleaseActualDevice(vm->def, net);
3006 3007
        virDomainNetDefFree(net);
    }
3008

3009 3010 3011 3012
    ret = 0;

 cleanup:
    VIR_FREE(drivestr);
3013
    virObjectUnref(cfg);
3014
    return ret;
3015 3016 3017
}


3018
static int
3019 3020 3021 3022 3023
qemuDomainRemoveNetDevice(virQEMUDriverPtr driver,
                          virDomainObjPtr vm,
                          virDomainNetDefPtr net)
{
    virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
3024
    qemuDomainObjPrivatePtr priv = vm->privateData;
3025
    virNetDevVPortProfilePtr vport;
3026
    virObjectEventPtr event;
3027
    char *hostnet_name = NULL;
3028
    size_t i;
3029
    int ret = -1;
3030

3031 3032
    if (virDomainNetGetActualType(net) == VIR_DOMAIN_NET_TYPE_HOSTDEV) {
        /* this function handles all hostdev and netdev cleanup */
3033 3034
        ret = qemuDomainRemoveHostDevice(driver, vm,
                                         virDomainNetGetActualHostdev(net));
3035
        goto cleanup;
3036 3037
    }

3038 3039 3040
    VIR_DEBUG("Removing network interface %s from domain %p %s",
              net->info.alias, vm, vm->def->name);

3041 3042 3043 3044
    if (virAsprintf(&hostnet_name, "host%s", net->info.alias) < 0)
        goto cleanup;

    qemuDomainObjEnterMonitor(driver, vm);
3045
    if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_NETDEV)) {
3046
        if (qemuMonitorRemoveNetdev(priv->mon, hostnet_name) < 0) {
3047 3048
            if (qemuDomainObjExitMonitor(driver, vm) < 0)
                goto cleanup;
3049 3050 3051 3052 3053 3054 3055 3056 3057 3058 3059
            virDomainAuditNet(vm, net, NULL, "detach", false);
            goto cleanup;
        }
    } else {
        int vlan;
        if ((vlan = qemuDomainNetVLAN(net)) < 0 ||
            qemuMonitorRemoveHostNetwork(priv->mon, vlan, hostnet_name) < 0) {
            if (vlan < 0) {
                virReportError(VIR_ERR_OPERATION_FAILED, "%s",
                               _("unable to determine original VLAN"));
            }
3060 3061
            if (qemuDomainObjExitMonitor(driver, vm) < 0)
                goto cleanup;
3062 3063 3064 3065
            virDomainAuditNet(vm, net, NULL, "detach", false);
            goto cleanup;
        }
    }
3066 3067
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;
3068

3069 3070 3071
    virDomainAuditNet(vm, net, NULL, "detach", true);

    event = virDomainEventDeviceRemovedNewFromObj(vm, net->info.alias);
3072
    qemuDomainEventQueue(driver, event);
3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083

    for (i = 0; i < vm->def->nnets; i++) {
        if (vm->def->nets[i] == net) {
            virDomainNetRemove(vm->def, i);
            break;
        }
    }

    qemuDomainReleaseDeviceAddress(vm, &net->info, NULL);
    virDomainConfNWFilterTeardown(net);

3084 3085 3086 3087 3088 3089
    if (cfg->macFilter && (net->ifname != NULL)) {
        ignore_value(ebtablesRemoveForwardAllowIn(driver->ebtables,
                                                  net->ifname,
                                                  &net->mac));
    }

3090 3091 3092 3093 3094 3095 3096 3097 3098 3099
    if (virDomainNetGetActualType(net) == VIR_DOMAIN_NET_TYPE_DIRECT) {
        ignore_value(virNetDevMacVLanDeleteWithVPortProfile(
                         net->ifname, &net->mac,
                         virDomainNetGetActualDirectDev(net),
                         virDomainNetGetActualDirectMode(net),
                         virDomainNetGetActualVirtPortProfile(net),
                         cfg->stateDir));
    }

    vport = virDomainNetGetActualVirtPortProfile(net);
3100 3101 3102 3103 3104 3105 3106 3107 3108
    if (vport) {
        if (vport->virtPortType == VIR_NETDEV_VPORT_PROFILE_MIDONET) {
            ignore_value(virNetDevMidonetUnbindPort(vport));
        } else if (vport->virtPortType == VIR_NETDEV_VPORT_PROFILE_OPENVSWITCH) {
            ignore_value(virNetDevOpenvswitchRemovePort(
                             virDomainNetGetActualBridgeName(net),
                             net->ifname));
        }
    }
3109

3110
    networkReleaseActualDevice(vm->def, net);
3111
    virDomainNetDefFree(net);
3112
    ret = 0;
3113 3114

 cleanup:
3115
    virObjectUnref(cfg);
3116 3117
    VIR_FREE(hostnet_name);
    return ret;
3118 3119 3120
}


3121
static int
3122
qemuDomainRemoveChrDevice(virQEMUDriverPtr driver,
3123 3124 3125
                          virDomainObjPtr vm,
                          virDomainChrDefPtr chr)
{
3126
    virObjectEventPtr event;
3127 3128 3129
    char *charAlias = NULL;
    qemuDomainObjPrivatePtr priv = vm->privateData;
    int ret = -1;
3130
    int rc;
3131

3132 3133 3134
    VIR_DEBUG("Removing character device %s from domain %p %s",
              chr->info.alias, vm, vm->def->name);

3135 3136 3137 3138
    if (virAsprintf(&charAlias, "char%s", chr->info.alias) < 0)
        goto cleanup;

    qemuDomainObjEnterMonitor(driver, vm);
3139
    rc = qemuMonitorDetachCharDev(priv->mon, charAlias);
3140 3141
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;
3142

3143 3144 3145 3146 3147
    virDomainAuditChardev(vm, chr, NULL, "detach", rc == 0);

    if (rc < 0)
        goto cleanup;

3148
    event = virDomainEventDeviceRemovedNewFromObj(vm, chr->info.alias);
3149
    qemuDomainEventQueue(driver, event);
3150

3151 3152
    qemuDomainChrRemove(vm->def, chr);
    virDomainChrDefFree(chr);
3153 3154 3155 3156 3157
    ret = 0;

 cleanup:
    VIR_FREE(charAlias);
    return ret;
3158 3159 3160
}


3161 3162 3163 3164 3165 3166 3167 3168 3169 3170 3171 3172 3173 3174 3175 3176 3177 3178 3179 3180 3181 3182 3183 3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195 3196
static int
qemuDomainRemoveRNGDevice(virQEMUDriverPtr driver,
                          virDomainObjPtr vm,
                          virDomainRNGDefPtr rng)
{
    virObjectEventPtr event;
    char *charAlias = NULL;
    char *objAlias = NULL;
    qemuDomainObjPrivatePtr priv = vm->privateData;
    ssize_t idx;
    int ret = -1;
    int rc;

    VIR_DEBUG("Removing RNG device %s from domain %p %s",
              rng->info.alias, vm, vm->def->name);

    if (virAsprintf(&objAlias, "obj%s", rng->info.alias) < 0)
        goto cleanup;

    if (virAsprintf(&charAlias, "char%s", rng->info.alias) < 0)
        goto cleanup;

    qemuDomainObjEnterMonitor(driver, vm);
    rc = qemuMonitorDelObject(priv->mon, objAlias);

    if (rc == 0 && rng->backend == VIR_DOMAIN_RNG_BACKEND_EGD)
        ignore_value(qemuMonitorDetachCharDev(priv->mon, charAlias));

    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;

    virDomainAuditRNG(vm, rng, NULL, "detach", rc == 0);

    if (rc < 0)
        goto cleanup;

3197 3198
    event = virDomainEventDeviceRemovedNewFromObj(vm, rng->info.alias);
    qemuDomainEventQueue(driver, event);
3199 3200 3201 3202 3203 3204 3205 3206 3207 3208 3209 3210 3211 3212

    if ((idx = virDomainRNGFind(vm->def, rng)) >= 0)
        virDomainRNGRemove(vm->def, idx);
    qemuDomainReleaseDeviceAddress(vm, &rng->info, NULL);
    virDomainRNGDefFree(rng);
    ret = 0;

 cleanup:
    VIR_FREE(charAlias);
    VIR_FREE(objAlias);
    return ret;
}


3213
int
3214 3215 3216 3217
qemuDomainRemoveDevice(virQEMUDriverPtr driver,
                       virDomainObjPtr vm,
                       virDomainDeviceDefPtr dev)
{
3218
    int ret = -1;
3219 3220
    switch ((virDomainDeviceType) dev->type) {
    case VIR_DOMAIN_DEVICE_DISK:
3221
        ret = qemuDomainRemoveDiskDevice(driver, vm, dev->data.disk);
3222 3223
        break;
    case VIR_DOMAIN_DEVICE_CONTROLLER:
3224
        ret = qemuDomainRemoveControllerDevice(driver, vm, dev->data.controller);
3225 3226
        break;
    case VIR_DOMAIN_DEVICE_NET:
3227
        ret = qemuDomainRemoveNetDevice(driver, vm, dev->data.net);
3228 3229
        break;
    case VIR_DOMAIN_DEVICE_HOSTDEV:
3230
        ret = qemuDomainRemoveHostDevice(driver, vm, dev->data.hostdev);
3231 3232 3233
        break;

    case VIR_DOMAIN_DEVICE_CHR:
3234
        ret = qemuDomainRemoveChrDevice(driver, vm, dev->data.chr);
3235
        break;
3236
    case VIR_DOMAIN_DEVICE_RNG:
3237
        ret = qemuDomainRemoveRNGDevice(driver, vm, dev->data.rng);
3238
        break;
3239

3240
    case VIR_DOMAIN_DEVICE_MEMORY:
3241 3242
        ret = qemuDomainRemoveMemoryDevice(driver, vm, dev->data.memory);
        break;
3243

3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256
    case VIR_DOMAIN_DEVICE_NONE:
    case VIR_DOMAIN_DEVICE_LEASE:
    case VIR_DOMAIN_DEVICE_FS:
    case VIR_DOMAIN_DEVICE_INPUT:
    case VIR_DOMAIN_DEVICE_SOUND:
    case VIR_DOMAIN_DEVICE_VIDEO:
    case VIR_DOMAIN_DEVICE_WATCHDOG:
    case VIR_DOMAIN_DEVICE_GRAPHICS:
    case VIR_DOMAIN_DEVICE_HUB:
    case VIR_DOMAIN_DEVICE_REDIRDEV:
    case VIR_DOMAIN_DEVICE_SMARTCARD:
    case VIR_DOMAIN_DEVICE_MEMBALLOON:
    case VIR_DOMAIN_DEVICE_NVRAM:
3257
    case VIR_DOMAIN_DEVICE_SHMEM:
3258
    case VIR_DOMAIN_DEVICE_TPM:
3259
    case VIR_DOMAIN_DEVICE_PANIC:
3260 3261 3262 3263 3264 3265
    case VIR_DOMAIN_DEVICE_LAST:
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("don't know how to remove a %s device"),
                       virDomainDeviceTypeToString(dev->type));
        break;
    }
3266
    return ret;
3267 3268 3269 3270 3271 3272 3273 3274 3275
}


static void
qemuDomainMarkDeviceForRemoval(virDomainObjPtr vm,
                               virDomainDeviceInfoPtr info)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;

3276 3277 3278 3279 3280 3281
    memset(&priv->unplug, 0, sizeof(priv->unplug));

    if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_DEVICE_DEL_EVENT))
        return;

    priv->unplug.alias = info->alias;
3282 3283 3284 3285 3286 3287
}

static void
qemuDomainResetDeviceRemoval(virDomainObjPtr vm)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
3288
    priv->unplug.alias = NULL;
3289 3290 3291
}

/* Returns:
3292 3293
 *  -1 Unplug of the device failed
 *
3294 3295 3296 3297 3298 3299 3300
 *   0 DEVICE_DELETED event is supported and removal of the device did not
 *     finish in qemuDomainRemoveDeviceWaitTime
 *
 *   1 when the caller is responsible for finishing the device removal:
 *      - DEVICE_DELETED event is unsupported
 *      - DEVICE_DELETED event arrived before the timeout time
 *      - we failed to reliably wait for the event and thus use fallback behavior
3301 3302 3303 3304 3305 3306
 */
static int
qemuDomainWaitForDeviceRemoval(virDomainObjPtr vm)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    unsigned long long until;
3307
    int rc;
3308 3309

    if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_DEVICE_DEL_EVENT))
3310
        return 1;
3311 3312

    if (virTimeMillisNow(&until) < 0)
3313
        return 1;
3314
    until += qemuDomainRemoveDeviceWaitTime;
3315

3316
    while (priv->unplug.alias) {
3317 3318 3319 3320 3321
        if ((rc = virDomainObjWaitUntil(vm, until)) == 1)
            return 0;

        if (rc < 0) {
            VIR_WARN("Failed to wait on unplug condition for domain '%s' "
3322
                     "device '%s'", vm->def->name, priv->unplug.alias);
3323
            return 1;
3324 3325 3326
        }
    }

3327 3328 3329 3330 3331 3332
    if (priv->unplug.status == QEMU_DOMAIN_UNPLUGGING_DEVICE_STATUS_GUEST_REJECTED) {
        virReportError(VIR_ERR_OPERATION_FAILED, "%s",
                       _("unplug of device was rejected by the guest"));
        return -1;
    }

3333 3334 3335
    return 1;
}

3336 3337 3338 3339 3340 3341 3342
/* Returns:
 *  true    there was a thread waiting for devAlias to be removed and this
 *          thread will take care of finishing the removal
 *  false   the thread that started the removal is already gone and delegate
 *          finishing the removal to a new thread
 */
bool
3343
qemuDomainSignalDeviceRemoval(virDomainObjPtr vm,
3344 3345
                              const char *devAlias,
                              qemuDomainUnpluggingDeviceStatus status)
3346 3347 3348
{
    qemuDomainObjPrivatePtr priv = vm->privateData;

3349
    if (STREQ_NULLABLE(priv->unplug.alias, devAlias)) {
3350
        qemuDomainResetDeviceRemoval(vm);
3351
        priv->unplug.status = status;
3352
        virDomainObjBroadcast(vm);
3353
        return true;
3354
    }
3355
    return false;
3356 3357 3358
}


3359 3360 3361 3362
static int
qemuDomainDetachVirtioDiskDevice(virQEMUDriverPtr driver,
                                 virDomainObjPtr vm,
                                 virDomainDiskDefPtr detach)
3363
{
3364
    int ret = -1;
3365 3366
    qemuDomainObjPrivatePtr priv = vm->privateData;

3367
    if (qemuIsMultiFunctionDevice(vm->def, &detach->info)) {
3368 3369
        virReportError(VIR_ERR_OPERATION_FAILED,
                       _("cannot hot unplug multifunction PCI device: %s"),
3370
                       detach->dst);
3371 3372 3373
        goto cleanup;
    }

3374
    if (qemuDomainMachineIsS390CCW(vm->def) &&
3375 3376 3377 3378 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388
        virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_VIRTIO_CCW)) {
        if (!virDomainDeviceAddressIsValid(&detach->info,
                                           VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW)) {
            virReportError(VIR_ERR_OPERATION_FAILED, "%s",
                           _("device cannot be detached without a valid CCW address"));
            goto cleanup;
        }
    } else {
        if (!virDomainDeviceAddressIsValid(&detach->info,
                                           VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
            virReportError(VIR_ERR_OPERATION_FAILED, "%s",
                           _("device cannot be detached without a valid PCI address"));
            goto cleanup;
        }
3389 3390
    }

3391
    if (!detach->info.alias) {
3392 3393 3394 3395
        if (qemuAssignDeviceDiskAlias(vm->def, detach, priv->qemuCaps) < 0)
            goto cleanup;
    }

3396 3397
    qemuDomainMarkDeviceForRemoval(vm, &detach->info);

3398
    qemuDomainObjEnterMonitor(driver, vm);
3399 3400
    if (qemuMonitorDelDevice(priv->mon, detach->info.alias) < 0) {
        if (qemuDomainObjExitMonitor(driver, vm) < 0)
3401
            goto cleanup;
3402 3403
        virDomainAuditDisk(vm, detach->src, NULL, "detach", false);
        goto cleanup;
3404
    }
3405 3406
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;
3407

3408
    if ((ret = qemuDomainWaitForDeviceRemoval(vm)) == 1)
3409
        ret = qemuDomainRemoveDiskDevice(driver, vm, detach);
3410

3411
 cleanup:
3412
    qemuDomainResetDeviceRemoval(vm);
3413 3414 3415
    return ret;
}

3416 3417 3418 3419
static int
qemuDomainDetachDiskDevice(virQEMUDriverPtr driver,
                           virDomainObjPtr vm,
                           virDomainDiskDefPtr detach)
3420
{
3421
    int ret = -1;
3422 3423
    qemuDomainObjPrivatePtr priv = vm->privateData;

E
Eric Blake 已提交
3424 3425
    if (detach->mirror) {
        virReportError(VIR_ERR_BLOCK_COPY_ACTIVE,
3426
                       _("disk '%s' is in an active block job"),
E
Eric Blake 已提交
3427 3428 3429 3430
                       detach->dst);
        goto cleanup;
    }

3431 3432
    qemuDomainMarkDeviceForRemoval(vm, &detach->info);

3433
    qemuDomainObjEnterMonitor(driver, vm);
3434
    if (qemuMonitorDelDevice(priv->mon, detach->info.alias) < 0) {
3435 3436
        if (qemuDomainObjExitMonitor(driver, vm) < 0)
            goto cleanup;
3437
        virDomainAuditDisk(vm, detach->src, NULL, "detach", false);
3438 3439
        goto cleanup;
    }
3440 3441
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;
3442

3443
    if ((ret = qemuDomainWaitForDeviceRemoval(vm)) == 1)
3444
        ret = qemuDomainRemoveDiskDevice(driver, vm, detach);
3445

3446
 cleanup:
3447
    qemuDomainResetDeviceRemoval(vm);
3448 3449 3450
    return ret;
}

3451 3452 3453 3454 3455 3456
static int
qemuFindDisk(virDomainDefPtr def, const char *dst)
{
    size_t i;

    for (i = 0; i < def->ndisks; i++) {
3457
        if (STREQ(def->disks[i]->dst, dst))
3458 3459 3460 3461 3462 3463 3464 3465 3466 3467 3468 3469 3470 3471 3472 3473 3474 3475 3476 3477 3478 3479 3480 3481 3482 3483 3484 3485 3486 3487 3488 3489 3490 3491 3492 3493 3494 3495 3496 3497 3498 3499 3500 3501 3502
            return i;
    }

    return -1;
}

int
qemuDomainDetachDeviceDiskLive(virQEMUDriverPtr driver,
                               virDomainObjPtr vm,
                               virDomainDeviceDefPtr dev)
{
    virDomainDiskDefPtr disk;
    int ret = -1;
    int idx;

    if ((idx = qemuFindDisk(vm->def, dev->data.disk->dst)) < 0) {
        virReportError(VIR_ERR_OPERATION_FAILED,
                       _("disk %s not found"), dev->data.disk->dst);
        return -1;
    }
    disk = vm->def->disks[idx];

    switch (disk->device) {
    case VIR_DOMAIN_DISK_DEVICE_DISK:
    case VIR_DOMAIN_DISK_DEVICE_LUN:
        if (disk->bus == VIR_DOMAIN_DISK_BUS_VIRTIO)
            ret = qemuDomainDetachVirtioDiskDevice(driver, vm, disk);
        else if (disk->bus == VIR_DOMAIN_DISK_BUS_SCSI ||
                 disk->bus == VIR_DOMAIN_DISK_BUS_USB)
            ret = qemuDomainDetachDiskDevice(driver, vm, disk);
        else
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                           _("This type of disk cannot be hot unplugged"));
        break;
    default:
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("disk device type '%s' cannot be detached"),
                       virDomainDiskDeviceTypeToString(disk->device));
        break;
    }

    return ret;
}


3503 3504 3505
static bool qemuDomainDiskControllerIsBusy(virDomainObjPtr vm,
                                           virDomainControllerDefPtr detach)
{
3506
    size_t i;
3507 3508 3509 3510 3511 3512 3513 3514 3515 3516 3517 3518 3519 3520 3521 3522 3523 3524 3525 3526 3527 3528 3529 3530 3531 3532 3533 3534 3535 3536 3537 3538 3539 3540 3541 3542 3543 3544 3545 3546 3547 3548 3549 3550 3551 3552
    virDomainDiskDefPtr disk;

    for (i = 0; i < vm->def->ndisks; i++) {
        disk = vm->def->disks[i];
        if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE)
            /* the disk does not use disk controller */
            continue;

        /* check whether the disk uses this type controller */
        if (disk->bus == VIR_DOMAIN_DISK_BUS_IDE &&
            detach->type != VIR_DOMAIN_CONTROLLER_TYPE_IDE)
            continue;
        if (disk->bus == VIR_DOMAIN_DISK_BUS_FDC &&
            detach->type != VIR_DOMAIN_CONTROLLER_TYPE_FDC)
            continue;
        if (disk->bus == VIR_DOMAIN_DISK_BUS_SCSI &&
            detach->type != VIR_DOMAIN_CONTROLLER_TYPE_SCSI)
            continue;

        if (disk->info.addr.drive.controller == detach->idx)
            return true;
    }

    return false;
}

static bool qemuDomainControllerIsBusy(virDomainObjPtr vm,
                                       virDomainControllerDefPtr detach)
{
    switch (detach->type) {
    case VIR_DOMAIN_CONTROLLER_TYPE_IDE:
    case VIR_DOMAIN_CONTROLLER_TYPE_FDC:
    case VIR_DOMAIN_CONTROLLER_TYPE_SCSI:
        return qemuDomainDiskControllerIsBusy(vm, detach);

    case VIR_DOMAIN_CONTROLLER_TYPE_SATA:
    case VIR_DOMAIN_CONTROLLER_TYPE_VIRTIO_SERIAL:
    case VIR_DOMAIN_CONTROLLER_TYPE_CCID:
    default:
        /* libvirt does not support sata controller, and does not support to
         * detach virtio and smart card controller.
         */
        return true;
    }
}

3553 3554 3555
int qemuDomainDetachControllerDevice(virQEMUDriverPtr driver,
                                     virDomainObjPtr vm,
                                     virDomainDeviceDefPtr dev)
3556
{
3557
    int idx, ret = -1;
3558 3559 3560
    virDomainControllerDefPtr detach = NULL;
    qemuDomainObjPrivatePtr priv = vm->privateData;

3561 3562 3563
    if ((idx = virDomainControllerFind(vm->def,
                                       dev->data.controller->type,
                                       dev->data.controller->idx)) < 0) {
3564
        virReportError(VIR_ERR_OPERATION_FAILED,
3565
                       _("controller %s:%d not found"),
3566 3567
                       virDomainControllerTypeToString(dev->data.controller->type),
                       dev->data.controller->idx);
3568 3569 3570
        goto cleanup;
    }

3571 3572
    detach = vm->def->controllers[idx];

3573 3574 3575 3576 3577 3578
    if (detach->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI &&
        detach->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW &&
        detach->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_S390) {
        virReportError(VIR_ERR_OPERATION_FAILED,
                       _("device with '%s' address cannot be detached"),
                       virDomainDeviceAddressTypeToString(detach->info.type));
3579 3580 3581
        goto cleanup;
    }

3582 3583 3584 3585 3586 3587 3588 3589 3590
    if (!virDomainDeviceAddressIsValid(&detach->info, detach->info.type)) {
        virReportError(VIR_ERR_OPERATION_FAILED,
                       _("device with invalid '%s' address cannot be detached"),
                       virDomainDeviceAddressTypeToString(detach->info.type));
        goto cleanup;
    }

    if (detach->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI &&
        qemuIsMultiFunctionDevice(vm->def, &detach->info)) {
3591 3592 3593
        virReportError(VIR_ERR_OPERATION_FAILED,
                       _("cannot hot unplug multifunction PCI device: %s"),
                       dev->data.disk->dst);
3594 3595 3596
        goto cleanup;
    }

3597
    if (qemuDomainControllerIsBusy(vm, detach)) {
3598 3599
        virReportError(VIR_ERR_OPERATION_FAILED, "%s",
                       _("device cannot be detached: device is busy"));
3600 3601 3602
        goto cleanup;
    }

3603
    if (!detach->info.alias) {
3604
        if (qemuAssignDeviceControllerAlias(vm->def, priv->qemuCaps, detach) < 0)
3605 3606 3607
            goto cleanup;
    }

3608 3609
    qemuDomainMarkDeviceForRemoval(vm, &detach->info);

3610
    qemuDomainObjEnterMonitor(driver, vm);
3611 3612 3613
    if (qemuMonitorDelDevice(priv->mon, detach->info.alias)) {
        ignore_value(qemuDomainObjExitMonitor(driver, vm));
        goto cleanup;
3614
    }
3615 3616
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;
3617

3618
    if ((ret = qemuDomainWaitForDeviceRemoval(vm)) == 1)
3619
        ret = qemuDomainRemoveControllerDevice(driver, vm, detach);
3620

3621
 cleanup:
3622
    qemuDomainResetDeviceRemoval(vm);
3623 3624 3625
    return ret;
}

3626
static int
3627
qemuDomainDetachHostPCIDevice(virQEMUDriverPtr driver,
3628
                              virDomainObjPtr vm,
3629
                              virDomainHostdevDefPtr detach)
3630 3631
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
3632
    virDomainHostdevSubsysPCIPtr pcisrc = &detach->source.subsys.u.pci;
3633
    int ret;
3634

3635
    if (qemuIsMultiFunctionDevice(vm->def, detach->info)) {
3636 3637
        virReportError(VIR_ERR_OPERATION_FAILED,
                       _("cannot hot unplug multifunction PCI device: %.4x:%.2x:%.2x.%.1x"),
3638 3639
                       pcisrc->addr.domain, pcisrc->addr.bus,
                       pcisrc->addr.slot, pcisrc->addr.function);
3640
        return -1;
3641 3642
    }

3643
    if (!virDomainDeviceAddressIsValid(detach->info,
3644
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
3645 3646
        virReportError(VIR_ERR_OPERATION_FAILED,
                       "%s", _("device cannot be detached without a PCI address"));
3647
        return -1;
3648 3649
    }

3650 3651
    qemuDomainMarkDeviceForRemoval(vm, detach->info);

3652
    qemuDomainObjEnterMonitor(driver, vm);
3653
    ret = qemuMonitorDelDevice(priv->mon, detach->info->alias);
3654 3655
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        ret = -1;
3656 3657 3658 3659

    return ret;
}

3660
static int
3661
qemuDomainDetachHostUSBDevice(virQEMUDriverPtr driver,
3662
                              virDomainObjPtr vm,
3663
                              virDomainHostdevDefPtr detach)
3664 3665
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
3666
    int ret;
3667

3668
    if (!detach->info->alias) {
3669 3670
        virReportError(VIR_ERR_OPERATION_FAILED,
                       "%s", _("device cannot be detached without a device alias"));
3671 3672 3673
        return -1;
    }

3674 3675
    qemuDomainMarkDeviceForRemoval(vm, detach->info);

3676
    qemuDomainObjEnterMonitor(driver, vm);
3677
    ret = qemuMonitorDelDevice(priv->mon, detach->info->alias);
3678 3679
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        ret = -1;
3680 3681 3682 3683

    return ret;
}

3684
static int
3685
qemuDomainDetachHostSCSIDevice(virQEMUDriverPtr driver,
3686 3687 3688 3689 3690 3691 3692 3693 3694 3695 3696 3697
                               virDomainObjPtr vm,
                               virDomainHostdevDefPtr detach)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    int ret = -1;

    if (!detach->info->alias) {
        virReportError(VIR_ERR_OPERATION_FAILED,
                       "%s", _("device cannot be detached without a device alias"));
        return -1;
    }

3698 3699
    qemuDomainMarkDeviceForRemoval(vm, detach->info);

3700
    qemuDomainObjEnterMonitor(driver, vm);
3701 3702 3703 3704
    ret = qemuMonitorDelDevice(priv->mon, detach->info->alias);

    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        return -1;
3705 3706 3707 3708 3709

    return ret;
}

static int
3710
qemuDomainDetachThisHostDevice(virQEMUDriverPtr driver,
3711
                               virDomainObjPtr vm,
3712
                               virDomainHostdevDefPtr detach)
3713
{
3714
    int ret = -1;
3715

3716
    if (!detach->info->alias) {
3717
        if (qemuAssignDeviceHostdevAlias(vm->def, &detach->info->alias, -1) < 0)
3718 3719 3720
            return -1;
    }

3721
    switch (detach->source.subsys.type) {
3722
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
3723
        ret = qemuDomainDetachHostPCIDevice(driver, vm, detach);
3724
        break;
3725
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
3726
        ret = qemuDomainDetachHostUSBDevice(driver, vm, detach);
3727
        break;
3728
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI:
3729
        ret = qemuDomainDetachHostSCSIDevice(driver, vm, detach);
3730
        break;
3731
    default:
3732 3733 3734
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("hostdev subsys type '%s' not supported"),
                       virDomainHostdevSubsysTypeToString(detach->source.subsys.type));
3735 3736 3737
        return -1;
    }

3738
    if (ret < 0) {
3739 3740
        if (virDomainObjIsActive(vm))
            virDomainAuditHostdev(vm, detach, "detach", false);
3741 3742
    } else if ((ret = qemuDomainWaitForDeviceRemoval(vm)) == 1) {
        ret = qemuDomainRemoveHostDevice(driver, vm, detach);
3743
    }
3744

3745 3746
    qemuDomainResetDeviceRemoval(vm);

3747 3748
    return ret;
}
3749

3750
/* search for a hostdev matching dev and detach it */
3751
int qemuDomainDetachHostDevice(virQEMUDriverPtr driver,
3752 3753 3754 3755 3756
                               virDomainObjPtr vm,
                               virDomainDeviceDefPtr dev)
{
    virDomainHostdevDefPtr hostdev = dev->data.hostdev;
    virDomainHostdevSubsysPtr subsys = &hostdev->source.subsys;
3757
    virDomainHostdevSubsysUSBPtr usbsrc = &subsys->u.usb;
3758
    virDomainHostdevSubsysPCIPtr pcisrc = &subsys->u.pci;
3759
    virDomainHostdevSubsysSCSIPtr scsisrc = &subsys->u.scsi;
3760 3761 3762 3763
    virDomainHostdevDefPtr detach = NULL;
    int idx;

    if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS) {
3764 3765 3766
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("hostdev mode '%s' not supported"),
                       virDomainHostdevModeTypeToString(hostdev->mode));
3767 3768 3769 3770 3771 3772
        return -1;
    }

    idx = virDomainHostdevFind(vm->def, hostdev, &detach);

    if (idx < 0) {
3773
        switch (subsys->type) {
3774
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
3775 3776
            virReportError(VIR_ERR_OPERATION_FAILED,
                           _("host pci device %.4x:%.2x:%.2x.%.1x not found"),
3777 3778
                           pcisrc->addr.domain, pcisrc->addr.bus,
                           pcisrc->addr.slot, pcisrc->addr.function);
3779 3780
            break;
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
3781
            if (usbsrc->bus && usbsrc->device) {
3782 3783
                virReportError(VIR_ERR_OPERATION_FAILED,
                               _("host usb device %03d.%03d not found"),
3784
                               usbsrc->bus, usbsrc->device);
3785
            } else {
3786 3787
                virReportError(VIR_ERR_OPERATION_FAILED,
                               _("host usb device vendor=0x%.4x product=0x%.4x not found"),
3788
                               usbsrc->vendor, usbsrc->product);
3789 3790
            }
            break;
3791
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI: {
3792 3793 3794 3795 3796 3797 3798 3799 3800 3801
            if (scsisrc->protocol ==
                VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI) {
                virDomainHostdevSubsysSCSIiSCSIPtr iscsisrc = &scsisrc->u.iscsi;
                virReportError(VIR_ERR_OPERATION_FAILED,
                               _("host scsi iSCSI path %s not found"),
                               iscsisrc->path);
            } else {
                 virDomainHostdevSubsysSCSIHostPtr scsihostsrc =
                     &scsisrc->u.host;
                 virReportError(VIR_ERR_OPERATION_FAILED,
3802
                                _("host scsi device %s:%u:%u.%llu not found"),
3803 3804 3805
                                scsihostsrc->adapter, scsihostsrc->bus,
                                scsihostsrc->target, scsihostsrc->unit);
            }
3806
            break;
3807
        }
3808
        default:
3809 3810
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("unexpected hostdev type %d"), subsys->type);
3811 3812 3813 3814 3815
            break;
        }
        return -1;
    }

3816 3817 3818 3819
    /* If this is a network hostdev, we need to use the higher-level detach
     * function so that mac address / virtualport are reset
     */
    if (detach->parent.type == VIR_DOMAIN_DEVICE_NET)
3820
        return qemuDomainDetachNetDevice(driver, vm, &detach->parent);
3821
    else
3822
        return qemuDomainDetachThisHostDevice(driver, vm, detach);
3823 3824
}

3825
int
3826
qemuDomainDetachNetDevice(virQEMUDriverPtr driver,
3827 3828 3829
                          virDomainObjPtr vm,
                          virDomainDeviceDefPtr dev)
{
3830
    int detachidx, ret = -1;
3831 3832 3833
    virDomainNetDefPtr detach = NULL;
    qemuDomainObjPrivatePtr priv = vm->privateData;

3834
    if ((detachidx = virDomainNetFindIdx(vm->def, dev->data.net)) < 0)
3835
        goto cleanup;
3836

3837
    detach = vm->def->nets[detachidx];
3838

3839
    if (virDomainNetGetActualType(detach) == VIR_DOMAIN_NET_TYPE_HOSTDEV) {
3840
        /* coverity[negative_returns] */
3841
        ret = qemuDomainDetachThisHostDevice(driver, vm,
3842
                                             virDomainNetGetActualHostdev(detach));
3843 3844
        goto cleanup;
    }
3845
    if (qemuDomainMachineIsS390CCW(vm->def) &&
3846 3847 3848 3849 3850 3851 3852 3853 3854 3855 3856 3857 3858 3859
        virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_VIRTIO_CCW)) {
        if (!virDomainDeviceAddressIsValid(&detach->info,
                                           VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW)) {
            virReportError(VIR_ERR_OPERATION_FAILED,
                            "%s", _("device cannot be detached without a CCW address"));
            goto cleanup;
        }
    } else {
        if (!virDomainDeviceAddressIsValid(&detach->info,
                                           VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
            virReportError(VIR_ERR_OPERATION_FAILED,
                            "%s", _("device cannot be detached without a PCI address"));
            goto cleanup;
        }
3860

3861 3862 3863 3864 3865 3866
        if (qemuIsMultiFunctionDevice(vm->def, &detach->info)) {
            virReportError(VIR_ERR_OPERATION_FAILED,
                            _("cannot hot unplug multifunction PCI device :%s"),
                            dev->data.disk->dst);
            goto cleanup;
        }
3867 3868
    }

3869
    if (!detach->info.alias) {
3870 3871 3872 3873
        if (qemuAssignDeviceNetAlias(vm->def, detach, -1) < 0)
            goto cleanup;
    }

3874 3875
    if (virDomainNetGetActualBandwidth(detach) &&
        virNetDevSupportBandwidth(virDomainNetGetActualType(detach)) &&
3876 3877 3878 3879
        virNetDevBandwidthClear(detach->ifname) < 0)
        VIR_WARN("cannot clear bandwidth setting for device : %s",
                 detach->ifname);

3880 3881 3882
    /* deactivate the tap/macvtap device on the host, which could also
     * affect the parent device (e.g. macvtap passthrough mode sets
     * the parent device offline)
3883 3884 3885
     */
    ignore_value(qemuInterfaceStopDevice(detach));

3886 3887
    qemuDomainMarkDeviceForRemoval(vm, &detach->info);

3888
    qemuDomainObjEnterMonitor(driver, vm);
3889 3890
    if (qemuMonitorDelDevice(priv->mon, detach->info.alias) < 0) {
        if (qemuDomainObjExitMonitor(driver, vm) < 0)
3891
            goto cleanup;
3892 3893
        virDomainAuditNet(vm, detach, NULL, "detach", false);
        goto cleanup;
3894
    }
3895 3896
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;
3897

3898
    if ((ret = qemuDomainWaitForDeviceRemoval(vm)) == 1)
3899
        ret = qemuDomainRemoveNetDevice(driver, vm, detach);
3900

3901
 cleanup:
3902
    qemuDomainResetDeviceRemoval(vm);
3903 3904 3905
    return ret;
}

3906
int
3907
qemuDomainChangeGraphicsPasswords(virQEMUDriverPtr driver,
3908 3909 3910
                                  virDomainObjPtr vm,
                                  int type,
                                  virDomainGraphicsAuthDefPtr auth,
3911 3912
                                  const char *defaultPasswd,
                                  int asyncJob)
3913 3914 3915 3916
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    time_t now = time(NULL);
    char expire_time [64];
3917
    const char *connected = NULL;
3918 3919
    int ret = -1;
    virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
3920

3921
    if (!auth->passwd && !defaultPasswd) {
3922 3923 3924
        ret = 0;
        goto cleanup;
    }
3925

3926 3927 3928
    if (auth->connected)
        connected = virDomainGraphicsAuthConnectedTypeToString(auth->connected);

3929 3930
    if (qemuDomainObjEnterMonitorAsync(driver, vm, asyncJob) < 0)
        goto cleanup;
3931 3932 3933
    ret = qemuMonitorSetPassword(priv->mon,
                                 type,
                                 auth->passwd ? auth->passwd : defaultPasswd,
3934
                                 connected);
3935 3936 3937

    if (ret == -2) {
        if (type != VIR_DOMAIN_GRAPHICS_TYPE_VNC) {
3938 3939
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Graphics password only supported for VNC"));
3940 3941 3942 3943 3944 3945
            ret = -1;
        } else {
            ret = qemuMonitorSetVNCPassword(priv->mon,
                                            auth->passwd ? auth->passwd : defaultPasswd);
        }
    }
3946
    if (ret != 0)
3947
        goto end_job;
3948

3949 3950 3951
    if (auth->expires) {
        time_t lifetime = auth->validTo - now;
        if (lifetime <= 0)
3952
            snprintf(expire_time, sizeof(expire_time), "now");
3953
        else
3954
            snprintf(expire_time, sizeof(expire_time), "%lu", (long unsigned)auth->validTo);
3955
    } else {
3956
        snprintf(expire_time, sizeof(expire_time), "never");
3957 3958 3959 3960 3961 3962 3963
    }

    ret = qemuMonitorExpirePassword(priv->mon, type, expire_time);

    if (ret == -2) {
        /* XXX we could fake this with a timer */
        if (auth->expires) {
3964 3965
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Expiry of passwords is not supported"));
3966
            ret = -1;
3967 3968
        } else {
            ret = 0;
3969 3970 3971
        }
    }

3972
 end_job:
3973 3974
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        ret = -1;
3975
 cleanup:
3976
    virObjectUnref(cfg);
3977 3978
    return ret;
}
3979

3980
int qemuDomainAttachLease(virQEMUDriverPtr driver,
3981 3982 3983
                          virDomainObjPtr vm,
                          virDomainLeaseDefPtr lease)
{
3984 3985 3986
    int ret = -1;
    virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);

3987
    if (virDomainLeaseInsertPreAlloc(vm->def) < 0)
3988
        goto cleanup;
3989

3990
    if (virDomainLockLeaseAttach(driver->lockManager, cfg->uri,
3991
                                 vm, lease) < 0) {
3992
        virDomainLeaseInsertPreAlloced(vm->def, NULL);
3993
        goto cleanup;
3994 3995 3996
    }

    virDomainLeaseInsertPreAlloced(vm->def, lease);
3997 3998
    ret = 0;

3999
 cleanup:
4000 4001
    virObjectUnref(cfg);
    return ret;
4002 4003
}

4004
int qemuDomainDetachLease(virQEMUDriverPtr driver,
4005 4006 4007
                          virDomainObjPtr vm,
                          virDomainLeaseDefPtr lease)
{
4008
    virDomainLeaseDefPtr det_lease;
4009
    int idx;
4010

4011
    if ((idx = virDomainLeaseIndex(vm->def, lease)) < 0) {
4012 4013 4014
        virReportError(VIR_ERR_INVALID_ARG,
                       _("Lease %s in lockspace %s does not exist"),
                       lease->key, NULLSTR(lease->lockspace));
4015 4016 4017 4018 4019 4020
        return -1;
    }

    if (virDomainLockLeaseDetach(driver->lockManager, vm, lease) < 0)
        return -1;

4021
    det_lease = virDomainLeaseRemoveAt(vm->def, idx);
4022
    virDomainLeaseDefFree(det_lease);
4023 4024
    return 0;
}
4025 4026 4027 4028 4029 4030 4031 4032 4033 4034 4035 4036 4037 4038 4039 4040 4041

int qemuDomainDetachChrDevice(virQEMUDriverPtr driver,
                              virDomainObjPtr vm,
                              virDomainChrDefPtr chr)
{
    int ret = -1;
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainDefPtr vmdef = vm->def;
    virDomainChrDefPtr tmpChr;
    char *devstr = NULL;

    if (!(tmpChr = virDomainChrFind(vmdef, chr))) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("device not present in domain configuration"));
        return ret;
    }

P
Pavel Hrdina 已提交
4042 4043 4044 4045 4046
    if (!tmpChr->info.alias && qemuAssignDeviceChrAlias(vmdef, tmpChr, -1) < 0)
        return ret;

    sa_assert(tmpChr->info.alias);

4047 4048 4049
    if (qemuBuildChrDeviceStr(&devstr, vm->def, chr, priv->qemuCaps) < 0)
        return ret;

4050 4051
    qemuDomainMarkDeviceForRemoval(vm, &tmpChr->info);

4052 4053
    qemuDomainObjEnterMonitor(driver, vm);
    if (devstr && qemuMonitorDelDevice(priv->mon, tmpChr->info.alias) < 0) {
4054
        ignore_value(qemuDomainObjExitMonitor(driver, vm));
4055 4056
        goto cleanup;
    }
4057 4058
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;
4059

4060
    if ((ret = qemuDomainWaitForDeviceRemoval(vm)) == 1) {
4061
        qemuDomainReleaseDeviceAddress(vm, &tmpChr->info, NULL);
4062
        ret = qemuDomainRemoveChrDevice(driver, vm, tmpChr);
4063 4064
    }

4065
 cleanup:
4066
    qemuDomainResetDeviceRemoval(vm);
4067 4068 4069
    VIR_FREE(devstr);
    return ret;
}
4070 4071 4072 4073 4074 4075 4076 4077 4078 4079 4080 4081 4082 4083 4084 4085 4086 4087 4088 4089 4090 4091 4092 4093 4094 4095 4096 4097 4098 4099 4100 4101 4102 4103


int
qemuDomainDetachRNGDevice(virQEMUDriverPtr driver,
                          virDomainObjPtr vm,
                          virDomainRNGDefPtr rng)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    ssize_t idx;
    virDomainRNGDefPtr tmpRNG;
    int rc;
    int ret = -1;

    if ((idx = virDomainRNGFind(vm->def, rng) < 0)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("device not present in domain configuration"));
        return -1;
    }

    tmpRNG = vm->def->rngs[idx];

    if (!tmpRNG->info.alias) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("alias not set for RNG device"));
        return -1;
    }

    qemuDomainMarkDeviceForRemoval(vm, &tmpRNG->info);

    qemuDomainObjEnterMonitor(driver, vm);
    rc = qemuMonitorDelDevice(priv->mon, tmpRNG->info.alias);
    if (qemuDomainObjExitMonitor(driver, vm) || rc < 0)
        goto cleanup;

4104
    if ((ret = qemuDomainWaitForDeviceRemoval(vm)) == 1)
4105 4106 4107 4108 4109 4110
        ret = qemuDomainRemoveRNGDevice(driver, vm, tmpRNG);

 cleanup:
    qemuDomainResetDeviceRemoval(vm);
    return ret;
}
4111 4112 4113 4114 4115 4116 4117 4118 4119 4120 4121 4122 4123


int
qemuDomainDetachMemoryDevice(virQEMUDriverPtr driver,
                             virDomainObjPtr vm,
                             virDomainMemoryDefPtr memdef)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainMemoryDefPtr mem;
    int idx;
    int rc;
    int ret = -1;

4124
    qemuDomainMemoryDeviceAlignSize(vm->def, memdef);
4125 4126 4127 4128 4129 4130 4131 4132 4133 4134 4135 4136 4137 4138 4139 4140 4141 4142 4143 4144 4145 4146

    if ((idx = virDomainMemoryFindByDef(vm->def, memdef)) < 0) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("device not present in domain configuration"));
        return -1;
    }

    mem = vm->def->mems[idx];

    if (!mem->info.alias) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("alias for the memory device was not found"));
        return -1;
    }

    qemuDomainMarkDeviceForRemoval(vm, &mem->info);

    qemuDomainObjEnterMonitor(driver, vm);
    rc = qemuMonitorDelDevice(priv->mon, mem->info.alias);
    if (qemuDomainObjExitMonitor(driver, vm) < 0 || rc < 0)
        goto cleanup;

4147
    if ((ret = qemuDomainWaitForDeviceRemoval(vm)) == 1)
4148 4149 4150 4151 4152 4153
        ret = qemuDomainRemoveMemoryDevice(driver, vm, mem);

 cleanup:
    qemuDomainResetDeviceRemoval(vm);
    return ret;
}