xen_hypervisor.c 110.8 KB
Newer Older
1 2 3
/*
 * xen_internal.c: direct access to Xen hypervisor level
 *
4
 * Copyright (C) 2005-2011 Red Hat, Inc.
5 6 7 8 9 10
 *
 * See COPYING.LIB for the License of this software
 *
 * Daniel Veillard <veillard@redhat.com>
 */

11
#include <config.h>
12

13 14
#include <stdio.h>
#include <string.h>
15
/* required for uint8_t, uint32_t, etc ... */
16 17 18 19 20 21 22
#include <stdint.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <unistd.h>
#include <fcntl.h>
#include <sys/mman.h>
#include <sys/ioctl.h>
23
#include <limits.h>
24
#include <stdint.h>
25 26 27
#include <regex.h>
#include <errno.h>
#include <sys/utsname.h>
28

J
John Levon 已提交
29
#ifdef __sun
30
# include <sys/systeminfo.h>
J
John Levon 已提交
31

32
# include <priv.h>
J
John Levon 已提交
33

34 35 36
# ifndef PRIV_XVM_CONTROL
#  define PRIV_XVM_CONTROL ((const char *)"xvm_control")
# endif
J
John Levon 已提交
37 38 39

#endif /* __sun */

40
/* required for dom0_getdomaininfo_t */
41
#include <xen/dom0_ops.h>
42
#include <xen/version.h>
43
#ifdef HAVE_XEN_LINUX_PRIVCMD_H
44
# include <xen/linux/privcmd.h>
45
#else
46 47 48
# ifdef HAVE_XEN_SYS_PRIVCMD_H
#  include <xen/sys/privcmd.h>
# endif
49
#endif
50

51 52 53
/* required for shutdown flags */
#include <xen/sched.h>

54
#include "virterror_internal.h"
55
#include "logging.h"
56
#include "datatypes.h"
57 58
#include "driver.h"
#include "util.h"
59 60
#include "xen_driver.h"
#include "xen_hypervisor.h"
61 62
#include "xs_internal.h"
#include "stats_linux.h"
63
#include "block_stats.h"
64
#include "xend_internal.h"
65
#include "buf.h"
66
#include "capabilities.h"
67
#include "memory.h"
E
Eric Blake 已提交
68
#include "virfile.h"
69

70 71
#define VIR_FROM_THIS VIR_FROM_XEN

72
/*
73
 * so far there is 2 versions of the structures usable for doing
74 75 76 77
 * hypervisor calls.
 */
/* the old one */
typedef struct v0_hypercall_struct {
78 79
    unsigned long op;
    unsigned long arg[5];
80
} v0_hypercall_t;
81 82

#ifdef __linux__
83
# define XEN_V0_IOCTL_HYPERCALL_CMD \
84 85 86 87 88 89 90
        _IOC(_IOC_NONE, 'P', 0, sizeof(v0_hypercall_t))
/* the new one */
typedef struct v1_hypercall_struct
{
    uint64_t op;
    uint64_t arg[5];
} v1_hypercall_t;
91
# define XEN_V1_IOCTL_HYPERCALL_CMD                  \
92
    _IOC(_IOC_NONE, 'P', 0, sizeof(v1_hypercall_t))
93
typedef v1_hypercall_t hypercall_t;
94
#elif defined(__sun)
95 96
typedef privcmd_hypercall_t hypercall_t;
#else
97
# error "unsupported platform"
98
#endif
99 100

#ifndef __HYPERVISOR_sysctl
101
# define __HYPERVISOR_sysctl 35
102 103
#endif
#ifndef __HYPERVISOR_domctl
104
# define __HYPERVISOR_domctl 36
105
#endif
106

107
#ifdef WITH_RHEL5_API
108
# define SYS_IFACE_MIN_VERS_NUMA 3
109
#else
110
# define SYS_IFACE_MIN_VERS_NUMA 4
111 112
#endif

113 114
static int xen_ioctl_hypercall_cmd = 0;
static int initialized = 0;
115
static int in_init = 0;
P
Philipp Hahn 已提交
116 117 118 119 120 121 122
static struct xenHypervisorVersions hv_versions = {
    .hv = 0,
    .hypervisor = 2,
    .sys_interface = -1,
    .dom_interface = -1,
};

123
static int kb_per_pages = 0;
124

125 126 127 128 129 130 131 132
/* Regular expressions used by xenHypervisorGetCapabilities, and
 * compiled once by xenHypervisorInit.  Note that these are POSIX.2
 * extended regular expressions (regex(7)).
 */
static const char *flags_hvm_re = "^flags[[:blank:]]+:.* (vmx|svm)[[:space:]]";
static regex_t flags_hvm_rec;
static const char *flags_pae_re = "^flags[[:blank:]]+:.* pae[[:space:]]";
static regex_t flags_pae_rec;
133
static const char *xen_cap_re = "(xen|hvm)-[[:digit:]]+\\.[[:digit:]]+-(x86_32|x86_64|ia64|powerpc64)(p|be)?";
134 135
static regex_t xen_cap_rec;

136 137 138 139
/*
 * The content of the structures for a getdomaininfolist system hypercall
 */
#ifndef DOMFLAGS_DYING
140 141 142 143 144 145 146 147 148 149
# define DOMFLAGS_DYING     (1<<0) /* Domain is scheduled to die.             */
# define DOMFLAGS_HVM       (1<<1) /* Domain is HVM                           */
# define DOMFLAGS_SHUTDOWN  (1<<2) /* The guest OS has shut down.             */
# define DOMFLAGS_PAUSED    (1<<3) /* Currently paused by control software.   */
# define DOMFLAGS_BLOCKED   (1<<4) /* Currently blocked pending an event.     */
# define DOMFLAGS_RUNNING   (1<<5) /* Domain is currently running.            */
# define DOMFLAGS_CPUMASK      255 /* CPU to which this domain is bound.      */
# define DOMFLAGS_CPUSHIFT       8
# define DOMFLAGS_SHUTDOWNMASK 255 /* DOMFLAGS_SHUTDOWN guest-supplied code.  */
# define DOMFLAGS_SHUTDOWNSHIFT 16
150 151
#endif

152 153 154 155 156
/*
 * These flags explain why a system is in the state of "shutdown".  Normally,
 * They are defined in xen/sched.h
 */
#ifndef SHUTDOWN_poweroff
157 158 159 160
# define SHUTDOWN_poweroff   0  /* Domain exited normally. Clean up and kill. */
# define SHUTDOWN_reboot     1  /* Clean up, kill, and then restart.          */
# define SHUTDOWN_suspend    2  /* Clean up, save suspend info, kill.         */
# define SHUTDOWN_crash      3  /* Tell controller we've crashed.             */
161 162
#endif

163 164 165 166 167 168
#define XEN_V0_OP_GETDOMAININFOLIST	38
#define XEN_V1_OP_GETDOMAININFOLIST	38
#define XEN_V2_OP_GETDOMAININFOLIST	6

struct xen_v0_getdomaininfo {
    domid_t  domain;	/* the domain number */
R
Richard W.M. Jones 已提交
169
    uint32_t flags;	/* flags, see before */
170 171
    uint64_t tot_pages;	/* total number of pages used */
    uint64_t max_pages;	/* maximum number of pages allowed */
172
    unsigned long shared_info_frame; /* MFN of shared_info struct */
173 174 175 176 177 178 179 180
    uint64_t cpu_time;  /* CPU time used */
    uint32_t nr_online_vcpus;  /* Number of VCPUs currently online. */
    uint32_t max_vcpu_id; /* Maximum VCPUID in use by this domain. */
    uint32_t ssidref;
    xen_domain_handle_t handle;
};
typedef struct xen_v0_getdomaininfo xen_v0_getdomaininfo;

181 182
struct xen_v2_getdomaininfo {
    domid_t  domain;	/* the domain number */
R
Richard W.M. Jones 已提交
183
    uint32_t flags;	/* flags, see before */
184 185 186 187 188 189 190 191 192 193 194
    uint64_t tot_pages;	/* total number of pages used */
    uint64_t max_pages;	/* maximum number of pages allowed */
    uint64_t shared_info_frame; /* MFN of shared_info struct */
    uint64_t cpu_time;  /* CPU time used */
    uint32_t nr_online_vcpus;  /* Number of VCPUs currently online. */
    uint32_t max_vcpu_id; /* Maximum VCPUID in use by this domain. */
    uint32_t ssidref;
    xen_domain_handle_t handle;
};
typedef struct xen_v2_getdomaininfo xen_v2_getdomaininfo;

195 196 197 198 199 200 201

/* As of Hypervisor Call v2,  DomCtl v5 we are now 8-byte aligned
   even on 32-bit archs when dealing with uint64_t */
#define ALIGN_64 __attribute__((aligned(8)))

struct xen_v2d5_getdomaininfo {
    domid_t  domain;	/* the domain number */
R
Richard W.M. Jones 已提交
202
    uint32_t flags;	/* flags, see before */
203 204 205 206 207 208 209 210 211 212 213
    uint64_t tot_pages ALIGN_64;	/* total number of pages used */
    uint64_t max_pages ALIGN_64;	/* maximum number of pages allowed */
    uint64_t shared_info_frame ALIGN_64; /* MFN of shared_info struct */
    uint64_t cpu_time ALIGN_64;  /* CPU time used */
    uint32_t nr_online_vcpus;  /* Number of VCPUs currently online. */
    uint32_t max_vcpu_id; /* Maximum VCPUID in use by this domain. */
    uint32_t ssidref;
    xen_domain_handle_t handle;
};
typedef struct xen_v2d5_getdomaininfo xen_v2d5_getdomaininfo;

214 215 216 217 218 219 220 221 222 223 224 225 226 227 228
struct xen_v2d6_getdomaininfo {
    domid_t  domain;	/* the domain number */
    uint32_t flags;	/* flags, see before */
    uint64_t tot_pages ALIGN_64;	/* total number of pages used */
    uint64_t max_pages ALIGN_64;	/* maximum number of pages allowed */
    uint64_t shr_pages ALIGN_64;    /* number of shared pages */
    uint64_t shared_info_frame ALIGN_64; /* MFN of shared_info struct */
    uint64_t cpu_time ALIGN_64;  /* CPU time used */
    uint32_t nr_online_vcpus;  /* Number of VCPUs currently online. */
    uint32_t max_vcpu_id; /* Maximum VCPUID in use by this domain. */
    uint32_t ssidref;
    xen_domain_handle_t handle;
};
typedef struct xen_v2d6_getdomaininfo xen_v2d6_getdomaininfo;

J
Jim Fehlig 已提交
229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244
struct xen_v2d7_getdomaininfo {
    domid_t  domain;	/* the domain number */
    uint32_t flags;	/* flags, see before */
    uint64_t tot_pages ALIGN_64;	/* total number of pages used */
    uint64_t max_pages ALIGN_64;	/* maximum number of pages allowed */
    uint64_t shr_pages ALIGN_64;    /* number of shared pages */
    uint64_t shared_info_frame ALIGN_64; /* MFN of shared_info struct */
    uint64_t cpu_time ALIGN_64;  /* CPU time used */
    uint32_t nr_online_vcpus;  /* Number of VCPUs currently online. */
    uint32_t max_vcpu_id; /* Maximum VCPUID in use by this domain. */
    uint32_t ssidref;
    xen_domain_handle_t handle;
    uint32_t cpupool;
};
typedef struct xen_v2d7_getdomaininfo xen_v2d7_getdomaininfo;

245 246 247
union xen_getdomaininfo {
    struct xen_v0_getdomaininfo v0;
    struct xen_v2_getdomaininfo v2;
248
    struct xen_v2d5_getdomaininfo v2d5;
249
    struct xen_v2d6_getdomaininfo v2d6;
J
Jim Fehlig 已提交
250
    struct xen_v2d7_getdomaininfo v2d7;
251 252 253 254 255 256
};
typedef union xen_getdomaininfo xen_getdomaininfo;

union xen_getdomaininfolist {
    struct xen_v0_getdomaininfo *v0;
    struct xen_v2_getdomaininfo *v2;
257
    struct xen_v2d5_getdomaininfo *v2d5;
258
    struct xen_v2d6_getdomaininfo *v2d6;
J
Jim Fehlig 已提交
259
    struct xen_v2d7_getdomaininfo *v2d7;
260 261 262
};
typedef union xen_getdomaininfolist xen_getdomaininfolist;

263 264 265 266 267 268 269 270 271 272 273 274

struct xen_v2_getschedulerid {
    uint32_t sched_id; /* Get Scheduler ID from Xen */
};
typedef struct xen_v2_getschedulerid xen_v2_getschedulerid;


union xen_getschedulerid {
    struct xen_v2_getschedulerid *v2;
};
typedef union xen_getschedulerid xen_getschedulerid;

275 276 277 278 279 280 281 282 283
struct xen_v2s4_availheap {
    uint32_t min_bitwidth;  /* Smallest address width (zero if don't care). */
    uint32_t max_bitwidth;  /* Largest address width (zero if don't care). */
    int32_t  node;          /* NUMA node (-1 for sum across all nodes). */
    uint64_t avail_bytes;   /* Bytes available in the specified region. */
};

typedef struct xen_v2s4_availheap  xen_v2s4_availheap;

284 285 286 287 288 289 290 291 292
struct xen_v2s5_availheap {
    uint32_t min_bitwidth;  /* Smallest address width (zero if don't care). */
    uint32_t max_bitwidth;  /* Largest address width (zero if don't care). */
    int32_t  node;          /* NUMA node (-1 for sum across all nodes). */
    uint64_t avail_bytes ALIGN_64;   /* Bytes available in the specified region. */
};

typedef struct xen_v2s5_availheap  xen_v2s5_availheap;

293

294
#define XEN_GETDOMAININFOLIST_ALLOC(domlist, size)                      \
P
Philipp Hahn 已提交
295
    (hv_versions.hypervisor < 2 ?                                       \
296
     (VIR_ALLOC_N(domlist.v0, (size)) == 0) :                           \
P
Philipp Hahn 已提交
297
     (hv_versions.dom_interface >= 7 ?                                  \
J
Jim Fehlig 已提交
298
      (VIR_ALLOC_N(domlist.v2d7, (size)) == 0) :                        \
P
Philipp Hahn 已提交
299
     (hv_versions.dom_interface == 6 ?                                  \
300
      (VIR_ALLOC_N(domlist.v2d6, (size)) == 0) :                        \
P
Philipp Hahn 已提交
301
     (hv_versions.dom_interface == 5 ?                                  \
302
      (VIR_ALLOC_N(domlist.v2d5, (size)) == 0) :                        \
J
Jim Fehlig 已提交
303
      (VIR_ALLOC_N(domlist.v2, (size)) == 0)))))
304

305
#define XEN_GETDOMAININFOLIST_FREE(domlist)            \
P
Philipp Hahn 已提交
306
    (hv_versions.hypervisor < 2 ?                      \
307
     VIR_FREE(domlist.v0) :                            \
P
Philipp Hahn 已提交
308
     (hv_versions.dom_interface >= 7 ?                 \
J
Jim Fehlig 已提交
309
      VIR_FREE(domlist.v2d7) :                         \
P
Philipp Hahn 已提交
310
     (hv_versions.dom_interface == 6 ?                 \
311
      VIR_FREE(domlist.v2d6) :                         \
P
Philipp Hahn 已提交
312
     (hv_versions.dom_interface == 5 ?                 \
313
      VIR_FREE(domlist.v2d5) :                         \
J
Jim Fehlig 已提交
314
      VIR_FREE(domlist.v2)))))
315

316
#define XEN_GETDOMAININFOLIST_CLEAR(domlist, size)            \
P
Philipp Hahn 已提交
317
    (hv_versions.hypervisor < 2 ?                             \
318
     memset(domlist.v0, 0, sizeof(*domlist.v0) * size) :      \
P
Philipp Hahn 已提交
319
     (hv_versions.dom_interface >= 7 ?                        \
J
Jim Fehlig 已提交
320
      memset(domlist.v2d7, 0, sizeof(*domlist.v2d7) * size) : \
P
Philipp Hahn 已提交
321
     (hv_versions.dom_interface == 6 ?                        \
322
      memset(domlist.v2d6, 0, sizeof(*domlist.v2d6) * size) : \
P
Philipp Hahn 已提交
323
     (hv_versions.dom_interface == 5 ?                        \
324
      memset(domlist.v2d5, 0, sizeof(*domlist.v2d5) * size) : \
J
Jim Fehlig 已提交
325
      memset(domlist.v2, 0, sizeof(*domlist.v2) * size)))))
326 327

#define XEN_GETDOMAININFOLIST_DOMAIN(domlist, n)    \
P
Philipp Hahn 已提交
328
    (hv_versions.hypervisor < 2 ?                   \
329
     domlist.v0[n].domain :                         \
P
Philipp Hahn 已提交
330
     (hv_versions.dom_interface >= 7 ?              \
J
Jim Fehlig 已提交
331
      domlist.v2d7[n].domain :                      \
P
Philipp Hahn 已提交
332
     (hv_versions.dom_interface == 6 ?              \
333
      domlist.v2d6[n].domain :                      \
P
Philipp Hahn 已提交
334
     (hv_versions.dom_interface == 5 ?              \
335
      domlist.v2d5[n].domain :                      \
J
Jim Fehlig 已提交
336
      domlist.v2[n].domain))))
337

338
#define XEN_GETDOMAININFOLIST_UUID(domlist, n)      \
P
Philipp Hahn 已提交
339
    (hv_versions.hypervisor < 2 ?                   \
340
     domlist.v0[n].handle :                         \
P
Philipp Hahn 已提交
341
     (hv_versions.dom_interface >= 7 ?              \
J
Jim Fehlig 已提交
342
      domlist.v2d7[n].handle :                      \
P
Philipp Hahn 已提交
343
     (hv_versions.dom_interface == 6 ?              \
344
      domlist.v2d6[n].handle :                      \
P
Philipp Hahn 已提交
345
     (hv_versions.dom_interface == 5 ?              \
346
      domlist.v2d5[n].handle :                      \
J
Jim Fehlig 已提交
347
      domlist.v2[n].handle))))
348

349
#define XEN_GETDOMAININFOLIST_DATA(domlist)        \
P
Philipp Hahn 已提交
350
    (hv_versions.hypervisor < 2 ?                  \
351
     (void*)(domlist->v0) :                        \
P
Philipp Hahn 已提交
352
     (hv_versions.dom_interface >= 7 ?             \
J
Jim Fehlig 已提交
353
      (void*)(domlist->v2d7) :                     \
P
Philipp Hahn 已提交
354
     (hv_versions.dom_interface == 6 ?             \
355
      (void*)(domlist->v2d6) :                     \
P
Philipp Hahn 已提交
356
     (hv_versions.dom_interface == 5 ?             \
357
      (void*)(domlist->v2d5) :                     \
J
Jim Fehlig 已提交
358
      (void*)(domlist->v2)))))
359 360

#define XEN_GETDOMAININFO_SIZE                     \
P
Philipp Hahn 已提交
361
    (hv_versions.hypervisor < 2 ?                  \
362
     sizeof(xen_v0_getdomaininfo) :                \
P
Philipp Hahn 已提交
363
     (hv_versions.dom_interface >= 7 ?             \
J
Jim Fehlig 已提交
364
      sizeof(xen_v2d7_getdomaininfo) :             \
P
Philipp Hahn 已提交
365
     (hv_versions.dom_interface == 6 ?             \
366
      sizeof(xen_v2d6_getdomaininfo) :             \
P
Philipp Hahn 已提交
367
     (hv_versions.dom_interface == 5 ?             \
368
      sizeof(xen_v2d5_getdomaininfo) :             \
J
Jim Fehlig 已提交
369
      sizeof(xen_v2_getdomaininfo)))))
370 371

#define XEN_GETDOMAININFO_CLEAR(dominfo)                           \
P
Philipp Hahn 已提交
372
    (hv_versions.hypervisor < 2 ?                                  \
373
     memset(&(dominfo.v0), 0, sizeof(xen_v0_getdomaininfo)) :      \
P
Philipp Hahn 已提交
374
     (hv_versions.dom_interface >= 7 ?                             \
J
Jim Fehlig 已提交
375
      memset(&(dominfo.v2d7), 0, sizeof(xen_v2d7_getdomaininfo)) : \
P
Philipp Hahn 已提交
376
     (hv_versions.dom_interface == 6 ?                             \
377
      memset(&(dominfo.v2d6), 0, sizeof(xen_v2d6_getdomaininfo)) : \
P
Philipp Hahn 已提交
378
     (hv_versions.dom_interface == 5 ?                             \
379
      memset(&(dominfo.v2d5), 0, sizeof(xen_v2d5_getdomaininfo)) : \
J
Jim Fehlig 已提交
380
      memset(&(dominfo.v2), 0, sizeof(xen_v2_getdomaininfo))))))
381 382

#define XEN_GETDOMAININFO_DOMAIN(dominfo)       \
P
Philipp Hahn 已提交
383
    (hv_versions.hypervisor < 2 ?               \
384
     dominfo.v0.domain :                        \
P
Philipp Hahn 已提交
385
     (hv_versions.dom_interface >= 7 ?          \
J
Jim Fehlig 已提交
386
      dominfo.v2d7.domain :                     \
P
Philipp Hahn 已提交
387
     (hv_versions.dom_interface == 6 ?          \
388
      dominfo.v2d6.domain :                     \
P
Philipp Hahn 已提交
389
     (hv_versions.dom_interface == 5 ?          \
390
      dominfo.v2d5.domain :                     \
J
Jim Fehlig 已提交
391
      dominfo.v2.domain))))
392 393

#define XEN_GETDOMAININFO_CPUTIME(dominfo)      \
P
Philipp Hahn 已提交
394
    (hv_versions.hypervisor < 2 ?               \
395
     dominfo.v0.cpu_time :                      \
P
Philipp Hahn 已提交
396
     (hv_versions.dom_interface >= 7 ?          \
J
Jim Fehlig 已提交
397
      dominfo.v2d7.cpu_time :                   \
P
Philipp Hahn 已提交
398
     (hv_versions.dom_interface == 6 ?          \
399
      dominfo.v2d6.cpu_time :                   \
P
Philipp Hahn 已提交
400
     (hv_versions.dom_interface == 5 ?          \
401
      dominfo.v2d5.cpu_time :                   \
J
Jim Fehlig 已提交
402
      dominfo.v2.cpu_time))))
403

404 405

#define XEN_GETDOMAININFO_CPUCOUNT(dominfo)     \
P
Philipp Hahn 已提交
406
    (hv_versions.hypervisor < 2 ?               \
407
     dominfo.v0.nr_online_vcpus :               \
P
Philipp Hahn 已提交
408
     (hv_versions.dom_interface >= 7 ?          \
J
Jim Fehlig 已提交
409
      dominfo.v2d7.nr_online_vcpus :            \
P
Philipp Hahn 已提交
410
     (hv_versions.dom_interface == 6 ?          \
411
      dominfo.v2d6.nr_online_vcpus :            \
P
Philipp Hahn 已提交
412
     (hv_versions.dom_interface == 5 ?          \
413
      dominfo.v2d5.nr_online_vcpus :            \
J
Jim Fehlig 已提交
414
      dominfo.v2.nr_online_vcpus))))
415

416
#define XEN_GETDOMAININFO_MAXCPUID(dominfo)  \
P
Philipp Hahn 已提交
417
    (hv_versions.hypervisor < 2 ?               \
418
     dominfo.v0.max_vcpu_id :                   \
P
Philipp Hahn 已提交
419
     (hv_versions.dom_interface >= 7 ?          \
J
Jim Fehlig 已提交
420
      dominfo.v2d7.max_vcpu_id :                \
P
Philipp Hahn 已提交
421
     (hv_versions.dom_interface == 6 ?          \
422
      dominfo.v2d6.max_vcpu_id :                \
P
Philipp Hahn 已提交
423
     (hv_versions.dom_interface == 5 ?          \
424
      dominfo.v2d5.max_vcpu_id :                \
J
Jim Fehlig 已提交
425
      dominfo.v2.max_vcpu_id))))
426

427
#define XEN_GETDOMAININFO_FLAGS(dominfo)        \
P
Philipp Hahn 已提交
428
    (hv_versions.hypervisor < 2 ?               \
429
     dominfo.v0.flags :                         \
P
Philipp Hahn 已提交
430
     (hv_versions.dom_interface >= 7 ?          \
J
Jim Fehlig 已提交
431
      dominfo.v2d7.flags :                      \
P
Philipp Hahn 已提交
432
     (hv_versions.dom_interface == 6 ?          \
433
      dominfo.v2d6.flags :                      \
P
Philipp Hahn 已提交
434
     (hv_versions.dom_interface == 5 ?          \
435
      dominfo.v2d5.flags :                      \
J
Jim Fehlig 已提交
436
      dominfo.v2.flags))))
437 438

#define XEN_GETDOMAININFO_TOT_PAGES(dominfo)    \
P
Philipp Hahn 已提交
439
    (hv_versions.hypervisor < 2 ?               \
440
     dominfo.v0.tot_pages :                     \
P
Philipp Hahn 已提交
441
     (hv_versions.dom_interface >= 7 ?          \
J
Jim Fehlig 已提交
442
      dominfo.v2d7.tot_pages :                  \
P
Philipp Hahn 已提交
443
     (hv_versions.dom_interface == 6 ?          \
444
      dominfo.v2d6.tot_pages :                  \
P
Philipp Hahn 已提交
445
     (hv_versions.dom_interface == 5 ?          \
446
      dominfo.v2d5.tot_pages :                  \
J
Jim Fehlig 已提交
447
      dominfo.v2.tot_pages))))
448 449

#define XEN_GETDOMAININFO_MAX_PAGES(dominfo)    \
P
Philipp Hahn 已提交
450
    (hv_versions.hypervisor < 2 ?               \
451
     dominfo.v0.max_pages :                     \
P
Philipp Hahn 已提交
452
     (hv_versions.dom_interface >= 7 ?          \
J
Jim Fehlig 已提交
453
      dominfo.v2d7.max_pages :                  \
P
Philipp Hahn 已提交
454
     (hv_versions.dom_interface == 6 ?          \
455
      dominfo.v2d6.max_pages :                  \
P
Philipp Hahn 已提交
456
     (hv_versions.dom_interface == 5 ?          \
457
      dominfo.v2d5.max_pages :                  \
J
Jim Fehlig 已提交
458
      dominfo.v2.max_pages))))
459

460
#define XEN_GETDOMAININFO_UUID(dominfo)         \
P
Philipp Hahn 已提交
461
    (hv_versions.hypervisor < 2 ?               \
462
     dominfo.v0.handle :                        \
P
Philipp Hahn 已提交
463
     (hv_versions.dom_interface >= 7 ?          \
J
Jim Fehlig 已提交
464
      dominfo.v2d7.handle :                     \
P
Philipp Hahn 已提交
465
     (hv_versions.dom_interface == 6 ?          \
466
      dominfo.v2d6.handle :                     \
P
Philipp Hahn 已提交
467
     (hv_versions.dom_interface == 5 ?          \
468
      dominfo.v2d5.handle :                     \
J
Jim Fehlig 已提交
469
      dominfo.v2.handle))))
470

471

472 473 474 475
static int
lock_pages(void *addr, size_t len)
{
#ifdef __linux__
476
        return (mlock(addr, len));
477
#elif defined(__sun)
478
        return (0);
479 480 481 482 483 484 485
#endif
}

static int
unlock_pages(void *addr, size_t len)
{
#ifdef __linux__
486
        return (munlock(addr, len));
487
#elif defined(__sun)
488
        return (0);
489 490 491
#endif
}

492 493

struct xen_v0_getdomaininfolistop {
494 495 496 497 498
    domid_t   first_domain;
    uint32_t  max_domains;
    struct xen_v0_getdomaininfo *buffer;
    uint32_t  num_domains;
};
499 500 501 502 503 504 505 506 507 508 509
typedef struct xen_v0_getdomaininfolistop xen_v0_getdomaininfolistop;


struct xen_v2_getdomaininfolistop {
    domid_t   first_domain;
    uint32_t  max_domains;
    struct xen_v2_getdomaininfo *buffer;
    uint32_t  num_domains;
};
typedef struct xen_v2_getdomaininfolistop xen_v2_getdomaininfolistop;

510 511 512 513
/* As of HV version 2, sysctl version 3 the *buffer pointer is 64-bit aligned */
struct xen_v2s3_getdomaininfolistop {
    domid_t   first_domain;
    uint32_t  max_domains;
514 515 516 517 518 519
#ifdef __BIG_ENDIAN__
    struct {
        int __pad[(sizeof (long long) - sizeof (struct xen_v2d5_getdomaininfo *)) / sizeof (int)];
        struct xen_v2d5_getdomaininfo *v;
    } buffer;
#else
520 521 522 523
    union {
        struct xen_v2d5_getdomaininfo *v;
        uint64_t pad ALIGN_64;
    } buffer;
524
#endif
525 526 527 528
    uint32_t  num_domains;
};
typedef struct xen_v2s3_getdomaininfolistop xen_v2s3_getdomaininfolistop;

529

530 531 532 533 534 535 536

struct xen_v0_domainop {
    domid_t   domain;
};
typedef struct xen_v0_domainop xen_v0_domainop;

/*
537
 * The information for a destroydomain system hypercall
538 539 540 541 542 543
 */
#define XEN_V0_OP_DESTROYDOMAIN	9
#define XEN_V1_OP_DESTROYDOMAIN	9
#define XEN_V2_OP_DESTROYDOMAIN	2

/*
544
 * The information for a pausedomain system hypercall
545 546 547 548 549 550
 */
#define XEN_V0_OP_PAUSEDOMAIN	10
#define XEN_V1_OP_PAUSEDOMAIN	10
#define XEN_V2_OP_PAUSEDOMAIN	3

/*
551
 * The information for an unpausedomain system hypercall
552 553 554 555 556 557
 */
#define XEN_V0_OP_UNPAUSEDOMAIN	11
#define XEN_V1_OP_UNPAUSEDOMAIN	11
#define XEN_V2_OP_UNPAUSEDOMAIN	4

/*
558
 * The information for an setmaxmem system hypercall
559 560 561
 */
#define XEN_V0_OP_SETMAXMEM	28
#define XEN_V1_OP_SETMAXMEM	28
562
#define XEN_V2_OP_SETMAXMEM	11
563 564 565 566 567 568 569 570 571 572 573 574 575

struct xen_v0_setmaxmem {
    domid_t	domain;
    uint64_t	maxmem;
};
typedef struct xen_v0_setmaxmem xen_v0_setmaxmem;
typedef struct xen_v0_setmaxmem xen_v1_setmaxmem;

struct xen_v2_setmaxmem {
    uint64_t	maxmem;
};
typedef struct xen_v2_setmaxmem xen_v2_setmaxmem;

576 577 578 579 580
struct xen_v2d5_setmaxmem {
    uint64_t	maxmem ALIGN_64;
};
typedef struct xen_v2d5_setmaxmem xen_v2d5_setmaxmem;

581
/*
582
 * The information for an setmaxvcpu system hypercall
583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600
 */
#define XEN_V0_OP_SETMAXVCPU	41
#define XEN_V1_OP_SETMAXVCPU	41
#define XEN_V2_OP_SETMAXVCPU	15

struct xen_v0_setmaxvcpu {
    domid_t	domain;
    uint32_t	maxvcpu;
};
typedef struct xen_v0_setmaxvcpu xen_v0_setmaxvcpu;
typedef struct xen_v0_setmaxvcpu xen_v1_setmaxvcpu;

struct xen_v2_setmaxvcpu {
    uint32_t	maxvcpu;
};
typedef struct xen_v2_setmaxvcpu xen_v2_setmaxvcpu;

/*
601
 * The information for an setvcpumap system hypercall
602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626
 * Note that between 1 and 2 the limitation to 64 physical CPU was lifted
 * hence the difference in structures
 */
#define XEN_V0_OP_SETVCPUMAP	20
#define XEN_V1_OP_SETVCPUMAP	20
#define XEN_V2_OP_SETVCPUMAP	9

struct xen_v0_setvcpumap {
    domid_t	domain;
    uint32_t	vcpu;
    cpumap_t    cpumap;
};
typedef struct xen_v0_setvcpumap xen_v0_setvcpumap;
typedef struct xen_v0_setvcpumap xen_v1_setvcpumap;

struct xen_v2_cpumap {
    uint8_t    *bitmap;
    uint32_t    nr_cpus;
};
struct xen_v2_setvcpumap {
    uint32_t	vcpu;
    struct xen_v2_cpumap cpumap;
};
typedef struct xen_v2_setvcpumap xen_v2_setvcpumap;

627 628
/* HV version 2, Dom version 5 requires 64-bit alignment */
struct xen_v2d5_cpumap {
629 630 631 632 633 634
#ifdef __BIG_ENDIAN__
    struct {
        int __pad[(sizeof (long long) - sizeof (uint8_t *)) / sizeof (int)];
        uint8_t *v;
    } bitmap;
#else
635 636 637 638
    union {
        uint8_t    *v;
        uint64_t   pad ALIGN_64;
    } bitmap;
639
#endif
640 641 642 643 644 645 646 647
    uint32_t    nr_cpus;
};
struct xen_v2d5_setvcpumap {
    uint32_t	vcpu;
    struct xen_v2d5_cpumap cpumap;
};
typedef struct xen_v2d5_setvcpumap xen_v2d5_setvcpumap;

648
/*
649
 * The information for an vcpuinfo system hypercall
650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677
 */
#define XEN_V0_OP_GETVCPUINFO   43
#define XEN_V1_OP_GETVCPUINFO	43
#define XEN_V2_OP_GETVCPUINFO   14

struct xen_v0_vcpuinfo {
    domid_t	domain;		/* owner's domain */
    uint32_t	vcpu;		/* the vcpu number */
    uint8_t	online;		/* seen as on line */
    uint8_t	blocked;	/* blocked on event */
    uint8_t	running;	/* scheduled on CPU */
    uint64_t    cpu_time;	/* nanosecond of CPU used */
    uint32_t	cpu;		/* current mapping */
    cpumap_t	cpumap;		/* deprecated in V2 */
};
typedef struct xen_v0_vcpuinfo xen_v0_vcpuinfo;
typedef struct xen_v0_vcpuinfo xen_v1_vcpuinfo;

struct xen_v2_vcpuinfo {
    uint32_t	vcpu;		/* the vcpu number */
    uint8_t	online;		/* seen as on line */
    uint8_t	blocked;	/* blocked on event */
    uint8_t	running;	/* scheduled on CPU */
    uint64_t    cpu_time;	/* nanosecond of CPU used */
    uint32_t	cpu;		/* current mapping */
};
typedef struct xen_v2_vcpuinfo xen_v2_vcpuinfo;

678 679 680 681 682 683 684 685 686 687
struct xen_v2d5_vcpuinfo {
    uint32_t	vcpu;		/* the vcpu number */
    uint8_t	online;		/* seen as on line */
    uint8_t	blocked;	/* blocked on event */
    uint8_t	running;	/* scheduled on CPU */
    uint64_t    cpu_time ALIGN_64; /* nanosecond of CPU used */
    uint32_t	cpu;		/* current mapping */
};
typedef struct xen_v2d5_vcpuinfo xen_v2d5_vcpuinfo;

688 689 690 691 692
/*
 * from V2 the pinning of a vcpu is read with a separate call
 */
#define XEN_V2_OP_GETVCPUMAP	25
typedef struct xen_v2_setvcpumap xen_v2_getvcpumap;
693
typedef struct xen_v2d5_setvcpumap xen_v2d5_getvcpumap;
694

695 696 697 698 699
/*
 * from V2 we get the scheduler information
 */
#define XEN_V2_OP_GETSCHEDULERID	4

700 701 702
/*
 * from V2 we get the available heap information
 */
E
Eric Blake 已提交
703
#define XEN_V2_OP_GETAVAILHEAP		9
704

705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736
/*
 * from V2 we get the scheduler parameter
 */
#define XEN_V2_OP_SCHEDULER		16
/* Scheduler types. */
#define XEN_SCHEDULER_SEDF       4
#define XEN_SCHEDULER_CREDIT     5
/* get/set scheduler parameters */
#define XEN_DOMCTL_SCHEDOP_putinfo 0
#define XEN_DOMCTL_SCHEDOP_getinfo 1

struct xen_v2_setschedinfo {
    uint32_t sched_id;
    uint32_t cmd;
    union {
        struct xen_domctl_sched_sedf {
            uint64_t period ALIGN_64;
            uint64_t slice  ALIGN_64;
            uint64_t latency ALIGN_64;
            uint32_t extratime;
            uint32_t weight;
        } sedf;
        struct xen_domctl_sched_credit {
            uint16_t weight;
            uint16_t cap;
        } credit;
    } u;
};
typedef struct xen_v2_setschedinfo xen_v2_setschedinfo;
typedef struct xen_v2_setschedinfo xen_v2_getschedinfo;


737 738 739 740 741 742 743 744 745
/*
 * The hypercall operation structures also have changed on
 * changeset 86d26e6ec89b
 */
/* the old structure */
struct xen_op_v0 {
    uint32_t cmd;
    uint32_t interface_version;
    union {
746 747 748 749 750 751 752
        xen_v0_getdomaininfolistop getdomaininfolist;
        xen_v0_domainop          domain;
        xen_v0_setmaxmem         setmaxmem;
        xen_v0_setmaxvcpu        setmaxvcpu;
        xen_v0_setvcpumap        setvcpumap;
        xen_v0_vcpuinfo          getvcpuinfo;
        uint8_t padding[128];
753 754 755 756 757 758 759 760 761 762
    } u;
};
typedef struct xen_op_v0 xen_op_v0;
typedef struct xen_op_v0 xen_op_v1;

/* the new structure for systems operations */
struct xen_op_v2_sys {
    uint32_t cmd;
    uint32_t interface_version;
    union {
763 764
        xen_v2_getdomaininfolistop   getdomaininfolist;
        xen_v2s3_getdomaininfolistop getdomaininfolists3;
765
        xen_v2_getschedulerid        getschedulerid;
766
        xen_v2s4_availheap           availheap;
767
        xen_v2s5_availheap           availheap5;
768
        uint8_t padding[128];
769 770 771 772 773 774 775 776 777 778
    } u;
};
typedef struct xen_op_v2_sys xen_op_v2_sys;

/* the new structure for domains operation */
struct xen_op_v2_dom {
    uint32_t cmd;
    uint32_t interface_version;
    domid_t  domain;
    union {
779
        xen_v2_setmaxmem         setmaxmem;
780
        xen_v2d5_setmaxmem       setmaxmemd5;
781 782
        xen_v2_setmaxvcpu        setmaxvcpu;
        xen_v2_setvcpumap        setvcpumap;
783
        xen_v2d5_setvcpumap      setvcpumapd5;
784
        xen_v2_vcpuinfo          getvcpuinfo;
785
        xen_v2d5_vcpuinfo        getvcpuinfod5;
786
        xen_v2_getvcpumap        getvcpumap;
787
        xen_v2d5_getvcpumap      getvcpumapd5;
788 789
        xen_v2_setschedinfo      setschedinfo;
        xen_v2_getschedinfo      getschedinfo;
790
        uint8_t padding[128];
791 792 793
    } u;
};
typedef struct xen_op_v2_dom xen_op_v2_dom;
794 795


796
#ifdef __linux__
797 798
# define XEN_HYPERVISOR_SOCKET	"/proc/xen/privcmd"
# define HYPERVISOR_CAPABILITIES	"/sys/hypervisor/properties/capabilities"
799
#elif defined(__sun)
800
# define XEN_HYPERVISOR_SOCKET	"/dev/xen/privcmd"
801
#else
802
# error "unsupported platform"
803
#endif
804

805
static unsigned long xenHypervisorGetMaxMemory(virDomainPtr domain);
806

807
struct xenUnifiedDriver xenHypervisorDriver = {
E
Eric Blake 已提交
808 809 810 811 812 813 814 815 816 817 818 819 820 821
    .xenClose = xenHypervisorClose,
    .xenVersion = xenHypervisorGetVersion,
    .xenDomainSuspend = xenHypervisorPauseDomain,
    .xenDomainResume = xenHypervisorResumeDomain,
    .xenDomainDestroyFlags = xenHypervisorDestroyDomainFlags,
    .xenDomainGetOSType = xenHypervisorDomainGetOSType,
    .xenDomainGetMaxMemory = xenHypervisorGetMaxMemory,
    .xenDomainSetMaxMemory = xenHypervisorSetMaxMemory,
    .xenDomainGetInfo = xenHypervisorGetDomainInfo,
    .xenDomainPinVcpu = xenHypervisorPinVcpu,
    .xenDomainGetVcpus = xenHypervisorGetVcpus,
    .xenDomainGetSchedulerType = xenHypervisorGetSchedulerType,
    .xenDomainGetSchedulerParameters = xenHypervisorGetSchedulerParameters,
    .xenDomainSetSchedulerParameters = xenHypervisorSetSchedulerParameters,
822 823
};

824
#define virXenError(code, ...)                                             \
825
        if (in_init == 0)                                                  \
826
            virReportErrorHelper(VIR_FROM_XEN, code, __FILE__,             \
827
                                 __FUNCTION__, __LINE__, __VA_ARGS__)
828

829 830 831 832 833 834 835 836 837 838
/**
 * virXenErrorFunc:
 * @error: the error number
 * @func: the function failing
 * @info: extra information string
 * @value: extra information number
 *
 * Handle an error at the xend daemon interface
 */
static void
839
virXenErrorFunc(virErrorNumber error, const char *func, const char *info,
840 841
                int value)
{
D
Daniel Veillard 已提交
842
    char fullinfo[1000];
843 844 845 846 847 848
    const char *errmsg;

    if ((error == VIR_ERR_OK) || (in_init != 0))
        return;


849
    errmsg =virErrorMsg(error, info);
850 851
    if (func != NULL) {
        snprintf(fullinfo, 999, "%s: %s", func, info);
852
        fullinfo[999] = 0;
853
        virRaiseError(NULL, NULL, VIR_FROM_XEN, error, VIR_ERR_ERROR,
854 855
                        errmsg, fullinfo, NULL, value, 0, errmsg, fullinfo,
                        value);
856
    } else {
857
        virRaiseError(NULL, NULL, VIR_FROM_XEN, error, VIR_ERR_ERROR,
858 859
                        errmsg, info, NULL, value, 0, errmsg, info,
                        value);
860 861 862
    }
}

863 864 865
/**
 * xenHypervisorDoV0Op:
 * @handle: the handle to the Xen hypervisor
R
Richard W.M. Jones 已提交
866
 * @op: pointer to the hypervisor operation structure
867 868 869 870 871 872 873 874 875 876 877 878 879
 *
 * Do an hypervisor operation though the old interface,
 * this leads to an hypervisor call through ioctl.
 *
 * Returns 0 in case of success and -1 in case of error.
 */
static int
xenHypervisorDoV0Op(int handle, xen_op_v0 * op)
{
    int ret;
    v0_hypercall_t hc;

    memset(&hc, 0, sizeof(hc));
P
Philipp Hahn 已提交
880
    op->interface_version = hv_versions.hv << 8;
881 882 883
    hc.op = __HYPERVISOR_dom0_op;
    hc.arg[0] = (unsigned long) op;

884
    if (lock_pages(op, sizeof(dom0_op_t)) < 0) {
885
        virXenError(VIR_ERR_XEN_CALL, " locking");
886 887 888 889 890
        return (-1);
    }

    ret = ioctl(handle, xen_ioctl_hypercall_cmd, (unsigned long) &hc);
    if (ret < 0) {
891
        virXenError(VIR_ERR_XEN_CALL, " ioctl %d",
892
                    xen_ioctl_hypercall_cmd);
893 894
    }

895
    if (unlock_pages(op, sizeof(dom0_op_t)) < 0) {
896
        virXenError(VIR_ERR_XEN_CALL, " releasing");
897 898 899 900 901 902 903 904 905 906 907
        ret = -1;
    }

    if (ret < 0)
        return (-1);

    return (0);
}
/**
 * xenHypervisorDoV1Op:
 * @handle: the handle to the Xen hypervisor
R
Richard W.M. Jones 已提交
908
 * @op: pointer to the hypervisor operation structure
909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925
 *
 * Do an hypervisor v1 operation, this leads to an hypervisor call through
 * ioctl.
 *
 * Returns 0 in case of success and -1 in case of error.
 */
static int
xenHypervisorDoV1Op(int handle, xen_op_v1* op)
{
    int ret;
    hypercall_t hc;

    memset(&hc, 0, sizeof(hc));
    op->interface_version = DOM0_INTERFACE_VERSION;
    hc.op = __HYPERVISOR_dom0_op;
    hc.arg[0] = (unsigned long) op;

926
    if (lock_pages(op, sizeof(dom0_op_t)) < 0) {
927
        virXenError(VIR_ERR_XEN_CALL, " locking");
928 929 930 931 932
        return (-1);
    }

    ret = ioctl(handle, xen_ioctl_hypercall_cmd, (unsigned long) &hc);
    if (ret < 0) {
933
        virXenError(VIR_ERR_XEN_CALL, " ioctl %d",
934
                    xen_ioctl_hypercall_cmd);
935 936
    }

937
    if (unlock_pages(op, sizeof(dom0_op_t)) < 0) {
938
        virXenError(VIR_ERR_XEN_CALL, " releasing");
939 940 941 942 943 944 945 946 947 948 949 950 951 952
        ret = -1;
    }

    if (ret < 0)
        return (-1);

    return (0);
}

/**
 * xenHypervisorDoV2Sys:
 * @handle: the handle to the Xen hypervisor
 * @op: pointer to the hypervisor operation structure
 *
R
Richard W.M. Jones 已提交
953
 * Do an hypervisor v2 system operation, this leads to an hypervisor
954 955 956 957 958 959 960 961 962 963 964
 * call through ioctl.
 *
 * Returns 0 in case of success and -1 in case of error.
 */
static int
xenHypervisorDoV2Sys(int handle, xen_op_v2_sys* op)
{
    int ret;
    hypercall_t hc;

    memset(&hc, 0, sizeof(hc));
P
Philipp Hahn 已提交
965
    op->interface_version = hv_versions.sys_interface;
966 967 968
    hc.op = __HYPERVISOR_sysctl;
    hc.arg[0] = (unsigned long) op;

969
    if (lock_pages(op, sizeof(dom0_op_t)) < 0) {
970
        virXenError(VIR_ERR_XEN_CALL, " locking");
971 972 973 974 975
        return (-1);
    }

    ret = ioctl(handle, xen_ioctl_hypercall_cmd, (unsigned long) &hc);
    if (ret < 0) {
976
        virXenError(VIR_ERR_XEN_CALL, " sys ioctl %d",
977
                                            xen_ioctl_hypercall_cmd);
978 979
    }

980
    if (unlock_pages(op, sizeof(dom0_op_t)) < 0) {
981
        virXenError(VIR_ERR_XEN_CALL, " releasing");
982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007
        ret = -1;
    }

    if (ret < 0)
        return (-1);

    return (0);
}

/**
 * xenHypervisorDoV2Dom:
 * @handle: the handle to the Xen hypervisor
 * @op: pointer to the hypervisor domain operation structure
 *
 * Do an hypervisor v2 domain operation, this leads to an hypervisor
 * call through ioctl.
 *
 * Returns 0 in case of success and -1 in case of error.
 */
static int
xenHypervisorDoV2Dom(int handle, xen_op_v2_dom* op)
{
    int ret;
    hypercall_t hc;

    memset(&hc, 0, sizeof(hc));
P
Philipp Hahn 已提交
1008
    op->interface_version = hv_versions.dom_interface;
1009 1010 1011
    hc.op = __HYPERVISOR_domctl;
    hc.arg[0] = (unsigned long) op;

1012
    if (lock_pages(op, sizeof(dom0_op_t)) < 0) {
1013
        virXenError(VIR_ERR_XEN_CALL, " locking");
1014 1015 1016 1017 1018
        return (-1);
    }

    ret = ioctl(handle, xen_ioctl_hypercall_cmd, (unsigned long) &hc);
    if (ret < 0) {
1019
        virXenError(VIR_ERR_XEN_CALL, " ioctl %d",
1020
                    xen_ioctl_hypercall_cmd);
1021 1022
    }

1023
    if (unlock_pages(op, sizeof(dom0_op_t)) < 0) {
1024
        virXenError(VIR_ERR_XEN_CALL, " releasing");
1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040
        ret = -1;
    }

    if (ret < 0)
        return (-1);

    return (0);
}

/**
 * virXen_getdomaininfolist:
 * @handle: the hypervisor handle
 * @first_domain: first domain in the range
 * @maxids: maximum number of domains to list
 * @dominfos: output structures
 *
1041
 * Do a low level hypercall to list existing domains information
1042 1043 1044 1045 1046
 *
 * Returns the number of domains or -1 in case of failure
 */
static int
virXen_getdomaininfolist(int handle, int first_domain, int maxids,
1047
                         xen_getdomaininfolist *dominfos)
1048 1049 1050
{
    int ret = -1;

1051
    if (lock_pages(XEN_GETDOMAININFOLIST_DATA(dominfos),
1052
              XEN_GETDOMAININFO_SIZE * maxids) < 0) {
1053
        virXenError(VIR_ERR_XEN_CALL, " locking");
1054 1055
        return (-1);
    }
P
Philipp Hahn 已提交
1056
    if (hv_versions.hypervisor > 1) {
1057 1058 1059
        xen_op_v2_sys op;

        memset(&op, 0, sizeof(op));
1060
        op.cmd = XEN_V2_OP_GETDOMAININFOLIST;
1061

P
Philipp Hahn 已提交
1062
        if (hv_versions.sys_interface < 3) {
1063 1064 1065 1066 1067 1068 1069 1070 1071 1072
            op.u.getdomaininfolist.first_domain = (domid_t) first_domain;
            op.u.getdomaininfolist.max_domains = maxids;
            op.u.getdomaininfolist.buffer = dominfos->v2;
            op.u.getdomaininfolist.num_domains = maxids;
        } else {
            op.u.getdomaininfolists3.first_domain = (domid_t) first_domain;
            op.u.getdomaininfolists3.max_domains = maxids;
            op.u.getdomaininfolists3.buffer.v = dominfos->v2d5;
            op.u.getdomaininfolists3.num_domains = maxids;
        }
1073
        ret = xenHypervisorDoV2Sys(handle, &op);
1074 1075

        if (ret == 0) {
P
Philipp Hahn 已提交
1076
            if (hv_versions.sys_interface < 3)
1077 1078 1079 1080
                ret = op.u.getdomaininfolist.num_domains;
            else
                ret = op.u.getdomaininfolists3.num_domains;
        }
P
Philipp Hahn 已提交
1081
    } else if (hv_versions.hypervisor == 1) {
1082 1083 1084
        xen_op_v1 op;

        memset(&op, 0, sizeof(op));
1085 1086 1087 1088 1089 1090 1091 1092
        op.cmd = XEN_V1_OP_GETDOMAININFOLIST;
        op.u.getdomaininfolist.first_domain = (domid_t) first_domain;
        op.u.getdomaininfolist.max_domains = maxids;
        op.u.getdomaininfolist.buffer = dominfos->v0;
        op.u.getdomaininfolist.num_domains = maxids;
        ret = xenHypervisorDoV1Op(handle, &op);
        if (ret == 0)
            ret = op.u.getdomaininfolist.num_domains;
P
Philipp Hahn 已提交
1093
    } else if (hv_versions.hypervisor == 0) {
1094 1095 1096
        xen_op_v0 op;

        memset(&op, 0, sizeof(op));
1097 1098 1099 1100 1101 1102 1103 1104
        op.cmd = XEN_V0_OP_GETDOMAININFOLIST;
        op.u.getdomaininfolist.first_domain = (domid_t) first_domain;
        op.u.getdomaininfolist.max_domains = maxids;
        op.u.getdomaininfolist.buffer = dominfos->v0;
        op.u.getdomaininfolist.num_domains = maxids;
        ret = xenHypervisorDoV0Op(handle, &op);
        if (ret == 0)
            ret = op.u.getdomaininfolist.num_domains;
1105
    }
1106
    if (unlock_pages(XEN_GETDOMAININFOLIST_DATA(dominfos),
1107
                XEN_GETDOMAININFO_SIZE * maxids) < 0) {
1108
        virXenError(VIR_ERR_XEN_CALL, " release");
1109 1110 1111 1112 1113
        ret = -1;
    }
    return(ret);
}

1114 1115 1116 1117 1118
static int
virXen_getdomaininfo(int handle, int first_domain,
                     xen_getdomaininfo *dominfo) {
    xen_getdomaininfolist dominfos;

P
Philipp Hahn 已提交
1119
    if (hv_versions.hypervisor < 2) {
1120 1121 1122 1123 1124 1125 1126 1127 1128
        dominfos.v0 = &(dominfo->v0);
    } else {
        dominfos.v2 = &(dominfo->v2);
    }

    return virXen_getdomaininfolist(handle, first_domain, 1, &dominfos);
}


1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143
/**
 * xenHypervisorGetSchedulerType:
 * @domain: pointer to the Xen Hypervisor block
 * @nparams:give a number of scheduler parameters.
 *
 * Do a low level hypercall to get scheduler type
 *
 * Returns scheduler name or NULL in case of failure
 */
char *
xenHypervisorGetSchedulerType(virDomainPtr domain, int *nparams)
{
    char *schedulertype = NULL;
    xenUnifiedPrivatePtr priv;

1144
    if (domain->conn == NULL) {
1145
        virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
1146
                        "domain or conn is NULL", 0);
1147 1148 1149 1150
        return NULL;
    }

    priv = (xenUnifiedPrivatePtr) domain->conn->privateData;
1151
    if (priv->handle < 0) {
1152
        virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
1153 1154 1155 1156
                        "priv->handle invalid", 0);
        return NULL;
    }
    if (domain->id < 0) {
1157
        virXenError(VIR_ERR_OPERATION_INVALID,
1158
                    "%s", _("domain is not running"));
1159 1160 1161 1162
        return NULL;
    }

    /*
P
Philipp Hahn 已提交
1163
     * Support only hv_versions.dom_interface >=5
1164
     * (Xen3.1.0 or later)
1165
     * TODO: check on Xen 3.0.3
1166
     */
P
Philipp Hahn 已提交
1167
    if (hv_versions.dom_interface < 5) {
1168
        virXenErrorFunc(VIR_ERR_NO_XEN, __FUNCTION__,
1169
                        "unsupported in dom interface < 5", 0);
1170 1171 1172
        return NULL;
    }

P
Philipp Hahn 已提交
1173
    if (hv_versions.hypervisor > 1) {
1174 1175 1176 1177 1178 1179 1180
        xen_op_v2_sys op;
        int ret;

        memset(&op, 0, sizeof(op));
        op.cmd = XEN_V2_OP_GETSCHEDULERID;
        ret = xenHypervisorDoV2Sys(priv->handle, &op);
        if (ret < 0)
1181
            return(NULL);
1182 1183

        switch (op.u.getschedulerid.sched_id){
1184 1185
            case XEN_SCHEDULER_SEDF:
                schedulertype = strdup("sedf");
1186
                if (schedulertype == NULL)
1187
                    virReportOOMError();
1188
                if (nparams)
1189
                    *nparams = XEN_SCHED_SEDF_NPARAM;
1190 1191 1192
                break;
            case XEN_SCHEDULER_CREDIT:
                schedulertype = strdup("credit");
1193
                if (schedulertype == NULL)
1194
                    virReportOOMError();
1195
                if (nparams)
1196
                    *nparams = XEN_SCHED_CRED_NPARAM;
1197 1198 1199
                break;
            default:
                break;
1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210
        }
    }

    return schedulertype;
}

/**
 * xenHypervisorGetSchedulerParameters:
 * @domain: pointer to the Xen Hypervisor block
 * @params: pointer to scheduler parameters.
 *     This memory area should be allocated before calling.
1211 1212
 * @nparams: this parameter must be at least as large as
 *     the given number of scheduler parameters.
1213 1214 1215 1216 1217 1218 1219 1220
 *     from xenHypervisorGetSchedulerType().
 *
 * Do a low level hypercall to get scheduler parameters
 *
 * Returns 0 or -1 in case of failure
 */
int
xenHypervisorGetSchedulerParameters(virDomainPtr domain,
1221
                                    virTypedParameterPtr params, int *nparams)
1222 1223 1224
{
    xenUnifiedPrivatePtr priv;

1225
    if (domain->conn == NULL) {
1226
        virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
1227
                        "domain or conn is NULL", 0);
1228 1229 1230 1231
        return -1;
    }

    priv = (xenUnifiedPrivatePtr) domain->conn->privateData;
1232
    if (priv->handle < 0) {
1233
        virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
1234 1235 1236 1237
                        "priv->handle invalid", 0);
        return -1;
    }
    if (domain->id < 0) {
1238
        virXenError(VIR_ERR_OPERATION_INVALID,
1239
                    "%s", _("domain is not running"));
1240 1241 1242 1243
        return -1;
    }

    /*
P
Philipp Hahn 已提交
1244
     * Support only hv_versions.dom_interface >=5
1245 1246 1247
     * (Xen3.1.0 or later)
     * TODO: check on Xen 3.0.3
     */
P
Philipp Hahn 已提交
1248
    if (hv_versions.dom_interface < 5) {
1249
        virXenErrorFunc(VIR_ERR_NO_XEN, __FUNCTION__,
1250
                        "unsupported in dom interface < 5", 0);
1251 1252 1253
        return -1;
    }

P
Philipp Hahn 已提交
1254
    if (hv_versions.hypervisor > 1) {
1255 1256 1257 1258 1259 1260 1261 1262
        xen_op_v2_sys op_sys;
        xen_op_v2_dom op_dom;
        int ret;

        memset(&op_sys, 0, sizeof(op_sys));
        op_sys.cmd = XEN_V2_OP_GETSCHEDULERID;
        ret = xenHypervisorDoV2Sys(priv->handle, &op_sys);
        if (ret < 0)
1263
            return -1;
1264 1265

        switch (op_sys.u.getschedulerid.sched_id){
1266
            case XEN_SCHEDULER_SEDF:
1267 1268 1269 1270 1271 1272
                if (*nparams < XEN_SCHED_SEDF_NPARAM) {
                    virXenError(VIR_ERR_INVALID_ARG,
                                "%s", _("Invalid parameter count"));
                    return -1;
                }

1273 1274 1275 1276
                /* TODO: Implement for Xen/SEDF */
                TODO
                return(-1);
            case XEN_SCHEDULER_CREDIT:
1277 1278 1279 1280 1281
                if (*nparams < XEN_SCHED_CRED_NPARAM) {
                    virXenError(VIR_ERR_INVALID_ARG,
                                "%s", _("Invalid parameter count"));
                    return -1;
                }
1282 1283 1284 1285 1286 1287 1288 1289 1290
                memset(&op_dom, 0, sizeof(op_dom));
                op_dom.cmd = XEN_V2_OP_SCHEDULER;
                op_dom.domain = (domid_t) domain->id;
                op_dom.u.getschedinfo.sched_id = XEN_SCHEDULER_CREDIT;
                op_dom.u.getschedinfo.cmd = XEN_DOMCTL_SCHEDOP_getinfo;
                ret = xenHypervisorDoV2Dom(priv->handle, &op_dom);
                if (ret < 0)
                    return(-1);

1291 1292
                if (virStrcpyStatic(params[0].field,
                                    VIR_DOMAIN_SCHEDULER_WEIGHT) == NULL) {
1293
                    virXenError(VIR_ERR_INTERNAL_ERROR,
1294 1295
                                "Weight %s too big for destination",
                                VIR_DOMAIN_SCHEDULER_WEIGHT);
C
Chris Lalancette 已提交
1296 1297
                    return -1;
                }
1298
                params[0].type = VIR_TYPED_PARAM_UINT;
1299
                params[0].value.ui = op_dom.u.getschedinfo.u.credit.weight;
1300

1301 1302
                if (virStrcpyStatic(params[1].field,
                                    VIR_DOMAIN_SCHEDULER_CAP) == NULL) {
1303
                    virXenError(VIR_ERR_INTERNAL_ERROR,
1304 1305
                                "Cap %s too big for destination",
                                VIR_DOMAIN_SCHEDULER_CAP);
C
Chris Lalancette 已提交
1306 1307
                    return -1;
                }
1308
                params[1].type = VIR_TYPED_PARAM_UINT;
1309
                params[1].value.ui = op_dom.u.getschedinfo.u.credit.cap;
1310

1311
                *nparams = XEN_SCHED_CRED_NPARAM;
1312 1313
                break;
            default:
1314
                virXenErrorFunc(VIR_ERR_INVALID_ARG, __FUNCTION__,
1315 1316
                        "Unknown scheduler", op_sys.u.getschedulerid.sched_id);
                return -1;
1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333
        }
    }

    return 0;
}

/**
 * xenHypervisorSetSchedulerParameters:
 * @domain: pointer to the Xen Hypervisor block
 * @nparams:give a number of scheduler setting parameters .
 *
 * Do a low level hypercall to set scheduler parameters
 *
 * Returns 0 or -1 in case of failure
 */
int
xenHypervisorSetSchedulerParameters(virDomainPtr domain,
1334
                                    virTypedParameterPtr params, int nparams)
1335 1336
{
    int i;
1337
    unsigned int val;
1338
    xenUnifiedPrivatePtr priv;
1339
    char buf[256];
1340

1341
    if (domain->conn == NULL) {
1342 1343
        virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
                        "domain or conn is NULL", 0);
1344 1345 1346
        return -1;
    }

1347 1348 1349
    if (nparams == 0) {
        /* nothing to do, exit early */
        return 0;
1350 1351 1352
    }

    priv = (xenUnifiedPrivatePtr) domain->conn->privateData;
1353
    if (priv->handle < 0) {
1354
        virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
1355 1356 1357 1358
                        "priv->handle invalid", 0);
        return -1;
    }
    if (domain->id < 0) {
1359
        virXenError(VIR_ERR_OPERATION_INVALID,
1360
                    "%s", _("domain is not running"));
1361 1362 1363 1364
        return -1;
    }

    /*
P
Philipp Hahn 已提交
1365
     * Support only hv_versions.dom_interface >=5
1366 1367 1368
     * (Xen3.1.0 or later)
     * TODO: check on Xen 3.0.3
     */
P
Philipp Hahn 已提交
1369
    if (hv_versions.dom_interface < 5) {
1370
        virXenErrorFunc(VIR_ERR_NO_XEN, __FUNCTION__,
1371
                        "unsupported in dom interface < 5", 0);
1372 1373 1374
        return -1;
    }

P
Philipp Hahn 已提交
1375
    if (hv_versions.hypervisor > 1) {
1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388
        xen_op_v2_sys op_sys;
        xen_op_v2_dom op_dom;
        int ret;

        memset(&op_sys, 0, sizeof(op_sys));
        op_sys.cmd = XEN_V2_OP_GETSCHEDULERID;
        ret = xenHypervisorDoV2Sys(priv->handle, &op_sys);
        if (ret == -1) return -1;

        switch (op_sys.u.getschedulerid.sched_id){
        case XEN_SCHEDULER_SEDF:
            /* TODO: Implement for Xen/SEDF */
            TODO
1389
            return(-1);
1390 1391 1392 1393 1394 1395 1396 1397
        case XEN_SCHEDULER_CREDIT: {
            memset(&op_dom, 0, sizeof(op_dom));
            op_dom.cmd = XEN_V2_OP_SCHEDULER;
            op_dom.domain = (domid_t) domain->id;
            op_dom.u.getschedinfo.sched_id = XEN_SCHEDULER_CREDIT;
            op_dom.u.getschedinfo.cmd = XEN_DOMCTL_SCHEDOP_putinfo;

            /*
1398 1399
             * credit scheduler parameters
             * following values do not change the parameters
1400 1401 1402 1403 1404
             */
            op_dom.u.getschedinfo.u.credit.weight = 0;
            op_dom.u.getschedinfo.u.credit.cap    = (uint16_t)~0U;

            for (i = 0; i < nparams; i++) {
1405
                memset(&buf, 0, sizeof(buf));
1406
                if (STREQ (params[i].field, VIR_DOMAIN_SCHEDULER_WEIGHT) &&
1407
                    params[i].type == VIR_TYPED_PARAM_UINT) {
1408 1409
                    val = params[i].value.ui;
                    if ((val < 1) || (val > USHRT_MAX)) {
1410
                        snprintf(buf, sizeof(buf), _("Credit scheduler weight parameter (%d) is out of range (1-65535)"), val);
1411
                        virXenErrorFunc(VIR_ERR_INVALID_ARG, __FUNCTION__, buf, val);
1412 1413
                        return(-1);
                    }
1414
                    op_dom.u.getschedinfo.u.credit.weight = val;
1415
                } else if (STREQ (params[i].field, VIR_DOMAIN_SCHEDULER_CAP) &&
1416
                    params[i].type == VIR_TYPED_PARAM_UINT) {
1417
                    val = params[i].value.ui;
1418 1419
                    if (val >= USHRT_MAX) {
                        snprintf(buf, sizeof(buf), _("Credit scheduler cap parameter (%d) is out of range (0-65534)"), val);
1420
                        virXenErrorFunc(VIR_ERR_INVALID_ARG, __FUNCTION__, buf, val);
1421 1422
                        return(-1);
                    }
1423
                    op_dom.u.getschedinfo.u.credit.cap = val;
1424
                } else {
1425 1426 1427
                    virXenErrorFunc(VIR_ERR_INVALID_ARG, __FUNCTION__,
                                    "Credit scheduler accepts 'cap' and 'weight' integer parameters",
                                    0);
1428 1429
                    return(-1);
                }
1430 1431 1432 1433
            }

            ret = xenHypervisorDoV2Dom(priv->handle, &op_dom);
            if (ret < 0)
1434
                return -1;
1435
            break;
1436
        }
1437
        default:
1438
            virXenErrorFunc(VIR_ERR_INVALID_ARG, __FUNCTION__,
1439 1440 1441 1442
                        "Unknown scheduler", op_sys.u.getschedulerid.sched_id);
            return -1;
        }
    }
1443

1444 1445 1446
    return 0;
}

1447 1448 1449 1450 1451 1452

int
xenHypervisorDomainBlockStats (virDomainPtr dom,
                               const char *path,
                               struct _virDomainBlockStats *stats)
{
1453
#ifdef __linux__
1454
    xenUnifiedPrivatePtr priv;
D
Daniel P. Berrange 已提交
1455
    int ret;
1456

1457
    priv = (xenUnifiedPrivatePtr) dom->conn->privateData;
D
Daniel P. Berrange 已提交
1458 1459 1460 1461 1462
    xenUnifiedLock(priv);
    /* Need to lock because it hits the xenstore handle :-( */
    ret = xenLinuxDomainBlockStats (priv, dom, path, stats);
    xenUnifiedUnlock(priv);
    return ret;
1463
#else
1464
    virXenErrorFunc(VIR_ERR_OPERATION_INVALID, __FUNCTION__,
1465 1466
                    "block statistics not supported on this platform",
                    dom->id);
1467
    return -1;
1468
#endif
1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482
}

/* Paths have the form vif<domid>.<n> (this interface checks that
 * <domid> is the real domain ID and returns an error if not).
 *
 * In future we may allow you to query bridge stats (virbrX or
 * xenbrX), but that will probably be through a separate
 * virNetwork interface, as yet not decided.
 */
int
xenHypervisorDomainInterfaceStats (virDomainPtr dom,
                                   const char *path,
                                   struct _virDomainInterfaceStats *stats)
{
1483
#ifdef __linux__
1484 1485
    int rqdomid, device;

1486 1487 1488
    /* Verify that the vif requested is one belonging to the current
     * domain.
     */
1489
    if (sscanf (path, "vif%d.%d", &rqdomid, &device) != 2) {
1490 1491
        virXenErrorFunc(VIR_ERR_INVALID_ARG, __FUNCTION__,
                        "invalid path, should be vif<domid>.<n>.", 0);
1492 1493 1494
        return -1;
    }
    if (rqdomid != dom->id) {
1495 1496
        virXenErrorFunc(VIR_ERR_INVALID_ARG, __FUNCTION__,
                        "invalid path, vif<domid> should match this domain ID", 0);
1497 1498 1499
        return -1;
    }

1500
    return linuxDomainInterfaceStats(path, stats);
1501
#else
1502
    virXenErrorFunc(VIR_ERR_OPERATION_INVALID, __FUNCTION__,
1503
                    "/proc/net/dev: Interface not found", 0);
1504
    return -1;
1505
#endif
1506 1507
}

1508 1509 1510 1511 1512 1513 1514 1515 1516 1517
/**
 * virXen_pausedomain:
 * @handle: the hypervisor handle
 * @id: the domain id
 *
 * Do a low level hypercall to pause the domain
 *
 * Returns 0 or -1 in case of failure
 */
static int
1518
virXen_pausedomain(int handle, int id)
1519 1520 1521
{
    int ret = -1;

P
Philipp Hahn 已提交
1522
    if (hv_versions.hypervisor > 1) {
1523 1524 1525
        xen_op_v2_dom op;

        memset(&op, 0, sizeof(op));
1526 1527 1528
        op.cmd = XEN_V2_OP_PAUSEDOMAIN;
        op.domain = (domid_t) id;
        ret = xenHypervisorDoV2Dom(handle, &op);
P
Philipp Hahn 已提交
1529
    } else if (hv_versions.hypervisor == 1) {
1530 1531 1532
        xen_op_v1 op;

        memset(&op, 0, sizeof(op));
1533 1534 1535
        op.cmd = XEN_V1_OP_PAUSEDOMAIN;
        op.u.domain.domain = (domid_t) id;
        ret = xenHypervisorDoV1Op(handle, &op);
P
Philipp Hahn 已提交
1536
    } else if (hv_versions.hypervisor == 0) {
1537 1538 1539
        xen_op_v0 op;

        memset(&op, 0, sizeof(op));
1540 1541 1542
        op.cmd = XEN_V0_OP_PAUSEDOMAIN;
        op.u.domain.domain = (domid_t) id;
        ret = xenHypervisorDoV0Op(handle, &op);
1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556
    }
    return(ret);
}

/**
 * virXen_unpausedomain:
 * @handle: the hypervisor handle
 * @id: the domain id
 *
 * Do a low level hypercall to unpause the domain
 *
 * Returns 0 or -1 in case of failure
 */
static int
1557
virXen_unpausedomain(int handle, int id)
1558 1559 1560
{
    int ret = -1;

P
Philipp Hahn 已提交
1561
    if (hv_versions.hypervisor > 1) {
1562 1563 1564
        xen_op_v2_dom op;

        memset(&op, 0, sizeof(op));
1565 1566 1567
        op.cmd = XEN_V2_OP_UNPAUSEDOMAIN;
        op.domain = (domid_t) id;
        ret = xenHypervisorDoV2Dom(handle, &op);
P
Philipp Hahn 已提交
1568
    } else if (hv_versions.hypervisor == 1) {
1569 1570 1571
        xen_op_v1 op;

        memset(&op, 0, sizeof(op));
1572 1573 1574
        op.cmd = XEN_V1_OP_UNPAUSEDOMAIN;
        op.u.domain.domain = (domid_t) id;
        ret = xenHypervisorDoV1Op(handle, &op);
P
Philipp Hahn 已提交
1575
    } else if (hv_versions.hypervisor == 0) {
1576 1577 1578
        xen_op_v0 op;

        memset(&op, 0, sizeof(op));
1579 1580 1581
        op.cmd = XEN_V0_OP_UNPAUSEDOMAIN;
        op.u.domain.domain = (domid_t) id;
        ret = xenHypervisorDoV0Op(handle, &op);
1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595
    }
    return(ret);
}

/**
 * virXen_destroydomain:
 * @handle: the hypervisor handle
 * @id: the domain id
 *
 * Do a low level hypercall to destroy the domain
 *
 * Returns 0 or -1 in case of failure
 */
static int
1596
virXen_destroydomain(int handle, int id)
1597 1598 1599
{
    int ret = -1;

P
Philipp Hahn 已提交
1600
    if (hv_versions.hypervisor > 1) {
1601 1602 1603
        xen_op_v2_dom op;

        memset(&op, 0, sizeof(op));
1604 1605 1606
        op.cmd = XEN_V2_OP_DESTROYDOMAIN;
        op.domain = (domid_t) id;
        ret = xenHypervisorDoV2Dom(handle, &op);
P
Philipp Hahn 已提交
1607
    } else if (hv_versions.hypervisor == 1) {
1608 1609 1610
        xen_op_v1 op;

        memset(&op, 0, sizeof(op));
1611 1612 1613
        op.cmd = XEN_V1_OP_DESTROYDOMAIN;
        op.u.domain.domain = (domid_t) id;
        ret = xenHypervisorDoV1Op(handle, &op);
P
Philipp Hahn 已提交
1614
    } else if (hv_versions.hypervisor == 0) {
1615 1616 1617
        xen_op_v0 op;

        memset(&op, 0, sizeof(op));
1618 1619 1620
        op.cmd = XEN_V0_OP_DESTROYDOMAIN;
        op.u.domain.domain = (domid_t) id;
        ret = xenHypervisorDoV0Op(handle, &op);
1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635
    }
    return(ret);
}

/**
 * virXen_setmaxmem:
 * @handle: the hypervisor handle
 * @id: the domain id
 * @memory: the amount of memory in kilobytes
 *
 * Do a low level hypercall to change the max memory amount
 *
 * Returns 0 or -1 in case of failure
 */
static int
1636
virXen_setmaxmem(int handle, int id, unsigned long memory)
1637 1638 1639
{
    int ret = -1;

P
Philipp Hahn 已提交
1640
    if (hv_versions.hypervisor > 1) {
1641 1642 1643
        xen_op_v2_dom op;

        memset(&op, 0, sizeof(op));
1644 1645
        op.cmd = XEN_V2_OP_SETMAXMEM;
        op.domain = (domid_t) id;
P
Philipp Hahn 已提交
1646
        if (hv_versions.dom_interface < 5)
1647 1648 1649
            op.u.setmaxmem.maxmem = memory;
        else
            op.u.setmaxmemd5.maxmem = memory;
1650
        ret = xenHypervisorDoV2Dom(handle, &op);
P
Philipp Hahn 已提交
1651
    } else if (hv_versions.hypervisor == 1) {
1652 1653 1654
        xen_op_v1 op;

        memset(&op, 0, sizeof(op));
1655 1656 1657 1658
        op.cmd = XEN_V1_OP_SETMAXMEM;
        op.u.setmaxmem.domain = (domid_t) id;
        op.u.setmaxmem.maxmem = memory;
        ret = xenHypervisorDoV1Op(handle, &op);
P
Philipp Hahn 已提交
1659
    } else if (hv_versions.hypervisor == 0) {
1660
        xen_op_v0 op;
1661 1662

        memset(&op, 0, sizeof(op));
1663 1664 1665 1666
        op.cmd = XEN_V0_OP_SETMAXMEM;
        op.u.setmaxmem.domain = (domid_t) id;
        op.u.setmaxmem.maxmem = memory;
        ret = xenHypervisorDoV0Op(handle, &op);
1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681
    }
    return(ret);
}

/**
 * virXen_setmaxvcpus:
 * @handle: the hypervisor handle
 * @id: the domain id
 * @vcpus: the numbers of vcpus
 *
 * Do a low level hypercall to change the max vcpus amount
 *
 * Returns 0 or -1 in case of failure
 */
static int
1682
virXen_setmaxvcpus(int handle, int id, unsigned int vcpus)
1683 1684 1685
{
    int ret = -1;

P
Philipp Hahn 已提交
1686
    if (hv_versions.hypervisor > 1) {
1687 1688 1689
        xen_op_v2_dom op;

        memset(&op, 0, sizeof(op));
1690 1691 1692 1693
        op.cmd = XEN_V2_OP_SETMAXVCPU;
        op.domain = (domid_t) id;
        op.u.setmaxvcpu.maxvcpu = vcpus;
        ret = xenHypervisorDoV2Dom(handle, &op);
P
Philipp Hahn 已提交
1694
    } else if (hv_versions.hypervisor == 1) {
1695 1696 1697
        xen_op_v1 op;

        memset(&op, 0, sizeof(op));
1698 1699 1700 1701
        op.cmd = XEN_V1_OP_SETMAXVCPU;
        op.u.setmaxvcpu.domain = (domid_t) id;
        op.u.setmaxvcpu.maxvcpu = vcpus;
        ret = xenHypervisorDoV1Op(handle, &op);
P
Philipp Hahn 已提交
1702
    } else if (hv_versions.hypervisor == 0) {
1703
        xen_op_v0 op;
1704 1705

        memset(&op, 0, sizeof(op));
1706 1707 1708 1709
        op.cmd = XEN_V0_OP_SETMAXVCPU;
        op.u.setmaxvcpu.domain = (domid_t) id;
        op.u.setmaxvcpu.maxvcpu = vcpus;
        ret = xenHypervisorDoV0Op(handle, &op);
1710 1711 1712 1713 1714 1715 1716 1717 1718 1719
    }
    return(ret);
}

/**
 * virXen_setvcpumap:
 * @handle: the hypervisor handle
 * @id: the domain id
 * @vcpu: the vcpu to map
 * @cpumap: the bitmap for this vcpu
1720
 * @maplen: the size of the bitmap in bytes
1721 1722 1723 1724 1725 1726 1727 1728 1729 1730
 *
 * Do a low level hypercall to change the pinning for vcpu
 *
 * Returns 0 or -1 in case of failure
 */
static int
virXen_setvcpumap(int handle, int id, unsigned int vcpu,
                  unsigned char * cpumap, int maplen)
{
    int ret = -1;
1731 1732 1733
    unsigned char *new = NULL;
    unsigned char *bitmap = NULL;
    uint32_t nr_cpus;
1734

P
Philipp Hahn 已提交
1735
    if (hv_versions.hypervisor > 1) {
1736 1737
        xen_op_v2_dom op;

1738
        if (lock_pages(cpumap, maplen) < 0) {
1739
            virXenError(VIR_ERR_XEN_CALL, " locking");
1740 1741
            return (-1);
        }
1742
        memset(&op, 0, sizeof(op));
1743 1744
        op.cmd = XEN_V2_OP_SETVCPUMAP;
        op.domain = (domid_t) id;
1745 1746 1747 1748

        /* The allocated memory to cpumap must be 'sizeof(uint64_t)' byte *
         * for Xen, and also nr_cpus must be 'sizeof(uint64_t) * 8'       */
        if (maplen < 8) {
1749
            if (VIR_ALLOC_N(new, sizeof(uint64_t)) < 0) {
1750
                virReportOOMError();
1751 1752 1753 1754 1755 1756 1757 1758 1759 1760
                return (-1);
            }
            memcpy(new, cpumap, maplen);
            bitmap = new;
            nr_cpus = sizeof(uint64_t) * 8;
        } else {
            bitmap = cpumap;
            nr_cpus = maplen * 8;
        }

P
Philipp Hahn 已提交
1761
        if (hv_versions.dom_interface < 5) {
1762
            op.u.setvcpumap.vcpu = vcpu;
1763 1764
            op.u.setvcpumap.cpumap.bitmap = bitmap;
            op.u.setvcpumap.cpumap.nr_cpus = nr_cpus;
1765 1766
        } else {
            op.u.setvcpumapd5.vcpu = vcpu;
1767 1768
            op.u.setvcpumapd5.cpumap.bitmap.v = bitmap;
            op.u.setvcpumapd5.cpumap.nr_cpus = nr_cpus;
1769
        }
1770
        ret = xenHypervisorDoV2Dom(handle, &op);
1771
        VIR_FREE(new);
1772

1773
        if (unlock_pages(cpumap, maplen) < 0) {
1774
            virXenError(VIR_ERR_XEN_CALL, " release");
1775 1776
            ret = -1;
        }
1777
    } else {
1778 1779 1780
        cpumap_t xen_cpumap; /* limited to 64 CPUs in old hypervisors */
        uint64_t *pm = &xen_cpumap;
        int j;
1781

1782 1783
        if ((maplen > (int)sizeof(cpumap_t)) || (sizeof(cpumap_t) & 7))
            return (-1);
1784

1785 1786 1787
        memset(pm, 0, sizeof(cpumap_t));
        for (j = 0; j < maplen; j++)
            *(pm + (j / 8)) |= cpumap[j] << (8 * (j & 7));
1788

P
Philipp Hahn 已提交
1789
        if (hv_versions.hypervisor == 1) {
1790 1791 1792 1793 1794 1795 1796 1797
            xen_op_v1 op;

            memset(&op, 0, sizeof(op));
            op.cmd = XEN_V1_OP_SETVCPUMAP;
            op.u.setvcpumap.domain = (domid_t) id;
            op.u.setvcpumap.vcpu = vcpu;
            op.u.setvcpumap.cpumap = xen_cpumap;
            ret = xenHypervisorDoV1Op(handle, &op);
P
Philipp Hahn 已提交
1798
        } else if (hv_versions.hypervisor == 0) {
1799 1800 1801 1802 1803 1804 1805 1806 1807
            xen_op_v0 op;

            memset(&op, 0, sizeof(op));
            op.cmd = XEN_V0_OP_SETVCPUMAP;
            op.u.setvcpumap.domain = (domid_t) id;
            op.u.setvcpumap.vcpu = vcpu;
            op.u.setvcpumap.cpumap = xen_cpumap;
            ret = xenHypervisorDoV0Op(handle, &op);
        }
1808 1809 1810
    }
    return(ret);
}
1811

1812

1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826
/**
 * virXen_getvcpusinfo:
 * @handle: the hypervisor handle
 * @id: the domain id
 * @vcpu: the vcpu to map
 * @cpumap: the bitmap for this vcpu
 * @maplen: the size of the bitmap in bytes
 *
 * Do a low level hypercall to change the pinning for vcpu
 *
 * Returns 0 or -1 in case of failure
 */
static int
virXen_getvcpusinfo(int handle, int id, unsigned int vcpu, virVcpuInfoPtr ipt,
1827
                    unsigned char *cpumap, int maplen)
1828 1829 1830
{
    int ret = -1;

P
Philipp Hahn 已提交
1831
    if (hv_versions.hypervisor > 1) {
1832 1833 1834
        xen_op_v2_dom op;

        memset(&op, 0, sizeof(op));
1835 1836
        op.cmd = XEN_V2_OP_GETVCPUINFO;
        op.domain = (domid_t) id;
P
Philipp Hahn 已提交
1837
        if (hv_versions.dom_interface < 5)
1838 1839 1840
            op.u.getvcpuinfo.vcpu = (uint16_t) vcpu;
        else
            op.u.getvcpuinfod5.vcpu = (uint16_t) vcpu;
1841
        ret = xenHypervisorDoV2Dom(handle, &op);
1842

1843 1844
        if (ret < 0)
            return(-1);
1845
        ipt->number = vcpu;
P
Philipp Hahn 已提交
1846
        if (hv_versions.dom_interface < 5) {
1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867
            if (op.u.getvcpuinfo.online) {
                if (op.u.getvcpuinfo.running)
                    ipt->state = VIR_VCPU_RUNNING;
                if (op.u.getvcpuinfo.blocked)
                    ipt->state = VIR_VCPU_BLOCKED;
            } else
                ipt->state = VIR_VCPU_OFFLINE;

            ipt->cpuTime = op.u.getvcpuinfo.cpu_time;
            ipt->cpu = op.u.getvcpuinfo.online ? (int)op.u.getvcpuinfo.cpu : -1;
        } else {
            if (op.u.getvcpuinfod5.online) {
                if (op.u.getvcpuinfod5.running)
                    ipt->state = VIR_VCPU_RUNNING;
                if (op.u.getvcpuinfod5.blocked)
                    ipt->state = VIR_VCPU_BLOCKED;
            } else
                ipt->state = VIR_VCPU_OFFLINE;

            ipt->cpuTime = op.u.getvcpuinfod5.cpu_time;
            ipt->cpu = op.u.getvcpuinfod5.online ? (int)op.u.getvcpuinfod5.cpu : -1;
1868 1869
        }
        if ((cpumap != NULL) && (maplen > 0)) {
1870
            if (lock_pages(cpumap, maplen) < 0) {
1871
                virXenError(VIR_ERR_XEN_CALL, " locking");
1872 1873
                return (-1);
            }
1874
            memset(cpumap, 0, maplen);
1875 1876 1877
            memset(&op, 0, sizeof(op));
            op.cmd = XEN_V2_OP_GETVCPUMAP;
            op.domain = (domid_t) id;
P
Philipp Hahn 已提交
1878
            if (hv_versions.dom_interface < 5) {
1879 1880 1881 1882 1883 1884 1885 1886
                op.u.getvcpumap.vcpu = vcpu;
                op.u.getvcpumap.cpumap.bitmap = cpumap;
                op.u.getvcpumap.cpumap.nr_cpus = maplen * 8;
            } else {
                op.u.getvcpumapd5.vcpu = vcpu;
                op.u.getvcpumapd5.cpumap.bitmap.v = cpumap;
                op.u.getvcpumapd5.cpumap.nr_cpus = maplen * 8;
            }
1887
            ret = xenHypervisorDoV2Dom(handle, &op);
1888
            if (unlock_pages(cpumap, maplen) < 0) {
1889
                virXenError(VIR_ERR_XEN_CALL, " release");
1890 1891 1892
                ret = -1;
            }
        }
1893
    } else {
1894 1895 1896 1897 1898
        int mapl = maplen;
        int cpu;

        if (maplen > (int)sizeof(cpumap_t))
            mapl = (int)sizeof(cpumap_t);
1899

P
Philipp Hahn 已提交
1900
        if (hv_versions.hypervisor == 1) {
1901 1902 1903 1904 1905 1906 1907 1908 1909
            xen_op_v1 op;

            memset(&op, 0, sizeof(op));
            op.cmd = XEN_V1_OP_GETVCPUINFO;
            op.u.getvcpuinfo.domain = (domid_t) id;
            op.u.getvcpuinfo.vcpu = vcpu;
            ret = xenHypervisorDoV1Op(handle, &op);
            if (ret < 0)
                return(-1);
1910
            ipt->number = vcpu;
1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923
            if (op.u.getvcpuinfo.online) {
                if (op.u.getvcpuinfo.running) ipt->state = VIR_VCPU_RUNNING;
                if (op.u.getvcpuinfo.blocked) ipt->state = VIR_VCPU_BLOCKED;
            }
            else ipt->state = VIR_VCPU_OFFLINE;
            ipt->cpuTime = op.u.getvcpuinfo.cpu_time;
            ipt->cpu = op.u.getvcpuinfo.online ? (int)op.u.getvcpuinfo.cpu : -1;
            if ((cpumap != NULL) && (maplen > 0)) {
                for (cpu = 0; cpu < (mapl * 8); cpu++) {
                    if (op.u.getvcpuinfo.cpumap & ((uint64_t)1<<cpu))
                        VIR_USE_CPU(cpumap, cpu);
                }
            }
P
Philipp Hahn 已提交
1924
        } else if (hv_versions.hypervisor == 0) {
1925 1926 1927 1928 1929 1930 1931 1932 1933
            xen_op_v1 op;

            memset(&op, 0, sizeof(op));
            op.cmd = XEN_V0_OP_GETVCPUINFO;
            op.u.getvcpuinfo.domain = (domid_t) id;
            op.u.getvcpuinfo.vcpu = vcpu;
            ret = xenHypervisorDoV0Op(handle, &op);
            if (ret < 0)
                return(-1);
1934
            ipt->number = vcpu;
1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948
            if (op.u.getvcpuinfo.online) {
                if (op.u.getvcpuinfo.running) ipt->state = VIR_VCPU_RUNNING;
                if (op.u.getvcpuinfo.blocked) ipt->state = VIR_VCPU_BLOCKED;
            }
            else ipt->state = VIR_VCPU_OFFLINE;
            ipt->cpuTime = op.u.getvcpuinfo.cpu_time;
            ipt->cpu = op.u.getvcpuinfo.online ? (int)op.u.getvcpuinfo.cpu : -1;
            if ((cpumap != NULL) && (maplen > 0)) {
                for (cpu = 0; cpu < (mapl * 8); cpu++) {
                    if (op.u.getvcpuinfo.cpumap & ((uint64_t)1<<cpu))
                        VIR_USE_CPU(cpumap, cpu);
                }
            }
        }
1949 1950 1951
    }
    return(ret);
}
1952

1953 1954
/**
 * xenHypervisorInit:
P
Philipp Hahn 已提交
1955 1956
 * @override_versions: pointer to optional struct xenHypervisorVersions with
 *     version information used instead of automatic version detection.
1957 1958 1959
 *
 * Initialize the hypervisor layer. Try to detect the kind of interface
 * used i.e. pre or post changeset 10277
P
Philipp Hahn 已提交
1960 1961
 *
 * Returns 0 or -1 in case of failure
1962
 */
1963
int
P
Philipp Hahn 已提交
1964
xenHypervisorInit(struct xenHypervisorVersions *override_versions)
1965
{
1966
    int fd, ret, cmd, errcode;
1967
    hypercall_t hc;
1968
    v0_hypercall_t v0_hc;
1969
    xen_getdomaininfo info;
D
Daniel Veillard 已提交
1970
    virVcpuInfoPtr ipt = NULL;
1971 1972

    if (initialized) {
P
Philipp Hahn 已提交
1973
        if (hv_versions.hypervisor == -1)
1974
            return (-1);
1975
        return(0);
1976 1977
    }
    initialized = 1;
1978
    in_init = 1;
1979

1980 1981 1982 1983 1984 1985 1986 1987 1988
    /* Compile regular expressions used by xenHypervisorGetCapabilities.
     * Note that errors here are really internal errors since these
     * regexps should never fail to compile.
     */
    errcode = regcomp (&flags_hvm_rec, flags_hvm_re, REG_EXTENDED);
    if (errcode != 0) {
        char error[100];
        regerror (errcode, &flags_hvm_rec, error, sizeof error);
        regfree (&flags_hvm_rec);
1989
        virXenError(VIR_ERR_INTERNAL_ERROR, "%s", error);
1990 1991 1992 1993 1994 1995 1996 1997 1998
        in_init = 0;
        return -1;
    }
    errcode = regcomp (&flags_pae_rec, flags_pae_re, REG_EXTENDED);
    if (errcode != 0) {
        char error[100];
        regerror (errcode, &flags_pae_rec, error, sizeof error);
        regfree (&flags_pae_rec);
        regfree (&flags_hvm_rec);
1999
        virXenError(VIR_ERR_INTERNAL_ERROR, "%s", error);
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009
        in_init = 0;
        return -1;
    }
    errcode = regcomp (&xen_cap_rec, xen_cap_re, REG_EXTENDED);
    if (errcode != 0) {
        char error[100];
        regerror (errcode, &xen_cap_rec, error, sizeof error);
        regfree (&xen_cap_rec);
        regfree (&flags_pae_rec);
        regfree (&flags_hvm_rec);
2010
        virXenError(VIR_ERR_INTERNAL_ERROR, "%s", error);
2011 2012 2013 2014
        in_init = 0;
        return -1;
    }

P
Philipp Hahn 已提交
2015 2016 2017 2018 2019 2020
    if (override_versions) {
      hv_versions = *override_versions;
      in_init = 0;
      return 0;
    }

2021
    /* Xen hypervisor version detection begins. */
2022 2023
    ret = open(XEN_HYPERVISOR_SOCKET, O_RDWR);
    if (ret < 0) {
P
Philipp Hahn 已提交
2024
        hv_versions.hypervisor = -1;
2025
        return(-1);
2026 2027 2028
    }
    fd = ret;

2029 2030 2031 2032
    /*
     * The size of the hypervisor call block changed July 2006
     * this detect if we are using the new or old hypercall_t structure
     */
2033 2034 2035 2036 2037 2038 2039 2040
    hc.op = __HYPERVISOR_xen_version;
    hc.arg[0] = (unsigned long) XENVER_version;
    hc.arg[1] = 0;

    cmd = IOCTL_PRIVCMD_HYPERCALL;
    ret = ioctl(fd, cmd, (unsigned long) &hc);

    if ((ret != -1) && (ret != 0)) {
2041
        VIR_DEBUG("Using new hypervisor call: %X", ret);
P
Philipp Hahn 已提交
2042
        hv_versions.hv = ret;
2043 2044
        xen_ioctl_hypercall_cmd = cmd;
        goto detect_v2;
2045
    }
2046

2047
#ifndef __sun
2048 2049 2050 2051 2052 2053 2054 2055
    /*
     * check if the old hypercall are actually working
     */
    v0_hc.op = __HYPERVISOR_xen_version;
    v0_hc.arg[0] = (unsigned long) XENVER_version;
    v0_hc.arg[1] = 0;
    cmd = _IOC(_IOC_NONE, 'P', 0, sizeof(v0_hypercall_t));
    ret = ioctl(fd, cmd, (unsigned long) &v0_hc);
2056
    if ((ret != -1) && (ret != 0)) {
2057
        VIR_DEBUG("Using old hypervisor call: %X", ret);
P
Philipp Hahn 已提交
2058
        hv_versions.hv = ret;
2059
        xen_ioctl_hypercall_cmd = cmd;
P
Philipp Hahn 已提交
2060
        hv_versions.hypervisor = 0;
2061
        goto done;
2062
    }
2063
#endif
2064

2065
    /*
R
Richard W.M. Jones 已提交
2066
     * we failed to make any hypercall
2067 2068
     */

P
Philipp Hahn 已提交
2069
    hv_versions.hypervisor = -1;
2070
    virXenError(VIR_ERR_XEN_CALL, " ioctl %lu",
2071
                (unsigned long) IOCTL_PRIVCMD_HYPERCALL);
2072
    VIR_FORCE_CLOSE(fd);
2073 2074 2075
    in_init = 0;
    return(-1);

2076
 detect_v2:
2077 2078 2079 2080 2081
    /*
     * The hypercalls were refactored into 3 different section in August 2006
     * Try to detect if we are running a version post 3.0.2 with the new ones
     * or the old ones
     */
P
Philipp Hahn 已提交
2082
    hv_versions.hypervisor = 2;
2083

2084
    if (VIR_ALLOC(ipt) < 0) {
2085
        virReportOOMError();
2086 2087
        return(-1);
    }
2088
    /* Currently consider RHEL5.0 Fedora7, xen-3.1, and xen-unstable */
P
Philipp Hahn 已提交
2089
    hv_versions.sys_interface = 2; /* XEN_SYSCTL_INTERFACE_VERSION */
2090
    if (virXen_getdomaininfo(fd, 0, &info) == 1) {
2091
        /* RHEL 5.0 */
P
Philipp Hahn 已提交
2092
        hv_versions.dom_interface = 3; /* XEN_DOMCTL_INTERFACE_VERSION */
2093
        if (virXen_getvcpusinfo(fd, 0, 0, ipt, NULL, 0) == 0){
2094
            VIR_DEBUG("Using hypervisor call v2, sys ver2 dom ver3");
2095 2096 2097
            goto done;
        }
        /* Fedora 7 */
P
Philipp Hahn 已提交
2098
        hv_versions.dom_interface = 4; /* XEN_DOMCTL_INTERFACE_VERSION */
2099
        if (virXen_getvcpusinfo(fd, 0, 0, ipt, NULL, 0) == 0){
2100
            VIR_DEBUG("Using hypervisor call v2, sys ver2 dom ver4");
2101 2102 2103 2104
            goto done;
        }
    }

P
Philipp Hahn 已提交
2105
    hv_versions.sys_interface = 3; /* XEN_SYSCTL_INTERFACE_VERSION */
2106
    if (virXen_getdomaininfo(fd, 0, &info) == 1) {
2107
        /* xen-3.1 */
P
Philipp Hahn 已提交
2108
        hv_versions.dom_interface = 5; /* XEN_DOMCTL_INTERFACE_VERSION */
2109
        if (virXen_getvcpusinfo(fd, 0, 0, ipt, NULL, 0) == 0){
2110
            VIR_DEBUG("Using hypervisor call v2, sys ver3 dom ver5");
2111 2112
            goto done;
        }
2113
    }
2114

P
Philipp Hahn 已提交
2115
    hv_versions.sys_interface = 4; /* XEN_SYSCTL_INTERFACE_VERSION */
2116
    if (virXen_getdomaininfo(fd, 0, &info) == 1) {
2117
        /* Fedora 8 */
P
Philipp Hahn 已提交
2118
        hv_versions.dom_interface = 5; /* XEN_DOMCTL_INTERFACE_VERSION */
2119
        if (virXen_getvcpusinfo(fd, 0, 0, ipt, NULL, 0) == 0){
2120
            VIR_DEBUG("Using hypervisor call v2, sys ver4 dom ver5");
2121 2122 2123 2124
            goto done;
        }
    }

P
Philipp Hahn 已提交
2125
    hv_versions.sys_interface = 6; /* XEN_SYSCTL_INTERFACE_VERSION */
2126 2127
    if (virXen_getdomaininfo(fd, 0, &info) == 1) {
        /* Xen 3.2, Fedora 9 */
P
Philipp Hahn 已提交
2128
        hv_versions.dom_interface = 5; /* XEN_DOMCTL_INTERFACE_VERSION */
2129
        if (virXen_getvcpusinfo(fd, 0, 0, ipt, NULL, 0) == 0){
2130
            VIR_DEBUG("Using hypervisor call v2, sys ver6 dom ver5");
2131 2132
            goto done;
        }
J
Jim Fehlig 已提交
2133 2134 2135
    }

    /* Xen 4.0 */
P
Philipp Hahn 已提交
2136
    hv_versions.sys_interface = 7; /* XEN_SYSCTL_INTERFACE_VERSION */
J
Jim Fehlig 已提交
2137
    if (virXen_getdomaininfo(fd, 0, &info) == 1) {
P
Philipp Hahn 已提交
2138
        hv_versions.dom_interface = 6; /* XEN_DOMCTL_INTERFACE_VERSION */
2139
        VIR_DEBUG("Using hypervisor call v2, sys ver7 dom ver6");
J
Jim Fehlig 已提交
2140
        goto done;
2141 2142
    }

J
Jim Fehlig 已提交
2143 2144 2145 2146
    /* Xen 4.1
     * sysctl version 8 -> xen-unstable c/s 21118:28e5409e3fb3
     * domctl version 7 -> xen-unstable c/s 21212:de94884a669c
     */
P
Philipp Hahn 已提交
2147
    hv_versions.sys_interface = 8; /* XEN_SYSCTL_INTERFACE_VERSION */
J
Jim Fehlig 已提交
2148
    if (virXen_getdomaininfo(fd, 0, &info) == 1) {
P
Philipp Hahn 已提交
2149
        hv_versions.dom_interface = 7; /* XEN_DOMCTL_INTERFACE_VERSION */
2150
        VIR_DEBUG("Using hypervisor call v2, sys ver8 dom ver7\n");
J
Jim Fehlig 已提交
2151 2152 2153
        goto done;
    }

P
Philipp Hahn 已提交
2154 2155
    hv_versions.hypervisor = 1;
    hv_versions.sys_interface = -1;
2156
    if (virXen_getdomaininfo(fd, 0, &info) == 1) {
2157
        VIR_DEBUG("Using hypervisor call v1");
2158
        goto done;
2159 2160 2161
    }

    /*
R
Richard W.M. Jones 已提交
2162
     * we failed to make the getdomaininfolist hypercall
2163 2164
     */

2165
    VIR_DEBUG("Failed to find any Xen hypervisor method");
P
Philipp Hahn 已提交
2166
    hv_versions.hypervisor = -1;
2167
    virXenError(VIR_ERR_XEN_CALL, " ioctl %lu",
2168
                (unsigned long)IOCTL_PRIVCMD_HYPERCALL);
2169
    VIR_FORCE_CLOSE(fd);
2170
    in_init = 0;
2171
    VIR_FREE(ipt);
2172 2173
    return(-1);

2174
 done:
2175
    VIR_FORCE_CLOSE(fd);
2176
    in_init = 0;
2177
    VIR_FREE(ipt);
2178 2179 2180
    return(0);
}

2181 2182
/**
 * xenHypervisorOpen:
2183 2184 2185
 * @conn: pointer to the connection block
 * @name: URL for the target, NULL for local
 * @flags: combination of virDrvOpenFlag(s)
2186 2187 2188
 *
 * Connects to the Xen hypervisor.
 *
2189
 * Returns 0 or -1 in case of error.
2190
 */
2191
virDrvOpenStatus
2192
xenHypervisorOpen(virConnectPtr conn,
2193
                  virConnectAuthPtr auth ATTRIBUTE_UNUSED,
E
Eric Blake 已提交
2194
                  unsigned int flags)
2195
{
2196
    int ret;
2197
    xenUnifiedPrivatePtr priv = (xenUnifiedPrivatePtr) conn->privateData;
2198

E
Eric Blake 已提交
2199 2200
    virCheckFlags(VIR_CONNECT_RO, VIR_DRV_OPEN_ERROR);

2201
    if (initialized == 0)
P
Philipp Hahn 已提交
2202
        if (xenHypervisorInit(NULL) == -1)
2203
            return -1;
2204

2205
    priv->handle = -1;
2206

2207
    ret = open(XEN_HYPERVISOR_SOCKET, O_RDWR);
2208
    if (ret < 0) {
2209
        virXenError(VIR_ERR_NO_XEN, "%s", XEN_HYPERVISOR_SOCKET);
2210
        return (-1);
2211
    }
2212 2213

    priv->handle = ret;
2214

2215
    return(0);
2216 2217 2218 2219
}

/**
 * xenHypervisorClose:
2220
 * @conn: pointer to the connection block
2221 2222 2223 2224 2225
 *
 * Close the connection to the Xen hypervisor.
 *
 * Returns 0 in case of success or -1 in case of error.
 */
2226
int
2227
xenHypervisorClose(virConnectPtr conn)
2228
{
2229
    int ret;
2230
    xenUnifiedPrivatePtr priv;
2231

2232
    if (conn == NULL)
2233
        return (-1);
2234

2235 2236 2237 2238 2239
    priv = (xenUnifiedPrivatePtr) conn->privateData;

    if (priv->handle < 0)
        return -1;

2240
    ret = VIR_CLOSE(priv->handle);
2241
    if (ret < 0)
2242
        return (-1);
2243

2244
    return (0);
2245 2246 2247
}


2248 2249
/**
 * xenHypervisorGetVersion:
2250 2251
 * @conn: pointer to the connection block
 * @hvVer: where to store the version
2252 2253 2254
 *
 * Call the hypervisor to extracts his own internal API version
 *
2255
 * Returns 0 in case of success, -1 in case of error
2256
 */
2257 2258
int
xenHypervisorGetVersion(virConnectPtr conn, unsigned long *hvVer)
2259
{
2260 2261 2262 2263 2264 2265
    xenUnifiedPrivatePtr priv;

    if (conn == NULL)
        return -1;
    priv = (xenUnifiedPrivatePtr) conn->privateData;
    if (priv->handle < 0 || hvVer == NULL)
2266
        return (-1);
P
Philipp Hahn 已提交
2267
    *hvVer = (hv_versions.hv >> 16) * 1000000 + (hv_versions.hv & 0xFFFF) * 1000;
2268
    return(0);
2269 2270
}

2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281
struct guest_arch {
    const char *model;
    int bits;
    int hvm;
    int pae;
    int nonpae;
    int ia64_be;
};


static virCapsPtr
2282 2283
xenHypervisorBuildCapabilities(virConnectPtr conn,
                               const char *hostmachine,
2284
                               int host_pae,
2285
                               const char *hvm_type,
2286 2287 2288 2289
                               struct guest_arch *guest_archs,
                               int nr_guest_archs) {
    virCapsPtr caps;
    int i;
P
Philipp Hahn 已提交
2290 2291
    int hv_major = hv_versions.hv >> 16;
    int hv_minor = hv_versions.hv & 0xFFFF;
2292 2293 2294

    if ((caps = virCapabilitiesNew(hostmachine, 1, 1)) == NULL)
        goto no_memory;
2295 2296 2297

    virCapabilitiesSetMacPrefix(caps, (unsigned char[]){ 0x00, 0x16, 0x3e });

2298 2299 2300 2301 2302 2303 2304 2305 2306 2307 2308 2309 2310
    if (hvm_type && STRNEQ(hvm_type, "") &&
        virCapabilitiesAddHostFeature(caps, hvm_type) < 0)
        goto no_memory;
    if (host_pae &&
        virCapabilitiesAddHostFeature(caps, "pae") < 0)
        goto no_memory;


    if (virCapabilitiesAddHostMigrateTransport(caps,
                                               "xenmigr") < 0)
        goto no_memory;


P
Philipp Hahn 已提交
2311
    if (hv_versions.sys_interface >= SYS_IFACE_MIN_VERS_NUMA && conn != NULL) {
2312
        if (xenDaemonNodeGetTopology(conn, caps) != 0) {
2313 2314 2315 2316 2317 2318 2319
            virCapabilitiesFree(caps);
            return NULL;
        }
    }

    for (i = 0; i < nr_guest_archs; ++i) {
        virCapsGuestPtr guest;
2320 2321 2322
        char const *const xen_machines[] = {guest_archs[i].hvm ? "xenfv" : "xenpv"};
        virCapsGuestMachinePtr *machines;

2323
        if ((machines = virCapabilitiesAllocMachines(xen_machines, 1)) == NULL)
2324
            goto no_memory;
2325 2326 2327 2328 2329 2330 2331 2332 2333 2334 2335 2336

        if ((guest = virCapabilitiesAddGuest(caps,
                                             guest_archs[i].hvm ? "hvm" : "xen",
                                             guest_archs[i].model,
                                             guest_archs[i].bits,
                                             (STREQ(hostmachine, "x86_64") ?
                                              "/usr/lib64/xen/bin/qemu-dm" :
                                              "/usr/lib/xen/bin/qemu-dm"),
                                             (guest_archs[i].hvm ?
                                              "/usr/lib/xen/boot/hvmloader" :
                                              NULL),
                                             1,
2337 2338
                                             machines)) == NULL) {
            virCapabilitiesFreeMachines(machines, 1);
2339
            goto no_memory;
2340
        }
2341
        machines = NULL;
2342 2343 2344 2345 2346 2347 2348 2349 2350 2351 2352 2353 2354 2355 2356 2357 2358 2359 2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376 2377

        if (virCapabilitiesAddGuestDomain(guest,
                                          "xen",
                                          NULL,
                                          NULL,
                                          0,
                                          NULL) == NULL)
            goto no_memory;

        if (guest_archs[i].pae &&
            virCapabilitiesAddGuestFeature(guest,
                                           "pae",
                                           1,
                                           0) == NULL)
            goto no_memory;

        if (guest_archs[i].nonpae &&
            virCapabilitiesAddGuestFeature(guest,
                                           "nonpae",
                                           1,
                                           0) == NULL)
            goto no_memory;

        if (guest_archs[i].ia64_be &&
            virCapabilitiesAddGuestFeature(guest,
                                           "ia64_be",
                                           1,
                                           0) == NULL)
            goto no_memory;

        if (guest_archs[i].hvm) {
            if (virCapabilitiesAddGuestFeature(guest,
                                               "acpi",
                                               1, 1) == NULL)
                goto no_memory;

2378
            /* In Xen 3.1.0, APIC is always on and can't be toggled */
2379 2380 2381 2382 2383 2384 2385
            if (virCapabilitiesAddGuestFeature(guest,
                                               "apic",
                                               1,
                                               (hv_major > 3 &&
                                                hv_minor > 0 ?
                                                0 : 1)) == NULL)
                goto no_memory;
2386 2387 2388 2389 2390 2391 2392 2393 2394 2395

            /* Xen 3.3.x and beyond supports enabling/disabling
             * hardware assisted paging.  Default is off.
             */
            if ((hv_major == 3 && hv_minor >= 3) || (hv_major > 3))
                if (virCapabilitiesAddGuestFeature(guest,
                                                   "hap",
                                                   0,
                                                   1) == NULL)
                    goto no_memory;
2396 2397 2398 2399 2400 2401 2402 2403 2404 2405

            /* Xen 3.4.x and beyond supports the Viridian (Hyper-V)
             * enlightenment interface.  Default is off.
             */
            if ((hv_major == 3 && hv_minor >= 4) || (hv_major > 3))
                if (virCapabilitiesAddGuestFeature(guest,
                                                   "viridian",
                                                   0,
                                                   1) == NULL)
                    goto no_memory;
2406
        }
2407

2408 2409
    }

2410 2411
    caps->defaultConsoleTargetType = VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_XEN;

2412 2413 2414 2415 2416 2417 2418
    return caps;

 no_memory:
    virCapabilitiesFree(caps);
    return NULL;
}

2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433 2434 2435 2436
#ifdef __sun

static int
get_cpu_flags(virConnectPtr conn, const char **hvm, int *pae, int *longmode)
{
    struct {
        uint32_t r_eax, r_ebx, r_ecx, r_edx;
    } regs;

    char tmpbuf[20];
    int ret = 0;
    int fd;

    /* returns -1, errno 22 if in 32-bit mode */
    *longmode = (sysinfo(SI_ARCHITECTURE_64, tmpbuf, sizeof(tmpbuf)) != -1);

    if ((fd = open("/dev/cpu/self/cpuid", O_RDONLY)) == -1 ||
        pread(fd, &regs, sizeof(regs), 0) != sizeof(regs)) {
2437
        virReportSystemError(errno, "%s", _("could not read CPU flags"));
2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465
        goto out;
    }

    *pae = 0;
    *hvm = "";

    if (STREQLEN((const char *)&regs.r_ebx, "AuthcAMDenti", 12)) {
        if (pread(fd, &regs, sizeof (regs), 0x80000001) == sizeof (regs)) {
            /* Read secure virtual machine bit (bit 2 of ECX feature ID) */
            if ((regs.r_ecx >> 2) & 1) {
                *hvm = "svm";
            }
            if ((regs.r_edx >> 6) & 1)
                *pae = 1;
        }
    } else if (STREQLEN((const char *)&regs.r_ebx, "GenuntelineI", 12)) {
        if (pread(fd, &regs, sizeof (regs), 0x00000001) == sizeof (regs)) {
            /* Read VMXE feature bit (bit 5 of ECX feature ID) */
            if ((regs.r_ecx >> 5) & 1)
                *hvm = "vmx";
            if ((regs.r_edx >> 6) & 1)
                *pae = 1;
        }
    }

    ret = 1;

out:
2466
    VIR_FORCE_CLOSE(fd);
2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525 2526 2527
    return ret;
}

static virCapsPtr
xenHypervisorMakeCapabilitiesSunOS(virConnectPtr conn)
{
    struct guest_arch guest_arches[32];
    int i = 0;
    virCapsPtr caps = NULL;
    struct utsname utsname;
    int pae, longmode;
    const char *hvm;

    if (!get_cpu_flags(conn, &hvm, &pae, &longmode))
        return NULL;

    /* Really, this never fails - look at the man-page. */
    uname (&utsname);

    guest_arches[i].model = "i686";
    guest_arches[i].bits = 32;
    guest_arches[i].hvm = 0;
    guest_arches[i].pae = pae;
    guest_arches[i].nonpae = !pae;
    guest_arches[i].ia64_be = 0;
    i++;

    if (longmode) {
        guest_arches[i].model = "x86_64";
        guest_arches[i].bits = 64;
        guest_arches[i].hvm = 0;
        guest_arches[i].pae = 0;
        guest_arches[i].nonpae = 0;
        guest_arches[i].ia64_be = 0;
        i++;
    }

    if (hvm[0] != '\0') {
        guest_arches[i].model = "i686";
        guest_arches[i].bits = 32;
        guest_arches[i].hvm = 1;
        guest_arches[i].pae = pae;
        guest_arches[i].nonpae = 1;
        guest_arches[i].ia64_be = 0;
        i++;

        if (longmode) {
            guest_arches[i].model = "x86_64";
            guest_arches[i].bits = 64;
            guest_arches[i].hvm = 1;
            guest_arches[i].pae = 0;
            guest_arches[i].nonpae = 0;
            guest_arches[i].ia64_be = 0;
            i++;
        }
    }

    if ((caps = xenHypervisorBuildCapabilities(conn,
                                               utsname.machine,
                                               pae, hvm,
                                               guest_arches, i)) == NULL)
2528
        virReportOOMError();
2529 2530 2531 2532 2533 2534

    return caps;
}

#endif /* __sun */

2535
/**
2536
 * xenHypervisorMakeCapabilitiesInternal:
2537
 * @conn: pointer to the connection block
2538 2539
 * @cpuinfo: file handle containing /proc/cpuinfo data, or NULL
 * @capabilities: file handle containing /sys/hypervisor/properties/capabilities data, or NULL
2540 2541 2542
 *
 * Return the capabilities of this hypervisor.
 */
2543
virCapsPtr
2544 2545
xenHypervisorMakeCapabilitiesInternal(virConnectPtr conn,
                                      const char *hostmachine,
2546
                                      FILE *cpuinfo, FILE *capabilities)
2547 2548
{
    char line[1024], *str, *token;
2549
    regmatch_t subs[4];
2550
    char *saveptr = NULL;
2551
    int i;
2552 2553 2554

    char hvm_type[4] = ""; /* "vmx" or "svm" (or "" if not in CPU). */
    int host_pae = 0;
2555
    struct guest_arch guest_archs[32];
2556
    int nr_guest_archs = 0;
2557
    virCapsPtr caps = NULL;
2558

2559 2560
    memset(guest_archs, 0, sizeof(guest_archs));

2561 2562 2563 2564
    /* /proc/cpuinfo: flags: Intel calls HVM "vmx", AMD calls it "svm".
     * It's not clear if this will work on IA64, let alone other
     * architectures and non-Linux. (XXX)
     */
2565 2566 2567 2568
    if (cpuinfo) {
        while (fgets (line, sizeof line, cpuinfo)) {
            if (regexec (&flags_hvm_rec, line, sizeof(subs)/sizeof(regmatch_t), subs, 0) == 0
                && subs[0].rm_so != -1) {
C
Chris Lalancette 已提交
2569 2570 2571 2572 2573
                if (virStrncpy(hvm_type,
                               &line[subs[1].rm_so],
                               subs[1].rm_eo-subs[1].rm_so,
                               sizeof(hvm_type)) == NULL)
                    return NULL;
2574 2575 2576
            } else if (regexec (&flags_pae_rec, line, 0, NULL, 0) == 0)
                host_pae = 1;
        }
2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599 2600 2601 2602 2603
    }

    /* Most of the useful info is in /sys/hypervisor/properties/capabilities
     * which is documented in the code in xen-unstable.hg/xen/arch/.../setup.c.
     *
     * It is a space-separated list of supported guest architectures.
     *
     * For x86:
     *    TYP-VER-ARCH[p]
     *    ^   ^   ^    ^
     *    |   |   |    +-- PAE supported
     *    |   |   +------- x86_32 or x86_64
     *    |   +----------- the version of Xen, eg. "3.0"
     *    +--------------- "xen" or "hvm" for para or full virt respectively
     *
     * For PPC this file appears to be always empty (?)
     *
     * For IA64:
     *    TYP-VER-ARCH[be]
     *    ^   ^   ^    ^
     *    |   |   |    +-- Big-endian supported
     *    |   |   +------- always "ia64"
     *    |   +----------- the version of Xen, eg. "3.0"
     *    +--------------- "xen" or "hvm" for para or full virt respectively
     */

    /* Expecting one line in this file - ignore any more. */
2604
    if ((capabilities) && (fgets (line, sizeof line, capabilities))) {
2605 2606 2607 2608 2609 2610 2611 2612 2613 2614
        /* Split the line into tokens.  strtok_r is OK here because we "own"
         * this buffer.  Parse out the features from each token.
         */
        for (str = line, nr_guest_archs = 0;
             nr_guest_archs < sizeof guest_archs / sizeof guest_archs[0]
                 && (token = strtok_r (str, " ", &saveptr)) != NULL;
             str = NULL) {

            if (regexec (&xen_cap_rec, token, sizeof subs / sizeof subs[0],
                         subs, 0) == 0) {
2615
                int hvm = STRPREFIX(&token[subs[1].rm_so], "hvm");
2616 2617
                const char *model;
                int bits, pae = 0, nonpae = 0, ia64_be = 0;
2618 2619

                if (STRPREFIX(&token[subs[2].rm_so], "x86_32")) {
2620 2621
                    model = "i686";
                    bits = 32;
2622 2623
                    if (subs[3].rm_so != -1 &&
                        STRPREFIX(&token[subs[3].rm_so], "p"))
2624 2625 2626 2627
                        pae = 1;
                    else
                        nonpae = 1;
                }
2628
                else if (STRPREFIX(&token[subs[2].rm_so], "x86_64")) {
2629 2630 2631
                    model = "x86_64";
                    bits = 64;
                }
2632
                else if (STRPREFIX(&token[subs[2].rm_so], "ia64")) {
2633 2634
                    model = "ia64";
                    bits = 64;
2635 2636
                    if (subs[3].rm_so != -1 &&
                        STRPREFIX(&token[subs[3].rm_so], "be"))
2637 2638
                        ia64_be = 1;
                }
2639
                else if (STRPREFIX(&token[subs[2].rm_so], "powerpc64")) {
2640 2641 2642 2643 2644 2645
                    model = "ppc64";
                    bits = 64;
                } else {
                    /* XXX surely no other Xen archs exist  */
                    continue;
                }
2646

2647 2648
                /* Search for existing matching (model,hvm) tuple */
                for (i = 0 ; i < nr_guest_archs ; i++) {
2649
                    if (STREQ(guest_archs[i].model, model) &&
2650 2651 2652 2653
                        guest_archs[i].hvm == hvm) {
                        break;
                    }
                }
2654

2655
                /* Too many arch flavours - highly unlikely ! */
J
Jim Meyering 已提交
2656
                if (i >= ARRAY_CARDINALITY(guest_archs))
2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2671 2672 2673 2674 2675
                    continue;
                /* Didn't find a match, so create a new one */
                if (i == nr_guest_archs)
                    nr_guest_archs++;

                guest_archs[i].model = model;
                guest_archs[i].bits = bits;
                guest_archs[i].hvm = hvm;

                /* Careful not to overwrite a previous positive
                   setting with a negative one here - some archs
                   can do both pae & non-pae, but Xen reports
                   separately capabilities so we're merging archs */
                if (pae)
                    guest_archs[i].pae = pae;
                if (nonpae)
                    guest_archs[i].nonpae = nonpae;
                if (ia64_be)
                    guest_archs[i].ia64_be = ia64_be;
2676 2677 2678 2679
            }
        }
    }

2680 2681
    if ((caps = xenHypervisorBuildCapabilities(conn,
                                               hostmachine,
2682 2683 2684 2685 2686
                                               host_pae,
                                               hvm_type,
                                               guest_archs,
                                               nr_guest_archs)) == NULL)
        goto no_memory;
2687

2688
    return caps;
2689

2690
 no_memory:
2691
    virReportOOMError();
2692
    virCapabilitiesFree(caps);
2693 2694 2695 2696
    return NULL;
}

/**
2697
 * xenHypervisorMakeCapabilities:
2698 2699 2700
 *
 * Return the capabilities of this hypervisor.
 */
2701
virCapsPtr
2702
xenHypervisorMakeCapabilities(virConnectPtr conn)
2703
{
2704 2705 2706
#ifdef __sun
    return xenHypervisorMakeCapabilitiesSunOS(conn);
#else
2707
    virCapsPtr caps;
2708 2709 2710 2711 2712 2713 2714 2715 2716
    FILE *cpuinfo, *capabilities;
    struct utsname utsname;

    /* Really, this never fails - look at the man-page. */
    uname (&utsname);

    cpuinfo = fopen ("/proc/cpuinfo", "r");
    if (cpuinfo == NULL) {
        if (errno != ENOENT) {
2717
            virReportSystemError(errno,
2718 2719
                                 _("cannot read file %s"),
                                 "/proc/cpuinfo");
2720 2721 2722 2723 2724 2725 2726
            return NULL;
        }
    }

    capabilities = fopen ("/sys/hypervisor/properties/capabilities", "r");
    if (capabilities == NULL) {
        if (errno != ENOENT) {
2727
            VIR_FORCE_FCLOSE(cpuinfo);
2728
            virReportSystemError(errno,
2729 2730
                                 _("cannot read file %s"),
                                 "/sys/hypervisor/properties/capabilities");
2731 2732 2733 2734
            return NULL;
        }
    }

2735 2736 2737 2738
    caps = xenHypervisorMakeCapabilitiesInternal(conn,
                                                 utsname.machine,
                                                 cpuinfo,
                                                 capabilities);
2739

2740 2741
    VIR_FORCE_FCLOSE(cpuinfo);
    VIR_FORCE_FCLOSE(capabilities);
2742

2743
    return caps;
2744
#endif /* __sun */
2745 2746 2747 2748 2749 2750 2751 2752 2753 2754 2755 2756 2757 2758 2759 2760 2761
}



/**
 * xenHypervisorGetCapabilities:
 * @conn: pointer to the connection block
 *
 * Return the capabilities of this hypervisor.
 */
char *
xenHypervisorGetCapabilities (virConnectPtr conn)
{
    xenUnifiedPrivatePtr priv = (xenUnifiedPrivatePtr) conn->privateData;
    char *xml;

    if (!(xml = virCapabilitiesFormatXML(priv->caps))) {
2762
        virReportOOMError();
2763 2764 2765
        return NULL;
    }

2766
    return xml;
2767 2768
}

2769

2770 2771 2772 2773 2774 2775 2776 2777 2778 2779 2780
/**
 * xenHypervisorNumOfDomains:
 * @conn: pointer to the connection block
 *
 * Provides the number of active domains.
 *
 * Returns the number of domain found or -1 in case of error
 */
int
xenHypervisorNumOfDomains(virConnectPtr conn)
{
2781
    xen_getdomaininfolist dominfos;
2782 2783 2784
    int ret, nbids;
    static int last_maxids = 2;
    int maxids = last_maxids;
2785
    xenUnifiedPrivatePtr priv;
2786

2787 2788 2789 2790
    if (conn == NULL)
        return -1;
    priv = (xenUnifiedPrivatePtr) conn->privateData;
    if (priv->handle < 0)
2791 2792
        return (-1);

2793 2794
 retry:
    if (!(XEN_GETDOMAININFOLIST_ALLOC(dominfos, maxids))) {
2795
        virReportOOMError();
2796
        return(-1);
2797 2798
    }

2799 2800
    XEN_GETDOMAININFOLIST_CLEAR(dominfos, maxids);

2801
    ret = virXen_getdomaininfolist(priv->handle, 0, maxids, &dominfos);
2802

2803
    XEN_GETDOMAININFOLIST_FREE(dominfos);
2804 2805 2806 2807

    if (ret < 0)
        return (-1);

2808
    nbids = ret;
2809 2810 2811 2812 2813
    /* Can't possibly have more than 65,000 concurrent guests
     * so limit how many times we try, to avoid increasing
     * without bound & thus allocating all of system memory !
     * XXX I'll regret this comment in a few years time ;-)
     */
2814
    if (nbids == maxids) {
2815 2816 2817 2818 2819 2820
        if (maxids < 65000) {
            last_maxids *= 2;
            maxids *= 2;
            goto retry;
        }
        nbids = -1;
2821 2822 2823 2824 2825 2826 2827 2828 2829 2830 2831 2832 2833 2834 2835 2836 2837 2838 2839
    }
    if ((nbids < 0) || (nbids > maxids))
        return(-1);
    return(nbids);
}

/**
 * xenHypervisorListDomains:
 * @conn: pointer to the connection block
 * @ids: array to collect the list of IDs of active domains
 * @maxids: size of @ids
 *
 * Collect the list of active domains, and store their ID in @maxids
 *
 * Returns the number of domain found or -1 in case of error
 */
int
xenHypervisorListDomains(virConnectPtr conn, int *ids, int maxids)
{
2840
    xen_getdomaininfolist dominfos;
2841
    int ret, nbids, i;
2842 2843 2844 2845
    xenUnifiedPrivatePtr priv;

    if (conn == NULL)
        return -1;
2846

2847 2848
    priv = (xenUnifiedPrivatePtr) conn->privateData;
    if (priv->handle < 0 ||
2849
        (ids == NULL) || (maxids < 0))
2850 2851
        return (-1);

2852 2853 2854
    if (maxids == 0)
        return(0);

2855
    if (!(XEN_GETDOMAININFOLIST_ALLOC(dominfos, maxids))) {
2856
        virReportOOMError();
2857
        return(-1);
2858
    }
2859 2860

    XEN_GETDOMAININFOLIST_CLEAR(dominfos, maxids);
2861 2862
    memset(ids, 0, maxids * sizeof(int));

2863
    ret = virXen_getdomaininfolist(priv->handle, 0, maxids, &dominfos);
2864 2865

    if (ret < 0) {
2866
        XEN_GETDOMAININFOLIST_FREE(dominfos);
2867 2868 2869
        return (-1);
    }

2870
    nbids = ret;
2871
    if ((nbids < 0) || (nbids > maxids)) {
2872
        XEN_GETDOMAININFOLIST_FREE(dominfos);
2873 2874 2875 2876
        return(-1);
    }

    for (i = 0;i < nbids;i++) {
2877
        ids[i] = XEN_GETDOMAININFOLIST_DOMAIN(dominfos, i);
2878 2879
    }

2880
    XEN_GETDOMAININFOLIST_FREE(dominfos);
2881 2882 2883
    return (nbids);
}

2884 2885 2886 2887 2888 2889

char *
xenHypervisorDomainGetOSType (virDomainPtr dom)
{
    xenUnifiedPrivatePtr priv;
    xen_getdomaininfo dominfo;
2890
    char *ostype = NULL;
2891 2892

    priv = (xenUnifiedPrivatePtr) dom->conn->privateData;
2893
    if (priv->handle < 0) {
2894
        virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
2895
                        _("domain shut off or invalid"), 0);
2896
        return (NULL);
2897
    }
2898 2899

    /* HV's earlier than 3.1.0 don't include the HVM flags in guests status*/
P
Philipp Hahn 已提交
2900 2901
    if (hv_versions.hypervisor < 2 ||
        hv_versions.dom_interface < 4) {
2902
        virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
2903
                        _("unsupported in dom interface < 4"), 0);
2904
        return (NULL);
2905
    }
2906 2907 2908

    XEN_GETDOMAININFO_CLEAR(dominfo);

2909
    if (virXen_getdomaininfo(priv->handle, dom->id, &dominfo) < 0) {
2910
        virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
2911
                        _("cannot get domain details"), 0);
2912
        return (NULL);
2913
    }
2914

2915
    if (XEN_GETDOMAININFO_DOMAIN(dominfo) != dom->id) {
2916
        virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
2917
                        _("cannot get domain details"), 0);
2918
        return (NULL);
2919
    }
2920 2921

    if (XEN_GETDOMAININFO_FLAGS(dominfo) & DOMFLAGS_HVM)
2922 2923 2924 2925 2926
        ostype = strdup("hvm");
    else
        ostype = strdup("linux");

    if (ostype == NULL)
2927
        virReportOOMError();
2928 2929

    return ostype;
2930 2931
}

2932 2933 2934 2935 2936 2937 2938 2939 2940 2941 2942 2943 2944 2945 2946 2947 2948 2949 2950 2951 2952 2953
int
xenHypervisorHasDomain(virConnectPtr conn,
                       int id)
{
    xenUnifiedPrivatePtr priv;
    xen_getdomaininfo dominfo;

    priv = (xenUnifiedPrivatePtr) conn->privateData;
    if (priv->handle < 0)
        return 0;

    XEN_GETDOMAININFO_CLEAR(dominfo);

    if (virXen_getdomaininfo(priv->handle, id, &dominfo) < 0)
        return 0;

    if (XEN_GETDOMAININFO_DOMAIN(dominfo) != id)
        return 0;

    return 1;
}

2954 2955 2956 2957 2958 2959 2960 2961 2962 2963 2964 2965 2966 2967 2968 2969 2970 2971 2972 2973 2974
virDomainPtr
xenHypervisorLookupDomainByID(virConnectPtr conn,
                              int id)
{
    xenUnifiedPrivatePtr priv;
    xen_getdomaininfo dominfo;
    virDomainPtr ret;
    char *name;

    priv = (xenUnifiedPrivatePtr) conn->privateData;
    if (priv->handle < 0)
        return (NULL);

    XEN_GETDOMAININFO_CLEAR(dominfo);

    if (virXen_getdomaininfo(priv->handle, id, &dominfo) < 0)
        return (NULL);

    if (XEN_GETDOMAININFO_DOMAIN(dominfo) != id)
        return (NULL);

D
Daniel P. Berrange 已提交
2975 2976 2977 2978
    xenUnifiedLock(priv);
    name = xenStoreDomainGetName(conn, id);
    xenUnifiedUnlock(priv);
    if (!name)
2979 2980 2981 2982 2983
        return (NULL);

    ret = virGetDomain(conn, name, XEN_GETDOMAININFO_UUID(dominfo));
    if (ret)
        ret->id = id;
2984
    VIR_FREE(name);
2985 2986 2987 2988 2989 2990 2991 2992 2993 2994 2995 2996 2997 2998 2999 3000 3001 3002 3003 3004
    return ret;
}


virDomainPtr
xenHypervisorLookupDomainByUUID(virConnectPtr conn,
                                const unsigned char *uuid)
{
    xen_getdomaininfolist dominfos;
    xenUnifiedPrivatePtr priv;
    virDomainPtr ret;
    char *name;
    int maxids = 100, nids, i, id;

    priv = (xenUnifiedPrivatePtr) conn->privateData;
    if (priv->handle < 0)
        return (NULL);

 retry:
    if (!(XEN_GETDOMAININFOLIST_ALLOC(dominfos, maxids))) {
3005
        virReportOOMError();
3006 3007 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 3029 3030 3031 3032 3033 3034 3035 3036 3037 3038 3039 3040 3041 3042 3043
        return(NULL);
    }

    XEN_GETDOMAININFOLIST_CLEAR(dominfos, maxids);

    nids = virXen_getdomaininfolist(priv->handle, 0, maxids, &dominfos);

    if (nids < 0) {
        XEN_GETDOMAININFOLIST_FREE(dominfos);
        return (NULL);
    }

    /* Can't possibly have more than 65,000 concurrent guests
     * so limit how many times we try, to avoid increasing
     * without bound & thus allocating all of system memory !
     * XXX I'll regret this comment in a few years time ;-)
     */
    if (nids == maxids) {
        XEN_GETDOMAININFOLIST_FREE(dominfos);
        if (maxids < 65000) {
            maxids *= 2;
            goto retry;
        }
        return (NULL);
    }

    id = -1;
    for (i = 0 ; i < nids ; i++) {
        if (memcmp(XEN_GETDOMAININFOLIST_UUID(dominfos, i), uuid, VIR_UUID_BUFLEN) == 0) {
            id = XEN_GETDOMAININFOLIST_DOMAIN(dominfos, i);
            break;
        }
    }
    XEN_GETDOMAININFOLIST_FREE(dominfos);

    if (id == -1)
        return (NULL);

D
Daniel P. Berrange 已提交
3044 3045 3046 3047
    xenUnifiedLock(priv);
    name = xenStoreDomainGetName(conn, id);
    xenUnifiedUnlock(priv);
    if (!name)
3048 3049 3050 3051 3052
        return (NULL);

    ret = virGetDomain(conn, name, uuid);
    if (ret)
        ret->id = id;
3053
    VIR_FREE(name);
3054 3055 3056
    return ret;
}

3057
/**
3058
 * xenHypervisorGetMaxVcpus:
3059 3060 3061 3062
 *
 * Returns the maximum of CPU defined by Xen.
 */
int
3063 3064
xenHypervisorGetMaxVcpus(virConnectPtr conn,
                         const char *type ATTRIBUTE_UNUSED)
3065
{
3066 3067 3068 3069 3070 3071
    xenUnifiedPrivatePtr priv;

    if (conn == NULL)
        return -1;
    priv = (xenUnifiedPrivatePtr) conn->privateData;
    if (priv->handle < 0)
3072 3073 3074 3075 3076
        return (-1);

    return MAX_VIRT_CPUS;
}

3077
/**
3078 3079 3080
 * xenHypervisorGetDomMaxMemory:
 * @conn: connection data
 * @id: domain id
3081
 *
3082
 * Retrieve the maximum amount of physical memory allocated to a
3083
 * domain.
3084 3085 3086
 *
 * Returns the memory size in kilobytes or 0 in case of error.
 */
3087 3088
unsigned long
xenHypervisorGetDomMaxMemory(virConnectPtr conn, int id)
3089
{
3090
    xenUnifiedPrivatePtr priv;
3091
    xen_getdomaininfo dominfo;
3092 3093
    int ret;

3094 3095 3096 3097 3098 3099
    if (conn == NULL)
        return 0;

    priv = (xenUnifiedPrivatePtr) conn->privateData;
    if (priv->handle < 0)
        return 0;
3100

3101 3102
    if (kb_per_pages == 0) {
        kb_per_pages = sysconf(_SC_PAGESIZE) / 1024;
3103 3104
        if (kb_per_pages <= 0)
            kb_per_pages = 4;
3105 3106
    }

3107
    XEN_GETDOMAININFO_CLEAR(dominfo);
3108

3109
    ret = virXen_getdomaininfo(priv->handle, id, &dominfo);
3110

3111
    if ((ret < 0) || (XEN_GETDOMAININFO_DOMAIN(dominfo) != id))
3112 3113
        return (0);

3114
    return((unsigned long) XEN_GETDOMAININFO_MAX_PAGES(dominfo) * kb_per_pages);
3115 3116
}

3117 3118 3119
/**
 * xenHypervisorGetMaxMemory:
 * @domain: a domain object or NULL
3120
 *
3121 3122 3123 3124 3125 3126
 * Retrieve the maximum amount of physical memory allocated to a
 * domain. If domain is NULL, then this get the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
 *
 * Returns the memory size in kilobytes or 0 in case of error.
 */
3127
static unsigned long ATTRIBUTE_NONNULL (1)
3128 3129
xenHypervisorGetMaxMemory(virDomainPtr domain)
{
3130 3131
    xenUnifiedPrivatePtr priv;

3132
    if (domain->conn == NULL)
3133 3134 3135 3136
        return 0;

    priv = (xenUnifiedPrivatePtr) domain->conn->privateData;
    if (priv->handle < 0 || domain->id < 0)
3137 3138
        return (0);

3139
    return(xenHypervisorGetDomMaxMemory(domain->conn, domain->id));
3140 3141
}

3142
/**
3143 3144 3145
 * xenHypervisorGetDomInfo:
 * @conn: connection data
 * @id: the domain ID
3146
 * @info: the place where information should be stored
3147
 *
3148
 * Do an hypervisor call to get the related set of domain information.
3149 3150 3151 3152
 *
 * Returns 0 in case of success, -1 in case of error.
 */
int
3153
xenHypervisorGetDomInfo(virConnectPtr conn, int id, virDomainInfoPtr info)
3154
{
3155
    xenUnifiedPrivatePtr priv;
3156
    xen_getdomaininfo dominfo;
3157
    int ret;
3158
    uint32_t domain_flags, domain_state, domain_shutdown_cause;
3159 3160 3161

    if (kb_per_pages == 0) {
        kb_per_pages = sysconf(_SC_PAGESIZE) / 1024;
3162 3163
        if (kb_per_pages <= 0)
            kb_per_pages = 4;
3164
    }
3165

3166 3167 3168 3169 3170
    if (conn == NULL)
        return -1;

    priv = (xenUnifiedPrivatePtr) conn->privateData;
    if (priv->handle < 0 || info == NULL)
3171
        return (-1);
3172

3173
    memset(info, 0, sizeof(virDomainInfo));
3174
    XEN_GETDOMAININFO_CLEAR(dominfo);
3175

3176
    ret = virXen_getdomaininfo(priv->handle, id, &dominfo);
3177

3178
    if ((ret < 0) || (XEN_GETDOMAININFO_DOMAIN(dominfo) != id))
3179
        return (-1);
3180

3181
    domain_flags = XEN_GETDOMAININFO_FLAGS(dominfo);
3182 3183
    domain_flags &= ~DOMFLAGS_HVM; /* Mask out HVM flags */
    domain_state = domain_flags & 0xFF; /* Mask out high bits */
3184
    switch (domain_state) {
3185 3186 3187 3188
        case DOMFLAGS_DYING:
            info->state = VIR_DOMAIN_SHUTDOWN;
            break;
        case DOMFLAGS_SHUTDOWN:
3189 3190 3191 3192 3193 3194 3195 3196 3197
            /* The domain is shutdown.  Determine the cause. */
            domain_shutdown_cause = domain_flags >> DOMFLAGS_SHUTDOWNSHIFT;
            switch (domain_shutdown_cause) {
                case SHUTDOWN_crash:
                    info->state = VIR_DOMAIN_CRASHED;
                    break;
                default:
                    info->state = VIR_DOMAIN_SHUTOFF;
            }
3198 3199 3200 3201 3202 3203 3204 3205 3206 3207 3208 3209
            break;
        case DOMFLAGS_PAUSED:
            info->state = VIR_DOMAIN_PAUSED;
            break;
        case DOMFLAGS_BLOCKED:
            info->state = VIR_DOMAIN_BLOCKED;
            break;
        case DOMFLAGS_RUNNING:
            info->state = VIR_DOMAIN_RUNNING;
            break;
        default:
            info->state = VIR_DOMAIN_NOSTATE;
3210 3211 3212 3213 3214 3215 3216
    }

    /*
     * the API brings back the cpu time in nanoseconds,
     * convert to microseconds, same thing convert to
     * kilobytes from page counts
     */
3217
    info->cpuTime = XEN_GETDOMAININFO_CPUTIME(dominfo);
3218
    info->memory = XEN_GETDOMAININFO_TOT_PAGES(dominfo) * kb_per_pages;
3219 3220 3221
    info->maxMem = XEN_GETDOMAININFO_MAX_PAGES(dominfo);
    if(info->maxMem != UINT_MAX)
        info->maxMem *= kb_per_pages;
3222
    info->nrVirtCpu = XEN_GETDOMAININFO_CPUCOUNT(dominfo);
3223
    return (0);
3224 3225
}

3226 3227 3228
/**
 * xenHypervisorGetDomainInfo:
 * @domain: pointer to the domain block
3229
 * @info: the place where information should be stored
3230
 *
3231
 * Do an hypervisor call to get the related set of domain information.
3232 3233 3234 3235 3236 3237
 *
 * Returns 0 in case of success, -1 in case of error.
 */
int
xenHypervisorGetDomainInfo(virDomainPtr domain, virDomainInfoPtr info)
{
3238 3239
    xenUnifiedPrivatePtr priv;

3240
    if (domain->conn == NULL)
3241 3242 3243 3244
        return -1;

    priv = (xenUnifiedPrivatePtr) domain->conn->privateData;
    if (priv->handle < 0 || info == NULL ||
3245
        (domain->id < 0))
3246
        return (-1);
3247

3248
    return(xenHypervisorGetDomInfo(domain->conn, domain->id, info));
3249 3250 3251

}

3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266
/**
 * xenHypervisorGetDomainState:
 * @domain: pointer to the domain block
 * @state: returned state of the domain
 * @reason: returned reason for the state
 * @flags: additional flags, 0 for now
 *
 * Do a hypervisor call to get the related set of domain information.
 *
 * Returns 0 in case of success, -1 in case of error.
 */
int
xenHypervisorGetDomainState(virDomainPtr domain,
                            int *state,
                            int *reason,
E
Eric Blake 已提交
3267
                            unsigned int flags)
3268 3269 3270 3271
{
    xenUnifiedPrivatePtr priv = domain->conn->privateData;
    virDomainInfo info;

E
Eric Blake 已提交
3272 3273
    virCheckFlags(0, -1);

3274 3275 3276 3277 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287 3288 3289
    if (domain->conn == NULL)
        return -1;

    if (priv->handle < 0 || domain->id < 0)
        return -1;

    if (xenHypervisorGetDomInfo(domain->conn, domain->id, &info) < 0)
        return -1;

    *state = info.state;
    if (reason)
        *reason = 0;

    return 0;
}

3290 3291 3292 3293
/**
 * xenHypervisorNodeGetCellsFreeMemory:
 * @conn: pointer to the hypervisor connection
 * @freeMems: pointer to the array of unsigned long long
3294 3295
 * @startCell: index of first cell to return freeMems info on.
 * @maxCells: Maximum number of cells for which freeMems information can
3296 3297 3298 3299
 *            be returned.
 *
 * This call returns the amount of free memory in one or more NUMA cells.
 * The @freeMems array must be allocated by the caller and will be filled
3300 3301 3302
 * with the amount of free memory in kilobytes for each cell requested,
 * starting with startCell (in freeMems[0]), up to either
 * (startCell + maxCells), or the number of additional cells in the node,
3303 3304 3305 3306 3307 3308 3309 3310 3311 3312 3313
 * whichever is smaller.
 *
 * Returns the number of entries filled in freeMems, or -1 in case of error.
 */
int
xenHypervisorNodeGetCellsFreeMemory(virConnectPtr conn, unsigned long long *freeMems,
                                    int startCell, int maxCells)
{
    xen_op_v2_sys op_sys;
    int i, j, ret;
    xenUnifiedPrivatePtr priv;
3314

3315
    if (conn == NULL) {
3316
        virXenErrorFunc(VIR_ERR_INVALID_ARG, __FUNCTION__,
3317 3318 3319
                        "invalid argument", 0);
        return -1;
    }
3320

D
Daniel P. Berrange 已提交
3321 3322 3323
    priv = conn->privateData;

    if (priv->nbNodeCells < 0) {
3324 3325
        virXenErrorFunc(VIR_ERR_XEN_CALL, __FUNCTION__,
                        "cannot determine actual number of cells",0);
3326
        return(-1);
3327 3328
    }

D
Daniel P. Berrange 已提交
3329
    if ((maxCells < 1) || (startCell >= priv->nbNodeCells)) {
3330
        virXenErrorFunc(VIR_ERR_INVALID_ARG, __FUNCTION__,
3331 3332 3333
                        "invalid argument", 0);
        return -1;
    }
3334

3335
    /*
P
Philipp Hahn 已提交
3336
     * Support only hv_versions.sys_interface >=4
3337
     */
P
Philipp Hahn 已提交
3338
    if (hv_versions.sys_interface < SYS_IFACE_MIN_VERS_NUMA) {
3339
        virXenErrorFunc(VIR_ERR_XEN_CALL, __FUNCTION__,
3340 3341 3342 3343 3344
                        "unsupported in sys interface < 4", 0);
        return -1;
    }

    if (priv->handle < 0) {
3345
        virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
3346 3347 3348 3349 3350 3351 3352
                        "priv->handle invalid", 0);
        return -1;
    }

    memset(&op_sys, 0, sizeof(op_sys));
    op_sys.cmd = XEN_V2_OP_GETAVAILHEAP;

D
Daniel P. Berrange 已提交
3353
    for (i = startCell, j = 0;(i < priv->nbNodeCells) && (j < maxCells);i++,j++) {
P
Philipp Hahn 已提交
3354
        if (hv_versions.sys_interface >= 5)
3355 3356 3357
            op_sys.u.availheap5.node = i;
        else
            op_sys.u.availheap.node = i;
3358 3359 3360 3361
        ret = xenHypervisorDoV2Sys(priv->handle, &op_sys);
        if (ret < 0) {
            return(-1);
        }
P
Philipp Hahn 已提交
3362
        if (hv_versions.sys_interface >= 5)
3363 3364 3365
            freeMems[j] = op_sys.u.availheap5.avail_bytes;
        else
            freeMems[j] = op_sys.u.availheap.avail_bytes;
3366 3367 3368 3369 3370
    }
    return (j);
}


3371 3372
/**
 * xenHypervisorPauseDomain:
3373
 * @domain: pointer to the domain block
3374 3375 3376 3377 3378 3379
 *
 * Do an hypervisor call to pause the given domain
 *
 * Returns 0 in case of success, -1 in case of error.
 */
int
3380
xenHypervisorPauseDomain(virDomainPtr domain)
3381
{
3382
    int ret;
3383
    xenUnifiedPrivatePtr priv;
3384

3385
    if (domain->conn == NULL)
3386 3387 3388 3389
        return -1;

    priv = (xenUnifiedPrivatePtr) domain->conn->privateData;
    if (priv->handle < 0 || domain->id < 0)
3390 3391
        return (-1);

3392
    ret = virXen_pausedomain(priv->handle, domain->id);
3393
    if (ret < 0)
3394 3395
        return (-1);
    return (0);
3396 3397 3398 3399
}

/**
 * xenHypervisorResumeDomain:
3400
 * @domain: pointer to the domain block
3401 3402 3403 3404 3405 3406
 *
 * Do an hypervisor call to resume the given domain
 *
 * Returns 0 in case of success, -1 in case of error.
 */
int
3407
xenHypervisorResumeDomain(virDomainPtr domain)
3408
{
3409
    int ret;
3410 3411
    xenUnifiedPrivatePtr priv;

3412
    if (domain->conn == NULL)
3413
        return -1;
3414

3415 3416
    priv = (xenUnifiedPrivatePtr) domain->conn->privateData;
    if (priv->handle < 0 || domain->id < 0)
3417 3418
        return (-1);

3419
    ret = virXen_unpausedomain(priv->handle, domain->id);
3420
    if (ret < 0)
3421 3422
        return (-1);
    return (0);
3423 3424 3425
}

/**
3426
 * xenHypervisorDestroyDomainFlags:
3427
 * @domain: pointer to the domain block
3428
 * @flags: an OR'ed set of virDomainDestroyFlagsValues
3429 3430 3431
 *
 * Do an hypervisor call to destroy the given domain
 *
3432 3433 3434
 * Calling this function with no @flags set (equal to zero)
 * is equivalent to calling xenHypervisorDestroyDomain.
 *
3435 3436 3437
 * Returns 0 in case of success, -1 in case of error.
 */
int
3438 3439
xenHypervisorDestroyDomainFlags(virDomainPtr domain,
                                unsigned int flags)
3440
{
3441
    int ret;
3442 3443
    xenUnifiedPrivatePtr priv;

3444 3445
    virCheckFlags(0, -1);

3446
    if (domain->conn == NULL)
3447
        return -1;
3448

3449 3450
    priv = (xenUnifiedPrivatePtr) domain->conn->privateData;
    if (priv->handle < 0 || domain->id < 0)
3451 3452
        return (-1);

3453
    ret = virXen_destroydomain(priv->handle, domain->id);
3454
    if (ret < 0)
3455 3456
        return (-1);
    return (0);
3457 3458
}

3459 3460
/**
 * xenHypervisorSetMaxMemory:
3461
 * @domain: pointer to the domain block
3462 3463 3464 3465 3466 3467 3468
 * @memory: the max memory size in kilobytes.
 *
 * Do an hypervisor call to change the maximum amount of memory used
 *
 * Returns 0 in case of success, -1 in case of error.
 */
int
3469
xenHypervisorSetMaxMemory(virDomainPtr domain, unsigned long memory)
3470
{
3471
    int ret;
3472
    xenUnifiedPrivatePtr priv;
3473

3474
    if (domain->conn == NULL)
3475 3476 3477 3478
        return -1;

    priv = (xenUnifiedPrivatePtr) domain->conn->privateData;
    if (priv->handle < 0 || domain->id < 0)
3479 3480
        return (-1);

3481
    ret = virXen_setmaxmem(priv->handle, domain->id, memory);
3482
    if (ret < 0)
3483 3484
        return (-1);
    return (0);
3485
}
3486

3487

3488 3489 3490 3491 3492 3493 3494 3495 3496 3497 3498 3499 3500
/**
 * xenHypervisorSetVcpus:
 * @domain: pointer to domain object
 * @nvcpus: the new number of virtual CPUs for this domain
 *
 * Dynamically change the number of virtual CPUs used by the domain.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */

int
xenHypervisorSetVcpus(virDomainPtr domain, unsigned int nvcpus)
{
3501
    int ret;
3502 3503
    xenUnifiedPrivatePtr priv;

3504
    if (domain->conn == NULL)
3505
        return -1;
3506

3507 3508
    priv = (xenUnifiedPrivatePtr) domain->conn->privateData;
    if (priv->handle < 0 || domain->id < 0 || nvcpus < 1)
3509
        return (-1);
3510

3511
    ret = virXen_setmaxvcpus(priv->handle, domain->id, nvcpus);
3512
    if (ret < 0)
3513
        return (-1);
3514
    return (0);
3515 3516 3517 3518 3519 3520 3521 3522
}

/**
 * xenHypervisorPinVcpu:
 * @domain: pointer to domain object
 * @vcpu: virtual CPU number
 * @cpumap: pointer to a bit map of real CPUs (in 8-bit bytes)
 * @maplen: length of cpumap in bytes
3523
 *
3524 3525 3526 3527 3528 3529 3530 3531 3532
 * Dynamically change the real CPUs which can be allocated to a virtual CPU.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */

int
xenHypervisorPinVcpu(virDomainPtr domain, unsigned int vcpu,
                     unsigned char *cpumap, int maplen)
{
3533
    int ret;
3534
    xenUnifiedPrivatePtr priv;
3535

3536
    if (domain->conn == NULL)
3537 3538 3539 3540
        return -1;

    priv = (xenUnifiedPrivatePtr) domain->conn->privateData;
    if (priv->handle < 0 || (domain->id < 0) ||
3541
        (cpumap == NULL) || (maplen < 1))
3542 3543
        return (-1);

3544
    ret = virXen_setvcpumap(priv->handle, domain->id, vcpu,
3545 3546
                            cpumap, maplen);
    if (ret < 0)
3547
        return (-1);
3548
    return (0);
3549 3550 3551 3552 3553 3554 3555 3556
}

/**
 * virDomainGetVcpus:
 * @domain: pointer to domain object, or NULL for Domain0
 * @info: pointer to an array of virVcpuInfo structures (OUT)
 * @maxinfo: number of structures in info array
 * @cpumaps: pointer to an bit map of real CPUs for all vcpus of this domain (in 8-bit bytes) (OUT)
D
Daniel Veillard 已提交
3557
 *	If cpumaps is NULL, then no cpumap information is returned by the API.
3558 3559 3560 3561 3562 3563
 *	It's assumed there is <maxinfo> cpumap in cpumaps array.
 *	The memory allocated to cpumaps must be (maxinfo * maplen) bytes
 *	(ie: calloc(maxinfo, maplen)).
 *	One cpumap inside cpumaps has the format described in virDomainPinVcpu() API.
 * @maplen: number of bytes in one cpumap, from 1 up to size of CPU map in
 *	underlying virtualization system (Xen...).
3564
 *
3565
 * Extract information about virtual CPUs of domain, store it in info array
R
Richard W.M. Jones 已提交
3566
 * and also in cpumaps if this pointer isn't NULL.
3567 3568 3569 3570 3571
 *
 * Returns the number of info filled in case of success, -1 in case of failure.
 */
int
xenHypervisorGetVcpus(virDomainPtr domain, virVcpuInfoPtr info, int maxinfo,
3572
                      unsigned char *cpumaps, int maplen)
3573
{
3574
    xen_getdomaininfo dominfo;
3575
    int ret;
3576
    xenUnifiedPrivatePtr priv;
3577
    virVcpuInfoPtr ipt;
3578
    int nbinfo, i;
3579

3580
    if (domain->conn == NULL)
3581 3582 3583 3584
        return -1;

    priv = (xenUnifiedPrivatePtr) domain->conn->privateData;
    if (priv->handle < 0 || (domain->id < 0) ||
3585
        (info == NULL) || (maxinfo < 1) ||
3586
        (sizeof(cpumap_t) & 7)) {
3587
        virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
3588
                        _("domain shut off or invalid"), 0);
3589
        return (-1);
3590 3591
    }
    if ((cpumaps != NULL) && (maplen < 1)) {
3592
        virXenErrorFunc(VIR_ERR_INVALID_ARG, __FUNCTION__,
3593
                        "invalid argument", 0);
3594
        return -1;
3595
    }
3596
    /* first get the number of virtual CPUs in this domain */
3597
    XEN_GETDOMAININFO_CLEAR(dominfo);
3598
    ret = virXen_getdomaininfo(priv->handle, domain->id,
3599
                               &dominfo);
3600

3601
    if ((ret < 0) || (XEN_GETDOMAININFO_DOMAIN(dominfo) != domain->id)) {
3602
        virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
3603
                        _("cannot get domain details"), 0);
3604
        return (-1);
3605
    }
3606
    nbinfo = XEN_GETDOMAININFO_CPUCOUNT(dominfo) + 1;
3607 3608 3609
    if (nbinfo > maxinfo) nbinfo = maxinfo;

    if (cpumaps != NULL)
3610
        memset(cpumaps, 0, maxinfo * maplen);
3611

3612 3613
    for (i = 0, ipt = info; i < nbinfo; i++, ipt++) {
        if ((cpumaps != NULL) && (i < maxinfo)) {
3614
            ret = virXen_getvcpusinfo(priv->handle, domain->id, i,
3615 3616 3617
                                      ipt,
                                      (unsigned char *)VIR_GET_CPUMAP(cpumaps, maplen, i),
                                      maplen);
3618
            if (ret < 0) {
3619
                virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
3620
                                _("cannot get VCPUs info"), 0);
3621
                return(-1);
3622
            }
3623
        } else {
3624
            ret = virXen_getvcpusinfo(priv->handle, domain->id, i,
3625
                                      ipt, NULL, 0);
3626
            if (ret < 0) {
3627
                virXenErrorFunc(VIR_ERR_INTERNAL_ERROR, __FUNCTION__,
3628
                                _("cannot get VCPUs info"), 0);
3629
                return(-1);
3630
            }
3631
        }
3632 3633 3634
    }
    return nbinfo;
}
3635

3636 3637 3638 3639 3640 3641 3642 3643 3644 3645 3646 3647 3648 3649
/**
 * xenHypervisorGetVcpuMax:
 *
 *  Returns the maximum number of virtual CPUs supported for
 *  the guest VM. If the guest is inactive, this is the maximum
 *  of CPU defined by Xen. If the guest is running this reflect
 *  the maximum number of virtual CPUs the guest was booted with.
 */
int
xenHypervisorGetVcpuMax(virDomainPtr domain)
{
    xen_getdomaininfo dominfo;
    int ret;
    int maxcpu;
3650 3651
    xenUnifiedPrivatePtr priv;

3652
    if (domain->conn == NULL)
3653
        return -1;
3654

3655 3656
    priv = (xenUnifiedPrivatePtr) domain->conn->privateData;
    if (priv->handle < 0)
3657 3658 3659 3660 3661 3662 3663
        return (-1);

    /* inactive domain */
    if (domain->id < 0) {
        maxcpu = MAX_VIRT_CPUS;
    } else {
        XEN_GETDOMAININFO_CLEAR(dominfo);
3664
        ret = virXen_getdomaininfo(priv->handle, domain->id,
3665 3666 3667 3668 3669 3670 3671 3672 3673 3674
                                   &dominfo);

        if ((ret < 0) || (XEN_GETDOMAININFO_DOMAIN(dominfo) != domain->id))
            return (-1);
        maxcpu = XEN_GETDOMAININFO_MAXCPUID(dominfo) + 1;
    }

    return maxcpu;
}

J
John Levon 已提交
3675 3676 3677 3678 3679 3680
/**
 * xenHavePrivilege()
 *
 * Return true if the current process should be able to connect to Xen.
 */
int
3681
xenHavePrivilege(void)
J
John Levon 已提交
3682 3683 3684 3685
{
#ifdef __sun
    return priv_ineffect (PRIV_XVM_CONTROL);
#else
3686
    return access(XEN_HYPERVISOR_SOCKET, R_OK) == 0;
J
John Levon 已提交
3687 3688
#endif
}