qemu_conf.c 61.3 KB
Newer Older
D
Daniel P. Berrange 已提交
1
/*
2
 * qemu_conf.c: QEMU configuration management
D
Daniel P. Berrange 已提交
3
 *
4
 * Copyright (C) 2006-2014 Red Hat, Inc.
D
Daniel P. Berrange 已提交
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
D
Daniel P. Berrange 已提交
20 21
 */

22
#include <config.h>
23

D
Daniel P. Berrange 已提交
24 25 26 27 28
#include <sys/types.h>
#include <sys/stat.h>
#include <unistd.h>
#include <fcntl.h>

29
#include "virerror.h"
30
#include "qemu_conf.h"
31
#include "qemu_capabilities.h"
32
#include "qemu_domain.h"
33
#include "qemu_firmware.h"
34
#include "qemu_security.h"
35
#include "viruuid.h"
36
#include "virbuffer.h"
37
#include "virconf.h"
38
#include "viralloc.h"
39
#include "datatypes.h"
40
#include "virxml.h"
41
#include "virlog.h"
42
#include "cpu/cpu.h"
43
#include "domain_nwfilter.h"
E
Eric Blake 已提交
44
#include "virfile.h"
45
#include "virsocket.h"
46
#include "virstring.h"
47
#include "storage_conf.h"
J
Ján Tomko 已提交
48
#include "virutil.h"
49
#include "configmake.h"
50

51 52
#define VIR_FROM_THIS VIR_FROM_QEMU

53 54
VIR_LOG_INIT("qemu.qemu_conf");

55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70
/* These are only defaults, they can be changed now in qemu.conf and
 * explicitly specified port is checked against these two (makes
 * sense to limit the values).
 *
 * This limitation is mentioned in qemu.conf, so bear in mind that the
 * configuration file should reflect any changes made to these values.
 */
#define QEMU_REMOTE_PORT_MIN 5900
#define QEMU_REMOTE_PORT_MAX 65535

#define QEMU_WEBSOCKET_PORT_MIN 5700
#define QEMU_WEBSOCKET_PORT_MAX 65535

#define QEMU_MIGRATION_PORT_MIN 49152
#define QEMU_MIGRATION_PORT_MAX 49215

71 72 73 74 75
static virClassPtr virQEMUDriverConfigClass;
static void virQEMUDriverConfigDispose(void *obj);

static int virQEMUConfigOnceInit(void)
{
76
    if (!VIR_CLASS_NEW(virQEMUDriverConfig, virClassForObject()))
77
        return -1;
78 79

    return 0;
80 81
}

82
VIR_ONCE_GLOBAL_INIT(virQEMUConfig);
83 84


85 86
static void
qemuDriverLock(virQEMUDriverPtr driver)
87 88 89
{
    virMutexLock(&driver->lock);
}
90 91
static void
qemuDriverUnlock(virQEMUDriverPtr driver)
92 93 94 95
{
    virMutexUnlock(&driver->lock);
}

96 97 98 99
#ifndef DEFAULT_LOADER_NVRAM
# define DEFAULT_LOADER_NVRAM \
    "/usr/share/OVMF/OVMF_CODE.fd:/usr/share/OVMF/OVMF_VARS.fd:" \
    "/usr/share/OVMF/OVMF_CODE.secboot.fd:/usr/share/OVMF/OVMF_VARS.fd:" \
100 101
    "/usr/share/AAVMF/AAVMF_CODE.fd:/usr/share/AAVMF/AAVMF_VARS.fd:" \
    "/usr/share/AAVMF/AAVMF32_CODE.fd:/usr/share/AAVMF/AAVMF32_VARS.fd"
102 103
#endif

104

105 106
virQEMUDriverConfigPtr virQEMUDriverConfigNew(bool privileged,
                                              const char *root)
107
{
108
    g_autoptr(virQEMUDriverConfig) cfg = NULL;
109 110 111 112 113 114 115

    if (virQEMUConfigInitialize() < 0)
        return NULL;

    if (!(cfg = virObjectNew(virQEMUDriverConfigClass)))
        return NULL;

116 117
    if (root) {
        cfg->uri = g_strdup_printf("qemu:///embed?root=%s", root);
118
        cfg->root = g_strdup(root);
119 120 121
    } else {
        cfg->uri = g_strdup(privileged ? "qemu:///system" : "qemu:///session");
    }
122 123 124

    if (privileged) {
        if (virGetUserID(QEMU_USER, &cfg->user) < 0)
125
            return NULL;
126
        if (virGetGroupID(QEMU_GROUP, &cfg->group) < 0)
127
            return NULL;
128
    } else {
129 130
        cfg->user = (uid_t)-1;
        cfg->group = (gid_t)-1;
131 132
    }
    cfg->dynamicOwnership = privileged;
133
    cfg->rememberOwner = privileged;
134

135
    cfg->cgroupControllers = -1; /* -1 == auto-detect */
136

137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154
    if (root != NULL) {
        cfg->logDir = g_strdup_printf("%s/log/qemu", root);
        cfg->swtpmLogDir = g_strdup_printf("%s/log/swtpm", root);
        cfg->configBaseDir = g_strdup_printf("%s/etc", root);
        cfg->stateDir = g_strdup_printf("%s/run/qemu", root);
        cfg->swtpmStateDir = g_strdup_printf("%s/run/swtpm", root);
        cfg->cacheDir = g_strdup_printf("%s/cache/qemu", root);
        cfg->libDir = g_strdup_printf("%s/lib/qemu", root);
        cfg->swtpmStorageDir = g_strdup_printf("%s/lib/swtpm", root);

        cfg->saveDir = g_strdup_printf("%s/save", cfg->libDir);
        cfg->snapshotDir = g_strdup_printf("%s/snapshot", cfg->libDir);
        cfg->checkpointDir = g_strdup_printf("%s/checkpoint", cfg->libDir);
        cfg->autoDumpPath = g_strdup_printf("%s/dump", cfg->libDir);
        cfg->channelTargetDir = g_strdup_printf("%s/channel/target", cfg->libDir);
        cfg->nvramDir = g_strdup_printf("%s/nvram", cfg->libDir);
        cfg->memoryBackingDir = g_strdup_printf("%s/ram", cfg->libDir);
    } else if (privileged) {
155
        cfg->logDir = g_strdup_printf("%s/log/libvirt/qemu", LOCALSTATEDIR);
156

157 158
        cfg->swtpmLogDir = g_strdup_printf("%s/log/swtpm/libvirt/qemu",
                                           LOCALSTATEDIR);
159

160
        cfg->configBaseDir = g_strdup(SYSCONFDIR "/libvirt");
D
Daniel P. Berrange 已提交
161

162
        cfg->stateDir = g_strdup_printf("%s/libvirt/qemu", RUNSTATEDIR);
163

164
        cfg->swtpmStateDir = g_strdup_printf("%s/libvirt/qemu/swtpm", RUNSTATEDIR);
165

166
        cfg->cacheDir = g_strdup_printf("%s/cache/libvirt/qemu", LOCALSTATEDIR);
167

168 169 170 171 172 173 174 175 176 177
        cfg->libDir = g_strdup_printf("%s/lib/libvirt/qemu", LOCALSTATEDIR);
        cfg->saveDir = g_strdup_printf("%s/save", cfg->libDir);
        cfg->snapshotDir = g_strdup_printf("%s/snapshot", cfg->libDir);
        cfg->checkpointDir = g_strdup_printf("%s/checkpoint", cfg->libDir);
        cfg->autoDumpPath = g_strdup_printf("%s/dump", cfg->libDir);
        cfg->channelTargetDir = g_strdup_printf("%s/channel/target", cfg->libDir);
        cfg->nvramDir = g_strdup_printf("%s/nvram", cfg->libDir);
        cfg->memoryBackingDir = g_strdup_printf("%s/ram", cfg->libDir);
        cfg->swtpmStorageDir = g_strdup_printf("%s/lib/libvirt/swtpm",
                                               LOCALSTATEDIR);
M
Martin Kletzander 已提交
178
        if (!virDoesUserExist("tss") ||
179
            virGetUserID("tss", &cfg->swtpm_user) < 0)
180
            cfg->swtpm_user = 0; /* fall back to root */
M
Martin Kletzander 已提交
181
        if (!virDoesGroupExist("tss") ||
182
            virGetGroupID("tss", &cfg->swtpm_group) < 0)
183
            cfg->swtpm_group = 0; /* fall back to root */
184
    } else {
185 186
        g_autofree char *rundir = NULL;
        g_autofree char *cachedir = NULL;
187 188 189

        cachedir = virGetUserCacheDirectory();

190 191 192
        cfg->logDir = g_strdup_printf("%s/qemu/log", cachedir);
        cfg->swtpmLogDir = g_strdup_printf("%s/qemu/log", cachedir);
        cfg->cacheDir = g_strdup_printf("%s/qemu/cache", cachedir);
193

194
        rundir = virGetUserRuntimeDirectory();
195
        cfg->stateDir = g_strdup_printf("%s/qemu/run", rundir);
196

197
        cfg->swtpmStateDir = g_strdup_printf("%s/swtpm", cfg->stateDir);
198

199
        cfg->configBaseDir = virGetUserConfigDirectory();
200

201 202 203 204 205 206 207 208 209 210 211 212
        cfg->libDir = g_strdup_printf("%s/qemu/lib", cfg->configBaseDir);
        cfg->saveDir = g_strdup_printf("%s/qemu/save", cfg->configBaseDir);
        cfg->snapshotDir = g_strdup_printf("%s/qemu/snapshot", cfg->configBaseDir);
        cfg->checkpointDir = g_strdup_printf("%s/qemu/checkpoint",
                                             cfg->configBaseDir);
        cfg->autoDumpPath = g_strdup_printf("%s/qemu/dump", cfg->configBaseDir);
        cfg->channelTargetDir = g_strdup_printf("%s/qemu/channel/target",
                                                cfg->configBaseDir);
        cfg->nvramDir = g_strdup_printf("%s/qemu/nvram", cfg->configBaseDir);
        cfg->memoryBackingDir = g_strdup_printf("%s/qemu/ram", cfg->configBaseDir);
        cfg->swtpmStorageDir = g_strdup_printf("%s/qemu/swtpm",
                                               cfg->configBaseDir);
213 214 215 216 217 218 219 220 221 222
    }

    if (privileged) {
        if (!virDoesUserExist("tss") ||
            virGetUserID("tss", &cfg->swtpm_user) < 0)
            cfg->swtpm_user = 0; /* fall back to root */
        if (!virDoesGroupExist("tss") ||
            virGetGroupID("tss", &cfg->swtpm_group) < 0)
            cfg->swtpm_group = 0; /* fall back to root */
    } else {
223 224
        cfg->swtpm_user = (uid_t)-1;
        cfg->swtpm_group = (gid_t)-1;
225 226
    }

227 228 229
    cfg->configDir = g_strdup_printf("%s/qemu", cfg->configBaseDir);
    cfg->autostartDir = g_strdup_printf("%s/qemu/autostart", cfg->configBaseDir);
    cfg->slirpStateDir = g_strdup_printf("%s/slirp", cfg->stateDir);
230

231 232 233 234
    /* Set the default directory to find TLS X.509 certificates.
     * This will then be used as a fallback if the service specific
     * directory doesn't exist (although we don't check if this exists).
     */
235 236 237 238 239
    if (root == NULL) {
        cfg->defaultTLSx509certdir = g_strdup(SYSCONFDIR "pki/qemu");
    } else {
        cfg->defaultTLSx509certdir = g_strdup_printf("%s/etc/pki/qemu", root);
    }
240

241 242
    cfg->vncListen = g_strdup(VIR_LOOPBACK_IPV4_ADDR);
    cfg->spiceListen = g_strdup(VIR_LOOPBACK_IPV4_ADDR);
243 244 245 246

    cfg->remotePortMin = QEMU_REMOTE_PORT_MIN;
    cfg->remotePortMax = QEMU_REMOTE_PORT_MAX;

247 248 249
    cfg->webSocketPortMin = QEMU_WEBSOCKET_PORT_MIN;
    cfg->webSocketPortMax = QEMU_WEBSOCKET_PORT_MAX;

250 251 252
    cfg->migrationPortMin = QEMU_MIGRATION_PORT_MIN;
    cfg->migrationPortMax = QEMU_MIGRATION_PORT_MAX;

253
    /* For privileged driver, try and find hugetlbfs mounts automatically.
254
     * Non-privileged driver requires admin to create a dir for the
255
     * user, chown it, and then let user configure it manually. */
256
    if (privileged &&
257 258
        virFileFindHugeTLBFS(&cfg->hugetlbfs, &cfg->nhugetlbfs) < 0) {
        /* This however is not implemented on all platforms. */
259
        if (virGetLastErrorCode() != VIR_ERR_NO_SUPPORT)
260
            return NULL;
261
    }
262

263 264 265
    cfg->bridgeHelperName = g_strdup(QEMU_BRIDGE_HELPER);
    cfg->prHelperName = g_strdup(QEMU_PR_HELPER);
    cfg->slirpHelperName = g_strdup(QEMU_SLIRP_HELPER);
266
    cfg->dbusDaemonName = g_strdup(QEMU_DBUS_DAEMON);
267

268 269 270 271 272 273 274
    cfg->securityDefaultConfined = true;
    cfg->securityRequireConfined = false;

    cfg->keepAliveInterval = 5;
    cfg->keepAliveCount = 5;
    cfg->seccompSandbox = -1;

275
    cfg->logTimestamp = true;
276
    cfg->glusterDebugLevel = 4;
277
    cfg->stdioLogD = true;
278

279
    if (!(cfg->namespaces = virBitmapNew(QEMU_DOMAIN_NS_LAST)))
280
        return NULL;
281

282
    if (privileged &&
283
        qemuDomainNamespaceAvailable(QEMU_DOMAIN_NS_MOUNT) &&
284
        virBitmapSetBit(cfg->namespaces, QEMU_DOMAIN_NS_MOUNT) < 0)
285
        return NULL;
286

287 288 289
    if (virFirmwareParseList(DEFAULT_LOADER_NVRAM,
                             &cfg->firmwares,
                             &cfg->nfirmwares) < 0)
290
        return NULL;
291

J
Ján Tomko 已提交
292
    return g_steal_pointer(&cfg);
293 294 295 296 297 298 299
}


static void virQEMUDriverConfigDispose(void *obj)
{
    virQEMUDriverConfigPtr cfg = obj;

300
    virBitmapFree(cfg->namespaces);
301

302
    virStringListFree(cfg->cgroupDeviceACL);
303
    VIR_FREE(cfg->uri);
304
    VIR_FREE(cfg->root);
305 306 307 308 309

    VIR_FREE(cfg->configBaseDir);
    VIR_FREE(cfg->configDir);
    VIR_FREE(cfg->autostartDir);
    VIR_FREE(cfg->logDir);
310
    VIR_FREE(cfg->swtpmLogDir);
311
    VIR_FREE(cfg->stateDir);
312
    VIR_FREE(cfg->swtpmStateDir);
313
    VIR_FREE(cfg->slirpStateDir);
314 315 316 317 318

    VIR_FREE(cfg->libDir);
    VIR_FREE(cfg->cacheDir);
    VIR_FREE(cfg->saveDir);
    VIR_FREE(cfg->snapshotDir);
319
    VIR_FREE(cfg->checkpointDir);
320
    VIR_FREE(cfg->channelTargetDir);
321
    VIR_FREE(cfg->nvramDir);
322

323
    VIR_FREE(cfg->defaultTLSx509certdir);
324
    VIR_FREE(cfg->defaultTLSx509secretUUID);
325

326
    VIR_FREE(cfg->vncTLSx509certdir);
327
    VIR_FREE(cfg->vncTLSx509secretUUID);
328 329 330 331 332 333 334
    VIR_FREE(cfg->vncListen);
    VIR_FREE(cfg->vncPassword);
    VIR_FREE(cfg->vncSASLdir);

    VIR_FREE(cfg->spiceTLSx509certdir);
    VIR_FREE(cfg->spiceListen);
    VIR_FREE(cfg->spicePassword);
335
    VIR_FREE(cfg->spiceSASLdir);
336

337
    VIR_FREE(cfg->chardevTLSx509certdir);
338
    VIR_FREE(cfg->chardevTLSx509secretUUID);
339

340
    VIR_FREE(cfg->vxhsTLSx509certdir);
341
    VIR_FREE(cfg->nbdTLSx509certdir);
342

343 344 345
    VIR_FREE(cfg->migrateTLSx509certdir);
    VIR_FREE(cfg->migrateTLSx509secretUUID);

346 347 348 349 350
    while (cfg->nhugetlbfs) {
        cfg->nhugetlbfs--;
        VIR_FREE(cfg->hugetlbfs[cfg->nhugetlbfs].mnt_dir);
    }
    VIR_FREE(cfg->hugetlbfs);
351
    VIR_FREE(cfg->bridgeHelperName);
352
    VIR_FREE(cfg->prHelperName);
353
    VIR_FREE(cfg->slirpHelperName);
354
    VIR_FREE(cfg->dbusDaemonName);
355 356 357

    VIR_FREE(cfg->saveImageFormat);
    VIR_FREE(cfg->dumpImageFormat);
358
    VIR_FREE(cfg->snapshotImageFormat);
359 360
    VIR_FREE(cfg->autoDumpPath);

361
    virStringListFree(cfg->securityDriverNames);
362 363

    VIR_FREE(cfg->lockManagerName);
364

365
    virFirmwareFreeList(cfg->firmwares, cfg->nfirmwares);
366 367

    VIR_FREE(cfg->memoryBackingDir);
368
    VIR_FREE(cfg->swtpmStorageDir);
369 370

    virStringListFree(cfg->capabilityfilters);
371 372
}

373

374 375 376 377 378
static int
virQEMUDriverConfigHugeTLBFSInit(virHugeTLBFSPtr hugetlbfs,
                                 const char *path,
                                 bool deflt)
{
379 380
    hugetlbfs->mnt_dir = g_strdup(path);
    if (virFileGetHugepageSize(path, &hugetlbfs->size) < 0)
381
        return -1;
382 383

    hugetlbfs->deflt = deflt;
384
    return 0;
385 386 387
}


388 389 390 391 392 393 394 395
static int
virQEMUDriverConfigLoadDefaultTLSEntry(virQEMUDriverConfigPtr cfg,
                                       virConfPtr conf)
{
    int rv;

    if ((rv = virConfGetValueString(conf, "default_tls_x509_cert_dir", &cfg->defaultTLSx509certdir)) < 0)
        return -1;
396
    cfg->defaultTLSx509certdirPresent = (rv == 1);
397 398 399 400 401 402 403 404 405 406
    if (virConfGetValueBool(conf, "default_tls_x509_verify", &cfg->defaultTLSx509verify) < 0)
        return -1;
    if (virConfGetValueString(conf, "default_tls_x509_secret_uuid",
                              &cfg->defaultTLSx509secretUUID) < 0)
        return -1;

    return 0;
}


407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422
static int
virQEMUDriverConfigLoadVNCEntry(virQEMUDriverConfigPtr cfg,
                                virConfPtr conf)
{
    int rv;

    if (virConfGetValueBool(conf, "vnc_auto_unix_socket", &cfg->vncAutoUnixSocket) < 0)
        return -1;
    if (virConfGetValueBool(conf, "vnc_tls", &cfg->vncTLS) < 0)
        return -1;
    if ((rv = virConfGetValueBool(conf, "vnc_tls_x509_verify", &cfg->vncTLSx509verify)) < 0)
        return -1;
    if (rv == 1)
        cfg->vncTLSx509verifyPresent = true;
    if (virConfGetValueString(conf, "vnc_tls_x509_cert_dir", &cfg->vncTLSx509certdir) < 0)
        return -1;
423 424
    if (virConfGetValueString(conf, "vnc_tls_x509_secret_uuid", &cfg->vncTLSx509secretUUID) < 0)
        return -1;
425 426 427 428 429 430 431 432 433 434 435 436 437 438 439
    if (virConfGetValueString(conf, "vnc_listen", &cfg->vncListen) < 0)
        return -1;
    if (virConfGetValueString(conf, "vnc_password", &cfg->vncPassword) < 0)
        return -1;
    if (virConfGetValueBool(conf, "vnc_sasl", &cfg->vncSASL) < 0)
        return -1;
    if (virConfGetValueString(conf, "vnc_sasl_dir", &cfg->vncSASLdir) < 0)
        return -1;
    if (virConfGetValueBool(conf, "vnc_allow_host_audio", &cfg->vncAllowHostAudio) < 0)
        return -1;

    return 0;
}


440 441 442 443 444 445 446 447
static int
virQEMUDriverConfigLoadNographicsEntry(virQEMUDriverConfigPtr cfg,
                                       virConfPtr conf)
{
    return virConfGetValueBool(conf, "nographics_allow_host_audio", &cfg->nogfxAllowHostAudio);
}


448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470
static int
virQEMUDriverConfigLoadSPICEEntry(virQEMUDriverConfigPtr cfg,
                                  virConfPtr conf)
{
    if (virConfGetValueBool(conf, "spice_tls", &cfg->spiceTLS) < 0)
        return -1;
    if (virConfGetValueString(conf, "spice_tls_x509_cert_dir", &cfg->spiceTLSx509certdir) < 0)
        return -1;
    if (virConfGetValueBool(conf, "spice_sasl", &cfg->spiceSASL) < 0)
        return -1;
    if (virConfGetValueString(conf, "spice_sasl_dir", &cfg->spiceSASLdir) < 0)
        return -1;
    if (virConfGetValueString(conf, "spice_listen", &cfg->spiceListen) < 0)
        return -1;
    if (virConfGetValueString(conf, "spice_password", &cfg->spicePassword) < 0)
        return -1;
    if (virConfGetValueBool(conf, "spice_auto_unix_socket", &cfg->spiceAutoUnixSocket) < 0)
        return -1;

    return 0;
}


471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512
static int
virQEMUDriverConfigLoadSpecificTLSEntry(virQEMUDriverConfigPtr cfg,
                                        virConfPtr conf)
{
    int rv;

    if (virConfGetValueBool(conf, "vxhs_tls", &cfg->vxhsTLS) < 0)
        return -1;
    if (virConfGetValueString(conf, "vxhs_tls_x509_cert_dir", &cfg->vxhsTLSx509certdir) < 0)
        return -1;
    if (virConfGetValueBool(conf, "nbd_tls", &cfg->nbdTLS) < 0)
        return -1;
    if (virConfGetValueString(conf, "nbd_tls_x509_cert_dir", &cfg->nbdTLSx509certdir) < 0)
        return -1;

#define GET_CONFIG_TLS_CERTINFO(val) \
    do { \
        if ((rv = virConfGetValueBool(conf, #val "_tls_x509_verify", \
                                      &cfg->val## TLSx509verify)) < 0) \
            return -1; \
        if (rv == 1) \
            cfg->val## TLSx509verifyPresent = true; \
        if (virConfGetValueString(conf, #val "_tls_x509_cert_dir", \
                                  &cfg->val## TLSx509certdir) < 0) \
            return -1; \
        if (virConfGetValueString(conf, \
                                  #val "_tls_x509_secret_uuid", \
                                  &cfg->val## TLSx509secretUUID) < 0) \
            return -1; \
    } while (0)

    if (virConfGetValueBool(conf, "chardev_tls", &cfg->chardevTLS) < 0)
        return -1;
    GET_CONFIG_TLS_CERTINFO(chardev);

    GET_CONFIG_TLS_CERTINFO(migrate);

#undef GET_CONFIG_TLS_CERTINFO
    return 0;
}


513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583
static int
virQEMUDriverConfigLoadRemoteDisplayEntry(virQEMUDriverConfigPtr cfg,
                                          virConfPtr conf,
                                          const char *filename)
{
    if (virConfGetValueUInt(conf, "remote_websocket_port_min", &cfg->webSocketPortMin) < 0)
        return -1;
    if (cfg->webSocketPortMin < QEMU_WEBSOCKET_PORT_MIN) {
        /* if the port is too low, we can't get the display name
         * to tell to vnc (usually subtract 5700, e.g. localhost:1
         * for port 5701) */
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("%s: remote_websocket_port_min: port must be greater "
                         "than or equal to %d"),
                        filename, QEMU_WEBSOCKET_PORT_MIN);
        return -1;
    }

    if (virConfGetValueUInt(conf, "remote_websocket_port_max", &cfg->webSocketPortMax) < 0)
        return -1;
    if (cfg->webSocketPortMax > QEMU_WEBSOCKET_PORT_MAX ||
        cfg->webSocketPortMax < cfg->webSocketPortMin) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: remote_websocket_port_max: port must be between "
                          "the minimal port and %d"),
                       filename, QEMU_WEBSOCKET_PORT_MAX);
        return -1;
    }

    if (cfg->webSocketPortMin > cfg->webSocketPortMax) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: remote_websocket_port_min: min port must not be "
                          "greater than max port"), filename);
        return -1;
    }

    if (virConfGetValueUInt(conf, "remote_display_port_min", &cfg->remotePortMin) < 0)
        return -1;
    if (cfg->remotePortMin < QEMU_REMOTE_PORT_MIN) {
        /* if the port is too low, we can't get the display name
         * to tell to vnc (usually subtract 5900, e.g. localhost:1
         * for port 5901) */
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("%s: remote_display_port_min: port must be greater "
                         "than or equal to %d"),
                        filename, QEMU_REMOTE_PORT_MIN);
        return -1;
    }

    if (virConfGetValueUInt(conf, "remote_display_port_max", &cfg->remotePortMax) < 0)
        return -1;
    if (cfg->remotePortMax > QEMU_REMOTE_PORT_MAX ||
        cfg->remotePortMax < cfg->remotePortMin) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: remote_display_port_max: port must be between "
                          "the minimal port and %d"),
                       filename, QEMU_REMOTE_PORT_MAX);
        return -1;
    }

    if (cfg->remotePortMin > cfg->remotePortMax) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: remote_display_port_min: min port must not be "
                          "greater than max port"), filename);
        return -1;
    }

    return 0;
}


584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604
static int
virQEMUDriverConfigLoadSaveEntry(virQEMUDriverConfigPtr cfg,
                                 virConfPtr conf)
{
    if (virConfGetValueString(conf, "save_image_format", &cfg->saveImageFormat) < 0)
        return -1;
    if (virConfGetValueString(conf, "dump_image_format", &cfg->dumpImageFormat) < 0)
        return -1;
    if (virConfGetValueString(conf, "snapshot_image_format", &cfg->snapshotImageFormat) < 0)
        return -1;
    if (virConfGetValueString(conf, "auto_dump_path", &cfg->autoDumpPath) < 0)
        return -1;
    if (virConfGetValueBool(conf, "auto_dump_bypass_cache", &cfg->autoDumpBypassCache) < 0)
        return -1;
    if (virConfGetValueBool(conf, "auto_start_bypass_cache", &cfg->autoStartBypassCache) < 0)
        return -1;

    return 0;
}


605 606 607 608
static int
virQEMUDriverConfigLoadProcessEntry(virQEMUDriverConfigPtr cfg,
                                    virConfPtr conf)
{
609
    VIR_AUTOSTRINGLIST hugetlbfs = NULL;
610 611
    g_autofree char *stdioHandler = NULL;
    g_autofree char *corestr = NULL;
612 613 614 615
    size_t i;

    if (virConfGetValueStringList(conf, "hugetlbfs_mount", true,
                                  &hugetlbfs) < 0)
616
        return -1;
617 618 619 620 621 622 623 624 625 626 627
    if (hugetlbfs) {
        /* There already might be something autodetected. Avoid leaking it. */
        while (cfg->nhugetlbfs) {
            cfg->nhugetlbfs--;
            VIR_FREE(cfg->hugetlbfs[cfg->nhugetlbfs].mnt_dir);
        }
        VIR_FREE(cfg->hugetlbfs);

        cfg->nhugetlbfs = virStringListLength((const char *const *)hugetlbfs);
        if (hugetlbfs[0] &&
            VIR_ALLOC_N(cfg->hugetlbfs, cfg->nhugetlbfs) < 0)
628
            return -1;
629 630 631 632

        for (i = 0; hugetlbfs[i] != NULL; i++) {
            if (virQEMUDriverConfigHugeTLBFSInit(&cfg->hugetlbfs[i],
                                                 hugetlbfs[i], i != 0) < 0)
633
                return -1;
634 635 636 637
        }
    }

    if (virConfGetValueString(conf, "bridge_helper", &cfg->bridgeHelperName) < 0)
638
        return -1;
639 640

    if (virConfGetValueString(conf, "pr_helper", &cfg->prHelperName) < 0)
641
        return -1;
642

643 644 645
    if (virConfGetValueString(conf, "slirp_helper", &cfg->slirpHelperName) < 0)
        return -1;

646 647 648
    if (virConfGetValueString(conf, "dbus_daemon", &cfg->dbusDaemonName) < 0)
        return -1;

649
    if (virConfGetValueBool(conf, "set_process_name", &cfg->setProcessName) < 0)
650
        return -1;
651
    if (virConfGetValueUInt(conf, "max_processes", &cfg->maxProcesses) < 0)
652
        return -1;
653
    if (virConfGetValueUInt(conf, "max_files", &cfg->maxFiles) < 0)
654
        return -1;
655 656
    if (virConfGetValueUInt(conf, "max_threads_per_process", &cfg->maxThreadsPerProc) < 0)
        return -1;
657 658 659

    if (virConfGetValueType(conf, "max_core") == VIR_CONF_STRING) {
        if (virConfGetValueString(conf, "max_core", &corestr) < 0)
660
            return -1;
661 662 663 664 665 666
        if (STREQ(corestr, "unlimited")) {
            cfg->maxCore = ULLONG_MAX;
        } else {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unknown core size '%s'"),
                           corestr);
667
            return -1;
668 669
        }
    } else if (virConfGetValueULLong(conf, "max_core", &cfg->maxCore) < 0) {
670
        return -1;
671 672 673
    }

    if (virConfGetValueBool(conf, "dump_guest_core", &cfg->dumpGuestCore) < 0)
674
        return -1;
675
    if (virConfGetValueString(conf, "stdio_handler", &stdioHandler) < 0)
676
        return -1;
677 678 679 680 681 682 683 684 685
    if (stdioHandler) {
        if (STREQ(stdioHandler, "logd")) {
            cfg->stdioLogD = true;
        } else if (STREQ(stdioHandler, "file")) {
            cfg->stdioLogD = false;
        } else {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unknown stdio handler %s"),
                           stdioHandler);
686
            return -1;
687 688 689
        }
    }

690
    return 0;
691 692 693
}


694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719
static int
virQEMUDriverConfigLoadDeviceEntry(virQEMUDriverConfigPtr cfg,
                                   virConfPtr conf)
{
    bool tmp;
    int rv;

    if (virConfGetValueBool(conf, "mac_filter", &cfg->macFilter) < 0)
        return -1;

    if (virConfGetValueBool(conf, "relaxed_acs_check", &cfg->relaxedACS) < 0)
        return -1;
    if (virConfGetValueString(conf, "lock_manager", &cfg->lockManagerName) < 0)
        return -1;
    if ((rv = virConfGetValueBool(conf, "allow_disk_format_probing", &tmp)) < 0)
        return -1;
    if (rv == 1 && tmp) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("allow_disk_format_probing is no longer supported"));
        return -1;
    }

    return 0;
}


720 721 722 723 724 725 726 727 728 729 730 731 732 733 734
static int
virQEMUDriverConfigLoadRPCEntry(virQEMUDriverConfigPtr cfg,
                                virConfPtr conf)
{
    if (virConfGetValueUInt(conf, "max_queued", &cfg->maxQueuedJobs) < 0)
        return -1;
    if (virConfGetValueInt(conf, "keepalive_interval", &cfg->keepAliveInterval) < 0)
        return -1;
    if (virConfGetValueUInt(conf, "keepalive_count", &cfg->keepAliveCount) < 0)
        return -1;

    return 0;
}


735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789
static int
virQEMUDriverConfigLoadNetworkEntry(virQEMUDriverConfigPtr cfg,
                                    virConfPtr conf,
                                    const char *filename)
{
    if (virConfGetValueUInt(conf, "migration_port_min", &cfg->migrationPortMin) < 0)
        return -1;
    if (cfg->migrationPortMin <= 0) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("%s: migration_port_min: port must be greater than 0"),
                        filename);
        return -1;
    }

    if (virConfGetValueUInt(conf, "migration_port_max", &cfg->migrationPortMax) < 0)
        return -1;
    if (cfg->migrationPortMax > 65535 ||
        cfg->migrationPortMax < cfg->migrationPortMin) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: migration_port_max: port must be between "
                          "the minimal port %d and 65535"),
                       filename, cfg->migrationPortMin);
        return -1;
    }

    if (virConfGetValueString(conf, "migration_host", &cfg->migrateHost) < 0)
        return -1;
    virStringStripIPv6Brackets(cfg->migrateHost);
    if (cfg->migrateHost &&
        (STRPREFIX(cfg->migrateHost, "localhost") ||
         virSocketAddrIsNumericLocalhost(cfg->migrateHost))) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("migration_host must not be the address of"
                         " the local machine: %s"),
                       cfg->migrateHost);
        return -1;
    }

    if (virConfGetValueString(conf, "migration_address", &cfg->migrationAddress) < 0)
        return -1;
    virStringStripIPv6Brackets(cfg->migrationAddress);
    if (cfg->migrationAddress &&
        (STRPREFIX(cfg->migrationAddress, "localhost") ||
         virSocketAddrIsNumericLocalhost(cfg->migrationAddress))) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("migration_address must not be the address of"
                         " the local machine: %s"),
                       cfg->migrationAddress);
        return -1;
    }

    return 0;
}


790 791 792 793 794 795 796 797
static int
virQEMUDriverConfigLoadLogEntry(virQEMUDriverConfigPtr cfg,
                                virConfPtr conf)
{
    return virConfGetValueBool(conf, "log_timestamp", &cfg->logTimestamp);
}


798 799
static int
virQEMUDriverConfigLoadNVRAMEntry(virQEMUDriverConfigPtr cfg,
800 801
                                  virConfPtr conf,
                                  bool privileged)
802
{
803
    VIR_AUTOSTRINGLIST nvram = NULL;
804 805 806
    size_t i;

    if (virConfGetValueStringList(conf, "nvram", false, &nvram) < 0)
807
        return -1;
808
    if (nvram) {
809 810
        VIR_AUTOSTRINGLIST fwList = NULL;

811 812
        virFirmwareFreeList(cfg->firmwares, cfg->nfirmwares);

813 814 815 816 817 818 819 820 821 822 823
        if (qemuFirmwareFetchConfigs(&fwList, privileged) < 0)
            return -1;

        if (fwList) {
            VIR_WARN("Obsolete nvram variable is set while firmware metadata "
                     "files found. Note that the nvram config file variable is "
                     "going to be ignored.");
            cfg->nfirmwares = 0;
            return 0;
        }

824 825
        cfg->nfirmwares = virStringListLength((const char *const *)nvram);
        if (nvram[0] && VIR_ALLOC_N(cfg->firmwares, cfg->nfirmwares) < 0)
826
            return -1;
827 828 829

        for (i = 0; nvram[i] != NULL; i++) {
            if (VIR_ALLOC(cfg->firmwares[i]) < 0)
830
                return -1;
831
            if (virFirmwareParse(nvram[i], cfg->firmwares[i]) < 0)
832
                return -1;
833 834 835
        }
    }

836
    return 0;
837 838 839
}


840
static int
J
Ján Tomko 已提交
841 842
virQEMUDriverConfigLoadDebugEntry(virQEMUDriverConfigPtr cfg,
                                  virConfPtr conf)
843
{
J
Ján Tomko 已提交
844 845
    if (virConfGetValueUInt(conf, "gluster_debug_level", &cfg->glusterDebugLevel) < 0)
        return -1;
846 847
    if (virConfGetValueBool(conf, "virtiofsd_debug", &cfg->virtiofsdDebug) < 0)
        return -1;
J
Ján Tomko 已提交
848 849

    return 0;
850 851 852
}


853 854 855 856 857
static int
virQEMUDriverConfigLoadSecurityEntry(virQEMUDriverConfigPtr cfg,
                                     virConfPtr conf,
                                     bool privileged)
{
858 859
    VIR_AUTOSTRINGLIST controllers = NULL;
    VIR_AUTOSTRINGLIST namespaces = NULL;
860 861
    g_autofree char *user = NULL;
    g_autofree char *group = NULL;
862 863 864
    size_t i, j;

    if (virConfGetValueStringList(conf, "security_driver", true, &cfg->securityDriverNames) < 0)
865
        return -1;
866 867 868 869 870 871 872 873

    for (i = 0; cfg->securityDriverNames && cfg->securityDriverNames[i] != NULL; i++) {
        for (j = i + 1; cfg->securityDriverNames[j] != NULL; j++) {
            if (STREQ(cfg->securityDriverNames[i],
                      cfg->securityDriverNames[j])) {
                virReportError(VIR_ERR_CONF_SYNTAX,
                               _("Duplicate security driver %s"),
                               cfg->securityDriverNames[i]);
874
                return -1;
875 876 877 878 879
            }
        }
    }

    if (virConfGetValueBool(conf, "security_default_confined", &cfg->securityDefaultConfined) < 0)
880
        return -1;
881
    if (virConfGetValueBool(conf, "security_require_confined", &cfg->securityRequireConfined) < 0)
882
        return -1;
883 884

    if (virConfGetValueString(conf, "user", &user) < 0)
885
        return -1;
886
    if (user && virGetUserID(user, &cfg->user) < 0)
887
        return -1;
888 889

    if (virConfGetValueString(conf, "group", &group) < 0)
890
        return -1;
891
    if (group && virGetGroupID(group, &cfg->group) < 0)
892
        return -1;
893 894

    if (virConfGetValueBool(conf, "dynamic_ownership", &cfg->dynamicOwnership) < 0)
895
        return -1;
896

897 898 899
    if (virConfGetValueBool(conf, "remember_owner", &cfg->rememberOwner) < 0)
        return -1;

900 901
    if (virConfGetValueStringList(conf, "cgroup_controllers", false,
                                  &controllers) < 0)
902
        return -1;
903 904 905 906 907 908 909 910 911

    if (controllers) {
        cfg->cgroupControllers = 0;
        for (i = 0; controllers[i] != NULL; i++) {
            int ctl;
            if ((ctl = virCgroupControllerTypeFromString(controllers[i])) < 0) {
                virReportError(VIR_ERR_CONF_SYNTAX,
                               _("Unknown cgroup controller '%s'"),
                               controllers[i]);
912
                return -1;
913 914 915 916 917 918 919
            }
            cfg->cgroupControllers |= (1 << ctl);
        }
    }

    if (virConfGetValueStringList(conf, "cgroup_device_acl", false,
                                  &cfg->cgroupDeviceACL) < 0)
920
        return -1;
921 922

    if (virConfGetValueInt(conf, "seccomp_sandbox", &cfg->seccompSandbox) < 0)
923
        return -1;
924 925

    if (virConfGetValueStringList(conf, "namespaces", false, &namespaces) < 0)
926
        return -1;
927 928 929 930 931 932 933 934 935 936 937

    if (namespaces) {
        virBitmapClearAll(cfg->namespaces);

        for (i = 0; namespaces[i]; i++) {
            int ns = qemuDomainNamespaceTypeFromString(namespaces[i]);

            if (ns < 0) {
                virReportError(VIR_ERR_CONF_SYNTAX,
                               _("Unknown namespace: %s"),
                               namespaces[i]);
938
                return -1;
939 940 941 942 943
            }

            if (!privileged) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("cannot use namespaces in session mode"));
944
                return -1;
945 946 947 948 949 950
            }

            if (!qemuDomainNamespaceAvailable(ns)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("%s namespace is not available"),
                               namespaces[i]);
951
                return -1;
952 953 954 955 956 957
            }

            if (virBitmapSetBit(cfg->namespaces, ns) < 0) {
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("Unable to enable namespace: %s"),
                               namespaces[i]);
958
                return -1;
959 960 961 962
            }
        }
    }

963
    return 0;
964 965 966
}


967 968 969 970 971 972 973 974
static int
virQEMUDriverConfigLoadMemoryEntry(virQEMUDriverConfigPtr cfg,
                                   virConfPtr conf)
{
    return virConfGetValueString(conf, "memory_backing_dir", &cfg->memoryBackingDir);
}


975 976 977 978
static int
virQEMUDriverConfigLoadSWTPMEntry(virQEMUDriverConfigPtr cfg,
                                  virConfPtr conf)
{
979 980
    g_autofree char *swtpm_user = NULL;
    g_autofree char *swtpm_group = NULL;
981 982

    if (virConfGetValueString(conf, "swtpm_user", &swtpm_user) < 0)
983
        return -1;
984
    if (swtpm_user && virGetUserID(swtpm_user, &cfg->swtpm_user) < 0)
985
        return -1;
986 987

    if (virConfGetValueString(conf, "swtpm_group", &swtpm_group) < 0)
988
        return -1;
989
    if (swtpm_group && virGetGroupID(swtpm_group, &cfg->swtpm_group) < 0)
990
        return -1;
991

992
    return 0;
993 994 995
}


996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007
static int
virQEMUDriverConfigLoadCapsFiltersEntry(virQEMUDriverConfigPtr cfg,
                                        virConfPtr conf)
{
    if (virConfGetValueStringList(conf, "capability_filters", false,
                                  &cfg->capabilityfilters) < 0)
        return -1;

    return 0;
}


1008
int virQEMUDriverConfigLoadFile(virQEMUDriverConfigPtr cfg,
1009 1010
                                const char *filename,
                                bool privileged)
1011
{
J
Ján Tomko 已提交
1012
    g_autoptr(virConf) conf = NULL;
1013

D
Daniel P. Berrange 已提交
1014 1015 1016
    /* Just check the file is readable before opening it, otherwise
     * libvirt emits an error.
     */
1017
    if (access(filename, R_OK) == -1) {
1018
        VIR_INFO("Could not read qemu config file %s", filename);
1019
        return 0;
1020
    }
D
Daniel P. Berrange 已提交
1021

1022
    if (!(conf = virConfReadFile(filename, 0)))
1023
        return -1;
D
Daniel P. Berrange 已提交
1024

1025
    if (virQEMUDriverConfigLoadDefaultTLSEntry(cfg, conf) < 0)
1026
        return -1;
1027

1028
    if (virQEMUDriverConfigLoadVNCEntry(cfg, conf) < 0)
1029
        return -1;
1030 1031

    if (virQEMUDriverConfigLoadNographicsEntry(cfg, conf) < 0)
1032
        return -1;
1033

1034
    if (virQEMUDriverConfigLoadSPICEEntry(cfg, conf) < 0)
1035
        return -1;
1036

1037
    if (virQEMUDriverConfigLoadSpecificTLSEntry(cfg, conf) < 0)
1038
        return -1;
1039

1040
    if (virQEMUDriverConfigLoadRemoteDisplayEntry(cfg, conf, filename) < 0)
1041
        return -1;
1042

1043
    if (virQEMUDriverConfigLoadSaveEntry(cfg, conf) < 0)
1044
        return -1;
1045

1046
    if (virQEMUDriverConfigLoadProcessEntry(cfg, conf) < 0)
1047
        return -1;
1048

1049
    if (virQEMUDriverConfigLoadDeviceEntry(cfg, conf) < 0)
1050
        return -1;
1051

1052
    if (virQEMUDriverConfigLoadRPCEntry(cfg, conf) < 0)
1053
        return -1;
1054

1055
    if (virQEMUDriverConfigLoadNetworkEntry(cfg, conf, filename) < 0)
1056
        return -1;
1057

1058
    if (virQEMUDriverConfigLoadLogEntry(cfg, conf) < 0)
1059
        return -1;
1060

1061
    if (virQEMUDriverConfigLoadNVRAMEntry(cfg, conf, privileged) < 0)
1062
        return -1;
1063

J
Ján Tomko 已提交
1064
    if (virQEMUDriverConfigLoadDebugEntry(cfg, conf) < 0)
1065
        return -1;
1066

1067
    if (virQEMUDriverConfigLoadSecurityEntry(cfg, conf, privileged) < 0)
1068
        return -1;
1069

1070
    if (virQEMUDriverConfigLoadMemoryEntry(cfg, conf) < 0)
1071
        return -1;
1072

1073
    if (virQEMUDriverConfigLoadSWTPMEntry(cfg, conf) < 0)
1074
        return -1;
1075

1076
    if (virQEMUDriverConfigLoadCapsFiltersEntry(cfg, conf) < 0)
1077
        return -1;
1078

1079
    return 0;
D
Daniel P. Berrange 已提交
1080
}
1081

1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092

/**
 * @cfg: Recently read config values
 *
 * Validate the recently read configuration values.
 *
 * Returns 0 on success, -1 on failure
 */
int
virQEMUDriverConfigValidate(virQEMUDriverConfigPtr cfg)
{
1093
    if (cfg->defaultTLSx509certdirPresent) {
1094 1095 1096 1097 1098 1099 1100 1101 1102
        if (!virFileExists(cfg->defaultTLSx509certdir)) {
            virReportError(VIR_ERR_CONF_SYNTAX,
                           _("default_tls_x509_cert_dir directory '%s' "
                             "does not exist"),
                           cfg->defaultTLSx509certdir);
            return -1;
        }
    }

1103
    if (cfg->vncTLSx509certdir &&
1104 1105 1106 1107 1108 1109 1110
        !virFileExists(cfg->vncTLSx509certdir)) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("vnc_tls_x509_cert_dir directory '%s' does not exist"),
                       cfg->vncTLSx509certdir);
        return -1;
    }

1111
    if (cfg->spiceTLSx509certdir &&
1112 1113 1114 1115 1116 1117 1118
        !virFileExists(cfg->spiceTLSx509certdir)) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("spice_tls_x509_cert_dir directory '%s' does not exist"),
                       cfg->spiceTLSx509certdir);
        return -1;
    }

1119
    if (cfg->chardevTLSx509certdir &&
1120 1121 1122 1123 1124 1125 1126
        !virFileExists(cfg->chardevTLSx509certdir)) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("chardev_tls_x509_cert_dir directory '%s' does not exist"),
                       cfg->chardevTLSx509certdir);
        return -1;
    }

1127
    if (cfg->migrateTLSx509certdir &&
1128 1129 1130 1131 1132
        !virFileExists(cfg->migrateTLSx509certdir)) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("migrate_tls_x509_cert_dir directory '%s' does not exist"),
                       cfg->migrateTLSx509certdir);
        return -1;
1133 1134
    }

1135
    if (cfg->vxhsTLSx509certdir &&
1136 1137 1138 1139 1140
        !virFileExists(cfg->vxhsTLSx509certdir)) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("vxhs_tls_x509_cert_dir directory '%s' does not exist"),
                       cfg->vxhsTLSx509certdir);
        return -1;
1141 1142
    }

1143
    if (cfg->nbdTLSx509certdir &&
1144 1145 1146 1147 1148 1149 1150
        !virFileExists(cfg->nbdTLSx509certdir)) {
        virReportError(VIR_ERR_CONF_SYNTAX,
                       _("nbd_tls_x509_cert_dir directory '%s' does not exist"),
                       cfg->nbdTLSx509certdir);
        return -1;
    }

1151 1152 1153 1154
    return 0;
}


1155 1156 1157
int
virQEMUDriverConfigSetDefaults(virQEMUDriverConfigPtr cfg)
{
1158 1159 1160 1161 1162
#define SET_TLS_SECRET_UUID_DEFAULT(val) \
    do { \
        if (!cfg->val## TLSx509certdir && \
            !cfg->val## TLSx509secretUUID && \
            cfg->defaultTLSx509secretUUID) { \
1163
            cfg->val## TLSx509secretUUID = g_strdup(cfg->defaultTLSx509secretUUID); \
1164 1165 1166
        } \
    } while (0)

1167
    SET_TLS_SECRET_UUID_DEFAULT(vnc);
1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184
    SET_TLS_SECRET_UUID_DEFAULT(chardev);
    SET_TLS_SECRET_UUID_DEFAULT(migrate);

#undef SET_TLS_SECRET_UUID_DEFAULT

    /*
     * If a "SYSCONFDIR" + "pki/libvirt-<val>" exists, then assume someone
     * has created a val specific area to place service specific certificates.
     *
     * If the service specific directory doesn't exist, 'assume' that the
     * user has created and populated the "SYSCONFDIR" + "pki/libvirt-default".
     */
#define SET_TLS_X509_CERT_DEFAULT(val) \
    do { \
        if (cfg->val ## TLSx509certdir) \
            break; \
        if (virFileExists(SYSCONFDIR "/pki/libvirt-"#val)) { \
1185
            cfg->val ## TLSx509certdir = g_strdup(SYSCONFDIR "/pki/libvirt-"#val); \
1186
        } else { \
1187
            cfg->val ## TLSx509certdir = g_strdup(cfg->defaultTLSx509certdir); \
1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199
        } \
    } while (0)

    SET_TLS_X509_CERT_DEFAULT(vnc);
    SET_TLS_X509_CERT_DEFAULT(spice);
    SET_TLS_X509_CERT_DEFAULT(chardev);
    SET_TLS_X509_CERT_DEFAULT(migrate);
    SET_TLS_X509_CERT_DEFAULT(vxhs);
    SET_TLS_X509_CERT_DEFAULT(nbd);

#undef SET_TLS_X509_CERT_DEFAULT

1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211
#define SET_TLS_VERIFY_DEFAULT(val) \
    do { \
        if (!cfg->val## TLSx509verifyPresent) \
            cfg->val## TLSx509verify = cfg->defaultTLSx509verify; \
    } while (0)

    SET_TLS_VERIFY_DEFAULT(vnc);
    SET_TLS_VERIFY_DEFAULT(chardev);
    SET_TLS_VERIFY_DEFAULT(migrate);

#undef SET_TLS_VERIFY_DEFAULT

1212
    return 0;
1213 1214 1215
}


1216 1217
virQEMUDriverConfigPtr virQEMUDriverGetConfig(virQEMUDriverPtr driver)
{
1218 1219 1220 1221 1222
    virQEMUDriverConfigPtr conf;
    qemuDriverLock(driver);
    conf = virObjectRef(driver->config);
    qemuDriverUnlock(driver);
    return conf;
1223 1224
}

1225 1226 1227 1228 1229 1230
bool
virQEMUDriverIsPrivileged(virQEMUDriverPtr driver)
{
    return driver->privileged;
}

1231
virDomainXMLOptionPtr
1232 1233
virQEMUDriverCreateXMLConf(virQEMUDriverPtr driver,
                           const char *defsecmodel)
1234
{
1235
    virQEMUDriverDomainDefParserConfig.priv = driver;
1236
    virQEMUDriverDomainDefParserConfig.defSecModel = defsecmodel;
1237
    return virDomainXMLOptionNew(&virQEMUDriverDomainDefParserConfig,
1238
                                 &virQEMUDriverPrivateDataCallbacks,
1239
                                 &virQEMUDriverDomainXMLNamespace,
1240
                                 &virQEMUDriverDomainABIStability,
1241
                                 &virQEMUDriverDomainSaveCookie);
1242 1243
}

1244

1245 1246 1247
virCapsHostNUMAPtr
virQEMUDriverGetHostNUMACaps(virQEMUDriverPtr driver)
{
1248 1249
    virCapsHostNUMAPtr hostnuma;

1250 1251 1252 1253 1254
    qemuDriverLock(driver);

    if (!driver->hostnuma)
        driver->hostnuma = virCapabilitiesHostNUMANewHost();

1255 1256
    hostnuma = driver->hostnuma;

1257 1258
    qemuDriverUnlock(driver);

1259 1260
    if (hostnuma)
        virCapabilitiesHostNUMARef(hostnuma);
1261

1262
    return hostnuma;
1263 1264 1265
}


1266 1267 1268
virCPUDefPtr
virQEMUDriverGetHostCPU(virQEMUDriverPtr driver)
{
1269 1270
    virCPUDefPtr hostcpu;

1271 1272 1273 1274 1275
    qemuDriverLock(driver);

    if (!driver->hostcpu)
        driver->hostcpu = virCPUProbeHost(virArchFromHost());

1276 1277
    hostcpu = driver->hostcpu;

1278 1279
    qemuDriverUnlock(driver);

1280 1281
    if (hostcpu)
        virCPUDefRef(hostcpu);
1282

1283
    return hostcpu;
1284 1285 1286
}


1287 1288
virCapsPtr virQEMUDriverCreateCapabilities(virQEMUDriverPtr driver)
{
1289
    size_t i, j;
1290
    g_autoptr(virCaps) caps = NULL;
1291
    g_autofree virSecurityManagerPtr *sec_managers = NULL;
1292
    /* Security driver data */
1293 1294 1295
    const char *doi, *model, *lbl, *type;
    const int virtTypes[] = {VIR_DOMAIN_VIRT_KVM,
                             VIR_DOMAIN_VIRT_QEMU,};
1296 1297

    /* Basic host arch / guest machine capabilities */
1298
    if (!(caps = virQEMUCapsInit(driver->qemuCapsCache)))
1299
        return NULL;
1300 1301 1302 1303

    if (virGetHostUUID(caps->host.host_uuid)) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("cannot get the host uuid"));
1304
        return NULL;
1305 1306 1307
    }

    /* access sec drivers and create a sec model for each one */
1308
    if (!(sec_managers = qemuSecurityGetNested(driver->securityManager)))
1309
        return NULL;
1310 1311 1312 1313 1314 1315 1316

    /* calculate length */
    for (i = 0; sec_managers[i]; i++)
        ;
    caps->host.nsecModels = i;

    if (VIR_ALLOC_N(caps->host.secModels, caps->host.nsecModels) < 0)
1317
        return NULL;
1318 1319

    for (i = 0; sec_managers[i]; i++) {
1320
        virCapsHostSecModelPtr sm = &caps->host.secModels[i];
1321 1322
        doi = qemuSecurityGetDOI(sec_managers[i]);
        model = qemuSecurityGetModel(sec_managers[i]);
1323 1324
        sm->model = g_strdup(model);
        sm->doi = g_strdup(doi);
1325

1326
        for (j = 0; j < G_N_ELEMENTS(virtTypes); j++) {
1327
            lbl = qemuSecurityGetBaseLabel(sec_managers[i], virtTypes[j]);
1328 1329 1330
            type = virDomainVirtTypeToString(virtTypes[j]);
            if (lbl &&
                virCapabilitiesHostSecModelAddBaseLabel(sm, type, lbl) < 0)
1331
                return NULL;
1332 1333
        }

1334 1335 1336 1337
        VIR_DEBUG("Initialized caps for security driver \"%s\" with "
                  "DOI \"%s\"", model, doi);
    }

1338
    caps->host.numa = virQEMUDriverGetHostNUMACaps(driver);
1339
    caps->host.cpu = virQEMUDriverGetHostCPU(driver);
J
Ján Tomko 已提交
1340
    return g_steal_pointer(&caps);
1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357
}


/**
 * virQEMUDriverGetCapabilities:
 *
 * Get a reference to the virCapsPtr instance for the
 * driver. If @refresh is true, the capabilities will be
 * rebuilt first
 *
 * The caller must release the reference with virObjetUnref
 *
 * Returns: a reference to a virCapsPtr instance or NULL
 */
virCapsPtr virQEMUDriverGetCapabilities(virQEMUDriverPtr driver,
                                        bool refresh)
{
1358
    virCapsPtr ret = NULL;
1359 1360 1361 1362 1363
    if (refresh) {
        virCapsPtr caps = NULL;
        if ((caps = virQEMUDriverCreateCapabilities(driver)) == NULL)
            return NULL;

1364
        qemuDriverLock(driver);
1365 1366
        virObjectUnref(driver->caps);
        driver->caps = caps;
1367 1368
    } else {
        qemuDriverLock(driver);
1369

1370 1371 1372 1373 1374 1375 1376
        if (driver->caps == NULL ||
            driver->caps->nguests == 0) {
            VIR_DEBUG("Capabilities didn't detect any guests. Forcing a "
                      "refresh.");
            qemuDriverUnlock(driver);
            return virQEMUDriverGetCapabilities(driver, true);
        }
1377 1378
    }

1379 1380 1381
    ret = virObjectRef(driver->caps);
    qemuDriverUnlock(driver);
    return ret;
1382 1383
}

1384 1385 1386 1387

/**
 * virQEMUDriverGetDomainCapabilities:
 *
1388 1389 1390 1391 1392
 * Get a reference to the virDomainCapsPtr instance from the virQEMUCapsPtr
 * domCapsCache. If there's no domcaps in the cache, create a new instance,
 * add it to the cache, and return a reference.
 *
 * The caller must release the reference with virObjetUnref
1393 1394 1395 1396 1397 1398 1399 1400 1401 1402
 *
 * Returns: a reference to a virDomainCapsPtr instance or NULL
 */
virDomainCapsPtr
virQEMUDriverGetDomainCapabilities(virQEMUDriverPtr driver,
                                   virQEMUCapsPtr qemuCaps,
                                   const char *machine,
                                   virArch arch,
                                   virDomainVirtType virttype)
{
1403
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
1404

1405 1406 1407 1408 1409 1410 1411 1412
    return virQEMUCapsGetDomainCapsCache(qemuCaps,
                                         machine,
                                         arch,
                                         virttype,
                                         driver->hostarch,
                                         driver->privileged,
                                         cfg->firmwares,
                                         cfg->nfirmwares);
1413 1414 1415
}


1416
struct _qemuSharedDeviceEntry {
1417 1418 1419 1420
    size_t ref;
    char **domains; /* array of domain names */
};

1421
/* Construct the hash key for sharedDevices as "major:minor" */
1422
char *
1423
qemuGetSharedDeviceKey(const char *device_path)
1424 1425 1426 1427 1428
{
    int maj, min;
    char *key = NULL;
    int rc;

1429
    if ((rc = virGetDeviceID(device_path, &maj, &min)) < 0) {
1430 1431
        virReportSystemError(-rc,
                             _("Unable to get minor number of device '%s'"),
1432
                             device_path);
1433 1434 1435
        return NULL;
    }

1436
    key = g_strdup_printf("%d:%d", maj, min);
1437 1438 1439 1440

    return key;
}

1441 1442 1443
/*
 * Make necessary checks for the need to check and for the current setting
 * of the 'unpriv_sgio' value for the device_path passed.
1444
 *
1445 1446 1447 1448 1449 1450
 * Returns:
 *  0 - Success
 * -1 - Some failure which would already have been messaged
 * -2 - Mismatch with the "shared" sgio setting - needs to be messaged
 *      by caller since it has context of which type of disk resource is
 *      being used and in the future the hostdev information.
1451 1452
 */
static int
1453 1454 1455
qemuCheckUnprivSGIO(virHashTablePtr sharedDevices,
                    const char *device_path,
                    int sgio)
1456
{
1457 1458
    g_autofree char *sysfs_path = NULL;
    g_autofree char *key = NULL;
1459
    int val;
1460

1461
    if (!(sysfs_path = virGetUnprivSGIOSysfsPath(device_path, NULL)))
1462
        return -1;
1463

1464
    /* It can't be conflict if unpriv_sgio is not supported by kernel. */
1465 1466
    if (!virFileExists(sysfs_path))
        return 0;
1467

1468
    if (!(key = qemuGetSharedDeviceKey(device_path)))
1469
        return -1;
1470

1471
    /* It can't be conflict if no other domain is sharing it. */
1472 1473
    if (!(virHashLookup(sharedDevices, key)))
        return 0;
1474

1475
    if (virGetDeviceUnprivSGIO(device_path, NULL, &val) < 0)
1476
        return -1;
1477

1478 1479 1480
    /* Error message on failure needs to be handled in caller
     * since there is more specific knowledge of device
     */
1481
    if (!((val == 0 &&
1482 1483
           (sgio == VIR_DOMAIN_DEVICE_SGIO_FILTERED ||
            sgio == VIR_DOMAIN_DEVICE_SGIO_DEFAULT)) ||
1484
          (val == 1 &&
1485
           sgio == VIR_DOMAIN_DEVICE_SGIO_UNFILTERED))) {
1486
        return -2;
1487 1488
    }

1489
    return 0;
1490
}
1491

1492

1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531
/* Check if a shared device's setting conflicts with the conf
 * used by other domain(s). Currently only checks the sgio
 * setting. Note that this should only be called for disk with
 * block source if the device type is disk.
 *
 * Returns 0 if no conflicts, otherwise returns -1.
 */
static int
qemuCheckSharedDisk(virHashTablePtr sharedDevices,
                    virDomainDiskDefPtr disk)
{
    int ret;

    if (disk->device != VIR_DOMAIN_DISK_DEVICE_LUN)
        return 0;

    if ((ret = qemuCheckUnprivSGIO(sharedDevices, disk->src->path,
                                   disk->sgio)) < 0) {
        if (ret == -2) {
            if (virDomainDiskGetType(disk) == VIR_STORAGE_TYPE_VOLUME) {
                virReportError(VIR_ERR_OPERATION_INVALID,
                               _("sgio of shared disk 'pool=%s' 'volume=%s' "
                                 "conflicts with other active domains"),
                               disk->src->srcpool->pool,
                               disk->src->srcpool->volume);
            } else {
                virReportError(VIR_ERR_OPERATION_INVALID,
                               _("sgio of shared disk '%s' conflicts with "
                                 "other active domains"),
                               disk->src->path);
            }
        }
        return -1;
    }

    return 0;
}


1532
bool
1533 1534 1535
qemuSharedDeviceEntryDomainExists(qemuSharedDeviceEntryPtr entry,
                                  const char *name,
                                  int *idx)
1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550
{
    size_t i;

    for (i = 0; i < entry->ref; i++) {
        if (STREQ(entry->domains[i], name)) {
            if (idx)
                *idx = i;
            return true;
        }
    }

    return false;
}

void
1551
qemuSharedDeviceEntryFree(void *payload)
1552
{
1553
    qemuSharedDeviceEntryPtr entry = payload;
1554 1555
    size_t i;

1556 1557 1558
    if (!entry)
        return;

1559
    for (i = 0; i < entry->ref; i++)
1560 1561 1562 1563 1564
        VIR_FREE(entry->domains[i]);
    VIR_FREE(entry->domains);
    VIR_FREE(entry);
}

1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576

static int
qemuSharedDeviceEntryInsert(virQEMUDriverPtr driver,
                            const char *key,
                            const char *name)
{
    qemuSharedDeviceEntry *entry = NULL;

    if ((entry = virHashLookup(driver->sharedDevices, key))) {
        /* Nothing to do if the shared scsi host device is already
         * recorded in the table.
         */
J
Ján Tomko 已提交
1577
        if (!qemuSharedDeviceEntryDomainExists(entry, name, NULL)) {
1578
            if (VIR_EXPAND_N(entry->domains, entry->ref, 1) < 0) {
J
Ján Tomko 已提交
1579 1580 1581 1582
                /* entry is owned by the hash table here */
                entry = NULL;
                goto error;
            }
1583
            entry->domains[entry->ref - 1] = g_strdup(name);
1584 1585 1586
        }
    } else {
        if (VIR_ALLOC(entry) < 0 ||
1587
            VIR_ALLOC_N(entry->domains, 1) < 0)
J
Ján Tomko 已提交
1588
            goto error;
1589

1590 1591
        entry->domains[0] = g_strdup(name);

1592 1593
        entry->ref = 1;

1594
        if (virHashAddEntry(driver->sharedDevices, key, entry) < 0)
J
Ján Tomko 已提交
1595
            goto error;
1596 1597
    }

J
Ján Tomko 已提交
1598
    return 0;
1599

J
Ján Tomko 已提交
1600
 error:
1601
    qemuSharedDeviceEntryFree(entry);
J
Ján Tomko 已提交
1602
    return -1;
1603 1604
}

1605

1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620
static int
qemuSharedDeviceEntryRemove(virQEMUDriverPtr driver,
                            const char *key,
                            const char *name)
{
    qemuSharedDeviceEntryPtr entry = NULL;
    int idx;

    if (!(entry = virHashLookup(driver->sharedDevices, key)))
        return -1;

    /* Nothing to do if the shared disk is not recored in the table. */
    if (!qemuSharedDeviceEntryDomainExists(entry, name, &idx))
        return 0;

1621 1622
    if (entry->ref != 1) {
        VIR_FREE(entry->domains[idx]);
1623
        VIR_DELETE_ELEMENT(entry->domains, idx, entry->ref);
1624
    } else {
1625
        ignore_value(virHashRemoveEntry(driver->sharedDevices, key));
1626
    }
1627 1628 1629 1630 1631 1632

    return 0;
}


static int
1633
qemuSharedDiskAddRemoveInternal(virQEMUDriverPtr driver,
1634 1635 1636
                                virDomainDiskDefPtr disk,
                                const char *name,
                                bool addDisk)
1637
{
1638
    g_autofree char *key = NULL;
1639
    int ret = -1;
1640

1641 1642 1643
    if (virStorageSourceIsEmpty(disk->src) ||
        !disk->src->shared ||
        !virStorageSourceIsBlockLocal(disk->src))
1644
        return 0;
1645

1646
    qemuDriverLock(driver);
1647

1648 1649 1650
    if (!(key = qemuGetSharedDeviceKey(virDomainDiskGetSource(disk))))
        goto cleanup;

1651 1652 1653
    if (addDisk) {
        if (qemuCheckSharedDisk(driver->sharedDevices, disk) < 0)
            goto cleanup;
1654

1655 1656 1657 1658 1659 1660
        if (qemuSharedDeviceEntryInsert(driver, key, name) < 0)
            goto cleanup;
    } else {
        if (qemuSharedDeviceEntryRemove(driver, key, name) < 0)
            goto cleanup;
    }
1661

1662
    ret = 0;
1663 1664 1665 1666 1667 1668
 cleanup:
    qemuDriverUnlock(driver);
    return ret;
}


1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682
/* qemuAddSharedDisk:
 * @driver: Pointer to qemu driver struct
 * @src: disk source
 * @name: The domain name
 *
 * Increase ref count and add the domain name into the list which
 * records all the domains that use the shared device if the entry
 * already exists, otherwise add a new entry.
 */
int
qemuAddSharedDisk(virQEMUDriverPtr driver,
                  virDomainDiskDefPtr disk,
                  const char *name)
{
1683
    return qemuSharedDiskAddRemoveInternal(driver, disk, name, true);
1684 1685 1686
}


1687 1688 1689 1690
static bool
qemuIsSharedHostdev(virDomainHostdevDefPtr hostdev)
{
    return (hostdev->shareable &&
1691 1692 1693
            (virHostdevIsSCSIDevice(hostdev) &&
             hostdev->source.subsys.u.scsi.protocol !=
             VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI));
1694 1695 1696
}


1697
static char *
J
John Ferlan 已提交
1698
qemuGetHostdevPath(virDomainHostdevDefPtr hostdev)
1699 1700 1701
{
    virDomainHostdevSubsysSCSIPtr scsisrc = &hostdev->source.subsys.u.scsi;
    virDomainHostdevSubsysSCSIHostPtr scsihostsrc = &scsisrc->u.host;
1702
    g_autofree char *dev_name = NULL;
1703
    char *dev_path = NULL;
1704

1705 1706 1707 1708 1709
    if (!(dev_name = virSCSIDeviceGetDevName(NULL,
                                             scsihostsrc->adapter,
                                             scsihostsrc->bus,
                                             scsihostsrc->target,
                                             scsihostsrc->unit)))
1710
        return NULL;
1711

1712
    dev_path = g_strdup_printf("/dev/%s", dev_name);
J
John Ferlan 已提交
1713 1714 1715 1716
    return dev_path;
}


1717
static int
1718
qemuSharedHostdevAddRemoveInternal(virQEMUDriverPtr driver,
1719 1720 1721
                                   virDomainHostdevDefPtr hostdev,
                                   const char *name,
                                   bool addDevice)
1722
{
1723 1724
    g_autofree char *dev_path = NULL;
    g_autofree char *key = NULL;
1725 1726
    int ret = -1;

1727
    if (!qemuIsSharedHostdev(hostdev))
1728 1729
        return 0;

1730 1731 1732
    if (!(dev_path = qemuGetHostdevPath(hostdev)) ||
        !(key = qemuGetSharedDeviceKey(dev_path)))
        return -1;
1733 1734

    qemuDriverLock(driver);
1735 1736 1737 1738 1739 1740

    if (addDevice)
        ret = qemuSharedDeviceEntryInsert(driver, key, name);
    else
        ret = qemuSharedDeviceEntryRemove(driver, key, name);

1741 1742
    qemuDriverUnlock(driver);

1743
    return ret;
1744 1745
}

1746
static int
1747
qemuSharedDeviceAddRemoveInternal(virQEMUDriverPtr driver,
1748 1749 1750 1751 1752 1753 1754 1755 1756
                                  virDomainDeviceDefPtr dev,
                                  const char *name,
                                  bool addDevice)
{
    /* Currently the only conflicts we have to care about for
     * the shared disk and shared host device is "sgio" setting,
     * which is only valid for block disk and scsi host device.
     */
    if (dev->type == VIR_DOMAIN_DEVICE_DISK)
1757
        return qemuSharedDiskAddRemoveInternal(driver, dev->data.disk,
1758 1759
                                               name, addDevice);
    else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV)
1760
        return qemuSharedHostdevAddRemoveInternal(driver, dev->data.hostdev,
1761 1762 1763 1764 1765
                                                  name, addDevice);
    else
        return 0;
}

1766

1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780
/* qemuAddSharedDevice:
 * @driver: Pointer to qemu driver struct
 * @dev: The device def
 * @name: The domain name
 *
 * Increase ref count and add the domain name into the list which
 * records all the domains that use the shared device if the entry
 * already exists, otherwise add a new entry.
 */
int
qemuAddSharedDevice(virQEMUDriverPtr driver,
                    virDomainDeviceDefPtr dev,
                    const char *name)
{
1781
    return qemuSharedDeviceAddRemoveInternal(driver, dev, name, true);
1782 1783
}

1784

1785
int
1786 1787 1788
qemuRemoveSharedDisk(virQEMUDriverPtr driver,
                     virDomainDiskDefPtr disk,
                     const char *name)
1789
{
1790
    return qemuSharedDiskAddRemoveInternal(driver, disk, name, false);
1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807
}


/* qemuRemoveSharedDevice:
 * @driver: Pointer to qemu driver struct
 * @device: The device def
 * @name: The domain name
 *
 * Decrease ref count and remove the domain name from the list which
 * records all the domains that use the shared device if ref is not
 * 1, otherwise remove the entry.
 */
int
qemuRemoveSharedDevice(virQEMUDriverPtr driver,
                       virDomainDeviceDefPtr dev,
                       const char *name)
{
1808
    return qemuSharedDeviceAddRemoveInternal(driver, dev, name, false);
1809 1810 1811
}


1812
int
1813
qemuSetUnprivSGIO(virDomainDeviceDefPtr dev)
1814
{
1815 1816
    virDomainDiskDefPtr disk = NULL;
    virDomainHostdevDefPtr hostdev = NULL;
1817
    g_autofree char *sysfs_path = NULL;
1818
    const char *path = NULL;
1819
    int val = -1;
1820 1821 1822 1823

    /* "sgio" is only valid for block disk; cdrom
     * and floopy disk can have empty source.
     */
1824 1825 1826
    if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
        disk = dev->data.disk;

1827
        if (disk->device != VIR_DOMAIN_DISK_DEVICE_LUN ||
1828
            !virStorageSourceIsBlockLocal(disk->src))
1829 1830
            return 0;

1831
        path = virDomainDiskGetSource(disk);
1832 1833 1834
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
        hostdev = dev->data.hostdev;

1835 1836
        if (!qemuIsSharedHostdev(hostdev))
            return 0;
1837

1838
        if (hostdev->source.subsys.u.scsi.sgio) {
1839 1840 1841
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("'sgio' is not supported for SCSI "
                             "generic device yet "));
1842
            return -1;
1843
        }
1844

1845
        return 0;
1846
    } else {
1847
        return 0;
1848
    }
1849

1850
    if (!(sysfs_path = virGetUnprivSGIOSysfsPath(path, NULL)))
1851
        return -1;
1852 1853

    /* By default, filter the SG_IO commands, i.e. set unpriv_sgio to 0.  */
1854
    val = (disk->sgio == VIR_DOMAIN_DEVICE_SGIO_UNFILTERED);
1855 1856 1857 1858 1859

    /* Do not do anything if unpriv_sgio is not supported by the kernel and the
     * whitelist is enabled.  But if requesting unfiltered access, always call
     * virSetDeviceUnprivSGIO, to report an error for unsupported unpriv_sgio.
     */
1860 1861
    if ((virFileExists(sysfs_path) || val == 1) &&
        virSetDeviceUnprivSGIO(path, NULL, val) < 0)
1862
        return -1;
1863

1864
    return 0;
1865
}
1866

1867 1868
int qemuDriverAllocateID(virQEMUDriverPtr driver)
{
J
Ján Tomko 已提交
1869
    return g_atomic_int_add(&driver->lastvmid, 1) + 1;
1870
}
1871

1872 1873

int
1874
qemuTranslateSnapshotDiskSourcePool(virDomainSnapshotDiskDefPtr def)
1875
{
1876
    if (def->src->type != VIR_STORAGE_TYPE_VOLUME)
1877 1878 1879 1880 1881 1882
        return 0;

    virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                   _("Snapshots are not yet supported with 'pool' volumes"));
    return -1;
}
1883 1884

char *
1885
qemuGetBaseHugepagePath(virHugeTLBFSPtr hugepage)
1886 1887 1888
{
    char *ret;

1889
    ret = g_strdup_printf("%s/libvirt/qemu", hugepage->mnt_dir);
1890 1891 1892 1893

    return ret;
}

1894

1895 1896 1897 1898
char *
qemuGetDomainHugepagePath(const virDomainDef *def,
                          virHugeTLBFSPtr hugepage)
{
1899 1900
    g_autofree char *base = qemuGetBaseHugepagePath(hugepage);
    g_autofree char *domPath = virDomainDefGetShortName(def);
1901
    char *ret = NULL;
1902 1903

    if (base && domPath)
1904
        ret = g_strdup_printf("%s/%s", base, domPath);
1905 1906 1907 1908
    return ret;
}


1909
/**
1910
 * qemuGetDomainHupageMemPath: Construct HP enabled memory backend path
1911 1912 1913 1914 1915 1916 1917
 *
 * The resulting path is stored at @memPath.
 *
 * Returns 0 on success,
 *        -1 otherwise.
 */
int
1918 1919 1920 1921
qemuGetDomainHupageMemPath(const virDomainDef *def,
                           virQEMUDriverConfigPtr cfg,
                           unsigned long long pagesize,
                           char **memPath)
1922 1923 1924 1925 1926 1927 1928 1929 1930 1931
{
    size_t i = 0;

    if (!cfg->nhugetlbfs) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("hugetlbfs filesystem is not mounted "
                               "or disabled by administrator config"));
        return -1;
    }

1932 1933 1934 1935
    for (i = 0; i < cfg->nhugetlbfs; i++) {
        if (cfg->hugetlbfs[i].size == pagesize)
            break;
    }
1936

1937 1938 1939 1940 1941 1942
    if (i == cfg->nhugetlbfs) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Unable to find any usable hugetlbfs "
                         "mount for %llu KiB"),
                       pagesize);
        return -1;
1943 1944
    }

1945 1946 1947
    if (!(*memPath = qemuGetDomainHugepagePath(def, &cfg->hugetlbfs[i])))
        return -1;

1948 1949
    return 0;
}
1950 1951


1952
void
1953 1954 1955
qemuGetMemoryBackingBasePath(virQEMUDriverConfigPtr cfg,
                             char **path)
{
1956
    *path = g_strdup_printf("%s/libvirt/qemu", cfg->memoryBackingDir);
1957 1958 1959 1960 1961 1962 1963 1964
}


int
qemuGetMemoryBackingDomainPath(const virDomainDef *def,
                               virQEMUDriverConfigPtr cfg,
                               char **path)
{
1965 1966
    g_autofree char *shortName = NULL;
    g_autofree char *base = NULL;
1967

1968
    if (!(shortName = virDomainDefGetShortName(def)))
1969
        return -1;
1970

1971 1972 1973
    qemuGetMemoryBackingBasePath(cfg, &base);
    *path = g_strdup_printf("%s/%s", base, shortName);

1974
    return 0;
1975 1976 1977
}


1978 1979
/**
 * qemuGetMemoryBackingPath:
1980
 * @def: domain definition
1981
 * @cfg: the driver config
1982
 * @alias: memory object alias
1983 1984 1985 1986 1987 1988 1989 1990
 * @memPath: constructed path
 *
 * Constructs path to memory backing dir and stores it at @memPath.
 *
 * Returns: 0 on success,
 *          -1 otherwise (with error reported).
 */
int
1991 1992 1993
qemuGetMemoryBackingPath(const virDomainDef *def,
                         virQEMUDriverConfigPtr cfg,
                         const char *alias,
1994 1995
                         char **memPath)
{
1996
    g_autofree char *domainPath = NULL;
1997 1998 1999 2000 2001

    if (!alias) {
        /* This should never happen (TM) */
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("memory device alias is not assigned"));
2002
        return -1;
2003 2004
    }

2005
    if (qemuGetMemoryBackingDomainPath(def, cfg, &domainPath) < 0)
2006
        return -1;
2007

2008
    *memPath = g_strdup_printf("%s/%s", domainPath, alias);
2009
    return 0;
2010
}