qemu_driver.c 265.8 KB
Newer Older
D
Daniel P. Berrange 已提交
1 2 3
/*
 * driver.c: core driver methods for managing qemu guests
 *
4
 * Copyright (C) 2006, 2007, 2008, 2009, 2010 Red Hat, Inc.
D
Daniel P. Berrange 已提交
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307  USA
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

24
#include <config.h>
25

D
Daniel P. Berrange 已提交
26 27
#include <sys/types.h>
#include <sys/poll.h>
28
#include <sys/time.h>
D
Daniel P. Berrange 已提交
29 30 31
#include <dirent.h>
#include <limits.h>
#include <string.h>
32
#include <stdbool.h>
D
Daniel P. Berrange 已提交
33 34 35 36 37 38
#include <stdio.h>
#include <strings.h>
#include <stdarg.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
39
#include <sys/utsname.h>
40 41 42 43
#include <sys/stat.h>
#include <fcntl.h>
#include <signal.h>
#include <paths.h>
44 45
#include <pwd.h>
#include <stdio.h>
46
#include <sys/wait.h>
47
#include <sys/ioctl.h>
48
#include <sys/un.h>
D
Daniel P. Berrange 已提交
49

50
#include "virterror_internal.h"
51
#include "logging.h"
52
#include "datatypes.h"
53 54
#include "qemu_driver.h"
#include "qemu_conf.h"
55
#include "qemu_monitor.h"
56
#include "qemu_monitor_text.h"
57
#include "qemu_bridge_filter.h"
J
Jim Meyering 已提交
58
#include "c-ctype.h"
59
#include "event.h"
60
#include "buf.h"
61
#include "util.h"
62
#include "nodeinfo.h"
63
#include "stats_linux.h"
64
#include "capabilities.h"
65
#include "memory.h"
66
#include "uuid.h"
67
#include "domain_conf.h"
68 69
#include "node_device_conf.h"
#include "pci.h"
70
#include "hostusb.h"
71
#include "processinfo.h"
72 73
#include "qemu_security_stacked.h"
#include "qemu_security_dac.h"
74
#include "cgroup.h"
C
Chris Lalancette 已提交
75
#include "libvirt_internal.h"
76
#include "xml.h"
77
#include "cpu/cpu.h"
78

79

80 81
#define VIR_FROM_THIS VIR_FROM_QEMU

82 83 84
typedef struct _qemuDomainObjPrivate qemuDomainObjPrivate;
typedef qemuDomainObjPrivate *qemuDomainObjPrivatePtr;
struct _qemuDomainObjPrivate {
85 86 87 88 89
    virCond jobCond; /* Use in conjunction with main virDomainObjPtr lock */
    int jobActive; /* Non-zero if a job is active. Only 1 job is allowed at any time
                    * A job includes *all* monitor commands, even those just querying
                    * information, not merely actions */

90
    qemuMonitorPtr mon;
91
    virDomainChrDefPtr monConfig;
D
Daniel P. Berrange 已提交
92
    int monJSON;
93 94 95

    int nvcpupids;
    int *vcpupids;
96 97

    qemuDomainPCIAddressSetPtr pciaddrs;
98 99
};

100 101
static int qemudShutdown(void);

102 103
static void qemuDriverLock(struct qemud_driver *driver)
{
104
    virMutexLock(&driver->lock);
105 106 107
}
static void qemuDriverUnlock(struct qemud_driver *driver)
{
108
    virMutexUnlock(&driver->lock);
109 110
}

111 112 113
static void qemuDomainEventFlush(int timer, void *opaque);
static void qemuDomainEventQueue(struct qemud_driver *driver,
                                 virDomainEventPtr event);
114

115 116
static int qemudStartVMDaemon(virConnectPtr conn,
                              struct qemud_driver *driver,
117
                              virDomainObjPtr vm,
118 119
                              const char *migrateFrom,
                              int stdin_fd);
120

121 122
static void qemudShutdownVMDaemon(virConnectPtr conn,
                                  struct qemud_driver *driver,
123
                                  virDomainObjPtr vm);
124

125
static int qemudDomainGetMaxVcpus(virDomainPtr dom);
126

127
static int qemuDetectVcpuPIDs(virConnectPtr conn,
128
                              struct qemud_driver *driver,
129
                              virDomainObjPtr vm);
130

131 132 133
static int qemuUpdateActivePciHostdevs(struct qemud_driver *driver,
                                       virDomainDefPtr def);

J
Jim Meyering 已提交
134
static struct qemud_driver *qemu_driver = NULL;
135

136 137 138 139 140 141 142 143 144 145 146 147 148 149 150

static void *qemuDomainObjPrivateAlloc(void)
{
    qemuDomainObjPrivatePtr priv;

    if (VIR_ALLOC(priv) < 0)
        return NULL;

    return priv;
}

static void qemuDomainObjPrivateFree(void *data)
{
    qemuDomainObjPrivatePtr priv = data;

151
    qemuDomainPCIAddressSetFree(priv->pciaddrs);
152 153 154
    virDomainChrDefFree(priv->monConfig);
    VIR_FREE(priv->vcpupids);

155 156 157 158 159 160 161 162 163
    /* This should never be non-NULL if we get here, but just in case... */
    if (priv->mon) {
        VIR_ERROR0("Unexpected QEMU monitor still active during domain deletion");
        qemuMonitorClose(priv->mon);
    }
    VIR_FREE(priv);
}


164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181
static int qemuDomainObjPrivateXMLFormat(virBufferPtr buf, void *data)
{
    qemuDomainObjPrivatePtr priv = data;
    const char *monitorpath;

    /* priv->monitor_chr is set only for qemu */
    if (priv->monConfig) {
        switch (priv->monConfig->type) {
        case VIR_DOMAIN_CHR_TYPE_UNIX:
            monitorpath = priv->monConfig->data.nix.path;
            break;
        default:
        case VIR_DOMAIN_CHR_TYPE_PTY:
            monitorpath = priv->monConfig->data.file.path;
            break;
        }

        virBufferEscapeString(buf, "  <monitor path='%s'", monitorpath);
D
Daniel P. Berrange 已提交
182 183
        if (priv->monJSON)
            virBufferAddLit(buf, " json='1'");
184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213
        virBufferVSprintf(buf, " type='%s'/>\n",
                          virDomainChrTypeToString(priv->monConfig->type));
    }


    if (priv->nvcpupids) {
        int i;
        virBufferAddLit(buf, "  <vcpus>\n");
        for (i = 0 ; i < priv->nvcpupids ; i++) {
            virBufferVSprintf(buf, "    <vcpu pid='%d'/>\n", priv->vcpupids[i]);
        }
        virBufferAddLit(buf, "  </vcpus>\n");
    }

    return 0;
}

static int qemuDomainObjPrivateXMLParse(xmlXPathContextPtr ctxt, void *data)
{
    qemuDomainObjPrivatePtr priv = data;
    char *monitorpath;
    char *tmp;
    int n, i;
    xmlNodePtr *nodes = NULL;

    if (VIR_ALLOC(priv->monConfig) < 0) {
        virReportOOMError(NULL);
        goto error;
    }

214 215 216 217 218
    if (!(priv->monConfig->info.alias = strdup("monitor"))) {
        virReportOOMError(NULL);
        goto error;
    }

219 220 221 222 223 224 225 226 227 228 229 230 231 232
    if (!(monitorpath =
          virXPathString(NULL, "string(./monitor[1]/@path)", ctxt))) {
        qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("no monitor path"));
        goto error;
    }

    tmp = virXPathString(NULL, "string(./monitor[1]/@type)", ctxt);
    if (tmp)
        priv->monConfig->type = virDomainChrTypeFromString(tmp);
    else
        priv->monConfig->type = VIR_DOMAIN_CHR_TYPE_PTY;
    VIR_FREE(tmp);

233
    if (virXPathBoolean(NULL, "count(./monitor[@json = '1']) > 0", ctxt)) {
D
Daniel P. Berrange 已提交
234
        priv->monJSON = 1;
235 236 237
    } else {
        priv->monJSON = 0;
    }
D
Daniel P. Berrange 已提交
238

239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280
    switch (priv->monConfig->type) {
    case VIR_DOMAIN_CHR_TYPE_PTY:
        priv->monConfig->data.file.path = monitorpath;
        break;
    case VIR_DOMAIN_CHR_TYPE_UNIX:
        priv->monConfig->data.nix.path = monitorpath;
        break;
    default:
        VIR_FREE(monitorpath);
        qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unsupported monitor type '%s'"),
                         virDomainChrTypeToString(priv->monConfig->type));
        goto error;
    }

    n = virXPathNodeSet(NULL, "./vcpus/vcpu", ctxt, &nodes);
    if (n < 0)
        goto error;
    if (n) {
        priv->nvcpupids = n;
        if (VIR_REALLOC_N(priv->vcpupids, priv->nvcpupids) < 0) {
            virReportOOMError(NULL);
            goto error;
        }

        for (i = 0 ; i < n ; i++) {
            char *pidstr = virXMLPropString(nodes[i], "pid");
            if (!pidstr)
                goto error;

            if (virStrToLong_i(pidstr, NULL, 10, &(priv->vcpupids[i])) < 0) {
                VIR_FREE(pidstr);
                goto error;
            }
            VIR_FREE(pidstr);
        }
        VIR_FREE(nodes);
    }

    return 0;

error:
281 282
    virDomainChrDefFree(priv->monConfig);
    priv->monConfig = NULL;
283 284 285 286 287 288
    VIR_FREE(nodes);
    return -1;
}



289 290 291 292 293 294 295 296 297
/*
 * obj must be locked before calling, qemud_driver must NOT be locked
 *
 * This must be called by anything that will change the VM state
 * in any way, or anything that will use the QEMU monitor.
 *
 * Upon successful return, the object will have its ref count increased,
 * successful calls must be followed by EndJob eventually
 */
298 299 300 301

/* Give up waiting for mutex after 30 seconds */
#define QEMU_JOB_WAIT_TIME (1000ull * 30)

302 303 304 305
static int qemuDomainObjBeginJob(virDomainObjPtr obj) ATTRIBUTE_RETURN_CHECK;
static int qemuDomainObjBeginJob(virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
306 307 308 309 310 311 312 313 314 315
    struct timeval now;
    unsigned long long then;

    if (gettimeofday(&now, NULL) < 0) {
        virReportSystemError(NULL, errno, "%s",
                             _("cannot get time of day"));
        return -1;
    }
    then = (now.tv_sec * 1000ull) + (now.tv_usec / 1000);
    then += QEMU_JOB_WAIT_TIME;
316 317 318 319

    virDomainObjRef(obj);

    while (priv->jobActive) {
320
        if (virCondWaitUntil(&priv->jobCond, &obj->lock, then) < 0) {
321
            virDomainObjUnref(obj);
322 323 324 325 326 327
            if (errno == ETIMEDOUT)
                qemudReportError(NULL, NULL, NULL, VIR_ERR_OPERATION_TIMEOUT,
                                 "%s", _("cannot acquire state change lock"));
            else
                virReportSystemError(NULL, errno,
                                     "%s", _("cannot acquire job mutex"));
328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347
            return -1;
        }
    }
    priv->jobActive = 1;

    return 0;
}

/*
 * obj must be locked before calling, qemud_driver must be locked
 *
 * This must be called by anything that will change the VM state
 * in any way, or anything that will use the QEMU monitor.
 */
static int qemuDomainObjBeginJobWithDriver(struct qemud_driver *driver,
                                           virDomainObjPtr obj) ATTRIBUTE_RETURN_CHECK;
static int qemuDomainObjBeginJobWithDriver(struct qemud_driver *driver,
                                           virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
348 349 350 351 352 353 354 355 356 357
    struct timeval now;
    unsigned long long then;

    if (gettimeofday(&now, NULL) < 0) {
        virReportSystemError(NULL, errno, "%s",
                             _("cannot get time of day"));
        return -1;
    }
    then = (now.tv_sec * 1000ull) + (now.tv_usec / 1000);
    then += QEMU_JOB_WAIT_TIME;
358 359 360 361 362

    virDomainObjRef(obj);
    qemuDriverUnlock(driver);

    while (priv->jobActive) {
363
        if (virCondWaitUntil(&priv->jobCond, &obj->lock, then) < 0) {
364
            virDomainObjUnref(obj);
365 366 367 368 369 370
            if (errno == ETIMEDOUT)
                qemudReportError(NULL, NULL, NULL, VIR_ERR_OPERATION_TIMEOUT,
                                 "%s", _("cannot acquire state change lock"));
            else
                virReportSystemError(NULL, errno,
                                     "%s", _("cannot acquire job mutex"));
M
Matthias Bolte 已提交
371
            qemuDriverLock(driver);
372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388
            return -1;
        }
    }
    priv->jobActive = 1;

    virDomainObjUnlock(obj);
    qemuDriverLock(driver);
    virDomainObjLock(obj);

    return 0;
}

/*
 * obj must be locked before calling, qemud_driver does not matter
 *
 * To be called after completing the work associated with the
 * earlier  qemuDomainBeginJob() call
389 390 391
 *
 * Returns remaining refcount on 'obj', maybe 0 to indicated it
 * was deleted
392
 */
393
static int ATTRIBUTE_RETURN_CHECK qemuDomainObjEndJob(virDomainObjPtr obj)
394 395 396 397 398 399
{
    qemuDomainObjPrivatePtr priv = obj->privateData;

    priv->jobActive = 0;
    virCondSignal(&priv->jobCond);

400
    return virDomainObjUnref(obj);
401 402 403 404 405 406 407 408 409 410 411
}


/*
 * obj must be locked before calling, qemud_driver must be unlocked
 *
 * To be called immediately before any QEMU monitor API call
 * Must have alrady called qemuDomainObjBeginJob().
 *
 * To be followed with qemuDomainObjExitMonitor() once complete
 */
412 413 414 415 416
static void qemuDomainObjEnterMonitor(virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;

    qemuMonitorLock(priv->mon);
417
    qemuMonitorRef(priv->mon);
418
    virDomainObjUnlock(obj);
419 420 421
}


422 423 424 425
/* obj must NOT be locked before calling, qemud_driver must be unlocked
 *
 * Should be paired with an earlier  qemuDomainObjEnterMonitor() call
 */
426 427 428
static void qemuDomainObjExitMonitor(virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
429 430 431 432 433 434
    int refs;

    refs = qemuMonitorUnref(priv->mon);

    if (refs > 0)
        qemuMonitorUnlock(priv->mon);
435

436
    virDomainObjLock(obj);
437 438 439 440 441

    if (refs == 0) {
        virDomainObjUnref(obj);
        priv->mon = NULL;
    }
442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457
}


/*
 * obj must be locked before calling, qemud_driver must be locked
 *
 * To be called immediately before any QEMU monitor API call
 * Must have alrady called qemuDomainObjBeginJob().
 *
 * To be followed with qemuDomainObjExitMonitorWithDriver() once complete
 */
static void qemuDomainObjEnterMonitorWithDriver(struct qemud_driver *driver, virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;

    qemuMonitorLock(priv->mon);
458
    qemuMonitorRef(priv->mon);
459 460 461 462 463 464 465 466 467 468 469 470 471
    virDomainObjUnlock(obj);
    qemuDriverUnlock(driver);
}


/* obj must NOT be locked before calling, qemud_driver must be unlocked,
 * and will be locked after returning
 *
 * Should be paired with an earlier  qemuDomainObjEnterMonitor() call
 */
static void qemuDomainObjExitMonitorWithDriver(struct qemud_driver *driver, virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
472 473 474 475 476 477
    int refs;

    refs = qemuMonitorUnref(priv->mon);

    if (refs > 0)
        qemuMonitorUnlock(priv->mon);
478 479 480

    qemuDriverLock(driver);
    virDomainObjLock(obj);
481 482 483 484 485

    if (refs == 0) {
        virDomainObjUnref(obj);
        priv->mon = NULL;
    }
486 487 488
}


489 490 491 492 493 494 495 496 497
static int qemuCgroupControllerActive(struct qemud_driver *driver,
                                      int controller)
{
    if (driver->cgroup == NULL)
        return 0;
    if (driver->cgroupControllers & (1 << controller))
        return 1;
    return 0;
}
498

499
static int
500
qemudLogFD(virConnectPtr conn, struct qemud_driver *driver, const char* name)
501 502 503
{
    char logfile[PATH_MAX];
    mode_t logmode;
G
Guido Günther 已提交
504
    int ret, fd = -1;
505

506 507
    if ((ret = snprintf(logfile, sizeof(logfile), "%s/%s.log",
                        driver->logDir, name))
G
Guido Günther 已提交
508
        < 0 || ret >= sizeof(logfile)) {
509
        virReportOOMError(conn);
510 511 512 513
        return -1;
    }

    logmode = O_CREAT | O_WRONLY;
514 515
    /* Only logrotate files in /var/log, so only append if running privileged */
    if (driver->privileged)
516
        logmode |= O_APPEND;
517 518 519
    else
        logmode |= O_TRUNC;

520
    if ((fd = open(logfile, logmode, S_IRUSR | S_IWUSR)) < 0) {
521 522 523
        virReportSystemError(conn, errno,
                             _("failed to create logfile %s"),
                             logfile);
524 525
        return -1;
    }
526
    if (virSetCloseExec(fd) < 0) {
527 528
        virReportSystemError(conn, errno, "%s",
                             _("Unable to set VM logfile close-on-exec flag"));
529 530 531 532 533 534 535
        close(fd);
        return -1;
    }
    return fd;
}


536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552
static int
qemudLogReadFD(virConnectPtr conn, const char* logDir, const char* name, off_t pos)
{
    char logfile[PATH_MAX];
    mode_t logmode = O_RDONLY;
    int ret, fd = -1;

    if ((ret = snprintf(logfile, sizeof(logfile), "%s/%s.log", logDir, name))
        < 0 || ret >= sizeof(logfile)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("failed to build logfile name %s/%s.log"),
                         logDir, name);
        return -1;
    }


    if ((fd = open(logfile, logmode)) < 0) {
553 554 555
        virReportSystemError(conn, errno,
                             _("failed to create logfile %s"),
                             logfile);
556 557
        return -1;
    }
558
    if (virSetCloseExec(fd) < 0) {
559 560
        virReportSystemError(conn, errno, "%s",
                             _("Unable to set VM logfile close-on-exec flag"));
561 562 563
        close(fd);
        return -1;
    }
564 565
    if (pos < 0 || lseek(fd, pos, SEEK_SET) < 0) {
      virReportSystemError(conn, pos < 0 ? 0 : errno,
566 567
                             _("Unable to seek to %lld in %s"),
                             (long long) pos, logfile);
568 569 570 571 572 573
        close(fd);
    }
    return fd;
}


574 575 576 577 578 579 580 581 582 583 584 585
struct qemuAutostartData {
    struct qemud_driver *driver;
    virConnectPtr conn;
};
static void
qemuAutostartDomain(void *payload, const char *name ATTRIBUTE_UNUSED, void *opaque)
{
    virDomainObjPtr vm = payload;
    struct qemuAutostartData *data = opaque;

    virDomainObjLock(vm);
    if (vm->autostart &&
D
Daniel P. Berrange 已提交
586
        !virDomainObjIsActive(vm)) {
587 588 589 590 591 592
        int ret;

        virResetLastError();
        ret = qemudStartVMDaemon(data->conn, data->driver, vm, NULL, -1);
        if (ret < 0) {
            virErrorPtr err = virGetLastError();
593
            VIR_ERROR(_("Failed to autostart VM '%s': %s"),
594 595 596 597 598 599 600 601 602 603 604 605 606 607
                      vm->def->name,
                      err ? err->message : "");
        } else {
            virDomainEventPtr event =
                virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STARTED,
                                         VIR_DOMAIN_EVENT_STARTED_BOOTED);
            if (event)
                qemuDomainEventQueue(data->driver, event);
        }
    }
    virDomainObjUnlock(vm);
}

608 609
static void
qemudAutostartConfigs(struct qemud_driver *driver) {
610 611 612 613 614
    /* XXX: Figure out a better way todo this. The domain
     * startup code needs a connection handle in order
     * to lookup the bridge associated with a virtual
     * network
     */
615 616 617
    virConnectPtr conn = virConnectOpen(driver->privileged ?
                                        "qemu:///system" :
                                        "qemu:///session");
618
    /* Ignoring NULL conn which is mostly harmless here */
619
    struct qemuAutostartData data = { driver, conn };
620

621
    qemuDriverLock(driver);
622
    virHashForEach(driver->domains.objs, qemuAutostartDomain, &data);
623
    qemuDriverUnlock(driver);
624

625 626
    if (conn)
        virConnectClose(conn);
627 628
}

629 630 631 632 633 634 635 636 637 638 639 640 641

/**
 * qemudRemoveDomainStatus
 *
 * remove all state files of a domain from statedir
 *
 * Returns 0 on success
 */
static int
qemudRemoveDomainStatus(virConnectPtr conn,
                        struct qemud_driver *driver,
                        virDomainObjPtr vm)
{
642
    char ebuf[1024];
643 644 645
    char *file = NULL;

    if (virAsprintf(&file, "%s/%s.xml", driver->stateDir, vm->def->name) < 0) {
646
        virReportOOMError(conn);
D
Daniel Veillard 已提交
647
        return(-1);
648 649
    }

650 651
    if (unlink(file) < 0 && errno != ENOENT && errno != ENOTDIR)
        VIR_WARN(_("Failed to remove domain XML for %s: %s"),
D
Daniel Veillard 已提交
652 653 654
                 vm->def->name, virStrerror(errno, ebuf, sizeof(ebuf)));
    VIR_FREE(file);

655 656 657
    if (virFileDeletePid(driver->stateDir, vm->def->name) != 0)
        VIR_WARN(_("Failed to remove PID file for %s: %s"),
                 vm->def->name, virStrerror(errno, ebuf, sizeof(ebuf)));
658

D
Daniel Veillard 已提交
659

660
    return 0;
661 662
}

663 664 665 666 667 668 669 670 671 672 673 674 675 676

/*
 * This is a callback registered with a qemuMonitorPtr  instance,
 * and to be invoked when the monitor console hits an end of file
 * condition, or error, thus indicating VM shutdown should be
 * performed
 */
static void
qemuHandleMonitorEOF(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                     virDomainObjPtr vm,
                     int hasError) {
    struct qemud_driver *driver = qemu_driver;
    virDomainEventPtr event = NULL;

677
    VIR_DEBUG("Received EOF on %p '%s'", vm, vm->def->name);
678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699
    virDomainObjLock(vm);

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     hasError ?
                                     VIR_DOMAIN_EVENT_STOPPED_FAILED :
                                     VIR_DOMAIN_EVENT_STOPPED_SHUTDOWN);

    qemudShutdownVMDaemon(NULL, driver, vm);
    if (!vm->persistent)
        virDomainRemoveInactive(&driver->domains, vm);
    else
        virDomainObjUnlock(vm);

    if (event) {
        qemuDriverLock(driver);
        qemuDomainEventQueue(driver, event);
        qemuDriverUnlock(driver);
    }
}


700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741
static virStorageEncryptionPtr
findDomainDiskEncryption(virConnectPtr conn, virDomainObjPtr vm,
                         const char *path)
{
    bool seen_volume;
    int i;

    seen_volume = false;
    for (i = 0; i < vm->def->ndisks; i++) {
        virDomainDiskDefPtr disk;

        disk = vm->def->disks[i];
        if (disk->src != NULL && STREQ(disk->src, path)) {
            seen_volume = true;
            if (disk->encryption != NULL)
                return disk->encryption;
        }
    }
    if (seen_volume)
        qemudReportError(conn, NULL, NULL, VIR_ERR_INVALID_DOMAIN,
                         _("missing <encryption> for volume %s"), path);
    else
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unexpected passphrase request for volume %s"),
                         path);
    return NULL;
}


static int
findVolumeQcowPassphrase(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                         virConnectPtr conn,
                         virDomainObjPtr vm,
                         const char *path,
                         char **secretRet,
                         size_t *secretLen)
{
    virStorageEncryptionPtr enc;
    virSecretPtr secret;
    char *passphrase;
    unsigned char *data;
    size_t size;
742 743
    int ret = -1;

744
    virDomainObjLock(vm);
745 746 747 748

    if (!conn) {
        qemudReportError(NULL, NULL, NULL, VIR_ERR_NO_SUPPORT,
                         "%s", _("cannot find secrets without a connection"));
749
        goto cleanup;
750 751 752 753 754 755 756
    }

    if (conn->secretDriver == NULL ||
        conn->secretDriver->lookupByUUID == NULL ||
        conn->secretDriver->getValue == NULL) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_NO_SUPPORT, "%s",
                         _("secret storage not supported"));
757
        goto cleanup;
758 759 760 761 762 763 764 765 766 767 768 769
    }

    enc = findDomainDiskEncryption(conn, vm, path);
    if (enc == NULL)
        return -1;

    if (enc->format != VIR_STORAGE_ENCRYPTION_FORMAT_QCOW ||
        enc->nsecrets != 1 ||
        enc->secrets[0]->type !=
        VIR_STORAGE_ENCRYPTION_SECRET_TYPE_PASSPHRASE) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INVALID_DOMAIN,
                         _("invalid <encryption> for volume %s"), path);
770
        goto cleanup;
771 772 773 774 775
    }

    secret = conn->secretDriver->lookupByUUID(conn,
                                              enc->secrets[0]->uuid);
    if (secret == NULL)
776
        goto cleanup;
777 778 779 780
    data = conn->secretDriver->getValue(secret, &size,
                                        VIR_SECRET_GET_VALUE_INTERNAL_CALL);
    virUnrefSecret(secret);
    if (data == NULL)
781
        goto cleanup;
782 783 784 785 786 787 788

    if (memchr(data, '\0', size) != NULL) {
        memset(data, 0, size);
        VIR_FREE(data);
        qemudReportError(conn, NULL, NULL, VIR_ERR_INVALID_SECRET,
                         _("format='qcow' passphrase for %s must not contain a "
                           "'\\0'"), path);
789
        goto cleanup;
790 791 792 793 794 795
    }

    if (VIR_ALLOC_N(passphrase, size + 1) < 0) {
        memset(data, 0, size);
        VIR_FREE(data);
        virReportOOMError(conn);
796
        goto cleanup;
797 798 799 800 801 802 803 804 805 806
    }
    memcpy(passphrase, data, size);
    passphrase[size] = '\0';

    memset(data, 0, size);
    VIR_FREE(data);

    *secretRet = passphrase;
    *secretLen = size;

807 808 809
    ret = 0;

cleanup:
810 811
    virDomainObjUnlock(vm);

812
    return ret;
813 814
}

815 816 817 818 819
static qemuMonitorCallbacks monitorCallbacks = {
    .eofNotify = qemuHandleMonitorEOF,
    .diskSecretLookup = findVolumeQcowPassphrase,
};

820
static int
821
qemuConnectMonitor(virDomainObjPtr vm)
822
{
823
    qemuDomainObjPrivatePtr priv = vm->privateData;
824

825 826 827 828
    /* Hold an extra reference because we can't allow 'vm' to be
     * deleted while the monitor is active */
    virDomainObjRef(vm);

829 830
    if ((priv->mon = qemuMonitorOpen(vm,
                                     priv->monConfig,
D
Daniel P. Berrange 已提交
831
                                     priv->monJSON,
832
                                     &monitorCallbacks)) == NULL) {
833
        VIR_ERROR(_("Failed to connect monitor for %s"), vm->def->name);
834
        return -1;
835
    }
836

837 838
    return 0;
}
839 840 841 842

/*
 * Open an existing VM's monitor, re-detect VCPU threads
 * and re-reserve the security labels in use
843
 */
844 845
static void
qemuReconnectDomain(void *payload, const char *name ATTRIBUTE_UNUSED, void *opaque)
846
{
847 848
    virDomainObjPtr obj = payload;
    struct qemud_driver *driver = opaque;
849
    qemuDomainObjPrivatePtr priv;
850 851

    virDomainObjLock(obj);
852

853 854
    VIR_DEBUG("Reconnect monitor to %p '%s'", obj, obj->def->name);

855 856
    priv = obj->privateData;

857 858
    /* XXX check PID liveliness & EXE path */
    if (qemuConnectMonitor(obj) < 0)
859
        goto error;
860

861 862 863 864
    if (qemuUpdateActivePciHostdevs(driver, obj->def) < 0) {
        goto error;
    }

865 866 867
    if (!(priv->pciaddrs = qemuDomainPCIAddressSetCreate(obj->def)))
        goto error;

868
    if (driver->securityDriver &&
869 870
        driver->securityDriver->domainReserveSecurityLabel &&
        driver->securityDriver->domainReserveSecurityLabel(NULL, obj) < 0)
871
        goto error;
872

873 874
    if (obj->def->id >= driver->nextvmid)
        driver->nextvmid = obj->def->id + 1;
875

876 877
    virDomainObjUnlock(obj);
    return;
878

879
error:
880 881 882 883
    /* We can't get the monitor back, so must kill the VM
     * to remove danger of it ending up running twice if
     * user tries to start it again later */
    qemudShutdownVMDaemon(NULL, driver, obj);
884 885 886 887
    if (!obj->persistent)
        virDomainRemoveInactive(&driver->domains, obj);
    else
        virDomainObjUnlock(obj);
888
}
889

890
/**
891
 * qemudReconnectDomains
892 893 894 895 896 897 898
 *
 * Try to re-open the resources for live VMs that we care
 * about.
 */
static void
qemuReconnectDomains(struct qemud_driver *driver)
{
899
    virHashForEach(driver->domains.objs, qemuReconnectDomain, driver);
900 901
}

902

903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920
static int
qemudSecurityInit(struct qemud_driver *qemud_drv)
{
    int ret;
    virSecurityDriverPtr security_drv;

    ret = virSecurityDriverStartup(&security_drv,
                                   qemud_drv->securityDriverName);
    if (ret == -1) {
        VIR_ERROR0(_("Failed to start security driver"));
        return -1;
    }
    /* No security driver wanted to be enabled: just return */
    if (ret == -2) {
        VIR_INFO0(_("No security driver available"));
        return 0;
    }

921 922 923 924 925 926
    qemuSecurityStackedSetDriver(qemud_drv);
    qemuSecurityDACSetDriver(qemud_drv);

    qemud_drv->securityPrimaryDriver = security_drv;
    qemud_drv->securitySecondaryDriver = &qemuDACSecurityDriver;
    qemud_drv->securityDriver = &qemuStackedSecurityDriver;
927

928
    VIR_INFO("Initialized security driver %s", security_drv->name);
929
    return 0;
930
}
931 932


933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974
static virCapsPtr
qemuCreateCapabilities(virCapsPtr oldcaps,
                       virSecurityDriverPtr secDriver)
{
    virCapsPtr caps;

    /* Basic host arch / guest machine capabilities */
    if (!(caps = qemudCapsInit(oldcaps))) {
        virReportOOMError(NULL);
        return NULL;
    }

    /* Domain XML parser hooks */
    caps->privateDataAllocFunc = qemuDomainObjPrivateAlloc;
    caps->privateDataFreeFunc = qemuDomainObjPrivateFree;
    caps->privateDataXMLFormat = qemuDomainObjPrivateXMLFormat;
    caps->privateDataXMLParse = qemuDomainObjPrivateXMLParse;


    /* Security driver data */
    if (secDriver) {
        const char *doi, *model;

        doi = virSecurityDriverGetDOI(secDriver);
        model = virSecurityDriverGetModel(secDriver);

        if (!(caps->host.secModel.model = strdup(model)))
            goto no_memory;
        if (!(caps->host.secModel.doi = strdup(doi)))
            goto no_memory;

        VIR_DEBUG("Initialized caps for security driver \"%s\" with "
                  "DOI \"%s\"", model, doi);
    }

    return caps;

no_memory:
    virReportOOMError(NULL);
    virCapabilitiesFree(caps);
    return NULL;
}
975

976 977 978 979 980 981
/**
 * qemudStartup:
 *
 * Initialization function for the QEmu daemon
 */
static int
982
qemudStartup(int privileged) {
983
    char *base = NULL;
D
Daniel P. Berrange 已提交
984
    char driverConf[PATH_MAX];
985
    int rc;
986

987
    if (VIR_ALLOC(qemu_driver) < 0)
988 989
        return -1;

990
    if (virMutexInit(&qemu_driver->lock) < 0) {
991
        VIR_ERROR("%s", _("cannot initialize mutex"));
992 993 994
        VIR_FREE(qemu_driver);
        return -1;
    }
995
    qemuDriverLock(qemu_driver);
996
    qemu_driver->privileged = privileged;
997

998 999 1000
    /* Don't have a dom0 so start from 1 */
    qemu_driver->nextvmid = 1;

1001 1002 1003
    if (virDomainObjListInit(&qemu_driver->domains) < 0)
        goto out_of_memory;

1004
    /* Init callback list */
1005
    if (VIR_ALLOC(qemu_driver->domainEventCallbacks) < 0)
1006
        goto out_of_memory;
1007 1008 1009 1010 1011 1012
    if (!(qemu_driver->domainEventQueue = virDomainEventQueueNew()))
        goto out_of_memory;

    if ((qemu_driver->domainEventTimer =
         virEventAddTimeout(-1, qemuDomainEventFlush, qemu_driver, NULL)) < 0)
        goto error;
1013

1014
    if (privileged) {
1015 1016
        if (virAsprintf(&qemu_driver->logDir,
                        "%s/log/libvirt/qemu", LOCAL_STATE_DIR) == -1)
1017
            goto out_of_memory;
1018

D
Daniel P. Berrange 已提交
1019
        if ((base = strdup (SYSCONF_DIR "/libvirt")) == NULL)
1020
            goto out_of_memory;
1021 1022

        if (virAsprintf(&qemu_driver->stateDir,
1023
                      "%s/run/libvirt/qemu", LOCAL_STATE_DIR) == -1)
1024
            goto out_of_memory;
1025 1026 1027 1028 1029 1030 1031 1032

        if (virAsprintf(&qemu_driver->libDir,
                      "%s/lib/libvirt/qemu", LOCAL_STATE_DIR) == -1)
            goto out_of_memory;

        if (virAsprintf(&qemu_driver->cacheDir,
                      "%s/cache/libvirt/qemu", LOCAL_STATE_DIR) == -1)
            goto out_of_memory;
1033
    } else {
1034
        uid_t uid = geteuid();
1035 1036
        char *userdir = virGetUserDirectory(NULL, uid);
        if (!userdir)
1037
            goto error;
1038

1039
        if (virAsprintf(&qemu_driver->logDir,
1040 1041
                        "%s/.libvirt/qemu/log", userdir) == -1) {
            VIR_FREE(userdir);
1042
            goto out_of_memory;
1043
        }
1044

1045 1046
        if (virAsprintf(&base, "%s/.libvirt", userdir) == -1) {
            VIR_FREE(userdir);
1047
            goto out_of_memory;
1048 1049
        }
        VIR_FREE(userdir);
1050 1051 1052

        if (virAsprintf(&qemu_driver->stateDir, "%s/qemu/run", base) == -1)
            goto out_of_memory;
1053 1054 1055 1056
        if (virAsprintf(&qemu_driver->libDir, "%s/qemu/lib", base) == -1)
            goto out_of_memory;
        if (virAsprintf(&qemu_driver->cacheDir, "%s/qemu/cache", base) == -1)
            goto out_of_memory;
1057 1058
    }

L
Laine Stump 已提交
1059
    if (virFileMakePath(qemu_driver->stateDir) != 0) {
1060
        char ebuf[1024];
1061
        VIR_ERROR(_("Failed to create state dir '%s': %s"),
1062
                  qemu_driver->stateDir, virStrerror(errno, ebuf, sizeof ebuf));
1063
        goto error;
1064
    }
L
Laine Stump 已提交
1065
    if (virFileMakePath(qemu_driver->libDir) != 0) {
1066
        char ebuf[1024];
1067
        VIR_ERROR(_("Failed to create lib dir '%s': %s"),
1068 1069 1070
                  qemu_driver->libDir, virStrerror(errno, ebuf, sizeof ebuf));
        goto error;
    }
L
Laine Stump 已提交
1071
    if (virFileMakePath(qemu_driver->cacheDir) != 0) {
1072
        char ebuf[1024];
1073
        VIR_ERROR(_("Failed to create cache dir '%s': %s"),
1074 1075 1076
                  qemu_driver->cacheDir, virStrerror(errno, ebuf, sizeof ebuf));
        goto error;
    }
1077 1078 1079 1080

    /* Configuration paths are either ~/.libvirt/qemu/... (session) or
     * /etc/libvirt/qemu/... (system).
     */
D
Daniel P. Berrange 已提交
1081
    if (snprintf (driverConf, sizeof(driverConf), "%s/qemu.conf", base) == -1)
1082
        goto out_of_memory;
D
Daniel P. Berrange 已提交
1083
    driverConf[sizeof(driverConf)-1] = '\0';
1084

1085
    if (virAsprintf(&qemu_driver->configDir, "%s/qemu", base) == -1)
1086 1087
        goto out_of_memory;

1088
    if (virAsprintf(&qemu_driver->autostartDir, "%s/qemu/autostart", base) == -1)
1089 1090
        goto out_of_memory;

1091
    VIR_FREE(base);
1092

1093 1094 1095 1096 1097 1098 1099
    rc = virCgroupForDriver("qemu", &qemu_driver->cgroup, privileged, 1);
    if (rc < 0) {
        char buf[1024];
        VIR_WARN("Unable to create cgroup for driver: %s",
                 virStrerror(-rc, buf, sizeof(buf)));
    }

1100 1101
    if (qemudSecurityInit(qemu_driver) < 0)
        goto error;
D
Daniel P. Berrange 已提交
1102

1103 1104 1105
    if ((qemu_driver->caps = qemuCreateCapabilities(NULL,
                                                    qemu_driver->securityDriver)) == NULL)
        goto error;
1106

1107 1108 1109
    if ((qemu_driver->activePciHostdevs = pciDeviceListNew(NULL)) == NULL)
        goto error;

1110
    if (qemudLoadDriverConfig(qemu_driver, driverConf) < 0) {
1111 1112 1113
        goto error;
    }

1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128
    if (privileged) {
        if (chown(qemu_driver->libDir, qemu_driver->user, qemu_driver->group) < 0) {
            virReportSystemError(NULL, errno,
                                 _("unable to set ownership of '%s' to user %d:%d"),
                                 qemu_driver->libDir, qemu_driver->user, qemu_driver->group);
            goto error;
        }
        if (chown(qemu_driver->cacheDir, qemu_driver->user, qemu_driver->group) < 0) {
            virReportSystemError(NULL, errno,
                                 _("unable to set ownership of '%s' to %d:%d"),
                                 qemu_driver->cacheDir, qemu_driver->user, qemu_driver->group);
            goto error;
        }
    }

1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159
    /* If hugetlbfs is present, then we need to create a sub-directory within
     * it, since we can't assume the root mount point has permissions that
     * will let our spawned QEMU instances use it.
     *
     * NB the check for '/', since user may config "" to disable hugepages
     * even when mounted
     */
    if (qemu_driver->hugetlbfs_mount &&
        qemu_driver->hugetlbfs_mount[0] == '/') {
        char *mempath = NULL;
        if (virAsprintf(&mempath, "%s/libvirt/qemu", qemu_driver->hugetlbfs_mount) < 0)
            goto out_of_memory;

        if ((rc = virFileMakePath(mempath)) != 0) {
            virReportSystemError(NULL, rc,
                                 _("unable to create hugepage path %s"), mempath);
            VIR_FREE(mempath);
            goto error;
        }
        if (qemu_driver->privileged &&
            chown(mempath, qemu_driver->user, qemu_driver->group) < 0) {
            virReportSystemError(NULL, errno,
                                 _("unable to set ownership on %s to %d:%d"),
                                 mempath, qemu_driver->user, qemu_driver->group);
            VIR_FREE(mempath);
            goto error;
        }

        qemu_driver->hugepage_path = mempath;
    }

1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171
    /* Get all the running persistent or transient configs first */
    if (virDomainLoadAllConfigs(NULL,
                                qemu_driver->caps,
                                &qemu_driver->domains,
                                qemu_driver->stateDir,
                                NULL,
                                1, NULL, NULL) < 0)
        goto error;

    qemuReconnectDomains(qemu_driver);

    /* Then inactive persistent configs */
1172 1173 1174 1175
    if (virDomainLoadAllConfigs(NULL,
                                qemu_driver->caps,
                                &qemu_driver->domains,
                                qemu_driver->configDir,
1176
                                qemu_driver->autostartDir,
1177
                                0, NULL, NULL) < 0)
1178
        goto error;
1179 1180
    qemuDriverUnlock(qemu_driver);

1181 1182
    qemudAutostartConfigs(qemu_driver);

1183

1184 1185
    return 0;

1186
out_of_memory:
1187
    virReportOOMError(NULL);
1188 1189 1190
error:
    if (qemu_driver)
        qemuDriverUnlock(qemu_driver);
1191
    VIR_FREE(base);
1192
    qemudShutdown();
1193 1194 1195
    return -1;
}

1196 1197 1198 1199
static void qemudNotifyLoadDomain(virDomainObjPtr vm, int newVM, void *opaque)
{
    struct qemud_driver *driver = opaque;

1200 1201 1202 1203 1204 1205 1206 1207
    if (newVM) {
        virDomainEventPtr event =
            virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_DEFINED,
                                     VIR_DOMAIN_EVENT_DEFINED_ADDED);
        if (event)
            qemuDomainEventQueue(driver, event);
    }
1208 1209
}

1210 1211 1212 1213 1214 1215 1216 1217
/**
 * qemudReload:
 *
 * Function to restart the QEmu daemon, it will recheck the configuration
 * files and update its state and the networking
 */
static int
qemudReload(void) {
1218 1219 1220
    if (!qemu_driver)
        return 0;

1221
    qemuDriverLock(qemu_driver);
1222 1223 1224 1225
    virDomainLoadAllConfigs(NULL,
                            qemu_driver->caps,
                            &qemu_driver->domains,
                            qemu_driver->configDir,
1226
                            qemu_driver->autostartDir,
1227
                            0, qemudNotifyLoadDomain, qemu_driver);
1228
    qemuDriverUnlock(qemu_driver);
1229

1230
    qemudAutostartConfigs(qemu_driver);
1231 1232

    return 0;
1233 1234
}

1235 1236 1237 1238 1239 1240 1241 1242 1243 1244
/**
 * qemudActive:
 *
 * Checks if the QEmu daemon is active, i.e. has an active domain or
 * an active network
 *
 * Returns 1 if active, 0 otherwise
 */
static int
qemudActive(void) {
1245
    int active = 0;
1246

1247 1248 1249
    if (!qemu_driver)
        return 0;

1250
    /* XXX having to iterate here is not great because it requires many locks */
1251
    qemuDriverLock(qemu_driver);
1252
    active = virDomainObjListNumOfDomains(&qemu_driver->domains, 1);
1253 1254
    qemuDriverUnlock(qemu_driver);
    return active;
1255 1256
}

1257 1258 1259 1260 1261 1262 1263
/**
 * qemudShutdown:
 *
 * Shutdown the QEmu daemon, it will stop all active domains and networks
 */
static int
qemudShutdown(void) {
1264
    int i;
1265

1266
    if (!qemu_driver)
1267
        return -1;
1268

1269
    qemuDriverLock(qemu_driver);
1270
    pciDeviceListFree(NULL, qemu_driver->activePciHostdevs);
1271 1272
    virCapabilitiesFree(qemu_driver->caps);

1273
    virDomainObjListDeinit(&qemu_driver->domains);
1274

1275
    VIR_FREE(qemu_driver->securityDriverName);
1276
    VIR_FREE(qemu_driver->logDir);
1277 1278
    VIR_FREE(qemu_driver->configDir);
    VIR_FREE(qemu_driver->autostartDir);
1279
    VIR_FREE(qemu_driver->stateDir);
1280 1281
    VIR_FREE(qemu_driver->libDir);
    VIR_FREE(qemu_driver->cacheDir);
1282
    VIR_FREE(qemu_driver->vncTLSx509certdir);
J
Jim Meyering 已提交
1283
    VIR_FREE(qemu_driver->vncListen);
1284
    VIR_FREE(qemu_driver->vncPassword);
1285
    VIR_FREE(qemu_driver->vncSASLdir);
1286
    VIR_FREE(qemu_driver->saveImageFormat);
1287 1288
    VIR_FREE(qemu_driver->hugetlbfs_mount);
    VIR_FREE(qemu_driver->hugepage_path);
D
Daniel P. Berrange 已提交
1289

1290 1291 1292 1293 1294 1295
    if (qemu_driver->cgroupDeviceACL) {
        for (i = 0 ; qemu_driver->cgroupDeviceACL[i] != NULL ; i++)
            VIR_FREE(qemu_driver->cgroupDeviceACL[i]);
        VIR_FREE(qemu_driver->cgroupDeviceACL);
    }

1296 1297
    /* Free domain callback list */
    virDomainEventCallbackListFree(qemu_driver->domainEventCallbacks);
1298 1299 1300 1301
    virDomainEventQueueFree(qemu_driver->domainEventQueue);

    if (qemu_driver->domainEventTimer != -1)
        virEventRemoveTimeout(qemu_driver->domainEventTimer);
1302

1303 1304 1305
    if (qemu_driver->brctl)
        brShutdown(qemu_driver->brctl);

1306 1307
    virCgroupFree(&qemu_driver->cgroup);

1308
    qemuDriverUnlock(qemu_driver);
1309
    virMutexDestroy(&qemu_driver->lock);
1310
    VIR_FREE(qemu_driver);
1311 1312

    return 0;
1313 1314
}

1315 1316 1317 1318
typedef int qemuLogHandleOutput(virConnectPtr conn,
                                virDomainObjPtr vm,
                                const char *output,
                                int fd);
1319 1320 1321 1322 1323 1324 1325 1326 1327

/*
 * Returns -1 for error, 0 on success
 */
static int
qemudReadLogOutput(virConnectPtr conn,
                   virDomainObjPtr vm,
                   int fd,
                   char *buf,
G
Guido Günther 已提交
1328
                   size_t buflen,
1329
                   qemuLogHandleOutput func,
1330 1331 1332
                   const char *what,
                   int timeout)
{
1333
    int retries = (timeout*10);
1334
    int got = 0;
1335 1336 1337
    buf[0] = '\0';

    while (retries) {
1338
        ssize_t func_ret, ret;
1339
        int isdead = 0;
G
Guido Günther 已提交
1340

1341 1342
        func_ret = func(conn, vm, buf, fd);

1343 1344
        if (kill(vm->pid, 0) == -1 && errno == ESRCH)
            isdead = 1;
1345

1346 1347
        /* Any failures should be detected before we read the log, so we
         * always have something useful to report on failure. */
1348 1349
        ret = saferead(fd, buf+got, buflen-got-1);
        if (ret < 0) {
1350 1351 1352 1353 1354 1355
            virReportSystemError(conn, errno,
                                 _("Failure while reading %s log output"),
                                 what);
            return -1;
        }

1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371
        got += ret;
        buf[got] = '\0';
        if (got == buflen-1) {
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("Out of space while reading %s log output"),
                             what);
            return -1;
        }

        if (isdead) {
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("Process exited while reading %s log output"),
                             what);
            return -1;
        }

1372 1373
        if (func_ret <= 0)
            return func_ret;
1374 1375 1376 1377

        usleep(100*1000);
        retries--;
    }
1378 1379 1380

    qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                     _("Timed out while reading %s log output"), what);
1381 1382 1383
    return -1;
}

1384

1385 1386 1387 1388 1389 1390 1391 1392
/*
 * Look at a chunk of data from the QEMU stdout logs and try to
 * find a TTY device, as indicated by a line like
 *
 * char device redirected to /dev/pts/3
 *
 * Returns -1 for error, 0 success, 1 continue reading
 */
1393
static int
1394 1395 1396 1397
qemudExtractTTYPath(virConnectPtr conn,
                    const char *haystack,
                    size_t *offset,
                    char **path)
1398
{
1399
    static const char needle[] = "char device redirected to";
1400
    char *tmp, *dev;
1401

1402
    VIR_FREE(*path);
1403
    /* First look for our magic string */
1404 1405 1406 1407 1408
    if (!(tmp = strstr(haystack + *offset, needle))) {
        return 1;
    }
    tmp += sizeof(needle);
    dev = tmp;
1409

1410 1411 1412 1413 1414
    /*
     * And look for first whitespace character and nul terminate
     * to mark end of the pty path
     */
    while (*tmp) {
1415
        if (c_isspace(*tmp)) {
1416 1417
            *path = strndup(dev, tmp-dev);
            if (*path == NULL) {
1418
                virReportOOMError(conn);
1419 1420
                return -1;
            }
1421

1422
            /* ... now further update offset till we get EOL */
1423
            *offset = tmp - haystack;
1424 1425
            return 0;
        }
1426
        tmp++;
1427 1428 1429 1430 1431
    }

    /*
     * We found a path, but didn't find any whitespace,
     * so it must be still incomplete - we should at
1432 1433
     * least see a \n - indicate that we want to carry
     * on trying again
1434
     */
1435
    return 1;
1436 1437
}

1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455
static int
qemudFindCharDevicePTYsMonitor(virConnectPtr conn,
                               virDomainObjPtr vm,
                               virHashTablePtr paths)
{
    int i;

#define LOOKUP_PTYS(array, arraylen, idprefix)                            \
    for (i = 0 ; i < (arraylen) ; i++) {                                  \
        virDomainChrDefPtr chr = (array)[i];                              \
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {                       \
            char id[16];                                                  \
                                                                          \
            if (snprintf(id, sizeof(id), idprefix "%i", i) >= sizeof(id)) \
                return -1;                                                \
                                                                          \
            const char *path = (const char *) virHashLookup(paths, id);   \
            if (path == NULL) {                                           \
1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466
                if (chr->data.file.path == NULL) {                        \
                    /* neither the log output nor 'info chardev' had a */ \
                    /* pty path for this chardev, report an error */      \
                    qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, \
                                     _("no assigned pty for device %s"), id);  \
                    return -1;                                                 \
                } else {                                                  \
                    /* 'info chardev' had no pty path for this chardev, */\
                    /* but the log output had, so we're fine */           \
                    continue;                                             \
                }                                                         \
1467 1468
            }                                                             \
                                                                          \
1469
            VIR_FREE(chr->data.file.path);                                \
1470
            chr->data.file.path = strdup(path);                           \
1471 1472 1473 1474 1475
                                                                          \
            if (chr->data.file.path == NULL) {                            \
                virReportOOMError(conn);                                  \
                return -1;                                                \
            }                                                             \
1476 1477 1478 1479 1480 1481
        }                                                                 \
    }

    LOOKUP_PTYS(vm->def->serials,   vm->def->nserials,   "serial");
    LOOKUP_PTYS(vm->def->parallels, vm->def->nparallels, "parallel");
    LOOKUP_PTYS(vm->def->channels,  vm->def->nchannels,  "channel");
1482
#undef LOOKUP_PTYS
1483 1484 1485 1486

    return 0;
}

1487
static int
1488
qemudFindCharDevicePTYs(virConnectPtr conn,
1489
                        virDomainObjPtr vm,
1490 1491
                        const char *output,
                        int fd ATTRIBUTE_UNUSED)
1492
{
1493
    size_t offset = 0;
1494
    int ret, i;
1495 1496

    /* The order in which QEMU prints out the PTY paths is
1497 1498
       the order in which it procsses its serial and parallel
       device args. This code must match that ordering.... */
1499

1500
    /* first comes the serial devices */
1501 1502
    for (i = 0 ; i < vm->def->nserials ; i++) {
        virDomainChrDefPtr chr = vm->def->serials[i];
1503
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {
1504 1505
            if ((ret = qemudExtractTTYPath(conn, output, &offset,
                                           &chr->data.file.path)) != 0)
1506
                return ret;
1507 1508 1509
        }
    }

1510
    /* then the parallel devices */
1511 1512
    for (i = 0 ; i < vm->def->nparallels ; i++) {
        virDomainChrDefPtr chr = vm->def->parallels[i];
1513
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {
1514 1515
            if ((ret = qemudExtractTTYPath(conn, output, &offset,
                                           &chr->data.file.path)) != 0)
1516
                return ret;
1517 1518 1519
        }
    }

1520 1521 1522 1523 1524 1525 1526 1527 1528 1529
    /* then the channel devices */
    for (i = 0 ; i < vm->def->nchannels ; i++) {
        virDomainChrDefPtr chr = vm->def->channels[i];
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {
            if ((ret = qemudExtractTTYPath(conn, output, &offset,
                                           &chr->data.file.path)) != 0)
                return ret;
        }
    }

1530
    return 0;
1531 1532
}

1533 1534 1535 1536 1537
static void qemudFreePtyPath(void *payload, const char *name ATTRIBUTE_UNUSED)
{
    VIR_FREE(payload);
}

1538 1539 1540 1541
static int
qemudWaitForMonitor(virConnectPtr conn,
                    struct qemud_driver* driver,
                    virDomainObjPtr vm, off_t pos)
1542
{
1543
    char buf[4096]; /* Plenty of space to get startup greeting */
1544
    int logfd;
1545
    int ret = -1;
1546 1547 1548

    if ((logfd = qemudLogReadFD(conn, driver->logDir, vm->def->name, pos))
        < 0)
1549
        return -1;
1550

1551 1552 1553
    ret = qemudReadLogOutput(conn, vm, logfd, buf, sizeof(buf),
                             qemudFindCharDevicePTYs,
                             "console", 3);
1554
    if (close(logfd) < 0) {
1555
        char ebuf[4096];
1556
        VIR_WARN(_("Unable to close logfile: %s"),
1557 1558
                 virStrerror(errno, ebuf, sizeof ebuf));
    }
1559

1560 1561 1562 1563 1564 1565
    if (ret < 0) {
        /* Unexpected end of file - inform user of QEMU log data */
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unable to start guest: %s"), buf);
        return -1;
    }
1566

1567 1568
    VIR_DEBUG("Connect monitor to %p '%s'", vm, vm->def->name);
    if (qemuConnectMonitor(vm) < 0)
1569 1570
        return -1;

1571 1572 1573 1574 1575 1576 1577 1578 1579 1580
    /* Try to get the pty path mappings again via the monitor. This is much more
     * reliable if it's available.
     * Note that the monitor itself can be on a pty, so we still need to try the
     * log output method. */
    virHashTablePtr paths = virHashCreate(0);
    if (paths == NULL) {
        virReportOOMError(NULL);
        goto cleanup;
    }

1581
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
1582 1583
    qemuDomainObjPrivatePtr priv = vm->privateData;
    ret = qemuMonitorGetPtyPaths(priv->mon, paths);
1584
    qemuDomainObjExitMonitorWithDriver(driver, vm);
1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596

    VIR_DEBUG("qemuMonitorGetPtyPaths returned %i", ret);
    if (ret == 0) {
        ret = qemudFindCharDevicePTYsMonitor(conn, vm, paths);
    }

cleanup:
    if (paths) {
        virHashFree(paths, qemudFreePtyPath);
    }

    return ret;
1597 1598
}

1599
static int
1600
qemuDetectVcpuPIDs(virConnectPtr conn,
1601
                   struct qemud_driver *driver,
1602 1603 1604
                   virDomainObjPtr vm) {
    pid_t *cpupids = NULL;
    int ncpupids;
1605
    qemuDomainObjPrivatePtr priv = vm->privateData;
1606

1607
    if (vm->def->virtType != VIR_DOMAIN_VIRT_KVM) {
1608 1609
        priv->nvcpupids = 1;
        if (VIR_ALLOC_N(priv->vcpupids, priv->nvcpupids) < 0) {
1610 1611 1612
            virReportOOMError(conn);
            return -1;
        }
1613
        priv->vcpupids[0] = vm->pid;
1614 1615 1616
        return 0;
    }

1617
    /* What follows is now all KVM specific */
1618

1619
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
1620
    if ((ncpupids = qemuMonitorGetCPUInfo(priv->mon, &cpupids)) < 0) {
1621
        qemuDomainObjExitMonitorWithDriver(driver, vm);
1622
        return -1;
1623
    }
1624
    qemuDomainObjExitMonitorWithDriver(driver, vm);
1625

1626 1627 1628
    /* Treat failure to get VCPU<->PID mapping as non-fatal */
    if (ncpupids == 0)
        return 0;
1629

1630 1631 1632 1633 1634 1635 1636
    if (ncpupids != vm->def->vcpus) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("got wrong number of vCPU pids from QEMU monitor. got %d, wanted %d"),
                         ncpupids, (int)vm->def->vcpus);
        VIR_FREE(cpupids);
        return -1;
    }
1637

1638 1639
    priv->nvcpupids = ncpupids;
    priv->vcpupids = cpupids;
1640 1641 1642
    return 0;
}

1643
static int
1644 1645
qemudInitCpuAffinity(virConnectPtr conn,
                     virDomainObjPtr vm) {
1646
    int i, hostcpus, maxcpu = QEMUD_CPUMASK_LEN;
1647
    virNodeInfo nodeinfo;
1648 1649
    unsigned char *cpumap;
    int cpumaplen;
1650
    qemuDomainObjPrivatePtr priv = vm->privateData;
1651

1652
    if (nodeGetInfo(conn, &nodeinfo) < 0)
1653 1654 1655 1656
        return -1;

    /* setaffinity fails if you set bits for CPUs which
     * aren't present, so we have to limit ourselves */
1657 1658 1659
    hostcpus = VIR_NODEINFO_MAXCPUS(nodeinfo);
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;
1660

1661 1662 1663 1664 1665 1666
    cpumaplen = VIR_CPU_MAPLEN(maxcpu);
    if (VIR_ALLOC_N(cpumap, cpumaplen) < 0) {
        virReportOOMError(conn);
        return -1;
    }

D
Daniel P. Berrange 已提交
1667
    if (vm->def->cpumask) {
1668 1669 1670
        /* XXX why don't we keep 'cpumask' in the libvirt cpumap
         * format to start with ?!?! */
        for (i = 0 ; i < maxcpu && i < vm->def->cpumasklen ; i++)
D
Daniel P. Berrange 已提交
1671
            if (vm->def->cpumask[i])
1672
                VIR_USE_CPU(cpumap, i);
D
Daniel P. Berrange 已提交
1673
    } else {
1674 1675 1676 1677
        /* You may think this is redundant, but we can't assume libvirtd
         * itself is running on all pCPUs, so we need to explicitly set
         * the spawned QEMU instance to all pCPUs if no map is given in
         * its config file */
D
Daniel P. Berrange 已提交
1678
        for (i = 0 ; i < maxcpu ; i++)
1679
            VIR_USE_CPU(cpumap, i);
D
Daniel P. Berrange 已提交
1680
    }
1681

1682 1683
    /* The XML config only gives a per-VM affinity, so we apply
     * the same mapping to all vCPUs */
1684 1685
    for (i = 0 ; i < priv->nvcpupids ; i++) {
        if (virProcessInfoSetAffinity(priv->vcpupids[i],
1686 1687
                                      cpumap, cpumaplen, maxcpu) < 0) {
            VIR_FREE(cpumap);
1688 1689 1690
            return -1;
        }
    }
1691
    VIR_FREE(cpumap);
1692 1693 1694 1695 1696

    return 0;
}


1697
static int
1698 1699
qemuInitPasswords(struct qemud_driver *driver,
                  virDomainObjPtr vm) {
1700
    int ret = 0;
1701
    qemuDomainObjPrivatePtr priv = vm->privateData;
1702

1703 1704 1705
    if ((vm->def->ngraphics == 1) &&
        vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
        (vm->def->graphics[0]->data.vnc.passwd || driver->vncPassword)) {
1706

1707
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
1708
        ret = qemuMonitorSetVNCPassword(priv->mon,
1709 1710 1711
                                        vm->def->graphics[0]->data.vnc.passwd ?
                                        vm->def->graphics[0]->data.vnc.passwd :
                                        driver->vncPassword);
1712
        qemuDomainObjExitMonitorWithDriver(driver, vm);
1713 1714
    }

1715
    return ret;
1716 1717 1718
}


1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076
#define QEMU_PCI_VENDOR_INTEL     0x8086
#define QEMU_PCI_VENDOR_LSI_LOGIC 0x1000
#define QEMU_PCI_VENDOR_REDHAT    0x1af4
#define QEMU_PCI_VENDOR_CIRRUS    0x1013
#define QEMU_PCI_VENDOR_REALTEK   0x10ec
#define QEMU_PCI_VENDOR_AMD       0x1022
#define QEMU_PCI_VENDOR_ENSONIQ   0x1274
#define QEMU_PCI_VENDOR_VMWARE    0x15ad
#define QEMU_PCI_VENDOR_QEMU      0x1234

#define QEMU_PCI_PRODUCT_DISK_VIRTIO 0x1001

#define QEMU_PCI_PRODUCT_NIC_NE2K     0x8029
#define QEMU_PCI_PRODUCT_NIC_PCNET    0x2000
#define QEMU_PCI_PRODUCT_NIC_RTL8139  0x8139
#define QEMU_PCI_PRODUCT_NIC_E1000    0x100E
#define QEMU_PCI_PRODUCT_NIC_VIRTIO   0x1000

#define QEMU_PCI_PRODUCT_VGA_CIRRUS 0x00b8
#define QEMU_PCI_PRODUCT_VGA_VMWARE 0x0405
#define QEMU_PCI_PRODUCT_VGA_STDVGA 0x1111

#define QEMU_PCI_PRODUCT_AUDIO_AC97    0x2415
#define QEMU_PCI_PRODUCT_AUDIO_ES1370  0x5000

#define QEMU_PCI_PRODUCT_CONTROLLER_PIIX 0x7010
#define QEMU_PCI_PRODUCT_CONTROLLER_LSI  0x0012

#define QEMU_PCI_PRODUCT_WATCHDOG_I63000ESB 0x25ab

static int
qemuAssignNextPCIAddress(virDomainDeviceInfo *info,
                         int vendor,
                         int product,
                         qemuMonitorPCIAddress *addrs,
                         int naddrs)
{
    int found = 0;
    int i;

    VIR_DEBUG("Look for %x:%x out of %d", vendor, product, naddrs);

    for (i = 0 ; (i < naddrs) && !found; i++) {
        VIR_DEBUG("Maybe %x:%x", addrs[i].vendor, addrs[i].product);
        if (addrs[i].vendor == vendor &&
            addrs[i].product == product) {
            VIR_DEBUG("Match %d", i);
            found = 1;
            break;
        }
    }
    if (!found) {
        return -1;
    }

    /* Blank it out so this device isn't matched again */
    addrs[i].vendor = 0;
    addrs[i].product = 0;

    if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE)
        info->type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;

    if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
        info->addr.pci.domain = addrs[i].addr.domain;
        info->addr.pci.bus = addrs[i].addr.bus;
        info->addr.pci.slot = addrs[i].addr.slot;
        info->addr.pci.function = addrs[i].addr.function;
    }

    return 0;
}

static int
qemuGetPCIDiskVendorProduct(virDomainDiskDefPtr def,
                            unsigned *vendor,
                            unsigned *product)
{
    switch (def->bus) {
    case VIR_DOMAIN_DISK_BUS_VIRTIO:
        *vendor = QEMU_PCI_VENDOR_REDHAT;
        *product = QEMU_PCI_PRODUCT_DISK_VIRTIO;
        break;

    default:
        return -1;
    }

    return 0;
}

static int
qemuGetPCINetVendorProduct(virDomainNetDefPtr def,
                            unsigned *vendor,
                            unsigned *product)
{
    if (!def->model)
        return -1;

    if (STREQ(def->model, "ne2k_pci")) {
        *vendor = QEMU_PCI_VENDOR_REALTEK;
        *product = QEMU_PCI_PRODUCT_NIC_NE2K;
    } else if (STREQ(def->model, "pcnet")) {
        *vendor = QEMU_PCI_VENDOR_AMD;
        *product = QEMU_PCI_PRODUCT_NIC_PCNET;
    } else if (STREQ(def->model, "rtl8139")) {
        *vendor = QEMU_PCI_VENDOR_REALTEK;
        *product = QEMU_PCI_PRODUCT_NIC_RTL8139;
    } else if (STREQ(def->model, "e1000")) {
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_NIC_E1000;
    } else if (STREQ(def->model, "virtio")) {
        *vendor = QEMU_PCI_VENDOR_REDHAT;
        *product = QEMU_PCI_PRODUCT_NIC_VIRTIO;
    } else {
        VIR_INFO("Unexpected NIC model %s, cannot get PCI address",
                 def->model);
        return -1;
    }
    return 0;
}

static int
qemuGetPCIControllerVendorProduct(virDomainControllerDefPtr def,
                                  unsigned *vendor,
                                  unsigned *product)
{
    switch (def->type) {
    case VIR_DOMAIN_CONTROLLER_TYPE_SCSI:
        *vendor = QEMU_PCI_VENDOR_LSI_LOGIC;
        *product = QEMU_PCI_PRODUCT_CONTROLLER_LSI;
        break;

    case VIR_DOMAIN_CONTROLLER_TYPE_FDC:
        /* XXX we could put in the ISA bridge address, but
           that's not technically the FDC's address */
        return -1;

    case VIR_DOMAIN_CONTROLLER_TYPE_IDE:
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_CONTROLLER_PIIX;
        break;

    default:
        VIR_INFO("Unexpected controller type %s, cannot get PCI address",
                 virDomainControllerTypeToString(def->type));
        return -1;
    }

    return 0;
}

static int
qemuGetPCIVideoVendorProduct(virDomainVideoDefPtr def,
                             unsigned *vendor,
                             unsigned *product)
{
    switch (def->type) {
    case VIR_DOMAIN_VIDEO_TYPE_CIRRUS:
        *vendor = QEMU_PCI_VENDOR_CIRRUS;
        *product = QEMU_PCI_PRODUCT_VGA_CIRRUS;
        break;

    case VIR_DOMAIN_VIDEO_TYPE_VGA:
        *vendor = QEMU_PCI_VENDOR_QEMU;
        *product = QEMU_PCI_PRODUCT_VGA_STDVGA;
        break;

    case VIR_DOMAIN_VIDEO_TYPE_VMVGA:
        *vendor = QEMU_PCI_VENDOR_VMWARE;
        *product = QEMU_PCI_PRODUCT_VGA_VMWARE;
        break;

    default:
        return -1;
    }
    return 0;
}

static int
qemuGetPCISoundVendorProduct(virDomainSoundDefPtr def,
                             unsigned *vendor,
                             unsigned *product)
{
    switch (def->model) {
    case VIR_DOMAIN_SOUND_MODEL_ES1370:
        *vendor = QEMU_PCI_VENDOR_ENSONIQ;
        *product = QEMU_PCI_PRODUCT_AUDIO_ES1370;
        break;

    case VIR_DOMAIN_SOUND_MODEL_AC97:
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_AUDIO_AC97;
        break;

    default:
        return -1;
    }

    return 0;
}

static int
qemuGetPCIWatchdogVendorProduct(virDomainWatchdogDefPtr def,
                                unsigned *vendor,
                                unsigned *product)
{
    switch (def->model) {
    case VIR_DOMAIN_WATCHDOG_MODEL_I6300ESB:
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_WATCHDOG_I63000ESB;
        break;

    default:
        return -1;
    }

    return 0;
}


/*
 * This entire method assumes that PCI devices in 'info pci'
 * match ordering of devices specified on the command line
 * wrt to devices of matching vendor+product
 *
 * XXXX this might not be a valid assumption if we assign
 * some static addrs on CLI. Have to check that...
 */
static int
qemuAssignPCIAddresses(virDomainObjPtr vm,
                       qemuMonitorPCIAddress *addrs,
                       int naddrs)
{
    unsigned int vendor = 0, product = 0;
    int i;

    /* XXX should all these vendor/product IDs be kept in the
     * actual device data structure instead ?
     */

    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (qemuGetPCIDiskVendorProduct(vm->def->disks[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->disks[i]->info),
                                     vendor, product,
                                     addrs, naddrs) < 0) {
            qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("cannot find PCI address for VirtIO disk %s"),
                             vm->def->disks[i]->dst);
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->nnets ; i++) {
        if (qemuGetPCINetVendorProduct(vm->def->nets[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->nets[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
            qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("cannot find PCI address for %s NIC"),
                             vm->def->nets[i]->model);
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
        if (qemuGetPCIControllerVendorProduct(vm->def->controllers[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->controllers[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
            qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("cannot find PCI address for controller %s"),
                             virDomainControllerTypeToString(vm->def->controllers[i]->type));
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->nvideos ; i++) {
        if (qemuGetPCIVideoVendorProduct(vm->def->videos[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->videos[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
            qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("cannot find PCI address for video adapter %s"),
                             virDomainVideoTypeToString(vm->def->videos[i]->type));
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->nsounds ; i++) {
        if (qemuGetPCISoundVendorProduct(vm->def->sounds[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->sounds[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
            qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("cannot find PCI address for sound adapter %s"),
                             virDomainSoundModelTypeToString(vm->def->sounds[i]->model));
            return -1;
        }
    }


    if (vm->def->watchdog &&
        qemuGetPCIWatchdogVendorProduct(vm->def->watchdog, &vendor, &product) == 0) {
        if (qemuAssignNextPCIAddress(&(vm->def->watchdog->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
            qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("cannot find PCI address for watchdog %s"),
                             virDomainWatchdogModelTypeToString(vm->def->watchdog->model));
            return -1;
        }
    }

    /* XXX console (virtio) */


    /* ... and now things we don't have in our xml */

    /* XXX USB controller ? */

    /* XXXX virtio balloon ? */

    /* XXX what about other PCI devices (ie bridges) */

    return 0;
}

static int
qemuInitPCIAddresses(struct qemud_driver *driver,
                     virDomainObjPtr vm)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    int naddrs;
    int ret;
    qemuMonitorPCIAddress *addrs = NULL;

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    naddrs = qemuMonitorGetAllPCIAddresses(priv->mon,
                                           &addrs);
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    ret = qemuAssignPCIAddresses(vm, addrs, naddrs);

    VIR_FREE(addrs);

    return ret;
}

2077
static int qemudNextFreeVNCPort(struct qemud_driver *driver ATTRIBUTE_UNUSED) {
2078 2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112
    int i;

    for (i = 5900 ; i < 6000 ; i++) {
        int fd;
        int reuse = 1;
        struct sockaddr_in addr;
        addr.sin_family = AF_INET;
        addr.sin_port = htons(i);
        addr.sin_addr.s_addr = htonl(INADDR_ANY);
        fd = socket(PF_INET, SOCK_STREAM, 0);
        if (fd < 0)
            return -1;

        if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (void*)&reuse, sizeof(reuse)) < 0) {
            close(fd);
            break;
        }

        if (bind(fd, (struct sockaddr*)&addr, sizeof(addr)) == 0) {
            /* Not in use, lets grab it */
            close(fd);
            return i;
        }
        close(fd);

        if (errno == EADDRINUSE) {
            /* In use, try next */
            continue;
        }
        /* Some other bad failure, get out.. */
        break;
    }
    return -1;
}

2113 2114 2115 2116 2117
static pciDeviceList *
qemuGetPciHostDeviceList(virConnectPtr conn,
                         virDomainDefPtr def)
{
    pciDeviceList *list;
2118 2119
    int i;

2120 2121
    if (!(list = pciDeviceListNew(conn)))
        return NULL;
2122 2123 2124 2125 2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136

    for (i = 0 ; i < def->nhostdevs ; i++) {
        virDomainHostdevDefPtr hostdev = def->hostdevs[i];
        pciDevice *dev;

        if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
            continue;
        if (hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI)
            continue;

        dev = pciGetDevice(conn,
                           hostdev->source.subsys.u.pci.domain,
                           hostdev->source.subsys.u.pci.bus,
                           hostdev->source.subsys.u.pci.slot,
                           hostdev->source.subsys.u.pci.function);
2137 2138 2139 2140
        if (!dev) {
            pciDeviceListFree(conn, list);
            return NULL;
        }
2141

2142
        if (pciDeviceListAdd(conn, list, dev) < 0) {
2143
            pciFreeDevice(conn, dev);
2144 2145
            pciDeviceListFree(conn, list);
            return NULL;
2146 2147
        }

2148
        pciDeviceSetManaged(dev, hostdev->managed);
2149 2150
    }

2151 2152 2153 2154
    return list;
}

static int
2155 2156 2157 2158
qemuUpdateActivePciHostdevs(struct qemud_driver *driver,
                            virDomainDefPtr def)
{
    pciDeviceList *pcidevs;
2159
    int i;
2160
    int ret = -1;
2161 2162 2163 2164 2165 2166 2167

    if (!def->nhostdevs)
        return 0;

    if (!(pcidevs = qemuGetPciHostDeviceList(NULL, def)))
        return -1;

2168 2169 2170
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
        pciDeviceListSteal(NULL, pcidevs, dev);
2171 2172
        if (pciDeviceListAdd(NULL,
                             driver->activePciHostdevs,
2173 2174 2175
                             dev) < 0) {
            pciFreeDevice(NULL, dev);
            goto cleanup;
2176 2177 2178
        }
    }

2179 2180 2181
    ret = 0;

cleanup:
2182 2183 2184 2185 2186 2187 2188 2189
    pciDeviceListFree(NULL, pcidevs);
    return ret;
}

static int
qemuPrepareHostDevices(virConnectPtr conn,
                       struct qemud_driver *driver,
                       virDomainDefPtr def)
2190 2191 2192
{
    pciDeviceList *pcidevs;
    int i;
2193
    int ret = -1;
2194 2195 2196 2197 2198 2199 2200

    if (!def->nhostdevs)
        return 0;

    if (!(pcidevs = qemuGetPciHostDeviceList(conn, def)))
        return -1;

2201
    /* We have to use 3 loops here. *All* devices must
2202 2203
     * be detached before we reset any of them, because
     * in some cases you have to reset the whole PCI,
2204 2205
     * which impacts all devices on it. Also, all devices
     * must be reset before being marked as active.
2206 2207 2208 2209 2210 2211 2212
     */

    /* XXX validate that non-managed device isn't in use, eg
     * by checking that device is either un-bound, or bound
     * to pci-stub.ko
     */

2213 2214
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2215 2216 2217
        if (!pciDeviceIsAssignable(conn, dev, !driver->relaxedACS))
            goto cleanup;

2218 2219 2220 2221
        if (pciDeviceGetManaged(dev) &&
            pciDettachDevice(conn, dev) < 0)
            goto cleanup;
    }
2222 2223 2224

    /* Now that all the PCI hostdevs have be dettached, we can safely
     * reset them */
2225 2226 2227
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
        if (pciResetDevice(conn, dev,
2228
                           driver->activePciHostdevs) < 0)
2229 2230
            goto cleanup;
    }
2231

2232
    /* Now mark all the devices as active */
2233 2234 2235
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
        pciDeviceListSteal(NULL, pcidevs, dev);
2236 2237
        if (pciDeviceListAdd(conn,
                             driver->activePciHostdevs,
2238 2239 2240 2241
                             dev) < 0) {
            pciFreeDevice(NULL, dev);
            goto cleanup;
        }
2242 2243
    }

2244
    ret = 0;
2245

2246
cleanup:
2247
    pciDeviceListFree(conn, pcidevs);
2248
    return ret;
2249 2250
}

2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270
static void
qemudReattachManagedDevice(pciDevice *dev)
{
    int retries = 100;

    if (pciDeviceGetManaged(dev)) {
        while (pciWaitForDeviceCleanup(dev, "kvm_assigned_device")
               && retries) {
            usleep(100*1000);
            retries--;
        }
        if (pciReAttachDevice(NULL, dev) < 0) {
            virErrorPtr err = virGetLastError();
            VIR_ERROR(_("Failed to re-attach PCI device: %s"),
                      err ? err->message : "");
            virResetError(err);
        }
    }
}

2271
static void
2272 2273 2274
qemuDomainReAttachHostDevices(virConnectPtr conn,
                              struct qemud_driver *driver,
                              virDomainDefPtr def)
2275
{
2276
    pciDeviceList *pcidevs;
2277 2278
    int i;

2279 2280
    if (!def->nhostdevs)
        return;
2281

2282 2283
    if (!(pcidevs = qemuGetPciHostDeviceList(conn, def))) {
        virErrorPtr err = virGetLastError();
2284
        VIR_ERROR(_("Failed to allocate pciDeviceList: %s"),
2285 2286 2287
                  err ? err->message : "");
        virResetError(err);
        return;
2288 2289
    }

2290 2291
    /* Again 3 loops; mark all devices as inactive before reset
     * them and reset all the devices before re-attach */
2292

2293 2294 2295 2296
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
        pciDeviceListDel(conn, driver->activePciHostdevs, dev);
    }
2297

2298 2299 2300
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
        if (pciResetDevice(conn, dev,
2301
                           driver->activePciHostdevs) < 0) {
2302
            virErrorPtr err = virGetLastError();
2303
            VIR_ERROR(_("Failed to reset PCI device: %s"),
2304 2305 2306
                      err ? err->message : "");
            virResetError(err);
        }
2307
    }
2308

2309 2310
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2311
        qemudReattachManagedDevice(dev);
2312
    }
2313

2314
    pciDeviceListFree(conn, pcidevs);
2315 2316
}

2317 2318 2319 2320 2321 2322 2323 2324 2325 2326
static const char *const defaultDeviceACL[] = {
    "/dev/null", "/dev/full", "/dev/zero",
    "/dev/random", "/dev/urandom",
    "/dev/ptmx", "/dev/kvm", "/dev/kqemu",
    "/dev/rtc", "/dev/hpet", "/dev/net/tun",
    NULL,
};
#define DEVICE_PTY_MAJOR 136
#define DEVICE_SND_MAJOR 116

2327 2328 2329 2330 2331 2332
static int qemuSetupCgroup(virConnectPtr conn,
                           struct qemud_driver *driver,
                           virDomainObjPtr vm)
{
    virCgroupPtr cgroup = NULL;
    int rc;
2333
    unsigned int i;
2334 2335 2336 2337
    const char *const *deviceACL =
        driver->cgroupDeviceACL ?
        (const char *const *)driver->cgroupDeviceACL :
        defaultDeviceACL;
2338 2339 2340 2341 2342 2343 2344 2345 2346 2347 2348 2349

    if (driver->cgroup == NULL)
        return 0; /* Not supported, so claim success */

    rc = virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 1);
    if (rc != 0) {
        virReportSystemError(conn, -rc,
                             _("Unable to create cgroup for %s"),
                             vm->def->name);
        goto cleanup;
    }

2350 2351
    if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
        rc = virCgroupDenyAllDevices(cgroup);
2352
        if (rc != 0) {
2353 2354 2355 2356 2357
            if (rc == -EPERM) {
                VIR_WARN0("Group devices ACL is not accessible, disabling whitelisting");
                goto done;
            }

2358
            virReportSystemError(conn, -rc,
2359
                                 _("Unable to deny all devices for %s"), vm->def->name);
2360 2361 2362
            goto cleanup;
        }

2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376
        for (i = 0; i < vm->def->ndisks ; i++) {
            if (vm->def->disks[i]->type != VIR_DOMAIN_DISK_TYPE_BLOCK ||
                vm->def->disks[i]->src == NULL)
                continue;

            rc = virCgroupAllowDevicePath(cgroup,
                                          vm->def->disks[i]->src);
            if (rc != 0) {
                virReportSystemError(conn, -rc,
                                     _("Unable to allow device %s for %s"),
                                     vm->def->disks[i]->src, vm->def->name);
                goto cleanup;
            }
        }
2377

2378
        rc = virCgroupAllowDeviceMajor(cgroup, 'c', DEVICE_PTY_MAJOR);
2379 2380
        if (rc != 0) {
            virReportSystemError(conn, -rc, "%s",
2381
                                 _("unable to allow /dev/pts/ devices"));
2382 2383 2384
            goto cleanup;
        }

2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403
        if (vm->def->nsounds) {
            rc = virCgroupAllowDeviceMajor(cgroup, 'c', DEVICE_SND_MAJOR);
            if (rc != 0) {
                virReportSystemError(conn, -rc, "%s",
                                     _("unable to allow /dev/snd/ devices"));
                goto cleanup;
            }
        }

        for (i = 0; deviceACL[i] != NULL ; i++) {
            rc = virCgroupAllowDevicePath(cgroup,
                                          deviceACL[i]);
            if (rc < 0 &&
                rc != -ENOENT) {
                virReportSystemError(conn, -rc,
                                     _("unable to allow device %s"),
                                     deviceACL[i]);
                goto cleanup;
            }
2404 2405 2406 2407
        }
    }

done:
2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421
    virCgroupFree(&cgroup);
    return 0;

cleanup:
    if (cgroup) {
        virCgroupRemove(cgroup);
        virCgroupFree(&cgroup);
    }
    return -1;
}


static int qemuRemoveCgroup(virConnectPtr conn,
                            struct qemud_driver *driver,
2422 2423
                            virDomainObjPtr vm,
                            int quiet)
2424 2425 2426 2427 2428 2429 2430 2431 2432
{
    virCgroupPtr cgroup;
    int rc;

    if (driver->cgroup == NULL)
        return 0; /* Not supported, so claim success */

    rc = virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0);
    if (rc != 0) {
2433 2434 2435 2436
        if (!quiet)
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("Unable to find cgroup for %s\n"),
                             vm->def->name);
2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482
        return rc;
    }

    rc = virCgroupRemove(cgroup);
    virCgroupFree(&cgroup);
    return rc;
}

static int qemuAddToCgroup(struct qemud_driver *driver,
                           virDomainDefPtr def)
{
    virCgroupPtr cgroup = NULL;
    int ret = -1;
    int rc;

    if (driver->cgroup == NULL)
        return 0; /* Not supported, so claim success */

    rc = virCgroupForDomain(driver->cgroup, def->name, &cgroup, 0);
    if (rc != 0) {
        virReportSystemError(NULL, -rc,
                             _("unable to find cgroup for domain %s"),
                             def->name);
        goto cleanup;
    }

    rc = virCgroupAddTask(cgroup, getpid());
    if (rc != 0) {
        virReportSystemError(NULL, -rc,
                             _("unable to add domain %s task %d to cgroup"),
                             def->name, getpid());
        goto cleanup;
    }

    ret = 0;

cleanup:
    virCgroupFree(&cgroup);
    return ret;
}


struct qemudHookData {
    virConnectPtr conn;
    virDomainObjPtr vm;
    struct qemud_driver *driver;
2483 2484 2485
};

static int qemudSecurityHook(void *data) {
2486 2487 2488 2489
    struct qemudHookData *h = data;

    if (qemuAddToCgroup(h->driver, h->vm->def) < 0)
        return -1;
2490

2491 2492 2493
    if (h->driver->securityDriver &&
        h->driver->securityDriver->domainSetSecurityProcessLabel &&
        h->driver->securityDriver->domainSetSecurityProcessLabel(h->conn, h->driver->securityDriver, h->vm) < 0)
2494 2495 2496
        return -1;

    return 0;
2497 2498
}

2499 2500 2501
static int
qemuPrepareMonitorChr(virConnectPtr conn,
                      struct qemud_driver *driver,
2502
                      virDomainChrDefPtr monConfig,
2503 2504
                      const char *vm)
{
2505
    monConfig->targetType = VIR_DOMAIN_CHR_TARGET_TYPE_MONITOR;
2506

2507 2508
    monConfig->type = VIR_DOMAIN_CHR_TYPE_UNIX;
    monConfig->data.nix.listen = 1;
2509

D
Daniel P. Berrange 已提交
2510 2511 2512 2513 2514
    if (!(monConfig->info.alias = strdup("monitor"))) {
        virReportOOMError(conn);
        return -1;
    }

2515
    if (virAsprintf(&monConfig->data.nix.path, "%s/%s.monitor",
2516
                    driver->libDir, vm) < 0) {
2517 2518 2519 2520 2521 2522 2523
        virReportOOMError(conn);
        return -1;
    }

    return 0;
}

2524 2525
static int qemudStartVMDaemon(virConnectPtr conn,
                              struct qemud_driver *driver,
2526
                              virDomainObjPtr vm,
2527 2528
                              const char *migrateFrom,
                              int stdin_fd) {
2529
    const char **argv = NULL, **tmp;
2530
    const char **progenv = NULL;
2531
    int i, ret;
2532
    struct stat sb;
2533 2534
    int *tapfds = NULL;
    int ntapfds = 0;
2535
    unsigned int qemuCmdFlags;
2536
    fd_set keepfd;
2537
    const char *emulator;
G
Guido Günther 已提交
2538
    pid_t child;
2539
    int pos = -1;
2540
    char ebuf[1024];
2541
    char *pidfile = NULL;
2542
    int logfile;
2543
    qemuDomainObjPrivatePtr priv = vm->privateData;
2544

2545
    struct qemudHookData hookData;
2546 2547 2548 2549
    hookData.conn = conn;
    hookData.vm = vm;
    hookData.driver = driver;

2550
    FD_ZERO(&keepfd);
2551

D
Daniel P. Berrange 已提交
2552
    if (virDomainObjIsActive(vm)) {
2553
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_INVALID,
2554
                         "%s", _("VM is already active"));
2555 2556 2557
        return -1;
    }

2558 2559
    /* If you are using a SecurityDriver with dynamic labelling,
       then generate a security label for isolation */
2560
    if (driver->securityDriver &&
2561 2562 2563 2564
        driver->securityDriver->domainGenSecurityLabel &&
        driver->securityDriver->domainGenSecurityLabel(conn, vm) < 0)
        return -1;

2565 2566 2567 2568 2569
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityAllLabel &&
        driver->securityDriver->domainSetSecurityAllLabel(conn, vm) < 0)
        goto cleanup;

2570
    /* Ensure no historical cgroup for this VM is lieing around bogus settings */
2571
    qemuRemoveCgroup(conn, driver, vm, 1);
2572

2573 2574 2575
    if ((vm->def->ngraphics == 1) &&
        vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
        vm->def->graphics[0]->data.vnc.autoport) {
2576
        int port = qemudNextFreeVNCPort(driver);
2577
        if (port < 0) {
2578
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
2579
                             "%s", _("Unable to find an unused VNC port"));
2580
            goto cleanup;
2581
        }
2582
        vm->def->graphics[0]->data.vnc.port = port;
2583
    }
2584

L
Laine Stump 已提交
2585
    if (virFileMakePath(driver->logDir) != 0) {
2586 2587 2588
        virReportSystemError(conn, errno,
                             _("cannot create log directory %s"),
                             driver->logDir);
2589
        goto cleanup;
2590 2591
    }

2592
    if ((logfile = qemudLogFD(conn, driver, vm->def->name)) < 0)
2593
        goto cleanup;
2594

2595 2596
    emulator = vm->def->emulator;

2597 2598 2599 2600
    /* Make sure the binary we are about to try exec'ing exists.
     * Technically we could catch the exec() failure, but that's
     * in a sub-process so its hard to feed back a useful error
     */
2601
    if (stat(emulator, &sb) < 0) {
2602 2603 2604
        virReportSystemError(conn, errno,
                             _("Cannot find QEMU binary %s"),
                             emulator);
2605
        goto cleanup;
2606 2607
    }

2608
    if (qemudExtractVersionInfo(emulator,
2609
                                NULL,
2610
                                &qemuCmdFlags) < 0)
2611
        goto cleanup;
2612

2613 2614 2615
    if (qemuSetupCgroup(conn, driver, vm) < 0)
        goto cleanup;

2616
    if (qemuPrepareHostDevices(conn, driver, vm->def) < 0)
2617
        goto cleanup;
2618

2619
    if (VIR_ALLOC(priv->monConfig) < 0) {
2620 2621 2622 2623
        virReportOOMError(conn);
        goto cleanup;
    }

2624
    if (qemuPrepareMonitorChr(conn, driver, priv->monConfig, vm->def->name) < 0)
2625
        goto cleanup;
2626

D
Daniel P. Berrange 已提交
2627 2628 2629
#if HAVE_YAJL
    if (qemuCmdFlags & QEMUD_CMD_FLAG_MONITOR_JSON)
        priv->monJSON = 1;
2630
    else
D
Daniel P. Berrange 已提交
2631
#endif
2632
        priv->monJSON = 0;
D
Daniel P. Berrange 已提交
2633

D
Daniel P. Berrange 已提交
2634 2635 2636 2637 2638 2639 2640
    if ((ret = virFileDeletePid(driver->stateDir, vm->def->name)) != 0) {
        virReportSystemError(conn, ret,
                             _("Cannot remove stale PID file for %s"),
                             vm->def->name);
        goto cleanup;
    }

2641 2642 2643 2644 2645
    if (!(pidfile = virFilePid(driver->stateDir, vm->def->name))) {
        virReportSystemError(conn, errno,
                             "%s", _("Failed to build pidfile path."));
        goto cleanup;
    }
D
Daniel P. Berrange 已提交
2646

2647 2648 2649 2650 2651 2652 2653 2654 2655 2656 2657 2658
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (priv->pciaddrs) {
            qemuDomainPCIAddressSetFree(priv->pciaddrs);
            priv->pciaddrs = NULL;
        }
        if (!(priv->pciaddrs = qemuDomainPCIAddressSetCreate(vm->def)))
            goto cleanup;

        if (qemuAssignDevicePCISlots(vm->def, priv->pciaddrs) < 0)
            goto cleanup;
    }

2659
    vm->def->id = driver->nextvmid++;
2660
    if (qemudBuildCommandLine(conn, driver, vm->def, priv->monConfig,
D
Daniel P. Berrange 已提交
2661
                              priv->monJSON, qemuCmdFlags, &argv, &progenv,
2662 2663
                              &tapfds, &ntapfds, migrateFrom) < 0)
        goto cleanup;
2664

2665 2666
    tmp = progenv;
    while (*tmp) {
2667
        if (safewrite(logfile, *tmp, strlen(*tmp)) < 0)
2668
            VIR_WARN(_("Unable to write envv to logfile: %s"),
2669
                     virStrerror(errno, ebuf, sizeof ebuf));
2670
        if (safewrite(logfile, " ", 1) < 0)
2671
            VIR_WARN(_("Unable to write envv to logfile: %s"),
2672
                     virStrerror(errno, ebuf, sizeof ebuf));
2673 2674
        tmp++;
    }
2675 2676
    tmp = argv;
    while (*tmp) {
2677
        if (safewrite(logfile, *tmp, strlen(*tmp)) < 0)
2678
            VIR_WARN(_("Unable to write argv to logfile: %s"),
2679
                     virStrerror(errno, ebuf, sizeof ebuf));
2680
        if (safewrite(logfile, " ", 1) < 0)
2681
            VIR_WARN(_("Unable to write argv to logfile: %s"),
2682
                     virStrerror(errno, ebuf, sizeof ebuf));
2683 2684
        tmp++;
    }
2685
    if (safewrite(logfile, "\n", 1) < 0)
2686
        VIR_WARN(_("Unable to write argv to logfile: %s"),
2687
                 virStrerror(errno, ebuf, sizeof ebuf));
2688

2689
    if ((pos = lseek(logfile, 0, SEEK_END)) < 0)
2690
        VIR_WARN(_("Unable to seek to end of logfile: %s"),
2691
                 virStrerror(errno, ebuf, sizeof ebuf));
2692

2693 2694 2695
    for (i = 0 ; i < ntapfds ; i++)
        FD_SET(tapfds[i], &keepfd);

2696
    ret = virExecDaemonize(conn, argv, progenv, &keepfd, &child,
2697
                           stdin_fd, &logfile, &logfile,
2698
                           VIR_EXEC_NONBLOCK | VIR_EXEC_CLEAR_CAPS,
2699 2700 2701
                           qemudSecurityHook, &hookData,
                           pidfile);
    VIR_FREE(pidfile);
G
Guido Günther 已提交
2702 2703 2704

    /* wait for qemu process to to show up */
    if (ret == 0) {
2705
        if (virFileReadPid(driver->stateDir, vm->def->name, &vm->pid)) {
2706
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
2707
                             _("Domain %s didn't show up\n"), vm->def->name);
2708
            ret = -1;
G
Guido Günther 已提交
2709
        }
2710 2711 2712 2713 2714 2715 2716 2717 2718 2719 2720
    } else if (ret == -2) {
        /* The virExec process that launches the daemon failed. Pending on
         * when it failed (we can't determine for sure), there may be
         * extra info in the domain log (if the hook failed for example).
         *
         * Pretend like things succeeded, and let 'WaitForMonitor' report
         * the log contents for us.
         */
        vm->pid = child;
        ret = 0;
    }
2721 2722

    vm->state = migrateFrom ? VIR_DOMAIN_PAUSED : VIR_DOMAIN_RUNNING;
2723

2724
    for (i = 0 ; argv[i] ; i++)
2725 2726
        VIR_FREE(argv[i]);
    VIR_FREE(argv);
2727

2728 2729 2730 2731
    for (i = 0 ; progenv[i] ; i++)
        VIR_FREE(progenv[i]);
    VIR_FREE(progenv);

2732 2733 2734
    if (tapfds) {
        for (i = 0 ; i < ntapfds ; i++) {
            close(tapfds[i]);
2735
        }
2736
        VIR_FREE(tapfds);
2737 2738
    }

2739
    if (ret == -1) /* The VM failed to start */
2740 2741
        goto cleanup;

2742 2743 2744
    if (qemudWaitForMonitor(conn, driver, vm, pos) < 0)
        goto abort;

2745
    if (qemuDetectVcpuPIDs(conn, driver, vm) < 0)
2746 2747
        goto abort;

2748
    if (qemudInitCpuAffinity(conn, vm) < 0)
2749 2750 2751 2752 2753
        goto abort;

    if (qemuInitPasswords(driver, vm) < 0)
        goto abort;

D
Daniel P. Berrange 已提交
2754 2755 2756 2757 2758 2759
    /* If we have -device, then addresses are assigned explicitly.
     * If not, then we have to detect dynamic ones here */
    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
        if (qemuInitPCIAddresses(driver, vm) < 0)
            goto abort;
    }
2760

2761
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
2762
    if (qemuMonitorSetBalloon(priv->mon, vm->def->memory) < 0) {
2763
        qemuDomainObjExitMonitorWithDriver(driver, vm);
2764
        goto abort;
2765
    }
2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776

    if (migrateFrom == NULL) {
        /* Allow the CPUS to start executing */
        if (qemuMonitorStartCPUs(priv->mon, conn) < 0) {
            if (virGetLastError() == NULL)
                qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                 "%s", _("resume operation failed"));
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            goto abort;
        }
    }
2777
    qemuDomainObjExitMonitorWithDriver(driver, vm);
2778

2779

2780
    if (virDomainSaveStatus(conn, driver->caps, driver->stateDir, vm) < 0)
2781
        goto abort;
2782

2783
    return 0;
2784 2785

cleanup:
2786 2787 2788
    /* We jump here if we failed to start the VM for any reason
     * XXX investigate if we can kill this block and safely call
     * qemudShutdownVMDaemon even though no PID is running */
2789 2790
    qemuDomainReAttachHostDevices(conn, driver, vm->def);

2791 2792 2793
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityAllLabel)
        driver->securityDriver->domainRestoreSecurityAllLabel(conn, vm);
2794 2795 2796
    if (driver->securityDriver &&
        driver->securityDriver->domainReleaseSecurityLabel)
        driver->securityDriver->domainReleaseSecurityLabel(conn, vm);
2797
    qemuRemoveCgroup(conn, driver, vm, 0);
2798 2799 2800 2801
    if ((vm->def->ngraphics == 1) &&
        vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
        vm->def->graphics[0]->data.vnc.autoport)
        vm->def->graphics[0]->data.vnc.port = -1;
2802 2803
    if (logfile != -1)
        close(logfile);
2804 2805
    vm->def->id = -1;
    return -1;
2806 2807 2808 2809 2810 2811 2812 2813 2814 2815

abort:
    /* We jump here if we failed to initialize the now running VM
     * killing it off and pretend we never started it */
    qemudShutdownVMDaemon(conn, driver, vm);

    if (logfile != -1)
        close(logfile);

    return -1;
2816 2817 2818
}


2819
static void qemudShutdownVMDaemon(virConnectPtr conn,
2820 2821
                                  struct qemud_driver *driver,
                                  virDomainObjPtr vm) {
D
Daniel P. Berrange 已提交
2822
    int ret;
2823
    int retries = 0;
2824
    qemuDomainObjPrivatePtr priv = vm->privateData;
2825
    virErrorPtr orig_err;
D
Daniel P. Berrange 已提交
2826

D
Daniel P. Berrange 已提交
2827
    if (!virDomainObjIsActive(vm))
2828
        return;
2829

2830
    VIR_DEBUG("Shutting down VM '%s'", vm->def->name);
2831

2832 2833 2834 2835
    /* This method is routinely used in clean up paths. Disable error
     * reporting so we don't squash a legit error. */
    orig_err = virSaveLastError();

2836 2837 2838 2839 2840 2841 2842 2843 2844 2845 2846 2847 2848 2849 2850 2851
    if (driver->macFilter) {
        int i;
        virDomainDefPtr def = vm->def;
        for (i = 0 ; i < def->nnets ; i++) {
            virDomainNetDefPtr net = def->nets[i];
            if (net->ifname == NULL)
                continue;
            if ((errno = networkDisallowMacOnPort(conn, driver, net->ifname,
                                                  net->mac))) {
                virReportSystemError(conn, errno,
             _("failed to remove ebtables rule to allow MAC address on  '%s'"),
                                     net->ifname);
            }
        }
    }

G
Guido Günther 已提交
2852 2853
    if (virKillProcess(vm->pid, 0) == 0 &&
        virKillProcess(vm->pid, SIGTERM) < 0)
2854 2855 2856
        virReportSystemError(conn, errno,
                             _("Failed to send SIGTERM to %s (%d)"),
                             vm->def->name, vm->pid);
2857

2858 2859 2860
    if (priv->mon &&
        qemuMonitorClose(priv->mon) == 0) {
        virDomainObjUnref(vm);
2861
        priv->mon = NULL;
2862
    }
2863

2864 2865 2866 2867 2868
    if (priv->monConfig) {
        if (priv->monConfig->type == VIR_DOMAIN_CHR_TYPE_UNIX)
            unlink(priv->monConfig->data.nix.path);
        virDomainChrDefFree(priv->monConfig);
        priv->monConfig = NULL;
2869 2870
    }

G
Guido Günther 已提交
2871 2872
    /* shut it off for sure */
    virKillProcess(vm->pid, SIGKILL);
2873

2874
    /* Reset Security Labels */
2875
    if (driver->securityDriver &&
2876 2877 2878 2879 2880
        driver->securityDriver->domainRestoreSecurityAllLabel)
        driver->securityDriver->domainRestoreSecurityAllLabel(conn, vm);
    if (driver->securityDriver &&
        driver->securityDriver->domainReleaseSecurityLabel)
        driver->securityDriver->domainReleaseSecurityLabel(conn, vm);
2881

2882 2883 2884 2885 2886 2887 2888
    /* Clear out dynamically assigned labels */
    if (vm->def->seclabel.type == VIR_DOMAIN_SECLABEL_DYNAMIC) {
        VIR_FREE(vm->def->seclabel.model);
        VIR_FREE(vm->def->seclabel.label);
        VIR_FREE(vm->def->seclabel.imagelabel);
    }

2889
    virDomainDefClearPCIAddresses(vm->def);
D
Daniel P. Berrange 已提交
2890
    virDomainDefClearDeviceAliases(vm->def);
2891 2892
    qemuDomainPCIAddressSetFree(priv->pciaddrs);
    priv->pciaddrs = NULL;
2893

2894
    qemuDomainReAttachHostDevices(conn, driver, vm->def);
2895

2896
retry:
2897
    if ((ret = qemuRemoveCgroup(conn, driver, vm, 0)) < 0) {
2898 2899 2900 2901 2902 2903 2904 2905
        if (ret == -EBUSY && (retries++ < 5)) {
            usleep(200*1000);
            goto retry;
        }
        VIR_WARN("Failed to remove cgroup for %s",
                 vm->def->name);
    }

2906
    qemudRemoveDomainStatus(conn, driver, vm);
D
Daniel P. Berrange 已提交
2907

2908
    vm->pid = -1;
2909
    vm->def->id = -1;
2910
    vm->state = VIR_DOMAIN_SHUTOFF;
2911 2912
    VIR_FREE(priv->vcpupids);
    priv->nvcpupids = 0;
2913 2914

    if (vm->newDef) {
2915
        virDomainDefFree(vm->def);
2916
        vm->def = vm->newDef;
2917
        vm->def->id = -1;
2918 2919
        vm->newDef = NULL;
    }
2920 2921 2922 2923 2924

    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
2925 2926 2927
}


2928
static virDrvOpenStatus qemudOpen(virConnectPtr conn,
2929
                                  virConnectAuthPtr auth ATTRIBUTE_UNUSED,
2930
                                  int flags ATTRIBUTE_UNUSED) {
2931
    if (conn->uri == NULL) {
2932 2933 2934
        if (qemu_driver == NULL)
            return VIR_DRV_OPEN_DECLINED;

2935
        conn->uri = xmlParseURI(qemu_driver->privileged ?
2936 2937
                                "qemu:///system" :
                                "qemu:///session");
2938
        if (!conn->uri) {
2939
            virReportOOMError(conn);
2940 2941
            return VIR_DRV_OPEN_ERROR;
        }
2942 2943 2944 2945 2946 2947 2948 2949 2950 2951
    } else {
        /* If URI isn't 'qemu' its definitely not for us */
        if (conn->uri->scheme == NULL ||
            STRNEQ(conn->uri->scheme, "qemu"))
            return VIR_DRV_OPEN_DECLINED;

        /* Allow remote driver to deal with URIs with hostname server */
        if (conn->uri->server != NULL)
            return VIR_DRV_OPEN_DECLINED;

2952 2953 2954 2955 2956 2957
        if (qemu_driver == NULL) {
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, "%s",
                             _("qemu state driver is not active"));
            return VIR_DRV_OPEN_ERROR;
        }

2958 2959 2960 2961 2962 2963 2964 2965 2966
        if (conn->uri->path == NULL) {
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("no QEMU URI path given, try %s"),
                             qemu_driver->privileged
                               ? "qemu:///system"
                               : "qemu:///session");
                return VIR_DRV_OPEN_ERROR;
        }

2967
        if (qemu_driver->privileged) {
2968 2969 2970 2971 2972 2973 2974 2975 2976 2977 2978 2979 2980 2981 2982
            if (STRNEQ (conn->uri->path, "/system") &&
                STRNEQ (conn->uri->path, "/session")) {
                qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                 _("unexpected QEMU URI path '%s', try qemu:///system"),
                                 conn->uri->path);
                return VIR_DRV_OPEN_ERROR;
            }
        } else {
            if (STRNEQ (conn->uri->path, "/session")) {
                qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                 _("unexpected QEMU URI path '%s', try qemu:///session"),
                                 conn->uri->path);
                return VIR_DRV_OPEN_ERROR;
            }
        }
2983 2984 2985 2986 2987 2988 2989
    }
    conn->privateData = qemu_driver;

    return VIR_DRV_OPEN_SUCCESS;
}

static int qemudClose(virConnectPtr conn) {
2990
    struct qemud_driver *driver = conn->privateData;
2991 2992

    /* Get rid of callbacks registered for this conn */
2993
    qemuDriverLock(driver);
2994
    virDomainEventCallbackListRemoveConn(conn, driver->domainEventCallbacks);
2995
    qemuDriverUnlock(driver);
2996 2997 2998 2999 3000 3001

    conn->privateData = NULL;

    return 0;
}

D
Daniel Veillard 已提交
3002 3003 3004 3005 3006
/* Which features are supported by this driver? */
static int
qemudSupportsFeature (virConnectPtr conn ATTRIBUTE_UNUSED, int feature)
{
    switch (feature) {
3007 3008 3009 3010 3011
    case VIR_DRV_FEATURE_MIGRATION_V2:
    case VIR_DRV_FEATURE_MIGRATION_P2P:
        return 1;
    default:
        return 0;
D
Daniel Veillard 已提交
3012 3013 3014
    }
}

3015
static const char *qemudGetType(virConnectPtr conn ATTRIBUTE_UNUSED) {
3016
    return "QEMU";
3017 3018
}

3019

3020 3021 3022 3023 3024 3025 3026 3027 3028 3029 3030 3031 3032
static int qemuIsSecure(virConnectPtr conn ATTRIBUTE_UNUSED)
{
    /* Trivially secure, since always inside the daemon */
    return 1;
}

static int qemuIsEncrypted(virConnectPtr conn ATTRIBUTE_UNUSED)
{
    /* Not encrypted, but remote driver takes care of that */
    return 0;
}


3033 3034 3035 3036
static int kvmGetMaxVCPUs(void) {
    int maxvcpus = 1;

    int r, fd;
3037

3038 3039
    fd = open(KVM_DEVICE, O_RDONLY);
    if (fd < 0) {
3040 3041
        virReportSystemError(NULL, errno, _("Unable to open %s"), KVM_DEVICE);
        return -1;
3042 3043 3044 3045 3046 3047 3048 3049 3050 3051 3052
    }

    r = ioctl(fd, KVM_CHECK_EXTENSION, KVM_CAP_NR_VCPUS);
    if (r > 0)
        maxvcpus = r;

    close(fd);
    return maxvcpus;
}


3053
static int qemudGetMaxVCPUs(virConnectPtr conn, const char *type) {
3054 3055 3056
    if (!type)
        return 16;

3057
    if (STRCASEEQ(type, "qemu"))
3058 3059
        return 16;

3060
    if (STRCASEEQ(type, "kvm"))
3061
        return kvmGetMaxVCPUs();
3062

3063
    if (STRCASEEQ(type, "kqemu"))
3064
        return 1;
3065 3066 3067

    qemudReportError(conn, NULL, NULL, VIR_ERR_INVALID_ARG,
                     _("unknown type '%s'"), type);
3068 3069 3070
    return -1;
}

3071

3072
static char *qemudGetCapabilities(virConnectPtr conn) {
3073
    struct qemud_driver *driver = conn->privateData;
3074
    virCapsPtr caps = NULL;
3075
    char *xml = NULL;
3076

3077
    qemuDriverLock(driver);
3078

3079 3080 3081 3082 3083
    if ((caps = qemuCreateCapabilities(qemu_driver->caps,
                                       qemu_driver->securityDriver)) == NULL) {
        virCapabilitiesFree(caps);
        goto cleanup;
    }
3084

3085
    virCapabilitiesFree(qemu_driver->caps);
3086 3087 3088
    qemu_driver->caps = caps;

    if ((xml = virCapabilitiesFormatXML(driver->caps)) == NULL)
3089
        virReportOOMError(conn);
3090 3091

cleanup:
3092
    qemuDriverUnlock(driver);
3093

3094
    return xml;
3095 3096 3097
}


3098
static int qemudGetProcessInfo(unsigned long long *cpuTime, int *lastCpu, int pid, int tid) {
D
Daniel P. Berrange 已提交
3099 3100
    char proc[PATH_MAX];
    FILE *pidinfo;
3101
    unsigned long long usertime, systime;
3102 3103
    int cpu;
    int ret;
D
Daniel P. Berrange 已提交
3104

3105 3106 3107 3108 3109 3110
    if (tid)
        ret = snprintf(proc, sizeof(proc), "/proc/%d/task/%d/stat", pid, tid);
    else
        ret = snprintf(proc, sizeof(proc), "/proc/%d/stat", pid);
    if (ret >= (int)sizeof(proc)) {
        errno = E2BIG;
D
Daniel P. Berrange 已提交
3111 3112 3113 3114
        return -1;
    }

    if (!(pidinfo = fopen(proc, "r"))) {
3115
        /*printf("cannot read pid info");*/
D
Daniel P. Berrange 已提交
3116
        /* VM probably shut down, so fake 0 */
3117 3118 3119 3120
        if (cpuTime)
            *cpuTime = 0;
        if (lastCpu)
            *lastCpu = 0;
D
Daniel P. Berrange 已提交
3121 3122 3123
        return 0;
    }

3124 3125 3126 3127 3128 3129 3130 3131 3132 3133
    /* See 'man proc' for information about what all these fields are. We're
     * only interested in a very few of them */
    if (fscanf(pidinfo,
               /* pid -> stime */
               "%*d %*s %*c %*d %*d %*d %*d %*d %*u %*u %*u %*u %*u %llu %llu"
               /* cutime -> endcode */
               "%*d %*d %*d %*d %*d %*u %*u %*d %*u %*u %*u %*u"
               /* startstack -> processor */
               "%*u %*u %*u %*u %*u %*u %*u %*u %*u %*u %*d %d",
               &usertime, &systime, &cpu) != 3) {
3134
        fclose(pidinfo);
3135 3136
        VIR_WARN0("cannot parse process status data");
        errno = -EINVAL;
D
Daniel P. Berrange 已提交
3137 3138 3139 3140 3141 3142 3143 3144
        return -1;
    }

    /* We got jiffies
     * We want nanoseconds
     * _SC_CLK_TCK is jiffies per second
     * So calulate thus....
     */
3145 3146 3147 3148 3149
    if (cpuTime)
        *cpuTime = 1000ull * 1000ull * 1000ull * (usertime + systime) / (unsigned long long)sysconf(_SC_CLK_TCK);
    if (lastCpu)
        *lastCpu = cpu;

D
Daniel P. Berrange 已提交
3150

3151 3152
    VIR_DEBUG("Got status for %d/%d user=%llu sys=%llu cpu=%d",
              pid, tid, usertime, systime, cpu);
D
Daniel P. Berrange 已提交
3153 3154 3155 3156 3157 3158 3159

    fclose(pidinfo);

    return 0;
}


3160
static virDomainPtr qemudDomainLookupByID(virConnectPtr conn,
3161
                                          int id) {
3162 3163 3164 3165
    struct qemud_driver *driver = conn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;

3166
    qemuDriverLock(driver);
3167
    vm  = virDomainFindByID(&driver->domains, id);
3168
    qemuDriverUnlock(driver);
3169 3170

    if (!vm) {
3171 3172
        qemudReportError(conn, NULL, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching id %d"), id);
3173
        goto cleanup;
3174 3175
    }

3176
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
3177
    if (dom) dom->id = vm->def->id;
3178 3179

cleanup:
3180 3181
    if (vm)
        virDomainObjUnlock(vm);
3182 3183
    return dom;
}
3184

3185
static virDomainPtr qemudDomainLookupByUUID(virConnectPtr conn,
3186
                                            const unsigned char *uuid) {
3187 3188 3189
    struct qemud_driver *driver = conn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;
3190

3191
    qemuDriverLock(driver);
3192
    vm = virDomainFindByUUID(&driver->domains, uuid);
3193 3194
    qemuDriverUnlock(driver);

3195
    if (!vm) {
3196 3197 3198
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(uuid, uuidstr);
        qemudReportError(conn, NULL, NULL, VIR_ERR_NO_DOMAIN,
3199
                         _("no domain with matching uuid '%s'"), uuidstr);
3200
        goto cleanup;
3201 3202
    }

3203
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
3204
    if (dom) dom->id = vm->def->id;
3205 3206

cleanup:
3207 3208
    if (vm)
        virDomainObjUnlock(vm);
3209 3210
    return dom;
}
3211

3212
static virDomainPtr qemudDomainLookupByName(virConnectPtr conn,
3213
                                            const char *name) {
3214 3215 3216
    struct qemud_driver *driver = conn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;
3217

3218
    qemuDriverLock(driver);
3219
    vm = virDomainFindByName(&driver->domains, name);
3220 3221
    qemuDriverUnlock(driver);

3222
    if (!vm) {
3223 3224
        qemudReportError(conn, NULL, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching name '%s'"), name);
3225
        goto cleanup;
3226 3227
    }

3228
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
3229
    if (dom) dom->id = vm->def->id;
3230 3231

cleanup:
3232 3233
    if (vm)
        virDomainObjUnlock(vm);
3234 3235 3236
    return dom;
}

3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277 3278 3279 3280

static int qemuDomainIsActive(virDomainPtr dom)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr obj;
    int ret = -1;

    qemuDriverLock(driver);
    obj = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!obj) {
        qemudReportError(dom->conn, NULL, NULL, VIR_ERR_NO_DOMAIN, NULL);
        goto cleanup;
    }
    ret = virDomainObjIsActive(obj);

cleanup:
    if (obj)
        virDomainObjUnlock(obj);
    return ret;
}

static int qemuDomainIsPersistent(virDomainPtr dom)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr obj;
    int ret = -1;

    qemuDriverLock(driver);
    obj = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!obj) {
        qemudReportError(dom->conn, NULL, NULL, VIR_ERR_NO_DOMAIN, NULL);
        goto cleanup;
    }
    ret = obj->persistent;

cleanup:
    if (obj)
        virDomainObjUnlock(obj);
    return ret;
}


3281
static int qemudGetVersion(virConnectPtr conn, unsigned long *version) {
3282 3283 3284
    struct qemud_driver *driver = conn->privateData;
    int ret = -1;

3285
    qemuDriverLock(driver);
3286
    if (qemudExtractVersion(conn, driver) < 0)
3287
        goto cleanup;
3288

3289
    *version = qemu_driver->qemuVersion;
3290 3291 3292
    ret = 0;

cleanup:
3293
    qemuDriverUnlock(driver);
3294
    return ret;
D
Daniel P. Berrange 已提交
3295 3296
}

3297
static int qemudListDomains(virConnectPtr conn, int *ids, int nids) {
3298
    struct qemud_driver *driver = conn->privateData;
3299
    int n;
3300

3301
    qemuDriverLock(driver);
3302
    n = virDomainObjListGetActiveIDs(&driver->domains, ids, nids);
3303
    qemuDriverUnlock(driver);
3304

3305
    return n;
D
Daniel P. Berrange 已提交
3306
}
3307

3308
static int qemudNumDomains(virConnectPtr conn) {
3309
    struct qemud_driver *driver = conn->privateData;
3310
    int n;
3311

3312
    qemuDriverLock(driver);
3313
    n = virDomainObjListNumOfDomains(&driver->domains, 1);
3314
    qemuDriverUnlock(driver);
3315

3316
    return n;
D
Daniel P. Berrange 已提交
3317
}
3318

3319
static virDomainPtr qemudDomainCreate(virConnectPtr conn, const char *xml,
3320
                                      unsigned int flags ATTRIBUTE_UNUSED) {
3321
    struct qemud_driver *driver = conn->privateData;
3322
    virDomainDefPtr def;
3323
    virDomainObjPtr vm = NULL;
3324
    virDomainPtr dom = NULL;
3325
    virDomainEventPtr event = NULL;
D
Daniel P. Berrange 已提交
3326

3327
    qemuDriverLock(driver);
3328 3329
    if (!(def = virDomainDefParseString(conn, driver->caps, xml,
                                        VIR_DOMAIN_XML_INACTIVE)))
3330
        goto cleanup;
3331

3332 3333 3334
    if (virSecurityDriverVerify(conn, def) < 0)
        goto cleanup;

3335 3336
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
3337

3338
    if (!(vm = virDomainAssignDef(conn,
3339
                                  driver->caps,
3340
                                  &driver->domains,
3341 3342 3343 3344
                                  def)))
        goto cleanup;

    def = NULL;
D
Daniel P. Berrange 已提交
3345

3346 3347 3348
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup; /* XXXX free the 'vm' we created ? */

3349
    if (qemudStartVMDaemon(conn, driver, vm, NULL, -1) < 0) {
3350 3351 3352
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains,
                                    vm);
3353
        vm = NULL;
3354
        goto endjob;
D
Daniel P. Berrange 已提交
3355
    }
3356 3357 3358 3359

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_BOOTED);
D
Daniel P. Berrange 已提交
3360

3361
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
3362
    if (dom) dom->id = vm->def->id;
3363

3364
endjob:
3365 3366 3367
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3368

3369 3370
cleanup:
    virDomainDefFree(def);
3371 3372
    if (vm)
        virDomainObjUnlock(vm);
3373 3374
    if (event)
        qemuDomainEventQueue(driver, event);
3375
    qemuDriverUnlock(driver);
3376
    return dom;
D
Daniel P. Berrange 已提交
3377 3378 3379
}


3380
static int qemudDomainSuspend(virDomainPtr dom) {
3381 3382 3383
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3384
    virDomainEventPtr event = NULL;
3385

3386
    qemuDriverLock(driver);
3387
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3388

D
Daniel P. Berrange 已提交
3389
    if (!vm) {
3390 3391 3392 3393
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3394
        goto cleanup;
D
Daniel P. Berrange 已提交
3395
    }
3396 3397 3398
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3399
    if (!virDomainObjIsActive(vm)) {
3400
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
3401
                         "%s", _("domain is not running"));
3402
        goto endjob;
D
Daniel P. Berrange 已提交
3403
    }
3404
    if (vm->state != VIR_DOMAIN_PAUSED) {
3405
        qemuDomainObjPrivatePtr priv = vm->privateData;
3406
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
3407
        if (qemuMonitorStopCPUs(priv->mon) < 0) {
3408 3409
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            goto endjob;
3410
        }
3411
        qemuDomainObjExitMonitorWithDriver(driver, vm);
3412
        vm->state = VIR_DOMAIN_PAUSED;
3413 3414 3415
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_SUSPENDED,
                                         VIR_DOMAIN_EVENT_SUSPENDED_PAUSED);
D
Daniel P. Berrange 已提交
3416
    }
3417
    if (virDomainSaveStatus(dom->conn, driver->caps, driver->stateDir, vm) < 0)
3418
        goto endjob;
3419 3420
    ret = 0;

3421
endjob:
3422 3423
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3424

3425
cleanup:
3426 3427
    if (vm)
        virDomainObjUnlock(vm);
3428

3429
    if (event)
3430
        qemuDomainEventQueue(driver, event);
3431
    qemuDriverUnlock(driver);
3432
    return ret;
D
Daniel P. Berrange 已提交
3433 3434 3435
}


3436
static int qemudDomainResume(virDomainPtr dom) {
3437 3438 3439
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3440
    virDomainEventPtr event = NULL;
3441

3442
    qemuDriverLock(driver);
3443
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3444

D
Daniel P. Berrange 已提交
3445
    if (!vm) {
3446 3447 3448 3449
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3450
        goto cleanup;
D
Daniel P. Berrange 已提交
3451
    }
3452 3453 3454 3455

    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3456
    if (!virDomainObjIsActive(vm)) {
3457
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
3458
                         "%s", _("domain is not running"));
3459
        goto endjob;
D
Daniel P. Berrange 已提交
3460
    }
3461
    if (vm->state == VIR_DOMAIN_PAUSED) {
3462
        qemuDomainObjPrivatePtr priv = vm->privateData;
3463
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
3464
        if (qemuMonitorStartCPUs(priv->mon, dom->conn) < 0) {
3465
            qemuDomainObjExitMonitorWithDriver(driver, vm);
3466 3467 3468
            if (virGetLastError() == NULL)
                qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                                 "%s", _("resume operation failed"));
3469
            goto endjob;
3470
        }
3471
        qemuDomainObjExitMonitorWithDriver(driver, vm);
3472
        vm->state = VIR_DOMAIN_RUNNING;
3473 3474 3475
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_RESUMED,
                                         VIR_DOMAIN_EVENT_RESUMED_UNPAUSED);
D
Daniel P. Berrange 已提交
3476
    }
3477
    if (virDomainSaveStatus(dom->conn, driver->caps, driver->stateDir, vm) < 0)
3478
        goto endjob;
3479 3480
    ret = 0;

3481
endjob:
3482 3483
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3484

3485
cleanup:
3486 3487
    if (vm)
        virDomainObjUnlock(vm);
3488
    if (event)
3489
        qemuDomainEventQueue(driver, event);
3490
    qemuDriverUnlock(driver);
3491
    return ret;
D
Daniel P. Berrange 已提交
3492 3493 3494
}


3495
static int qemudDomainShutdown(virDomainPtr dom) {
3496 3497 3498
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3499

3500
    qemuDriverLock(driver);
3501
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3502 3503
    qemuDriverUnlock(driver);

3504
    if (!vm) {
3505 3506 3507 3508
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3509
        goto cleanup;
3510 3511
    }

3512 3513 3514
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3515
    if (!virDomainObjIsActive(vm)) {
3516 3517
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
                         "%s", _("domain is not running"));
3518
        goto endjob;
3519 3520
    }

3521
    qemuDomainObjPrivatePtr priv = vm->privateData;
3522 3523 3524
    qemuDomainObjEnterMonitor(vm);
    ret = qemuMonitorSystemPowerdown(priv->mon);
    qemuDomainObjExitMonitor(vm);
3525

3526
endjob:
3527 3528
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3529

3530
cleanup:
3531 3532
    if (vm)
        virDomainObjUnlock(vm);
3533
    return ret;
3534 3535 3536
}


3537
static int qemudDomainDestroy(virDomainPtr dom) {
3538 3539 3540
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3541
    virDomainEventPtr event = NULL;
3542

3543
    qemuDriverLock(driver);
3544
    vm  = virDomainFindByUUID(&driver->domains, dom->uuid);
D
Daniel P. Berrange 已提交
3545
    if (!vm) {
3546 3547 3548 3549
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3550
        goto cleanup;
D
Daniel P. Berrange 已提交
3551
    }
3552 3553 3554 3555

    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3556
    if (!virDomainObjIsActive(vm)) {
3557
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
3558
                         "%s", _("domain is not running"));
3559
        goto endjob;
3560
    }
3561

3562
    qemudShutdownVMDaemon(dom->conn, driver, vm);
3563 3564 3565
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     VIR_DOMAIN_EVENT_STOPPED_DESTROYED);
3566
    if (!vm->persistent) {
3567 3568 3569
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains,
                                    vm);
3570 3571
        vm = NULL;
    }
3572 3573
    ret = 0;

3574
endjob:
3575 3576 3577
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3578

3579
cleanup:
3580 3581
    if (vm)
        virDomainObjUnlock(vm);
3582 3583
    if (event)
        qemuDomainEventQueue(driver, event);
3584
    qemuDriverUnlock(driver);
3585
    return ret;
D
Daniel P. Berrange 已提交
3586 3587 3588
}


3589
static char *qemudDomainGetOSType(virDomainPtr dom) {
3590 3591 3592
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    char *type = NULL;
3593

3594
    qemuDriverLock(driver);
3595
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3596
    qemuDriverUnlock(driver);
3597
    if (!vm) {
3598 3599 3600 3601
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3602
        goto cleanup;
3603 3604
    }

3605
    if (!(type = strdup(vm->def->os.type)))
3606
        virReportOOMError(dom->conn);
3607 3608

cleanup:
3609 3610
    if (vm)
        virDomainObjUnlock(vm);
3611 3612 3613
    return type;
}

3614 3615
/* Returns max memory in kb, 0 if error */
static unsigned long qemudDomainGetMaxMemory(virDomainPtr dom) {
3616 3617 3618
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    unsigned long ret = 0;
3619

3620
    qemuDriverLock(driver);
3621
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3622 3623
    qemuDriverUnlock(driver);

3624
    if (!vm) {
3625 3626
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3627
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
3628
                         _("no domain with matching uuid '%s'"), uuidstr);
3629
        goto cleanup;
3630 3631
    }

3632 3633 3634
    ret = vm->def->maxmem;

cleanup:
3635 3636
    if (vm)
        virDomainObjUnlock(vm);
3637
    return ret;
3638 3639 3640
}

static int qemudDomainSetMaxMemory(virDomainPtr dom, unsigned long newmax) {
3641 3642 3643
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3644

3645
    qemuDriverLock(driver);
3646
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3647 3648
    qemuDriverUnlock(driver);

3649
    if (!vm) {
3650 3651
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3652
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
3653
                         _("no domain with matching uuid '%s'"), uuidstr);
3654
        goto cleanup;
3655 3656 3657 3658
    }

    if (newmax < vm->def->memory) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
3659
                         "%s", _("cannot set max memory lower than current memory"));
3660
        goto cleanup;;
3661 3662 3663
    }

    vm->def->maxmem = newmax;
3664 3665 3666
    ret = 0;

cleanup:
3667 3668
    if (vm)
        virDomainObjUnlock(vm);
3669
    return ret;
3670 3671
}

3672

3673
static int qemudDomainSetMemory(virDomainPtr dom, unsigned long newmem) {
3674 3675 3676
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3677

3678
    qemuDriverLock(driver);
3679
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3680
    qemuDriverUnlock(driver);
3681
    if (!vm) {
3682 3683
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3684
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
3685
                         _("no domain with matching uuid '%s'"), uuidstr);
3686
        goto cleanup;
3687 3688 3689 3690
    }

    if (newmem > vm->def->maxmem) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
3691
                         "%s", _("cannot set memory higher than max memory"));
3692
        goto cleanup;
3693 3694
    }

3695 3696 3697
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3698
    if (virDomainObjIsActive(vm)) {
3699
        qemuDomainObjPrivatePtr priv = vm->privateData;
3700
        qemuDomainObjEnterMonitor(vm);
3701
        int r = qemuMonitorSetBalloon(priv->mon, newmem);
3702
        qemuDomainObjExitMonitor(vm);
3703
        if (r < 0)
3704
            goto endjob;
3705 3706 3707

        /* Lack of balloon support is a fatal error */
        if (r == 0) {
3708 3709
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                             "%s", _("cannot set memory of an active domain"));
3710
            goto endjob;
3711
        }
3712 3713 3714
    } else {
        vm->def->memory = newmem;
    }
3715
    ret = 0;
3716

3717
endjob:
3718 3719
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3720

3721
cleanup:
3722 3723
    if (vm)
        virDomainObjUnlock(vm);
3724
    return ret;
3725 3726
}

3727
static int qemudDomainGetInfo(virDomainPtr dom,
3728
                              virDomainInfoPtr info) {
3729 3730 3731
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3732 3733
    int err;
    unsigned long balloon;
3734

3735
    qemuDriverLock(driver);
3736
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3737
    qemuDriverUnlock(driver);
D
Daniel P. Berrange 已提交
3738
    if (!vm) {
3739 3740 3741 3742
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3743
        goto cleanup;
D
Daniel P. Berrange 已提交
3744 3745
    }

3746
    info->state = vm->state;
D
Daniel P. Berrange 已提交
3747

D
Daniel P. Berrange 已提交
3748
    if (!virDomainObjIsActive(vm)) {
3749
        info->cpuTime = 0;
D
Daniel P. Berrange 已提交
3750
    } else {
3751
        if (qemudGetProcessInfo(&(info->cpuTime), NULL, vm->pid, 0) < 0) {
3752
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED, ("cannot read cputime for domain"));
3753
            goto cleanup;
D
Daniel P. Berrange 已提交
3754 3755 3756
        }
    }

3757
    info->maxMem = vm->def->maxmem;
3758

D
Daniel P. Berrange 已提交
3759
    if (virDomainObjIsActive(vm)) {
3760
        qemuDomainObjPrivatePtr priv = vm->privateData;
3761 3762 3763
        if (!priv->jobActive) {
            if (qemuDomainObjBeginJob(vm) < 0)
                goto cleanup;
3764

3765 3766 3767 3768
            qemuDomainObjEnterMonitor(vm);
            err = qemuMonitorGetBalloonInfo(priv->mon, &balloon);
            qemuDomainObjExitMonitor(vm);
            if (err < 0) {
3769 3770
                if (qemuDomainObjEndJob(vm) == 0)
                    vm = NULL;
3771 3772 3773 3774 3775 3776 3777 3778 3779
                goto cleanup;
            }

            if (err == 0)
                /* Balloon not supported, so maxmem is always the allocation */
                info->memory = vm->def->maxmem;
            else
                info->memory = balloon;

3780 3781 3782 3783
            if (qemuDomainObjEndJob(vm) == 0) {
                vm = NULL;
                goto cleanup;
            }
3784 3785 3786
        } else {
            info->memory = vm->def->memory;
        }
3787 3788 3789 3790
    } else {
        info->memory = vm->def->memory;
    }

3791
    info->nrVirtCpu = vm->def->vcpus;
3792 3793 3794
    ret = 0;

cleanup:
3795 3796
    if (vm)
        virDomainObjUnlock(vm);
3797
    return ret;
D
Daniel P. Berrange 已提交
3798 3799 3800
}


3801
#define QEMUD_SAVE_MAGIC "LibvirtQemudSave"
3802 3803 3804
#define QEMUD_SAVE_VERSION 2

enum qemud_save_formats {
3805 3806 3807
    QEMUD_SAVE_FORMAT_RAW = 0,
    QEMUD_SAVE_FORMAT_GZIP = 1,
    QEMUD_SAVE_FORMAT_BZIP2 = 2,
3808 3809
    /*
     * Deprecated by xz and never used as part of a release
3810
     * QEMUD_SAVE_FORMAT_LZMA
3811 3812
     */
    QEMUD_SAVE_FORMAT_XZ = 3,
3813
    QEMUD_SAVE_FORMAT_LZOP = 4,
3814 3815 3816
    /* Note: add new members only at the end.
       These values are used in the on-disk format.
       Do not change or re-use numbers. */
3817 3818

    QEMUD_SAVE_FORMAT_LAST
3819
};
3820

3821 3822 3823 3824 3825
VIR_ENUM_DECL(qemudSaveCompression)
VIR_ENUM_IMPL(qemudSaveCompression, QEMUD_SAVE_FORMAT_LAST,
              "raw",
              "gzip",
              "bzip2",
3826 3827
              "xz",
              "lzop")
3828

3829 3830 3831 3832 3833
struct qemud_save_header {
    char magic[sizeof(QEMUD_SAVE_MAGIC)-1];
    int version;
    int xml_len;
    int was_running;
3834 3835
    int compressed;
    int unused[15];
3836 3837
};

3838
static int qemudDomainSave(virDomainPtr dom,
3839 3840
                           const char *path)
{
3841
    struct qemud_driver *driver = dom->conn->privateData;
3842
    virDomainObjPtr vm = NULL;
3843 3844
    int fd = -1;
    char *xml = NULL;
3845
    struct qemud_save_header header;
3846
    int ret = -1;
3847
    int rc;
3848
    virDomainEventPtr event = NULL;
3849 3850 3851 3852 3853

    memset(&header, 0, sizeof(header));
    memcpy(header.magic, QEMUD_SAVE_MAGIC, sizeof(header.magic));
    header.version = QEMUD_SAVE_VERSION;

3854
    qemuDriverLock(driver);
3855 3856 3857
    if (driver->saveImageFormat == NULL)
        header.compressed = QEMUD_SAVE_FORMAT_RAW;
    else {
3858 3859 3860 3861 3862 3863
        header.compressed =
            qemudSaveCompressionTypeFromString(driver->saveImageFormat);
        if (header.compressed < 0) {
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                             "%s", _("Invalid save image format specified "
                                     "in configuration file"));
3864
            goto cleanup;
3865
        }
3866 3867
    }

3868
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3869

D
Daniel P. Berrange 已提交
3870
    if (!vm) {
3871 3872 3873 3874
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3875
        goto cleanup;
D
Daniel P. Berrange 已提交
3876
    }
3877

3878 3879 3880
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3881
    if (!virDomainObjIsActive(vm)) {
3882
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
3883
                         "%s", _("domain is not running"));
3884
        goto endjob;
D
Daniel P. Berrange 已提交
3885
    }
3886 3887 3888

    /* Pause */
    if (vm->state == VIR_DOMAIN_RUNNING) {
3889
        qemuDomainObjPrivatePtr priv = vm->privateData;
3890
        header.was_running = 1;
3891
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
3892
        if (qemuMonitorStopCPUs(priv->mon) < 0) {
3893 3894
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            goto endjob;
3895
        }
3896
        qemuDomainObjExitMonitorWithDriver(driver, vm);
3897
        vm->state = VIR_DOMAIN_PAUSED;
3898 3899 3900
    }

    /* Get XML for the domain */
3901
    xml = virDomainDefFormat(dom->conn, vm->def, VIR_DOMAIN_XML_SECURE);
3902 3903
    if (!xml) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
3904
                         "%s", _("failed to get domain xml"));
3905
        goto endjob;
3906 3907 3908 3909 3910 3911
    }
    header.xml_len = strlen(xml) + 1;

    /* Write header to file, followed by XML */
    if ((fd = open(path, O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR)) < 0) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
3912
                         _("failed to create '%s'"), path);
3913
        goto endjob;
3914 3915 3916 3917
    }

    if (safewrite(fd, &header, sizeof(header)) != sizeof(header)) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
3918
                         "%s", _("failed to write save header"));
3919
        goto endjob;
3920 3921 3922 3923
    }

    if (safewrite(fd, xml, header.xml_len) != header.xml_len) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
3924
                         "%s", _("failed to write xml"));
3925
        goto endjob;
3926 3927
    }

3928
    if (close(fd) < 0) {
3929 3930 3931
        virReportSystemError(dom->conn, errno,
                             _("unable to save file %s"),
                             path);
3932
        goto endjob;
3933 3934
    }
    fd = -1;
3935

3936 3937 3938 3939 3940
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSavedStateLabel &&
        driver->securityDriver->domainSetSavedStateLabel(dom->conn, vm, path) == -1)
        goto endjob;

3941 3942
    if (header.compressed == QEMUD_SAVE_FORMAT_RAW) {
        const char *args[] = { "cat", NULL };
3943
        qemuDomainObjPrivatePtr priv = vm->privateData;
M
Matthias Bolte 已提交
3944
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
3945
        rc = qemuMonitorMigrateToCommand(priv->mon, 0, args, path);
M
Matthias Bolte 已提交
3946
        qemuDomainObjExitMonitorWithDriver(driver, vm);
3947
    } else {
3948
        const char *prog = qemudSaveCompressionTypeToString(header.compressed);
3949
        qemuDomainObjPrivatePtr priv = vm->privateData;
3950 3951 3952 3953 3954
        const char *args[] = {
            prog,
            "-c",
            NULL
        };
M
Matthias Bolte 已提交
3955
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
3956
        rc = qemuMonitorMigrateToCommand(priv->mon, 0, args, path);
M
Matthias Bolte 已提交
3957
        qemuDomainObjExitMonitorWithDriver(driver, vm);
3958 3959
    }

3960
    if (rc < 0)
3961
        goto endjob;
3962

3963 3964
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSavedStateLabel &&
3965
        driver->securityDriver->domainRestoreSavedStateLabel(dom->conn, vm, path) == -1)
3966 3967 3968 3969
        goto endjob;

    ret = 0;

3970 3971
    /* Shut it down */
    qemudShutdownVMDaemon(dom->conn, driver, vm);
3972 3973 3974
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     VIR_DOMAIN_EVENT_STOPPED_SAVED);
3975
    if (!vm->persistent) {
3976 3977 3978
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains,
                                    vm);
3979 3980
        vm = NULL;
    }
3981

3982
endjob:
3983 3984 3985
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3986

3987 3988 3989 3990 3991 3992
cleanup:
    if (fd != -1)
        close(fd);
    VIR_FREE(xml);
    if (ret != 0)
        unlink(path);
3993 3994
    if (vm)
        virDomainObjUnlock(vm);
3995 3996
    if (event)
        qemuDomainEventQueue(driver, event);
3997
    qemuDriverUnlock(driver);
3998
    return ret;
D
Daniel P. Berrange 已提交
3999 4000 4001
}


P
Paolo Bonzini 已提交
4002 4003 4004 4005 4006 4007
static int qemudDomainCoreDump(virDomainPtr dom,
                               const char *path,
                               int flags ATTRIBUTE_UNUSED) {
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int resume = 0, paused = 0;
4008
    int ret = -1, fd = -1;
4009
    virDomainEventPtr event = NULL;
4010 4011 4012 4013
    const char *args[] = {
        "cat",
        NULL,
    };
P
Paolo Bonzini 已提交
4014 4015 4016 4017 4018 4019 4020 4021 4022 4023 4024 4025 4026

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);

    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

4027 4028 4029
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
4030
    if (!virDomainObjIsActive(vm)) {
P
Paolo Bonzini 已提交
4031 4032
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
                         "%s", _("domain is not running"));
4033
        goto endjob;
P
Paolo Bonzini 已提交
4034 4035
    }

4036 4037 4038 4039 4040 4041 4042 4043 4044 4045 4046 4047 4048 4049 4050 4051 4052 4053 4054
    /* Create an empty file with appropriate ownership.  */
    if ((fd = open(path, O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR)) < 0) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                         _("failed to create '%s'"), path);
        goto endjob;
    }

    if (close(fd) < 0) {
        virReportSystemError(dom->conn, errno,
                             _("unable to save file %s"),
                             path);
        goto endjob;
    }

    if (driver->securityDriver &&
        driver->securityDriver->domainSetSavedStateLabel &&
        driver->securityDriver->domainSetSavedStateLabel(dom->conn, vm, path) == -1)
        goto endjob;

P
Paolo Bonzini 已提交
4055 4056
    /* Migrate will always stop the VM, so the resume condition is
       independent of whether the stop command is issued.  */
P
Paolo Bonzini 已提交
4057 4058
    resume = (vm->state == VIR_DOMAIN_RUNNING);

4059 4060
    qemuDomainObjPrivatePtr priv = vm->privateData;

P
Paolo Bonzini 已提交
4061
    /* Pause domain for non-live dump */
P
Paolo Bonzini 已提交
4062
    if (!(flags & VIR_DUMP_LIVE) && vm->state == VIR_DOMAIN_RUNNING) {
4063 4064 4065
        qemuDomainObjEnterMonitor(vm);
        if (qemuMonitorStopCPUs(priv->mon) < 0) {
            qemuDomainObjExitMonitor(vm);
4066
            goto endjob;
4067 4068
        }
        qemuDomainObjExitMonitor(vm);
P
Paolo Bonzini 已提交
4069 4070 4071
        paused = 1;
    }

4072
    qemuDomainObjEnterMonitor(vm);
4073
    ret = qemuMonitorMigrateToCommand(priv->mon, 0, args, path);
4074
    qemuDomainObjExitMonitor(vm);
4075 4076 4077 4078
    paused |= (ret == 0);

    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSavedStateLabel &&
4079
        driver->securityDriver->domainRestoreSavedStateLabel(dom->conn, vm, path) == -1)
4080 4081 4082
        goto endjob;

endjob:
4083 4084 4085 4086 4087 4088 4089
    if ((ret == 0) && (flags & VIR_DUMP_CRASH)) {
        qemudShutdownVMDaemon(dom->conn, driver, vm);
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STOPPED,
                                         VIR_DOMAIN_EVENT_STOPPED_CRASHED);
    }

P
Paolo Bonzini 已提交
4090 4091 4092
    /* Since the monitor is always attached to a pty for libvirt, it
       will support synchronous operations so we always get here after
       the migration is complete.  */
4093
    else if (resume && paused) {
4094
        qemuDomainObjEnterMonitor(vm);
4095
        if (qemuMonitorStartCPUs(priv->mon, dom->conn) < 0) {
4096 4097 4098
            if (virGetLastError() == NULL)
                qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                                 "%s", _("resuming after dump failed"));
P
Paolo Bonzini 已提交
4099
        }
4100
        qemuDomainObjExitMonitor(vm);
P
Paolo Bonzini 已提交
4101
    }
4102

4103 4104
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4105
    else if ((ret == 0) && (flags & VIR_DUMP_CRASH) && !vm->persistent) {
4106 4107 4108 4109
        virDomainRemoveInactive(&driver->domains,
                                vm);
        vm = NULL;
    }
4110 4111

cleanup:
4112 4113
    if (ret != 0)
        unlink(path);
P
Paolo Bonzini 已提交
4114 4115
    if (vm)
        virDomainObjUnlock(vm);
4116 4117
    if (event)
        qemuDomainEventQueue(driver, event);
P
Paolo Bonzini 已提交
4118 4119 4120 4121
    return ret;
}


4122
static int qemudDomainSetVcpus(virDomainPtr dom, unsigned int nvcpus) {
4123 4124
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
4125
    int max;
4126
    int ret = -1;
4127
    const char *type;
4128

4129
    qemuDriverLock(driver);
4130
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4131 4132
    qemuDriverUnlock(driver);

4133
    if (!vm) {
4134 4135
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4136
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
4137
                         _("no domain with matching uuid '%s'"), uuidstr);
4138
        goto cleanup;
4139 4140
    }

4141 4142 4143
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
4144
    if (virDomainObjIsActive(vm)) {
4145
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID, "%s",
4146
                         _("cannot change vcpu count of an active domain"));
4147
        goto endjob;
4148 4149
    }

4150 4151 4152 4153
    if (!(type = virDomainVirtTypeToString(vm->def->virtType))) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unknown virt type in domain definition '%d'"),
                         vm->def->virtType);
4154
        goto endjob;
4155 4156 4157
    }

    if ((max = qemudGetMaxVCPUs(dom->conn, type)) < 0) {
4158 4159
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR, "%s",
                         _("could not determine max vcpus for the domain"));
4160
        goto endjob;
4161 4162 4163 4164 4165 4166
    }

    if (nvcpus > max) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
                         _("requested vcpus is greater than max allowable"
                           " vcpus for the domain: %d > %d"), nvcpus, max);
4167
        goto endjob;
4168 4169 4170
    }

    vm->def->vcpus = nvcpus;
4171 4172
    ret = 0;

4173
endjob:
4174 4175
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4176

4177
cleanup:
4178 4179
    if (vm)
        virDomainObjUnlock(vm);
4180
    return ret;
4181 4182
}

4183 4184 4185 4186 4187 4188

static int
qemudDomainPinVcpu(virDomainPtr dom,
                   unsigned int vcpu,
                   unsigned char *cpumap,
                   int maplen) {
4189 4190
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
4191
    int maxcpu, hostcpus;
4192
    virNodeInfo nodeinfo;
4193
    int ret = -1;
4194
    qemuDomainObjPrivatePtr priv;
4195

4196
    qemuDriverLock(driver);
4197
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4198 4199
    qemuDriverUnlock(driver);

4200 4201 4202 4203 4204 4205 4206 4207
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

D
Daniel P. Berrange 已提交
4208
    if (!virDomainObjIsActive(vm)) {
4209
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
4210
                         "%s",_("cannot pin vcpus on an inactive domain"));
4211
        goto cleanup;
4212 4213
    }

4214 4215 4216
    priv = vm->privateData;

    if (vcpu > (priv->nvcpupids-1)) {
4217 4218
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
                         _("vcpu number out of range %d > %d"),
4219
                         vcpu, priv->nvcpupids);
4220
        goto cleanup;
4221 4222
    }

4223
    if (nodeGetInfo(dom->conn, &nodeinfo) < 0)
4224
        goto cleanup;
4225

4226
    hostcpus = VIR_NODEINFO_MAXCPUS(nodeinfo);
4227
    maxcpu = maplen * 8;
4228 4229
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;
4230

4231 4232
    if (priv->vcpupids != NULL) {
        if (virProcessInfoSetAffinity(priv->vcpupids[vcpu],
4233
                                      cpumap, maplen, maxcpu) < 0)
4234
            goto cleanup;
4235 4236 4237
    } else {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         "%s", _("cpu affinity is not supported"));
4238
        goto cleanup;
4239
    }
4240
    ret = 0;
4241

4242
cleanup:
4243 4244
    if (vm)
        virDomainObjUnlock(vm);
4245
    return ret;
4246 4247 4248 4249 4250 4251 4252 4253
}

static int
qemudDomainGetVcpus(virDomainPtr dom,
                    virVcpuInfoPtr info,
                    int maxinfo,
                    unsigned char *cpumaps,
                    int maplen) {
4254 4255
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
4256
    virNodeInfo nodeinfo;
4257
    int i, v, maxcpu, hostcpus;
4258
    int ret = -1;
4259
    qemuDomainObjPrivatePtr priv;
4260

4261
    qemuDriverLock(driver);
4262
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4263 4264
    qemuDriverUnlock(driver);

4265 4266 4267 4268 4269 4270 4271 4272
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

D
Daniel P. Berrange 已提交
4273
    if (!virDomainObjIsActive(vm)) {
4274
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
4275 4276
                         "%s",
                         _("cannot list vcpu pinning for an inactive domain"));
4277
        goto cleanup;
4278 4279
    }

4280 4281
    priv = vm->privateData;

4282
    if (nodeGetInfo(dom->conn, &nodeinfo) < 0)
4283
        goto cleanup;
4284

4285
    hostcpus = VIR_NODEINFO_MAXCPUS(nodeinfo);
4286
    maxcpu = maplen * 8;
4287 4288
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;
4289 4290

    /* Clamp to actual number of vcpus */
4291 4292
    if (maxinfo > priv->nvcpupids)
        maxinfo = priv->nvcpupids;
4293

4294 4295 4296 4297 4298 4299
    if (maxinfo >= 1) {
        if (info != NULL) {
            memset(info, 0, sizeof(*info) * maxinfo);
            for (i = 0 ; i < maxinfo ; i++) {
                info[i].number = i;
                info[i].state = VIR_VCPU_RUNNING;
4300

4301
                if (priv->vcpupids != NULL &&
4302 4303 4304
                    qemudGetProcessInfo(&(info[i].cpuTime),
                                        &(info[i].cpu),
                                        vm->pid,
4305
                                        priv->vcpupids[i]) < 0) {
4306 4307 4308 4309
                    virReportSystemError(dom->conn, errno, "%s",
                                         _("cannot get vCPU placement & pCPU time"));
                    goto cleanup;
                }
4310
            }
4311 4312
        }

4313 4314
        if (cpumaps != NULL) {
            memset(cpumaps, 0, maplen * maxinfo);
4315
            if (priv->vcpupids != NULL) {
4316 4317 4318
                for (v = 0 ; v < maxinfo ; v++) {
                    unsigned char *cpumap = VIR_GET_CPUMAP(cpumaps, maplen, v);

4319
                    if (virProcessInfoGetAffinity(priv->vcpupids[v],
4320
                                                  cpumap, maplen, maxcpu) < 0)
4321
                        goto cleanup;
4322
                }
4323 4324 4325 4326
            } else {
                qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                                 "%s", _("cpu affinity is not available"));
                goto cleanup;
4327 4328 4329
            }
        }
    }
4330
    ret = maxinfo;
4331

4332
cleanup:
4333 4334
    if (vm)
        virDomainObjUnlock(vm);
4335
    return ret;
4336 4337 4338
}


4339
static int qemudDomainGetMaxVcpus(virDomainPtr dom) {
4340 4341
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
4342
    const char *type;
4343
    int ret = -1;
4344

4345
    qemuDriverLock(driver);
4346
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4347 4348
    qemuDriverUnlock(driver);

4349
    if (!vm) {
4350 4351
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4352
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
4353
                         _("no domain with matching uuid '%s'"), uuidstr);
4354
        goto cleanup;
4355 4356
    }

4357
    if (!(type = virDomainVirtTypeToString(vm->def->virtType))) {
4358 4359 4360
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unknown virt type in domain definition '%d'"),
                         vm->def->virtType);
4361
        goto cleanup;
4362 4363
    }

4364
    ret = qemudGetMaxVCPUs(dom->conn, type);
4365

4366
cleanup:
4367 4368
    if (vm)
        virDomainObjUnlock(vm);
4369 4370 4371
    return ret;
}

4372 4373 4374 4375 4376 4377 4378 4379 4380 4381
static int qemudDomainGetSecurityLabel(virDomainPtr dom, virSecurityLabelPtr seclabel)
{
    struct qemud_driver *driver = (struct qemud_driver *)dom->conn->privateData;
    virDomainObjPtr vm;
    const char *type;
    int ret = -1;

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

4382 4383
    memset(seclabel, 0, sizeof(*seclabel));

4384 4385 4386
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4387
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
4388 4389 4390 4391 4392 4393 4394 4395 4396 4397 4398 4399 4400 4401 4402 4403 4404 4405 4406 4407 4408 4409 4410 4411 4412
                         _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    if (!(type = virDomainVirtTypeToString(vm->def->virtType))) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unknown virt type in domain definition '%d'"),
                         vm->def->virtType);
        goto cleanup;
    }

    /*
     * Theoretically, the pid can be replaced during this operation and
     * return the label of a different process.  If atomicity is needed,
     * further validation will be required.
     *
     * Comment from Dan Berrange:
     *
     *   Well the PID as stored in the virDomainObjPtr can't be changed
     *   because you've got a locked object.  The OS level PID could have
     *   exited, though and in extreme circumstances have cycled through all
     *   PIDs back to ours. We could sanity check that our PID still exists
     *   after reading the label, by checking that our FD connecting to the
     *   QEMU monitor hasn't seen SIGHUP/ERR on poll().
     */
D
Daniel P. Berrange 已提交
4413
    if (virDomainObjIsActive(vm)) {
4414 4415
        if (driver->securityDriver && driver->securityDriver->domainGetSecurityProcessLabel) {
            if (driver->securityDriver->domainGetSecurityProcessLabel(dom->conn, vm, seclabel) == -1) {
4416
                qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
4417
                                 "%s", _("Failed to get security label"));
4418 4419 4420 4421 4422 4423 4424 4425 4426 4427
                goto cleanup;
            }
        }
    }

    ret = 0;

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
4428
    qemuDriverUnlock(driver);
4429 4430 4431
    return ret;
}

4432 4433
static int qemudNodeGetSecurityModel(virConnectPtr conn,
                                     virSecurityModelPtr secmodel)
4434 4435 4436
{
    struct qemud_driver *driver = (struct qemud_driver *)conn->privateData;
    char *p;
4437
    int ret = 0;
4438

4439 4440
    qemuDriverLock(driver);
    if (!driver->securityDriver) {
4441
        memset(secmodel, 0, sizeof (*secmodel));
4442 4443
        goto cleanup;
    }
4444

4445 4446 4447 4448 4449
    p = driver->caps->host.secModel.model;
    if (strlen(p) >= VIR_SECURITY_MODEL_BUFLEN-1) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("security model string exceeds max %d bytes"),
                         VIR_SECURITY_MODEL_BUFLEN-1);
4450 4451
        ret = -1;
        goto cleanup;
4452 4453 4454 4455 4456 4457 4458 4459
    }
    strcpy(secmodel->model, p);

    p = driver->caps->host.secModel.doi;
    if (strlen(p) >= VIR_SECURITY_DOI_BUFLEN-1) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("security DOI string exceeds max %d bytes"),
                         VIR_SECURITY_DOI_BUFLEN-1);
4460 4461
        ret = -1;
        goto cleanup;
4462 4463
    }
    strcpy(secmodel->doi, p);
4464 4465 4466 4467

cleanup:
    qemuDriverUnlock(driver);
    return ret;
4468 4469 4470
}

/* TODO: check seclabel restore */
4471
static int qemudDomainRestore(virConnectPtr conn,
4472 4473 4474
                              const char *path) {
    struct qemud_driver *driver = conn->privateData;
    virDomainDefPtr def = NULL;
4475
    virDomainObjPtr vm = NULL;
4476 4477 4478
    int fd = -1;
    int ret = -1;
    char *xml = NULL;
4479
    struct qemud_save_header header;
4480
    virDomainEventPtr event = NULL;
4481 4482 4483
    int intermediatefd = -1;
    pid_t intermediate_pid = -1;
    int childstat;
4484

4485
    qemuDriverLock(driver);
4486 4487 4488
    /* Verify the header and read the XML */
    if ((fd = open(path, O_RDONLY)) < 0) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4489
                         "%s", _("cannot read domain image"));
4490
        goto cleanup;
4491 4492 4493 4494
    }

    if (saferead(fd, &header, sizeof(header)) != sizeof(header)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4495
                         "%s", _("failed to read qemu header"));
4496
        goto cleanup;
4497 4498 4499 4500
    }

    if (memcmp(header.magic, QEMUD_SAVE_MAGIC, sizeof(header.magic)) != 0) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4501
                         "%s", _("image magic is incorrect"));
4502
        goto cleanup;
4503 4504 4505 4506
    }

    if (header.version > QEMUD_SAVE_VERSION) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4507
                         _("image version is not supported (%d > %d)"),
4508
                         header.version, QEMUD_SAVE_VERSION);
4509
        goto cleanup;
4510 4511
    }

4512
    if (VIR_ALLOC_N(xml, header.xml_len) < 0) {
4513
        virReportOOMError(conn);
4514
        goto cleanup;
4515 4516 4517 4518
    }

    if (saferead(fd, xml, header.xml_len) != header.xml_len) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4519
                         "%s", _("failed to read XML"));
4520
        goto cleanup;
4521 4522 4523
    }

    /* Create a domain from this XML */
4524 4525
    if (!(def = virDomainDefParseString(conn, driver->caps, xml,
                                        VIR_DOMAIN_XML_INACTIVE))) {
4526
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4527
                         "%s", _("failed to parse XML"));
4528
        goto cleanup;
4529 4530
    }

4531 4532
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
4533

4534
    if (!(vm = virDomainAssignDef(conn,
4535
                                  driver->caps,
4536 4537
                                  &driver->domains,
                                  def))) {
4538
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4539
                         "%s", _("failed to assign new VM"));
4540
        goto cleanup;
4541
    }
4542
    def = NULL;
4543

4544 4545 4546
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

4547 4548
    if (header.version == 2) {
        const char *intermediate_argv[3] = { NULL, "-dc", NULL };
4549 4550
        const char *prog = qemudSaveCompressionTypeToString(header.compressed);
        if (prog == NULL) {
4551
            qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4552
                             _("Invalid compressed save format %d"),
4553
                             header.compressed);
4554
            goto endjob;
4555
        }
4556

4557
        if (header.compressed != QEMUD_SAVE_FORMAT_RAW) {
4558
            intermediate_argv[0] = prog;
4559 4560 4561 4562 4563 4564 4565
            intermediatefd = fd;
            fd = -1;
            if (virExec(conn, intermediate_argv, NULL, NULL,
                        &intermediate_pid, intermediatefd, &fd, NULL, 0) < 0) {
                qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                 _("Failed to start decompression binary %s"),
                                 intermediate_argv[0]);
4566
                goto endjob;
4567 4568 4569
            }
        }
    }
4570
    /* Set the migration source and start it up. */
4571
    ret = qemudStartVMDaemon(conn, driver, vm, "stdio", fd);
4572 4573 4574 4575 4576 4577 4578
    if (intermediate_pid != -1) {
        /* Wait for intermediate process to exit */
        while (waitpid(intermediate_pid, &childstat, 0) == -1 &&
               errno == EINTR);
    }
    if (intermediatefd != -1)
        close(intermediatefd);
4579
    close(fd);
4580
    fd = -1;
4581
    if (ret < 0) {
4582
        if (!vm->persistent) {
4583 4584 4585
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains,
                                        vm);
4586 4587
            vm = NULL;
        }
4588
        goto endjob;
4589 4590
    }

4591 4592 4593
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_RESTORED);
4594

4595 4596
    /* If it was running before, resume it now. */
    if (header.was_running) {
4597
        qemuDomainObjPrivatePtr priv = vm->privateData;
4598
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
4599
        if (qemuMonitorStartCPUs(priv->mon, conn) < 0) {
4600 4601 4602
            if (virGetLastError() == NULL)
                qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                                 "%s", _("failed to resume domain"));
4603 4604
            qemuDomainObjExitMonitorWithDriver(driver,vm);
            goto endjob;
4605
        }
4606
        qemuDomainObjExitMonitorWithDriver(driver, vm);
4607
        vm->state = VIR_DOMAIN_RUNNING;
4608
        virDomainSaveStatus(conn, driver->caps, driver->stateDir, vm);
4609
    }
4610
    ret = 0;
4611

4612
endjob:
4613 4614 4615
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4616

4617 4618 4619 4620 4621
cleanup:
    virDomainDefFree(def);
    VIR_FREE(xml);
    if (fd != -1)
        close(fd);
4622 4623
    if (vm)
        virDomainObjUnlock(vm);
4624 4625
    if (event)
        qemuDomainEventQueue(driver, event);
4626
    qemuDriverUnlock(driver);
4627
    return ret;
D
Daniel P. Berrange 已提交
4628 4629 4630
}


4631
static char *qemudDomainDumpXML(virDomainPtr dom,
4632
                                int flags) {
4633 4634 4635
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    char *ret = NULL;
4636 4637
    unsigned long balloon;
    int err;
4638

4639
    qemuDriverLock(driver);
4640
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4641 4642
    qemuDriverUnlock(driver);

D
Daniel P. Berrange 已提交
4643
    if (!vm) {
4644 4645 4646 4647
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
4648
        goto cleanup;
D
Daniel P. Berrange 已提交
4649 4650
    }

4651
    /* Refresh current memory based on balloon info */
D
Daniel P. Berrange 已提交
4652
    if (virDomainObjIsActive(vm)) {
4653
        qemuDomainObjPrivatePtr priv = vm->privateData;
4654 4655 4656 4657 4658 4659 4660 4661 4662
        /* Don't delay if someone's using the monitor, just use
         * existing most recent data instead */
        if (!priv->jobActive) {
            if (qemuDomainObjBeginJob(vm) < 0)
                goto cleanup;

            qemuDomainObjEnterMonitor(vm);
            err = qemuMonitorGetBalloonInfo(priv->mon, &balloon);
            qemuDomainObjExitMonitor(vm);
4663 4664 4665 4666
            if (qemuDomainObjEndJob(vm) == 0) {
                vm = NULL;
                goto cleanup;
            }
4667 4668 4669 4670 4671 4672
            if (err < 0)
                goto cleanup;
            if (err > 0)
                vm->def->memory = balloon;
            /* err == 0 indicates no balloon support, so ignore it */
        }
4673
    }
4674

4675 4676 4677 4678 4679 4680
    ret = virDomainDefFormat(dom->conn,
                             (flags & VIR_DOMAIN_XML_INACTIVE) && vm->newDef ?
                             vm->newDef : vm->def,
                             flags);

cleanup:
4681 4682
    if (vm)
        virDomainObjUnlock(vm);
4683
    return ret;
D
Daniel P. Berrange 已提交
4684 4685 4686
}


4687 4688 4689 4690
static char *qemuDomainXMLFromNative(virConnectPtr conn,
                                     const char *format,
                                     const char *config,
                                     unsigned int flags ATTRIBUTE_UNUSED) {
4691
    struct qemud_driver *driver = conn->privateData;
4692 4693 4694 4695 4696 4697 4698 4699 4700
    virDomainDefPtr def = NULL;
    char *xml = NULL;

    if (STRNEQ(format, QEMU_CONFIG_FORMAT_ARGV)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INVALID_ARG,
                         _("unsupported config type %s"), format);
        goto cleanup;
    }

4701
    qemuDriverLock(driver);
4702
    def = qemuParseCommandLineString(conn, driver->caps, config);
4703
    qemuDriverUnlock(driver);
4704 4705 4706 4707 4708 4709 4710 4711 4712 4713
    if (!def)
        goto cleanup;

    xml = virDomainDefFormat(conn, def, VIR_DOMAIN_XML_INACTIVE);

cleanup:
    virDomainDefFree(def);
    return xml;
}

4714 4715 4716 4717 4718 4719
static char *qemuDomainXMLToNative(virConnectPtr conn,
                                   const char *format,
                                   const char *xmlData,
                                   unsigned int flags ATTRIBUTE_UNUSED) {
    struct qemud_driver *driver = conn->privateData;
    virDomainDefPtr def = NULL;
4720
    virDomainChrDef monConfig;
4721 4722 4723 4724 4725 4726 4727 4728 4729 4730
    const char *emulator;
    unsigned int qemuCmdFlags;
    struct stat sb;
    const char **retargv = NULL;
    const char **retenv = NULL;
    const char **tmp;
    virBuffer buf = VIR_BUFFER_INITIALIZER;
    char *ret = NULL;
    int i;

4731 4732
    qemuDriverLock(driver);

4733 4734 4735 4736 4737 4738 4739 4740 4741 4742 4743 4744 4745 4746 4747 4748 4749 4750 4751 4752 4753 4754 4755 4756 4757 4758 4759 4760 4761 4762 4763 4764 4765 4766 4767 4768 4769 4770 4771 4772 4773 4774 4775 4776 4777 4778 4779 4780 4781 4782 4783 4784 4785 4786 4787 4788 4789 4790 4791 4792 4793 4794 4795 4796 4797 4798
    if (STRNEQ(format, QEMU_CONFIG_FORMAT_ARGV)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INVALID_ARG,
                         _("unsupported config type %s"), format);
        goto cleanup;
    }

    def = virDomainDefParseString(conn, driver->caps, xmlData, 0);
    if (!def)
        goto cleanup;

    /* Since we're just exporting args, we can't do bridge/network
     * setups, since libvirt will normally create TAP devices
     * directly. We convert those configs into generic 'ethernet'
     * config and assume the user has suitable 'ifup-qemu' scripts
     */
    for (i = 0 ; i < def->nnets ; i++) {
        virDomainNetDefPtr net = def->nets[i];
        if (net->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
            VIR_FREE(net->data.network.name);

            memset(net, 0, sizeof *net);

            net->type = VIR_DOMAIN_NET_TYPE_ETHERNET;
            net->data.ethernet.dev = NULL;
            net->data.ethernet.script = NULL;
            net->data.ethernet.ipaddr = NULL;
        } else if (net->type == VIR_DOMAIN_NET_TYPE_BRIDGE) {
            char *brname = net->data.bridge.brname;
            char *script = net->data.bridge.script;
            char *ipaddr = net->data.bridge.ipaddr;

            memset(net, 0, sizeof *net);

            net->type = VIR_DOMAIN_NET_TYPE_ETHERNET;
            net->data.ethernet.dev = brname;
            net->data.ethernet.script = script;
            net->data.ethernet.ipaddr = ipaddr;
        }
    }
    for (i = 0 ; i < def->ngraphics ; i++) {
        if (def->graphics[i]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
            def->graphics[i]->data.vnc.autoport)
            def->graphics[i]->data.vnc.port = 5900;
    }
    emulator = def->emulator;

    /* Make sure the binary we are about to try exec'ing exists.
     * Technically we could catch the exec() failure, but that's
     * in a sub-process so its hard to feed back a useful error
     */
    if (stat(emulator, &sb) < 0) {
        virReportSystemError(conn, errno,
                             _("Cannot find QEMU binary %s"),
                             emulator);
        goto cleanup;
    }

    if (qemudExtractVersionInfo(emulator,
                                NULL,
                                &qemuCmdFlags) < 0) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("Cannot determine QEMU argv syntax %s"),
                         emulator);
        goto cleanup;
    }

4799
    if (qemuPrepareMonitorChr(conn, driver, &monConfig, def->name) < 0)
4800
        goto cleanup;
4801 4802

    if (qemudBuildCommandLine(conn, driver, def,
D
Daniel P. Berrange 已提交
4803
                              &monConfig, 0, qemuCmdFlags,
4804 4805 4806 4807 4808 4809 4810 4811 4812 4813 4814 4815 4816 4817 4818 4819 4820 4821 4822
                              &retargv, &retenv,
                              NULL, NULL, /* Don't want it to create TAP devices */
                              NULL) < 0) {
        goto cleanup;
    }

    tmp = retenv;
    while (*tmp) {
        virBufferAdd(&buf, *tmp, strlen(*tmp));
        virBufferAddLit(&buf, " ");
        tmp++;
    }
    tmp = retargv;
    while (*tmp) {
        virBufferAdd(&buf, *tmp, strlen(*tmp));
        virBufferAddLit(&buf, " ");
        tmp++;
    }

4823 4824 4825
    if (virBufferError(&buf)) {
        virBufferFreeAndReset(&buf);
        virReportOOMError(conn);
4826
        goto cleanup;
4827
    }
4828 4829 4830 4831

    ret = virBufferContentAndReset(&buf);

cleanup:
4832
    qemuDriverUnlock(driver);
4833 4834 4835 4836 4837 4838 4839 4840 4841 4842 4843 4844 4845
    for (tmp = retargv ; tmp && *tmp ; tmp++)
        VIR_FREE(*tmp);
    VIR_FREE(retargv);

    for (tmp = retenv ; tmp && *tmp ; tmp++)
        VIR_FREE(*tmp);
    VIR_FREE(retenv);

    virDomainDefFree(def);
    return ret;
}


4846
static int qemudListDefinedDomains(virConnectPtr conn,
4847
                            char **const names, int nnames) {
4848
    struct qemud_driver *driver = conn->privateData;
4849
    int n;
4850

4851
    qemuDriverLock(driver);
4852
    n = virDomainObjListGetInactiveNames(&driver->domains, names, nnames);
4853
    qemuDriverUnlock(driver);
4854
    return n;
D
Daniel P. Berrange 已提交
4855 4856
}

4857
static int qemudNumDefinedDomains(virConnectPtr conn) {
4858
    struct qemud_driver *driver = conn->privateData;
4859
    int n;
4860

4861
    qemuDriverLock(driver);
4862
    n = virDomainObjListNumOfDomains(&driver->domains, 0);
4863
    qemuDriverUnlock(driver);
4864

4865
    return n;
D
Daniel P. Berrange 已提交
4866 4867 4868
}


4869
static int qemudDomainStart(virDomainPtr dom) {
4870 4871 4872
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
4873
    virDomainEventPtr event = NULL;
4874

4875
    qemuDriverLock(driver);
4876
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4877

4878
    if (!vm) {
4879 4880 4881 4882
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
4883
        goto cleanup;
4884 4885
    }

4886 4887 4888 4889 4890 4891 4892 4893 4894
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

    if (virDomainObjIsActive(vm)) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
                         "%s", _("domain is already running"));
        goto endjob;
    }

4895
    ret = qemudStartVMDaemon(dom->conn, driver, vm, NULL, -1);
4896
    if (ret != -1)
4897 4898 4899
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STARTED,
                                         VIR_DOMAIN_EVENT_STARTED_BOOTED);
4900

4901
endjob:
4902 4903
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4904

4905
cleanup:
4906 4907
    if (vm)
        virDomainObjUnlock(vm);
4908
    if (event)
4909
        qemuDomainEventQueue(driver, event);
4910
    qemuDriverUnlock(driver);
4911
    return ret;
D
Daniel P. Berrange 已提交
4912 4913
}

4914 4915 4916 4917 4918 4919 4920 4921 4922 4923 4924 4925 4926 4927 4928
static int
qemudCanonicalizeMachineFromInfo(virDomainDefPtr def,
                                 virCapsGuestDomainInfoPtr info,
                                 char **canonical)
{
    int i;

    *canonical = NULL;

    for (i = 0; i < info->nmachines; i++) {
        virCapsGuestMachinePtr machine = info->machines[i];

        if (!machine->canonical)
            continue;

4929
        if (STRNEQ(def->os.machine, machine->name))
4930 4931 4932 4933 4934 4935 4936 4937 4938 4939 4940 4941 4942
            continue;

        if (!(*canonical = strdup(machine->canonical))) {
            virReportOOMError(NULL);
            return -1;
        }

        break;
    }

    return 0;
}

4943 4944 4945 4946 4947 4948 4949 4950 4951 4952 4953 4954 4955 4956 4957
static int
qemudCanonicalizeMachineDirect(virDomainDefPtr def, char **canonical)
{
    virCapsGuestMachinePtr *machines = NULL;
    int i, nmachines = 0;

    if (qemudProbeMachineTypes(def->emulator, &machines, &nmachines) < 0) {
        virReportOOMError(NULL);
        return -1;
    }

    for (i = 0; i < nmachines; i++) {
        if (!machines[i]->canonical)
            continue;

4958
        if (STRNEQ(def->os.machine, machines[i]->name))
4959 4960 4961 4962 4963 4964 4965 4966 4967 4968 4969 4970
            continue;

        *canonical = machines[i]->canonical;
        machines[i]->canonical = NULL;
        break;
    }

    virCapabilitiesFreeMachines(machines, nmachines);

    return 0;
}

4971 4972
int
qemudCanonicalizeMachine(struct qemud_driver *driver, virDomainDefPtr def)
4973 4974 4975 4976 4977 4978
{
    char *canonical = NULL;
    int i;

    for (i = 0; i < driver->caps->nguests; i++) {
        virCapsGuestPtr guest = driver->caps->guests[i];
4979
        virCapsGuestDomainInfoPtr info;
4980 4981 4982
        int j;

        for (j = 0; j < guest->arch.ndomains; j++) {
4983
            info = &guest->arch.domains[j]->info;
4984

4985 4986 4987 4988 4989 4990 4991 4992 4993
            if (!info->emulator || !STREQ(info->emulator, def->emulator))
                continue;

            if (!info->nmachines)
                info = &guest->arch.defaultInfo;

            if (qemudCanonicalizeMachineFromInfo(def, info, &canonical) < 0)
                return -1;
            goto out;
4994 4995
        }

4996 4997 4998 4999
        info = &guest->arch.defaultInfo;

        if (info->emulator && STREQ(info->emulator, def->emulator)) {
            if (qemudCanonicalizeMachineFromInfo(def, info, &canonical) < 0)
5000 5001 5002 5003
                return -1;
            goto out;
        }
    }
5004 5005 5006 5007

    if (qemudCanonicalizeMachineDirect(def, &canonical) < 0)
        return -1;

5008 5009 5010 5011 5012 5013 5014
out:
    if (canonical) {
        VIR_FREE(def->os.machine);
        def->os.machine = canonical;
    }
    return 0;
}
D
Daniel P. Berrange 已提交
5015

5016
static virDomainPtr qemudDomainDefine(virConnectPtr conn, const char *xml) {
5017
    struct qemud_driver *driver = conn->privateData;
5018
    virDomainDefPtr def;
5019
    virDomainObjPtr vm = NULL;
5020
    virDomainPtr dom = NULL;
5021
    virDomainEventPtr event = NULL;
5022
    int dupVM;
5023

5024
    qemuDriverLock(driver);
5025 5026
    if (!(def = virDomainDefParseString(conn, driver->caps, xml,
                                        VIR_DOMAIN_XML_INACTIVE)))
5027
        goto cleanup;
5028

5029 5030 5031
    if (virSecurityDriverVerify(conn, def) < 0)
        goto cleanup;

5032 5033
    if ((dupVM = virDomainObjIsDuplicate(&driver->domains, def, 0)) < 0)
        goto cleanup;
5034

5035
    if (qemudCanonicalizeMachine(driver, def) < 0)
5036 5037
        goto cleanup;

5038
    if (!(vm = virDomainAssignDef(conn,
5039
                                  driver->caps,
5040 5041
                                  &driver->domains,
                                  def))) {
5042
        goto cleanup;
5043
    }
5044
    def = NULL;
5045
    vm->persistent = 1;
5046

5047 5048
    if (virDomainSaveConfig(conn,
                            driver->configDir,
5049
                            vm->newDef ? vm->newDef : vm->def) < 0) {
5050 5051
        virDomainRemoveInactive(&driver->domains,
                                vm);
5052
        vm = NULL;
5053
        goto cleanup;
5054 5055
    }

5056 5057
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_DEFINED,
5058
                                     !dupVM ?
5059 5060
                                     VIR_DOMAIN_EVENT_DEFINED_ADDED :
                                     VIR_DOMAIN_EVENT_DEFINED_UPDATED);
5061

5062
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
5063
    if (dom) dom->id = vm->def->id;
5064 5065

cleanup:
5066
    virDomainDefFree(def);
5067 5068
    if (vm)
        virDomainObjUnlock(vm);
5069 5070
    if (event)
        qemuDomainEventQueue(driver, event);
5071
    qemuDriverUnlock(driver);
5072
    return dom;
D
Daniel P. Berrange 已提交
5073 5074
}

5075
static int qemudDomainUndefine(virDomainPtr dom) {
5076 5077
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
5078
    virDomainEventPtr event = NULL;
5079
    int ret = -1;
D
Daniel P. Berrange 已提交
5080

5081
    qemuDriverLock(driver);
5082
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
5083

D
Daniel P. Berrange 已提交
5084
    if (!vm) {
5085 5086 5087 5088
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
5089
        goto cleanup;
D
Daniel P. Berrange 已提交
5090 5091
    }

D
Daniel P. Berrange 已提交
5092
    if (virDomainObjIsActive(vm)) {
5093
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
5094
                         "%s", _("cannot delete active domain"));
5095
        goto cleanup;
D
Daniel P. Berrange 已提交
5096 5097
    }

5098 5099 5100
    if (!vm->persistent) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("cannot undefine transient domain"));
5101
        goto cleanup;
5102 5103 5104
    }

    if (virDomainDeleteConfig(dom->conn, driver->configDir, driver->autostartDir, vm) < 0)
5105
        goto cleanup;
D
Daniel P. Berrange 已提交
5106

5107 5108 5109
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_UNDEFINED,
                                     VIR_DOMAIN_EVENT_UNDEFINED_REMOVED);
5110

5111 5112
    virDomainRemoveInactive(&driver->domains,
                            vm);
5113
    vm = NULL;
5114
    ret = 0;
D
Daniel P. Berrange 已提交
5115

5116
cleanup:
5117 5118
    if (vm)
        virDomainObjUnlock(vm);
5119 5120
    if (event)
        qemuDomainEventQueue(driver, event);
5121
    qemuDriverUnlock(driver);
5122
    return ret;
D
Daniel P. Berrange 已提交
5123 5124
}

5125

5126
static int qemudDomainChangeEjectableMedia(virConnectPtr conn,
5127
                                           struct qemud_driver *driver,
5128
                                           virDomainObjPtr vm,
5129
                                           virDomainDiskDefPtr disk)
5130
{
5131
    virDomainDiskDefPtr origdisk = NULL;
5132
    int i;
5133
    int ret;
5134

5135
    origdisk = NULL;
5136
    for (i = 0 ; i < vm->def->ndisks ; i++) {
5137 5138
        if (vm->def->disks[i]->bus == disk->bus &&
            STREQ(vm->def->disks[i]->dst, disk->dst)) {
5139
            origdisk = vm->def->disks[i];
5140
            break;
5141
        }
5142 5143 5144
    }

    if (!origdisk) {
5145
        qemudReportError(conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
5146
                         _("No device with bus '%s' and target '%s'"),
5147 5148
                         virDomainDiskBusTypeToString(disk->bus),
                         disk->dst);
5149 5150 5151
        return -1;
    }

5152 5153 5154 5155 5156
    if (!origdisk->info.alias) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("missing disk device alias name for %s"), origdisk->dst);
        return -1;
    }
5157

5158 5159 5160 5161
    if (origdisk->device != VIR_DOMAIN_DISK_DEVICE_FLOPPY &&
        origdisk->device != VIR_DOMAIN_DISK_DEVICE_CDROM) {
        qemudReportError(conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("Removable media not supported for %s device"),
5162
                         virDomainDiskDeviceTypeToString(disk->device));
5163
        return -1;
5164
    }
5165

5166 5167
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
5168
        driver->securityDriver->domainSetSecurityImageLabel(conn, vm, disk) < 0)
5169 5170
        return -1;

5171
    qemuDomainObjPrivatePtr priv = vm->privateData;
5172
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5173
    if (disk->src) {
5174
        const char *format = NULL;
5175 5176 5177
        if (disk->type != VIR_DOMAIN_DISK_TYPE_DIR) {
            if (disk->driverType)
                format = disk->driverType;
5178 5179 5180
            else if (origdisk->driverType)
                format = origdisk->driverType;
        }
5181 5182
        ret = qemuMonitorChangeMedia(priv->mon,
                                     origdisk->info.alias,
5183
                                     disk->src, format);
5184
    } else {
5185
        ret = qemuMonitorEjectMedia(priv->mon, origdisk->info.alias);
5186
    }
5187
    qemuDomainObjExitMonitorWithDriver(driver, vm);
5188

5189 5190 5191 5192 5193 5194 5195 5196 5197
    if (ret < 0)
        goto error;

    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
        driver->securityDriver->domainRestoreSecurityImageLabel(conn, vm, origdisk) < 0)
        VIR_WARN("Unable to restore security label on ejected image %s", origdisk->src);

    VIR_FREE(origdisk->src);
5198 5199 5200 5201 5202
    origdisk->src = disk->src;
    disk->src = NULL;
    origdisk->type = disk->type;

    virDomainDiskDefFree(disk);
5203

5204
    return ret;
5205 5206 5207 5208

error:
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
5209 5210
        driver->securityDriver->domainRestoreSecurityImageLabel(conn, vm, disk) < 0)
        VIR_WARN("Unable to restore security label on new media %s", disk->src);
5211
    return -1;
5212 5213
}

5214

5215
static int qemudDomainAttachPciDiskDevice(virConnectPtr conn,
5216
                                          struct qemud_driver *driver,
5217
                                          virDomainObjPtr vm,
5218 5219
                                          virDomainDiskDefPtr disk,
                                          int qemuCmdFlags)
5220
{
5221
    int i, ret;
5222
    const char* type = virDomainDiskBusTypeToString(disk->bus);
5223
    qemuDomainObjPrivatePtr priv = vm->privateData;
5224 5225
    char *devstr = NULL;
    char *drivestr = NULL;
5226 5227

    for (i = 0 ; i < vm->def->ndisks ; i++) {
5228
        if (STREQ(vm->def->disks[i]->dst, disk->dst)) {
5229
            qemudReportError(conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
5230
                           _("target %s already exists"), disk->dst);
5231 5232 5233 5234
            return -1;
        }
    }

5235 5236
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
5237
        driver->securityDriver->domainSetSecurityImageLabel(conn, vm, disk) < 0)
5238 5239
        return -1;

5240
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
5241 5242
        if (qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &disk->info) < 0)
            goto error;
5243 5244
        if (qemuAssignDeviceDiskAlias(disk, qemuCmdFlags) < 0)
            goto error;
5245

5246 5247 5248 5249 5250 5251 5252
        if (!(drivestr = qemuBuildDriveStr(disk, 0, qemuCmdFlags)))
            goto error;

        if (!(devstr = qemuBuildDriveDevStr(NULL, disk)))
            goto error;
    }

5253
    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0) {
5254
        virReportOOMError(conn);
5255
        goto error;
5256 5257
    }

5258
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5259 5260 5261 5262 5263 5264 5265 5266 5267 5268 5269 5270 5271 5272 5273 5274
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDrive(priv->mon, drivestr);
        if (ret == 0)
            qemuMonitorAddDevice(priv->mon, devstr);
            /* XXX remove the drive upon fail */
    } else {
        virDomainDevicePCIAddress guestAddr;
        ret = qemuMonitorAddPCIDisk(priv->mon,
                                    disk->src,
                                    type,
                                    &guestAddr);
        if (ret == 0) {
            disk->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
            memcpy(&disk->info.addr.pci, &guestAddr, sizeof(guestAddr));
        }
    }
5275
    qemuDomainObjExitMonitorWithDriver(driver, vm);
5276

5277 5278
    if (ret < 0)
        goto error;
5279

5280
    virDomainDiskInsertPreAlloced(vm->def, disk);
5281

5282 5283 5284
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

5285 5286 5287
    return 0;

error:
5288 5289 5290
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

5291 5292 5293 5294 5295
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (disk->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &disk->info) < 0)
        VIR_WARN("Unable to release PCI address on %s", disk->src);

5296 5297
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
5298 5299
        driver->securityDriver->domainRestoreSecurityImageLabel(conn, vm, disk) < 0)
        VIR_WARN("Unable to restore security label on %s", disk->src);
5300 5301

    return -1;
5302
}
5303

5304

5305 5306 5307
static int qemudDomainAttachPciControllerDevice(virConnectPtr conn,
                                                struct qemud_driver *driver,
                                                virDomainObjPtr vm,
5308 5309
                                                virDomainControllerDefPtr controller,
                                                int qemuCmdFlags)
5310
{
5311 5312
    int i;
    int ret = -1;
5313
    const char* type = virDomainControllerTypeToString(controller->type);
5314
    char *devstr = NULL;
5315 5316 5317
    qemuDomainObjPrivatePtr priv = vm->privateData;

    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
5318 5319
        if ((vm->def->controllers[i]->type == controller->type) &&
            (vm->def->controllers[i]->idx == controller->idx)) {
5320 5321
            qemudReportError(conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                             _("target %s:%d already exists"),
5322
                             type, controller->idx);
5323 5324 5325 5326
            return -1;
        }
    }

5327 5328 5329 5330 5331 5332
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &controller->info) < 0)
            goto cleanup;
        if (qemuAssignDeviceControllerAlias(controller) < 0)
            goto cleanup;
    }
5333

5334 5335 5336 5337 5338
    if (!(devstr = qemuBuildControllerDevStr(controller))) {
        virReportOOMError(NULL);
        goto cleanup;
    }

5339
    if (VIR_REALLOC_N(vm->def->controllers, vm->def->ncontrollers+1) < 0) {
5340 5341
        virReportOOMError(NULL);
        goto cleanup;
5342 5343 5344
    }

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5345 5346 5347 5348 5349 5350 5351
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDevice(priv->mon, devstr);
    } else {
        ret = qemuMonitorAttachPCIDiskController(priv->mon,
                                                 type,
                                                 &controller->info.addr.pci);
    }
5352 5353 5354
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    if (ret == 0) {
5355 5356
        controller->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
        virDomainControllerInsertPreAlloced(vm->def, controller);
5357 5358
    }

5359
cleanup:
5360 5361 5362 5363 5364 5365
    if ((ret != 0) &&
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (controller->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &controller->info) < 0)
        VIR_WARN0("Unable to release PCI address on controller");

5366
    VIR_FREE(devstr);
5367 5368 5369
    return ret;
}

5370

5371 5372 5373 5374
static virDomainControllerDefPtr
qemuDomainFindOrCreateSCSIDiskController(virConnectPtr conn,
                                         struct qemud_driver *driver,
                                         virDomainObjPtr vm,
5375 5376
                                         int controller,
                                         int qemuCmdFlags)
5377 5378 5379 5380 5381 5382 5383 5384 5385 5386 5387 5388 5389 5390 5391 5392 5393 5394 5395 5396 5397 5398 5399 5400
{
    int i;
    virDomainControllerDefPtr cont;
    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
        cont = vm->def->controllers[i];

        if (cont->type != VIR_DOMAIN_CONTROLLER_TYPE_SCSI)
            continue;

        if (cont->idx == controller)
            return cont;
    }

    /* No SCSI controller present, for back compatability we
     * now hotplug a controller */
    if (VIR_ALLOC(cont) < 0) {
        virReportOOMError(conn);
        return NULL;
    }
    cont->type = VIR_DOMAIN_CONTROLLER_TYPE_SCSI;
    cont->idx = 0;

    VIR_INFO0("No SCSI controller present, hotplugging one");
    if (qemudDomainAttachPciControllerDevice(conn, driver,
5401
                                             vm, cont, qemuCmdFlags) < 0) {
5402 5403 5404 5405 5406 5407
        VIR_FREE(cont);
        return NULL;
    }
    return cont;
}

5408

5409 5410 5411
static int qemudDomainAttachSCSIDisk(virConnectPtr conn,
                                     struct qemud_driver *driver,
                                     virDomainObjPtr vm,
5412
                                     virDomainDiskDefPtr disk,
5413 5414 5415 5416 5417 5418
                                     int qemuCmdFlags)
{
    int i;
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainControllerDefPtr cont;
    char *drivestr = NULL;
5419
    char *devstr = NULL;
5420 5421 5422
    int ret = -1;

    for (i = 0 ; i < vm->def->ndisks ; i++) {
5423
        if (STREQ(vm->def->disks[i]->dst, disk->dst)) {
5424
            qemudReportError(conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
5425
                           _("target %s already exists"), disk->dst);
5426
            return -1;
5427 5428 5429
        }
    }

5430 5431 5432

    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
5433
        driver->securityDriver->domainSetSecurityImageLabel(conn, vm, disk) < 0)
5434 5435
        return -1;

5436
    /* We should have an address already, so make sure */
5437
    if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE) {
5438 5439
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unexpected disk address type %s"),
5440
                         virDomainDeviceAddressTypeToString(disk->info.type));
5441
        goto error;
5442 5443
    }

5444 5445 5446 5447 5448 5449 5450 5451 5452 5453
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuAssignDeviceDiskAlias(disk, qemuCmdFlags) < 0)
            goto error;
        if (!(devstr = qemuBuildDriveDevStr(NULL, disk)))
            goto error;
    }

    if (!(drivestr = qemuBuildDriveStr(disk, 0, qemuCmdFlags)))
        goto error;

5454
    for (i = 0 ; i <= disk->info.addr.drive.controller ; i++) {
5455
        cont = qemuDomainFindOrCreateSCSIDiskController(conn, driver, vm, i, qemuCmdFlags);
5456
        if (!cont)
5457
            goto error;
5458 5459 5460 5461 5462
    }

    if (cont->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("SCSI controller %d was missing its PCI address"), cont->idx);
5463
        goto error;
5464 5465 5466 5467
    }

    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0) {
        virReportOOMError(conn);
5468
        goto error;
5469 5470 5471
    }

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5472 5473 5474 5475 5476 5477 5478 5479 5480 5481 5482 5483 5484 5485 5486 5487 5488 5489 5490 5491
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDrive(priv->mon,
                                  drivestr);
        if (ret == 0)
            ret = qemuMonitorAddDevice(priv->mon,
                                       devstr);
            /* XXX should call 'drive_del' on error but this does not exist yet */
    } else {
        virDomainDeviceDriveAddress driveAddr;
        ret = qemuMonitorAttachDrive(priv->mon,
                                     drivestr,
                                     &cont->info.addr.pci,
                                     &driveAddr);
        if (ret == 0) {
            /* XXX we should probably validate that the addr matches
             * our existing defined addr instead of overwriting */
            disk->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE;
            memcpy(&disk->info.addr.drive, &driveAddr, sizeof(driveAddr));
        }
    }
5492 5493
    qemuDomainObjExitMonitorWithDriver(driver, vm);

5494 5495
    if (ret < 0)
        goto error;
5496

5497
    virDomainDiskInsertPreAlloced(vm->def, disk);
5498 5499

    VIR_FREE(devstr);
5500
    VIR_FREE(drivestr);
5501 5502 5503 5504

    return 0;

error:
5505
    VIR_FREE(devstr);
5506
    VIR_FREE(drivestr);
5507

5508 5509
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
5510 5511
        driver->securityDriver->domainRestoreSecurityImageLabel(conn, vm, disk) < 0)
        VIR_WARN("Unable to restore security label on %s", disk->src);
5512 5513

    return -1;
5514 5515
}

5516

5517
static int qemudDomainAttachUsbMassstorageDevice(virConnectPtr conn,
5518
                                                 struct qemud_driver *driver,
5519
                                                 virDomainObjPtr vm,
5520 5521
                                                 virDomainDiskDefPtr disk,
                                                 int qemuCmdFlags)
5522
{
5523
    qemuDomainObjPrivatePtr priv = vm->privateData;
5524
    int i, ret;
5525 5526
    char *drivestr = NULL;
    char *devstr = NULL;
5527

5528
    for (i = 0 ; i < vm->def->ndisks ; i++) {
5529
        if (STREQ(vm->def->disks[i]->dst, disk->dst)) {
5530
            qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
5531
                           _("target %s already exists"), disk->dst);
5532 5533 5534 5535
            return -1;
        }
    }

5536 5537
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
5538
        driver->securityDriver->domainSetSecurityImageLabel(conn, vm, disk) < 0)
5539 5540
        return -1;

5541
    if (!disk->src) {
5542 5543
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("disk source path is missing"));
5544
        goto error;
5545 5546
    }

5547
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
5548 5549
        if (qemuAssignDeviceDiskAlias(disk, qemuCmdFlags) < 0)
            goto error;
5550 5551 5552 5553 5554 5555
        if (!(drivestr = qemuBuildDriveStr(disk, 0, qemuCmdFlags)))
            goto error;
        if (!(devstr = qemuBuildDriveDevStr(NULL, disk)))
            goto error;
    }

5556
    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0) {
5557
        virReportOOMError(conn);
5558
        goto error;
5559 5560
    }

5561
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5562 5563 5564 5565 5566 5567 5568 5569 5570 5571
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDrive(priv->mon,
                                  drivestr);
        if (ret == 0)
            ret = qemuMonitorAddDevice(priv->mon,
                                       devstr);
            /* XXX should call 'drive_del' on error but this does not exist yet */
    } else {
        ret = qemuMonitorAddUSBDisk(priv->mon, disk->src);
    }
5572
    qemuDomainObjExitMonitorWithDriver(driver, vm);
5573

5574 5575 5576
    if (ret < 0)
        goto error;

5577
    virDomainDiskInsertPreAlloced(vm->def, disk);
5578

5579 5580 5581
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

5582 5583 5584
    return 0;

error:
5585 5586 5587
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

5588 5589
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
5590 5591
        driver->securityDriver->domainRestoreSecurityImageLabel(conn, vm, disk) < 0)
        VIR_WARN("Unable to restore security label on %s", disk->src);
5592 5593

    return -1;
5594 5595
}

5596

M
Mark McLoughlin 已提交
5597
static int qemudDomainAttachNetDevice(virConnectPtr conn,
5598
                                      struct qemud_driver *driver,
M
Mark McLoughlin 已提交
5599
                                      virDomainObjPtr vm,
5600
                                      virDomainNetDefPtr net,
M
Mark McLoughlin 已提交
5601 5602
                                      unsigned int qemuCmdFlags)
{
5603
    qemuDomainObjPrivatePtr priv = vm->privateData;
5604
    char *tapfd_name = NULL;
5605
    int tapfd = -1;
5606
    char *nicstr = NULL;
5607
    char *netstr = NULL;
5608
    int ret = -1;
5609
    virDomainDevicePCIAddress guestAddr;
5610
    int vlan;
M
Mark McLoughlin 已提交
5611 5612 5613 5614 5615 5616 5617 5618 5619

    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_HOST_NET_ADD)) {
        qemudReportError(conn, dom, NULL, VIR_ERR_NO_SUPPORT, "%s",
                         _("installed qemu version does not support host_net_add"));
        return -1;
    }

    if (net->type == VIR_DOMAIN_NET_TYPE_BRIDGE ||
        net->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
5620
        if (priv->monConfig->type != VIR_DOMAIN_CHR_TYPE_UNIX) {
5621 5622 5623 5624 5625 5626 5627 5628 5629
            qemudReportError(conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                             _("network device type '%s' cannot be attached: "
                               "qemu is not using a unix socket monitor"),
                             virDomainNetTypeToString(net->type));
            return -1;
        }

        if ((tapfd = qemudNetworkIfaceConnect(conn, driver, net, qemuCmdFlags)) < 0)
            return -1;
M
Mark McLoughlin 已提交
5630 5631
    }

5632 5633
    if (VIR_REALLOC_N(vm->def->nets, vm->def->nnets+1) < 0)
        goto no_memory;
M
Mark McLoughlin 已提交
5634

5635 5636 5637 5638 5639
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_NET_NAME) ||
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
        if (qemuAssignDeviceNetAlias(vm->def, net, -1) < 0)
            goto cleanup;
    }
M
Mark McLoughlin 已提交
5640

5641 5642 5643 5644
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &net->info) < 0)
        goto cleanup;

5645
    vlan = qemuDomainNetVLAN(net);
M
Mark McLoughlin 已提交
5646

5647 5648 5649 5650 5651 5652
    if (vlan < 0) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_NO_SUPPORT, "%s",
                         _("Unable to attach network devices without vlan"));
        goto cleanup;
    }

5653
    if (tapfd != -1) {
5654
        if (virAsprintf(&tapfd_name, "fd-%s", net->info.alias) < 0)
5655 5656
            goto no_memory;

5657
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
5658
        if (qemuMonitorSendFileHandle(priv->mon, tapfd_name, tapfd) < 0) {
5659
            qemuDomainObjExitMonitorWithDriver(driver, vm);
5660
            goto cleanup;
5661
        }
5662
        qemuDomainObjExitMonitorWithDriver(driver, vm);
5663 5664
    }

5665
    if (!(netstr = qemuBuildHostNetStr(conn, net, ' ',
5666
                                       vlan, tapfd_name)))
5667
        goto try_tapfd_close;
M
Mark McLoughlin 已提交
5668

5669
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5670
    if (qemuMonitorAddHostNetwork(priv->mon, netstr) < 0) {
5671
        qemuDomainObjExitMonitorWithDriver(driver, vm);
5672
        goto try_tapfd_close;
5673
    }
5674
    qemuDomainObjExitMonitorWithDriver(driver, vm);
M
Mark McLoughlin 已提交
5675

5676 5677 5678
    if (tapfd != -1)
        close(tapfd);
    tapfd = -1;
M
Mark McLoughlin 已提交
5679

5680
    if (!(nicstr = qemuBuildNicStr(conn, net, NULL, vlan)))
5681
        goto try_remove;
M
Mark McLoughlin 已提交
5682

5683
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5684
    if (qemuMonitorAddPCINetwork(priv->mon, nicstr,
5685
                                 &guestAddr) < 0) {
5686
        qemuDomainObjExitMonitorWithDriver(driver, vm);
5687
        goto try_remove;
5688
    }
5689
    net->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
5690
    memcpy(&net->info.addr.pci, &guestAddr, sizeof(guestAddr));
5691
    qemuDomainObjExitMonitorWithDriver(driver, vm);
5692

5693
    ret = 0;
M
Mark McLoughlin 已提交
5694 5695 5696

    vm->def->nets[vm->def->nnets++] = net;

5697
cleanup:
5698 5699 5700 5701 5702 5703
    if ((ret != 0) &&
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (net->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &net->info) < 0)
        VIR_WARN0("Unable to release PCI address on NIC");

5704 5705 5706 5707 5708
    VIR_FREE(nicstr);
    VIR_FREE(netstr);
    VIR_FREE(tapfd_name);
    if (tapfd != -1)
        close(tapfd);
5709

5710
    return ret;
5711

5712
try_remove:
5713
    if (vlan < 0) {
5714
        VIR_WARN0(_("Unable to remove network backend"));
5715 5716 5717 5718
    } else {
        char *hostnet_name;
        if (virAsprintf(&hostnet_name, "host%s", net->info.alias) < 0)
            goto no_memory;
5719
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
5720
        if (qemuMonitorRemoveHostNetwork(priv->mon, vlan, hostnet_name) < 0)
5721
            VIR_WARN(_("Failed to remove network backend for vlan %d, net %s"),
5722
                     vlan, hostnet_name);
5723
        qemuDomainObjExitMonitorWithDriver(driver, vm);
5724
        VIR_FREE(hostnet_name);
5725
    }
5726
    goto cleanup;
5727

5728
try_tapfd_close:
5729
    if (tapfd_name) {
5730
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
5731
        if (qemuMonitorCloseFileHandle(priv->mon, tapfd_name) < 0)
5732
            VIR_WARN(_("Failed to close tapfd with '%s'"), tapfd_name);
5733
        qemuDomainObjExitMonitorWithDriver(driver, vm);
5734
    }
5735

5736 5737
    goto cleanup;

5738 5739
no_memory:
    virReportOOMError(conn);
5740
    goto cleanup;
M
Mark McLoughlin 已提交
5741 5742
}

5743

5744
static int qemudDomainAttachHostPciDevice(virConnectPtr conn,
5745
                                          struct qemud_driver *driver,
5746
                                          virDomainObjPtr vm,
5747 5748
                                          virDomainHostdevDefPtr hostdev,
                                          int qemuCmdFlags)
5749
{
5750
    qemuDomainObjPrivatePtr priv = vm->privateData;
5751
    pciDevice *pci;
5752
    int ret;
5753
    virDomainDevicePCIAddress guestAddr;
5754
    char *devstr = NULL;
5755 5756 5757 5758 5759 5760

    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs+1) < 0) {
        virReportOOMError(conn);
        return -1;
    }

5761 5762 5763 5764 5765
    pci = pciGetDevice(conn,
                       hostdev->source.subsys.u.pci.domain,
                       hostdev->source.subsys.u.pci.bus,
                       hostdev->source.subsys.u.pci.slot,
                       hostdev->source.subsys.u.pci.function);
5766
    if (!pci)
5767
        return -1;
5768

5769 5770
    if (!pciDeviceIsAssignable(conn, pci, !driver->relaxedACS) ||
        (hostdev->managed && pciDettachDevice(conn, pci) < 0) ||
5771 5772 5773 5774 5775 5776
        pciResetDevice(conn, pci, driver->activePciHostdevs) < 0) {
        pciFreeDevice(conn, pci);
        return -1;
    }

    if (pciDeviceListAdd(conn, driver->activePciHostdevs, pci) < 0) {
5777
        pciFreeDevice(conn, pci);
5778
        return -1;
5779 5780
    }

5781 5782 5783 5784 5785 5786 5787
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &hostdev->info) < 0)
            goto error;

        if (!(devstr = qemuBuildPCIHostdevDevStr(hostdev)))
            goto error;
    }
5788

5789
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5790 5791 5792 5793 5794 5795
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)
        ret = qemuMonitorAddDevice(priv->mon, devstr);
    else
        ret = qemuMonitorAddPCIHostDevice(priv->mon,
                                          &hostdev->source.subsys.u.pci,
                                          &guestAddr);
5796
    qemuDomainObjExitMonitorWithDriver(driver, vm);
5797
    if (ret < 0)
5798
        goto error;
5799
    hostdev->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
5800
    memcpy(&hostdev->info.addr.pci, &guestAddr, sizeof(guestAddr));
5801 5802 5803

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;

5804 5805
    VIR_FREE(devstr);

5806
    return 0;
5807 5808

error:
5809 5810 5811 5812 5813
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (hostdev->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &hostdev->info) < 0)
        VIR_WARN0("Unable to release PCI address on host device");

5814
    VIR_FREE(devstr);
5815 5816 5817
    pciDeviceListDel(conn, driver->activePciHostdevs, pci);

    return -1;
5818 5819
}

5820

M
Mark McLoughlin 已提交
5821
static int qemudDomainAttachHostUsbDevice(virConnectPtr conn,
5822
                                          struct qemud_driver *driver,
M
Mark McLoughlin 已提交
5823
                                          virDomainObjPtr vm,
5824 5825
                                          virDomainHostdevDefPtr hostdev,
                                          int qemuCmdFlags)
5826 5827
{
    int ret;
5828
    qemuDomainObjPrivatePtr priv = vm->privateData;
5829 5830 5831 5832 5833
    char *devstr = NULL;

    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        !(devstr = qemuBuildPCIHostdevDevStr(hostdev)))
        goto error;
5834

5835
    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs+1) < 0) {
5836
        virReportOOMError(conn);
5837
        goto error;
5838
    }
5839

5840
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5841 5842 5843
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)
        ret = qemuMonitorAddDevice(priv->mon, devstr);
    else
5844
        ret = qemuMonitorAddUSBDeviceExact(priv->mon,
5845 5846
                                           hostdev->source.subsys.u.usb.bus,
                                           hostdev->source.subsys.u.usb.device);
5847
    qemuDomainObjExitMonitorWithDriver(driver, vm);
5848 5849 5850 5851
    if (ret < 0)
        goto error;

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;
5852

5853
    VIR_FREE(devstr);
5854

5855 5856 5857 5858 5859
    return 0;

error:
    VIR_FREE(devstr);
    return -1;
5860 5861
}

5862

M
Mark McLoughlin 已提交
5863 5864 5865
static int qemudDomainAttachHostDevice(virConnectPtr conn,
                                       struct qemud_driver *driver,
                                       virDomainObjPtr vm,
5866 5867
                                       virDomainHostdevDefPtr hostdev,
                                       int qemuCmdFlags)
M
Mark McLoughlin 已提交
5868 5869 5870 5871 5872 5873 5874 5875
{
    if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS) {
        qemudReportError(conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         _("hostdev mode '%s' not supported"),
                         virDomainHostdevModeTypeToString(hostdev->mode));
        return -1;
    }

5876
    if (driver->securityDriver &&
5877
        driver->securityDriver->domainSetSecurityHostdevLabel &&
5878
        driver->securityDriver->domainSetSecurityHostdevLabel(conn, vm, hostdev) < 0)
5879
        return -1;
M
Mark McLoughlin 已提交
5880 5881

    switch (hostdev->source.subsys.type) {
5882
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
5883 5884
        if (qemudDomainAttachHostPciDevice(conn, driver, vm,
                                           hostdev, qemuCmdFlags) < 0)
5885 5886 5887
            goto error;
        break;

M
Mark McLoughlin 已提交
5888
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
5889 5890
        if (qemudDomainAttachHostUsbDevice(conn, driver, vm,
                                           hostdev, qemuCmdFlags) < 0)
5891 5892 5893
            goto error;
        break;

M
Mark McLoughlin 已提交
5894 5895 5896 5897
    default:
        qemudReportError(conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         _("hostdev subsys type '%s' not supported"),
                         virDomainHostdevSubsysTypeToString(hostdev->source.subsys.type));
5898
        goto error;
M
Mark McLoughlin 已提交
5899
    }
5900 5901 5902 5903 5904 5905

    return 0;

error:
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityHostdevLabel &&
5906
        driver->securityDriver->domainRestoreSecurityHostdevLabel(conn, vm, hostdev) < 0)
5907 5908 5909
        VIR_WARN0("Unable to restore host device labelling on hotplug fail");

    return -1;
M
Mark McLoughlin 已提交
5910 5911
}

5912

5913
static int qemudDomainAttachDevice(virDomainPtr dom,
5914 5915
                                   const char *xml)
{
5916 5917 5918
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    virDomainDeviceDefPtr dev = NULL;
5919
    unsigned int qemuCmdFlags;
5920
    virCgroupPtr cgroup = NULL;
5921
    int ret = -1;
5922

5923
    qemuDriverLock(driver);
5924
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
5925
    if (!vm) {
5926 5927 5928 5929
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
5930
        goto cleanup;
5931 5932
    }

5933 5934 5935
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
5936
    if (!virDomainObjIsActive(vm)) {
5937
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
5938
                         "%s", _("cannot attach device on inactive domain"));
5939
        goto endjob;
5940 5941
    }

5942 5943
    dev = virDomainDeviceDefParse(dom->conn, driver->caps, vm->def, xml,
                                  VIR_DOMAIN_XML_INACTIVE);
5944
    if (dev == NULL)
5945
        goto endjob;
5946

5947 5948 5949
    if (qemudExtractVersionInfo(vm->def->emulator,
                                NULL,
                                &qemuCmdFlags) < 0)
5950
        goto endjob;
5951

5952
    if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
5953
        if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
5954 5955 5956 5957
            if (virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0) !=0 ) {
                qemudReportError(dom->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                 _("Unable to find cgroup for %s\n"),
                                 vm->def->name);
5958
                goto endjob;
5959 5960 5961 5962 5963 5964 5965 5966
            }
            if (dev->data.disk->src != NULL &&
                dev->data.disk->type == VIR_DOMAIN_DISK_TYPE_BLOCK &&
                virCgroupAllowDevicePath(cgroup,
                                         dev->data.disk->src) < 0) {
                qemudReportError(dom->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                 _("unable to allow device %s"),
                                 dev->data.disk->src);
5967
                goto endjob;
5968 5969 5970
            }
        }

5971
        switch (dev->data.disk->device) {
5972 5973
        case VIR_DOMAIN_DISK_DEVICE_CDROM:
        case VIR_DOMAIN_DISK_DEVICE_FLOPPY:
5974 5975 5976
            ret = qemudDomainChangeEjectableMedia(dom->conn, driver, vm, dev->data.disk);
            if (ret == 0)
                dev->data.disk = NULL;
5977
            break;
5978

5979 5980
        case VIR_DOMAIN_DISK_DEVICE_DISK:
            if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_USB) {
5981 5982
                ret = qemudDomainAttachUsbMassstorageDevice(dom->conn, driver, vm,
                                                            dev->data.disk, qemuCmdFlags);
5983 5984
                if (ret == 0)
                    dev->data.disk = NULL;
5985
            } else if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_VIRTIO) {
5986 5987
                ret = qemudDomainAttachPciDiskDevice(dom->conn, driver, vm,
                                                     dev->data.disk, qemuCmdFlags);
5988 5989
                if (ret == 0)
                    dev->data.disk = NULL;
5990
            } else if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_SCSI) {
5991 5992
                ret = qemudDomainAttachSCSIDisk(dom->conn, driver, vm,
                                                dev->data.disk, qemuCmdFlags);
5993 5994
                if (ret == 0)
                    dev->data.disk = NULL;
5995 5996 5997 5998
            } else {
                qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                                 _("disk bus '%s' cannot be hotplugged."),
                                 virDomainDiskBusTypeToString(dev->data.disk->bus));
5999
                /* fallthrough */
6000 6001
            }
            break;
6002

6003 6004
        default:
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
6005 6006
                             _("disk device type '%s' cannot be hotplugged"),
                             virDomainDiskDeviceTypeToString(dev->data.disk->device));
6007 6008
            /* Fallthrough */
        }
6009
        if (ret != 0 && cgroup) {
6010 6011
            virCgroupDenyDevicePath(cgroup,
                                    dev->data.disk->src);
6012
        }
6013 6014
    } else if (dev->type == VIR_DOMAIN_DEVICE_CONTROLLER) {
        if (dev->data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_SCSI) {
6015 6016
            ret = qemudDomainAttachPciControllerDevice(dom->conn, driver, vm,
                                                       dev->data.controller, qemuCmdFlags);
6017 6018 6019 6020 6021 6022
        } else {
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                             _("disk controller bus '%s' cannot be hotplugged."),
                             virDomainControllerTypeToString(dev->data.controller->type));
            /* fallthrough */
        }
M
Mark McLoughlin 已提交
6023
    } else if (dev->type == VIR_DOMAIN_DEVICE_NET) {
6024 6025
        ret = qemudDomainAttachNetDevice(dom->conn, driver, vm,
                                         dev->data.net, qemuCmdFlags);
6026 6027
        if (ret == 0)
            dev->data.net = NULL;
M
Mark McLoughlin 已提交
6028
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
6029 6030
        ret = qemudDomainAttachHostDevice(dom->conn, driver, vm,
                                          dev->data.hostdev, qemuCmdFlags);
6031 6032
        if (ret == 0)
            dev->data.hostdev = NULL;
6033
    } else {
6034
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
6035 6036
                         _("device type '%s' cannot be attached"),
                         virDomainDeviceTypeToString(dev->type));
6037
        goto endjob;
6038 6039
    }

6040
    if (!ret && virDomainSaveStatus(dom->conn, driver->caps, driver->stateDir, vm) < 0)
6041 6042
        ret = -1;

6043
endjob:
6044 6045
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
6046

6047
cleanup:
6048 6049 6050
    if (cgroup)
        virCgroupFree(&cgroup);

6051
    virDomainDeviceDefFree(dev);
6052 6053
    if (vm)
        virDomainObjUnlock(vm);
6054
    qemuDriverUnlock(driver);
6055 6056 6057
    return ret;
}

6058
static int qemudDomainDetachPciDiskDevice(virConnectPtr conn,
6059 6060 6061
                                          struct qemud_driver *driver,
                                          virDomainObjPtr vm,
                                          virDomainDeviceDefPtr dev)
6062 6063 6064
{
    int i, ret = -1;
    virDomainDiskDefPtr detach = NULL;
6065
    qemuDomainObjPrivatePtr priv = vm->privateData;
6066 6067 6068 6069 6070 6071 6072 6073 6074

    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (STREQ(vm->def->disks[i]->dst, dev->data.disk->dst)) {
            detach = vm->def->disks[i];
            break;
        }
    }

    if (!detach) {
6075
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
6076
                         _("disk %s not found"), dev->data.disk->dst);
6077
        goto cleanup;
6078 6079
    }

6080 6081 6082 6083
    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED, "%s",
                         _("device cannot be detached without a PCI address"));
6084
        goto cleanup;
6085 6086
    }

6087
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6088
    if (qemuMonitorRemovePCIDevice(priv->mon,
6089
                                   &detach->info.addr.pci) < 0) {
6090
        qemuDomainObjExitMonitor(vm);
6091
        goto cleanup;
6092
    }
6093
    qemuDomainObjExitMonitorWithDriver(driver, vm);
6094

6095 6096 6097 6098 6099 6100 6101 6102 6103 6104
    if (vm->def->ndisks > 1) {
        memmove(vm->def->disks + i,
                vm->def->disks + i + 1,
                sizeof(*vm->def->disks) *
                (vm->def->ndisks - (i + 1)));
        vm->def->ndisks--;
        if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks) < 0) {
            /* ignore, harmless */
        }
    } else {
6105
        VIR_FREE(vm->def->disks);
6106
        vm->def->ndisks = 0;
6107
    }
6108
    virDomainDiskDefFree(detach);
6109

6110 6111 6112 6113 6114
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
        driver->securityDriver->domainRestoreSecurityImageLabel(conn, vm, dev->data.disk) < 0)
        VIR_WARN("Unable to restore security label on %s", dev->data.disk->src);

6115
    ret = 0;
6116 6117

cleanup:
6118 6119 6120
    return ret;
}

6121 6122 6123 6124 6125 6126 6127 6128 6129 6130 6131 6132 6133 6134 6135 6136 6137 6138 6139 6140 6141 6142 6143 6144 6145 6146 6147 6148 6149 6150 6151 6152 6153 6154 6155 6156 6157 6158 6159 6160 6161 6162 6163 6164 6165 6166 6167 6168 6169 6170 6171 6172 6173 6174 6175 6176 6177 6178 6179 6180 6181
static int qemudDomainDetachPciControllerDevice(virConnectPtr conn,
                                                struct qemud_driver *driver,
                                                virDomainObjPtr vm,
                                                virDomainDeviceDefPtr dev)
{
    int i, ret = -1;
    virDomainControllerDefPtr detach = NULL;
    qemuDomainObjPrivatePtr priv = vm->privateData;

    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
        if ((vm->def->controllers[i]->type == dev->data.controller->type) &&
            (vm->def->controllers[i]->idx == dev->data.controller->idx)) {
            detach = vm->def->controllers[i];
            break;
        }
    }

    if (!detach) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         _("disk controller %s:%d not found"),
                         virDomainControllerTypeToString(dev->data.controller->type),
                         dev->data.controller->idx);
        goto cleanup;
    }

    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED, "%s",
                         _("device cannot be detached without a PCI address"));
        goto cleanup;
    }

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    if (qemuMonitorRemovePCIDevice(priv->mon,
                                   &detach->info.addr.pci) < 0) {
        qemuDomainObjExitMonitor(vm);
        goto cleanup;
    }
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    if (vm->def->ncontrollers > 1) {
        memmove(vm->def->controllers + i,
                vm->def->controllers + i + 1,
                sizeof(*vm->def->controllers) *
                (vm->def->ncontrollers - (i + 1)));
        vm->def->ncontrollers--;
        if (VIR_REALLOC_N(vm->def->controllers, vm->def->ncontrollers) < 0) {
            /* ignore, harmless */
        }
    } else {
        VIR_FREE(vm->def->controllers);
        vm->def->ncontrollers = 0;
    }
    virDomainControllerDefFree(detach);

    ret = 0;

cleanup:
    return ret;
}

6182 6183
static int
qemudDomainDetachNetDevice(virConnectPtr conn,
6184
                           struct qemud_driver *driver,
6185 6186 6187 6188 6189
                           virDomainObjPtr vm,
                           virDomainDeviceDefPtr dev)
{
    int i, ret = -1;
    virDomainNetDefPtr detach = NULL;
6190
    qemuDomainObjPrivatePtr priv = vm->privateData;
6191 6192
    int vlan;
    char *hostnet_name = NULL;
6193 6194 6195 6196 6197 6198 6199 6200 6201 6202 6203 6204 6205 6206 6207 6208 6209 6210 6211

    for (i = 0 ; i < vm->def->nnets ; i++) {
        virDomainNetDefPtr net = vm->def->nets[i];

        if (!memcmp(net->mac, dev->data.net->mac,  sizeof(net->mac))) {
            detach = net;
            break;
        }
    }

    if (!detach) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         _("network device %02x:%02x:%02x:%02x:%02x:%02x not found"),
                         dev->data.net->mac[0], dev->data.net->mac[1],
                         dev->data.net->mac[2], dev->data.net->mac[3],
                         dev->data.net->mac[4], dev->data.net->mac[5]);
        goto cleanup;
    }

6212 6213 6214 6215 6216 6217 6218
    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("device cannot be detached without a PCI address"));
        goto cleanup;
    }

6219
    if ((vlan = qemuDomainNetVLAN(detach)) < 0) {
6220
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
6221 6222 6223 6224 6225 6226
                         "%s", _("unable to determine original VLAN"));
        goto cleanup;
    }

    if (virAsprintf(&hostnet_name, "host%s", detach->info.alias) < 0) {
        virReportOOMError(NULL);
6227 6228 6229
        goto cleanup;
    }

6230
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6231
    if (qemuMonitorRemovePCIDevice(priv->mon,
6232
                                   &detach->info.addr.pci) < 0) {
6233
        qemuDomainObjExitMonitorWithDriver(driver, vm);
6234
        goto cleanup;
6235
    }
6236

6237
    if (qemuMonitorRemoveHostNetwork(priv->mon, vlan, hostnet_name) < 0) {
6238
        qemuDomainObjExitMonitorWithDriver(driver, vm);
6239
        goto cleanup;
6240
    }
6241
    qemuDomainObjExitMonitorWithDriver(driver, vm);
6242

6243 6244 6245 6246 6247 6248 6249 6250 6251 6252 6253
    if ((driver->macFilter) && (detach->ifname != NULL)) {
        if ((errno = networkDisallowMacOnPort(conn,
                                              driver,
                                              detach->ifname,
                                              detach->mac))) {
            virReportSystemError(conn, errno,
             _("failed to remove ebtables rule on  '%s'"),
                                 detach->ifname);
        }
    }

6254 6255 6256 6257 6258 6259 6260 6261 6262 6263
    if (vm->def->nnets > 1) {
        memmove(vm->def->nets + i,
                vm->def->nets + i + 1,
                sizeof(*vm->def->nets) *
                (vm->def->nnets - (i + 1)));
        vm->def->nnets--;
        if (VIR_REALLOC_N(vm->def->nets, vm->def->nnets) < 0) {
            /* ignore, harmless */
        }
    } else {
6264
        VIR_FREE(vm->def->nets);
6265
        vm->def->nnets = 0;
6266
    }
6267
    virDomainNetDefFree(detach);
6268

6269 6270 6271
    ret = 0;

cleanup:
6272
    VIR_FREE(hostnet_name);
6273 6274 6275
    return ret;
}

6276
static int qemudDomainDetachHostPciDevice(virConnectPtr conn,
6277
                                          struct qemud_driver *driver,
6278 6279 6280
                                          virDomainObjPtr vm,
                                          virDomainDeviceDefPtr dev)
{
6281
    virDomainHostdevDefPtr detach = NULL;
6282
    qemuDomainObjPrivatePtr priv = vm->privateData;
6283
    int i, ret;
6284
    pciDevice *pci;
6285 6286 6287 6288 6289 6290 6291 6292 6293 6294 6295 6296 6297 6298 6299 6300 6301 6302 6303 6304 6305 6306 6307 6308 6309 6310

    for (i = 0 ; i < vm->def->nhostdevs ; i++) {
        unsigned domain   = vm->def->hostdevs[i]->source.subsys.u.pci.domain;
        unsigned bus      = vm->def->hostdevs[i]->source.subsys.u.pci.bus;
        unsigned slot     = vm->def->hostdevs[i]->source.subsys.u.pci.slot;
        unsigned function = vm->def->hostdevs[i]->source.subsys.u.pci.function;

        if (dev->data.hostdev->source.subsys.u.pci.domain   == domain &&
            dev->data.hostdev->source.subsys.u.pci.bus      == bus &&
            dev->data.hostdev->source.subsys.u.pci.slot     == slot &&
            dev->data.hostdev->source.subsys.u.pci.function == function) {
            detach = vm->def->hostdevs[i];
            break;
        }
    }

    if (!detach) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         _("host pci device %.4x:%.2x:%.2x.%.1x not found"),
                         dev->data.hostdev->source.subsys.u.pci.domain,
                         dev->data.hostdev->source.subsys.u.pci.bus,
                         dev->data.hostdev->source.subsys.u.pci.slot,
                         dev->data.hostdev->source.subsys.u.pci.function);
        return -1;
    }

6311 6312
    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
6313
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
6314
                         "%s", _("device cannot be detached without a PCI address"));
6315 6316 6317
        return -1;
    }

6318
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6319
    if (qemuMonitorRemovePCIDevice(priv->mon,
6320
                                   &detach->info.addr.pci) < 0) {
6321
        qemuDomainObjExitMonitorWithDriver(driver, vm);
6322
        return -1;
6323
    }
6324
    qemuDomainObjExitMonitorWithDriver(driver, vm);
6325 6326 6327

    ret = 0;

6328 6329 6330 6331 6332 6333 6334 6335
    pci = pciGetDevice(conn,
                       detach->source.subsys.u.pci.domain,
                       detach->source.subsys.u.pci.bus,
                       detach->source.subsys.u.pci.slot,
                       detach->source.subsys.u.pci.function);
    if (!pci)
        ret = -1;
    else {
6336
        pciDeviceSetManaged(pci, detach->managed);
6337 6338
        pciDeviceListDel(conn, driver->activePciHostdevs, pci);
        if (pciResetDevice(conn, pci, driver->activePciHostdevs) < 0)
6339
            ret = -1;
6340
        qemudReattachManagedDevice(pci);
6341
        pciFreeDevice(conn, pci);
6342 6343
    }

6344 6345 6346 6347 6348 6349 6350 6351 6352 6353 6354 6355
    if (vm->def->nhostdevs > 1) {
        memmove(vm->def->hostdevs + i,
                vm->def->hostdevs + i + 1,
                sizeof(*vm->def->hostdevs) *
                (vm->def->nhostdevs - (i + 1)));
        vm->def->nhostdevs--;
        if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs) < 0) {
            /* ignore, harmless */
        }
    } else {
        VIR_FREE(vm->def->hostdevs);
        vm->def->nhostdevs = 0;
6356
    }
6357
    virDomainHostdevDefFree(detach);
6358 6359 6360 6361 6362 6363 6364 6365 6366 6367 6368 6369 6370 6371 6372 6373 6374 6375 6376 6377 6378

    return ret;
}

static int qemudDomainDetachHostDevice(virConnectPtr conn,
                                       struct qemud_driver *driver,
                                       virDomainObjPtr vm,
                                       virDomainDeviceDefPtr dev)
{
    virDomainHostdevDefPtr hostdev = dev->data.hostdev;
    int ret;

    if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS) {
        qemudReportError(conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         _("hostdev mode '%s' not supported"),
                         virDomainHostdevModeTypeToString(hostdev->mode));
        return -1;
    }

    switch (hostdev->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
6379
        ret = qemudDomainDetachHostPciDevice(conn, driver, vm, dev);
6380
        break;
6381 6382 6383 6384 6385 6386 6387
    default:
        qemudReportError(conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         _("hostdev subsys type '%s' not supported"),
                         virDomainHostdevSubsysTypeToString(hostdev->source.subsys.type));
        return -1;
    }

6388
    if (driver->securityDriver &&
6389 6390 6391
        driver->securityDriver->domainRestoreSecurityHostdevLabel &&
        driver->securityDriver->domainRestoreSecurityHostdevLabel(conn, vm, dev->data.hostdev) < 0)
        VIR_WARN0("Failed to restore host device labelling");
6392

6393 6394 6395
    return ret;
}

6396 6397
static int qemudDomainDetachDevice(virDomainPtr dom,
                                   const char *xml) {
6398 6399 6400 6401
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    virDomainDeviceDefPtr dev = NULL;
    int ret = -1;
6402

6403
    qemuDriverLock(driver);
6404
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6405
    if (!vm) {
6406 6407 6408 6409
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6410
        goto cleanup;
6411 6412
    }

6413 6414 6415
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
6416
    if (!virDomainObjIsActive(vm)) {
6417
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
G
Guido Günther 已提交
6418
                         "%s", _("cannot detach device on inactive domain"));
6419
        goto endjob;
6420 6421
    }

6422 6423
    dev = virDomainDeviceDefParse(dom->conn, driver->caps, vm->def, xml,
                                  VIR_DOMAIN_XML_INACTIVE);
6424
    if (dev == NULL)
6425
        goto endjob;
6426

6427 6428 6429

    if (dev->type == VIR_DOMAIN_DEVICE_DISK &&
        dev->data.disk->device == VIR_DOMAIN_DISK_DEVICE_DISK &&
6430
        dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_VIRTIO) {
6431
        ret = qemudDomainDetachPciDiskDevice(dom->conn, driver, vm, dev);
6432
    } else if (dev->type == VIR_DOMAIN_DEVICE_NET) {
6433
        ret = qemudDomainDetachNetDevice(dom->conn, driver, vm, dev);
6434 6435 6436 6437 6438 6439 6440 6441 6442
    } else if (dev->type == VIR_DOMAIN_DEVICE_CONTROLLER) {
        if (dev->data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_SCSI) {
            ret = qemudDomainDetachPciControllerDevice(dom->conn, driver, vm, dev);
        } else {
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                             _("disk controller bus '%s' cannot be hotunplugged."),
                             virDomainControllerTypeToString(dev->data.controller->type));
            /* fallthrough */
        }
6443 6444
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
        ret = qemudDomainDetachHostDevice(dom->conn, driver, vm, dev);
6445
    } else {
6446
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
6447 6448
                         "%s", _("This type of device cannot be hot unplugged"));
    }
6449

6450
    if (!ret && virDomainSaveStatus(dom->conn, driver->caps, driver->stateDir, vm) < 0)
6451 6452
        ret = -1;

6453
endjob:
6454 6455
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
6456

6457 6458
cleanup:
    virDomainDeviceDefFree(dev);
6459 6460
    if (vm)
        virDomainObjUnlock(vm);
6461
    qemuDriverUnlock(driver);
6462 6463 6464
    return ret;
}

6465
static int qemudDomainGetAutostart(virDomainPtr dom,
6466
                                   int *autostart) {
6467 6468 6469
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
6470

6471
    qemuDriverLock(driver);
6472
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6473 6474
    qemuDriverUnlock(driver);

6475
    if (!vm) {
6476 6477 6478 6479
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6480
        goto cleanup;
6481 6482 6483
    }

    *autostart = vm->autostart;
6484
    ret = 0;
6485

6486
cleanup:
6487 6488
    if (vm)
        virDomainObjUnlock(vm);
6489
    return ret;
6490 6491
}

6492
static int qemudDomainSetAutostart(virDomainPtr dom,
6493
                                   int autostart) {
6494 6495
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
6496 6497
    char *configFile = NULL, *autostartLink = NULL;
    int ret = -1;
6498

6499
    qemuDriverLock(driver);
6500
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6501

6502
    if (!vm) {
6503 6504 6505 6506
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6507
        goto cleanup;
6508 6509
    }

6510 6511 6512
    if (!vm->persistent) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("cannot set autostart for transient domain"));
6513
        goto cleanup;
6514 6515
    }

6516 6517
    autostart = (autostart != 0);

6518 6519 6520 6521 6522
    if (vm->autostart != autostart) {
        if ((configFile = virDomainConfigFile(dom->conn, driver->configDir, vm->def->name)) == NULL)
            goto cleanup;
        if ((autostartLink = virDomainConfigFile(dom->conn, driver->autostartDir, vm->def->name)) == NULL)
            goto cleanup;
6523

6524 6525
        if (autostart) {
            int err;
6526

6527
            if ((err = virFileMakePath(driver->autostartDir))) {
6528 6529 6530
                virReportSystemError(dom->conn, err,
                                     _("cannot create autostart directory %s"),
                                     driver->autostartDir);
6531 6532
                goto cleanup;
            }
6533

6534
            if (symlink(configFile, autostartLink) < 0) {
6535 6536 6537
                virReportSystemError(dom->conn, errno,
                                     _("Failed to create symlink '%s to '%s'"),
                                     autostartLink, configFile);
6538 6539 6540 6541
                goto cleanup;
            }
        } else {
            if (unlink(autostartLink) < 0 && errno != ENOENT && errno != ENOTDIR) {
6542 6543 6544
                virReportSystemError(dom->conn, errno,
                                     _("Failed to delete symlink '%s'"),
                                     autostartLink);
6545 6546
                goto cleanup;
            }
6547 6548
        }

6549
        vm->autostart = autostart;
6550
    }
6551
    ret = 0;
6552

6553 6554 6555
cleanup:
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
6556 6557
    if (vm)
        virDomainObjUnlock(vm);
6558
    qemuDriverUnlock(driver);
6559
    return ret;
6560 6561
}

6562 6563 6564 6565 6566

static char *qemuGetSchedulerType(virDomainPtr dom,
                                  int *nparams)
{
    struct qemud_driver *driver = dom->conn->privateData;
6567
    char *ret = NULL;
6568

6569
    qemuDriverLock(driver);
6570
    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
6571 6572
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         __FUNCTION__);
6573
        goto cleanup;
6574 6575 6576 6577 6578 6579 6580 6581
    }

    if (nparams)
        *nparams = 1;

    ret = strdup("posix");
    if (!ret)
        virReportOOMError(dom->conn);
6582 6583 6584

cleanup:
    qemuDriverUnlock(driver);
6585 6586 6587 6588 6589 6590 6591 6592 6593 6594 6595 6596 6597
    return ret;
}

static int qemuSetSchedulerParameters(virDomainPtr dom,
                                      virSchedParameterPtr params,
                                      int nparams)
{
    struct qemud_driver *driver = dom->conn->privateData;
    int i;
    virCgroupPtr group = NULL;
    virDomainObjPtr vm = NULL;
    int ret = -1;

6598
    qemuDriverLock(driver);
6599
    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
6600 6601
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         __FUNCTION__);
6602
        goto cleanup;
6603 6604 6605 6606 6607 6608 6609 6610 6611 6612 6613 6614 6615 6616 6617 6618 6619 6620 6621 6622 6623 6624
    }

    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (vm == NULL) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("No such domain %s"), dom->uuid);
        goto cleanup;
    }

    if (virCgroupForDomain(driver->cgroup, vm->def->name, &group, 0) != 0) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("cannot find cgroup for domain %s"), vm->def->name);
        goto cleanup;
    }

    for (i = 0; i < nparams; i++) {
        virSchedParameterPtr param = &params[i];

        if (STREQ(param->field, "cpu_shares")) {
            int rc;
            if (param->type != VIR_DOMAIN_SCHED_FIELD_ULLONG) {
C
Chris Lalancette 已提交
6625
                qemudReportError(dom->conn, dom, NULL, VIR_ERR_INVALID_ARG, "%s",
6626 6627 6628 6629 6630 6631 6632 6633 6634 6635 6636 6637 6638 6639 6640 6641 6642 6643 6644 6645 6646 6647
                                 _("invalid type for cpu_shares tunable, expected a 'ullong'"));
                goto cleanup;
            }

            rc = virCgroupSetCpuShares(group, params[i].value.ul);
            if (rc != 0) {
                virReportSystemError(dom->conn, -rc, "%s",
                                     _("unable to set cpu shares tunable"));
                goto cleanup;
            }
        } else {
            qemudReportError(dom->conn, domain, NULL, VIR_ERR_INVALID_ARG,
                             _("Invalid parameter `%s'"), param->field);
            goto cleanup;
        }
    }
    ret = 0;

cleanup:
    virCgroupFree(&group);
    if (vm)
        virDomainObjUnlock(vm);
6648
    qemuDriverUnlock(driver);
6649 6650 6651 6652 6653 6654 6655 6656 6657 6658 6659 6660 6661 6662
    return ret;
}

static int qemuGetSchedulerParameters(virDomainPtr dom,
                                      virSchedParameterPtr params,
                                      int *nparams)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virCgroupPtr group = NULL;
    virDomainObjPtr vm = NULL;
    unsigned long long val;
    int ret = -1;
    int rc;

6663
    qemuDriverLock(driver);
6664
    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
6665 6666
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         __FUNCTION__);
6667
        goto cleanup;
6668 6669 6670 6671 6672
    }

    if ((*nparams) != 1) {
        qemudReportError(dom->conn, domain, NULL, VIR_ERR_INVALID_ARG,
                         "%s", _("Invalid parameter count"));
6673
        goto cleanup;
6674 6675 6676 6677 6678 6679 6680 6681 6682 6683 6684 6685 6686 6687 6688 6689 6690 6691 6692 6693 6694 6695 6696 6697
    }

    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (vm == NULL) {
        qemudReportError(dom->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("No such domain %s"), dom->uuid);
        goto cleanup;
    }

    if (virCgroupForDomain(driver->cgroup, vm->def->name, &group, 0) != 0) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("cannot find cgroup for domain %s"), vm->def->name);
        goto cleanup;
    }

    rc = virCgroupGetCpuShares(group, &val);
    if (rc != 0) {
        virReportSystemError(dom->conn, -rc, "%s",
                             _("unable to get cpu shares tunable"));
        goto cleanup;
    }
    params[0].value.ul = val;
    params[0].type = VIR_DOMAIN_SCHED_FIELD_ULLONG;
C
Chris Lalancette 已提交
6698 6699 6700 6701 6702
    if (virStrcpyStatic(params[0].field, "cpu_shares") == NULL) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("Field cpu_shares too long for destination"));
        goto cleanup;
    }
6703 6704 6705 6706 6707 6708 6709

    ret = 0;

cleanup:
    virCgroupFree(&group);
    if (vm)
        virDomainObjUnlock(vm);
6710
    qemuDriverUnlock(driver);
6711 6712 6713 6714
    return ret;
}


6715 6716 6717 6718 6719 6720 6721 6722 6723
/* This uses the 'info blockstats' monitor command which was
 * integrated into both qemu & kvm in late 2007.  If the command is
 * not supported we detect this and return the appropriate error.
 */
static int
qemudDomainBlockStats (virDomainPtr dom,
                       const char *path,
                       struct _virDomainBlockStats *stats)
{
6724
    struct qemud_driver *driver = dom->conn->privateData;
6725
    int i, ret = -1;
6726
    virDomainObjPtr vm;
6727
    virDomainDiskDefPtr disk = NULL;
6728

6729
    qemuDriverLock(driver);
6730
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6731
    qemuDriverUnlock(driver);
6732
    if (!vm) {
6733 6734 6735 6736
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6737
        goto cleanup;
6738
    }
6739 6740 6741 6742

    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
6743
    if (!virDomainObjIsActive (vm)) {
6744
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
6745
                          "%s", _("domain is not running"));
6746
        goto endjob;
6747 6748
    }

6749 6750 6751 6752 6753 6754 6755 6756
    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (STREQ(path, vm->def->disks[i]->dst)) {
            disk = vm->def->disks[i];
            break;
        }
    }

    if (!disk) {
6757 6758
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
                          _("invalid path: %s"), path);
6759
        goto endjob;
6760 6761
    }

6762 6763 6764
    if (!disk->info.alias) {
        qemudReportError(dom->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("missing disk device alias name for %s"), disk->dst);
6765
        goto endjob;
6766
    }
6767

6768
    qemuDomainObjPrivatePtr priv = vm->privateData;
6769 6770
    qemuDomainObjEnterMonitor(vm);
    ret = qemuMonitorGetBlockStatsInfo(priv->mon,
6771
                                       disk->info.alias,
6772 6773 6774 6775 6776 6777
                                       &stats->rd_req,
                                       &stats->rd_bytes,
                                       &stats->wr_req,
                                       &stats->wr_bytes,
                                       &stats->errs);
    qemuDomainObjExitMonitor(vm);
6778

6779
endjob:
6780 6781
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
6782

6783
cleanup:
6784 6785
    if (vm)
        virDomainObjUnlock(vm);
6786
    return ret;
6787 6788
}

6789
#ifdef __linux__
6790 6791 6792 6793 6794
static int
qemudDomainInterfaceStats (virDomainPtr dom,
                           const char *path,
                           struct _virDomainInterfaceStats *stats)
{
6795 6796
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
6797
    int i;
6798
    int ret = -1;
6799

6800
    qemuDriverLock(driver);
6801
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6802 6803
    qemuDriverUnlock(driver);

6804
    if (!vm) {
6805 6806 6807 6808
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6809
        goto cleanup;
6810 6811
    }

D
Daniel P. Berrange 已提交
6812
    if (!virDomainObjIsActive(vm)) {
6813
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
6814
                         "%s", _("domain is not running"));
6815
        goto cleanup;
6816 6817 6818
    }

    /* Check the path is one of the domain's network interfaces. */
6819 6820
    for (i = 0 ; i < vm->def->nnets ; i++) {
        if (vm->def->nets[i]->ifname &&
6821 6822 6823 6824
            STREQ (vm->def->nets[i]->ifname, path)) {
            ret = 0;
            break;
        }
6825 6826
    }

6827 6828 6829 6830 6831
    if (ret == 0)
        ret = linuxDomainInterfaceStats (dom->conn, path, stats);
    else
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
                          _("invalid path, '%s' is not a known interface"), path);
6832

6833
cleanup:
6834 6835
    if (vm)
        virDomainObjUnlock(vm);
6836 6837
    return ret;
}
6838
#else
6839 6840 6841 6842
static int
qemudDomainInterfaceStats (virDomainPtr dom,
                           const char *path ATTRIBUTE_UNUSED,
                           struct _virDomainInterfaceStats *stats ATTRIBUTE_UNUSED)
6843 6844 6845 6846
    qemudReportError (dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                      "%s", __FUNCTION__);
    return -1;
}
6847
#endif
6848

6849 6850 6851 6852 6853 6854 6855 6856 6857 6858 6859 6860 6861 6862 6863 6864 6865 6866 6867 6868 6869 6870 6871 6872 6873 6874 6875 6876 6877 6878 6879 6880 6881 6882 6883 6884 6885
static int
qemudDomainMemoryStats (virDomainPtr dom,
                        struct _virDomainMemoryStat *stats,
                        unsigned int nr_stats)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    unsigned int ret = -1;

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);

    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    if (virDomainObjIsActive(vm)) {
        qemuDomainObjPrivatePtr priv = vm->privateData;
        qemuDomainObjEnterMonitor(vm);
        ret = qemuMonitorTextGetMemoryStats(priv->mon, stats, nr_stats);
        qemuDomainObjExitMonitor(vm);
    } else {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
                         "%s", _("domain is not running"));
    }

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    return ret;
}

6886 6887 6888 6889 6890 6891 6892
static int
qemudDomainBlockPeek (virDomainPtr dom,
                      const char *path,
                      unsigned long long offset, size_t size,
                      void *buffer,
                      unsigned int flags ATTRIBUTE_UNUSED)
{
6893 6894 6895
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int fd = -1, ret = -1, i;
6896

6897
    qemuDriverLock(driver);
6898
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6899 6900
    qemuDriverUnlock(driver);

6901
    if (!vm) {
6902 6903 6904 6905
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6906
        goto cleanup;
6907 6908 6909 6910
    }

    if (!path || path[0] == '\0') {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
J
Jim Meyering 已提交
6911
                         "%s", _("NULL or empty path"));
6912
        goto cleanup;
6913 6914 6915
    }

    /* Check the path belongs to this domain. */
6916 6917
    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (vm->def->disks[i]->src != NULL &&
6918 6919 6920 6921
            STREQ (vm->def->disks[i]->src, path)) {
            ret = 0;
            break;
        }
6922 6923
    }

6924 6925 6926 6927 6928
    if (ret == 0) {
        ret = -1;
        /* The path is correct, now try to open it and get its size. */
        fd = open (path, O_RDONLY);
        if (fd == -1) {
6929 6930
            virReportSystemError (dom->conn, errno,
                                  _("%s: failed to open"), path);
6931 6932
            goto cleanup;
        }
6933

6934 6935 6936 6937 6938 6939
        /* Seek and read. */
        /* NB. Because we configure with AC_SYS_LARGEFILE, off_t should
         * be 64 bits on all platforms.
         */
        if (lseek (fd, offset, SEEK_SET) == (off_t) -1 ||
            saferead (fd, buffer, size) == (ssize_t) -1) {
6940 6941
            virReportSystemError (dom->conn, errno,
                                  _("%s: failed to seek or read"), path);
6942 6943 6944 6945 6946 6947 6948
            goto cleanup;
        }

        ret = 0;
    } else {
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
                          "%s", _("invalid path"));
6949 6950
    }

6951 6952 6953
cleanup:
    if (fd >= 0)
        close (fd);
6954 6955
    if (vm)
        virDomainObjUnlock(vm);
6956 6957 6958
    return ret;
}

R
Richard W.M. Jones 已提交
6959 6960 6961 6962 6963 6964
static int
qemudDomainMemoryPeek (virDomainPtr dom,
                       unsigned long long offset, size_t size,
                       void *buffer,
                       unsigned int flags)
{
6965 6966
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
6967
    char *tmp = NULL;
R
Richard W.M. Jones 已提交
6968 6969
    int fd = -1, ret = -1;

6970
    qemuDriverLock(driver);
6971
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6972
    qemuDriverUnlock(driver);
R
Richard W.M. Jones 已提交
6973 6974

    if (!vm) {
6975 6976 6977 6978
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6979 6980 6981
        goto cleanup;
    }

6982
    if (flags != VIR_MEMORY_VIRTUAL && flags != VIR_MEMORY_PHYSICAL) {
6983
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
6984
                     "%s", _("flags parameter must be VIR_MEMORY_VIRTUAL or VIR_MEMORY_PHYSICAL"));
6985
        goto cleanup;
R
Richard W.M. Jones 已提交
6986 6987
    }

6988 6989 6990
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
6991
    if (!virDomainObjIsActive(vm)) {
6992
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
R
Richard W.M. Jones 已提交
6993
                         "%s", _("domain is not running"));
6994
        goto endjob;
R
Richard W.M. Jones 已提交
6995 6996
    }

6997 6998
    if (virAsprintf(&tmp, driver->cacheDir,  "/qemu.mem.XXXXXX") < 0) {
        virReportOOMError(dom->conn);
6999
        goto endjob;
7000 7001
    }

R
Richard W.M. Jones 已提交
7002 7003
    /* Create a temporary filename. */
    if ((fd = mkstemp (tmp)) == -1) {
7004 7005
        virReportSystemError (dom->conn, errno,
                              _("mkstemp(\"%s\") failed"), tmp);
7006
        goto endjob;
R
Richard W.M. Jones 已提交
7007 7008
    }

7009
    qemuDomainObjPrivatePtr priv = vm->privateData;
7010
    qemuDomainObjEnterMonitor(vm);
7011
    if (flags == VIR_MEMORY_VIRTUAL) {
7012 7013
        if (qemuMonitorSaveVirtualMemory(priv->mon, offset, size, tmp) < 0) {
            qemuDomainObjExitMonitor(vm);
7014
            goto endjob;
7015
        }
7016
    } else {
7017 7018
        if (qemuMonitorSavePhysicalMemory(priv->mon, offset, size, tmp) < 0) {
            qemuDomainObjExitMonitor(vm);
7019
            goto endjob;
7020
        }
R
Richard W.M. Jones 已提交
7021
    }
7022
    qemuDomainObjExitMonitor(vm);
R
Richard W.M. Jones 已提交
7023 7024 7025

    /* Read the memory file into buffer. */
    if (saferead (fd, buffer, size) == (ssize_t) -1) {
7026 7027 7028
        virReportSystemError (dom->conn, errno,
                              _("failed to read temporary file "
                                "created with template %s"), tmp);
7029
        goto endjob;
R
Richard W.M. Jones 已提交
7030 7031 7032
    }

    ret = 0;
7033

7034
endjob:
7035 7036
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
7037

7038
cleanup:
7039
    VIR_FREE(tmp);
R
Richard W.M. Jones 已提交
7040 7041
    if (fd >= 0) close (fd);
    unlink (tmp);
7042 7043
    if (vm)
        virDomainObjUnlock(vm);
R
Richard W.M. Jones 已提交
7044 7045 7046
    return ret;
}

7047

7048 7049
static int
qemudDomainEventRegister (virConnectPtr conn,
7050
                          virConnectDomainEventCallback callback,
7051 7052
                          void *opaque,
                          virFreeCallback freecb)
7053
{
7054 7055 7056
    struct qemud_driver *driver = conn->privateData;
    int ret;

7057
    qemuDriverLock(driver);
7058 7059
    ret = virDomainEventCallbackListAdd(conn, driver->domainEventCallbacks,
                                        callback, opaque, freecb);
7060
    qemuDriverUnlock(driver);
7061

7062
    return ret;
7063 7064 7065 7066
}

static int
qemudDomainEventDeregister (virConnectPtr conn,
7067
                            virConnectDomainEventCallback callback)
7068
{
7069 7070 7071
    struct qemud_driver *driver = conn->privateData;
    int ret;

7072
    qemuDriverLock(driver);
7073 7074 7075 7076 7077 7078
    if (driver->domainEventDispatching)
        ret = virDomainEventCallbackListMarkDelete(conn, driver->domainEventCallbacks,
                                                   callback);
    else
        ret = virDomainEventCallbackListRemove(conn, driver->domainEventCallbacks,
                                               callback);
7079
    qemuDriverUnlock(driver);
7080

7081
    return ret;
7082 7083
}

7084 7085 7086 7087 7088
static void qemuDomainEventDispatchFunc(virConnectPtr conn,
                                        virDomainEventPtr event,
                                        virConnectDomainEventCallback cb,
                                        void *cbopaque,
                                        void *opaque)
7089
{
7090
    struct qemud_driver *driver = opaque;
7091

7092 7093 7094 7095 7096 7097 7098 7099 7100 7101 7102 7103 7104 7105 7106 7107 7108 7109 7110 7111 7112 7113 7114 7115 7116 7117 7118 7119 7120 7121 7122 7123 7124 7125 7126 7127 7128 7129 7130 7131 7132 7133 7134 7135
    /* Drop the lock whle dispatching, for sake of re-entrancy */
    qemuDriverUnlock(driver);
    virDomainEventDispatchDefaultFunc(conn, event, cb, cbopaque, NULL);
    qemuDriverLock(driver);
}

static void qemuDomainEventFlush(int timer ATTRIBUTE_UNUSED, void *opaque)
{
    struct qemud_driver *driver = opaque;
    virDomainEventQueue tempQueue;

    qemuDriverLock(driver);

    driver->domainEventDispatching = 1;

    /* Copy the queue, so we're reentrant safe */
    tempQueue.count = driver->domainEventQueue->count;
    tempQueue.events = driver->domainEventQueue->events;
    driver->domainEventQueue->count = 0;
    driver->domainEventQueue->events = NULL;

    virEventUpdateTimeout(driver->domainEventTimer, -1);
    virDomainEventQueueDispatch(&tempQueue,
                                driver->domainEventCallbacks,
                                qemuDomainEventDispatchFunc,
                                driver);

    /* Purge any deleted callbacks */
    virDomainEventCallbackListPurgeMarked(driver->domainEventCallbacks);

    driver->domainEventDispatching = 0;
    qemuDriverUnlock(driver);
}


/* driver must be locked before calling */
static void qemuDomainEventQueue(struct qemud_driver *driver,
                                 virDomainEventPtr event)
{
    if (virDomainEventQueuePush(driver->domainEventQueue,
                                event) < 0)
        virDomainEventFree(event);
    if (qemu_driver->domainEventQueue->count == 1)
        virEventUpdateTimeout(driver->domainEventTimer, 0);
7136 7137
}

D
Daniel Veillard 已提交
7138 7139
/* Migration support. */

C
Chris Lalancette 已提交
7140 7141 7142 7143 7144 7145 7146 7147 7148 7149 7150 7151 7152 7153 7154 7155 7156 7157 7158 7159 7160 7161 7162 7163 7164 7165 7166 7167 7168 7169 7170 7171 7172 7173 7174 7175 7176 7177 7178 7179 7180 7181 7182 7183 7184 7185 7186 7187 7188 7189 7190 7191 7192 7193 7194 7195 7196 7197 7198 7199 7200 7201 7202 7203 7204 7205 7206 7207 7208 7209 7210 7211 7212 7213 7214 7215 7216 7217 7218 7219 7220 7221 7222 7223 7224 7225 7226 7227 7228 7229 7230 7231 7232 7233 7234 7235 7236 7237 7238 7239 7240 7241 7242 7243 7244 7245 7246 7247 7248 7249 7250 7251 7252 7253 7254 7255 7256 7257 7258 7259 7260 7261 7262 7263 7264 7265 7266 7267 7268 7269 7270 7271 7272 7273 7274 7275 7276 7277 7278 7279 7280 7281 7282 7283 7284 7285 7286 7287 7288 7289 7290 7291 7292 7293 7294 7295 7296 7297 7298 7299 7300 7301 7302 7303 7304 7305 7306 7307 7308 7309 7310 7311 7312
/* Tunnelled migration stream support */
struct qemuStreamMigFile {
    int fd;

    int watch;
    unsigned int cbRemoved;
    unsigned int dispatching;
    virStreamEventCallback cb;
    void *opaque;
    virFreeCallback ff;
};

static int qemuStreamMigRemoveCallback(virStreamPtr stream)
{
    struct qemud_driver *driver = stream->conn->privateData;
    struct qemuStreamMigFile *qemust = stream->privateData;
    int ret = -1;

    if (!qemust) {
        qemudReportError(stream->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream is not open"));
        return -1;
    }

    qemuDriverLock(driver);
    if (qemust->watch == 0) {
        qemudReportError(stream->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream does not have a callback registered"));
        goto cleanup;
    }

    virEventRemoveHandle(qemust->watch);
    if (qemust->dispatching)
        qemust->cbRemoved = 1;
    else if (qemust->ff)
        (qemust->ff)(qemust->opaque);

    qemust->watch = 0;
    qemust->ff = NULL;
    qemust->cb = NULL;
    qemust->opaque = NULL;

    ret = 0;

cleanup:
    qemuDriverUnlock(driver);
    return ret;
}

static int qemuStreamMigUpdateCallback(virStreamPtr stream, int events)
{
    struct qemud_driver *driver = stream->conn->privateData;
    struct qemuStreamMigFile *qemust = stream->privateData;
    int ret = -1;

    if (!qemust) {
        qemudReportError(stream->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream is not open"));
        return -1;
    }

    qemuDriverLock(driver);
    if (qemust->watch == 0) {
        qemudReportError(stream->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream does not have a callback registered"));
        goto cleanup;
    }

    virEventUpdateHandle(qemust->watch, events);

    ret = 0;

cleanup:
    qemuDriverUnlock(driver);
    return ret;
}

static void qemuStreamMigEvent(int watch ATTRIBUTE_UNUSED,
                               int fd ATTRIBUTE_UNUSED,
                               int events,
                               void *opaque)
{
    virStreamPtr stream = opaque;
    struct qemud_driver *driver = stream->conn->privateData;
    struct qemuStreamMigFile *qemust = stream->privateData;
    virStreamEventCallback cb;
    void *cbopaque;
    virFreeCallback ff;

    qemuDriverLock(driver);
    if (!qemust || !qemust->cb) {
        qemuDriverUnlock(driver);
        return;
    }

    cb = qemust->cb;
    cbopaque = qemust->opaque;
    ff = qemust->ff;
    qemust->dispatching = 1;
    qemuDriverUnlock(driver);

    cb(stream, events, cbopaque);

    qemuDriverLock(driver);
    qemust->dispatching = 0;
    if (qemust->cbRemoved && ff)
        (ff)(cbopaque);
    qemuDriverUnlock(driver);
}

static int
qemuStreamMigAddCallback(virStreamPtr st,
                         int events,
                         virStreamEventCallback cb,
                         void *opaque,
                         virFreeCallback ff)
{
    struct qemud_driver *driver = st->conn->privateData;
    struct qemuStreamMigFile *qemust = st->privateData;
    int ret = -1;

    if (!qemust) {
        qemudReportError(st->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream is not open"));
        return -1;
    }

    qemuDriverLock(driver);
    if (qemust->watch != 0) {
        qemudReportError(st->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream already has a callback registered"));
        goto cleanup;
    }

    if ((qemust->watch = virEventAddHandle(qemust->fd,
                                           events,
                                           qemuStreamMigEvent,
                                           st,
                                           NULL)) < 0) {
        qemudReportError(st->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("cannot register file watch on stream"));
        goto cleanup;
    }

    qemust->cbRemoved = 0;
    qemust->cb = cb;
    qemust->opaque = opaque;
    qemust->ff = ff;
    virStreamRef(st);

    ret = 0;

cleanup:
    qemuDriverUnlock(driver);
    return ret;
}

static void qemuStreamMigFree(struct qemuStreamMigFile *qemust)
{
    if (qemust->fd != -1)
        close(qemust->fd);
    VIR_FREE(qemust);
}

static struct qemuStreamMigFile *qemuStreamMigOpen(virStreamPtr st,
                                                   const char *unixfile)
{
    struct qemuStreamMigFile *qemust = NULL;
    struct sockaddr_un sa_qemu;
    int i = 0;
    int timeout = 3;
    int ret;

7313 7314
    if (VIR_ALLOC(qemust) < 0) {
        virReportOOMError(st->conn);
C
Chris Lalancette 已提交
7315
        return NULL;
7316
    }
C
Chris Lalancette 已提交
7317 7318 7319 7320 7321 7322 7323 7324 7325 7326 7327 7328 7329 7330 7331 7332 7333 7334 7335 7336 7337 7338 7339 7340 7341 7342 7343 7344 7345 7346 7347 7348 7349 7350 7351 7352 7353 7354 7355 7356 7357 7358 7359 7360 7361 7362 7363 7364 7365 7366 7367 7368 7369 7370 7371 7372 7373 7374 7375 7376 7377 7378 7379 7380 7381 7382 7383 7384 7385 7386 7387 7388 7389 7390 7391 7392 7393 7394 7395 7396 7397 7398 7399 7400 7401 7402 7403 7404 7405 7406 7407 7408 7409 7410 7411 7412 7413 7414 7415 7416 7417 7418 7419 7420 7421 7422 7423 7424 7425 7426 7427 7428 7429 7430 7431 7432 7433 7434 7435 7436 7437 7438 7439 7440 7441 7442 7443 7444 7445 7446 7447 7448 7449 7450 7451 7452 7453 7454 7455 7456 7457 7458 7459 7460 7461 7462 7463

    qemust->fd = socket(AF_UNIX, SOCK_STREAM, 0);
    if (qemust->fd < 0)
        goto cleanup;

    memset(&sa_qemu, 0, sizeof(sa_qemu));
    sa_qemu.sun_family = AF_UNIX;
    if (virStrcpy(sa_qemu.sun_path, unixfile, sizeof(sa_qemu.sun_path)) == NULL)
        goto cleanup;

    do {
        ret = connect(qemust->fd, (struct sockaddr *)&sa_qemu, sizeof(sa_qemu));
        if (ret == 0)
            break;

        if (errno == ENOENT || errno == ECONNREFUSED) {
            /* ENOENT       : Socket may not have shown up yet
             * ECONNREFUSED : Leftover socket hasn't been removed yet */
            continue;
        }

        goto cleanup;
    } while ((++i <= timeout*5) && (usleep(.2 * 1000000) <= 0));

    if ((st->flags & VIR_STREAM_NONBLOCK) && virSetNonBlock(qemust->fd) < 0)
        goto cleanup;

    return qemust;

cleanup:
    qemuStreamMigFree(qemust);
    return NULL;
}

static int
qemuStreamMigClose(virStreamPtr st)
{
    struct qemud_driver *driver = st->conn->privateData;
    struct qemuStreamMigFile *qemust = st->privateData;

    if (!qemust)
        return 0;

    qemuDriverLock(driver);

    qemuStreamMigFree(qemust);

    st->privateData = NULL;

    qemuDriverUnlock(driver);

    return 0;
}

static int qemuStreamMigWrite(virStreamPtr st, const char *bytes, size_t nbytes)
{
    struct qemud_driver *driver = st->conn->privateData;
    struct qemuStreamMigFile *qemust = st->privateData;
    int ret;

    if (!qemust) {
        qemudReportError(st->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream is not open"));
        return -1;
    }

    qemuDriverLock(driver);

retry:
    ret = write(qemust->fd, bytes, nbytes);
    if (ret < 0) {
        if (errno == EAGAIN || errno == EWOULDBLOCK) {
            ret = -2;
        } else if (errno == EINTR) {
            goto retry;
        } else {
            ret = -1;
            virReportSystemError(st->conn, errno, "%s",
                                 _("cannot write to stream"));
        }
    }

    qemuDriverUnlock(driver);
    return ret;
}

static virStreamDriver qemuStreamMigDrv = {
    .streamSend = qemuStreamMigWrite,
    .streamFinish = qemuStreamMigClose,
    .streamAbort = qemuStreamMigClose,
    .streamAddCallback = qemuStreamMigAddCallback,
    .streamUpdateCallback = qemuStreamMigUpdateCallback,
    .streamRemoveCallback = qemuStreamMigRemoveCallback
};

/* Prepare is the first step, and it runs on the destination host.
 *
 * This version starts an empty VM listening on a localhost TCP port, and
 * sets up the corresponding virStream to handle the incoming data.
 */
static int
qemudDomainMigratePrepareTunnel(virConnectPtr dconn,
                                virStreamPtr st,
                                unsigned long flags,
                                const char *dname,
                                unsigned long resource ATTRIBUTE_UNUSED,
                                const char *dom_xml)
{
    struct qemud_driver *driver = dconn->privateData;
    virDomainDefPtr def = NULL;
    virDomainObjPtr vm = NULL;
    char *migrateFrom;
    virDomainEventPtr event = NULL;
    int ret = -1;
    int internalret;
    char *unixfile = NULL;
    unsigned int qemuCmdFlags;
    struct qemuStreamMigFile *qemust = NULL;

    qemuDriverLock(driver);
    if (!dom_xml) {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("no domain XML passed"));
        goto cleanup;
    }
    if (!(flags & VIR_MIGRATE_TUNNELLED)) {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("PrepareTunnel called but no TUNNELLED flag set"));
        goto cleanup;
    }
    if (st == NULL) {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("tunnelled migration requested but NULL stream passed"));
        goto cleanup;
    }

    /* Parse the domain XML. */
    if (!(def = virDomainDefParseString(dconn, driver->caps, dom_xml,
                                        VIR_DOMAIN_XML_INACTIVE))) {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("failed to parse XML"));
        goto cleanup;
    }

    /* Target domain name, maybe renamed. */
    dname = dname ? dname : def->name;

7464 7465
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
C
Chris Lalancette 已提交
7466 7467

    if (!(vm = virDomainAssignDef(dconn,
7468
                                  driver->caps,
C
Chris Lalancette 已提交
7469 7470 7471 7472 7473 7474 7475 7476
                                  &driver->domains,
                                  def))) {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("failed to assign new VM"));
        goto cleanup;
    }
    def = NULL;

7477 7478 7479
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

C
Chris Lalancette 已提交
7480 7481 7482 7483 7484 7485
    /* Domain starts inactive, even if the domain XML had an id field. */
    vm->def->id = -1;

    if (virAsprintf(&unixfile, "%s/qemu.tunnelmigrate.dest.%s",
                    driver->stateDir, vm->def->name) < 0) {
        virReportOOMError (dconn);
7486
        goto endjob;
C
Chris Lalancette 已提交
7487 7488 7489 7490 7491 7492 7493 7494
    }
    unlink(unixfile);

    /* check that this qemu version supports the interactive exec */
    if (qemudExtractVersionInfo(vm->def->emulator, NULL, &qemuCmdFlags) < 0) {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("Cannot determine QEMU argv syntax %s"),
                         vm->def->emulator);
7495
        goto endjob;
C
Chris Lalancette 已提交
7496 7497 7498 7499 7500 7501 7502 7503
    }
    if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_UNIX)
        internalret = virAsprintf(&migrateFrom, "unix:%s", unixfile);
    else if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_EXEC)
        internalret = virAsprintf(&migrateFrom, "exec:nc -U -l %s", unixfile);
    else {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("Destination qemu is too old to support tunnelled migration"));
7504
        goto endjob;
C
Chris Lalancette 已提交
7505 7506 7507
    }
    if (internalret < 0) {
        virReportOOMError(dconn);
7508
        goto endjob;
C
Chris Lalancette 已提交
7509 7510 7511 7512 7513 7514 7515 7516 7517 7518 7519 7520 7521 7522
    }
    /* Start the QEMU daemon, with the same command-line arguments plus
     * -incoming unix:/path/to/file or exec:nc -U /path/to/file
     */
    internalret = qemudStartVMDaemon(dconn, driver, vm, migrateFrom, -1);
    VIR_FREE(migrateFrom);
    if (internalret < 0) {
        /* Note that we don't set an error here because qemudStartVMDaemon
         * should have already done that.
         */
        if (!vm->persistent) {
            virDomainRemoveInactive(&driver->domains, vm);
            vm = NULL;
        }
7523
        goto endjob;
C
Chris Lalancette 已提交
7524 7525 7526 7527 7528
    }

    qemust = qemuStreamMigOpen(st, unixfile);
    if (qemust == NULL) {
        qemudShutdownVMDaemon(NULL, driver, vm);
7529
        if (!vm->persistent) {
7530 7531
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains, vm);
7532 7533
            vm = NULL;
        }
C
Chris Lalancette 已提交
7534 7535 7536
        virReportSystemError(dconn, errno,
                             _("cannot open unix socket '%s' for tunnelled migration"),
                             unixfile);
7537
        goto endjob;
C
Chris Lalancette 已提交
7538 7539 7540 7541 7542 7543 7544 7545 7546 7547
    }

    st->driver = &qemuStreamMigDrv;
    st->privateData = qemust;

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_MIGRATED);
    ret = 0;

7548
endjob:
7549 7550 7551
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
7552

C
Chris Lalancette 已提交
7553 7554
cleanup:
    virDomainDefFree(def);
7555 7556
    if (unixfile)
        unlink(unixfile);
C
Chris Lalancette 已提交
7557 7558 7559 7560 7561 7562 7563 7564 7565
    VIR_FREE(unixfile);
    if (vm)
        virDomainObjUnlock(vm);
    if (event)
        qemuDomainEventQueue(driver, event);
    qemuDriverUnlock(driver);
    return ret;
}

D
Daniel Veillard 已提交
7566 7567 7568 7569
/* Prepare is the first step, and it runs on the destination host.
 *
 * This starts an empty VM listening on a TCP port.
 */
7570
static int ATTRIBUTE_NONNULL (5)
D
Daniel Veillard 已提交
7571 7572 7573 7574 7575
qemudDomainMigratePrepare2 (virConnectPtr dconn,
                            char **cookie ATTRIBUTE_UNUSED,
                            int *cookielen ATTRIBUTE_UNUSED,
                            const char *uri_in,
                            char **uri_out,
C
Chris Lalancette 已提交
7576
                            unsigned long flags,
D
Daniel Veillard 已提交
7577 7578 7579 7580 7581
                            const char *dname,
                            unsigned long resource ATTRIBUTE_UNUSED,
                            const char *dom_xml)
{
    static int port = 0;
7582 7583
    struct qemud_driver *driver = dconn->privateData;
    virDomainDefPtr def = NULL;
D
Daniel Veillard 已提交
7584 7585
    virDomainObjPtr vm = NULL;
    int this_port;
7586
    char *hostname;
D
Daniel Veillard 已提交
7587 7588
    char migrateFrom [64];
    const char *p;
7589
    virDomainEventPtr event = NULL;
7590
    int ret = -1;
7591
    int internalret;
7592 7593

    *uri_out = NULL;
D
Daniel Veillard 已提交
7594

7595
    qemuDriverLock(driver);
C
Chris Lalancette 已提交
7596 7597 7598 7599 7600 7601 7602 7603 7604
    if (flags & VIR_MIGRATE_TUNNELLED) {
        /* this is a logical error; we never should have gotten here with
         * VIR_MIGRATE_TUNNELLED set
         */
        qemudReportError(dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("Tunnelled migration requested but invalid RPC method called"));
        goto cleanup;
    }

D
Daniel Veillard 已提交
7605 7606 7607
    if (!dom_xml) {
        qemudReportError (dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                          "%s", _("no domain XML passed"));
7608
        goto cleanup;
D
Daniel Veillard 已提交
7609 7610 7611 7612 7613 7614 7615 7616 7617 7618 7619 7620 7621 7622 7623 7624 7625
    }

    /* The URI passed in may be NULL or a string "tcp://somehostname:port".
     *
     * If the URI passed in is NULL then we allocate a port number
     * from our pool of port numbers and return a URI of
     * "tcp://ourhostname:port".
     *
     * If the URI passed in is not NULL then we try to parse out the
     * port number and use that (note that the hostname is assumed
     * to be a correct hostname which refers to the target machine).
     */
    if (uri_in == NULL) {
        this_port = QEMUD_MIGRATION_FIRST_PORT + port++;
        if (port == QEMUD_MIGRATION_NUM_PORTS) port = 0;

        /* Get hostname */
7626
        if ((hostname = virGetHostname(dconn)) == NULL)
7627
            goto cleanup;
D
Daniel Veillard 已提交
7628

7629 7630 7631 7632 7633
        /* XXX this really should have been a properly well-formed
         * URI, but we can't add in tcp:// now without breaking
         * compatability with old targets. We at least make the
         * new targets accept both syntaxes though.
         */
D
Daniel Veillard 已提交
7634
        /* Caller frees */
7635 7636 7637
        internalret = virAsprintf(uri_out, "tcp:%s:%d", hostname, this_port);
        VIR_FREE(hostname);
        if (internalret < 0) {
7638
            virReportOOMError (dconn);
7639
            goto cleanup;
D
Daniel Veillard 已提交
7640 7641 7642 7643 7644 7645
        }
    } else {
        /* Check the URI starts with "tcp:".  We will escape the
         * URI when passing it to the qemu monitor, so bad
         * characters in hostname part don't matter.
         */
7646
        if (!STRPREFIX (uri_in, "tcp:")) {
D
Daniel Veillard 已提交
7647
            qemudReportError (dconn, NULL, NULL, VIR_ERR_INVALID_ARG,
7648
                  "%s", _("only tcp URIs are supported for KVM/QEMU migrations"));
7649
            goto cleanup;
D
Daniel Veillard 已提交
7650 7651 7652 7653
        }

        /* Get the port number. */
        p = strrchr (uri_in, ':');
7654 7655 7656 7657 7658 7659 7660 7661 7662 7663 7664 7665 7666 7667 7668 7669 7670 7671 7672 7673
        if (p == strchr(uri_in, ':')) {
            /* Generate a port */
            this_port = QEMUD_MIGRATION_FIRST_PORT + port++;
            if (port == QEMUD_MIGRATION_NUM_PORTS)
                port = 0;

            /* Caller frees */
            if (virAsprintf(uri_out, "%s:%d", uri_in, this_port) < 0) {
                virReportOOMError (dconn);
                goto cleanup;
            }

        } else {
            p++; /* definitely has a ':' in it, see above */
            this_port = virParseNumber (&p);
            if (this_port == -1 || p-uri_in != strlen (uri_in)) {
                qemudReportError (dconn, NULL, NULL, VIR_ERR_INVALID_ARG,
                                  "%s", _("URI ended with incorrect ':port'"));
                goto cleanup;
            }
D
Daniel Veillard 已提交
7674 7675 7676
        }
    }

7677
    if (*uri_out)
7678 7679
        VIR_DEBUG("Generated uri_out=%s", *uri_out);

D
Daniel Veillard 已提交
7680
    /* Parse the domain XML. */
7681 7682
    if (!(def = virDomainDefParseString(dconn, driver->caps, dom_xml,
                                        VIR_DOMAIN_XML_INACTIVE))) {
D
Daniel Veillard 已提交
7683 7684
        qemudReportError (dconn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                          "%s", _("failed to parse XML"));
7685
        goto cleanup;
D
Daniel Veillard 已提交
7686 7687 7688 7689 7690
    }

    /* Target domain name, maybe renamed. */
    dname = dname ? dname : def->name;

7691 7692
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
D
Daniel Veillard 已提交
7693 7694

    if (!(vm = virDomainAssignDef(dconn,
7695
                                  driver->caps,
D
Daniel Veillard 已提交
7696 7697 7698 7699
                                  &driver->domains,
                                  def))) {
        qemudReportError (dconn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                          "%s", _("failed to assign new VM"));
7700
        goto cleanup;
D
Daniel Veillard 已提交
7701
    }
7702
    def = NULL;
D
Daniel Veillard 已提交
7703

7704 7705 7706
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel Veillard 已提交
7707 7708 7709 7710 7711 7712 7713
    /* Domain starts inactive, even if the domain XML had an id field. */
    vm->def->id = -1;

    /* Start the QEMU daemon, with the same command-line arguments plus
     * -incoming tcp:0.0.0.0:port
     */
    snprintf (migrateFrom, sizeof (migrateFrom), "tcp:0.0.0.0:%d", this_port);
7714
    if (qemudStartVMDaemon (dconn, driver, vm, migrateFrom, -1) < 0) {
7715 7716 7717
        /* Note that we don't set an error here because qemudStartVMDaemon
         * should have already done that.
         */
7718
        if (!vm->persistent) {
7719 7720
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains, vm);
7721 7722
            vm = NULL;
        }
7723
        goto endjob;
D
Daniel Veillard 已提交
7724
    }
7725 7726 7727 7728

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_MIGRATED);
7729
    ret = 0;
D
Daniel Veillard 已提交
7730

7731
endjob:
7732 7733 7734
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
7735

7736 7737 7738 7739 7740
cleanup:
    virDomainDefFree(def);
    if (ret != 0) {
        VIR_FREE(*uri_out);
    }
7741 7742
    if (vm)
        virDomainObjUnlock(vm);
7743 7744
    if (event)
        qemuDomainEventQueue(driver, event);
7745
    qemuDriverUnlock(driver);
7746
    return ret;
C
Chris Lalancette 已提交
7747 7748 7749

}

7750 7751 7752 7753 7754

/* Perform migration using QEMU's native TCP migrate support,
 * not encrypted obviously
 */
static int doNativeMigrate(virDomainPtr dom,
7755
                           struct qemud_driver *driver,
7756 7757 7758 7759 7760 7761 7762
                           virDomainObjPtr vm,
                           const char *uri,
                           unsigned long flags ATTRIBUTE_UNUSED,
                           const char *dname ATTRIBUTE_UNUSED,
                           unsigned long resource)
{
    int ret = -1;
7763
    xmlURIPtr uribits = NULL;
7764 7765
    int status;
    unsigned long long transferred, remaining, total;
7766
    qemuDomainObjPrivatePtr priv = vm->privateData;
7767 7768 7769 7770 7771 7772 7773 7774 7775 7776 7777 7778 7779 7780 7781 7782 7783 7784 7785 7786

    /* Issue the migrate command. */
    if (STRPREFIX(uri, "tcp:") && !STRPREFIX(uri, "tcp://")) {
        /* HACK: source host generates bogus URIs, so fix them up */
        char *tmpuri;
        if (virAsprintf(&tmpuri, "tcp://%s", uri + strlen("tcp:")) < 0) {
            virReportOOMError(dom->conn);
            goto cleanup;
        }
        uribits = xmlParseURI(tmpuri);
        VIR_FREE(tmpuri);
    } else {
        uribits = xmlParseURI(uri);
    }
    if (!uribits) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("cannot parse URI %s"), uri);
        goto cleanup;
    }

7787
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
7788
    if (resource > 0 &&
7789
        qemuMonitorSetMigrationSpeed(priv->mon, resource) < 0) {
7790
        qemuDomainObjExitMonitorWithDriver(driver, vm);
7791
        goto cleanup;
7792
    }
7793

7794
    if (qemuMonitorMigrateToHost(priv->mon, 0, uribits->server, uribits->port) < 0) {
7795
        qemuDomainObjExitMonitorWithDriver(driver, vm);
7796
        goto cleanup;
7797
    }
7798 7799 7800 7801

    /* it is also possible that the migrate didn't fail initially, but
     * rather failed later on.  Check the output of "info migrate"
     */
7802 7803
    if (qemuMonitorGetMigrationStatus(priv->mon,
                                      &status,
7804 7805 7806
                                      &transferred,
                                      &remaining,
                                      &total) < 0) {
7807
        qemuDomainObjExitMonitorWithDriver(driver, vm);
7808 7809
        goto cleanup;
    }
7810
    qemuDomainObjExitMonitorWithDriver(driver, vm);
7811 7812 7813 7814 7815 7816 7817 7818 7819 7820 7821 7822 7823 7824 7825

    if (status != QEMU_MONITOR_MIGRATION_STATUS_COMPLETED) {
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                          "%s", _("migrate did not successfully complete"));
        goto cleanup;
    }

    ret = 0;

cleanup:
    xmlFreeURI(uribits);
    return ret;
}


7826 7827 7828 7829 7830 7831 7832 7833 7834 7835 7836 7837 7838 7839 7840 7841 7842 7843 7844 7845 7846
static int doTunnelSendAll(virDomainPtr dom,
                           virStreamPtr st,
                           int sock)
{
    char buffer[65536];
    int nbytes = sizeof(buffer);

    /* XXX should honour the 'resource' parameter here */
    for (;;) {
        nbytes = saferead(sock, buffer, nbytes);
        if (nbytes < 0) {
            virStreamAbort(st);
            virReportSystemError(dom->conn, errno, "%s",
                                 _("tunnelled migration failed to read from qemu"));
            return -1;
        }
        else if (nbytes == 0)
            /* EOF; get out of here */
            break;

        if (virStreamSend(st, buffer, nbytes) < 0) {
C
Chris Lalancette 已提交
7847
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED, "%s",
7848 7849 7850 7851 7852 7853 7854 7855 7856 7857 7858 7859
                             _("Failed to write migration data to remote libvirtd"));
            return -1;
        }
    }

    if (virStreamFinish(st) < 0)
        /* virStreamFinish set the error for us */
        return -1;

    return 0;
}

C
Chris Lalancette 已提交
7860
static int doTunnelMigrate(virDomainPtr dom,
7861
                           struct qemud_driver *driver,
7862
                           virConnectPtr dconn,
C
Chris Lalancette 已提交
7863
                           virDomainObjPtr vm,
7864
                           const char *dom_xml,
C
Chris Lalancette 已提交
7865 7866 7867 7868 7869
                           const char *uri,
                           unsigned long flags,
                           const char *dname,
                           unsigned long resource)
{
7870
    qemuDomainObjPrivatePtr priv = vm->privateData;
7871 7872
    int client_sock = -1;
    int qemu_sock = -1;
C
Chris Lalancette 已提交
7873 7874
    struct sockaddr_un sa_qemu, sa_client;
    socklen_t addrlen;
7875
    virDomainPtr ddomain = NULL;
C
Chris Lalancette 已提交
7876
    int retval = -1;
7877
    virStreamPtr st = NULL;
C
Chris Lalancette 已提交
7878 7879 7880 7881 7882 7883
    char *unixfile = NULL;
    int internalret;
    unsigned int qemuCmdFlags;
    int status;
    unsigned long long transferred, remaining, total;

7884 7885 7886 7887 7888 7889 7890 7891
    /*
     * The order of operations is important here to avoid touching
     * the source VM until we are very sure we can successfully
     * start the migration operation.
     *
     *   1. setup local support infrastructure (eg sockets)
     *   2. setup destination fully
     *   3. start migration on source
C
Chris Lalancette 已提交
7892 7893
     */

7894

7895
    /* Stage 1. setup local support infrastructure */
C
Chris Lalancette 已提交
7896 7897 7898 7899

    if (virAsprintf(&unixfile, "%s/qemu.tunnelmigrate.src.%s",
                    driver->stateDir, vm->def->name) < 0) {
        virReportOOMError(dom->conn);
7900
        goto cleanup;
C
Chris Lalancette 已提交
7901 7902 7903 7904 7905 7906
    }

    qemu_sock = socket(AF_UNIX, SOCK_STREAM, 0);
    if (qemu_sock < 0) {
        virReportSystemError(dom->conn, errno, "%s",
                             _("cannot open tunnelled migration socket"));
7907
        goto cleanup;
C
Chris Lalancette 已提交
7908 7909 7910 7911 7912 7913 7914 7915
    }
    memset(&sa_qemu, 0, sizeof(sa_qemu));
    sa_qemu.sun_family = AF_UNIX;
    if (virStrcpy(sa_qemu.sun_path, unixfile,
                  sizeof(sa_qemu.sun_path)) == NULL) {
        qemudReportError(dom->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("Unix socket '%s' too big for destination"),
                         unixfile);
7916
        goto cleanup;
C
Chris Lalancette 已提交
7917 7918 7919 7920 7921 7922
    }
    unlink(unixfile);
    if (bind(qemu_sock, (struct sockaddr *)&sa_qemu, sizeof(sa_qemu)) < 0) {
        virReportSystemError(dom->conn, errno,
                             _("Cannot bind to unix socket '%s' for tunnelled migration"),
                             unixfile);
7923
        goto cleanup;
C
Chris Lalancette 已提交
7924 7925 7926 7927 7928
    }
    if (listen(qemu_sock, 1) < 0) {
        virReportSystemError(dom->conn, errno,
                             _("Cannot listen on unix socket '%s' for tunnelled migration"),
                             unixfile);
7929
        goto cleanup;
C
Chris Lalancette 已提交
7930 7931 7932 7933 7934 7935 7936
    }

    /* check that this qemu version supports the unix migration */
    if (qemudExtractVersionInfo(vm->def->emulator, NULL, &qemuCmdFlags) < 0) {
        qemudReportError(dom->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("Cannot extract Qemu version from '%s'"),
                         vm->def->emulator);
7937 7938 7939 7940 7941 7942 7943 7944
        goto cleanup;
    }

    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_UNIX) &&
        !(qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_EXEC)) {
        qemudReportError(dom->conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("Source qemu is too old to support tunnelled migration"));
        goto cleanup;
C
Chris Lalancette 已提交
7945
    }
7946 7947 7948 7949 7950 7951 7952 7953 7954 7955 7956 7957 7958 7959 7960 7961 7962 7963 7964 7965 7966


    /* Stage 2. setup destination fully
     *
     * Once stage 2 has completed successfully, we *must* call finish
     * to cleanup the target whether we succeed or fail
     */
    st = virStreamNew(dconn, 0);
    if (st == NULL)
        /* virStreamNew only fails on OOM, and it reports the error itself */
        goto cleanup;

    internalret = dconn->driver->domainMigratePrepareTunnel(dconn, st,
                                                            flags, dname,
                                                            resource, dom_xml);

    if (internalret < 0)
        /* domainMigratePrepareTunnel sets the error for us */
        goto cleanup;

    /*   3. start migration on source */
7967
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
C
Chris Lalancette 已提交
7968
    if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_UNIX)
7969
        internalret = qemuMonitorMigrateToUnix(priv->mon, 1, unixfile);
C
Chris Lalancette 已提交
7970 7971
    else if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_EXEC) {
        const char *args[] = { "nc", "-U", unixfile, NULL };
7972
        internalret = qemuMonitorMigrateToCommand(priv->mon, 1, args, "/dev/null");
7973 7974
    } else {
        internalret = -1;
C
Chris Lalancette 已提交
7975
    }
7976
    qemuDomainObjExitMonitorWithDriver(driver, vm);
C
Chris Lalancette 已提交
7977 7978 7979
    if (internalret < 0) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("tunnelled migration monitor command failed"));
7980
        goto finish;
C
Chris Lalancette 已提交
7981 7982
    }

7983 7984 7985
    /* From this point onwards we *must* call cancel to abort the
     * migration on source if anything goes wrong */

C
Chris Lalancette 已提交
7986 7987 7988
    /* it is also possible that the migrate didn't fail initially, but
     * rather failed later on.  Check the output of "info migrate"
     */
7989
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
7990 7991
    if (qemuMonitorGetMigrationStatus(priv->mon,
                                      &status,
C
Chris Lalancette 已提交
7992 7993 7994
                                      &transferred,
                                      &remaining,
                                      &total) < 0) {
7995
        qemuDomainObjExitMonitorWithDriver(driver, vm);
7996
        goto cancel;
C
Chris Lalancette 已提交
7997
    }
7998
    qemuDomainObjExitMonitorWithDriver(driver, vm);
C
Chris Lalancette 已提交
7999 8000 8001 8002

    if (status == QEMU_MONITOR_MIGRATION_STATUS_ERROR) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s",_("migrate failed"));
8003
        goto cancel;
C
Chris Lalancette 已提交
8004 8005 8006 8007 8008 8009 8010 8011
    }

    addrlen = sizeof(sa_client);
    while ((client_sock = accept(qemu_sock, (struct sockaddr *)&sa_client, &addrlen)) < 0) {
        if (errno == EAGAIN || errno == EINTR)
            continue;
        virReportSystemError(dom->conn, errno, "%s",
                             _("tunnelled migration failed to accept from qemu"));
8012
        goto cancel;
C
Chris Lalancette 已提交
8013 8014
    }

8015
    retval = doTunnelSendAll(dom, st, client_sock);
8016

8017
cancel:
8018
    if (retval != 0) {
8019
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
8020
        qemuMonitorMigrateCancel(priv->mon);
8021
        qemuDomainObjExitMonitorWithDriver(driver, vm);
8022
    }
C
Chris Lalancette 已提交
8023

8024
finish:
C
Chris Lalancette 已提交
8025 8026 8027
    dname = dname ? dname : dom->name;
    ddomain = dconn->driver->domainMigrateFinish2
        (dconn, dname, NULL, 0, uri, flags, retval);
8028 8029 8030 8031 8032 8033 8034

cleanup:
    if (client_sock != -1)
        close(client_sock);
    if (qemu_sock != -1)
        close(qemu_sock);

C
Chris Lalancette 已提交
8035 8036 8037
    if (ddomain)
        virUnrefDomain(ddomain);

8038 8039 8040 8041
    if (unixfile) {
        unlink(unixfile);
        VIR_FREE(unixfile);
    }
C
Chris Lalancette 已提交
8042

8043 8044 8045
    if (st)
        /* don't call virStreamFree(), because that resets any pending errors */
        virUnrefStream(st);
8046 8047 8048 8049
    return retval;
}


8050 8051 8052 8053
/* This is essentially a simplified re-impl of
 * virDomainMigrateVersion2 from libvirt.c, but running in source
 * libvirtd context, instead of client app context */
static int doNonTunnelMigrate(virDomainPtr dom,
8054
                              struct qemud_driver *driver,
8055 8056 8057 8058 8059 8060 8061 8062 8063 8064 8065 8066 8067 8068 8069 8070 8071 8072 8073 8074 8075 8076 8077 8078 8079
                              virConnectPtr dconn,
                              virDomainObjPtr vm,
                              const char *dom_xml,
                              const char *uri ATTRIBUTE_UNUSED,
                              unsigned long flags,
                              const char *dname,
                              unsigned long resource)
{
    virDomainPtr ddomain = NULL;
    int retval = -1;
    char *uri_out = NULL;

    /* NB we don't pass 'uri' into this, since that's the libvirtd
     * URI in this context - so we let dest pick it */
    if (dconn->driver->domainMigratePrepare2(dconn,
                                             NULL, /* cookie */
                                             0, /* cookielen */
                                             NULL, /* uri */
                                             &uri_out,
                                             flags, dname,
                                             resource, dom_xml) < 0)
        /* domainMigratePrepare2 sets the error for us */
        goto cleanup;

    if (uri_out == NULL) {
C
Chris Lalancette 已提交
8080
        qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR, "%s",
8081
                         _("domainMigratePrepare2 did not set uri"));
8082
        goto cleanup;
8083 8084
    }

8085
    if (doNativeMigrate(dom, driver, vm, uri_out, flags, dname, resource) < 0)
8086 8087 8088 8089 8090 8091 8092 8093 8094 8095 8096 8097 8098 8099 8100 8101 8102
        goto finish;

    retval = 0;

finish:
    dname = dname ? dname : dom->name;
    ddomain = dconn->driver->domainMigrateFinish2
        (dconn, dname, NULL, 0, uri_out, flags, retval);

    if (ddomain)
        virUnrefDomain(ddomain);

cleanup:
    return retval;
}


8103
static int doPeer2PeerMigrate(virDomainPtr dom,
8104
                              struct qemud_driver *driver,
8105 8106 8107 8108 8109 8110 8111 8112 8113 8114 8115 8116 8117 8118 8119 8120 8121 8122 8123 8124 8125
                              virDomainObjPtr vm,
                              const char *uri,
                              unsigned long flags,
                              const char *dname,
                              unsigned long resource)
{
    int ret = -1;
    virConnectPtr dconn = NULL;
    char *dom_xml;

    /* the order of operations is important here; we make sure the
     * destination side is completely setup before we touch the source
     */

    dconn = virConnectOpen(uri);
    if (dconn == NULL) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                         _("Failed to connect to remote libvirt URI %s"), uri);
        return -1;
    }
    if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
8126
                                  VIR_DRV_FEATURE_MIGRATION_P2P)) {
8127
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED, "%s",
8128
                         _("Destination libvirt does not support peer-to-peer migration protocol"));
8129 8130 8131 8132 8133 8134 8135 8136 8137 8138
        goto cleanup;
    }

    dom_xml = virDomainDefFormat(dom->conn, vm->def, VIR_DOMAIN_XML_SECURE);
    if (!dom_xml) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("failed to get domain xml"));
        goto cleanup;
    }

8139
    if (flags & VIR_MIGRATE_TUNNELLED)
8140
        ret = doTunnelMigrate(dom, driver, dconn, vm, dom_xml, uri, flags, dname, resource);
8141
    else
8142
        ret = doNonTunnelMigrate(dom, driver, dconn, vm, dom_xml, uri, flags, dname, resource);
8143 8144 8145

cleanup:
    VIR_FREE(dom_xml);
C
Chris Lalancette 已提交
8146 8147 8148
    /* don't call virConnectClose(), because that resets any pending errors */
    virUnrefConnect(dconn);

8149
    return ret;
D
Daniel Veillard 已提交
8150 8151
}

8152

D
Daniel Veillard 已提交
8153 8154 8155 8156 8157 8158
/* Perform is the second step, and it runs on the source host. */
static int
qemudDomainMigratePerform (virDomainPtr dom,
                           const char *cookie ATTRIBUTE_UNUSED,
                           int cookielen ATTRIBUTE_UNUSED,
                           const char *uri,
8159
                           unsigned long flags,
8160
                           const char *dname,
D
Daniel Veillard 已提交
8161 8162
                           unsigned long resource)
{
8163 8164
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
8165
    virDomainEventPtr event = NULL;
8166
    int ret = -1;
8167
    int paused = 0;
D
Daniel Veillard 已提交
8168

8169
    qemuDriverLock(driver);
8170
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
D
Daniel Veillard 已提交
8171
    if (!vm) {
8172 8173 8174 8175
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
8176
        goto cleanup;
D
Daniel Veillard 已提交
8177 8178
    }

8179 8180 8181
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
8182
    if (!virDomainObjIsActive(vm)) {
8183
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
D
Daniel Veillard 已提交
8184
                          "%s", _("domain is not running"));
8185
        goto endjob;
D
Daniel Veillard 已提交
8186 8187
    }

8188
    if (!(flags & VIR_MIGRATE_LIVE) && vm->state == VIR_DOMAIN_RUNNING) {
8189
        qemuDomainObjPrivatePtr priv = vm->privateData;
8190
        /* Pause domain for non-live migration */
8191
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
8192
        if (qemuMonitorStopCPUs(priv->mon) < 0) {
8193 8194
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            goto endjob;
8195
        }
8196
        qemuDomainObjExitMonitorWithDriver(driver, vm);
8197
        paused = 1;
8198

8199
        vm->state = VIR_DOMAIN_PAUSED;
8200 8201 8202 8203 8204 8205
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_SUSPENDED,
                                         VIR_DOMAIN_EVENT_SUSPENDED_MIGRATED);
        if (event)
            qemuDomainEventQueue(driver, event);
        event = NULL;
8206 8207
    }

8208
    if ((flags & (VIR_MIGRATE_TUNNELLED | VIR_MIGRATE_PEER2PEER))) {
8209
        if (doPeer2PeerMigrate(dom, driver, vm, uri, flags, dname, resource) < 0)
8210
            /* doPeer2PeerMigrate already set the error, so just get out */
8211
            goto endjob;
8212
    } else {
8213 8214
        if (doNativeMigrate(dom, driver, vm, uri, flags, dname, resource) < 0)
            goto endjob;
8215 8216
    }

D
Daniel Veillard 已提交
8217 8218
    /* Clean up the source domain. */
    qemudShutdownVMDaemon (dom->conn, driver, vm);
8219
    paused = 0;
8220 8221 8222 8223

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     VIR_DOMAIN_EVENT_STOPPED_MIGRATED);
C
Chris Lalancette 已提交
8224 8225
    if (!vm->persistent || (flags & VIR_MIGRATE_UNDEFINE_SOURCE)) {
        virDomainDeleteConfig(dom->conn, driver->configDir, driver->autostartDir, vm);
8226 8227
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains, vm);
8228 8229
        vm = NULL;
    }
8230
    ret = 0;
D
Daniel Veillard 已提交
8231

8232
endjob:
8233
    if (paused) {
8234
        qemuDomainObjPrivatePtr priv = vm->privateData;
8235
        /* we got here through some sort of failure; start the domain again */
8236
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
8237
        if (qemuMonitorStartCPUs(priv->mon, dom->conn) < 0) {
8238 8239 8240 8241
            /* Hm, we already know we are in error here.  We don't want to
             * overwrite the previous error, though, so we just throw something
             * to the logs and hope for the best
             */
8242
            VIR_ERROR(_("Failed to resume guest %s after failure"),
8243
                      vm->def->name);
8244
        }
8245
        qemuDomainObjExitMonitorWithDriver(driver, vm);
8246

8247
        vm->state = VIR_DOMAIN_RUNNING;
8248 8249 8250 8251
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_RESUMED,
                                         VIR_DOMAIN_EVENT_RESUMED_MIGRATED);
    }
8252 8253 8254
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
8255

8256
cleanup:
8257 8258
    if (vm)
        virDomainObjUnlock(vm);
8259 8260
    if (event)
        qemuDomainEventQueue(driver, event);
8261
    qemuDriverUnlock(driver);
8262
    return ret;
D
Daniel Veillard 已提交
8263 8264 8265 8266 8267 8268 8269 8270 8271
}

/* Finish is the third and final step, and it runs on the destination host. */
static virDomainPtr
qemudDomainMigrateFinish2 (virConnectPtr dconn,
                           const char *dname,
                           const char *cookie ATTRIBUTE_UNUSED,
                           int cookielen ATTRIBUTE_UNUSED,
                           const char *uri ATTRIBUTE_UNUSED,
C
Chris Lalancette 已提交
8272
                           unsigned long flags,
D
Daniel Veillard 已提交
8273 8274
                           int retcode)
{
8275 8276 8277
    struct qemud_driver *driver = dconn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;
8278
    virDomainEventPtr event = NULL;
8279
    virErrorPtr orig_err;
C
Chris Lalancette 已提交
8280
    int newVM = 1;
D
Daniel Veillard 已提交
8281

8282 8283 8284
    /* Migration failed. Save the current error so nothing squashes it */
    orig_err = virSaveLastError();

8285
    qemuDriverLock(driver);
8286
    vm = virDomainFindByName(&driver->domains, dname);
D
Daniel Veillard 已提交
8287
    if (!vm) {
8288 8289
        qemudReportError (dconn, NULL, NULL, VIR_ERR_NO_DOMAIN,
                          _("no domain with matching name '%s'"), dname);
8290
        goto cleanup;
D
Daniel Veillard 已提交
8291 8292
    }

8293 8294 8295
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel Veillard 已提交
8296 8297 8298 8299
    /* Did the migration go as planned?  If yes, return the domain
     * object, but if no, clean up the empty qemu process.
     */
    if (retcode == 0) {
C
Chris Lalancette 已提交
8300 8301 8302 8303 8304 8305 8306 8307 8308 8309 8310 8311 8312 8313 8314 8315
        if (flags & VIR_MIGRATE_PERSIST_DEST) {
            if (vm->persistent)
                newVM = 0;
            vm->persistent = 1;

            if (virDomainSaveConfig(dconn, driver->configDir, vm->def) < 0) {
                /* Hmpf.  Migration was successful, but making it persistent
                 * was not.  If we report successful, then when this domain
                 * shuts down, management tools are in for a surprise.  On the
                 * other hand, if we report failure, then the management tools
                 * might try to restart the domain on the source side, even
                 * though the domain is actually running on the destination.
                 * Return a NULL dom pointer, and hope that this is a rare
                 * situation and management tools are smart.
                 */
                vm = NULL;
8316
                goto endjob;
C
Chris Lalancette 已提交
8317 8318 8319 8320 8321 8322 8323 8324 8325
            }

            event = virDomainEventNewFromObj(vm,
                                             VIR_DOMAIN_EVENT_DEFINED,
                                             newVM ?
                                             VIR_DOMAIN_EVENT_DEFINED_ADDED :
                                             VIR_DOMAIN_EVENT_DEFINED_UPDATED);
            if (event)
                qemuDomainEventQueue(driver, event);
8326
            event = NULL;
C
Chris Lalancette 已提交
8327 8328

        }
8329
        qemuDomainObjPrivatePtr priv = vm->privateData;
D
Daniel Veillard 已提交
8330
        dom = virGetDomain (dconn, vm->def->name, vm->def->uuid);
8331

8332 8333 8334 8335 8336 8337 8338 8339 8340 8341 8342 8343 8344
        if (!(flags & VIR_MIGRATE_PAUSED)) {
            /* run 'cont' on the destination, which allows migration on qemu
             * >= 0.10.6 to work properly.  This isn't strictly necessary on
             * older qemu's, but it also doesn't hurt anything there
             */
            qemuDomainObjEnterMonitorWithDriver(driver, vm);
            if (qemuMonitorStartCPUs(priv->mon, dconn) < 0) {
                if (virGetLastError() == NULL)
                    qemudReportError(dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                     "%s", _("resume operation failed"));
                qemuDomainObjExitMonitorWithDriver(driver, vm);
                goto endjob;
            }
8345
            qemuDomainObjExitMonitorWithDriver(driver, vm);
8346 8347

            vm->state = VIR_DOMAIN_RUNNING;
8348 8349
        }

8350 8351 8352
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_RESUMED,
                                         VIR_DOMAIN_EVENT_RESUMED_MIGRATED);
8353 8354 8355 8356 8357 8358
        if (vm->state == VIR_DOMAIN_PAUSED) {
            qemuDomainEventQueue(driver, event);
            event = virDomainEventNewFromObj(vm,
                                             VIR_DOMAIN_EVENT_SUSPENDED,
                                             VIR_DOMAIN_EVENT_SUSPENDED_PAUSED);
        }
8359
        virDomainSaveStatus(dconn, driver->caps, driver->stateDir, vm);
D
Daniel Veillard 已提交
8360 8361
    } else {
        qemudShutdownVMDaemon (dconn, driver, vm);
8362 8363 8364
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STOPPED,
                                         VIR_DOMAIN_EVENT_STOPPED_FAILED);
8365
        if (!vm->persistent) {
8366 8367
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains, vm);
8368 8369
            vm = NULL;
        }
D
Daniel Veillard 已提交
8370
    }
8371

8372
endjob:
8373 8374 8375
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
8376

8377
cleanup:
8378 8379 8380 8381
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
8382 8383
    if (vm)
        virDomainObjUnlock(vm);
8384 8385
    if (event)
        qemuDomainEventQueue(driver, event);
8386
    qemuDriverUnlock(driver);
8387
    return dom;
D
Daniel Veillard 已提交
8388 8389
}

8390 8391 8392 8393 8394 8395 8396 8397 8398 8399 8400 8401 8402 8403 8404 8405
static int
qemudNodeDeviceGetPciInfo (virNodeDevicePtr dev,
                           unsigned *domain,
                           unsigned *bus,
                           unsigned *slot,
                           unsigned *function)
{
    virNodeDeviceDefPtr def = NULL;
    virNodeDevCapsDefPtr cap;
    char *xml = NULL;
    int ret = -1;

    xml = virNodeDeviceGetXMLDesc(dev, 0);
    if (!xml)
        goto out;

8406
    def = virNodeDeviceDefParseString(dev->conn, xml, EXISTING_DEVICE);
8407 8408 8409 8410 8411 8412 8413 8414 8415 8416 8417 8418 8419 8420 8421 8422 8423 8424 8425 8426 8427 8428 8429 8430 8431 8432 8433 8434 8435 8436 8437 8438 8439 8440 8441 8442 8443 8444 8445 8446 8447 8448 8449 8450 8451 8452 8453 8454 8455 8456 8457 8458 8459 8460 8461 8462 8463 8464 8465 8466 8467 8468 8469 8470 8471 8472 8473 8474 8475 8476 8477 8478 8479 8480 8481 8482 8483 8484
    if (!def)
        goto out;

    cap = def->caps;
    while (cap) {
        if (cap->type == VIR_NODE_DEV_CAP_PCI_DEV) {
            *domain   = cap->data.pci_dev.domain;
            *bus      = cap->data.pci_dev.bus;
            *slot     = cap->data.pci_dev.slot;
            *function = cap->data.pci_dev.function;
            break;
        }

        cap = cap->next;
    }

    if (!cap) {
        qemudReportError(dev->conn, NULL, NULL, VIR_ERR_INVALID_ARG,
                         _("device %s is not a PCI device"), dev->name);
        goto out;
    }

    ret = 0;
out:
    virNodeDeviceDefFree(def);
    VIR_FREE(xml);
    return ret;
}

static int
qemudNodeDeviceDettach (virNodeDevicePtr dev)
{
    pciDevice *pci;
    unsigned domain, bus, slot, function;
    int ret = -1;

    if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0)
        return -1;

    pci = pciGetDevice(dev->conn, domain, bus, slot, function);
    if (!pci)
        return -1;

    if (pciDettachDevice(dev->conn, pci) < 0)
        goto out;

    ret = 0;
out:
    pciFreeDevice(dev->conn, pci);
    return ret;
}

static int
qemudNodeDeviceReAttach (virNodeDevicePtr dev)
{
    pciDevice *pci;
    unsigned domain, bus, slot, function;
    int ret = -1;

    if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0)
        return -1;

    pci = pciGetDevice(dev->conn, domain, bus, slot, function);
    if (!pci)
        return -1;

    if (pciReAttachDevice(dev->conn, pci) < 0)
        goto out;

    ret = 0;
out:
    pciFreeDevice(dev->conn, pci);
    return ret;
}

static int
qemudNodeDeviceReset (virNodeDevicePtr dev)
{
8485
    struct qemud_driver *driver = dev->conn->privateData;
8486 8487 8488 8489 8490 8491 8492 8493 8494 8495 8496
    pciDevice *pci;
    unsigned domain, bus, slot, function;
    int ret = -1;

    if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0)
        return -1;

    pci = pciGetDevice(dev->conn, domain, bus, slot, function);
    if (!pci)
        return -1;

8497 8498 8499
    qemuDriverLock(driver);

    if (pciResetDevice(dev->conn, pci, driver->activePciHostdevs) < 0)
8500 8501 8502 8503
        goto out;

    ret = 0;
out:
8504
    qemuDriverUnlock(driver);
8505 8506 8507 8508
    pciFreeDevice(dev->conn, pci);
    return ret;
}

8509 8510 8511 8512 8513 8514 8515 8516 8517 8518 8519 8520 8521 8522 8523 8524 8525 8526 8527 8528 8529 8530
static int
qemuCPUCompare(virConnectPtr conn,
               const char *xmlDesc,
               unsigned int flags ATTRIBUTE_UNUSED)
{
    struct qemud_driver *driver = conn->privateData;
    int ret = VIR_CPU_COMPARE_ERROR;

    qemuDriverLock(driver);

    if (!driver->caps || !driver->caps->host.cpu) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_NO_SUPPORT,
                         "%s", _("cannot get host CPU capabilities"));
    }
    else
        ret = cpuCompareXML(conn, driver->caps->host.cpu, xmlDesc);

    qemuDriverUnlock(driver);

    return ret;
}

8531 8532 8533 8534 8535
static virDriver qemuDriver = {
    VIR_DRV_QEMU,
    "QEMU",
    qemudOpen, /* open */
    qemudClose, /* close */
D
Daniel Veillard 已提交
8536
    qemudSupportsFeature, /* supports_feature */
8537 8538
    qemudGetType, /* type */
    qemudGetVersion, /* version */
8539
    NULL, /* libvirtVersion (impl. in libvirt.c) */
8540
    virGetHostname, /* getHostname */
8541
    qemudGetMaxVCPUs, /* getMaxVcpus */
8542
    nodeGetInfo, /* nodeGetInfo */
8543 8544 8545
    qemudGetCapabilities, /* getCapabilities */
    qemudListDomains, /* listDomains */
    qemudNumDomains, /* numOfDomains */
8546
    qemudDomainCreate, /* domainCreateXML */
8547 8548 8549 8550 8551
    qemudDomainLookupByID, /* domainLookupByID */
    qemudDomainLookupByUUID, /* domainLookupByUUID */
    qemudDomainLookupByName, /* domainLookupByName */
    qemudDomainSuspend, /* domainSuspend */
    qemudDomainResume, /* domainResume */
8552
    qemudDomainShutdown, /* domainShutdown */
8553 8554 8555
    NULL, /* domainReboot */
    qemudDomainDestroy, /* domainDestroy */
    qemudDomainGetOSType, /* domainGetOSType */
8556 8557 8558
    qemudDomainGetMaxMemory, /* domainGetMaxMemory */
    qemudDomainSetMaxMemory, /* domainSetMaxMemory */
    qemudDomainSetMemory, /* domainSetMemory */
8559 8560 8561
    qemudDomainGetInfo, /* domainGetInfo */
    qemudDomainSave, /* domainSave */
    qemudDomainRestore, /* domainRestore */
P
Paolo Bonzini 已提交
8562
    qemudDomainCoreDump, /* domainCoreDump */
8563
    qemudDomainSetVcpus, /* domainSetVcpus */
8564 8565
    qemudDomainPinVcpu, /* domainPinVcpu */
    qemudDomainGetVcpus, /* domainGetVcpus */
8566
    qemudDomainGetMaxVcpus, /* domainGetMaxVcpus */
8567 8568
    qemudDomainGetSecurityLabel, /* domainGetSecurityLabel */
    qemudNodeGetSecurityModel, /* nodeGetSecurityModel */
8569
    qemudDomainDumpXML, /* domainDumpXML */
8570
    qemuDomainXMLFromNative, /* domainXmlFromNative */
8571
    qemuDomainXMLToNative, /* domainXMLToNative */
8572 8573
    qemudListDefinedDomains, /* listDefinedDomains */
    qemudNumDefinedDomains, /* numOfDefinedDomains */
8574 8575 8576
    qemudDomainStart, /* domainCreate */
    qemudDomainDefine, /* domainDefineXML */
    qemudDomainUndefine, /* domainUndefine */
8577
    qemudDomainAttachDevice, /* domainAttachDevice */
8578
    qemudDomainDetachDevice, /* domainDetachDevice */
8579 8580
    qemudDomainGetAutostart, /* domainGetAutostart */
    qemudDomainSetAutostart, /* domainSetAutostart */
8581 8582 8583
    qemuGetSchedulerType, /* domainGetSchedulerType */
    qemuGetSchedulerParameters, /* domainGetSchedulerParameters */
    qemuSetSchedulerParameters, /* domainSetSchedulerParameters */
D
Daniel Veillard 已提交
8584 8585
    NULL, /* domainMigratePrepare (v1) */
    qemudDomainMigratePerform, /* domainMigratePerform */
8586
    NULL, /* domainMigrateFinish */
8587
    qemudDomainBlockStats, /* domainBlockStats */
8588
    qemudDomainInterfaceStats, /* domainInterfaceStats */
8589
    qemudDomainMemoryStats, /* domainMemoryStats */
8590
    qemudDomainBlockPeek, /* domainBlockPeek */
R
Richard W.M. Jones 已提交
8591
    qemudDomainMemoryPeek, /* domainMemoryPeek */
8592 8593
    nodeGetCellsFreeMemory, /* nodeGetCellsFreeMemory */
    nodeGetFreeMemory,  /* getFreeMemory */
8594 8595
    qemudDomainEventRegister, /* domainEventRegister */
    qemudDomainEventDeregister, /* domainEventDeregister */
D
Daniel Veillard 已提交
8596 8597
    qemudDomainMigratePrepare2, /* domainMigratePrepare2 */
    qemudDomainMigrateFinish2, /* domainMigrateFinish2 */
8598 8599 8600
    qemudNodeDeviceDettach, /* nodeDeviceDettach */
    qemudNodeDeviceReAttach, /* nodeDeviceReAttach */
    qemudNodeDeviceReset, /* nodeDeviceReset */
C
Chris Lalancette 已提交
8601
    qemudDomainMigratePrepareTunnel, /* domainMigratePrepareTunnel */
8602 8603 8604 8605
    qemuIsEncrypted,
    qemuIsSecure,
    qemuDomainIsActive,
    qemuDomainIsPersistent,
8606
    qemuCPUCompare, /* cpuCompare */
8607 8608 8609
};


8610
static virStateDriver qemuStateDriver = {
8611
    .name = "QEMU",
8612 8613 8614 8615
    .initialize = qemudStartup,
    .cleanup = qemudShutdown,
    .reload = qemudReload,
    .active = qemudActive,
8616
};
8617

8618
int qemuRegister(void) {
8619 8620 8621 8622
    virRegisterDriver(&qemuDriver);
    virRegisterStateDriver(&qemuStateDriver);
    return 0;
}