libvirt.c 619.2 KB
Newer Older
D
Daniel P. Berrange 已提交
1
/*
2
 * libvirt.c: Main interfaces for the libvirt library to handle virtualization
D
Daniel Veillard 已提交
3 4
 *           domains from a process running in domain 0
 *
E
Eric Blake 已提交
5
 * Copyright (C) 2005-2006, 2008-2014 Red Hat, Inc.
D
Daniel Veillard 已提交
6
 *
O
Osier Yang 已提交
7 8 9 10 11 12 13 14 15 16 17
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
D
Daniel Veillard 已提交
20 21 22 23
 *
 * Daniel Veillard <veillard@redhat.com>
 */

24
#include <config.h>
D
Daniel Veillard 已提交
25

26
#include <stdio.h>
27
#include <stdlib.h>
28
#include <string.h>
29 30 31
#include <sys/types.h>
#include <sys/stat.h>
#include <unistd.h>
E
Eric Blake 已提交
32
#include <sys/wait.h>
33
#include <time.h>
34

35 36
#include <libxml/parser.h>
#include <libxml/xpath.h>
37 38
#include "getpass.h"

39
#ifdef HAVE_WINSOCK2_H
40
# include <winsock2.h>
41
#endif
42

43
#ifdef WITH_CURL
44 45 46
# include <curl/curl.h>
#endif

47
#include "virerror.h"
48
#include "virlog.h"
49
#include "datatypes.h"
50
#include "driver.h"
51

52
#include "viruuid.h"
53
#include "viralloc.h"
54
#include "configmake.h"
55
#include "intprops.h"
56
#include "virconf.h"
57
#if WITH_GNUTLS
58 59 60
# if WITH_GNUTLS_GCRYPT
#  include <gcrypt.h>
# endif
61 62
# include "rpc/virnettlscontext.h"
#endif
63
#include "vircommand.h"
64
#include "virfile.h"
65
#include "virrandom.h"
M
Martin Kletzander 已提交
66
#include "viruri.h"
67
#include "virthread.h"
68
#include "virstring.h"
E
Eric Blake 已提交
69
#include "virutil.h"
70
#include "virtypedparam.h"
71

72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94
#ifdef WITH_TEST
# include "test/test_driver.h"
#endif
#ifdef WITH_REMOTE
# include "remote/remote_driver.h"
#endif
#ifdef WITH_OPENVZ
# include "openvz/openvz_driver.h"
#endif
#ifdef WITH_VMWARE
# include "vmware/vmware_driver.h"
#endif
#ifdef WITH_PHYP
# include "phyp/phyp_driver.h"
#endif
#ifdef WITH_ESX
# include "esx/esx_driver.h"
#endif
#ifdef WITH_HYPERV
# include "hyperv/hyperv_driver.h"
#endif
#ifdef WITH_XENAPI
# include "xenapi/xenapi_driver.h"
95
#endif
D
Dmitry Guryanov 已提交
96 97 98
#ifdef WITH_PARALLELS
# include "parallels/parallels_driver.h"
#endif
R
Roman Bogorodskiy 已提交
99 100 101
#ifdef WITH_BHYVE
# include "bhyve/bhyve_driver.h"
#endif
102

103 104
#define VIR_FROM_THIS VIR_FROM_NONE

105 106
VIR_LOG_INIT("libvirt");

D
Daniel Veillard 已提交
107 108 109
/*
 * TODO:
 * - use lock to protect against concurrent accesses ?
D
Daniel Veillard 已提交
110
 * - use reference counting to guarantee coherent pointer state ?
D
Daniel Veillard 已提交
111 112
 */

113
#define MAX_DRIVERS 20
114

115 116 117 118 119 120 121 122 123 124
#define virDriverCheckTabMaxReturn(count, ret)                          \
    do {                                                                \
        if ((count) >= MAX_DRIVERS) {                                   \
            virReportError(VIR_ERR_INTERNAL_ERROR,                      \
                           _("Too many drivers, cannot register %s"),   \
                           driver->name);                               \
            return ret;                                                 \
        }                                                               \
    } while (0)

125
static virDriverPtr virDriverTab[MAX_DRIVERS];
126
static int virDriverTabCount = 0;
127
static virNetworkDriverPtr virNetworkDriverTab[MAX_DRIVERS];
128
static int virNetworkDriverTabCount = 0;
D
Daniel Veillard 已提交
129 130
static virInterfaceDriverPtr virInterfaceDriverTab[MAX_DRIVERS];
static int virInterfaceDriverTabCount = 0;
131 132
static virStorageDriverPtr virStorageDriverTab[MAX_DRIVERS];
static int virStorageDriverTabCount = 0;
133 134
static virNodeDeviceDriverPtr virNodeDeviceDriverTab[MAX_DRIVERS];
static int virNodeDeviceDriverTabCount = 0;
135 136
static virSecretDriverPtr virSecretDriverTab[MAX_DRIVERS];
static int virSecretDriverTabCount = 0;
S
Stefan Berger 已提交
137 138
static virNWFilterDriverPtr virNWFilterDriverTab[MAX_DRIVERS];
static int virNWFilterDriverTabCount = 0;
A
Atsushi SAKAI 已提交
139
#ifdef WITH_LIBVIRTD
140 141
static virStateDriverPtr virStateDriverTab[MAX_DRIVERS];
static int virStateDriverTabCount = 0;
A
Atsushi SAKAI 已提交
142
#endif
143

144

145
#if defined(POLKIT_AUTH)
146 147 148
static int
virConnectAuthGainPolkit(const char *privilege)
{
E
Eric Blake 已提交
149 150
    virCommandPtr cmd;
    int ret = -1;
151

152
    if (geteuid() == 0)
153 154
        return 0;

E
Eric Blake 已提交
155
    cmd = virCommandNewArgList(POLKIT_AUTH, "--obtain", privilege, NULL);
156
    if (virCommandRun(cmd, NULL) < 0)
E
Eric Blake 已提交
157
        goto cleanup;
158

E
Eric Blake 已提交
159
    ret = 0;
160
 cleanup:
E
Eric Blake 已提交
161 162
    virCommandFree(cmd);
    return ret;
163 164 165
}
#endif

166 167 168 169 170 171

static int
virConnectAuthCallbackDefault(virConnectCredentialPtr cred,
                              unsigned int ncred,
                              void *cbdata ATTRIBUTE_UNUSED)
{
172
    size_t i;
173

174
    for (i = 0; i < ncred; i++) {
175 176
        char buf[1024];
        char *bufptr = buf;
177
        size_t len;
178 179

        switch (cred[i].type) {
180 181 182 183
        case VIR_CRED_EXTERNAL: {
            if (STRNEQ(cred[i].challenge, "PolicyKit"))
                return -1;

184
#if defined(POLKIT_AUTH)
185
            if (virConnectAuthGainPolkit(cred[i].prompt) < 0)
186
                return -1;
187 188 189 190 191 192 193
#else
            /*
             * Ignore & carry on. Although we can't auth
             * directly, the user may have authenticated
             * themselves already outside context of libvirt
             */
#endif
194 195
            break;
        }
196

197 198 199 200
        case VIR_CRED_USERNAME:
        case VIR_CRED_AUTHNAME:
        case VIR_CRED_ECHOPROMPT:
        case VIR_CRED_REALM:
201
            if (printf("%s: ", cred[i].prompt) < 0)
202 203 204 205
                return -1;
            if (fflush(stdout) != 0)
                return -1;

206 207 208 209 210 211 212
            if (!fgets(buf, sizeof(buf), stdin)) {
                if (feof(stdin)) { /* Treat EOF as "" */
                    buf[0] = '\0';
                    break;
                }
                return -1;
            }
213 214 215
            len = strlen(buf);
            if (len != 0 && buf[len-1] == '\n')
                buf[len-1] = '\0';
216 217 218 219
            break;

        case VIR_CRED_PASSPHRASE:
        case VIR_CRED_NOECHOPROMPT:
220
            if (printf("%s: ", cred[i].prompt) < 0)
221 222 223 224
                return -1;
            if (fflush(stdout) != 0)
                return -1;

225 226 227 228
            bufptr = getpass("");
            if (!bufptr)
                return -1;
            break;
229 230 231

        default:
            return -1;
232 233
        }

D
Daniel P. Berrange 已提交
234
        if (cred[i].type != VIR_CRED_EXTERNAL) {
235 236 237
            if (VIR_STRDUP(cred[i].result,
                           STREQ(bufptr, "") && cred[i].defresult ?
                           cred[i].defresult : bufptr) < 0)
D
Daniel P. Berrange 已提交
238 239 240
                return -1;
            cred[i].resultlen = strlen(cred[i].result);
        }
241 242 243 244 245
    }

    return 0;
}

246

247 248 249 250 251 252 253 254 255 256
/* Don't typically want VIR_CRED_USERNAME. It enables you to authenticate
 * as one user, and act as another. It just results in annoying
 * prompts for the username twice & is very rarely what you want
 */
static int virConnectCredTypeDefault[] = {
    VIR_CRED_AUTHNAME,
    VIR_CRED_ECHOPROMPT,
    VIR_CRED_REALM,
    VIR_CRED_PASSPHRASE,
    VIR_CRED_NOECHOPROMPT,
257
    VIR_CRED_EXTERNAL,
258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278
};

static virConnectAuth virConnectAuthDefault = {
    virConnectCredTypeDefault,
    sizeof(virConnectCredTypeDefault)/sizeof(int),
    virConnectAuthCallbackDefault,
    NULL,
};

/*
 * virConnectAuthPtrDefault
 *
 * A default implementation of the authentication callbacks. This
 * implementation is suitable for command line based tools. It will
 * prompt for username, passwords, realm and one time keys as needed.
 * It will print on STDOUT, and read from STDIN. If this is not
 * suitable for the application's needs an alternative implementation
 * should be provided.
 */
virConnectAuthPtr virConnectAuthPtrDefault = &virConnectAuthDefault;

279 280
#if HAVE_WINSOCK2_H
static int
281
winsock_init(void)
282 283 284 285 286 287 288
{
    WORD winsock_version, err;
    WSADATA winsock_data;

    /* http://msdn2.microsoft.com/en-us/library/ms742213.aspx */
    winsock_version = MAKEWORD (2, 2);
    err = WSAStartup (winsock_version, &winsock_data);
J
Jim Meyering 已提交
289
    return err == 0 ? 0 : -1;
290 291 292
}
#endif

293

294
#ifdef WITH_GNUTLS_GCRYPT
295 296
static int
virTLSMutexInit(void **priv)
297
{
D
Daniel P. Berrange 已提交
298 299
    virMutexPtr lock = NULL;

300
    if (VIR_ALLOC_QUIET(lock) < 0)
D
Daniel P. Berrange 已提交
301 302 303 304 305 306 307 308 309 310 311
        return ENOMEM;

    if (virMutexInit(lock) < 0) {
        VIR_FREE(lock);
        return errno;
    }

    *priv = lock;
    return 0;
}

312 313 314

static int
virTLSMutexDestroy(void **priv)
D
Daniel P. Berrange 已提交
315 316 317 318 319 320 321
{
    virMutexPtr lock = *priv;
    virMutexDestroy(lock);
    VIR_FREE(lock);
    return 0;
}

322 323 324

static int
virTLSMutexLock(void **priv)
D
Daniel P. Berrange 已提交
325 326 327 328 329 330
{
    virMutexPtr lock = *priv;
    virMutexLock(lock);
    return 0;
}

331 332 333

static int
virTLSMutexUnlock(void **priv)
D
Daniel P. Berrange 已提交
334 335 336 337 338 339
{
    virMutexPtr lock = *priv;
    virMutexUnlock(lock);
    return 0;
}

340

D
Daniel P. Berrange 已提交
341
static struct gcry_thread_cbs virTLSThreadImpl = {
342
    /* GCRY_THREAD_OPTION_VERSION was added in gcrypt 1.4.2 */
343
# ifdef GCRY_THREAD_OPTION_VERSION
D
Daniel P. Berrange 已提交
344
    (GCRY_THREAD_OPTION_PTHREAD | (GCRY_THREAD_OPTION_VERSION << 8)),
345
# else
346
    GCRY_THREAD_OPTION_PTHREAD,
347
# endif
D
Daniel P. Berrange 已提交
348 349 350 351 352 353 354
    NULL,
    virTLSMutexInit,
    virTLSMutexDestroy,
    virTLSMutexLock,
    virTLSMutexUnlock,
    NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL
};
355
#endif /* WITH_GNUTLS_GCRYPT */
D
Daniel P. Berrange 已提交
356

357

358 359
static bool virGlobalError = false;
static virOnceControl virGlobalOnce = VIR_ONCE_CONTROL_INITIALIZER;
360

361 362 363
static void
virGlobalInit(void)
{
364 365 366 367 368
    /* It would be nice if we could trace the use of this call, to
     * help diagnose in log files if a user calls something other than
     * virConnectOpen first.  But we can't rely on VIR_DEBUG working
     * until after initialization is complete, and since this is
     * one-shot, we never get here again.  */
369
    if (virThreadInitialize() < 0 ||
370
        virErrorInitialize() < 0)
371
        goto error;
372

373
#ifndef LIBVIRT_SETUID_RPC_CLIENT
374 375 376 377 378 379 380
    if (virIsSUID()) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("libvirt.so is not safe to use from setuid programs"));
        goto error;
    }
#endif

381
#ifdef WITH_GNUTLS_GCRYPT
382 383 384 385 386 387 388 389 390 391 392 393 394
    /*
     * This sequence of API calls it copied exactly from
     * gnutls 2.12.23 source lib/gcrypt/init.c, with
     * exception that GCRYCTL_ENABLE_QUICK_RANDOM, is
     * dropped
     */
    if (gcry_control(GCRYCTL_ANY_INITIALIZATION_P) == 0) {
        gcry_control(GCRYCTL_SET_THREAD_CBS, &virTLSThreadImpl);
        gcry_check_version(NULL);

        gcry_control(GCRYCTL_DISABLE_SECMEM, NULL, 0);
        gcry_control(GCRYCTL_INITIALIZATION_FINISHED, NULL, 0);
    }
395
#endif
D
Daniel P. Berrange 已提交
396

397
    virLogSetFromEnv();
398

399
#ifdef WITH_GNUTLS
400
    virNetTLSInit();
401
#endif
402

403
#if WITH_CURL
404 405 406
    curl_global_init(CURL_GLOBAL_DEFAULT);
#endif

407
    VIR_DEBUG("register drivers");
408

409
#if HAVE_WINSOCK2_H
410
    if (winsock_init() == -1)
411
        goto error;
412 413
#endif

414
    if (!bindtextdomain(PACKAGE, LOCALEDIR))
415
        goto error;
416

417 418 419 420 421
    /*
     * Note we must avoid everything except 'remote' driver
     * for virt-login-shell usage
     */
#ifndef LIBVIRT_SETUID_RPC_CLIENT
422
    /*
423 424
     * Note that the order is important: the first ones have a higher
     * priority when calling virConnectOpen.
425
     */
426
# ifdef WITH_TEST
427 428
    if (testRegister() == -1)
        goto error;
429 430
# endif
# ifdef WITH_OPENVZ
431 432
    if (openvzRegister() == -1)
        goto error;
433 434
# endif
# ifdef WITH_VMWARE
435 436
    if (vmwareRegister() == -1)
        goto error;
437 438
# endif
# ifdef WITH_PHYP
439 440
    if (phypRegister() == -1)
        goto error;
441 442
# endif
# ifdef WITH_ESX
443 444
    if (esxRegister() == -1)
        goto error;
445 446
# endif
# ifdef WITH_HYPERV
447 448
    if (hypervRegister() == -1)
        goto error;
449 450
# endif
# ifdef WITH_XENAPI
451 452
    if (xenapiRegister() == -1)
        goto error;
453 454
# endif
# ifdef WITH_PARALLELS
455 456
    if (parallelsRegister() == -1)
        goto error;
457
# endif
D
Dmitry Guryanov 已提交
458
#endif
459
#ifdef WITH_REMOTE
460
    if (remoteRegister() == -1)
461
        goto error;
462
#endif
D
Daniel P. Berrange 已提交
463

464 465
    return;

466
 error:
467 468 469
    virGlobalError = true;
}

470

471 472 473 474 475
/**
 * virInitialize:
 *
 * Initialize the library.
 *
476 477 478 479 480 481
 * This method is invoked automatically by any of the virConnectOpen() API
 * calls, and by virGetVersion(). Since release 1.0.0, there is no need to
 * call this method even in a multithreaded application, since
 * initialization is performed in a thread safe manner; but applications
 * using an older version of the library should manually call this before
 * setting up competing threads that attempt virConnectOpen in parallel.
482
 *
483 484 485 486 487
 * The only other time it would be necessary to call virInitialize is if the
 * application did not invoke virConnectOpen as its first API call, such
 * as when calling virEventRegisterImpl() before setting up connections,
 * or when using virSetErrorFunc() to alter error reporting of the first
 * connection attempt.
488 489 490 491 492 493 494 495 496 497 498
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
virInitialize(void)
{
    if (virOnce(&virGlobalOnce, virGlobalInit) < 0)
        return -1;

    if (virGlobalError)
        return -1;
499
    return 0;
500 501
}

502

503 504
#ifdef WIN32
BOOL WINAPI
505
DllMain(HINSTANCE instance, DWORD reason, LPVOID ignore);
506 507

BOOL WINAPI
508 509 510
DllMain(HINSTANCE instance ATTRIBUTE_UNUSED,
        DWORD reason,
        LPVOID ignore ATTRIBUTE_UNUSED)
511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535
{
    switch (reason) {
    case DLL_PROCESS_ATTACH:
        virInitialize();
        break;

    case DLL_THREAD_ATTACH:
        /* Nothing todo in libvirt yet */
        break;

    case DLL_THREAD_DETACH:
        /* Release per-thread local data */
        virThreadOnExit();
        break;

    case DLL_PROCESS_DETACH:
        /* Don't bother releasing per-thread data
           since (hopefully) windows cleans up
           everything on process exit */
        break;
    }

    return TRUE;
}
#endif
536

537

538 539 540 541 542 543 544 545 546 547 548
/**
 * virRegisterNetworkDriver:
 * @driver: pointer to a network driver block
 *
 * Register a network virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterNetworkDriver(virNetworkDriverPtr driver)
{
549
    virCheckNonNullArgReturn(driver, -1);
550
    virDriverCheckTabMaxReturn(virNetworkDriverTabCount, -1);
551

552
    VIR_DEBUG("registering %s as network driver %d",
553 554
           driver->name, virNetworkDriverTabCount);

555 556
    virNetworkDriverTab[virNetworkDriverTabCount] = driver;
    return virNetworkDriverTabCount++;
557 558
}

559

D
Daniel Veillard 已提交
560 561
/**
 * virRegisterInterfaceDriver:
L
Laine Stump 已提交
562
 * @driver: pointer to an interface driver block
D
Daniel Veillard 已提交
563
 *
L
Laine Stump 已提交
564
 * Register an interface virtualization driver
D
Daniel Veillard 已提交
565 566 567 568 569 570
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterInterfaceDriver(virInterfaceDriverPtr driver)
{
571
    virCheckNonNullArgReturn(driver, -1);
572
    virDriverCheckTabMaxReturn(virInterfaceDriverTabCount, -1);
D
Daniel Veillard 已提交
573

574
    VIR_DEBUG("registering %s as interface driver %d",
D
Daniel Veillard 已提交
575 576 577 578 579 580
           driver->name, virInterfaceDriverTabCount);

    virInterfaceDriverTab[virInterfaceDriverTabCount] = driver;
    return virInterfaceDriverTabCount++;
}

581

582 583 584 585 586 587 588 589 590 591 592
/**
 * virRegisterStorageDriver:
 * @driver: pointer to a storage driver block
 *
 * Register a storage virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterStorageDriver(virStorageDriverPtr driver)
{
593
    virCheckNonNullArgReturn(driver, -1);
594
    virDriverCheckTabMaxReturn(virStorageDriverTabCount, -1);
595

596
    VIR_DEBUG("registering %s as storage driver %d",
597 598
           driver->name, virStorageDriverTabCount);

599 600 601 602
    virStorageDriverTab[virStorageDriverTabCount] = driver;
    return virStorageDriverTabCount++;
}

603

604
/**
605
 * virRegisterNodeDeviceDriver:
606 607 608 609 610 611 612
 * @driver: pointer to a device monitor block
 *
 * Register a device monitor
 *
 * Returns the driver priority or -1 in case of error.
 */
int
613
virRegisterNodeDeviceDriver(virNodeDeviceDriverPtr driver)
614
{
615
    virCheckNonNullArgReturn(driver, -1);
616
    virDriverCheckTabMaxReturn(virNodeDeviceDriverTabCount, -1);
617

618
    VIR_DEBUG("registering %s as device driver %d",
619
           driver->name, virNodeDeviceDriverTabCount);
620

621 622
    virNodeDeviceDriverTab[virNodeDeviceDriverTabCount] = driver;
    return virNodeDeviceDriverTabCount++;
623 624
}

625

626 627 628 629 630 631 632 633 634 635 636
/**
 * virRegisterSecretDriver:
 * @driver: pointer to a secret driver block
 *
 * Register a secret driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterSecretDriver(virSecretDriverPtr driver)
{
637
    virCheckNonNullArgReturn(driver, -1);
638
    virDriverCheckTabMaxReturn(virSecretDriverTabCount, -1);
639

640
    VIR_DEBUG("registering %s as secret driver %d",
641 642 643 644 645 646
           driver->name, virSecretDriverTabCount);

    virSecretDriverTab[virSecretDriverTabCount] = driver;
    return virSecretDriverTabCount++;
}

647

S
Stefan Berger 已提交
648 649 650 651 652 653 654 655 656 657 658
/**
 * virRegisterNWFilterDriver:
 * @driver: pointer to a network filter driver block
 *
 * Register a network filter virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterNWFilterDriver(virNWFilterDriverPtr driver)
{
659
    virCheckNonNullArgReturn(driver, -1);
660
    virDriverCheckTabMaxReturn(virNWFilterDriverTabCount, -1);
S
Stefan Berger 已提交
661

662
    VIR_DEBUG("registering %s as network filter driver %d",
S
Stefan Berger 已提交
663 664 665 666 667 668 669
           driver->name, virNWFilterDriverTabCount);

    virNWFilterDriverTab[virNWFilterDriverTabCount] = driver;
    return virNWFilterDriverTabCount++;
}


670 671 672 673 674 675 676 677 678 679 680
/**
 * virRegisterDriver:
 * @driver: pointer to a driver block
 *
 * Register a virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterDriver(virDriverPtr driver)
{
681 682
    VIR_DEBUG("driver=%p name=%s", driver,
              driver ? NULLSTR(driver->name) : "(null)");
683

684
    virCheckNonNullArgReturn(driver, -1);
685
    virDriverCheckTabMaxReturn(virDriverTabCount, -1);
686

687
    VIR_DEBUG("registering %s as driver %d",
688 689
           driver->name, virDriverTabCount);

690 691
    virDriverTab[virDriverTabCount] = driver;
    return virDriverTabCount++;
692 693
}

694

A
Atsushi SAKAI 已提交
695
#ifdef WITH_LIBVIRTD
696 697 698 699 700 701 702 703 704 705 706
/**
 * virRegisterStateDriver:
 * @driver: pointer to a driver block
 *
 * Register a virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterStateDriver(virStateDriverPtr driver)
{
707
    virCheckNonNullArgReturn(driver, -1);
708
    virDriverCheckTabMaxReturn(virStateDriverTabCount, -1);
709 710 711 712 713

    virStateDriverTab[virStateDriverTabCount] = driver;
    return virStateDriverTabCount++;
}

714

715 716
/**
 * virStateInitialize:
717
 * @privileged: set to true if running with root privilege, false otherwise
718 719
 * @callback: callback to invoke to inhibit shutdown of the daemon
 * @opaque: data to pass to @callback
720
 *
721 722 723 724 725
 * Initialize all virtualization drivers. Accomplished in two phases,
 * the first being state and structure initialization followed by any
 * auto start supported by the driver.  This is done to ensure dependencies
 * that some drivers may have on another driver having been initialized
 * will exist, such as the storage driver's need to use the secret driver.
726
 *
727
 * Returns 0 if all succeed, -1 upon any failure.
728
 */
729 730 731 732
int
virStateInitialize(bool privileged,
                   virStateInhibitCallback callback,
                   void *opaque)
733
{
734
    size_t i;
735 736 737 738

    if (virInitialize() < 0)
        return -1;

739
    for (i = 0; i < virStateDriverTabCount; i++) {
740
        if (virStateDriverTab[i]->stateInitialize) {
741
            VIR_DEBUG("Running global init for %s state driver",
742
                      virStateDriverTab[i]->name);
743 744 745
            if (virStateDriverTab[i]->stateInitialize(privileged,
                                                      callback,
                                                      opaque) < 0) {
746 747 748 749
                virErrorPtr err = virGetLastError();
                VIR_ERROR(_("Initialization of %s state driver failed: %s"),
                          virStateDriverTab[i]->name,
                          err && err->message ? err->message : _("Unknown problem"));
750 751
                return -1;
            }
752
        }
753
    }
754 755 756 757 758 759 760 761

    for (i = 0; i < virStateDriverTabCount; i++) {
        if (virStateDriverTab[i]->stateAutoStart) {
            VIR_DEBUG("Running global auto start for %s state driver",
                      virStateDriverTab[i]->name);
            virStateDriverTab[i]->stateAutoStart();
        }
    }
762
    return 0;
763 764
}

765

766 767 768 769 770
/**
 * virStateCleanup:
 *
 * Run each virtualization driver's cleanup method.
 *
771
 * Returns 0 if all succeed, -1 upon any failure.
772
 */
773 774 775
int
virStateCleanup(void)
{
776 777
    size_t i;
    int ret = 0;
778

779
    for (i = 0; i < virStateDriverTabCount; i++) {
780 781
        if (virStateDriverTab[i]->stateCleanup &&
            virStateDriverTab[i]->stateCleanup() < 0)
782 783 784 785 786
            ret = -1;
    }
    return ret;
}

787

788 789 790 791 792
/**
 * virStateReload:
 *
 * Run each virtualization driver's reload method.
 *
793
 * Returns 0 if all succeed, -1 upon any failure.
794
 */
795 796 797
int
virStateReload(void)
{
798 799
    size_t i;
    int ret = 0;
800

801
    for (i = 0; i < virStateDriverTabCount; i++) {
802 803
        if (virStateDriverTab[i]->stateReload &&
            virStateDriverTab[i]->stateReload() < 0)
804 805 806 807 808
            ret = -1;
    }
    return ret;
}

809

810 811 812 813 814 815 816
/**
 * virStateStop:
 *
 * Run each virtualization driver's "stop" method.
 *
 * Returns 0 if successful, -1 on failure
 */
817 818 819
int
virStateStop(void)
{
820 821
    size_t i;
    int ret = 0;
822

823
    for (i = 0; i < virStateDriverTabCount; i++) {
824 825
        if (virStateDriverTab[i]->stateStop &&
            virStateDriverTab[i]->stateStop())
826 827 828 829
            ret = 1;
    }
    return ret;
}
830
#endif /* WITH_LIBVIRTD */
831 832


833 834 835
/**
 * virGetVersion:
 * @libVer: return value for the library version (OUT)
836 837 838 839 840 841 842 843 844 845
 * @type: ignored; pass NULL
 * @typeVer: pass NULL; for historical purposes duplicates @libVer if
 * non-NULL
 *
 * Provides version information. @libVer is the version of the
 * library and will always be set unless an error occurs, in which case
 * an error code will be returned. @typeVer exists for historical
 * compatibility; if it is not NULL it will duplicate @libVer (it was
 * originally intended to return hypervisor information based on @type,
 * but due to the design of remote clients this is not reliable). To
846
 * get the version of the running hypervisor use the virConnectGetVersion()
847
 * function instead. To get the libvirt library version used by a
848 849 850
 * connection use the virConnectGetLibVersion() instead.
 *
 * This function includes a call to virInitialize() when necessary.
851 852 853 854 855
 *
 * Returns -1 in case of failure, 0 otherwise, and values for @libVer and
 *       @typeVer have the format major * 1,000,000 + minor * 1,000 + release.
 */
int
856
virGetVersion(unsigned long *libVer, const char *type ATTRIBUTE_UNUSED,
857 858
              unsigned long *typeVer)
{
859 860
    if (virInitialize() < 0)
        goto error;
861
    VIR_DEBUG("libVir=%p, type=%s, typeVer=%p", libVer, type, typeVer);
862

863
    virResetLastError();
864
    if (libVer == NULL)
865
        goto error;
866 867
    *libVer = LIBVIR_VERSION_NUMBER;

868
    if (typeVer != NULL)
869 870
        *typeVer = LIBVIR_VERSION_NUMBER;

871
    return 0;
872

873
 error:
874 875
    virDispatchError(NULL);
    return -1;
876 877
}

878

879
static char *
880
virConnectGetConfigFilePath(void)
881 882 883 884 885
{
    char *path;
    if (geteuid() == 0) {
        if (virAsprintf(&path, "%s/libvirt/libvirt.conf",
                        SYSCONFDIR) < 0)
886
            return NULL;
887
    } else {
888
        char *userdir = virGetUserConfigDirectory();
889
        if (!userdir)
890
            return NULL;
891

892
        if (virAsprintf(&path, "%s/libvirt.conf",
893 894
                        userdir) < 0) {
            VIR_FREE(userdir);
895
            return NULL;
896 897
        }
        VIR_FREE(userdir);
898 899 900 901 902
    }

    return path;
}

903

904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925
static int
virConnectGetConfigFile(virConfPtr *conf)
{
    char *filename = NULL;
    int ret = -1;

    *conf = NULL;

    if (!(filename = virConnectGetConfigFilePath()))
        goto cleanup;

    if (!virFileExists(filename)) {
        ret = 0;
        goto cleanup;
    }

    VIR_DEBUG("Loading config file '%s'", filename);
    if (!(*conf = virConfReadFile(filename, 0)))
        goto cleanup;

    ret = 0;

926
 cleanup:
927 928 929 930
    VIR_FREE(filename);
    return ret;
}

931 932
#define URI_ALIAS_CHARS "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789_-"

933

934
static int
935 936
virConnectOpenFindURIAliasMatch(virConfValuePtr value, const char *alias,
                                char **uri)
937 938
{
    virConfValuePtr entry;
W
Wen Ruo Lv 已提交
939 940
    size_t alias_len;

941
    if (value->type != VIR_CONF_LIST) {
942 943
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Expected a list for 'uri_aliases' config parameter"));
944 945 946 947
        return -1;
    }

    entry = value->list;
W
Wen Ruo Lv 已提交
948
    alias_len = strlen(alias);
949 950 951 952 953
    while (entry) {
        char *offset;
        size_t safe;

        if (entry->type != VIR_CONF_STRING) {
954 955
            virReportError(VIR_ERR_CONF_SYNTAX, "%s",
                           _("Expected a string for 'uri_aliases' config parameter list entry"));
956 957 958 959
            return -1;
        }

        if (!(offset = strchr(entry->str, '='))) {
960 961
            virReportError(VIR_ERR_CONF_SYNTAX,
                           _("Malformed 'uri_aliases' config entry '%s', expected 'alias=uri://host/path'"),
962 963 964 965 966 967
                            entry->str);
            return -1;
        }

        safe  = strspn(entry->str, URI_ALIAS_CHARS);
        if (safe < (offset - entry->str)) {
968 969
            virReportError(VIR_ERR_CONF_SYNTAX,
                           _("Malformed 'uri_aliases' config entry '%s', aliases may only contain 'a-Z, 0-9, _, -'"),
970 971 972 973
                            entry->str);
            return -1;
        }

W
Wen Ruo Lv 已提交
974 975
        if (alias_len == (offset - entry->str) &&
            STREQLEN(entry->str, alias, alias_len)) {
976 977
            VIR_DEBUG("Resolved alias '%s' to '%s'",
                      alias, offset+1);
978
            return VIR_STRDUP(*uri, offset+1);
979 980 981 982 983 984 985 986 987 988
        }

        entry = entry->next;
    }

    VIR_DEBUG("No alias found for '%s', passing through to drivers",
              alias);
    return 0;
}

989

990
static int
991 992
virConnectOpenResolveURIAlias(virConfPtr conf,
                              const char *alias, char **uri)
993 994 995 996 997 998
{
    int ret = -1;
    virConfValuePtr value = NULL;

    *uri = NULL;

999
    if ((value = virConfGetValue(conf, "uri_aliases")))
1000 1001 1002 1003
        ret = virConnectOpenFindURIAliasMatch(value, alias, uri);
    else
        ret = 0;

1004 1005 1006 1007 1008 1009 1010 1011 1012 1013
    return ret;
}


static int
virConnectGetDefaultURI(virConfPtr conf,
                        const char **name)
{
    int ret = -1;
    virConfValuePtr value = NULL;
1014
    const char *defname = virGetEnvBlockSUID("LIBVIRT_DEFAULT_URI");
1015 1016 1017 1018 1019
    if (defname && *defname) {
        VIR_DEBUG("Using LIBVIRT_DEFAULT_URI '%s'", defname);
        *name = defname;
    } else if ((value = virConfGetValue(conf, "uri_default"))) {
        if (value->type != VIR_CONF_STRING) {
1020 1021
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Expected a string for 'uri_default' config parameter"));
1022 1023 1024 1025 1026 1027 1028
            goto cleanup;
        }
        VIR_DEBUG("Using config file uri '%s'", value->str);
        *name = value->str;
    }

    ret = 0;
1029
 cleanup:
1030 1031 1032
    return ret;
}

1033

1034
static virConnectPtr
1035 1036 1037
do_open(const char *name,
        virConnectAuthPtr auth,
        unsigned int flags)
1038
{
1039 1040
    size_t i;
    int res;
1041
    virConnectPtr ret;
1042
    virConfPtr conf = NULL;
1043 1044 1045 1046

    ret = virGetConnect();
    if (ret == NULL)
        return NULL;
1047

1048 1049 1050 1051 1052 1053
    if (virConnectGetConfigFile(&conf) < 0)
        goto failed;

    if (name && name[0] == '\0')
        name = NULL;

1054 1055 1056 1057 1058 1059
    if (!name && virIsSUID()) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("An explicit URI must be provided when setuid"));
        goto failed;
    }

1060
    /*
E
Eric Blake 已提交
1061 1062 1063
     * If no URI is passed, then check for an environment string if not
     * available probe the compiled in drivers to find a default hypervisor
     * if detectable.
1064
     */
1065 1066 1067
    if (!name &&
        virConnectGetDefaultURI(conf, &name) < 0)
        goto failed;
1068

1069
    if (name) {
1070
        char *alias = NULL;
1071 1072 1073 1074 1075 1076 1077
        /* Convert xen -> xen:/// for back compat */
        if (STRCASEEQ(name, "xen"))
            name = "xen:///";

        /* Convert xen:// -> xen:/// because xmlParseURI cannot parse the
         * former.  This allows URIs such as xen://localhost to work.
         */
1078
        if (STREQ(name, "xen://"))
1079 1080
            name = "xen:///";

1081
        if (!(flags & VIR_CONNECT_NO_ALIASES) &&
1082
            virConnectOpenResolveURIAlias(conf, name, &alias) < 0)
1083 1084
            goto failed;

1085
        if (!(ret->uri = virURIParse(alias ? alias : name))) {
1086
            VIR_FREE(alias);
1087 1088
            goto failed;
        }
1089

1090
        VIR_DEBUG("name \"%s\" to URI components:\n"
1091 1092 1093 1094 1095 1096
                  "  scheme %s\n"
                  "  server %s\n"
                  "  user %s\n"
                  "  port %d\n"
                  "  path %s\n",
                  alias ? alias : name,
1097
                  NULLSTR(ret->uri->scheme), NULLSTR(ret->uri->server),
1098 1099 1100 1101
                  NULLSTR(ret->uri->user), ret->uri->port,
                  NULLSTR(ret->uri->path));

        VIR_FREE(alias);
1102
    } else {
1103
        VIR_DEBUG("no name, allowing driver auto-select");
1104 1105
    }

1106 1107 1108
    /* Cleansing flags */
    ret->flags = flags & VIR_CONNECT_RO;

1109
    for (i = 0; i < virDriverTabCount; i++) {
1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123
        /* We're going to probe the remote driver next. So we have already
         * probed all other client-side-only driver before, but none of them
         * accepted the URI.
         * If the scheme corresponds to a known but disabled client-side-only
         * driver then report a useful error, instead of a cryptic one about
         * not being able to connect to libvirtd or not being able to find
         * certificates. */
        if (virDriverTab[i]->no == VIR_DRV_REMOTE &&
            ret->uri != NULL && ret->uri->scheme != NULL &&
            (
#ifndef WITH_PHYP
             STRCASEEQ(ret->uri->scheme, "phyp") ||
#endif
#ifndef WITH_ESX
1124
             STRCASEEQ(ret->uri->scheme, "vpx") ||
1125 1126
             STRCASEEQ(ret->uri->scheme, "esx") ||
             STRCASEEQ(ret->uri->scheme, "gsx") ||
M
Matthias Bolte 已提交
1127 1128 1129
#endif
#ifndef WITH_HYPERV
             STRCASEEQ(ret->uri->scheme, "hyperv") ||
1130 1131 1132
#endif
#ifndef WITH_XENAPI
             STRCASEEQ(ret->uri->scheme, "xenapi") ||
D
Dmitry Guryanov 已提交
1133 1134 1135
#endif
#ifndef WITH_PARALLELS
             STRCASEEQ(ret->uri->scheme, "parallels") ||
1136 1137
#endif
             false)) {
1138
            virReportErrorHelper(VIR_FROM_NONE, VIR_ERR_CONFIG_UNSUPPORTED,
1139 1140 1141 1142 1143 1144
                                 __FILE__, __FUNCTION__, __LINE__,
                                 _("libvirt was built without the '%s' driver"),
                                 ret->uri->scheme);
            goto failed;
        }

1145
        VIR_DEBUG("trying driver %zu (%s) ...", i, virDriverTab[i]->name);
1146
        ret->driver = virDriverTab[i];
1147
        res = virDriverTab[i]->connectOpen(ret, auth, flags);
1148
        VIR_DEBUG("driver %zu %s returned %s",
O
Osier Yang 已提交
1149 1150 1151 1152 1153 1154
                  i, virDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1155
            break;
O
Osier Yang 已提交
1156
        } else if (res == VIR_DRV_OPEN_ERROR) {
1157
            ret->driver = NULL;
O
Osier Yang 已提交
1158
            goto failed;
1159 1160
        } else {
            ret->driver = NULL;
1161
        }
1162 1163
    }

1164
    if (!ret->driver) {
1165
        /* If we reach here, then all drivers declined the connection. */
1166
        virReportError(VIR_ERR_NO_CONNECT, "%s", NULLSTR(name));
1167
        goto failed;
1168 1169
    }

1170
    for (i = 0; i < virNetworkDriverTabCount; i++) {
1171
        res = virNetworkDriverTab[i]->networkOpen(ret, auth, flags);
1172
        VIR_DEBUG("network driver %zu %s returned %s",
O
Osier Yang 已提交
1173 1174 1175 1176 1177 1178
                  i, virNetworkDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1179 1180
            ret->networkDriver = virNetworkDriverTab[i];
            break;
O
Osier Yang 已提交
1181 1182
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1183
        }
1184
    }
1185

D
Daniel Veillard 已提交
1186
    for (i = 0; i < virInterfaceDriverTabCount; i++) {
1187
        res = virInterfaceDriverTab[i]->interfaceOpen(ret, auth, flags);
1188
        VIR_DEBUG("interface driver %zu %s returned %s",
O
Osier Yang 已提交
1189 1190 1191 1192 1193 1194
                  i, virInterfaceDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
D
Daniel Veillard 已提交
1195 1196
            ret->interfaceDriver = virInterfaceDriverTab[i];
            break;
O
Osier Yang 已提交
1197 1198
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
D
Daniel Veillard 已提交
1199 1200
        }
    }
1201 1202 1203

    /* Secondary driver for storage. Optional */
    for (i = 0; i < virStorageDriverTabCount; i++) {
1204
        res = virStorageDriverTab[i]->storageOpen(ret, auth, flags);
1205
        VIR_DEBUG("storage driver %zu %s returned %s",
O
Osier Yang 已提交
1206 1207 1208 1209 1210 1211
                  i, virStorageDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1212 1213
            ret->storageDriver = virStorageDriverTab[i];
            break;
O
Osier Yang 已提交
1214 1215
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1216 1217 1218
        }
    }

1219
    /* Node driver (optional) */
1220
    for (i = 0; i < virNodeDeviceDriverTabCount; i++) {
1221
        res = virNodeDeviceDriverTab[i]->nodeDeviceOpen(ret, auth, flags);
1222
        VIR_DEBUG("node driver %zu %s returned %s",
1223
                  i, virNodeDeviceDriverTab[i]->name,
O
Osier Yang 已提交
1224 1225 1226 1227 1228
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1229
            ret->nodeDeviceDriver = virNodeDeviceDriverTab[i];
1230
            break;
O
Osier Yang 已提交
1231 1232
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1233 1234 1235
        }
    }

1236 1237
    /* Secret manipulation driver. Optional */
    for (i = 0; i < virSecretDriverTabCount; i++) {
1238
        res = virSecretDriverTab[i]->secretOpen(ret, auth, flags);
1239
        VIR_DEBUG("secret driver %zu %s returned %s",
O
Osier Yang 已提交
1240 1241 1242 1243 1244 1245
                  i, virSecretDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1246 1247
            ret->secretDriver = virSecretDriverTab[i];
            break;
O
Osier Yang 已提交
1248 1249
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1250 1251 1252
        }
    }

S
Stefan Berger 已提交
1253 1254
    /* Network filter driver. Optional */
    for (i = 0; i < virNWFilterDriverTabCount; i++) {
1255
        res = virNWFilterDriverTab[i]->nwfilterOpen(ret, auth, flags);
1256
        VIR_DEBUG("nwfilter driver %zu %s returned %s",
O
Osier Yang 已提交
1257 1258 1259 1260 1261 1262
                  i, virNWFilterDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
S
Stefan Berger 已提交
1263 1264
            ret->nwfilterDriver = virNWFilterDriverTab[i];
            break;
O
Osier Yang 已提交
1265 1266
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
S
Stefan Berger 已提交
1267 1268 1269
        }
    }

1270 1271
    virConfFree(conf);

1272
    return ret;
1273

1274
 failed:
1275
    virConfFree(conf);
1276
    virObjectUnref(ret);
1277

1278
    return NULL;
1279 1280
}

1281

1282 1283
/**
 * virConnectOpen:
1284
 * @name: (optional) URI of the hypervisor
1285
 *
1286
 * This function should be called first to get a connection to the
1287 1288
 * Hypervisor and xen store
 *
1289 1290 1291 1292 1293
 * If @name is NULL, if the LIBVIRT_DEFAULT_URI environment variable is set,
 * then it will be used. Otherwise if the client configuration file
 * has the "uri_default" parameter set, then it will be used. Finally
 * probing will be done to determine a suitable default driver to activate.
 * This involves trying each hypervisor in turn until one successfully opens.
1294 1295 1296 1297 1298 1299
 *
 * If connecting to an unprivileged hypervisor driver which requires
 * the libvirtd daemon to be active, it will automatically be launched
 * if not already running. This can be prevented by setting the
 * environment variable LIBVIRT_AUTOSTART=0
 *
1300
 * URIs are documented at http://libvirt.org/uri.html
E
Eric Blake 已提交
1301 1302
 *
 * Returns a pointer to the hypervisor connection or NULL in case of error
1303 1304
 */
virConnectPtr
1305
virConnectOpen(const char *name)
1306
{
1307
    virConnectPtr ret = NULL;
1308 1309 1310

    if (virInitialize() < 0)
        goto error;
1311

1312
    VIR_DEBUG("name=%s", NULLSTR(name));
1313
    virResetLastError();
1314
    ret = do_open(name, NULL, 0);
1315 1316 1317 1318
    if (!ret)
        goto error;
    return ret;

1319
 error:
1320 1321
    virDispatchError(NULL);
    return NULL;
1322 1323
}

1324

1325
/**
1326
 * virConnectOpenReadOnly:
1327
 * @name: (optional) URI of the hypervisor
1328
 *
1329
 * This function should be called first to get a restricted connection to the
D
Daniel Veillard 已提交
1330
 * library functionalities. The set of APIs usable are then restricted
1331
 * on the available methods to control the domains.
1332
 *
1333 1334 1335
 * See virConnectOpen for notes about environment variables which can
 * have an effect on opening drivers
 *
1336
 * URIs are documented at http://libvirt.org/uri.html
E
Eric Blake 已提交
1337 1338
 *
 * Returns a pointer to the hypervisor connection or NULL in case of error
1339
 */
1340
virConnectPtr
1341 1342
virConnectOpenReadOnly(const char *name)
{
1343
    virConnectPtr ret = NULL;
1344 1345 1346

    if (virInitialize() < 0)
        goto error;
1347

1348
    VIR_DEBUG("name=%s", NULLSTR(name));
1349
    virResetLastError();
1350
    ret = do_open(name, NULL, VIR_CONNECT_RO);
1351 1352 1353 1354
    if (!ret)
        goto error;
    return ret;

1355
 error:
1356 1357
    virDispatchError(NULL);
    return NULL;
1358 1359
}

1360

1361 1362
/**
 * virConnectOpenAuth:
1363
 * @name: (optional) URI of the hypervisor
1364
 * @auth: Authenticate callback parameters
1365
 * @flags: bitwise-OR of virConnectFlags
1366
 *
1367
 * This function should be called first to get a connection to the
1368
 * Hypervisor. If necessary, authentication will be performed fetching
1369 1370
 * credentials via the callback
 *
1371 1372 1373
 * See virConnectOpen for notes about environment variables which can
 * have an effect on opening drivers
 *
1374
 * URIs are documented at http://libvirt.org/uri.html
E
Eric Blake 已提交
1375 1376
 *
 * Returns a pointer to the hypervisor connection or NULL in case of error
1377 1378 1379 1380
 */
virConnectPtr
virConnectOpenAuth(const char *name,
                   virConnectAuthPtr auth,
1381
                   unsigned int flags)
1382
{
1383
    virConnectPtr ret = NULL;
1384 1385 1386

    if (virInitialize() < 0)
        goto error;
1387

1388
    VIR_DEBUG("name=%s, auth=%p, flags=%x", NULLSTR(name), auth, flags);
1389
    virResetLastError();
1390
    ret = do_open(name, auth, flags);
1391 1392 1393 1394
    if (!ret)
        goto error;
    return ret;

1395
 error:
1396 1397
    virDispatchError(NULL);
    return NULL;
D
Daniel Veillard 已提交
1398 1399
}

1400

D
Daniel Veillard 已提交
1401
/**
1402
 * virConnectClose:
D
Daniel Veillard 已提交
1403 1404 1405 1406 1407 1408 1409
 * @conn: pointer to the hypervisor connection
 *
 * This function closes the connection to the Hypervisor. This should
 * not be called if further interaction with the Hypervisor are needed
 * especially if there is running domain which need further monitoring by
 * the application.
 *
1410 1411 1412 1413 1414 1415 1416 1417
 * Connections are reference counted; the count is explicitly
 * increased by the initial open (virConnectOpen, virConnectOpenAuth,
 * and the like) as well as virConnectRef; it is also temporarily
 * increased by other API that depend on the connection remaining
 * alive.  The open and every virConnectRef call should have a
 * matching virConnectClose, and all other references will be released
 * after the corresponding operation completes.
 *
1418 1419 1420 1421 1422 1423 1424 1425 1426 1427
 * Returns a positive number if at least 1 reference remains on
 * success. The returned value should not be assumed to be the total
 * reference count. A return of 0 implies no references remain and
 * the connection is closed and memory has been freed. A return of -1
 * implies a failure.
 *
 * It is possible for the last virConnectClose to return a positive
 * value if some other object still has a temporary reference to the
 * connection, but the application should not try to further use a
 * connection after the virConnectClose that matches the initial open.
D
Daniel Veillard 已提交
1428 1429
 */
int
1430 1431
virConnectClose(virConnectPtr conn)
{
1432
    VIR_DEBUG("conn=%p", conn);
1433

1434 1435
    virResetLastError();

1436
    virCheckConnectReturn(conn, -1);
1437

1438 1439 1440
    if (!virObjectUnref(conn))
        return 0;
    return 1;
D
Daniel Veillard 已提交
1441 1442
}

1443

1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457
/**
 * virConnectRef:
 * @conn: the connection to hold a reference on
 *
 * Increment the reference count on the connection. For each
 * additional call to this method, there shall be a corresponding
 * call to virConnectClose to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a connection would increment
 * the reference count.
D
Daniel Veillard 已提交
1458 1459
 *
 * Returns 0 in case of success, -1 in case of failure
1460 1461 1462 1463
 */
int
virConnectRef(virConnectPtr conn)
{
1464 1465
    VIR_DEBUG("conn=%p refs=%d", conn, conn ? conn->object.u.s.refs : 0);

1466 1467
    virResetLastError();

1468
    virCheckConnectReturn(conn, -1);
1469
    virObjectRef(conn);
1470 1471 1472
    return 0;
}

1473

D
Daniel Veillard 已提交
1474 1475
/*
 * Not for public use.  This function is part of the internal
1476 1477 1478
 * implementation of driver features in the remote case.
 */
int
1479
virConnectSupportsFeature(virConnectPtr conn, int feature)
1480
{
1481
    int ret;
1482
    VIR_DEBUG("conn=%p, feature=%d", conn, feature);
1483

1484 1485
    virResetLastError();

1486
    virCheckConnectReturn(conn, -1);
1487

1488
    if (!conn->driver->connectSupportsFeature)
1489 1490
        ret = 0;
    else
1491
        ret = conn->driver->connectSupportsFeature(conn, feature);
1492 1493

    if (ret < 0)
1494
        virDispatchError(conn);
1495

1496
    return ret;
1497 1498
}

1499

1500 1501 1502 1503
/**
 * virConnectGetType:
 * @conn: pointer to the hypervisor connection
 *
1504 1505 1506 1507 1508
 * Get the name of the Hypervisor driver used. This is merely the driver
 * name; for example, both KVM and QEMU guests are serviced by the
 * driver for the qemu:// URI, so a return of "QEMU" does not indicate
 * whether KVM acceleration is present.  For more details about the
 * hypervisor, use virConnectGetCapabilities().
1509 1510
 *
 * Returns NULL in case of error, a static zero terminated string otherwise.
1511 1512 1513
 *
 * See also:
 * http://www.redhat.com/archives/libvir-list/2007-February/msg00096.html
1514 1515
 */
const char *
1516 1517
virConnectGetType(virConnectPtr conn)
{
1518
    const char *ret;
1519
    VIR_DEBUG("conn=%p", conn);
1520

1521 1522
    virResetLastError();

1523
    virCheckConnectReturn(conn, NULL);
1524

1525 1526
    if (conn->driver->connectGetType) {
        ret = conn->driver->connectGetType(conn);
1527
        if (ret) return ret;
1528
    }
1529
    return conn->driver->name;
1530 1531
}

1532

D
Daniel Veillard 已提交
1533
/**
1534
 * virConnectGetVersion:
D
Daniel Veillard 已提交
1535
 * @conn: pointer to the hypervisor connection
1536
 * @hvVer: return value for the version of the running hypervisor (OUT)
D
Daniel Veillard 已提交
1537
 *
1538
 * Get the version level of the Hypervisor running. This may work only with
1539
 * hypervisor call, i.e. with privileged access to the hypervisor, not
1540
 * with a Read-Only connection.
D
Daniel Veillard 已提交
1541
 *
1542 1543 1544
 * Returns -1 in case of error, 0 otherwise. if the version can't be
 *    extracted by lack of capacities returns 0 and @hvVer is 0, otherwise
 *    @hvVer value is major * 1,000,000 + minor * 1,000 + release
D
Daniel Veillard 已提交
1545
 */
1546
int
1547 1548
virConnectGetVersion(virConnectPtr conn, unsigned long *hvVer)
{
1549
    VIR_DEBUG("conn=%p, hvVer=%p", conn, hvVer);
1550

1551 1552
    virResetLastError();

1553
    virCheckConnectReturn(conn, -1);
1554
    virCheckNonNullArgGoto(hvVer, error);
1555

1556 1557
    if (conn->driver->connectGetVersion) {
        int ret = conn->driver->connectGetVersion(conn, hvVer);
1558 1559 1560 1561
        if (ret < 0)
            goto error;
        return ret;
    }
D
Daniel P. Berrange 已提交
1562

1563
    virReportUnsupportedError();
1564

1565
 error:
1566
    virDispatchError(conn);
1567
    return -1;
1568 1569
}

1570

1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585
/**
 * virConnectGetLibVersion:
 * @conn: pointer to the hypervisor connection
 * @libVer: returns the libvirt library version used on the connection (OUT)
 *
 * Provides @libVer, which is the version of libvirt used by the
 *   daemon running on the @conn host
 *
 * Returns -1 in case of failure, 0 otherwise, and values for @libVer have
 *      the format major * 1,000,000 + minor * 1,000 + release.
 */
int
virConnectGetLibVersion(virConnectPtr conn, unsigned long *libVer)
{
    int ret = -1;
1586
    VIR_DEBUG("conn=%p, libVir=%p", conn, libVer);
1587 1588 1589

    virResetLastError();

1590
    virCheckConnectReturn(conn, -1);
1591
    virCheckNonNullArgGoto(libVer, error);
1592

1593 1594
    if (conn->driver->connectGetLibVersion) {
        ret = conn->driver->connectGetLibVersion(conn, libVer);
1595 1596 1597 1598 1599
        if (ret < 0)
            goto error;
        return ret;
    }

1600 1601 1602
    *libVer = LIBVIR_VERSION_NUMBER;
    return 0;

1603
 error:
1604
    virDispatchError(conn);
1605 1606 1607
    return ret;
}

1608

1609 1610 1611 1612
/**
 * virConnectGetHostname:
 * @conn: pointer to a hypervisor connection
 *
E
Eric Blake 已提交
1613 1614 1615 1616
 * This returns a system hostname on which the hypervisor is
 * running (based on the result of the gethostname system call, but
 * possibly expanded to a fully-qualified domain name via getaddrinfo).
 * If we are connected to a remote system, then this returns the
1617 1618 1619 1620 1621 1622
 * hostname of the remote system.
 *
 * Returns the hostname which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
1623
virConnectGetHostname(virConnectPtr conn)
1624
{
1625
    VIR_DEBUG("conn=%p", conn);
1626

1627 1628
    virResetLastError();

1629
    virCheckConnectReturn(conn, NULL);
1630

1631 1632
    if (conn->driver->connectGetHostname) {
        char *ret = conn->driver->connectGetHostname(conn);
1633 1634 1635 1636
        if (!ret)
            goto error;
        return ret;
    }
1637

1638
    virReportUnsupportedError();
1639

1640
 error:
1641
    virDispatchError(conn);
1642 1643 1644
    return NULL;
}

1645

1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661
/**
 * virConnectGetURI:
 * @conn: pointer to a hypervisor connection
 *
 * This returns the URI (name) of the hypervisor connection.
 * Normally this is the same as or similar to the string passed
 * to the virConnectOpen/virConnectOpenReadOnly call, but
 * the driver may make the URI canonical.  If name == NULL
 * was passed to virConnectOpen, then the driver will return
 * a non-NULL URI which can be used to connect to the same
 * hypervisor later.
 *
 * Returns the URI string which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
1662
virConnectGetURI(virConnectPtr conn)
1663
{
1664
    char *name;
1665
    VIR_DEBUG("conn=%p", conn);
1666

1667 1668
    virResetLastError();

1669
    virCheckConnectReturn(conn, NULL);
1670

1671
    if (!(name = virURIFormat(conn->uri)))
1672
        goto error;
1673

1674
    return name;
1675

1676
 error:
1677
    virDispatchError(conn);
1678
    return NULL;
1679 1680
}

1681

E
Eric Blake 已提交
1682 1683 1684
/**
 * virConnectGetSysinfo:
 * @conn: pointer to a hypervisor connection
1685
 * @flags: extra flags; not used yet, so callers should always pass 0
E
Eric Blake 已提交
1686 1687 1688 1689 1690 1691 1692 1693 1694 1695
 *
 * This returns the XML description of the sysinfo details for the
 * host on which the hypervisor is running, in the same format as the
 * <sysinfo> element of a domain XML.  This information is generally
 * available only for hypervisors running with root privileges.
 *
 * Returns the XML string which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
1696
virConnectGetSysinfo(virConnectPtr conn, unsigned int flags)
E
Eric Blake 已提交
1697
{
E
Eric Blake 已提交
1698
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
E
Eric Blake 已提交
1699 1700 1701

    virResetLastError();

1702
    virCheckConnectReturn(conn, NULL);
E
Eric Blake 已提交
1703

1704 1705
    if (conn->driver->connectGetSysinfo) {
        char *ret = conn->driver->connectGetSysinfo(conn, flags);
E
Eric Blake 已提交
1706 1707 1708 1709 1710
        if (!ret)
            goto error;
        return ret;
    }

1711
    virReportUnsupportedError();
E
Eric Blake 已提交
1712

1713
 error:
E
Eric Blake 已提交
1714 1715 1716 1717
    virDispatchError(conn);
    return NULL;
}

1718

1719 1720 1721 1722 1723
/**
 * virConnectGetMaxVcpus:
 * @conn: pointer to the hypervisor connection
 * @type: value of the 'type' attribute in the <domain> element
 *
1724
 * Provides the maximum number of virtual CPUs supported for a guest VM of a
1725 1726 1727 1728 1729 1730 1731 1732 1733
 * specific type. The 'type' parameter here corresponds to the 'type'
 * attribute in the <domain> element of the XML.
 *
 * Returns the maximum of virtual CPU or -1 in case of error.
 */
int
virConnectGetMaxVcpus(virConnectPtr conn,
                      const char *type)
{
1734
    VIR_DEBUG("conn=%p, type=%s", conn, type);
1735

1736 1737
    virResetLastError();

1738
    virCheckConnectReturn(conn, -1);
1739

1740 1741
    if (conn->driver->connectGetMaxVcpus) {
        int ret = conn->driver->connectGetMaxVcpus(conn, type);
1742 1743 1744 1745
        if (ret < 0)
            goto error;
        return ret;
    }
1746

1747
    virReportUnsupportedError();
1748
 error:
1749
    virDispatchError(conn);
1750
    return -1;
1751 1752
}

1753

1754
/**
1755
 * virConnectListDomains:
1756 1757 1758 1759
 * @conn: pointer to the hypervisor connection
 * @ids: array to collect the list of IDs of active domains
 * @maxids: size of @ids
 *
1760
 * Collect the list of active domains, and store their IDs in array @ids
1761
 *
1762 1763 1764 1765 1766 1767 1768 1769
 * For inactive domains, see virConnectListDefinedDomains().  For more
 * control over the results, see virConnectListAllDomains().
 *
 * Returns the number of domains found or -1 in case of error.  Note that
 * this command is inherently racy; a domain can be started between a
 * call to virConnectNumOfDomains() and this call; you are only guaranteed
 * that all currently active domains were listed if the return is less
 * than @maxids.
1770 1771
 */
int
1772 1773
virConnectListDomains(virConnectPtr conn, int *ids, int maxids)
{
1774
    VIR_DEBUG("conn=%p, ids=%p, maxids=%d", conn, ids, maxids);
1775

1776 1777
    virResetLastError();

1778
    virCheckConnectReturn(conn, -1);
1779 1780
    virCheckNonNullArgGoto(ids, error);
    virCheckNonNegativeArgGoto(maxids, error);
1781

1782 1783
    if (conn->driver->connectListDomains) {
        int ret = conn->driver->connectListDomains(conn, ids, maxids);
1784 1785 1786 1787
        if (ret < 0)
            goto error;
        return ret;
    }
1788

1789
    virReportUnsupportedError();
1790
 error:
1791
    virDispatchError(conn);
1792
    return -1;
D
Daniel Veillard 已提交
1793 1794
}

1795

K
 
Karel Zak 已提交
1796 1797 1798 1799
/**
 * virConnectNumOfDomains:
 * @conn: pointer to the hypervisor connection
 *
1800 1801
 * Provides the number of active domains.
 *
K
 
Karel Zak 已提交
1802 1803 1804
 * Returns the number of domain found or -1 in case of error
 */
int
1805 1806
virConnectNumOfDomains(virConnectPtr conn)
{
1807
    VIR_DEBUG("conn=%p", conn);
1808

1809 1810
    virResetLastError();

1811
    virCheckConnectReturn(conn, -1);
K
Karel Zak 已提交
1812

1813 1814
    if (conn->driver->connectNumOfDomains) {
        int ret = conn->driver->connectNumOfDomains(conn);
1815 1816 1817 1818
        if (ret < 0)
            goto error;
        return ret;
    }
1819

1820
    virReportUnsupportedError();
1821
 error:
1822
    virDispatchError(conn);
1823
    return -1;
K
 
Karel Zak 已提交
1824 1825
}

1826

1827 1828 1829 1830
/**
 * virDomainGetConnect:
 * @dom: pointer to a domain
 *
1831
 * Provides the connection pointer associated with a domain.  The
1832 1833 1834
 * reference counter on the connection is not increased by this
 * call.
 *
1835 1836 1837 1838
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the domain object together.
 *
1839 1840 1841
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
1842
virDomainGetConnect(virDomainPtr dom)
1843
{
1844
    VIR_DOMAIN_DEBUG(dom);
1845

1846 1847
    virResetLastError();

1848 1849
    virCheckDomainReturn(dom, NULL);

1850 1851 1852
    return dom->conn;
}

1853

D
Daniel Veillard 已提交
1854
/**
1855
 * virDomainCreateXML:
D
Daniel Veillard 已提交
1856
 * @conn: pointer to the hypervisor connection
D
Daniel Veillard 已提交
1857
 * @xmlDesc: string containing an XML description of the domain
1858
 * @flags: bitwise-OR of supported virDomainCreateFlags
D
Daniel Veillard 已提交
1859
 *
1860
 * Launch a new guest domain, based on an XML description similar
1861
 * to the one returned by virDomainGetXMLDesc()
1862
 * This function may require privileged access to the hypervisor.
1863 1864 1865
 * The domain is not persistent, so its definition will disappear when it
 * is destroyed, or if the host is restarted (see virDomainDefineXML() to
 * define persistent domains).
1866
 *
1867 1868 1869 1870 1871 1872 1873
 * If the VIR_DOMAIN_START_PAUSED flag is set, the guest domain
 * will be started, but its CPUs will remain paused. The CPUs
 * can later be manually started using virDomainResume.
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
E
Eric Blake 已提交
1874
 * client application crashes / loses its connection to the
1875
 * libvirtd daemon. Any domains marked for auto destroy will
1876
 * block attempts at migration, save-to-file, or snapshots.
1877
 *
D
Daniel Veillard 已提交
1878 1879
 * Returns a new domain object or NULL in case of failure
 */
1880
virDomainPtr
1881 1882
virDomainCreateXML(virConnectPtr conn, const char *xmlDesc,
                   unsigned int flags)
1883
{
1884
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
1885

1886 1887
    virResetLastError();

1888
    virCheckConnectReturn(conn, NULL);
1889
    virCheckNonNullArgGoto(xmlDesc, error);
1890
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
1891

1892 1893
    if (conn->driver->domainCreateXML) {
        virDomainPtr ret;
1894
        ret = conn->driver->domainCreateXML(conn, xmlDesc, flags);
1895 1896 1897 1898
        if (!ret)
            goto error;
        return ret;
    }
1899

1900
    virReportUnsupportedError();
1901
 error:
1902
    virDispatchError(conn);
1903
    return NULL;
D
Daniel Veillard 已提交
1904 1905
}

1906

1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952
/**
 * virDomainCreateXMLWithFiles:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: string containing an XML description of the domain
 * @nfiles: number of file descriptors passed
 * @files: list of file descriptors passed
 * @flags: bitwise-OR of supported virDomainCreateFlags
 *
 * Launch a new guest domain, based on an XML description similar
 * to the one returned by virDomainGetXMLDesc()
 * This function may require privileged access to the hypervisor.
 * The domain is not persistent, so its definition will disappear when it
 * is destroyed, or if the host is restarted (see virDomainDefineXML() to
 * define persistent domains).
 *
 * @files provides an array of file descriptors which will be
 * made available to the 'init' process of the guest. The file
 * handles exposed to the guest will be renumbered to start
 * from 3 (ie immediately following stderr). This is only
 * supported for guests which use container based virtualization
 * technology.
 *
 * If the VIR_DOMAIN_START_PAUSED flag is set, the guest domain
 * will be started, but its CPUs will remain paused. The CPUs
 * can later be manually started using virDomainResume.
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
 * client application crashes / loses its connection to the
 * libvirtd daemon. Any domains marked for auto destroy will
 * block attempts at migration, save-to-file, or snapshots.
 *
 * Returns a new domain object or NULL in case of failure
 */
virDomainPtr
virDomainCreateXMLWithFiles(virConnectPtr conn, const char *xmlDesc,
                            unsigned int nfiles,
                            int *files,
                            unsigned int flags)
{
    VIR_DEBUG("conn=%p, xmlDesc=%s, nfiles=%u, files=%p, flags=%x",
              conn, xmlDesc, nfiles, files, flags);

    virResetLastError();

1953
    virCheckConnectReturn(conn, NULL);
1954
    virCheckNonNullArgGoto(xmlDesc, error);
1955
    virCheckReadOnlyGoto(conn->flags, error);
1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966

    if (conn->driver->domainCreateXMLWithFiles) {
        virDomainPtr ret;
        ret = conn->driver->domainCreateXMLWithFiles(conn, xmlDesc,
                                                     nfiles, files,
                                                     flags);
        if (!ret)
            goto error;
        return ret;
    }

1967
    virReportUnsupportedError();
1968
 error:
1969 1970 1971 1972
    virDispatchError(conn);
    return NULL;
}

1973

1974 1975 1976 1977
/**
 * virDomainCreateLinux:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: string containing an XML description of the domain
1978
 * @flags: extra flags; not used yet, so callers should always pass 0
1979 1980 1981
 *
 * Deprecated after 0.4.6.
 * Renamed to virDomainCreateXML() providing identical functionality.
1982
 * This existing name will left indefinitely for API compatibility.
1983 1984 1985 1986 1987 1988 1989
 *
 * Returns a new domain object or NULL in case of failure
 */
virDomainPtr
virDomainCreateLinux(virConnectPtr conn, const char *xmlDesc,
                     unsigned int flags)
{
1990
    return virDomainCreateXML(conn, xmlDesc, flags);
1991
}
1992

1993

1994
/**
1995
 * virDomainLookupByID:
1996 1997 1998 1999
 * @conn: pointer to the hypervisor connection
 * @id: the domain ID number
 *
 * Try to find a domain based on the hypervisor ID number
D
Daniel Veillard 已提交
2000 2001
 * Note that this won't work for inactive domains which have an ID of -1,
 * in that case a lookup based on the Name or UUId need to be done instead.
2002
 *
2003 2004
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
2005
 */
2006
virDomainPtr
2007 2008
virDomainLookupByID(virConnectPtr conn, int id)
{
2009
    VIR_DEBUG("conn=%p, id=%d", conn, id);
2010

2011 2012
    virResetLastError();

2013
    virCheckConnectReturn(conn, NULL);
2014
    virCheckNonNegativeArgGoto(id, error);
2015

2016 2017
    if (conn->driver->domainLookupByID) {
        virDomainPtr ret;
2018
        ret = conn->driver->domainLookupByID(conn, id);
2019 2020 2021 2022
        if (!ret)
            goto error;
        return ret;
    }
2023

2024
    virReportUnsupportedError();
2025

2026
 error:
2027
    virDispatchError(conn);
2028
    return NULL;
2029 2030
}

2031

2032 2033 2034
/**
 * virDomainLookupByUUID:
 * @conn: pointer to the hypervisor connection
K
Karel Zak 已提交
2035
 * @uuid: the raw UUID for the domain
2036 2037 2038
 *
 * Try to lookup a domain on the given hypervisor based on its UUID.
 *
2039 2040
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
2041 2042
 */
virDomainPtr
2043 2044
virDomainLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
{
2045
    VIR_UUID_DEBUG(conn, uuid);
2046

2047 2048
    virResetLastError();

2049
    virCheckConnectReturn(conn, NULL);
2050
    virCheckNonNullArgGoto(uuid, error);
2051

2052 2053
    if (conn->driver->domainLookupByUUID) {
        virDomainPtr ret;
2054
        ret = conn->driver->domainLookupByUUID(conn, uuid);
2055 2056 2057 2058
        if (!ret)
            goto error;
        return ret;
    }
2059

2060
    virReportUnsupportedError();
2061

2062
 error:
2063
    virDispatchError(conn);
2064
    return NULL;
2065 2066
}

2067

K
Karel Zak 已提交
2068 2069 2070 2071 2072 2073 2074
/**
 * virDomainLookupByUUIDString:
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the domain
 *
 * Try to lookup a domain on the given hypervisor based on its UUID.
 *
2075 2076
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
K
Karel Zak 已提交
2077 2078 2079 2080
 */
virDomainPtr
virDomainLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
2081
    unsigned char uuid[VIR_UUID_BUFLEN];
2082
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
2083

2084 2085
    virResetLastError();

2086
    virCheckConnectReturn(conn, NULL);
2087
    virCheckNonNullArgGoto(uuidstr, error);
2088 2089

    if (virUUIDParse(uuidstr, uuid) < 0) {
2090 2091 2092
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
2093
        goto error;
K
Karel Zak 已提交
2094
    }
2095

K
Karel Zak 已提交
2096
    return virDomainLookupByUUID(conn, &uuid[0]);
2097

2098
 error:
2099
    virDispatchError(conn);
2100
    return NULL;
K
Karel Zak 已提交
2101 2102
}

2103

2104 2105 2106 2107 2108
/**
 * virDomainLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the domain
 *
2109
 * Try to lookup a domain on the given hypervisor based on its name.
2110
 *
2111 2112
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
2113 2114
 */
virDomainPtr
2115 2116
virDomainLookupByName(virConnectPtr conn, const char *name)
{
2117
    VIR_DEBUG("conn=%p, name=%s", conn, name);
2118

2119 2120
    virResetLastError();

2121
    virCheckConnectReturn(conn, NULL);
2122
    virCheckNonNullArgGoto(name, error);
2123

2124 2125
    if (conn->driver->domainLookupByName) {
        virDomainPtr dom;
2126
        dom = conn->driver->domainLookupByName(conn, name);
2127 2128 2129 2130
        if (!dom)
            goto error;
        return dom;
    }
2131

2132
    virReportUnsupportedError();
2133

2134
 error:
2135
    virDispatchError(conn);
2136
    return NULL;
2137 2138
}

2139

D
Daniel Veillard 已提交
2140
/**
2141
 * virDomainDestroy:
D
Daniel Veillard 已提交
2142 2143 2144
 * @domain: a domain object
 *
 * Destroy the domain object. The running instance is shutdown if not down
2145 2146
 * already and all resources used by it are given back to the hypervisor. This
 * does not free the associated virDomainPtr object.
2147
 * This function may require privileged access.
D
Daniel Veillard 已提交
2148
 *
2149 2150
 * virDomainDestroy first requests that a guest terminate
 * (e.g. SIGTERM), then waits for it to comply. After a reasonable
2151
 * timeout, if the guest still exists, virDomainDestroy will
2152 2153 2154 2155 2156 2157
 * forcefully terminate the guest (e.g. SIGKILL) if necessary (which
 * may produce undesirable results, for example unflushed disk cache
 * in the guest). To avoid this possibility, it's recommended to
 * instead call virDomainDestroyFlags, sending the
 * VIR_DOMAIN_DESTROY_GRACEFUL flag.
 *
2158 2159 2160 2161
 * If the domain is transient and has any snapshot metadata (see
 * virDomainSnapshotNum()), then that metadata will automatically
 * be deleted when the domain quits.
 *
D
Daniel Veillard 已提交
2162
 * Returns 0 in case of success and -1 in case of failure.
2163
 */
D
Daniel Veillard 已提交
2164
int
2165 2166
virDomainDestroy(virDomainPtr domain)
{
2167
    virConnectPtr conn;
2168

2169
    VIR_DOMAIN_DEBUG(domain);
2170

2171 2172
    virResetLastError();

2173
    virCheckDomainReturn(domain, -1);
2174
    conn = domain->conn;
2175

2176
    virCheckReadOnlyGoto(conn->flags, error);
2177

2178 2179
    if (conn->driver->domainDestroy) {
        int ret;
2180
        ret = conn->driver->domainDestroy(domain);
2181 2182 2183 2184
        if (ret < 0)
            goto error;
        return ret;
    }
2185

2186
    virReportUnsupportedError();
2187

2188
 error:
2189
    virDispatchError(conn);
2190
    return -1;
2191 2192
}

2193

2194 2195 2196
/**
 * virDomainDestroyFlags:
 * @domain: a domain object
2197
 * @flags: bitwise-OR of virDomainDestroyFlagsValues
2198 2199 2200 2201 2202 2203
 *
 * Destroy the domain object. The running instance is shutdown if not down
 * already and all resources used by it are given back to the hypervisor.
 * This does not free the associated virDomainPtr object.
 * This function may require privileged access.
 *
2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219
 * Calling this function with no @flags set (equal to zero) is
 * equivalent to calling virDomainDestroy, and after a reasonable
 * timeout will forcefully terminate the guest (e.g. SIGKILL) if
 * necessary (which may produce undesirable results, for example
 * unflushed disk cache in the guest). Including
 * VIR_DOMAIN_DESTROY_GRACEFUL in the flags will prevent the forceful
 * termination of the guest, and virDomainDestroyFlags will instead
 * return an error if the guest doesn't terminate by the end of the
 * timeout; at that time, the management application can decide if
 * calling again without VIR_DOMAIN_DESTROY_GRACEFUL is appropriate.
 *
 * Another alternative which may produce cleaner results for the
 * guest's disks is to use virDomainShutdown() instead, but that
 * depends on guest support (some hypervisor/guest combinations may
 * ignore the shutdown request).
 *
2220 2221 2222 2223 2224 2225 2226 2227 2228
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainDestroyFlags(virDomainPtr domain,
                      unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
2229
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
2230 2231 2232

    virResetLastError();

2233
    virCheckDomainReturn(domain, -1);
2234
    conn = domain->conn;
2235

2236
    virCheckReadOnlyGoto(conn->flags, error);
2237 2238 2239 2240 2241 2242 2243 2244 2245

    if (conn->driver->domainDestroyFlags) {
        int ret;
        ret = conn->driver->domainDestroyFlags(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

2246
    virReportUnsupportedError();
2247

2248
 error:
2249 2250 2251 2252
    virDispatchError(conn);
    return -1;
}

2253

2254 2255 2256 2257 2258 2259 2260 2261 2262 2263
/**
 * virDomainFree:
 * @domain: a domain object
 *
 * Free the domain object. The running instance is kept alive.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2264 2265
virDomainFree(virDomainPtr domain)
{
2266
    VIR_DOMAIN_DEBUG(domain);
2267

2268 2269
    virResetLastError();

2270 2271
    virCheckDomainReturn(domain, -1);

2272
    virObjectUnref(domain);
2273
    return 0;
D
Daniel Veillard 已提交
2274 2275
}

2276

2277 2278
/**
 * virDomainRef:
D
Daniel Veillard 已提交
2279
 * @domain: the domain to hold a reference on
2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290
 *
 * Increment the reference count on the domain. For each
 * additional call to this method, there shall be a corresponding
 * call to virDomainFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a domain would increment
 * the reference count.
D
Daniel Veillard 已提交
2291 2292
 *
 * Returns 0 in case of success and -1 in case of failure.
2293 2294 2295 2296
 */
int
virDomainRef(virDomainPtr domain)
{
2297 2298
    VIR_DOMAIN_DEBUG(domain, "refs=%d", domain ? domain->object.u.s.refs : 0);

2299 2300
    virResetLastError();

2301
    virCheckDomainReturn(domain, -1);
2302 2303

    virObjectRef(domain);
2304 2305 2306 2307
    return 0;
}


D
Daniel Veillard 已提交
2308
/**
2309
 * virDomainSuspend:
D
Daniel Veillard 已提交
2310 2311 2312
 * @domain: a domain object
 *
 * Suspends an active domain, the process is frozen without further access
2313
 * to CPU resources and I/O but the memory used by the domain at the
2314
 * hypervisor level will stay allocated. Use virDomainResume() to reactivate
D
Daniel Veillard 已提交
2315
 * the domain.
2316
 * This function may require privileged access.
2317 2318
 * Moreover, suspend may not be supported if domain is in some
 * special state like VIR_DOMAIN_PMSUSPENDED.
D
Daniel Veillard 已提交
2319 2320 2321 2322
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2323 2324
virDomainSuspend(virDomainPtr domain)
{
2325
    virConnectPtr conn;
2326

2327
    VIR_DOMAIN_DEBUG(domain);
2328

2329 2330
    virResetLastError();

2331
    virCheckDomainReturn(domain, -1);
2332 2333
    conn = domain->conn;

2334 2335
    virCheckReadOnlyGoto(conn->flags, error);

2336 2337
    if (conn->driver->domainSuspend) {
        int ret;
2338
        ret = conn->driver->domainSuspend(domain);
2339 2340 2341 2342
        if (ret < 0)
            goto error;
        return ret;
    }
2343

2344
    virReportUnsupportedError();
2345

2346
 error:
2347
    virDispatchError(domain->conn);
2348
    return -1;
D
Daniel Veillard 已提交
2349 2350
}

2351

D
Daniel Veillard 已提交
2352
/**
2353
 * virDomainResume:
D
Daniel Veillard 已提交
2354 2355
 * @domain: a domain object
 *
D
Dan Kenigsberg 已提交
2356
 * Resume a suspended domain, the process is restarted from the state where
2357
 * it was frozen by calling virDomainSuspend().
2358
 * This function may require privileged access
2359 2360
 * Moreover, resume may not be supported if domain is in some
 * special state like VIR_DOMAIN_PMSUSPENDED.
D
Daniel Veillard 已提交
2361 2362 2363 2364
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2365 2366
virDomainResume(virDomainPtr domain)
{
2367
    virConnectPtr conn;
2368

2369
    VIR_DOMAIN_DEBUG(domain);
2370

2371 2372
    virResetLastError();

2373
    virCheckDomainReturn(domain, -1);
2374 2375
    conn = domain->conn;

2376 2377
    virCheckReadOnlyGoto(conn->flags, error);

2378 2379
    if (conn->driver->domainResume) {
        int ret;
2380
        ret = conn->driver->domainResume(domain);
2381 2382 2383 2384
        if (ret < 0)
            goto error;
        return ret;
    }
2385

2386
    virReportUnsupportedError();
2387

2388
 error:
2389
    virDispatchError(domain->conn);
2390
    return -1;
D
Daniel Veillard 已提交
2391 2392
}

2393

2394 2395 2396
/**
 * virDomainPMSuspendForDuration:
 * @dom: a domain object
2397 2398 2399
 * @target: a value from virNodeSuspendTarget
 * @duration: duration in seconds to suspend, or 0 for indefinite
 * @flags: extra flags; not used yet, so callers should always pass 0
2400
 *
2401 2402 2403 2404 2405
 * Attempt to have the guest enter the given @target power management
 * suspension level.  If @duration is non-zero, also schedule the guest to
 * resume normal operation after that many seconds, if nothing else has
 * resumed it earlier.  Some hypervisors require that @duration be 0, for
 * an indefinite suspension.
2406
 *
2407
 * Dependent on hypervisor used, this may require a
2408 2409
 * guest agent to be available, e.g. QEMU.
 *
2410 2411 2412 2413 2414 2415 2416
 * Beware that at least for QEMU, the domain's process will be terminated
 * when VIR_NODE_SUSPEND_TARGET_DISK is used and a new process will be
 * launched when libvirt is asked to wake up the domain. As a result of
 * this, any runtime changes, such as device hotplug or memory settings,
 * are lost unless such changes were made with VIR_DOMAIN_AFFECT_CONFIG
 * flag.
 *
2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432
 * Returns: 0 on success,
 *          -1 on failure.
 */
int
virDomainPMSuspendForDuration(virDomainPtr dom,
                              unsigned int target,
                              unsigned long long duration,
                              unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "target=%u duration=%llu flags=%x",
                     target, duration, flags);

    virResetLastError();

2433
    virCheckDomainReturn(dom, -1);
2434 2435
    conn = dom->conn;

2436
    virCheckReadOnlyGoto(conn->flags, error);
2437 2438 2439 2440 2441 2442 2443 2444 2445 2446

    if (conn->driver->domainPMSuspendForDuration) {
        int ret;
        ret = conn->driver->domainPMSuspendForDuration(dom, target,
                                                       duration, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

2447
    virReportUnsupportedError();
2448

2449
 error:
2450 2451 2452 2453
    virDispatchError(conn);
    return -1;
}

2454

2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476
/**
 * virDomainPMWakeup:
 * @dom: a domain object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Inject a wakeup into the guest that previously used
 * virDomainPMSuspendForDuration, rather than waiting for the
 * previously requested duration (if any) to elapse.
 *
 * Returns: 0 on success,
 *          -1 on failure.
 */
int
virDomainPMWakeup(virDomainPtr dom,
                  unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);

    virResetLastError();

2477
    virCheckDomainReturn(dom, -1);
2478 2479
    conn = dom->conn;

2480
    virCheckReadOnlyGoto(conn->flags, error);
2481 2482 2483 2484 2485 2486 2487 2488 2489

    if (conn->driver->domainPMWakeup) {
        int ret;
        ret = conn->driver->domainPMWakeup(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

2490
    virReportUnsupportedError();
2491

2492
 error:
2493 2494 2495 2496
    virDispatchError(conn);
    return -1;
}

2497

2498 2499 2500 2501 2502 2503
/**
 * virDomainSave:
 * @domain: a domain object
 * @to: path for the output file
 *
 * This method will suspend a domain and save its memory contents to
2504
 * a file on disk. After the call, if successful, the domain is not
2505
 * listed as running anymore (this ends the life of a transient domain).
2506
 * Use virDomainRestore() to restore a domain after saving.
2507
 *
2508 2509 2510
 * See virDomainSaveFlags() for more control.  Also, a save file can
 * be inspected or modified slightly with virDomainSaveImageGetXMLDesc()
 * and virDomainSaveImageDefineXML().
2511
 *
2512 2513 2514
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2515 2516
virDomainSave(virDomainPtr domain, const char *to)
{
2517
    virConnectPtr conn;
2518 2519

    VIR_DOMAIN_DEBUG(domain, "to=%s", to);
2520

2521 2522
    virResetLastError();

2523
    virCheckDomainReturn(domain, -1);
2524
    conn = domain->conn;
2525 2526

    virCheckReadOnlyGoto(conn->flags, error);
2527
    virCheckNonNullArgGoto(to, error);
2528

2529 2530 2531
    if (conn->driver->domainSave) {
        int ret;
        char *absolute_to;
2532

2533 2534
        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
2535 2536
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute output file path"));
2537 2538
            goto error;
        }
2539

2540 2541 2542
        ret = conn->driver->domainSave(domain, absolute_to);

        VIR_FREE(absolute_to);
2543

2544 2545 2546 2547
        if (ret < 0)
            goto error;
        return ret;
    }
2548

2549
    virReportUnsupportedError();
2550

2551
 error:
2552
    virDispatchError(domain->conn);
2553
    return -1;
2554 2555
}

2556

2557 2558 2559 2560 2561 2562 2563 2564 2565
/**
 * virDomainSaveFlags:
 * @domain: a domain object
 * @to: path for the output file
 * @dxml: (optional) XML config for adjusting guest xml used on restore
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
 *
 * This method will suspend a domain and save its memory contents to
 * a file on disk. After the call, if successful, the domain is not
2566
 * listed as running anymore (this ends the life of a transient domain).
2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579 2580
 * Use virDomainRestore() to restore a domain after saving.
 *
 * If the hypervisor supports it, @dxml can be used to alter
 * host-specific portions of the domain XML that will be used when
 * restoring an image.  For example, it is possible to alter the
 * backing filename that is associated with a disk device, in order to
 * prepare for file renaming done as part of backing up the disk
 * device while the domain is stopped.
 *
 * If @flags includes VIR_DOMAIN_SAVE_BYPASS_CACHE, then libvirt will
 * attempt to bypass the file system cache while creating the file, or
 * fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
2581 2582 2583 2584 2585 2586
 * Normally, the saved state file will remember whether the domain was
 * running or paused, and restore defaults to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override what state gets saved into the file.  These
 * two flags are mutually exclusive.
 *
2587 2588 2589
 * A save file can be inspected or modified slightly with
 * virDomainSaveImageGetXMLDesc() and virDomainSaveImageDefineXML().
 *
E
Eric Blake 已提交
2590 2591 2592 2593
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation; in that case, use virDomainBlockJobAbort()
 * to stop the block copy first.
 *
2594 2595 2596 2597 2598 2599 2600 2601
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSaveFlags(virDomainPtr domain, const char *to,
                   const char *dxml, unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
2602
    VIR_DOMAIN_DEBUG(domain, "to=%s, dxml=%s, flags=%x",
2603 2604 2605 2606
                     to, NULLSTR(dxml), flags);

    virResetLastError();

2607
    virCheckDomainReturn(domain, -1);
2608
    conn = domain->conn;
2609 2610

    virCheckReadOnlyGoto(conn->flags, error);
2611
    virCheckNonNullArgGoto(to, error);
2612

2613
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
2614
        virReportInvalidArg(flags, "%s",
2615 2616
                            _("running and paused flags are mutually "
                              "exclusive"));
2617 2618 2619
        goto error;
    }

2620 2621 2622 2623 2624 2625
    if (conn->driver->domainSaveFlags) {
        int ret;
        char *absolute_to;

        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
2626 2627
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute output file path"));
2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639
            goto error;
        }

        ret = conn->driver->domainSaveFlags(domain, absolute_to, dxml, flags);

        VIR_FREE(absolute_to);

        if (ret < 0)
            goto error;
        return ret;
    }

2640
    virReportUnsupportedError();
2641

2642
 error:
2643 2644 2645 2646
    virDispatchError(domain->conn);
    return -1;
}

2647

2648 2649
/**
 * virDomainRestore:
2650
 * @conn: pointer to the hypervisor connection
2651
 * @from: path to the input file
2652 2653 2654
 *
 * This method will restore a domain saved to disk by virDomainSave().
 *
2655 2656
 * See virDomainRestoreFlags() for more control.
 *
2657 2658 2659
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2660 2661
virDomainRestore(virConnectPtr conn, const char *from)
{
2662
    VIR_DEBUG("conn=%p, from=%s", conn, from);
2663

2664 2665
    virResetLastError();

2666
    virCheckConnectReturn(conn, -1);
2667
    virCheckReadOnlyGoto(conn->flags, error);
2668
    virCheckNonNullArgGoto(from, error);
D
Daniel Veillard 已提交
2669

2670 2671 2672
    if (conn->driver->domainRestore) {
        int ret;
        char *absolute_from;
2673

2674 2675
        /* We must absolutize the file path as the restore is done out of process */
        if (virFileAbsPath(from, &absolute_from) < 0) {
2676 2677
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2678 2679
            goto error;
        }
2680

2681 2682 2683 2684
        ret = conn->driver->domainRestore(conn, absolute_from);

        VIR_FREE(absolute_from);

2685 2686 2687 2688
        if (ret < 0)
            goto error;
        return ret;
    }
2689

2690
    virReportUnsupportedError();
2691

2692
 error:
2693
    virDispatchError(conn);
2694
    return -1;
D
Daniel Veillard 已提交
2695 2696
}

2697

2698 2699 2700 2701 2702 2703 2704 2705 2706 2707 2708 2709 2710 2711 2712 2713 2714 2715 2716
/**
 * virDomainRestoreFlags:
 * @conn: pointer to the hypervisor connection
 * @from: path to the input file
 * @dxml: (optional) XML config for adjusting guest xml used on restore
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
 *
 * This method will restore a domain saved to disk by virDomainSave().
 *
 * If the hypervisor supports it, @dxml can be used to alter
 * host-specific portions of the domain XML that will be used when
 * restoring an image.  For example, it is possible to alter the
 * backing filename that is associated with a disk device, in order to
 * prepare for file renaming done as part of backing up the disk
 * device while the domain is stopped.
 *
 * If @flags includes VIR_DOMAIN_SAVE_BYPASS_CACHE, then libvirt will
 * attempt to bypass the file system cache while restoring the file, or
 * fail if it cannot do so for the given system; this can allow less
2717
 * pressure on file system cache, but also risks slowing restores from NFS.
2718
 *
2719 2720 2721 2722 2723 2724
 * Normally, the saved state file will remember whether the domain was
 * running or paused, and restore defaults to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override the default read from the file.  These two
 * flags are mutually exclusive.
 *
2725 2726 2727 2728
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainRestoreFlags(virConnectPtr conn, const char *from, const char *dxml,
2729
                      unsigned int flags)
2730 2731 2732 2733 2734 2735
{
    VIR_DEBUG("conn=%p, from=%s, dxml=%s, flags=%x",
              conn, from, NULLSTR(dxml), flags);

    virResetLastError();

2736
    virCheckConnectReturn(conn, -1);
2737
    virCheckReadOnlyGoto(conn->flags, error);
2738
    virCheckNonNullArgGoto(from, error);
2739

2740
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
2741
        virReportInvalidArg(flags, "%s",
2742 2743
                            _("running and paused flags are mutually "
                              "exclusive"));
2744 2745 2746
        goto error;
    }

2747 2748 2749 2750 2751 2752
    if (conn->driver->domainRestoreFlags) {
        int ret;
        char *absolute_from;

        /* We must absolutize the file path as the restore is done out of process */
        if (virFileAbsPath(from, &absolute_from) < 0) {
2753 2754
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767
            goto error;
        }

        ret = conn->driver->domainRestoreFlags(conn, absolute_from, dxml,
                                               flags);

        VIR_FREE(absolute_from);

        if (ret < 0)
            goto error;
        return ret;
    }

2768
    virReportUnsupportedError();
2769

2770
 error:
2771 2772 2773 2774
    virDispatchError(conn);
    return -1;
}

2775

2776 2777 2778 2779 2780 2781 2782 2783 2784 2785 2786 2787 2788 2789 2790 2791 2792 2793 2794 2795 2796 2797 2798 2799 2800 2801 2802
/**
 * virDomainSaveImageGetXMLDesc:
 * @conn: pointer to the hypervisor connection
 * @file: path to saved state file
 * @flags: bitwise-OR of subset of virDomainXMLFlags
 *
 * This method will extract the XML describing the domain at the time
 * a saved state file was created.  @file must be a file created
 * previously by virDomainSave() or virDomainSaveFlags().
 *
 * No security-sensitive data will be included unless @flags contains
 * VIR_DOMAIN_XML_SECURE; this flag is rejected on read-only
 * connections.  For this API, @flags should not contain either
 * VIR_DOMAIN_XML_INACTIVE or VIR_DOMAIN_XML_UPDATE_CPU.
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of
 * error.  The caller must free() the returned value.
 */
char *
virDomainSaveImageGetXMLDesc(virConnectPtr conn, const char *file,
                             unsigned int flags)
{
    VIR_DEBUG("conn=%p, file=%s, flags=%x",
              conn, file, flags);

    virResetLastError();

2803
    virCheckConnectReturn(conn, NULL);
2804
    virCheckNonNullArgGoto(file, error);
2805 2806

    if ((conn->flags & VIR_CONNECT_RO) && (flags & VIR_DOMAIN_XML_SECURE)) {
2807 2808
        virReportError(VIR_ERR_OPERATION_DENIED, "%s",
                       _("virDomainSaveImageGetXMLDesc with secure flag"));
2809 2810 2811 2812 2813 2814 2815 2816 2817
        goto error;
    }

    if (conn->driver->domainSaveImageGetXMLDesc) {
        char *ret;
        char *absolute_file;

        /* We must absolutize the file path as the read is done out of process */
        if (virFileAbsPath(file, &absolute_file) < 0) {
2818 2819
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2820 2821 2822 2823 2824 2825 2826 2827 2828 2829 2830 2831 2832
            goto error;
        }

        ret = conn->driver->domainSaveImageGetXMLDesc(conn, absolute_file,
                                                      flags);

        VIR_FREE(absolute_file);

        if (!ret)
            goto error;
        return ret;
    }

2833
    virReportUnsupportedError();
2834

2835
 error:
2836 2837 2838 2839
    virDispatchError(conn);
    return NULL;
}

2840

2841 2842 2843 2844 2845
/**
 * virDomainSaveImageDefineXML:
 * @conn: pointer to the hypervisor connection
 * @file: path to saved state file
 * @dxml: XML config for adjusting guest xml used on restore
2846
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
2847 2848 2849 2850 2851 2852 2853 2854 2855 2856 2857
 *
 * This updates the definition of a domain stored in a saved state
 * file.  @file must be a file created previously by virDomainSave()
 * or virDomainSaveFlags().
 *
 * @dxml can be used to alter host-specific portions of the domain XML
 * that will be used when restoring an image.  For example, it is
 * possible to alter the backing filename that is associated with a
 * disk device, to match renaming done as part of backing up the disk
 * device while the domain is stopped.
 *
2858 2859 2860 2861 2862 2863 2864
 * Normally, the saved state file will remember whether the domain was
 * running or paused, and restore defaults to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override the default saved into the file; omitting both
 * leaves the file's default unchanged.  These two flags are mutually
 * exclusive.
 *
2865 2866 2867 2868 2869 2870 2871 2872 2873 2874 2875
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSaveImageDefineXML(virConnectPtr conn, const char *file,
                            const char *dxml, unsigned int flags)
{
    VIR_DEBUG("conn=%p, file=%s, dxml=%s, flags=%x",
              conn, file, dxml, flags);

    virResetLastError();

2876
    virCheckConnectReturn(conn, -1);
2877
    virCheckReadOnlyGoto(conn->flags, error);
2878 2879
    virCheckNonNullArgGoto(file, error);
    virCheckNonNullArgGoto(dxml, error);
2880

2881
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
2882
        virReportInvalidArg(flags, "%s",
2883 2884
                            _("running and paused flags are mutually "
                              "exclusive"));
2885 2886 2887
        goto error;
    }

2888 2889 2890 2891 2892 2893
    if (conn->driver->domainSaveImageDefineXML) {
        int ret;
        char *absolute_file;

        /* We must absolutize the file path as the read is done out of process */
        if (virFileAbsPath(file, &absolute_file) < 0) {
2894 2895
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2896 2897 2898 2899 2900 2901 2902 2903 2904 2905 2906 2907 2908
            goto error;
        }

        ret = conn->driver->domainSaveImageDefineXML(conn, absolute_file,
                                                     dxml, flags);

        VIR_FREE(absolute_file);

        if (ret < 0)
            goto error;
        return ret;
    }

2909
    virReportUnsupportedError();
2910

2911
 error:
2912 2913 2914 2915
    virDispatchError(conn);
    return -1;
}

2916

D
Daniel Veillard 已提交
2917 2918 2919 2920
/**
 * virDomainCoreDump:
 * @domain: a domain object
 * @to: path for the core file
2921
 * @flags: bitwise-OR of virDomainCoreDumpFlags
D
Daniel Veillard 已提交
2922 2923 2924
 *
 * This method will dump the core of a domain on a given file for analysis.
 * Note that for remote Xen Daemon the file path will be interpreted in
2925 2926
 * the remote host. Hypervisors may require  the user to manually ensure
 * proper permissions on the file named by @to.
D
Daniel Veillard 已提交
2927
 *
2928 2929 2930 2931
 * If @flags includes VIR_DUMP_CRASH, then leave the guest shut off with
 * a crashed state after the dump completes.  If @flags includes
 * VIR_DUMP_LIVE, then make the core dump while continuing to allow
 * the guest to run; otherwise, the guest is suspended during the dump.
2932 2933
 * VIR_DUMP_RESET flag forces reset of the quest after dump.
 * The above three flags are mutually exclusive.
2934 2935 2936 2937 2938 2939
 *
 * Additionally, if @flags includes VIR_DUMP_BYPASS_CACHE, then libvirt
 * will attempt to bypass the file system cache while creating the file,
 * or fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
2940 2941
 * For more control over the output format, see virDomainCoreDumpWithFormat().
 *
D
Daniel Veillard 已提交
2942 2943 2944
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2945
virDomainCoreDump(virDomainPtr domain, const char *to, unsigned int flags)
D
Daniel Veillard 已提交
2946 2947
{
    virConnectPtr conn;
2948

2949
    VIR_DOMAIN_DEBUG(domain, "to=%s, flags=%x", to, flags);
D
Daniel Veillard 已提交
2950

2951 2952
    virResetLastError();

2953
    virCheckDomainReturn(domain, -1);
D
Daniel Veillard 已提交
2954
    conn = domain->conn;
2955 2956

    virCheckReadOnlyGoto(conn->flags, error);
2957
    virCheckNonNullArgGoto(to, error);
D
Daniel Veillard 已提交
2958

2959
    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_LIVE)) {
2960 2961
        virReportInvalidArg(flags, "%s",
                            _("crash and live flags are mutually exclusive"));
2962 2963 2964
        goto error;
    }

2965
    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_RESET)) {
2966
        virReportInvalidArg(flags, "%s",
2967 2968 2969 2970 2971
                         _("crash and reset flags are mutually exclusive"));
        goto error;
    }

    if ((flags & VIR_DUMP_LIVE) && (flags & VIR_DUMP_RESET)) {
2972 2973
        virReportInvalidArg(flags, "%s",
                            _("live and reset flags are mutually exclusive"));
2974 2975 2976
        goto error;
    }

2977 2978 2979
    if (conn->driver->domainCoreDump) {
        int ret;
        char *absolute_to;
D
Daniel Veillard 已提交
2980

2981 2982
        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
2983 2984
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute core file path"));
2985 2986
            goto error;
        }
D
Daniel Veillard 已提交
2987

2988 2989 2990
        ret = conn->driver->domainCoreDump(domain, absolute_to, flags);

        VIR_FREE(absolute_to);
D
Daniel Veillard 已提交
2991

2992 2993 2994 2995
        if (ret < 0)
            goto error;
        return ret;
    }
2996

2997
    virReportUnsupportedError();
2998

2999
 error:
3000
    virDispatchError(domain->conn);
3001
    return -1;
3002 3003
}

3004 3005 3006 3007 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 3029 3030 3031 3032 3033 3034 3035 3036 3037 3038 3039 3040 3041 3042 3043 3044 3045 3046 3047 3048 3049 3050 3051 3052 3053 3054 3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065 3066 3067 3068 3069 3070 3071 3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097
/**
 * virDomainCoreDumpWithFormat:
 * @domain: a domain object
 * @to: path for the core file
 * @dumpformat: format of domain memory's dump
 * @flags: bitwise-OR of virDomainCoreDumpFlags
 *
 * This method will dump the core of a domain on a given file for analysis.
 * Note that for remote Xen Daemon the file path will be interpreted in
 * the remote host. Hypervisors may require  the user to manually ensure
 * proper permissions on the file named by @to.
 *
 * @dumpformat controls which format the dump will have; use of
 * VIR_DOMAIN_CORE_DUMP_FORMAT_RAW mirrors what virDomainCoreDump() will
 * perform.  Not all hypervisors are able to support all formats.
 *
 * If @flags includes VIR_DUMP_CRASH, then leave the guest shut off with
 * a crashed state after the dump completes.  If @flags includes
 * VIR_DUMP_LIVE, then make the core dump while continuing to allow
 * the guest to run; otherwise, the guest is suspended during the dump.
 * VIR_DUMP_RESET flag forces reset of the quest after dump.
 * The above three flags are mutually exclusive.
 *
 * Additionally, if @flags includes VIR_DUMP_BYPASS_CACHE, then libvirt
 * will attempt to bypass the file system cache while creating the file,
 * or fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainCoreDumpWithFormat(virDomainPtr domain, const char *to,
                            unsigned int dumpformat, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "to=%s, dumpformat=%u, flags=%x",
                     to, dumpformat, flags);

    virResetLastError();

    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
    virCheckNonNullArgGoto(to, error);

    if (dumpformat >= VIR_DOMAIN_CORE_DUMP_FORMAT_LAST) {
        virReportInvalidArg(flags, _("dumpformat '%d' is not supported"),
                            dumpformat);
        goto error;
    }

    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_LIVE)) {
        virReportInvalidArg(flags, "%s",
                            _("crash and live flags are mutually exclusive"));
        goto error;
    }

    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_RESET)) {
        virReportInvalidArg(flags, "%s",
                            _("crash and reset flags are mutually exclusive"));
        goto error;
    }

    if ((flags & VIR_DUMP_LIVE) && (flags & VIR_DUMP_RESET)) {
        virReportInvalidArg(flags, "%s",
                            _("live and reset flags are mutually exclusive"));
        goto error;
    }

    if (conn->driver->domainCoreDumpWithFormat) {
        int ret;
        char *absolute_to;

        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute core file path"));
            goto error;
        }

        ret = conn->driver->domainCoreDumpWithFormat(domain, absolute_to,
                                                     dumpformat, flags);

        VIR_FREE(absolute_to);

        if (ret < 0)
            goto error;
        return ret;
    }

    virReportUnsupportedError();

3098
 error:
3099 3100 3101 3102
    virDispatchError(domain->conn);
    return -1;
}

3103

3104 3105 3106 3107 3108
/**
 * virDomainScreenshot:
 * @domain: a domain object
 * @stream: stream to use as output
 * @screen: monitor ID to take screenshot from
3109
 * @flags: extra flags; not used yet, so callers should always pass 0
3110 3111 3112 3113 3114 3115 3116
 *
 * Take a screenshot of current domain console as a stream. The image format
 * is hypervisor specific. Moreover, some hypervisors supports multiple
 * displays per domain. These can be distinguished by @screen argument.
 *
 * This call sets up a stream; subsequent use of stream API is necessary
 * to transfer actual data, determine how much data is successfully
J
Ján Tomko 已提交
3117
 * transferred, and detect any errors.
3118 3119 3120 3121
 *
 * The screen ID is the sequential number of screen. In case of multiple
 * graphics cards, heads are enumerated before devices, e.g. having
 * two graphics cards, both with four heads, screen ID 5 addresses
3122
 * the second head on the second card.
3123 3124 3125 3126 3127 3128 3129 3130 3131 3132
 *
 * Returns a string representing the mime-type of the image format, or
 * NULL upon error. The caller must free() the returned value.
 */
char *
virDomainScreenshot(virDomainPtr domain,
                    virStreamPtr stream,
                    unsigned int screen,
                    unsigned int flags)
{
E
Eric Blake 已提交
3133
    VIR_DOMAIN_DEBUG(domain, "stream=%p, flags=%x", stream, flags);
3134 3135 3136

    virResetLastError();

3137
    virCheckDomainReturn(domain, NULL);
3138 3139 3140 3141 3142 3143 3144 3145
    virCheckStreamGoto(stream, error);
    virCheckReadOnlyGoto(domain->conn->flags, error);

    if (domain->conn != stream->conn) {
        virReportInvalidArg(stream,
                            _("stream in %s must match connection of domain '%s'"),
                            __FUNCTION__, domain->name);
        goto error;
3146 3147 3148
    }

    if (domain->conn->driver->domainScreenshot) {
3149
        char *ret;
3150 3151 3152 3153 3154 3155 3156 3157
        ret = domain->conn->driver->domainScreenshot(domain, stream,
                                                     screen, flags);

        if (ret == NULL)
            goto error;
        return ret;
    }

3158
    virReportUnsupportedError();
3159

3160
 error:
3161 3162 3163 3164
    virDispatchError(domain->conn);
    return NULL;
}

3165

3166 3167 3168 3169
/**
 * virDomainShutdown:
 * @domain: a domain object
 *
3170
 * Shutdown a domain, the domain object is still usable thereafter, but
3171
 * the domain OS is being stopped. Note that the guest OS may ignore the
3172 3173 3174
 * request. Additionally, the hypervisor may check and support the domain
 * 'on_poweroff' XML setting resulting in a domain that reboots instead of
 * shutting down. For guests that react to a shutdown request, the differences
3175 3176 3177 3178
 * from virDomainDestroy() are that the guests disk storage will be in a
 * stable state rather than having the (virtual) power cord pulled, and
 * this command returns as soon as the shutdown request is issued rather
 * than blocking until the guest is no longer running.
3179
 *
3180 3181 3182
 * If the domain is transient and has any snapshot metadata (see
 * virDomainSnapshotNum()), then that metadata will automatically
 * be deleted when the domain quits.
3183 3184 3185 3186
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
3187 3188
virDomainShutdown(virDomainPtr domain)
{
3189
    virConnectPtr conn;
3190

3191
    VIR_DOMAIN_DEBUG(domain);
3192

3193 3194
    virResetLastError();

3195
    virCheckDomainReturn(domain, -1);
3196 3197
    conn = domain->conn;

3198 3199
    virCheckReadOnlyGoto(conn->flags, error);

3200 3201
    if (conn->driver->domainShutdown) {
        int ret;
3202
        ret = conn->driver->domainShutdown(domain);
3203 3204 3205 3206
        if (ret < 0)
            goto error;
        return ret;
    }
3207

3208
    virReportUnsupportedError();
3209

3210
 error:
3211
    virDispatchError(domain->conn);
3212
    return -1;
3213 3214
}

3215

3216 3217 3218 3219 3220 3221 3222
/**
 * virDomainShutdownFlags:
 * @domain: a domain object
 * @flags: bitwise-OR of virDomainShutdownFlagValues
 *
 * Shutdown a domain, the domain object is still usable thereafter but
 * the domain OS is being stopped. Note that the guest OS may ignore the
3223 3224 3225
 * request. Additionally, the hypervisor may check and support the domain
 * 'on_poweroff' XML setting resulting in a domain that reboots instead of
 * shutting down. For guests that react to a shutdown request, the differences
3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236
 * from virDomainDestroy() are that the guest's disk storage will be in a
 * stable state rather than having the (virtual) power cord pulled, and
 * this command returns as soon as the shutdown request is issued rather
 * than blocking until the guest is no longer running.
 *
 * If the domain is transient and has any snapshot metadata (see
 * virDomainSnapshotNum()), then that metadata will automatically
 * be deleted when the domain quits.
 *
 * If @flags is set to zero, then the hypervisor will choose the
 * method of shutdown it considers best. To have greater control
3237 3238 3239
 * pass one or more of the virDomainShutdownFlagValues. The order
 * in which the hypervisor tries each shutdown method is undefined,
 * and a hypervisor is not required to support all methods.
3240
 *
3241 3242 3243
 * To use guest agent (VIR_DOMAIN_SHUTDOWN_GUEST_AGENT) the domain XML
 * must have <channel> configured.
 *
3244 3245 3246 3247 3248 3249 3250
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainShutdownFlags(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;

3251
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
3252 3253 3254

    virResetLastError();

3255
    virCheckDomainReturn(domain, -1);
3256 3257
    conn = domain->conn;

3258 3259
    virCheckReadOnlyGoto(conn->flags, error);

3260 3261 3262 3263 3264 3265 3266 3267
    if (conn->driver->domainShutdownFlags) {
        int ret;
        ret = conn->driver->domainShutdownFlags(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3268
    virReportUnsupportedError();
3269

3270
 error:
3271 3272 3273 3274
    virDispatchError(domain->conn);
    return -1;
}

3275

3276 3277 3278
/**
 * virDomainReboot:
 * @domain: a domain object
3279
 * @flags: bitwise-OR of virDomainRebootFlagValues
3280
 *
3281
 * Reboot a domain, the domain object is still usable thereafter, but
3282 3283
 * the domain OS is being stopped for a restart.
 * Note that the guest OS may ignore the request.
3284 3285 3286
 * Additionally, the hypervisor may check and support the domain
 * 'on_reboot' XML setting resulting in a domain that shuts down instead
 * of rebooting.
3287
 *
3288 3289
 * If @flags is set to zero, then the hypervisor will choose the
 * method of shutdown it considers best. To have greater control
3290
 * pass one or more of the virDomainRebootFlagValues. The order
3291 3292
 * in which the hypervisor tries each shutdown method is undefined,
 * and a hypervisor is not required to support all methods.
3293 3294 3295 3296
 *
 * To use guest agent (VIR_DOMAIN_REBOOT_GUEST_AGENT) the domain XML
 * must have <channel> configured.
 *
3297 3298 3299 3300 3301
 * Due to implementation limitations in some drivers (the qemu driver,
 * for instance) it is not advised to migrate or save a guest that is
 * rebooting as a result of this API. Migrating such a guest can lead
 * to a plain shutdown on the destination.
 *
3302 3303 3304 3305 3306
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainReboot(virDomainPtr domain, unsigned int flags)
{
3307
    virConnectPtr conn;
3308

3309
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
3310

3311 3312
    virResetLastError();

3313
    virCheckDomainReturn(domain, -1);
3314 3315
    conn = domain->conn;

3316 3317
    virCheckReadOnlyGoto(conn->flags, error);

3318 3319
    if (conn->driver->domainReboot) {
        int ret;
3320
        ret = conn->driver->domainReboot(domain, flags);
3321 3322 3323 3324
        if (ret < 0)
            goto error;
        return ret;
    }
3325

3326
    virReportUnsupportedError();
X
Xu He Jie 已提交
3327

3328
 error:
X
Xu He Jie 已提交
3329 3330 3331 3332
    virDispatchError(domain->conn);
    return -1;
}

3333

X
Xu He Jie 已提交
3334 3335 3336
/**
 * virDomainReset:
 * @domain: a domain object
3337
 * @flags: extra flags; not used yet, so callers should always pass 0
X
Xu He Jie 已提交
3338 3339 3340 3341 3342 3343 3344 3345 3346 3347 3348 3349 3350 3351 3352 3353 3354 3355 3356
 *
 * Reset a domain immediately without any guest OS shutdown.
 * Reset emulates the power reset button on a machine, where all
 * hardware sees the RST line set and reinitializes internal state.
 *
 * Note that there is a risk of data loss caused by reset without any
 * guest OS shutdown.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainReset(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);

    virResetLastError();

3357
    virCheckDomainReturn(domain, -1);
X
Xu He Jie 已提交
3358 3359
    conn = domain->conn;

3360 3361
    virCheckReadOnlyGoto(conn->flags, error);

X
Xu He Jie 已提交
3362 3363
    if (conn->driver->domainReset) {
        int ret;
3364
        ret = conn->driver->domainReset(domain, flags);
X
Xu He Jie 已提交
3365 3366 3367 3368 3369
        if (ret < 0)
            goto error;
        return ret;
    }

3370
    virReportUnsupportedError();
3371

3372
 error:
3373
    virDispatchError(domain->conn);
3374
    return -1;
3375 3376
}

3377

3378
/**
3379
 * virDomainGetName:
3380 3381 3382 3383 3384 3385 3386 3387
 * @domain: a domain object
 *
 * Get the public name for that domain
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the domain object.
 */
const char *
3388 3389
virDomainGetName(virDomainPtr domain)
{
3390
    VIR_DEBUG("domain=%p", domain);
3391

3392 3393
    virResetLastError();

3394 3395
    virCheckDomainReturn(domain, NULL);

3396
    return domain->name;
3397 3398
}

3399

3400 3401 3402
/**
 * virDomainGetUUID:
 * @domain: a domain object
3403
 * @uuid: pointer to a VIR_UUID_BUFLEN bytes array
3404 3405 3406 3407 3408 3409
 *
 * Get the UUID for a domain
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
3410 3411
virDomainGetUUID(virDomainPtr domain, unsigned char *uuid)
{
3412
    VIR_DOMAIN_DEBUG(domain, "uuid=%p", uuid);
3413

3414 3415
    virResetLastError();

3416
    virCheckDomainReturn(domain, -1);
3417
    virCheckNonNullArgGoto(uuid, error);
D
Daniel Veillard 已提交
3418

3419 3420
    memcpy(uuid, &domain->uuid[0], VIR_UUID_BUFLEN);

3421
    return 0;
3422

3423
 error:
3424 3425
    virDispatchError(domain->conn);
    return -1;
3426 3427
}

3428

K
Karel Zak 已提交
3429 3430 3431
/**
 * virDomainGetUUIDString:
 * @domain: a domain object
3432
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
K
Karel Zak 已提交
3433
 *
3434
 * Get the UUID for a domain as string. For more information about
K
Karel Zak 已提交
3435 3436 3437 3438 3439 3440 3441
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virDomainGetUUIDString(virDomainPtr domain, char *buf)
{
3442
    VIR_DOMAIN_DEBUG(domain, "buf=%p", buf);
3443

3444 3445
    virResetLastError();

3446
    virCheckDomainReturn(domain, -1);
3447
    virCheckNonNullArgGoto(buf, error);
3448

E
Eric Blake 已提交
3449
    virUUIDFormat(domain->uuid, buf);
3450
    return 0;
3451

3452
 error:
3453
    virDispatchError(domain->conn);
3454
    return -1;
K
Karel Zak 已提交
3455 3456
}

3457

3458
/**
3459
 * virDomainGetID:
3460 3461 3462 3463 3464 3465 3466
 * @domain: a domain object
 *
 * Get the hypervisor ID number for the domain
 *
 * Returns the domain ID number or (unsigned int) -1 in case of error
 */
unsigned int
3467 3468
virDomainGetID(virDomainPtr domain)
{
3469
    VIR_DOMAIN_DEBUG(domain);
3470

3471 3472
    virResetLastError();

3473 3474
    virCheckDomainReturn(domain, (unsigned int)-1);

3475
    return domain->id;
3476 3477
}

3478

3479 3480 3481 3482 3483 3484
/**
 * virDomainGetOSType:
 * @domain: a domain object
 *
 * Get the type of domain operation system.
 *
3485 3486
 * Returns the new string or NULL in case of error, the string must be
 *         freed by the caller.
3487 3488
 */
char *
3489 3490
virDomainGetOSType(virDomainPtr domain)
{
3491
    virConnectPtr conn;
3492

3493
    VIR_DOMAIN_DEBUG(domain);
3494

3495 3496
    virResetLastError();

3497
    virCheckDomainReturn(domain, NULL);
3498 3499
    conn = domain->conn;

3500 3501
    if (conn->driver->domainGetOSType) {
        char *ret;
3502
        ret = conn->driver->domainGetOSType(domain);
3503 3504 3505 3506
        if (!ret)
            goto error;
        return ret;
    }
3507

3508
    virReportUnsupportedError();
3509

3510
 error:
3511
    virDispatchError(domain->conn);
3512
    return NULL;
3513 3514
}

3515

3516
/**
3517
 * virDomainGetMaxMemory:
3518
 * @domain: a domain object or NULL
3519
 *
3520 3521 3522 3523
 * Retrieve the maximum amount of physical memory allocated to a
 * domain. If domain is NULL, then this get the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
 *
3524 3525
 * Returns the memory size in kibibytes (blocks of 1024 bytes), or 0 in
 * case of error.
3526 3527
 */
unsigned long
3528 3529
virDomainGetMaxMemory(virDomainPtr domain)
{
3530
    virConnectPtr conn;
3531

3532
    VIR_DOMAIN_DEBUG(domain);
3533

3534 3535
    virResetLastError();

3536
    virCheckDomainReturn(domain, 0);
3537 3538
    conn = domain->conn;

3539
    if (conn->driver->domainGetMaxMemory) {
3540
        unsigned long long ret;
3541
        ret = conn->driver->domainGetMaxMemory(domain);
3542 3543
        if (ret == 0)
            goto error;
3544
        if ((unsigned long) ret != ret) {
3545 3546
            virReportError(VIR_ERR_OVERFLOW, _("result too large: %llu"),
                           ret);
3547 3548
            goto error;
        }
3549 3550
        return ret;
    }
3551

3552
    virReportUnsupportedError();
3553

3554
 error:
3555
    virDispatchError(domain->conn);
3556
    return 0;
3557 3558
}

3559

D
Daniel Veillard 已提交
3560
/**
3561
 * virDomainSetMaxMemory:
D
Daniel Veillard 已提交
3562
 * @domain: a domain object or NULL
3563
 * @memory: the memory size in kibibytes (blocks of 1024 bytes)
3564
 *
D
Daniel Veillard 已提交
3565 3566 3567
 * Dynamically change the maximum amount of physical memory allocated to a
 * domain. If domain is NULL, then this change the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
3568
 * This function may require privileged access to the hypervisor.
D
Daniel Veillard 已提交
3569
 *
3570 3571 3572
 * This command is hypervisor-specific for whether active, persistent,
 * or both configurations are changed; for more control, use
 * virDomainSetMemoryFlags().
3573
 *
D
Daniel Veillard 已提交
3574 3575 3576
 * Returns 0 in case of success and -1 in case of failure.
 */
int
3577 3578
virDomainSetMaxMemory(virDomainPtr domain, unsigned long memory)
{
3579
    virConnectPtr conn;
3580 3581

    VIR_DOMAIN_DEBUG(domain, "memory=%lu", memory);
3582

3583 3584
    virResetLastError();

3585
    virCheckDomainReturn(domain, -1);
3586
    conn = domain->conn;
3587

3588 3589 3590
    virCheckReadOnlyGoto(conn->flags, error);
    virCheckNonZeroArgGoto(memory, error);

3591 3592
    if (conn->driver->domainSetMaxMemory) {
        int ret;
3593
        ret = conn->driver->domainSetMaxMemory(domain, memory);
3594 3595 3596 3597
        if (ret < 0)
            goto error;
        return ret;
    }
3598

3599
    virReportUnsupportedError();
3600

3601
 error:
3602
    virDispatchError(domain->conn);
3603
    return -1;
3604
}
3605

3606

3607 3608 3609
/**
 * virDomainSetMemory:
 * @domain: a domain object or NULL
3610
 * @memory: the memory size in kibibytes (blocks of 1024 bytes)
3611
 *
3612 3613 3614
 * Dynamically change the target amount of physical memory allocated to a
 * domain. If domain is NULL, then this change the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
3615
 * This function may require privileged access to the hypervisor.
3616
 *
3617 3618 3619
 * This command only changes the runtime configuration of the domain,
 * so can only be called on an active domain.
 *
3620 3621 3622 3623 3624 3625
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSetMemory(virDomainPtr domain, unsigned long memory)
{
    virConnectPtr conn;
3626 3627

    VIR_DOMAIN_DEBUG(domain, "memory=%lu", memory);
3628

3629 3630
    virResetLastError();

3631
    virCheckDomainReturn(domain, -1);
3632
    conn = domain->conn;
3633

3634 3635 3636
    virCheckReadOnlyGoto(conn->flags, error);
    virCheckNonZeroArgGoto(memory, error);

3637 3638
    if (conn->driver->domainSetMemory) {
        int ret;
3639
        ret = conn->driver->domainSetMemory(domain, memory);
3640 3641 3642 3643
        if (ret < 0)
            goto error;
        return ret;
    }
3644

3645
    virReportUnsupportedError();
3646

3647
 error:
3648
    virDispatchError(domain->conn);
3649
    return -1;
D
Daniel Veillard 已提交
3650 3651
}

3652

3653
/**
3654
 * virDomainSetMemoryFlags:
3655
 * @domain: a domain object or NULL
3656
 * @memory: the memory size in kibibytes (blocks of 1024 bytes)
3657
 * @flags: bitwise-OR of virDomainMemoryModFlags
3658 3659 3660 3661
 *
 * Dynamically change the target amount of physical memory allocated to a
 * domain. If domain is NULL, then this change the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
3662
 * This function may require privileged access to the hypervisor.
3663
 *
3664 3665
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set. If VIR_DOMAIN_AFFECT_LIVE is set, the change affects
3666
 * a running domain and will fail if domain is not active.
3667
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
3668
 * and will fail for transient domains. If neither flag is specified
3669
 * (that is, @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain
3670 3671
 * modifies persistent setup, while an active domain is hypervisor-dependent
 * on whether just live or both live and persistent state is changed.
3672 3673
 * If VIR_DOMAIN_MEM_MAXIMUM is set, the change affects domain's maximum memory
 * size rather than current memory size.
3674
 * Not all hypervisors can support all flag combinations.
3675 3676 3677 3678 3679 3680 3681 3682 3683
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetMemoryFlags(virDomainPtr domain, unsigned long memory,
                        unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
3684
    VIR_DOMAIN_DEBUG(domain, "memory=%lu, flags=%x", memory, flags);
3685 3686 3687

    virResetLastError();

3688 3689
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
3690

3691
    virCheckReadOnlyGoto(conn->flags, error);
3692
    virCheckNonZeroArgGoto(memory, error);
3693 3694 3695 3696 3697 3698 3699 3700 3701

    if (conn->driver->domainSetMemoryFlags) {
        int ret;
        ret = conn->driver->domainSetMemoryFlags(domain, memory, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3702
    virReportUnsupportedError();
3703

3704
 error:
3705 3706 3707 3708
    virDispatchError(domain->conn);
    return -1;
}

3709

3710 3711 3712 3713 3714 3715 3716 3717 3718 3719 3720 3721 3722 3723 3724 3725 3726 3727 3728 3729 3730 3731 3732 3733 3734 3735 3736 3737 3738 3739 3740 3741
/**
 * virDomainSetMemoryStatsPeriod:
 * @domain: a domain object or NULL
 * @period: the period in seconds for stats collection
 * @flags: bitwise-OR of virDomainMemoryModFlags
 *
 * Dynamically change the domain memory balloon driver statistics collection
 * period. Use 0 to disable and a positive value to enable.
 *
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set. If VIR_DOMAIN_AFFECT_LIVE is set, the change affects
 * a running domain and will fail if domain is not active.
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
 * and will fail for transient domains. If neither flag is specified
 * (that is, @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain
 * modifies persistent setup, while an active domain is hypervisor-dependent
 * on whether just live or both live and persistent state is changed.
 *
 * Not all hypervisors can support all flag combinations.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetMemoryStatsPeriod(virDomainPtr domain, int period,
                              unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "peroid=%d, flags=%x", period, flags);

    virResetLastError();

3742 3743
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
3744

3745
    virCheckReadOnlyGoto(conn->flags, error);
3746 3747 3748 3749 3750 3751 3752 3753 3754 3755 3756 3757

    /* This must be positive to set the balloon collection period */
    virCheckNonNegativeArgGoto(period, error);

    if (conn->driver->domainSetMemoryStatsPeriod) {
        int ret;
        ret = conn->driver->domainSetMemoryStatsPeriod(domain, period, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3758
    virReportUnsupportedError();
3759

3760
 error:
3761 3762 3763 3764
    virDispatchError(domain->conn);
    return -1;
}

3765

E
Eric Blake 已提交
3766 3767 3768
/* Helper function called to validate incoming client array on any
 * interface that sets typed parameters in the hypervisor.  */
static int
3769
virTypedParameterValidateSet(virConnectPtr conn,
E
Eric Blake 已提交
3770 3771 3772 3773
                             virTypedParameterPtr params,
                             int nparams)
{
    bool string_okay;
3774
    size_t i;
E
Eric Blake 已提交
3775

3776 3777
    string_okay = VIR_DRV_SUPPORTS_FEATURE(conn->driver,
                                           conn,
E
Eric Blake 已提交
3778 3779 3780 3781
                                           VIR_DRV_FEATURE_TYPED_PARAM_STRING);
    for (i = 0; i < nparams; i++) {
        if (strnlen(params[i].field, VIR_TYPED_PARAM_FIELD_LENGTH) ==
            VIR_TYPED_PARAM_FIELD_LENGTH) {
3782 3783 3784 3785
            virReportInvalidArg(params,
                                _("string parameter name '%.*s' too long"),
                                VIR_TYPED_PARAM_FIELD_LENGTH,
                                params[i].field);
E
Eric Blake 已提交
3786 3787 3788 3789 3790
            return -1;
        }
        if (params[i].type == VIR_TYPED_PARAM_STRING) {
            if (string_okay) {
                if (!params[i].value.s) {
3791 3792 3793
                    virReportInvalidArg(params,
                                        _("NULL string parameter '%s'"),
                                        params[i].field);
E
Eric Blake 已提交
3794 3795 3796
                    return -1;
                }
            } else {
3797 3798 3799
                virReportInvalidArg(params,
                                    _("string parameter '%s' unsupported"),
                                    params[i].field);
E
Eric Blake 已提交
3800 3801 3802 3803 3804 3805 3806
                return -1;
            }
        }
    }
    return 0;
}

3807

3808 3809 3810 3811
/**
 * virDomainSetMemoryParameters:
 * @domain: pointer to domain object
 * @params: pointer to memory parameter objects
3812
 * @nparams: number of memory parameter (this value can be the same or
3813
 *          less than the number of parameters supported)
3814
 * @flags: bitwise-OR of virDomainModificationImpact
3815
 *
3816
 * Change all or a subset of the memory tunables.
3817
 * This function may require privileged access to the hypervisor.
3818 3819 3820 3821 3822
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetMemoryParameters(virDomainPtr domain,
3823
                             virTypedParameterPtr params,
3824 3825 3826
                             int nparams, unsigned int flags)
{
    virConnectPtr conn;
3827

3828
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
3829
                     params, nparams, flags);
3830
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
3831 3832 3833

    virResetLastError();

3834 3835 3836 3837
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
3838 3839 3840
    virCheckNonNullArgGoto(params, error);
    virCheckPositiveArgGoto(nparams, error);

3841
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
3842
        goto error;
E
Eric Blake 已提交
3843

3844 3845
    if (conn->driver->domainSetMemoryParameters) {
        int ret;
3846
        ret = conn->driver->domainSetMemoryParameters(domain, params, nparams, flags);
3847 3848 3849 3850 3851
        if (ret < 0)
            goto error;
        return ret;
    }

3852
    virReportUnsupportedError();
3853

3854
 error:
3855 3856 3857 3858
    virDispatchError(domain->conn);
    return -1;
}

3859

3860 3861 3862 3863 3864
/**
 * virDomainGetMemoryParameters:
 * @domain: pointer to domain object
 * @params: pointer to memory parameter object
 *          (return value, allocated by the caller)
3865
 * @nparams: pointer to number of memory parameters; input and output
E
Eric Blake 已提交
3866
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
3867
 *
3868 3869 3870 3871
 * Get all memory parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.
3872
 *
3873 3874 3875
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
3876
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
3877 3878
 * again.
 *
3879
 * Here is a sample code snippet:
3880
 *
3881 3882
 *   if (virDomainGetMemoryParameters(dom, NULL, &nparams, 0) == 0 &&
 *       nparams != 0) {
3883 3884 3885 3886 3887 3888
 *       if ((params = malloc(sizeof(*params) * nparams)) == NULL)
 *           goto error;
 *       memset(params, 0, sizeof(*params) * nparams);
 *       if (virDomainGetMemoryParameters(dom, params, &nparams, 0))
 *           goto error;
 *   }
3889
 *
3890
 * This function may require privileged access to the hypervisor. This function
3891
 * expects the caller to allocate the @params.
3892 3893 3894 3895 3896
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetMemoryParameters(virDomainPtr domain,
3897
                             virTypedParameterPtr params,
3898 3899 3900
                             int *nparams, unsigned int flags)
{
    virConnectPtr conn;
3901

3902
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
3903
                     params, (nparams) ? *nparams : -1, flags);
3904 3905 3906

    virResetLastError();

3907
    virCheckDomainReturn(domain, -1);
3908 3909 3910 3911 3912
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

E
Eric Blake 已提交
3913 3914 3915
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
3916 3917 3918 3919

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
3920
        virReportInvalidArg(flags,
3921 3922
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
3923
                            __FUNCTION__);
3924 3925
        goto error;
    }
3926 3927 3928 3929
    conn = domain->conn;

    if (conn->driver->domainGetMemoryParameters) {
        int ret;
3930
        ret = conn->driver->domainGetMemoryParameters(domain, params, nparams, flags);
3931 3932 3933 3934
        if (ret < 0)
            goto error;
        return ret;
    }
3935
    virReportUnsupportedError();
3936

3937
 error:
3938 3939 3940 3941
    virDispatchError(domain->conn);
    return -1;
}

3942

3943 3944 3945 3946 3947 3948 3949 3950 3951 3952 3953 3954 3955 3956 3957 3958 3959 3960 3961 3962 3963 3964
/**
 * virDomainSetNumaParameters:
 * @domain: pointer to domain object
 * @params: pointer to numa parameter objects
 * @nparams: number of numa parameters (this value can be the same or
 *          less than the number of parameters supported)
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Change all or a subset of the numa tunables.
 * This function may require privileged access to the hypervisor.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetNumaParameters(virDomainPtr domain,
                           virTypedParameterPtr params,
                           int nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
                     params, nparams, flags);
3965
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
3966 3967 3968

    virResetLastError();

3969
    virCheckDomainReturn(domain, -1);
3970
    virCheckReadOnlyGoto(domain->conn->flags, error);
3971 3972
    virCheckNonNullArgGoto(params, error);
    virCheckPositiveArgGoto(nparams, error);
3973
    if (virTypedParameterValidateSet(domain->conn, params, nparams) < 0)
3974
        goto error;
3975 3976 3977 3978 3979 3980 3981 3982 3983 3984 3985 3986

    conn = domain->conn;

    if (conn->driver->domainSetNumaParameters) {
        int ret;
        ret = conn->driver->domainSetNumaParameters(domain, params, nparams,
                                                    flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3987
    virReportUnsupportedError();
3988

3989
 error:
3990 3991 3992 3993
    virDispatchError(domain->conn);
    return -1;
}

3994

3995 3996 3997 3998 3999 4000 4001 4002 4003 4004 4005 4006 4007 4008 4009 4010 4011 4012 4013 4014 4015 4016 4017 4018 4019 4020 4021 4022 4023 4024 4025 4026 4027 4028 4029 4030 4031 4032
/**
 * virDomainGetNumaParameters:
 * @domain: pointer to domain object
 * @params: pointer to numa parameter object
 *          (return value, allocated by the caller)
 * @nparams: pointer to number of numa parameters
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
 *
 * Get all numa parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.
 *
 * See virDomainGetMemoryParameters() for an equivalent usage example.
 *
 * This function may require privileged access to the hypervisor. This function
 * expects the caller to allocate the @params.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetNumaParameters(virDomainPtr domain,
                           virTypedParameterPtr params,
                           int *nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
                     params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

4033
    virCheckDomainReturn(domain, -1);
4034 4035 4036 4037 4038
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

4039 4040 4041 4042 4043 4044 4045 4046 4047 4048 4049 4050 4051 4052
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    conn = domain->conn;

    if (conn->driver->domainGetNumaParameters) {
        int ret;
        ret = conn->driver->domainGetNumaParameters(domain, params, nparams,
                                                    flags);
        if (ret < 0)
            goto error;
        return ret;
    }
4053
    virReportUnsupportedError();
4054

4055
 error:
4056 4057 4058 4059
    virDispatchError(domain->conn);
    return -1;
}

4060

4061 4062 4063 4064
/**
 * virDomainSetBlkioParameters:
 * @domain: pointer to domain object
 * @params: pointer to blkio parameter objects
4065
 * @nparams: number of blkio parameters (this value can be the same or
4066
 *          less than the number of parameters supported)
E
Eric Blake 已提交
4067
 * @flags: bitwise-OR of virDomainModificationImpact
4068
 *
4069
 * Change all or a subset of the blkio tunables.
4070
 * This function may require privileged access to the hypervisor.
4071 4072 4073 4074 4075
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetBlkioParameters(virDomainPtr domain,
4076 4077
                            virTypedParameterPtr params,
                            int nparams, unsigned int flags)
4078 4079 4080
{
    virConnectPtr conn;

4081
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
4082
                     params, nparams, flags);
4083
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
4084 4085 4086

    virResetLastError();

4087 4088 4089 4090
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
4091 4092 4093
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

4094
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
4095
        goto error;
E
Eric Blake 已提交
4096

4097 4098
    if (conn->driver->domainSetBlkioParameters) {
        int ret;
4099
        ret = conn->driver->domainSetBlkioParameters(domain, params, nparams, flags);
4100 4101 4102 4103 4104
        if (ret < 0)
            goto error;
        return ret;
    }

4105
    virReportUnsupportedError();
4106

4107
 error:
4108 4109 4110 4111
    virDispatchError(domain->conn);
    return -1;
}

4112

4113 4114 4115 4116 4117
/**
 * virDomainGetBlkioParameters:
 * @domain: pointer to domain object
 * @params: pointer to blkio parameter object
 *          (return value, allocated by the caller)
4118
 * @nparams: pointer to number of blkio parameters; input and output
E
Eric Blake 已提交
4119
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
4120
 *
4121 4122 4123 4124 4125 4126 4127 4128 4129 4130 4131 4132
 * Get all blkio parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.
 *
 * See virDomainGetMemoryParameters() for an equivalent usage example.
4133
 *
4134
 * This function may require privileged access to the hypervisor. This function
4135 4136 4137 4138 4139 4140
 * expects the caller to allocate the @params.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetBlkioParameters(virDomainPtr domain,
4141 4142
                            virTypedParameterPtr params,
                            int *nparams, unsigned int flags)
4143 4144 4145
{
    virConnectPtr conn;

4146
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
4147 4148 4149 4150
                     params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

4151
    virCheckDomainReturn(domain, -1);
4152 4153 4154 4155 4156
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

E
Eric Blake 已提交
4157 4158 4159
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
4160 4161 4162 4163

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
4164
        virReportInvalidArg(flags,
4165 4166
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
4167
                            __FUNCTION__);
4168 4169
        goto error;
    }
4170 4171 4172 4173
    conn = domain->conn;

    if (conn->driver->domainGetBlkioParameters) {
        int ret;
4174
        ret = conn->driver->domainGetBlkioParameters(domain, params, nparams, flags);
4175 4176 4177 4178
        if (ret < 0)
            goto error;
        return ret;
    }
4179
    virReportUnsupportedError();
4180

4181
 error:
4182 4183 4184 4185
    virDispatchError(domain->conn);
    return -1;
}

4186

4187 4188
/**
 * virDomainGetInfo:
4189
 * @domain: a domain object
4190
 * @info: pointer to a virDomainInfo structure allocated by the user
4191
 *
4192
 * Extract information about a domain. Note that if the connection
4193
 * used to get the domain is limited only a partial set of the information
4194 4195 4196 4197 4198
 * can be extracted.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
4199 4200
virDomainGetInfo(virDomainPtr domain, virDomainInfoPtr info)
{
4201
    virConnectPtr conn;
4202 4203

    VIR_DOMAIN_DEBUG(domain, "info=%p", info);
4204

4205 4206
    virResetLastError();

4207 4208 4209
    if (info)
        memset(info, 0, sizeof(*info));

4210
    virCheckDomainReturn(domain, -1);
4211
    virCheckNonNullArgGoto(info, error);
4212

4213 4214
    conn = domain->conn;

4215 4216
    if (conn->driver->domainGetInfo) {
        int ret;
4217
        ret = conn->driver->domainGetInfo(domain, info);
4218 4219 4220 4221
        if (ret < 0)
            goto error;
        return ret;
    }
4222

4223
    virReportUnsupportedError();
4224

4225
 error:
4226
    virDispatchError(domain->conn);
4227
    return -1;
4228
}
4229

4230

4231 4232 4233 4234 4235 4236
/**
 * virDomainGetState:
 * @domain: a domain object
 * @state: returned state of the domain (one of virDomainState)
 * @reason: returned reason which led to @state (one of virDomain*Reason
 * corresponding to the current state); it is allowed to be NULL
4237
 * @flags: extra flags; not used yet, so callers should always pass 0
4238 4239 4240 4241 4242 4243 4244 4245 4246 4247 4248 4249 4250 4251
 *
 * Extract domain state. Each state can be accompanied with a reason (if known)
 * which led to the state.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetState(virDomainPtr domain,
                  int *state,
                  int *reason,
                  unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
4252 4253
    VIR_DOMAIN_DEBUG(domain, "state=%p, reason=%p, flags=%x",
                     state, reason, flags);
4254 4255 4256

    virResetLastError();

4257
    virCheckDomainReturn(domain, -1);
4258
    virCheckNonNullArgGoto(state, error);
4259 4260 4261 4262 4263 4264

    conn = domain->conn;
    if (conn->driver->domainGetState) {
        int ret;
        ret = conn->driver->domainGetState(domain, state, reason, flags);
        if (ret < 0)
4265 4266 4267 4268
            goto error;
        return ret;
    }

4269
    virReportUnsupportedError();
4270

4271
 error:
4272 4273 4274 4275
    virDispatchError(domain->conn);
    return -1;
}

4276

4277 4278 4279 4280
/**
 * virDomainGetControlInfo:
 * @domain: a domain object
 * @info: pointer to a virDomainControlInfo structure allocated by the user
4281
 * @flags: extra flags; not used yet, so callers should always pass 0
4282 4283 4284 4285 4286 4287 4288 4289 4290 4291 4292 4293
 *
 * Extract details about current state of control interface to a domain.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetControlInfo(virDomainPtr domain,
                        virDomainControlInfoPtr info,
                        unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
4294
    VIR_DOMAIN_DEBUG(domain, "info=%p, flags=%x", info, flags);
4295 4296 4297

    virResetLastError();

4298
    virCheckDomainReturn(domain, -1);
4299
    virCheckNonNullArgGoto(info, error);
4300 4301 4302 4303 4304 4305

    conn = domain->conn;
    if (conn->driver->domainGetControlInfo) {
        int ret;
        ret = conn->driver->domainGetControlInfo(domain, info, flags);
        if (ret < 0)
4306 4307 4308 4309
            goto error;
        return ret;
    }

4310
    virReportUnsupportedError();
4311

4312
 error:
4313 4314 4315 4316
    virDispatchError(domain->conn);
    return -1;
}

4317

4318 4319 4320
/**
 * virDomainGetXMLDesc:
 * @domain: a domain object
4321
 * @flags: bitwise-OR of virDomainXMLFlags
4322 4323
 *
 * Provide an XML description of the domain. The description may be reused
4324
 * later to relaunch the domain with virDomainCreateXML().
4325
 *
4326 4327 4328 4329 4330 4331 4332 4333 4334 4335
 * No security-sensitive data will be included unless @flags contains
 * VIR_DOMAIN_XML_SECURE; this flag is rejected on read-only
 * connections.  If @flags includes VIR_DOMAIN_XML_INACTIVE, then the
 * XML represents the configuration that will be used on the next boot
 * of a persistent domain; otherwise, the configuration represents the
 * currently running domain.  If @flags contains
 * VIR_DOMAIN_XML_UPDATE_CPU, then the portion of the domain XML
 * describing CPU capabilities is modified to match actual
 * capabilities of the host.
 *
4336 4337 4338 4339
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
4340
virDomainGetXMLDesc(virDomainPtr domain, unsigned int flags)
4341
{
4342
    virConnectPtr conn;
4343

4344
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
4345

4346 4347
    virResetLastError();

4348
    virCheckDomainReturn(domain, NULL);
4349 4350
    conn = domain->conn;

4351
    if ((conn->flags & VIR_CONNECT_RO) && (flags & VIR_DOMAIN_XML_SECURE)) {
4352 4353
        virReportError(VIR_ERR_OPERATION_DENIED, "%s",
                       _("virDomainGetXMLDesc with secure flag"));
4354 4355 4356
        goto error;
    }

4357
    if (conn->driver->domainGetXMLDesc) {
4358
        char *ret;
4359
        ret = conn->driver->domainGetXMLDesc(domain, flags);
4360 4361 4362 4363
        if (!ret)
            goto error;
        return ret;
    }
4364

4365
    virReportUnsupportedError();
4366

4367
 error:
4368
    virDispatchError(domain->conn);
4369
    return NULL;
4370
}
4371

4372

4373 4374 4375 4376 4377
/**
 * virConnectDomainXMLFromNative:
 * @conn: a connection object
 * @nativeFormat: configuration format importing from
 * @nativeConfig: the configuration data to import
4378
 * @flags: extra flags; not used yet, so callers should always pass 0
4379 4380 4381 4382 4383 4384 4385 4386
 *
 * Reads native configuration data  describing a domain, and
 * generates libvirt domain XML. The format of the native
 * data is hypervisor dependant.
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
4387 4388 4389 4390 4391
char *
virConnectDomainXMLFromNative(virConnectPtr conn,
                              const char *nativeFormat,
                              const char *nativeConfig,
                              unsigned int flags)
4392
{
E
Eric Blake 已提交
4393
    VIR_DEBUG("conn=%p, format=%s, config=%s, flags=%x",
4394
              conn, nativeFormat, nativeConfig, flags);
4395 4396 4397

    virResetLastError();

4398
    virCheckConnectReturn(conn, NULL);
4399
    virCheckReadOnlyGoto(conn->flags, error);
4400

4401 4402
    virCheckNonNullArgGoto(nativeFormat, error);
    virCheckNonNullArgGoto(nativeConfig, error);
4403

4404
    if (conn->driver->connectDomainXMLFromNative) {
4405
        char *ret;
4406 4407 4408 4409
        ret = conn->driver->connectDomainXMLFromNative(conn,
                                                       nativeFormat,
                                                       nativeConfig,
                                                       flags);
4410 4411 4412 4413 4414
        if (!ret)
            goto error;
        return ret;
    }

4415
    virReportUnsupportedError();
4416

4417
 error:
4418
    virDispatchError(conn);
4419 4420 4421
    return NULL;
}

4422

4423 4424 4425 4426 4427
/**
 * virConnectDomainXMLToNative:
 * @conn: a connection object
 * @nativeFormat: configuration format exporting to
 * @domainXml: the domain configuration to export
4428
 * @flags: extra flags; not used yet, so callers should always pass 0
4429 4430
 *
 * Reads a domain XML configuration document, and generates
E
Eric Blake 已提交
4431
 * a native configuration file describing the domain.
4432 4433 4434 4435 4436
 * The format of the native data is hypervisor dependant.
 *
 * Returns a 0 terminated UTF-8 encoded native config datafile, or NULL in case of error.
 *         the caller must free() the returned value.
 */
4437 4438 4439 4440 4441
char *
virConnectDomainXMLToNative(virConnectPtr conn,
                            const char *nativeFormat,
                            const char *domainXml,
                            unsigned int flags)
4442
{
E
Eric Blake 已提交
4443
    VIR_DEBUG("conn=%p, format=%s, xml=%s, flags=%x",
4444
              conn, nativeFormat, domainXml, flags);
4445 4446 4447

    virResetLastError();

4448
    virCheckConnectReturn(conn, NULL);
4449
    virCheckReadOnlyGoto(conn->flags, error);
4450

4451 4452
    virCheckNonNullArgGoto(nativeFormat, error);
    virCheckNonNullArgGoto(domainXml, error);
4453

4454
    if (conn->driver->connectDomainXMLToNative) {
4455
        char *ret;
4456 4457 4458 4459
        ret = conn->driver->connectDomainXMLToNative(conn,
                                                     nativeFormat,
                                                     domainXml,
                                                     flags);
4460 4461 4462 4463 4464
        if (!ret)
            goto error;
        return ret;
    }

4465
    virReportUnsupportedError();
4466

4467
 error:
4468
    virDispatchError(conn);
4469 4470 4471 4472
    return NULL;
}


4473 4474 4475 4476 4477 4478 4479 4480 4481 4482 4483 4484 4485 4486 4487 4488
/*
 * Sequence v1:
 *
 *  Dst: Prepare
 *        - Get ready to accept incoming VM
 *        - Generate optional cookie to pass to src
 *
 *  Src: Perform
 *        - Start migration and wait for send completion
 *        - Kill off VM if successful, resume if failed
 *
 *  Dst: Finish
 *        - Wait for recv completion and check status
 *        - Kill off VM if unsuccessful
 *
 */
4489
static virDomainPtr
4490 4491 4492 4493 4494 4495
virDomainMigrateVersion1(virDomainPtr domain,
                         virConnectPtr dconn,
                         unsigned long flags,
                         const char *dname,
                         const char *uri,
                         unsigned long bandwidth)
4496 4497 4498 4499
{
    virDomainPtr ddomain = NULL;
    char *uri_out = NULL;
    char *cookie = NULL;
4500 4501
    int cookielen = 0, ret;
    virDomainInfo info;
4502
    unsigned int destflags;
4503

4504
    VIR_DOMAIN_DEBUG(domain,
E
Eric Blake 已提交
4505
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
4506
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);
4507

4508
    ret = virDomainGetInfo(domain, &info);
4509
    if (ret == 0 && info.state == VIR_DOMAIN_PAUSED)
4510
        flags |= VIR_MIGRATE_PAUSED;
4511

4512 4513
    destflags = flags & ~(VIR_MIGRATE_ABORT_ON_ERROR |
                          VIR_MIGRATE_AUTO_CONVERGE);
4514 4515 4516 4517 4518 4519 4520 4521 4522 4523 4524 4525 4526

    /* Prepare the migration.
     *
     * The destination host may return a cookie, or leave cookie as
     * NULL.
     *
     * The destination host MUST set uri_out if uri_in is NULL.
     *
     * If uri_in is non-NULL, then the destination host may modify
     * the URI by setting uri_out.  If it does not wish to modify
     * the URI, it should leave uri_out as NULL.
     */
    if (dconn->driver->domainMigratePrepare
4527
        (dconn, &cookie, &cookielen, uri, &uri_out, destflags, dname,
4528 4529 4530 4531
         bandwidth) == -1)
        goto done;

    if (uri == NULL && uri_out == NULL) {
4532 4533
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("domainMigratePrepare did not set uri"));
4534 4535 4536 4537 4538 4539 4540 4541 4542 4543 4544 4545 4546 4547 4548 4549 4550 4551 4552 4553
        goto done;
    }
    if (uri_out)
        uri = uri_out; /* Did domainMigratePrepare change URI? */

    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete.
     */
    if (domain->conn->driver->domainMigratePerform
        (domain, cookie, cookielen, uri, flags, dname, bandwidth) == -1)
        goto done;

    /* Get the destination domain and return it or error.
     * 'domain' no longer actually exists at this point
     * (or so we hope), but we still use the object in memory
     * in order to get the name.
     */
    dname = dname ? dname : domain->name;
    if (dconn->driver->domainMigrateFinish)
        ddomain = dconn->driver->domainMigrateFinish
4554
            (dconn, dname, cookie, cookielen, uri, destflags);
4555
    else
4556
        ddomain = virDomainLookupByName(dconn, dname);
4557

4558
 done:
4559 4560
    VIR_FREE(uri_out);
    VIR_FREE(cookie);
4561 4562 4563
    return ddomain;
}

4564

4565 4566 4567 4568 4569 4570 4571 4572 4573 4574 4575 4576 4577 4578 4579 4580 4581 4582 4583
/*
 * Sequence v2:
 *
 *  Src: DumpXML
 *        - Generate XML to pass to dst
 *
 *  Dst: Prepare
 *        - Get ready to accept incoming VM
 *        - Generate optional cookie to pass to src
 *
 *  Src: Perform
 *        - Start migration and wait for send completion
 *        - Kill off VM if successful, resume if failed
 *
 *  Dst: Finish
 *        - Wait for recv completion and check status
 *        - Kill off VM if unsuccessful
 *
 */
4584
static virDomainPtr
4585 4586 4587 4588 4589 4590
virDomainMigrateVersion2(virDomainPtr domain,
                         virConnectPtr dconn,
                         unsigned long flags,
                         const char *dname,
                         const char *uri,
                         unsigned long bandwidth)
4591 4592 4593 4594 4595 4596
{
    virDomainPtr ddomain = NULL;
    char *uri_out = NULL;
    char *cookie = NULL;
    char *dom_xml = NULL;
    int cookielen = 0, ret;
4597
    virDomainInfo info;
4598
    virErrorPtr orig_err = NULL;
4599
    unsigned int getxml_flags = 0;
4600
    int cancelled;
4601
    unsigned long destflags;
4602

4603
    VIR_DOMAIN_DEBUG(domain,
E
Eric Blake 已提交
4604
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
4605
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);
4606 4607 4608 4609 4610 4611 4612 4613 4614 4615 4616 4617 4618 4619 4620 4621 4622

    /* Prepare the migration.
     *
     * The destination host may return a cookie, or leave cookie as
     * NULL.
     *
     * The destination host MUST set uri_out if uri_in is NULL.
     *
     * If uri_in is non-NULL, then the destination host may modify
     * the URI by setting uri_out.  If it does not wish to modify
     * the URI, it should leave uri_out as NULL.
     */

    /* In version 2 of the protocol, the prepare step is slightly
     * different.  We fetch the domain XML of the source domain
     * and pass it to Prepare2.
     */
4623
    if (!domain->conn->driver->domainGetXMLDesc) {
4624
        virReportUnsupportedError();
4625 4626
        return NULL;
    }
4627 4628 4629 4630 4631 4632 4633 4634 4635

    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_XML_MIGRATABLE)) {
        getxml_flags |= VIR_DOMAIN_XML_MIGRATABLE;
    } else {
        getxml_flags |= VIR_DOMAIN_XML_SECURE | VIR_DOMAIN_XML_UPDATE_CPU;
    }

    dom_xml = domain->conn->driver->domainGetXMLDesc(domain, getxml_flags);
4636 4637 4638
    if (!dom_xml)
        return NULL;

4639
    ret = virDomainGetInfo(domain, &info);
4640
    if (ret == 0 && info.state == VIR_DOMAIN_PAUSED)
4641 4642
        flags |= VIR_MIGRATE_PAUSED;

4643 4644
    destflags = flags & ~(VIR_MIGRATE_ABORT_ON_ERROR |
                          VIR_MIGRATE_AUTO_CONVERGE);
4645 4646

    VIR_DEBUG("Prepare2 %p flags=%lx", dconn, destflags);
4647
    ret = dconn->driver->domainMigratePrepare2
4648
        (dconn, &cookie, &cookielen, uri, &uri_out, destflags, dname,
4649
         bandwidth, dom_xml);
4650
    VIR_FREE(dom_xml);
4651 4652 4653 4654
    if (ret == -1)
        goto done;

    if (uri == NULL && uri_out == NULL) {
4655 4656
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("domainMigratePrepare2 did not set uri"));
4657
        cancelled = 1;
4658 4659
        /* Make sure Finish doesn't overwrite the error */
        orig_err = virSaveLastError();
4660
        goto finish;
4661 4662 4663 4664 4665 4666 4667
    }
    if (uri_out)
        uri = uri_out; /* Did domainMigratePrepare2 change URI? */

    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete.
     */
4668
    VIR_DEBUG("Perform %p", domain->conn);
4669 4670 4671
    ret = domain->conn->driver->domainMigratePerform
        (domain, cookie, cookielen, uri, flags, dname, bandwidth);

4672 4673 4674 4675
    /* Perform failed. Make sure Finish doesn't overwrite the error */
    if (ret < 0)
        orig_err = virSaveLastError();

4676 4677 4678 4679 4680
    /* If Perform returns < 0, then we need to cancel the VM
     * startup on the destination
     */
    cancelled = ret < 0 ? 1 : 0;

4681
 finish:
4682 4683 4684 4685 4686
    /* In version 2 of the migration protocol, we pass the
     * status code from the sender to the destination host,
     * so it can do any cleanup if the migration failed.
     */
    dname = dname ? dname : domain->name;
4687
    VIR_DEBUG("Finish2 %p ret=%d", dconn, ret);
4688
    ddomain = dconn->driver->domainMigrateFinish2
4689
        (dconn, dname, cookie, cookielen, uri, destflags, cancelled);
4690 4691
    if (cancelled && ddomain)
        VIR_ERROR(_("finish step ignored that migration was cancelled"));
4692

4693
 done:
4694 4695 4696 4697
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
4698 4699
    VIR_FREE(uri_out);
    VIR_FREE(cookie);
4700 4701 4702
    return ddomain;
}

4703

4704 4705 4706 4707 4708 4709 4710 4711 4712 4713 4714 4715 4716 4717 4718 4719 4720 4721 4722 4723 4724 4725 4726
/*
 * Sequence v3:
 *
 *  Src: Begin
 *        - Generate XML to pass to dst
 *        - Generate optional cookie to pass to dst
 *
 *  Dst: Prepare
 *        - Get ready to accept incoming VM
 *        - Generate optional cookie to pass to src
 *
 *  Src: Perform
 *        - Start migration and wait for send completion
 *        - Generate optional cookie to pass to dst
 *
 *  Dst: Finish
 *        - Wait for recv completion and check status
 *        - Kill off VM if failed, resume if success
 *        - Generate optional cookie to pass to src
 *
 *  Src: Confirm
 *        - Kill off VM if success, resume if failed
 *
4727 4728 4729 4730
  * If useParams is true, params and nparams contain migration parameters and
  * we know it's safe to call the API which supports extensible parameters.
  * Otherwise, we have to use xmlin, dname, uri, and bandwidth and pass them
  * to the old-style APIs.
4731 4732
 */
static virDomainPtr
4733 4734 4735 4736 4737 4738 4739 4740 4741 4742
virDomainMigrateVersion3Full(virDomainPtr domain,
                             virConnectPtr dconn,
                             const char *xmlin,
                             const char *dname,
                             const char *uri,
                             unsigned long long bandwidth,
                             virTypedParameterPtr params,
                             int nparams,
                             bool useParams,
                             unsigned int flags)
4743 4744 4745 4746 4747 4748 4749 4750 4751 4752 4753
{
    virDomainPtr ddomain = NULL;
    char *uri_out = NULL;
    char *cookiein = NULL;
    char *cookieout = NULL;
    char *dom_xml = NULL;
    int cookieinlen = 0;
    int cookieoutlen = 0;
    int ret;
    virDomainInfo info;
    virErrorPtr orig_err = NULL;
4754 4755
    int cancelled = 1;
    unsigned long protection = 0;
4756
    bool notify_source = true;
4757
    unsigned int destflags;
4758 4759
    int state;
    virTypedParameterPtr tmp;
4760

4761 4762 4763 4764 4765 4766
    VIR_DOMAIN_DEBUG(domain,
                     "dconn=%p, xmlin=%s, dname=%s, uri=%s, bandwidth=%llu, "
                     "params=%p, nparams=%d, useParams=%d, flags=%x",
                     dconn, NULLSTR(xmlin), NULLSTR(dname), NULLSTR(uri),
                     bandwidth, params, nparams, useParams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
4767

4768 4769 4770 4771 4772 4773 4774 4775 4776 4777 4778 4779
    if ((!useParams &&
         (!domain->conn->driver->domainMigrateBegin3 ||
          !domain->conn->driver->domainMigratePerform3 ||
          !domain->conn->driver->domainMigrateConfirm3 ||
          !dconn->driver->domainMigratePrepare3 ||
          !dconn->driver->domainMigrateFinish3)) ||
        (useParams &&
         (!domain->conn->driver->domainMigrateBegin3Params ||
          !domain->conn->driver->domainMigratePerform3Params ||
          !domain->conn->driver->domainMigrateConfirm3Params ||
          !dconn->driver->domainMigratePrepare3Params ||
          !dconn->driver->domainMigrateFinish3Params))) {
4780
        virReportUnsupportedError();
4781 4782 4783
        return NULL;
    }

4784 4785 4786 4787
    if (virTypedParamsCopy(&tmp, params, nparams) < 0)
        return NULL;
    params = tmp;

4788 4789 4790 4791
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION))
        protection = VIR_MIGRATE_CHANGE_PROTECTION;

4792
    VIR_DEBUG("Begin3 %p", domain->conn);
4793 4794 4795 4796 4797 4798 4799 4800 4801
    if (useParams) {
        dom_xml = domain->conn->driver->domainMigrateBegin3Params
            (domain, params, nparams, &cookieout, &cookieoutlen,
             flags | protection);
    } else {
        dom_xml = domain->conn->driver->domainMigrateBegin3
            (domain, xmlin, &cookieout, &cookieoutlen,
             flags | protection, dname, bandwidth);
    }
4802 4803 4804
    if (!dom_xml)
        goto done;

4805 4806 4807 4808 4809 4810 4811
    if (useParams) {
        /* If source is new enough to support extensible migration parameters,
         * it's certainly new enough to support virDomainGetState. */
        ret = virDomainGetState(domain, &state, NULL, 0);
    } else {
        ret = virDomainGetInfo(domain, &info);
        state = info.state;
4812
    }
4813 4814
    if (ret == 0 && state == VIR_DOMAIN_PAUSED)
        flags |= VIR_MIGRATE_PAUSED;
4815

4816 4817
    destflags = flags & ~(VIR_MIGRATE_ABORT_ON_ERROR |
                          VIR_MIGRATE_AUTO_CONVERGE);
4818 4819

    VIR_DEBUG("Prepare3 %p flags=%x", dconn, destflags);
4820 4821 4822 4823
    cookiein = cookieout;
    cookieinlen = cookieoutlen;
    cookieout = NULL;
    cookieoutlen = 0;
4824 4825 4826 4827 4828 4829 4830 4831 4832 4833 4834 4835 4836
    if (useParams) {
        if (virTypedParamsReplaceString(&params, &nparams,
                                        VIR_MIGRATE_PARAM_DEST_XML,
                                        dom_xml) < 0)
            goto done;
        ret = dconn->driver->domainMigratePrepare3Params
            (dconn, params, nparams, cookiein, cookieinlen,
             &cookieout, &cookieoutlen, &uri_out, destflags);
    } else {
        ret = dconn->driver->domainMigratePrepare3
            (dconn, cookiein, cookieinlen, &cookieout, &cookieoutlen,
             uri, &uri_out, destflags, dname, bandwidth, dom_xml);
    }
4837 4838 4839 4840 4841 4842 4843 4844 4845 4846 4847
    if (ret == -1) {
        if (protection) {
            /* Begin already started a migration job so we need to cancel it by
             * calling Confirm while making sure it doesn't overwrite the error
             */
            orig_err = virSaveLastError();
            goto confirm;
        } else {
            goto done;
        }
    }
4848

4849 4850 4851 4852 4853 4854
    /* Did domainMigratePrepare3 change URI? */
    if (uri_out) {
        uri = uri_out;
        if (useParams &&
            virTypedParamsReplaceString(&params, &nparams,
                                        VIR_MIGRATE_PARAM_URI,
4855 4856 4857
                                        uri_out) < 0) {
            cancelled = 1;
            orig_err = virSaveLastError();
4858
            goto finish;
4859
        }
4860 4861 4862
    } else if (!uri &&
               virTypedParamsGetString(params, nparams,
                                       VIR_MIGRATE_PARAM_URI, &uri) <= 0) {
4863 4864
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("domainMigratePrepare3 did not set uri"));
4865 4866 4867
        cancelled = 1;
        orig_err = virSaveLastError();
        goto finish;
4868 4869
    }

L
liguang 已提交
4870 4871 4872 4873 4874 4875 4876 4877
    if (flags & VIR_MIGRATE_OFFLINE) {
        VIR_DEBUG("Offline migration, skipping Perform phase");
        VIR_FREE(cookieout);
        cookieoutlen = 0;
        cancelled = 0;
        goto finish;
    }

4878 4879 4880 4881 4882 4883 4884 4885 4886 4887 4888
    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete. The src VM should remain
     * running, but in paused state until the destination can
     * confirm migration completion.
     */
    VIR_DEBUG("Perform3 %p uri=%s", domain->conn, uri);
    VIR_FREE(cookiein);
    cookiein = cookieout;
    cookieinlen = cookieoutlen;
    cookieout = NULL;
    cookieoutlen = 0;
4889
    /* dconnuri not relevant in non-P2P modes, so left NULL here */
4890 4891 4892 4893 4894 4895 4896 4897 4898 4899
    if (useParams) {
        ret = domain->conn->driver->domainMigratePerform3Params
            (domain, NULL, params, nparams, cookiein, cookieinlen,
             &cookieout, &cookieoutlen, flags | protection);
    } else {
        ret = domain->conn->driver->domainMigratePerform3
            (domain, NULL, cookiein, cookieinlen,
             &cookieout, &cookieoutlen, NULL,
             uri, flags | protection, dname, bandwidth);
    }
4900 4901

    /* Perform failed. Make sure Finish doesn't overwrite the error */
4902
    if (ret < 0) {
4903
        orig_err = virSaveLastError();
4904 4905 4906 4907 4908
        /* Perform failed so we don't need to call confirm to let source know
         * about the failure.
         */
        notify_source = false;
    }
4909 4910 4911 4912 4913 4914

    /* If Perform returns < 0, then we need to cancel the VM
     * startup on the destination
     */
    cancelled = ret < 0 ? 1 : 0;

4915
 finish:
4916 4917 4918 4919 4920 4921 4922 4923 4924 4925 4926 4927
    /*
     * The status code from the source is passed to the destination.
     * The dest can cleanup if the source indicated it failed to
     * send all migration data. Returns NULL for ddomain if
     * the dest was unable to complete migration.
     */
    VIR_DEBUG("Finish3 %p ret=%d", dconn, ret);
    VIR_FREE(cookiein);
    cookiein = cookieout;
    cookieinlen = cookieoutlen;
    cookieout = NULL;
    cookieoutlen = 0;
4928 4929 4930 4931 4932 4933
    if (useParams) {
        if (virTypedParamsGetString(params, nparams,
                                    VIR_MIGRATE_PARAM_DEST_NAME, NULL) <= 0 &&
            virTypedParamsReplaceString(&params, &nparams,
                                        VIR_MIGRATE_PARAM_DEST_NAME,
                                        domain->name) < 0) {
4934
            ddomain = NULL;
4935 4936 4937 4938 4939 4940 4941 4942 4943 4944 4945
        } else {
            ddomain = dconn->driver->domainMigrateFinish3Params
                (dconn, params, nparams, cookiein, cookieinlen,
                 &cookieout, &cookieoutlen, destflags, cancelled);
        }
    } else {
        dname = dname ? dname : domain->name;
        ddomain = dconn->driver->domainMigrateFinish3
            (dconn, dname, cookiein, cookieinlen, &cookieout, &cookieoutlen,
             NULL, uri, destflags, cancelled);
    }
4946 4947
    if (cancelled && ddomain)
        VIR_ERROR(_("finish step ignored that migration was cancelled"));
4948 4949 4950 4951 4952 4953 4954 4955

    /* If ddomain is NULL, then we were unable to start
     * the guest on the target, and must restart on the
     * source. There is a small chance that the ddomain
     * is NULL due to an RPC failure, in which case
     * ddomain could in fact be running on the dest.
     * The lock manager plugins should take care of
     * safety in this scenario.
4956
     */
4957
    cancelled = ddomain == NULL ? 1 : 0;
4958

4959 4960 4961 4962 4963 4964
    /* If finish3 set an error, and we don't have an earlier
     * one we need to preserve it in case confirm3 overwrites
     */
    if (!orig_err)
        orig_err = virSaveLastError();

4965
 confirm:
4966
    /*
4967 4968 4969
     * If cancelled, then src VM will be restarted, else it will be killed.
     * Don't do this if migration failed on source and thus it was already
     * cancelled there.
4970
     */
4971 4972 4973 4974 4975 4976 4977
    if (notify_source) {
        VIR_DEBUG("Confirm3 %p ret=%d domain=%p", domain->conn, ret, domain);
        VIR_FREE(cookiein);
        cookiein = cookieout;
        cookieinlen = cookieoutlen;
        cookieout = NULL;
        cookieoutlen = 0;
4978 4979 4980 4981 4982 4983 4984 4985 4986
        if (useParams) {
            ret = domain->conn->driver->domainMigrateConfirm3Params
                (domain, params, nparams, cookiein, cookieinlen,
                 flags | protection, cancelled);
        } else {
            ret = domain->conn->driver->domainMigrateConfirm3
                (domain, cookiein, cookieinlen,
                 flags | protection, cancelled);
        }
4987 4988 4989 4990 4991 4992 4993 4994 4995
        /* If Confirm3 returns -1, there's nothing more we can
         * do, but fortunately worst case is that there is a
         * domain left in 'paused' state on source.
         */
        if (ret < 0) {
            VIR_WARN("Guest %s probably left in 'paused' state on source",
                     domain->name);
        }
    }
4996

4997
 done:
4998 4999 5000 5001
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
5002
    VIR_FREE(dom_xml);
5003 5004 5005
    VIR_FREE(uri_out);
    VIR_FREE(cookiein);
    VIR_FREE(cookieout);
5006
    virTypedParamsFree(params, nparams);
5007 5008 5009
    return ddomain;
}

5010

5011 5012 5013 5014 5015 5016 5017 5018 5019 5020 5021 5022 5023
static virDomainPtr
virDomainMigrateVersion3(virDomainPtr domain,
                         virConnectPtr dconn,
                         const char *xmlin,
                         unsigned long flags,
                         const char *dname,
                         const char *uri,
                         unsigned long bandwidth)
{
    return virDomainMigrateVersion3Full(domain, dconn, xmlin, dname, uri,
                                        bandwidth, NULL, 0, false, flags);
}

5024

J
Jiri Denemark 已提交
5025 5026 5027 5028 5029 5030 5031 5032 5033 5034 5035
static virDomainPtr
virDomainMigrateVersion3Params(virDomainPtr domain,
                               virConnectPtr dconn,
                               virTypedParameterPtr params,
                               int nparams,
                               unsigned int flags)
{
    return virDomainMigrateVersion3Full(domain, dconn, NULL, NULL, NULL, 0,
                                        params, nparams, true, flags);
}

5036

5037 5038 5039 5040 5041 5042 5043 5044 5045 5046 5047 5048 5049 5050
/*
 * In normal migration, the libvirt client co-ordinates communication
 * between the 2 libvirtd instances on source & dest hosts.
 *
 * In this peer-2-peer migration alternative, the libvirt client
 * only talks to the source libvirtd instance. The source libvirtd
 * then opens its own connection to the destination and co-ordinates
 * migration itself.
 *
 * If useParams is true, params and nparams contain migration parameters and
 * we know it's safe to call the API which supports extensible parameters.
 * Otherwise, we have to use xmlin, dname, uri, and bandwidth and pass them
 * to the old-style APIs.
 */
5051
static int
5052 5053 5054 5055 5056 5057 5058 5059 5060 5061
virDomainMigratePeer2PeerFull(virDomainPtr domain,
                              const char *dconnuri,
                              const char *xmlin,
                              const char *dname,
                              const char *uri,
                              unsigned long long bandwidth,
                              virTypedParameterPtr params,
                              int nparams,
                              bool useParams,
                              unsigned int flags)
5062
{
M
Martin Kletzander 已提交
5063
    virURIPtr tempuri = NULL;
5064

5065 5066 5067 5068 5069 5070
    VIR_DOMAIN_DEBUG(domain,
                     "dconnuri=%s, xmlin=%s, dname=%s, uri=%s, bandwidth=%llu "
                     "params=%p, nparams=%d, useParams=%d, flags=%x",
                     dconnuri, NULLSTR(xmlin), NULLSTR(dname), NULLSTR(uri),
                     bandwidth, params, nparams, useParams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
5071

5072 5073 5074 5075
    if ((useParams && !domain->conn->driver->domainMigratePerform3Params) ||
        (!useParams &&
         !domain->conn->driver->domainMigratePerform &&
         !domain->conn->driver->domainMigratePerform3)) {
5076
        virReportUnsupportedError();
5077 5078 5079
        return -1;
    }

5080
    if (!(tempuri = virURIParse(dconnuri)))
5081
        return -1;
5082
    if (!tempuri->server || STRPREFIX(tempuri->server, "localhost")) {
5083 5084 5085
        virReportInvalidArg(dconnuri,
                            _("unable to parse server from dconnuri in %s"),
                            __FUNCTION__);
5086
        virURIFree(tempuri);
5087 5088
        return -1;
    }
5089
    virURIFree(tempuri);
5090

5091 5092 5093 5094 5095 5096 5097
    if (useParams) {
        VIR_DEBUG("Using migration protocol 3 with extensible parameters");
        return domain->conn->driver->domainMigratePerform3Params
                (domain, dconnuri, params, nparams,
                 NULL, 0, NULL, NULL, flags);
    } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                        VIR_DRV_FEATURE_MIGRATION_V3)) {
5098
        VIR_DEBUG("Using migration protocol 3");
5099 5100 5101
        return domain->conn->driver->domainMigratePerform3
                (domain, xmlin, NULL, 0, NULL, NULL, dconnuri,
                 uri, flags, dname, bandwidth);
5102 5103
    } else {
        VIR_DEBUG("Using migration protocol 2");
5104
        if (xmlin) {
5105 5106 5107
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during "
                             "migration"));
5108 5109
            return -1;
        }
5110
        if (uri) {
5111 5112
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unable to override peer2peer migration URI"));
5113 5114
            return -1;
        }
5115 5116
        return domain->conn->driver->domainMigratePerform
                (domain, NULL, 0, dconnuri, flags, dname, bandwidth);
5117
    }
5118 5119
}

5120

5121 5122 5123 5124 5125 5126 5127 5128 5129 5130 5131 5132 5133
static int
virDomainMigratePeer2Peer(virDomainPtr domain,
                          const char *xmlin,
                          unsigned long flags,
                          const char *dname,
                          const char *dconnuri,
                          const char *uri,
                          unsigned long bandwidth)
{
    return virDomainMigratePeer2PeerFull(domain, dconnuri, xmlin, dname, uri,
                                         bandwidth, NULL, 0, false, flags);
}

5134

J
Jiri Denemark 已提交
5135 5136 5137 5138 5139 5140 5141 5142 5143 5144 5145
static int
virDomainMigratePeer2PeerParams(virDomainPtr domain,
                                const char *dconnuri,
                                virTypedParameterPtr params,
                                int nparams,
                                unsigned int flags)
{
    return virDomainMigratePeer2PeerFull(domain, dconnuri, NULL, NULL, NULL, 0,
                                         params, nparams, true, flags);
}

5146

C
Chris Lalancette 已提交
5147
/*
5148
 * In normal migration, the libvirt client co-ordinates communication
5149
 * between the 2 libvirtd instances on source & dest hosts.
C
Chris Lalancette 已提交
5150
 *
5151 5152 5153
 * Some hypervisors support an alternative, direct migration where
 * there is no requirement for a libvirtd instance on the dest host.
 * In this case
5154
 *
5155 5156
 * eg, XenD can talk direct to XenD, so libvirtd on dest does not
 * need to be involved at all, or even running
C
Chris Lalancette 已提交
5157
 */
5158
static int
5159 5160 5161 5162 5163 5164
virDomainMigrateDirect(virDomainPtr domain,
                       const char *xmlin,
                       unsigned long flags,
                       const char *dname,
                       const char *uri,
                       unsigned long bandwidth)
5165
{
5166 5167 5168 5169
    VIR_DOMAIN_DEBUG(domain,
                     "xmlin=%s, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
                     NULLSTR(xmlin), flags, NULLSTR(dname), NULLSTR(uri),
                     bandwidth);
5170

5171
    if (!domain->conn->driver->domainMigratePerform) {
5172
        virReportUnsupportedError();
5173 5174 5175
        return -1;
    }

C
Chris Lalancette 已提交
5176 5177 5178
    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete.
     */
5179 5180 5181
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATION_V3)) {
        VIR_DEBUG("Using migration protocol 3");
5182 5183
        /* dconn URI not relevant in direct migration, since no
         * target libvirtd is involved */
5184
        return domain->conn->driver->domainMigratePerform3(domain,
5185
                                                           xmlin,
5186 5187 5188 5189
                                                           NULL, /* cookiein */
                                                           0,    /* cookieinlen */
                                                           NULL, /* cookieoutlen */
                                                           NULL, /* cookieoutlen */
5190
                                                           NULL, /* dconnuri */
5191 5192 5193 5194 5195 5196
                                                           uri,
                                                           flags,
                                                           dname,
                                                           bandwidth);
    } else {
        VIR_DEBUG("Using migration protocol 2");
5197
        if (xmlin) {
5198 5199
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during migration"));
5200 5201
            return -1;
        }
5202 5203 5204 5205 5206 5207 5208 5209
        return domain->conn->driver->domainMigratePerform(domain,
                                                          NULL, /* cookie */
                                                          0,    /* cookielen */
                                                          uri,
                                                          flags,
                                                          dname,
                                                          bandwidth);
    }
C
Chris Lalancette 已提交
5210 5211
}

5212

5213 5214 5215 5216
/**
 * virDomainMigrate:
 * @domain: a domain object
 * @dconn: destination host (a connection object)
5217
 * @flags: bitwise-OR of virDomainMigrateFlags
5218 5219
 * @dname: (optional) rename domain to this at destination
 * @uri: (optional) dest hostname/URI as seen from the source host
5220
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5221 5222 5223 5224 5225
 *
 * Migrate the domain object from its current host to the destination
 * host given by dconn (a connection to the destination host).
 *
 * Flags may be one of more of the following:
5226 5227 5228
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
C
Chris Lalancette 已提交
5229 5230 5231 5232
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
5233
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
5234 5235 5236 5237
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
5238 5239 5240
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
5241
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
5242
 *   VIR_MIGRATE_OFFLINE Migrate offline
5243 5244 5245 5246 5247
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 * Applications using the VIR_MIGRATE_PEER2PEER flag will probably
 * prefer to invoke virDomainMigrateToURI, avoiding the need to
 * open connection to the destination host themselves.
5248 5249 5250 5251 5252 5253
 *
 * If a hypervisor supports renaming domains during migration,
 * then you may set the dname parameter to the new name (otherwise
 * it keeps the same name).  If this is not supported by the
 * hypervisor, dname must be NULL or else you will get an error.
 *
5254 5255 5256 5257 5258 5259 5260 5261 5262 5263 5264
 * If the VIR_MIGRATE_PEER2PEER flag is set, the uri parameter
 * must be a valid libvirt connection URI, by which the source
 * libvirt driver can connect to the destination libvirt. If
 * omitted, the dconn connection object will be queried for its
 * current URI.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, the URI parameter
 * takes a hypervisor specific format. The hypervisor capabilities
 * XML includes details of the support URI schemes. If omitted
 * the dconn will be asked for a default URI.
 *
5265 5266 5267 5268
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
5269
 * In either case it is typically only necessary to specify a
5270 5271
 * URI if the destination host has multiple interfaces and a
 * specific interface is required to transmit migration data.
5272
 *
5273
 * The maximum bandwidth (in MiB/s) that will be used to do migration
5274 5275 5276 5277 5278 5279 5280 5281 5282 5283 5284 5285 5286 5287 5288 5289 5290 5291
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns the new domain object if the migration was successful,
 *   or NULL in case of error.  Note that the new domain object
 *   exists in the scope of the destination connection (dconn).
 */
virDomainPtr
5292 5293 5294 5295 5296 5297
virDomainMigrate(virDomainPtr domain,
                 virConnectPtr dconn,
                 unsigned long flags,
                 const char *dname,
                 const char *uri,
                 unsigned long bandwidth)
5298 5299
{
    virDomainPtr ddomain = NULL;
5300

5301 5302
    VIR_DOMAIN_DEBUG(domain,
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
5303
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);
5304

5305 5306
    virResetLastError();

5307
    /* First checkout the source */
5308
    virCheckDomainReturn(domain, NULL);
5309
    virCheckReadOnlyGoto(domain->conn->flags, error);
5310

5311
    /* Now checkout the destination */
5312
    virCheckConnectGoto(dconn, error);
5313
    virCheckReadOnlyGoto(dconn->flags, error);
5314

5315 5316 5317 5318 5319 5320 5321 5322 5323
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

L
liguang 已提交
5324 5325 5326
    if (flags & VIR_MIGRATE_OFFLINE) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5327 5328 5329
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the source host"));
L
liguang 已提交
5330 5331 5332 5333
            goto error;
        }
        if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5334 5335 5336
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the destination host"));
L
liguang 已提交
5337 5338 5339 5340
            goto error;
        }
    }

5341
    if (flags & VIR_MIGRATE_PEER2PEER) {
5342 5343
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
5344 5345 5346
            char *dstURI = NULL;
            if (uri == NULL) {
                dstURI = virConnectGetURI(dconn);
5347
                if (!dstURI)
5348 5349
                    return NULL;
            }
5350

5351
            VIR_DEBUG("Using peer2peer migration");
5352
            if (virDomainMigratePeer2Peer(domain, NULL, flags, dname,
5353
                                          uri ? uri : dstURI, NULL, bandwidth) < 0) {
5354 5355 5356 5357
                VIR_FREE(dstURI);
                goto error;
            }
            VIR_FREE(dstURI);
C
Chris Lalancette 已提交
5358

5359
            ddomain = virDomainLookupByName(dconn, dname ? dname : domain->name);
5360 5361
        } else {
            /* This driver does not support peer to peer migration */
5362
            virReportUnsupportedError();
5363 5364
            goto error;
        }
5365
    } else {
5366 5367 5368 5369 5370 5371 5372 5373
        /* Change protection requires support only on source side, and
         * is only needed in v3 migration, which automatically re-adds
         * the flag for just the source side.  We mask it out for
         * non-peer2peer to allow migration from newer source to an
         * older destination that rejects the flag.  */
        if (flags & VIR_MIGRATE_CHANGE_PROTECTION &&
            !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION)) {
5374 5375
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("cannot enforce change protection"));
5376 5377 5378
            goto error;
        }
        flags &= ~VIR_MIGRATE_CHANGE_PROTECTION;
5379
        if (flags & VIR_MIGRATE_TUNNELLED) {
5380 5381
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("cannot perform tunnelled migration without using peer2peer flag"));
5382 5383 5384
            goto error;
        }

C
Chris Lalancette 已提交
5385 5386
        /* Check that migration is supported by both drivers. */
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
5387
                                     VIR_DRV_FEATURE_MIGRATION_V3) &&
C
Chris Lalancette 已提交
5388
            VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
5389 5390
                                     VIR_DRV_FEATURE_MIGRATION_V3)) {
            VIR_DEBUG("Using migration protocol 3");
5391 5392
            ddomain = virDomainMigrateVersion3(domain, dconn, NULL,
                                               flags, dname, uri, bandwidth);
5393 5394 5395 5396 5397
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V2) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                          VIR_DRV_FEATURE_MIGRATION_V2)) {
            VIR_DEBUG("Using migration protocol 2");
5398 5399
            ddomain = virDomainMigrateVersion2(domain, dconn, flags,
                                               dname, uri, bandwidth);
5400 5401 5402 5403 5404
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V1) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                            VIR_DRV_FEATURE_MIGRATION_V1)) {
            VIR_DEBUG("Using migration protocol 1");
5405 5406 5407 5408
            ddomain = virDomainMigrateVersion1(domain, dconn, flags,
                                               dname, uri, bandwidth);
        } else {
            /* This driver does not support any migration method */
5409
            virReportUnsupportedError();
5410 5411 5412 5413 5414 5415 5416 5417 5418
            goto error;
        }
    }

    if (ddomain == NULL)
        goto error;

    return ddomain;

5419
 error:
5420 5421 5422 5423 5424 5425 5426 5427 5428
    virDispatchError(domain->conn);
    return NULL;
}


/**
 * virDomainMigrate2:
 * @domain: a domain object
 * @dconn: destination host (a connection object)
5429
 * @flags: bitwise-OR of virDomainMigrateFlags
5430 5431 5432
 * @dxml: (optional) XML config for launching guest on target
 * @dname: (optional) rename domain to this at destination
 * @uri: (optional) dest hostname/URI as seen from the source host
5433
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5434 5435 5436 5437 5438 5439 5440 5441 5442 5443 5444 5445 5446
 *
 * Migrate the domain object from its current host to the destination
 * host given by dconn (a connection to the destination host).
 *
 * Flags may be one of more of the following:
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
5447 5448 5449 5450
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
5451 5452 5453
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
5454
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
5455
 *   VIR_MIGRATE_OFFLINE Migrate offline
5456 5457 5458 5459 5460 5461 5462 5463 5464 5465 5466 5467 5468 5469 5470 5471 5472 5473 5474 5475 5476 5477
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 * Applications using the VIR_MIGRATE_PEER2PEER flag will probably
 * prefer to invoke virDomainMigrateToURI, avoiding the need to
 * open connection to the destination host themselves.
 *
 * If a hypervisor supports renaming domains during migration,
 * then you may set the dname parameter to the new name (otherwise
 * it keeps the same name).  If this is not supported by the
 * hypervisor, dname must be NULL or else you will get an error.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is set, the uri parameter
 * must be a valid libvirt connection URI, by which the source
 * libvirt driver can connect to the destination libvirt. If
 * omitted, the dconn connection object will be queried for its
 * current URI.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, the URI parameter
 * takes a hypervisor specific format. The hypervisor capabilities
 * XML includes details of the support URI schemes. If omitted
 * the dconn will be asked for a default URI.
 *
5478 5479 5480 5481
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
5482 5483 5484 5485
 * In either case it is typically only necessary to specify a
 * URI if the destination host has multiple interfaces and a
 * specific interface is required to transmit migration data.
 *
5486
 * The maximum bandwidth (in MiB/s) that will be used to do migration
5487 5488 5489 5490 5491 5492 5493 5494 5495 5496 5497 5498 5499
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
5500 5501 5502 5503 5504 5505 5506 5507
 * If the hypervisor supports it, @dxml can be used to alter
 * host-specific portions of the domain XML that will be used on
 * the destination.  For example, it is possible to alter the
 * backing filename that is associated with a disk device, in order
 * to account for naming differences between source and destination
 * in accessing the underlying storage.  The migration will fail
 * if @dxml would cause any guest-visible changes.  Pass NULL
 * if no changes are needed to the XML between source and destination.
5508
 * @dxml cannot be used to rename the domain during migration (use
5509 5510
 * @dname for that purpose).  Domain name in @dxml must match the
 * original domain name.
5511
 *
5512 5513 5514 5515 5516 5517 5518 5519 5520 5521 5522 5523 5524 5525 5526
 * Returns the new domain object if the migration was successful,
 *   or NULL in case of error.  Note that the new domain object
 *   exists in the scope of the destination connection (dconn).
 */
virDomainPtr
virDomainMigrate2(virDomainPtr domain,
                  virConnectPtr dconn,
                  const char *dxml,
                  unsigned long flags,
                  const char *dname,
                  const char *uri,
                  unsigned long bandwidth)
{
    virDomainPtr ddomain = NULL;

5527 5528
    VIR_DOMAIN_DEBUG(domain,
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
5529 5530 5531 5532 5533
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);

    virResetLastError();

    /* First checkout the source */
5534
    virCheckDomainReturn(domain, NULL);
5535
    virCheckReadOnlyGoto(domain->conn->flags, error);
5536 5537

    /* Now checkout the destination */
5538
    virCheckConnectGoto(dconn, error);
5539
    virCheckReadOnlyGoto(dconn->flags, error);
5540

5541 5542 5543 5544 5545 5546 5547 5548 5549
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

L
liguang 已提交
5550 5551 5552
    if (flags & VIR_MIGRATE_OFFLINE) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5553 5554 5555
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the source host"));
L
liguang 已提交
5556 5557 5558 5559
            goto error;
        }
        if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5560 5561 5562
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the destination host"));
L
liguang 已提交
5563 5564 5565 5566
            goto error;
        }
    }

5567
    if (flags & VIR_MIGRATE_PEER2PEER) {
5568 5569
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
5570 5571 5572 5573 5574 5575 5576 5577 5578 5579 5580 5581
            char *dstURI = virConnectGetURI(dconn);
            if (!dstURI)
                return NULL;

            VIR_DEBUG("Using peer2peer migration");
            if (virDomainMigratePeer2Peer(domain, dxml, flags, dname,
                                          dstURI, uri, bandwidth) < 0) {
                VIR_FREE(dstURI);
                goto error;
            }
            VIR_FREE(dstURI);

5582
            ddomain = virDomainLookupByName(dconn, dname ? dname : domain->name);
5583 5584
        } else {
            /* This driver does not support peer to peer migration */
5585
            virReportUnsupportedError();
5586 5587 5588
            goto error;
        }
    } else {
5589 5590 5591 5592 5593 5594 5595 5596
        /* Change protection requires support only on source side, and
         * is only needed in v3 migration, which automatically re-adds
         * the flag for just the source side.  We mask it out for
         * non-peer2peer to allow migration from newer source to an
         * older destination that rejects the flag.  */
        if (flags & VIR_MIGRATE_CHANGE_PROTECTION &&
            !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION)) {
5597 5598
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("cannot enforce change protection"));
5599 5600 5601
            goto error;
        }
        flags &= ~VIR_MIGRATE_CHANGE_PROTECTION;
5602
        if (flags & VIR_MIGRATE_TUNNELLED) {
5603 5604
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("cannot perform tunnelled migration without using peer2peer flag"));
5605 5606 5607 5608 5609 5610 5611 5612 5613 5614 5615 5616 5617 5618 5619 5620 5621
            goto error;
        }

        /* Check that migration is supported by both drivers. */
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_V3) &&
            VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                     VIR_DRV_FEATURE_MIGRATION_V3)) {
            VIR_DEBUG("Using migration protocol 3");
            ddomain = virDomainMigrateVersion3(domain, dconn, dxml,
                                               flags, dname, uri, bandwidth);
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V2) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                          VIR_DRV_FEATURE_MIGRATION_V2)) {
            VIR_DEBUG("Using migration protocol 2");
            if (dxml) {
5622 5623
                virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                               _("Unable to change target guest XML during migration"));
5624 5625 5626 5627 5628 5629 5630 5631 5632 5633
                goto error;
            }
            ddomain = virDomainMigrateVersion2(domain, dconn, flags,
                                               dname, uri, bandwidth);
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V1) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                            VIR_DRV_FEATURE_MIGRATION_V1)) {
            VIR_DEBUG("Using migration protocol 1");
            if (dxml) {
5634 5635
                virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                               _("Unable to change target guest XML during migration"));
5636 5637 5638 5639
                goto error;
            }
            ddomain = virDomainMigrateVersion1(domain, dconn, flags,
                                               dname, uri, bandwidth);
5640
        } else {
5641
            /* This driver does not support any migration method */
5642
            virReportUnsupportedError();
C
Chris Lalancette 已提交
5643 5644
            goto error;
        }
5645 5646
    }

5647 5648
    if (ddomain == NULL)
        goto error;
D
Daniel Veillard 已提交
5649

5650
    return ddomain;
5651

5652
 error:
5653
    virDispatchError(domain->conn);
5654
    return NULL;
5655 5656
}

5657

J
Jiri Denemark 已提交
5658 5659 5660 5661 5662 5663 5664 5665 5666 5667 5668 5669 5670 5671 5672 5673 5674 5675 5676 5677 5678 5679 5680 5681 5682 5683 5684 5685 5686 5687 5688 5689 5690 5691 5692 5693 5694 5695 5696 5697 5698 5699 5700 5701 5702 5703 5704 5705 5706 5707 5708 5709 5710
/**
 * virDomainMigrate3:
 * @domain: a domain object
 * @dconn: destination host (a connection object)
 * @params: (optional) migration parameters
 * @nparams: (optional) number of migration parameters in @params
 * @flags: bitwise-OR of virDomainMigrateFlags
 *
 * Migrate the domain object from its current host to the destination host
 * given by dconn (a connection to the destination host).
 *
 * See virDomainMigrateFlags documentation for description of individual flags.
 *
 * VIR_MIGRATE_TUNNELLED and VIR_MIGRATE_PEER2PEER are not supported by this
 * API, use virDomainMigrateToURI3 instead.
 *
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns the new domain object if the migration was successful,
 *   or NULL in case of error.  Note that the new domain object
 *   exists in the scope of the destination connection (dconn).
 */
virDomainPtr
virDomainMigrate3(virDomainPtr domain,
                  virConnectPtr dconn,
                  virTypedParameterPtr params,
                  unsigned int nparams,
                  unsigned int flags)
{
    virDomainPtr ddomain = NULL;
    const char *compatParams[] = { VIR_MIGRATE_PARAM_URI,
                                   VIR_MIGRATE_PARAM_DEST_NAME,
                                   VIR_MIGRATE_PARAM_DEST_XML,
                                   VIR_MIGRATE_PARAM_BANDWIDTH };
    const char *uri = NULL;
    const char *dname = NULL;
    const char *dxml = NULL;
    unsigned long long bandwidth = 0;

    VIR_DOMAIN_DEBUG(domain, "dconn=%p, params=%p, nparms=%u flags=%x",
                     dconn, params, nparams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

    /* First checkout the source */
5711
    virCheckDomainReturn(domain, NULL);
5712
    virCheckReadOnlyGoto(domain->conn->flags, error);
J
Jiri Denemark 已提交
5713 5714

    /* Now checkout the destination */
5715
    virCheckConnectGoto(dconn, error);
5716
    virCheckReadOnlyGoto(dconn->flags, error);
J
Jiri Denemark 已提交
5717 5718 5719 5720 5721 5722 5723 5724 5725

    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }
5726
    if (flags & VIR_MIGRATE_PEER2PEER) {
J
Jiri Denemark 已提交
5727 5728 5729 5730 5731
        virReportInvalidArg(flags, "%s",
                            _("use virDomainMigrateToURI3 for peer-to-peer "
                              "migration"));
        goto error;
    }
5732 5733 5734 5735 5736 5737
    if (flags & VIR_MIGRATE_TUNNELLED) {
        virReportInvalidArg(flags, "%s",
                            _("cannot perform tunnelled migration "
                              "without using peer2peer flag"));
        goto error;
    }
J
Jiri Denemark 已提交
5738 5739 5740 5741

    if (flags & VIR_MIGRATE_OFFLINE) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5742 5743 5744
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the source host"));
J
Jiri Denemark 已提交
5745 5746 5747 5748
            goto error;
        }
        if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5749 5750 5751
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the destination host"));
J
Jiri Denemark 已提交
5752 5753 5754 5755 5756 5757 5758 5759 5760 5761 5762 5763
            goto error;
        }
    }

    /* Change protection requires support only on source side, and
     * is only needed in v3 migration, which automatically re-adds
     * the flag for just the source side.  We mask it out to allow
     * migration from newer source to an older destination that
     * rejects the flag.  */
    if (flags & VIR_MIGRATE_CHANGE_PROTECTION &&
        !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                  VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION)) {
5764 5765
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("cannot enforce change protection"));
J
Jiri Denemark 已提交
5766 5767 5768 5769 5770 5771 5772 5773 5774 5775 5776 5777 5778 5779 5780 5781 5782 5783
        goto error;
    }
    flags &= ~VIR_MIGRATE_CHANGE_PROTECTION;

    /* Prefer extensible API but fall back to older migration APIs if params
     * only contains parameters which were supported by the older API. */
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATION_PARAMS) &&
        VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                 VIR_DRV_FEATURE_MIGRATION_PARAMS)) {
        VIR_DEBUG("Using migration protocol 3 with extensible parameters");
        ddomain = virDomainMigrateVersion3Params(domain, dconn, params,
                                                 nparams, flags);
        goto done;
    }

    if (!virTypedParamsCheck(params, nparams, compatParams,
                             ARRAY_CARDINALITY(compatParams))) {
5784 5785 5786
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("Migration APIs with extensible parameters are not "
                         "supported but extended parameters were passed"));
J
Jiri Denemark 已提交
5787 5788 5789 5790 5791 5792 5793 5794 5795 5796 5797 5798 5799 5800 5801 5802 5803 5804 5805 5806 5807 5808 5809 5810 5811 5812 5813
        goto error;
    }

    if (virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_URI, &uri) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_NAME, &dname) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_XML, &dxml) < 0 ||
        virTypedParamsGetULLong(params, nparams,
                                VIR_MIGRATE_PARAM_BANDWIDTH, &bandwidth) < 0) {
        goto error;
    }

    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATION_V3) &&
        VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                 VIR_DRV_FEATURE_MIGRATION_V3)) {
        VIR_DEBUG("Using migration protocol 3");
        ddomain = virDomainMigrateVersion3(domain, dconn, dxml, flags,
                                           dname, uri, bandwidth);
    } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                        VIR_DRV_FEATURE_MIGRATION_V2) &&
               VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_V2)) {
        VIR_DEBUG("Using migration protocol 2");
        if (dxml) {
5814 5815 5816
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during "
                             "migration"));
J
Jiri Denemark 已提交
5817 5818 5819 5820 5821 5822 5823 5824 5825 5826
            goto error;
        }
        ddomain = virDomainMigrateVersion2(domain, dconn, flags,
                                           dname, uri, bandwidth);
    } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                        VIR_DRV_FEATURE_MIGRATION_V1) &&
               VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                        VIR_DRV_FEATURE_MIGRATION_V1)) {
        VIR_DEBUG("Using migration protocol 1");
        if (dxml) {
5827 5828 5829
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during "
                             "migration"));
J
Jiri Denemark 已提交
5830 5831 5832 5833 5834 5835
            goto error;
        }
        ddomain = virDomainMigrateVersion1(domain, dconn, flags,
                                           dname, uri, bandwidth);
    } else {
        /* This driver does not support any migration method */
5836
        virReportUnsupportedError();
J
Jiri Denemark 已提交
5837 5838 5839
        goto error;
    }

5840
 done:
J
Jiri Denemark 已提交
5841 5842 5843 5844 5845
    if (ddomain == NULL)
        goto error;

    return ddomain;

5846
 error:
J
Jiri Denemark 已提交
5847 5848 5849 5850 5851
    virDispatchError(domain->conn);
    return NULL;
}


5852 5853 5854 5855
/**
 * virDomainMigrateToURI:
 * @domain: a domain object
 * @duri: mandatory URI for the destination host
5856
 * @flags: bitwise-OR of virDomainMigrateFlags
5857
 * @dname: (optional) rename domain to this at destination
5858
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5859 5860
 *
 * Migrate the domain object from its current host to the destination
D
Dan Kenigsberg 已提交
5861
 * host given by duri.
5862 5863 5864 5865 5866
 *
 * Flags may be one of more of the following:
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
5867 5868 5869 5870
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
5871 5872 5873 5874 5875
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
5876 5877 5878
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
5879
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
5880
 *   VIR_MIGRATE_OFFLINE Migrate offline
5881
 *
5882 5883 5884 5885 5886 5887 5888 5889 5890 5891
 * The operation of this API hinges on the VIR_MIGRATE_PEER2PEER flag.
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, the duri parameter
 * takes a hypervisor specific format. The uri_transports element of the
 * hypervisor capabilities XML includes details of the supported URI
 * schemes. Not all hypervisors will support this mode of migration, so
 * if the VIR_MIGRATE_PEER2PEER flag is not set, then it may be necessary
 * to use the alternative virDomainMigrate API providing and explicit
 * virConnectPtr for the destination host.
 *
 * If the VIR_MIGRATE_PEER2PEER flag IS set, the duri parameter
5892
 * must be a valid libvirt connection URI, by which the source
D
Dan Kenigsberg 已提交
5893
 * libvirt driver can connect to the destination libvirt.
5894
 *
5895 5896
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 *
5897 5898 5899 5900
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
5901 5902 5903 5904 5905
 * If a hypervisor supports renaming domains during migration,
 * the dname parameter specifies the new name for the domain.
 * Setting dname to NULL keeps the domain name the same.  If domain
 * renaming is not supported by the hypervisor, dname must be NULL or
 * else an error will be returned.
5906
 *
5907
 * The maximum bandwidth (in MiB/s) that will be used to do migration
5908 5909 5910 5911 5912 5913 5914 5915 5916 5917 5918 5919 5920 5921 5922 5923
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns 0 if the migration succeeded, -1 upon error.
 */
int
5924 5925 5926 5927 5928
virDomainMigrateToURI(virDomainPtr domain,
                      const char *duri,
                      unsigned long flags,
                      const char *dname,
                      unsigned long bandwidth)
5929
{
5930
    VIR_DOMAIN_DEBUG(domain, "duri=%p, flags=%lx, dname=%s, bandwidth=%lu",
5931
                     NULLSTR(duri), flags, NULLSTR(dname), bandwidth);
5932 5933 5934 5935

    virResetLastError();

    /* First checkout the source */
5936
    virCheckDomainReturn(domain, -1);
5937
    virCheckReadOnlyGoto(domain->conn->flags, error);
5938

5939
    virCheckNonNullArgGoto(duri, error);
5940

5941 5942 5943 5944 5945 5946 5947 5948 5949
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

L
liguang 已提交
5950 5951 5952
    if (flags & VIR_MIGRATE_OFFLINE &&
        !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                  VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5953 5954 5955
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("offline migration is not supported by "
                         "the source host"));
L
liguang 已提交
5956 5957 5958
        goto error;
    }

5959
    if (flags & VIR_MIGRATE_PEER2PEER) {
5960 5961
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
5962
            VIR_DEBUG("Using peer2peer migration");
5963
            if (virDomainMigratePeer2Peer(domain, NULL, flags,
5964
                                          dname, duri, NULL, bandwidth) < 0)
5965 5966 5967
                goto error;
        } else {
            /* No peer to peer migration supported */
5968
            virReportUnsupportedError();
5969 5970 5971
            goto error;
        }
    } else {
5972 5973
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_DIRECT)) {
5974
            VIR_DEBUG("Using direct migration");
5975 5976
            if (virDomainMigrateDirect(domain, NULL, flags,
                                       dname, duri, bandwidth) < 0)
5977 5978 5979
                goto error;
        } else {
            /* Cannot do a migration with only the perform step */
5980 5981 5982
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("direct migration is not supported by the"
                             " connection driver"));
5983 5984 5985 5986 5987 5988
            goto error;
        }
    }

    return 0;

5989
 error:
5990
    virDispatchError(domain->conn);
5991 5992 5993 5994
    return -1;
}


5995 5996 5997 5998 5999 6000
/**
 * virDomainMigrateToURI2:
 * @domain: a domain object
 * @dconnuri: (optional) URI for target libvirtd if @flags includes VIR_MIGRATE_PEER2PEER
 * @miguri: (optional) URI for invoking the migration, not if @flags includs VIR_MIGRATE_TUNNELLED
 * @dxml: (optional) XML config for launching guest on target
6001
 * @flags: bitwise-OR of virDomainMigrateFlags
6002
 * @dname: (optional) rename domain to this at destination
6003
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
6004 6005 6006 6007 6008 6009 6010 6011 6012 6013 6014 6015
 *
 * Migrate the domain object from its current host to the destination
 * host given by duri.
 *
 * Flags may be one of more of the following:
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
6016 6017 6018 6019 6020
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
6021 6022 6023
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
6024
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
6025
 *   VIR_MIGRATE_OFFLINE Migrate offline
6026 6027 6028 6029 6030 6031 6032 6033 6034 6035 6036 6037 6038 6039 6040 6041 6042
 *
 * The operation of this API hinges on the VIR_MIGRATE_PEER2PEER flag.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is set, the @dconnuri parameter
 * must be a valid libvirt connection URI, by which the source
 * libvirt driver can connect to the destination libvirt. If the
 * VIR_MIGRATE_PEER2PEER flag is NOT set, then @dconnuri must be
 * NULL.
 *
 * If the VIR_MIGRATE_TUNNELLED flag is NOT set, then the @miguri
 * parameter allows specification of a URI to use to initiate the
 * VM migration. It takes a hypervisor specific format. The uri_transports
 * element of the hypervisor capabilities XML includes details of the
 * supported URI schemes.
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 *
6043 6044 6045 6046
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
6047 6048 6049 6050 6051 6052 6053 6054 6055 6056 6057 6058 6059 6060 6061
 * If a hypervisor supports changing the configuration of the guest
 * during migration, the @dxml parameter specifies the new config
 * for the guest. The configuration must include an identical set
 * of virtual devices, to ensure a stable guest ABI across migration.
 * Only parameters related to host side configuration can be
 * changed in the XML. Hypervisors will validate this and refuse to
 * allow migration if the provided XML would cause a change in the
 * guest ABI,
 *
 * If a hypervisor supports renaming domains during migration,
 * the dname parameter specifies the new name for the domain.
 * Setting dname to NULL keeps the domain name the same.  If domain
 * renaming is not supported by the hypervisor, dname must be NULL or
 * else an error will be returned.
 *
6062
 * The maximum bandwidth (in MiB/s) that will be used to do migration
6063 6064 6065 6066 6067 6068 6069 6070 6071 6072 6073 6074 6075 6076 6077 6078 6079 6080 6081 6082 6083 6084 6085 6086 6087
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns 0 if the migration succeeded, -1 upon error.
 */
int
virDomainMigrateToURI2(virDomainPtr domain,
                       const char *dconnuri,
                       const char *miguri,
                       const char *dxml,
                       unsigned long flags,
                       const char *dname,
                       unsigned long bandwidth)
{
    VIR_DOMAIN_DEBUG(domain, "dconnuri=%s, miguri=%s, dxml=%s, "
6088
                     "flags=%lx, dname=%s, bandwidth=%lu",
6089 6090 6091 6092 6093 6094
                     NULLSTR(dconnuri), NULLSTR(miguri), NULLSTR(dxml),
                     flags, NULLSTR(dname), bandwidth);

    virResetLastError();

    /* First checkout the source */
6095
    virCheckDomainReturn(domain, -1);
6096
    virCheckReadOnlyGoto(domain->conn->flags, error);
6097

6098 6099 6100 6101 6102 6103 6104 6105 6106
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

6107
    if (flags & VIR_MIGRATE_PEER2PEER) {
6108 6109
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
6110 6111 6112 6113 6114 6115
            VIR_DEBUG("Using peer2peer migration");
            if (virDomainMigratePeer2Peer(domain, dxml, flags,
                                          dname, dconnuri, miguri, bandwidth) < 0)
                goto error;
        } else {
            /* No peer to peer migration supported */
6116
            virReportUnsupportedError();
6117 6118 6119
            goto error;
        }
    } else {
6120 6121
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_DIRECT)) {
6122 6123 6124 6125 6126 6127
            VIR_DEBUG("Using direct migration");
            if (virDomainMigrateDirect(domain, dxml, flags,
                                       dname, miguri, bandwidth) < 0)
                goto error;
        } else {
            /* Cannot do a migration with only the perform step */
6128 6129 6130
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("direct migration is not supported by the"
                             " connection driver"));
6131 6132 6133 6134 6135 6136
            goto error;
        }
    }

    return 0;

6137
 error:
6138 6139 6140 6141 6142
    virDispatchError(domain->conn);
    return -1;
}


J
Jiri Denemark 已提交
6143 6144 6145 6146 6147 6148 6149 6150 6151 6152 6153 6154 6155 6156 6157 6158 6159 6160 6161 6162 6163 6164 6165 6166 6167 6168 6169 6170 6171 6172 6173 6174 6175 6176 6177 6178 6179 6180 6181 6182 6183 6184 6185 6186 6187 6188 6189 6190 6191 6192 6193 6194 6195 6196 6197 6198 6199 6200 6201 6202 6203
/**
 * virDomainMigrateToURI3:
 * @domain: a domain object
 * @dconnuri: (optional) URI for target libvirtd if @flags includes VIR_MIGRATE_PEER2PEER
 * @params: (optional) migration parameters
 * @nparams: (optional) number of migration parameters in @params
 * @flags: bitwise-OR of virDomainMigrateFlags
 *
 * Migrate the domain object from its current host to the destination host
 * given by URI.
 *
 * See virDomainMigrateFlags documentation for description of individual flags.
 *
 * The operation of this API hinges on the VIR_MIGRATE_PEER2PEER flag.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is set, the @dconnuri parameter must be a
 * valid libvirt connection URI, by which the source libvirt daemon can connect
 * to the destination libvirt.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, then @dconnuri must be NULL
 * and VIR_MIGRATE_PARAM_URI migration parameter must be filled in with
 * hypervisor specific URI used to initiate the migration. This is called
 * "direct" migration.
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 *
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns 0 if the migration succeeded, -1 upon error.
 */
int
virDomainMigrateToURI3(virDomainPtr domain,
                       const char *dconnuri,
                       virTypedParameterPtr params,
                       unsigned int nparams,
                       unsigned int flags)
{
    bool compat;
    const char *compatParams[] = { VIR_MIGRATE_PARAM_URI,
                                   VIR_MIGRATE_PARAM_DEST_NAME,
                                   VIR_MIGRATE_PARAM_DEST_XML,
                                   VIR_MIGRATE_PARAM_BANDWIDTH };
    const char *uri = NULL;
    const char *dname = NULL;
    const char *dxml = NULL;
    unsigned long long bandwidth = 0;

    VIR_DOMAIN_DEBUG(domain, "dconnuri=%s, params=%p, nparms=%u flags=%x",
                     NULLSTR(dconnuri), params, nparams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

    /* First checkout the source */
6204
    virCheckDomainReturn(domain, -1);
6205
    virCheckReadOnlyGoto(domain->conn->flags, error);
J
Jiri Denemark 已提交
6206 6207 6208 6209 6210 6211 6212 6213 6214 6215 6216 6217 6218 6219 6220 6221 6222 6223 6224 6225 6226 6227 6228 6229 6230 6231 6232

    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

    compat = virTypedParamsCheck(params, nparams, compatParams,
                                 ARRAY_CARDINALITY(compatParams));

    if (virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_URI, &uri) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_NAME, &dname) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_XML, &dxml) < 0 ||
        virTypedParamsGetULLong(params, nparams,
                                VIR_MIGRATE_PARAM_BANDWIDTH, &bandwidth) < 0) {
        goto error;
    }

    if (flags & VIR_MIGRATE_PEER2PEER) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_P2P)) {
6233 6234 6235
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                           _("Peer-to-peer migration is not supported by "
                             "the connection driver"));
J
Jiri Denemark 已提交
6236 6237 6238 6239 6240 6241 6242 6243 6244 6245 6246 6247 6248 6249 6250
            goto error;
        }

        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_PARAMS)) {
            VIR_DEBUG("Using peer2peer migration with extensible parameters");
            if (virDomainMigratePeer2PeerParams(domain, dconnuri, params,
                                                nparams, flags) < 0)
                goto error;
        } else if (compat) {
            VIR_DEBUG("Using peer2peer migration");
            if (virDomainMigratePeer2Peer(domain, dxml, flags, dname,
                                          dconnuri, uri, bandwidth) < 0)
                goto error;
        } else {
6251 6252 6253 6254
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Peer-to-peer migration with extensible "
                             "parameters is not supported but extended "
                             "parameters were passed"));
J
Jiri Denemark 已提交
6255 6256 6257 6258 6259 6260
            goto error;
        }
    } else {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_DIRECT)) {
            /* Cannot do a migration with only the perform step */
6261 6262 6263
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                           _("Direct migration is not supported by the"
                             " connection driver"));
J
Jiri Denemark 已提交
6264 6265 6266 6267
            goto error;
        }

        if (!compat) {
6268 6269 6270
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Direct migration does not support extensible "
                             "parameters"));
J
Jiri Denemark 已提交
6271 6272 6273 6274 6275 6276 6277 6278 6279 6280 6281
            goto error;
        }

        VIR_DEBUG("Using direct migration");
        if (virDomainMigrateDirect(domain, dxml, flags,
                                   dname, uri, bandwidth) < 0)
            goto error;
    }

    return 0;

6282
 error:
J
Jiri Denemark 已提交
6283 6284 6285 6286 6287
    virDispatchError(domain->conn);
    return -1;
}


D
Daniel Veillard 已提交
6288 6289
/*
 * Not for public use.  This function is part of the internal
6290 6291 6292
 * implementation of migration in the remote case.
 */
int
6293 6294 6295 6296 6297 6298 6299 6300
virDomainMigratePrepare(virConnectPtr dconn,
                        char **cookie,
                        int *cookielen,
                        const char *uri_in,
                        char **uri_out,
                        unsigned long flags,
                        const char *dname,
                        unsigned long bandwidth)
6301
{
J
John Levon 已提交
6302
    VIR_DEBUG("dconn=%p, cookie=%p, cookielen=%p, uri_in=%s, uri_out=%p, "
6303
              "flags=%lx, dname=%s, bandwidth=%lu", dconn, cookie, cookielen,
J
John Levon 已提交
6304
              NULLSTR(uri_in), uri_out, flags, NULLSTR(dname), bandwidth);
6305

6306 6307
    virResetLastError();

6308
    virCheckConnectReturn(dconn, -1);
6309
    virCheckReadOnlyGoto(dconn->flags, error);
6310

6311 6312
    if (dconn->driver->domainMigratePrepare) {
        int ret;
6313 6314 6315
        ret = dconn->driver->domainMigratePrepare(dconn, cookie, cookielen,
                                                  uri_in, uri_out,
                                                  flags, dname, bandwidth);
6316 6317 6318 6319
        if (ret < 0)
            goto error;
        return ret;
    }
6320

6321
    virReportUnsupportedError();
6322

6323
 error:
6324
    virDispatchError(dconn);
6325 6326 6327
    return -1;
}

6328

D
Daniel Veillard 已提交
6329 6330
/*
 * Not for public use.  This function is part of the internal
6331 6332 6333
 * implementation of migration in the remote case.
 */
int
6334 6335 6336 6337 6338 6339 6340
virDomainMigratePerform(virDomainPtr domain,
                        const char *cookie,
                        int cookielen,
                        const char *uri,
                        unsigned long flags,
                        const char *dname,
                        unsigned long bandwidth)
6341 6342
{
    virConnectPtr conn;
6343

6344
    VIR_DOMAIN_DEBUG(domain, "cookie=%p, cookielen=%d, uri=%s, flags=%lx, "
6345 6346
                     "dname=%s, bandwidth=%lu", cookie, cookielen, uri, flags,
                     NULLSTR(dname), bandwidth);
6347

6348 6349
    virResetLastError();

6350
    virCheckDomainReturn(domain, -1);
6351 6352
    conn = domain->conn;

6353
    virCheckReadOnlyGoto(conn->flags, error);
6354

6355 6356
    if (conn->driver->domainMigratePerform) {
        int ret;
6357 6358 6359
        ret = conn->driver->domainMigratePerform(domain, cookie, cookielen,
                                                 uri,
                                                 flags, dname, bandwidth);
6360 6361 6362 6363
        if (ret < 0)
            goto error;
        return ret;
    }
6364

6365
    virReportUnsupportedError();
6366

6367
 error:
6368
    virDispatchError(domain->conn);
6369 6370 6371
    return -1;
}

6372

D
Daniel Veillard 已提交
6373 6374
/*
 * Not for public use.  This function is part of the internal
6375 6376 6377
 * implementation of migration in the remote case.
 */
virDomainPtr
6378 6379 6380 6381 6382 6383
virDomainMigrateFinish(virConnectPtr dconn,
                       const char *dname,
                       const char *cookie,
                       int cookielen,
                       const char *uri,
                       unsigned long flags)
6384
{
J
John Levon 已提交
6385
    VIR_DEBUG("dconn=%p, dname=%s, cookie=%p, cookielen=%d, uri=%s, "
6386
              "flags=%lx", dconn, NULLSTR(dname), cookie, cookielen,
J
John Levon 已提交
6387
              uri, flags);
6388

6389 6390
    virResetLastError();

6391
    virCheckConnectReturn(dconn, NULL);
6392
    virCheckReadOnlyGoto(dconn->flags, error);
6393

6394 6395
    if (dconn->driver->domainMigrateFinish) {
        virDomainPtr ret;
6396 6397 6398
        ret = dconn->driver->domainMigrateFinish(dconn, dname,
                                                 cookie, cookielen,
                                                 uri, flags);
6399 6400 6401 6402
        if (!ret)
            goto error;
        return ret;
    }
6403

6404
    virReportUnsupportedError();
6405

6406
 error:
6407
    virDispatchError(dconn);
6408
    return NULL;
D
Daniel Veillard 已提交
6409 6410 6411
}


D
Daniel Veillard 已提交
6412 6413
/*
 * Not for public use.  This function is part of the internal
D
Daniel Veillard 已提交
6414 6415 6416
 * implementation of migration in the remote case.
 */
int
6417 6418 6419 6420 6421 6422 6423 6424 6425
virDomainMigratePrepare2(virConnectPtr dconn,
                         char **cookie,
                         int *cookielen,
                         const char *uri_in,
                         char **uri_out,
                         unsigned long flags,
                         const char *dname,
                         unsigned long bandwidth,
                         const char *dom_xml)
D
Daniel Veillard 已提交
6426
{
J
John Levon 已提交
6427
    VIR_DEBUG("dconn=%p, cookie=%p, cookielen=%p, uri_in=%s, uri_out=%p,"
6428
              "flags=%lx, dname=%s, bandwidth=%lu, dom_xml=%s", dconn,
J
John Levon 已提交
6429 6430
              cookie, cookielen, uri_in, uri_out, flags, NULLSTR(dname),
              bandwidth, dom_xml);
D
Daniel Veillard 已提交
6431

6432 6433
    virResetLastError();

6434
    virCheckConnectReturn(dconn, -1);
6435
    virCheckReadOnlyGoto(dconn->flags, error);
6436

6437 6438
    if (dconn->driver->domainMigratePrepare2) {
        int ret;
6439 6440 6441 6442
        ret = dconn->driver->domainMigratePrepare2(dconn, cookie, cookielen,
                                                   uri_in, uri_out,
                                                   flags, dname, bandwidth,
                                                   dom_xml);
6443 6444 6445 6446
        if (ret < 0)
            goto error;
        return ret;
    }
D
Daniel Veillard 已提交
6447

6448
    virReportUnsupportedError();
6449

6450
 error:
6451
    virDispatchError(dconn);
D
Daniel Veillard 已提交
6452 6453 6454
    return -1;
}

6455

D
Daniel Veillard 已提交
6456 6457
/*
 * Not for public use.  This function is part of the internal
D
Daniel Veillard 已提交
6458 6459 6460
 * implementation of migration in the remote case.
 */
virDomainPtr
6461 6462 6463 6464 6465 6466 6467
virDomainMigrateFinish2(virConnectPtr dconn,
                        const char *dname,
                        const char *cookie,
                        int cookielen,
                        const char *uri,
                        unsigned long flags,
                        int retcode)
D
Daniel Veillard 已提交
6468
{
J
John Levon 已提交
6469
    VIR_DEBUG("dconn=%p, dname=%s, cookie=%p, cookielen=%d, uri=%s, "
6470
              "flags=%lx, retcode=%d", dconn, NULLSTR(dname), cookie,
J
John Levon 已提交
6471
              cookielen, uri, flags, retcode);
D
Daniel Veillard 已提交
6472

6473 6474
    virResetLastError();

6475
    virCheckConnectReturn(dconn, NULL);
6476
    virCheckReadOnlyGoto(dconn->flags, error);
6477

6478 6479
    if (dconn->driver->domainMigrateFinish2) {
        virDomainPtr ret;
6480 6481 6482 6483
        ret = dconn->driver->domainMigrateFinish2(dconn, dname,
                                                  cookie, cookielen,
                                                  uri, flags,
                                                  retcode);
6484
        if (!ret && !retcode)
6485 6486 6487
            goto error;
        return ret;
    }
D
Daniel Veillard 已提交
6488

6489
    virReportUnsupportedError();
6490

6491
 error:
6492
    virDispatchError(dconn);
D
Daniel Veillard 已提交
6493
    return NULL;
6494 6495 6496
}


C
Chris Lalancette 已提交
6497 6498 6499 6500 6501 6502 6503 6504 6505 6506 6507 6508
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepareTunnel(virConnectPtr conn,
                              virStreamPtr st,
                              unsigned long flags,
                              const char *dname,
                              unsigned long bandwidth,
                              const char *dom_xml)
{
6509
    VIR_DEBUG("conn=%p, stream=%p, flags=%lx, dname=%s, "
6510
              "bandwidth=%lu, dom_xml=%s", conn, st, flags,
C
Chris Lalancette 已提交
6511 6512 6513 6514
              NULLSTR(dname), bandwidth, dom_xml);

    virResetLastError();

6515
    virCheckConnectReturn(conn, -1);
6516
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
6517 6518

    if (conn != st->conn) {
6519 6520 6521
        virReportInvalidArg(conn,
                            _("conn in %s must match stream connection"),
                            __FUNCTION__);
C
Chris Lalancette 已提交
6522 6523 6524 6525
        goto error;
    }

    if (conn->driver->domainMigratePrepareTunnel) {
6526
        int rv = conn->driver->domainMigratePrepareTunnel(conn, st,
C
Chris Lalancette 已提交
6527 6528 6529 6530 6531 6532 6533
                                                          flags, dname,
                                                          bandwidth, dom_xml);
        if (rv < 0)
            goto error;
        return rv;
    }

6534
    virReportUnsupportedError();
C
Chris Lalancette 已提交
6535

6536
 error:
6537
    virDispatchError(conn);
C
Chris Lalancette 已提交
6538 6539 6540
    return -1;
}

6541

6542 6543 6544 6545 6546 6547
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
char *
virDomainMigrateBegin3(virDomainPtr domain,
6548
                       const char *xmlin,
6549 6550 6551 6552 6553 6554 6555 6556
                       char **cookieout,
                       int *cookieoutlen,
                       unsigned long flags,
                       const char *dname,
                       unsigned long bandwidth)
{
    virConnectPtr conn;

6557
    VIR_DOMAIN_DEBUG(domain, "xmlin=%s cookieout=%p, cookieoutlen=%p, "
6558
                     "flags=%lx, dname=%s, bandwidth=%lu",
6559
                     NULLSTR(xmlin), cookieout, cookieoutlen, flags,
6560 6561 6562 6563
                     NULLSTR(dname), bandwidth);

    virResetLastError();

6564
    virCheckDomainReturn(domain, NULL);
6565 6566
    conn = domain->conn;

6567
    virCheckReadOnlyGoto(conn->flags, error);
6568 6569 6570

    if (conn->driver->domainMigrateBegin3) {
        char *xml;
6571
        xml = conn->driver->domainMigrateBegin3(domain, xmlin,
6572 6573 6574 6575 6576 6577 6578 6579
                                                cookieout, cookieoutlen,
                                                flags, dname, bandwidth);
        VIR_DEBUG("xml %s", NULLSTR(xml));
        if (!xml)
            goto error;
        return xml;
    }

6580
    virReportUnsupportedError();
6581

6582
 error:
6583 6584 6585 6586 6587 6588 6589 6590 6591 6592 6593 6594 6595 6596 6597 6598 6599 6600 6601 6602 6603 6604
    virDispatchError(domain->conn);
    return NULL;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepare3(virConnectPtr dconn,
                         const char *cookiein,
                         int cookieinlen,
                         char **cookieout,
                         int *cookieoutlen,
                         const char *uri_in,
                         char **uri_out,
                         unsigned long flags,
                         const char *dname,
                         unsigned long bandwidth,
                         const char *dom_xml)
{
6605 6606 6607 6608 6609
    VIR_DEBUG("dconn=%p, cookiein=%p, cookieinlen=%d, cookieout=%p, "
              "cookieoutlen=%p, uri_in=%s, uri_out=%p, flags=%lx, dname=%s, "
              "bandwidth=%lu, dom_xml=%s",
              dconn, cookiein, cookieinlen, cookieout, cookieoutlen, uri_in,
              uri_out, flags, NULLSTR(dname), bandwidth, dom_xml);
6610 6611 6612

    virResetLastError();

6613
    virCheckConnectReturn(dconn, -1);
6614
    virCheckReadOnlyGoto(dconn->flags, error);
6615 6616 6617 6618 6619 6620 6621 6622 6623 6624 6625 6626 6627 6628

    if (dconn->driver->domainMigratePrepare3) {
        int ret;
        ret = dconn->driver->domainMigratePrepare3(dconn,
                                                   cookiein, cookieinlen,
                                                   cookieout, cookieoutlen,
                                                   uri_in, uri_out,
                                                   flags, dname, bandwidth,
                                                   dom_xml);
        if (ret < 0)
            goto error;
        return ret;
    }

6629
    virReportUnsupportedError();
6630

6631
 error:
6632 6633 6634 6635
    virDispatchError(dconn);
    return -1;
}

6636

6637 6638 6639 6640 6641 6642 6643 6644 6645 6646 6647 6648 6649 6650 6651 6652
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepareTunnel3(virConnectPtr conn,
                               virStreamPtr st,
                               const char *cookiein,
                               int cookieinlen,
                               char **cookieout,
                               int *cookieoutlen,
                               unsigned long flags,
                               const char *dname,
                               unsigned long bandwidth,
                               const char *dom_xml)
{
6653 6654 6655
    VIR_DEBUG("conn=%p, stream=%p, cookiein=%p, cookieinlen=%d, cookieout=%p, "
              "cookieoutlen=%p, flags=%lx, dname=%s, bandwidth=%lu, "
              "dom_xml=%s",
6656 6657 6658 6659 6660
              conn, st, cookiein, cookieinlen, cookieout, cookieoutlen, flags,
              NULLSTR(dname), bandwidth, dom_xml);

    virResetLastError();

6661
    virCheckConnectReturn(conn, -1);
6662
    virCheckReadOnlyGoto(conn->flags, error);
6663 6664

    if (conn != st->conn) {
6665 6666 6667
        virReportInvalidArg(conn,
                            _("conn in %s must match stream connection"),
                            __FUNCTION__);
6668 6669 6670 6671 6672 6673 6674 6675 6676 6677 6678 6679 6680 6681
        goto error;
    }

    if (conn->driver->domainMigratePrepareTunnel3) {
        int rv = conn->driver->domainMigratePrepareTunnel3(conn, st,
                                                           cookiein, cookieinlen,
                                                           cookieout, cookieoutlen,
                                                           flags, dname,
                                                           bandwidth, dom_xml);
        if (rv < 0)
            goto error;
        return rv;
    }

6682
    virReportUnsupportedError();
6683

6684
 error:
6685 6686 6687 6688 6689 6690 6691 6692 6693 6694 6695
    virDispatchError(conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePerform3(virDomainPtr domain,
6696
                         const char *xmlin,
6697 6698 6699 6700
                         const char *cookiein,
                         int cookieinlen,
                         char **cookieout,
                         int *cookieoutlen,
6701
                         const char *dconnuri,
6702 6703 6704 6705 6706 6707 6708
                         const char *uri,
                         unsigned long flags,
                         const char *dname,
                         unsigned long bandwidth)
{
    virConnectPtr conn;

6709
    VIR_DOMAIN_DEBUG(domain, "xmlin=%s cookiein=%p, cookieinlen=%d, "
6710
                     "cookieout=%p, cookieoutlen=%p, dconnuri=%s, "
6711
                     "uri=%s, flags=%lx, dname=%s, bandwidth=%lu",
6712
                     NULLSTR(xmlin), cookiein, cookieinlen,
6713 6714
                     cookieout, cookieoutlen, NULLSTR(dconnuri),
                     NULLSTR(uri), flags, NULLSTR(dname), bandwidth);
6715 6716 6717

    virResetLastError();

6718
    virCheckDomainReturn(domain, -1);
6719 6720
    conn = domain->conn;

6721
    virCheckReadOnlyGoto(conn->flags, error);
6722 6723 6724

    if (conn->driver->domainMigratePerform3) {
        int ret;
6725
        ret = conn->driver->domainMigratePerform3(domain, xmlin,
6726 6727
                                                  cookiein, cookieinlen,
                                                  cookieout, cookieoutlen,
6728
                                                  dconnuri, uri,
6729 6730 6731 6732 6733 6734
                                                  flags, dname, bandwidth);
        if (ret < 0)
            goto error;
        return ret;
    }

6735
    virReportUnsupportedError();
6736

6737
 error:
6738 6739 6740 6741 6742 6743 6744 6745 6746
    virDispatchError(domain->conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
6747
virDomainPtr
6748 6749 6750 6751 6752 6753
virDomainMigrateFinish3(virConnectPtr dconn,
                        const char *dname,
                        const char *cookiein,
                        int cookieinlen,
                        char **cookieout,
                        int *cookieoutlen,
6754
                        const char *dconnuri,
6755 6756
                        const char *uri,
                        unsigned long flags,
6757
                        int cancelled)
6758 6759
{
    VIR_DEBUG("dconn=%p, dname=%s, cookiein=%p, cookieinlen=%d, cookieout=%p,"
6760
              "cookieoutlen=%p, dconnuri=%s, uri=%s, flags=%lx, retcode=%d",
6761
              dconn, NULLSTR(dname), cookiein, cookieinlen, cookieout,
6762
              cookieoutlen, NULLSTR(dconnuri), NULLSTR(uri), flags, cancelled);
6763 6764 6765

    virResetLastError();

6766
    virCheckConnectReturn(dconn, NULL);
6767
    virCheckReadOnlyGoto(dconn->flags, error);
6768 6769

    if (dconn->driver->domainMigrateFinish3) {
6770
        virDomainPtr ret;
6771 6772 6773
        ret = dconn->driver->domainMigrateFinish3(dconn, dname,
                                                  cookiein, cookieinlen,
                                                  cookieout, cookieoutlen,
6774
                                                  dconnuri, uri, flags,
6775
                                                  cancelled);
6776
        if (!ret && !cancelled)
6777 6778 6779 6780
            goto error;
        return ret;
    }

6781
    virReportUnsupportedError();
6782

6783
 error:
6784
    virDispatchError(dconn);
6785
    return NULL;
6786 6787 6788 6789 6790 6791 6792 6793 6794 6795 6796 6797 6798 6799 6800 6801
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigrateConfirm3(virDomainPtr domain,
                         const char *cookiein,
                         int cookieinlen,
                         unsigned long flags,
                         int cancelled)
{
    virConnectPtr conn;

6802 6803
    VIR_DOMAIN_DEBUG(domain,
                     "cookiein=%p, cookieinlen=%d, flags=%lx, cancelled=%d",
6804 6805 6806 6807
                     cookiein, cookieinlen, flags, cancelled);

    virResetLastError();

6808
    virCheckDomainReturn(domain, -1);
6809 6810
    conn = domain->conn;

6811
    virCheckReadOnlyGoto(conn->flags, error);
6812 6813 6814 6815 6816 6817 6818 6819 6820 6821 6822

    if (conn->driver->domainMigrateConfirm3) {
        int ret;
        ret = conn->driver->domainMigrateConfirm3(domain,
                                                  cookiein, cookieinlen,
                                                  flags, cancelled);
        if (ret < 0)
            goto error;
        return ret;
    }

6823
    virReportUnsupportedError();
6824

6825
 error:
6826 6827 6828 6829
    virDispatchError(domain->conn);
    return -1;
}

C
Chris Lalancette 已提交
6830

6831 6832 6833 6834 6835 6836 6837 6838 6839 6840 6841 6842 6843 6844 6845 6846 6847 6848 6849 6850 6851
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
char *
virDomainMigrateBegin3Params(virDomainPtr domain,
                             virTypedParameterPtr params,
                             int nparams,
                             char **cookieout,
                             int *cookieoutlen,
                             unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, "
                     "cookieout=%p, cookieoutlen=%p, flags=%x",
                     params, nparams, cookieout, cookieoutlen, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6852
    virCheckDomainReturn(domain, NULL);
6853 6854
    conn = domain->conn;

6855
    virCheckReadOnlyGoto(conn->flags, error);
6856 6857 6858 6859 6860 6861 6862 6863 6864 6865 6866 6867

    if (conn->driver->domainMigrateBegin3Params) {
        char *xml;
        xml = conn->driver->domainMigrateBegin3Params(domain, params, nparams,
                                                      cookieout, cookieoutlen,
                                                      flags);
        VIR_DEBUG("xml %s", NULLSTR(xml));
        if (!xml)
            goto error;
        return xml;
    }

6868
    virReportUnsupportedError();
6869

6870
 error:
6871 6872 6873 6874 6875 6876 6877 6878 6879 6880 6881 6882 6883 6884 6885 6886 6887 6888 6889 6890 6891 6892 6893 6894 6895 6896 6897 6898
    virDispatchError(domain->conn);
    return NULL;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepare3Params(virConnectPtr dconn,
                               virTypedParameterPtr params,
                               int nparams,
                               const char *cookiein,
                               int cookieinlen,
                               char **cookieout,
                               int *cookieoutlen,
                               char **uri_out,
                               unsigned int flags)
{
    VIR_DEBUG("dconn=%p, params=%p, nparams=%d, cookiein=%p, cookieinlen=%d, "
              "cookieout=%p, cookieoutlen=%p, uri_out=%p, flags=%x",
              dconn, params, nparams, cookiein, cookieinlen,
              cookieout, cookieoutlen, uri_out, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6899
    virCheckConnectReturn(dconn, -1);
6900
    virCheckReadOnlyGoto(dconn->flags, error);
6901 6902 6903 6904 6905 6906 6907 6908 6909 6910 6911 6912

    if (dconn->driver->domainMigratePrepare3Params) {
        int ret;
        ret = dconn->driver->domainMigratePrepare3Params(dconn, params, nparams,
                                                         cookiein, cookieinlen,
                                                         cookieout, cookieoutlen,
                                                         uri_out, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

6913
    virReportUnsupportedError();
6914

6915
 error:
6916 6917 6918 6919 6920 6921 6922 6923 6924 6925 6926 6927 6928 6929 6930 6931 6932 6933 6934 6935 6936 6937 6938 6939 6940 6941 6942 6943
    virDispatchError(dconn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepareTunnel3Params(virConnectPtr conn,
                                     virStreamPtr st,
                                     virTypedParameterPtr params,
                                     int nparams,
                                     const char *cookiein,
                                     int cookieinlen,
                                     char **cookieout,
                                     int *cookieoutlen,
                                     unsigned int flags)
{
    VIR_DEBUG("conn=%p, stream=%p, params=%p, nparams=%d, cookiein=%p, "
              "cookieinlen=%d, cookieout=%p, cookieoutlen=%p, flags=%x",
              conn, st, params, nparams, cookiein, cookieinlen,
              cookieout, cookieoutlen, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6944
    virCheckConnectReturn(conn, -1);
6945
    virCheckReadOnlyGoto(conn->flags, error);
6946 6947 6948 6949 6950 6951 6952 6953 6954 6955 6956 6957 6958 6959 6960 6961 6962 6963

    if (conn != st->conn) {
        virReportInvalidArg(conn,
                            _("conn in %s must match stream connection"),
                            __FUNCTION__);
        goto error;
    }

    if (conn->driver->domainMigratePrepareTunnel3Params) {
        int rv;
        rv = conn->driver->domainMigratePrepareTunnel3Params(
                conn, st, params, nparams, cookiein, cookieinlen,
                cookieout, cookieoutlen, flags);
        if (rv < 0)
            goto error;
        return rv;
    }

6964
    virReportUnsupportedError();
6965

6966
 error:
6967 6968 6969 6970 6971 6972 6973 6974 6975 6976 6977 6978 6979 6980 6981 6982 6983 6984 6985 6986 6987 6988 6989 6990 6991 6992 6993 6994 6995 6996
    virDispatchError(conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePerform3Params(virDomainPtr domain,
                               const char *dconnuri,
                               virTypedParameterPtr params,
                               int nparams,
                               const char *cookiein,
                               int cookieinlen,
                               char **cookieout,
                               int *cookieoutlen,
                               unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "dconnuri=%s, params=%p, nparams=%d, cookiein=%p, "
                     "cookieinlen=%d, cookieout=%p, cookieoutlen=%p, flags=%x",
                     NULLSTR(dconnuri), params, nparams, cookiein,
                     cookieinlen, cookieout, cookieoutlen, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6997
    virCheckDomainReturn(domain, -1);
6998 6999
    conn = domain->conn;

7000
    virCheckReadOnlyGoto(conn->flags, error);
7001 7002 7003 7004 7005 7006 7007 7008 7009 7010 7011

    if (conn->driver->domainMigratePerform3Params) {
        int ret;
        ret = conn->driver->domainMigratePerform3Params(
                domain, dconnuri, params, nparams, cookiein, cookieinlen,
                cookieout, cookieoutlen, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7012
    virReportUnsupportedError();
7013

7014
 error:
7015 7016 7017 7018 7019 7020 7021 7022 7023 7024 7025 7026 7027 7028 7029 7030 7031 7032 7033 7034 7035 7036 7037 7038 7039 7040 7041 7042
    virDispatchError(domain->conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
virDomainPtr
virDomainMigrateFinish3Params(virConnectPtr dconn,
                              virTypedParameterPtr params,
                              int nparams,
                              const char *cookiein,
                              int cookieinlen,
                              char **cookieout,
                              int *cookieoutlen,
                              unsigned int flags,
                              int cancelled)
{
    VIR_DEBUG("dconn=%p, params=%p, nparams=%d, cookiein=%p, cookieinlen=%d, "
              "cookieout=%p, cookieoutlen=%p, flags=%x, cancelled=%d",
              dconn, params, nparams, cookiein, cookieinlen, cookieout,
              cookieoutlen, flags, cancelled);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

7043
    virCheckConnectReturn(dconn, NULL);
7044
    virCheckReadOnlyGoto(dconn->flags, error);
7045 7046 7047 7048 7049 7050

    if (dconn->driver->domainMigrateFinish3Params) {
        virDomainPtr ret;
        ret = dconn->driver->domainMigrateFinish3Params(
                dconn, params, nparams, cookiein, cookieinlen,
                cookieout, cookieoutlen, flags, cancelled);
7051
        if (!ret && !cancelled)
7052 7053 7054 7055
            goto error;
        return ret;
    }

7056
    virReportUnsupportedError();
7057

7058
 error:
7059 7060 7061 7062 7063 7064 7065 7066 7067 7068 7069 7070 7071 7072 7073 7074 7075 7076 7077 7078 7079 7080 7081 7082 7083 7084 7085
    virDispatchError(dconn);
    return NULL;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigrateConfirm3Params(virDomainPtr domain,
                               virTypedParameterPtr params,
                               int nparams,
                               const char *cookiein,
                               int cookieinlen,
                               unsigned int flags,
                               int cancelled)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, cookiein=%p, "
                     "cookieinlen=%d, flags=%x, cancelled=%d",
                     params, nparams, cookiein, cookieinlen, flags, cancelled);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

7086
    virCheckDomainReturn(domain, -1);
7087 7088
    conn = domain->conn;

7089
    virCheckReadOnlyGoto(conn->flags, error);
7090 7091 7092 7093 7094 7095 7096 7097 7098 7099 7100

    if (conn->driver->domainMigrateConfirm3Params) {
        int ret;
        ret = conn->driver->domainMigrateConfirm3Params(
                domain, params, nparams,
                cookiein, cookieinlen, flags, cancelled);
        if (ret < 0)
            goto error;
        return ret;
    }

7101
    virReportUnsupportedError();
7102

7103
 error:
7104 7105 7106 7107 7108
    virDispatchError(domain->conn);
    return -1;
}


7109 7110 7111 7112
/**
 * virNodeGetInfo:
 * @conn: pointer to the hypervisor connection
 * @info: pointer to a virNodeInfo structure allocated by the user
7113
 *
7114 7115 7116 7117 7118
 * Extract hardware information about the node.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
7119 7120
virNodeGetInfo(virConnectPtr conn, virNodeInfoPtr info)
{
7121
    VIR_DEBUG("conn=%p, info=%p", conn, info);
7122

7123 7124
    virResetLastError();

7125
    virCheckConnectReturn(conn, -1);
7126
    virCheckNonNullArgGoto(info, error);
7127

7128 7129
    if (conn->driver->nodeGetInfo) {
        int ret;
7130
        ret = conn->driver->nodeGetInfo(conn, info);
7131 7132 7133 7134
        if (ret < 0)
            goto error;
        return ret;
    }
7135

7136
    virReportUnsupportedError();
7137

7138
 error:
7139
    virDispatchError(conn);
7140
    return -1;
7141
}
7142

7143

7144 7145 7146 7147 7148 7149
/**
 * virConnectGetCapabilities:
 * @conn: pointer to the hypervisor connection
 *
 * Provides capabilities of the hypervisor / driver.
 *
7150 7151
 * Returns NULL in case of error, or an XML string
 * defining the capabilities.
7152 7153 7154
 * The client must free the returned string after use.
 */
char *
7155
virConnectGetCapabilities(virConnectPtr conn)
7156
{
7157
    VIR_DEBUG("conn=%p", conn);
7158

7159 7160
    virResetLastError();

7161
    virCheckConnectReturn(conn, NULL);
7162

7163
    if (conn->driver->connectGetCapabilities) {
7164
        char *ret;
7165
        ret = conn->driver->connectGetCapabilities(conn);
7166 7167
        if (!ret)
            goto error;
7168
        VIR_DEBUG("conn=%p ret=%s", conn, ret);
7169 7170
        return ret;
    }
7171

7172
    virReportUnsupportedError();
7173

7174
 error:
7175
    virDispatchError(conn);
7176 7177 7178
    return NULL;
}

7179

7180 7181 7182
/**
 * virNodeGetCPUStats:
 * @conn: pointer to the hypervisor connection.
7183
 * @cpuNum: number of node cpu. (VIR_NODE_CPU_STATS_ALL_CPUS means total cpu
7184 7185 7186 7187
 *          statistics)
 * @params: pointer to node cpu time parameter objects
 * @nparams: number of node cpu time parameter (this value should be same or
 *          less than the number of parameters supported)
7188
 * @flags: extra flags; not used yet, so callers should always pass 0
7189 7190 7191
 *
 * This function provides individual cpu statistics of the node.
 * If you want to get total cpu statistics of the node, you must specify
7192
 * VIR_NODE_CPU_STATS_ALL_CPUS to @cpuNum.
7193 7194 7195 7196 7197 7198
 * The @params array will be filled with the values equal to the number of
 * parameters suggested by @nparams
 *
 * As the value of @nparams is dynamic, call the API setting @nparams to 0 and
 * @params as NULL, the API returns the number of parameters supported by the
 * HV by updating @nparams on SUCCESS. The caller should then allocate @params
7199
 * array, i.e. (sizeof(@virNodeCPUStats) * @nparams) bytes and call
7200 7201 7202 7203
 * the API again.
 *
 * Here is a sample code snippet:
 *
E
Eric Blake 已提交
7204 7205 7206 7207 7208 7209 7210 7211
 *   if (virNodeGetCPUStats(conn, cpuNum, NULL, &nparams, 0) == 0 &&
 *       nparams != 0) {
 *       if ((params = malloc(sizeof(virNodeCPUStats) * nparams)) == NULL)
 *           goto error;
 *       memset(params, 0, sizeof(virNodeCPUStats) * nparams);
 *       if (virNodeGetCPUStats(conn, cpuNum, params, &nparams, 0))
 *           goto error;
 *   }
7212 7213 7214 7215 7216 7217 7218 7219 7220 7221 7222 7223 7224 7225 7226 7227 7228 7229 7230 7231 7232 7233
 *
 * This function doesn't require privileged access to the hypervisor.
 * This function expects the caller to allocate the @params.
 *
 * CPU time Statistics:
 *
 * VIR_NODE_CPU_STATS_KERNEL:
 *     The cumulative CPU time which spends by kernel,
 *     when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_USER:
 *     The cumulative CPU time which spends by user processes,
 *     when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_IDLE:
 *     The cumulative idle CPU time, when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_IOWAIT:
 *     The cumulative I/O wait CPU time, when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_UTILIZATION:
 *     The CPU utilization. The usage value is in percent and 100%
 *     represents all CPUs on the server.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
7234 7235 7236 7237 7238
int
virNodeGetCPUStats(virConnectPtr conn,
                   int cpuNum,
                   virNodeCPUStatsPtr params,
                   int *nparams, unsigned int flags)
7239
{
7240
    VIR_DEBUG("conn=%p, cpuNum=%d, params=%p, nparams=%d, flags=%x",
7241 7242 7243 7244
              conn, cpuNum, params, nparams ? *nparams : -1, flags);

    virResetLastError();

7245
    virCheckConnectReturn(conn, -1);
7246 7247
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
7248
    if (cpuNum < 0 && cpuNum != VIR_NODE_CPU_STATS_ALL_CPUS) {
7249
        virReportInvalidArg(cpuNum,
7250 7251
                            _("cpuNum in %s only accepts %d as a negative "
                              "value"),
7252
                            __FUNCTION__, VIR_NODE_CPU_STATS_ALL_CPUS);
7253 7254 7255 7256 7257
        goto error;
    }

    if (conn->driver->nodeGetCPUStats) {
        int ret;
7258
        ret = conn->driver->nodeGetCPUStats(conn, cpuNum, params, nparams, flags);
7259 7260 7261 7262
        if (ret < 0)
            goto error;
        return ret;
    }
7263
    virReportUnsupportedError();
7264

7265
 error:
7266 7267 7268 7269
    virDispatchError(conn);
    return -1;
}

7270

7271 7272 7273
/**
 * virNodeGetMemoryStats:
 * @conn: pointer to the hypervisor connection.
7274 7275
 * @cellNum: number of node cell. (VIR_NODE_MEMORY_STATS_ALL_CELLS means total
 *           cell statistics)
7276 7277 7278
 * @params: pointer to node memory stats objects
 * @nparams: number of node memory stats (this value should be same or
 *          less than the number of stats supported)
7279
 * @flags: extra flags; not used yet, so callers should always pass 0
7280 7281
 *
 * This function provides memory stats of the node.
7282
 * If you want to get total memory statistics of the node, you must specify
7283
 * VIR_NODE_MEMORY_STATS_ALL_CELLS to @cellNum.
7284 7285 7286 7287 7288 7289
 * The @params array will be filled with the values equal to the number of
 * stats suggested by @nparams
 *
 * As the value of @nparams is dynamic, call the API setting @nparams to 0 and
 * @params as NULL, the API returns the number of parameters supported by the
 * HV by updating @nparams on SUCCESS. The caller should then allocate @params
7290
 * array, i.e. (sizeof(@virNodeMemoryStats) * @nparams) bytes and call
7291 7292 7293 7294
 * the API again.
 *
 * Here is the sample code snippet:
 *
E
Eric Blake 已提交
7295 7296 7297 7298 7299 7300 7301 7302
 *   if (virNodeGetMemoryStats(conn, cellNum, NULL, &nparams, 0) == 0 &&
 *       nparams != 0) {
 *       if ((params = malloc(sizeof(virNodeMemoryStats) * nparams)) == NULL)
 *           goto error;
 *       memset(params, cellNum, 0, sizeof(virNodeMemoryStats) * nparams);
 *       if (virNodeGetMemoryStats(conn, params, &nparams, 0))
 *           goto error;
 *   }
7303 7304 7305 7306 7307 7308
 *
 * This function doesn't require privileged access to the hypervisor.
 * This function expects the caller to allocate the @params.
 *
 * Memory Stats:
 *
7309
 * VIR_NODE_MEMORY_STATS_TOTAL:
7310
 *     The total memory usage.(KB)
7311
 * VIR_NODE_MEMORY_STATS_FREE:
7312 7313
 *     The free memory usage.(KB)
 *     On linux, this usage includes buffers and cached.
7314
 * VIR_NODE_MEMORY_STATS_BUFFERS:
7315
 *     The buffers memory usage.(KB)
7316
 * VIR_NODE_MEMORY_STATS_CACHED:
7317 7318 7319 7320
 *     The cached memory usage.(KB)
 *
 * Returns -1 in case of error, 0 in case of success.
 */
7321 7322 7323 7324 7325
int
virNodeGetMemoryStats(virConnectPtr conn,
                      int cellNum,
                      virNodeMemoryStatsPtr params,
                      int *nparams, unsigned int flags)
7326
{
7327
    VIR_DEBUG("conn=%p, cellNum=%d, params=%p, nparams=%d, flags=%x",
7328 7329 7330 7331
              conn, cellNum, params, nparams ? *nparams : -1, flags);

    virResetLastError();

7332
    virCheckConnectReturn(conn, -1);
7333 7334
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
7335
    if (cellNum < 0 && cellNum != VIR_NODE_MEMORY_STATS_ALL_CELLS) {
7336
        virReportInvalidArg(cpuNum,
7337 7338
                            _("cellNum in %s only accepts %d as a negative "
                              "value"),
7339
                            __FUNCTION__, VIR_NODE_MEMORY_STATS_ALL_CELLS);
7340 7341 7342 7343 7344
        goto error;
    }

    if (conn->driver->nodeGetMemoryStats) {
        int ret;
7345
        ret = conn->driver->nodeGetMemoryStats(conn, cellNum, params, nparams, flags);
7346 7347 7348 7349
        if (ret < 0)
            goto error;
        return ret;
    }
7350
    virReportUnsupportedError();
7351

7352
 error:
7353 7354 7355 7356
    virDispatchError(conn);
    return -1;
}

7357

7358 7359 7360
/**
 * virNodeGetFreeMemory:
 * @conn: pointer to the hypervisor connection
7361
 *
D
Daniel Veillard 已提交
7362
 * provides the free memory available on the Node
7363
 * Note: most libvirt APIs provide memory sizes in kibibytes, but in this
D
Daniel Veillard 已提交
7364
 * function the returned value is in bytes. Divide by 1024 as necessary.
7365
 *
D
Daniel Veillard 已提交
7366
 * Returns the available free memory in bytes or 0 in case of error
7367 7368 7369 7370
 */
unsigned long long
virNodeGetFreeMemory(virConnectPtr conn)
{
7371
    VIR_DEBUG("conn=%p", conn);
7372

7373 7374
    virResetLastError();

7375
    virCheckConnectReturn(conn, 0);
7376

7377
    if (conn->driver->nodeGetFreeMemory) {
7378
        unsigned long long ret;
7379
        ret = conn->driver->nodeGetFreeMemory(conn);
7380 7381 7382 7383
        if (ret == 0)
            goto error;
        return ret;
    }
7384

7385
    virReportUnsupportedError();
7386

7387
 error:
7388
    virDispatchError(conn);
7389 7390 7391
    return 0;
}

7392

7393 7394 7395 7396 7397 7398 7399 7400 7401 7402
/**
 * virNodeSuspendForDuration:
 * @conn: pointer to the hypervisor connection
 * @target: the state to which the host must be suspended to,
 *         such as: VIR_NODE_SUSPEND_TARGET_MEM (Suspend-to-RAM)
 *                  VIR_NODE_SUSPEND_TARGET_DISK (Suspend-to-Disk)
 *                  VIR_NODE_SUSPEND_TARGET_HYBRID (Hybrid-Suspend,
 *                  which is a combination of the former modes).
 * @duration: the time duration in seconds for which the host
 *            has to be suspended
7403
 * @flags: extra flags; not used yet, so callers should always pass 0
7404 7405 7406 7407 7408 7409 7410 7411 7412 7413 7414 7415 7416 7417 7418 7419
 *
 * Attempt to suspend the node (host machine) for the given duration of
 * time in the specified state (Suspend-to-RAM, Suspend-to-Disk or
 * Hybrid-Suspend). Schedule the node's Real-Time-Clock interrupt to
 * resume the node after the duration is complete.
 *
 * Returns 0 on success (i.e., the node will be suspended after a short
 * delay), -1 on failure (the operation is not supported, or an attempted
 * suspend is already underway).
 */
int
virNodeSuspendForDuration(virConnectPtr conn,
                          unsigned int target,
                          unsigned long long duration,
                          unsigned int flags)
{
7420 7421
    VIR_DEBUG("conn=%p, target=%d, duration=%lld, flags=%x",
              conn, target, duration, flags);
7422 7423 7424

    virResetLastError();

7425
    virCheckConnectReturn(conn, -1);
7426
    virCheckReadOnlyGoto(conn->flags, error);
7427 7428 7429 7430 7431 7432 7433 7434 7435 7436

    if (conn->driver->nodeSuspendForDuration) {
        int ret;
        ret = conn->driver->nodeSuspendForDuration(conn, target,
                                                   duration, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7437
    virReportUnsupportedError();
7438

7439
 error:
7440 7441 7442 7443
    virDispatchError(conn);
    return -1;
}

7444

7445 7446 7447 7448 7449 7450 7451 7452
/*
 * virNodeGetMemoryParameters:
 * @conn: pointer to the hypervisor connection
 * @params: pointer to memory parameter object
 *          (return value, allocated by the caller)
 * @nparams: pointer to number of memory parameters; input and output
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
7453 7454 7455 7456
 * Get all node memory parameters (parameters unsupported by OS will be
 * omitted).  On input, @nparams gives the size of the @params array;
 * on output, @nparams gives how many slots were filled with parameter
 * information, which might be less but will not exceed the input value.
7457 7458 7459 7460 7461 7462 7463 7464 7465 7466 7467 7468 7469 7470 7471 7472 7473 7474 7475 7476 7477
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.  See virDomainGetMemoryParameters() for an equivalent usage
 * example.
 *
 * Returns 0 in case of success, and -1 in case of failure.
 */
int
virNodeGetMemoryParameters(virConnectPtr conn,
                           virTypedParameterPtr params,
                           int *nparams,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, params=%p, nparams=%p, flags=%x",
              conn, params, nparams, flags);

    virResetLastError();

7478
    virCheckConnectReturn(conn, -1);
7479 7480 7481 7482 7483 7484 7485 7486 7487 7488 7489 7490 7491 7492 7493 7494 7495 7496
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

    if (VIR_DRV_SUPPORTS_FEATURE(conn->driver, conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    if (conn->driver->nodeGetMemoryParameters) {
        int ret;
        ret = conn->driver->nodeGetMemoryParameters(conn, params,
                                                    nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7497
    virReportUnsupportedError();
7498

7499
 error:
7500 7501 7502 7503
    virDispatchError(conn);
    return -1;
}

7504

7505 7506 7507 7508 7509 7510 7511 7512 7513
/*
 * virNodeSetMemoryParameters:
 * @conn: pointer to the hypervisor connection
 * @params: pointer to scheduler parameter objects
 * @nparams: number of scheduler parameter objects
 *          (this value can be the same or less than the returned
 *           value nparams of virDomainGetSchedulerType)
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
7514 7515
 * Change all or a subset of the node memory tunables. The function
 * fails if not all of the tunables are supported.
O
Osier Yang 已提交
7516 7517 7518 7519 7520 7521
 *
 * Note that it's not recommended to use this function while the
 * outside tuning program is running (such as ksmtuned under Linux),
 * as they could change the tunables in parallel, which could cause
 * conflicts.
 *
7522 7523 7524 7525 7526 7527 7528 7529 7530 7531 7532 7533
 * This function may require privileged access to the hypervisor.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virNodeSetMemoryParameters(virConnectPtr conn,
                           virTypedParameterPtr params,
                           int nparams,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, params=%p, nparams=%d, flags=%x",
              conn, params, nparams, flags);
7534
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
7535 7536 7537

    virResetLastError();

7538
    virCheckConnectReturn(conn, -1);
7539
    virCheckReadOnlyGoto(conn->flags, error);
7540 7541 7542 7543 7544 7545 7546 7547 7548 7549 7550 7551 7552 7553 7554
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
        goto error;

    if (conn->driver->nodeSetMemoryParameters) {
        int ret;
        ret = conn->driver->nodeSetMemoryParameters(conn, params,
                                                          nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7555
    virReportUnsupportedError();
7556

7557
 error:
7558 7559 7560
    virDispatchError(conn);
    return -1;
}
7561

7562

7563 7564 7565
/**
 * virDomainGetSchedulerType:
 * @domain: pointer to domain object
7566 7567
 * @nparams: pointer to number of scheduler parameters, can be NULL
 *           (return value)
7568
 *
7569
 * Get the scheduler type and the number of scheduler parameters.
7570 7571 7572 7573 7574 7575 7576 7577
 *
 * Returns NULL in case of error. The caller must free the returned string.
 */
char *
virDomainGetSchedulerType(virDomainPtr domain, int *nparams)
{
    virConnectPtr conn;
    char *schedtype;
7578 7579

    VIR_DOMAIN_DEBUG(domain, "nparams=%p", nparams);
7580

7581 7582
    virResetLastError();

7583
    virCheckDomainReturn(domain, NULL);
7584 7585 7586
    conn = domain->conn;

    if (conn->driver->domainGetSchedulerType){
7587
        schedtype = conn->driver->domainGetSchedulerType(domain, nparams);
7588 7589
        if (!schedtype)
            goto error;
7590 7591 7592
        return schedtype;
    }

7593
    virReportUnsupportedError();
7594

7595
 error:
7596
    virDispatchError(domain->conn);
7597 7598 7599 7600 7601 7602 7603
    return NULL;
}


/**
 * virDomainGetSchedulerParameters:
 * @domain: pointer to domain object
7604
 * @params: pointer to scheduler parameter objects
7605
 *          (return value)
7606
 * @nparams: pointer to number of scheduler parameter objects
7607 7608 7609 7610 7611 7612 7613
 *          (this value should generally be as large as the returned value
 *           nparams of virDomainGetSchedulerType()); input and output
 *
 * Get all scheduler parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.  @nparams cannot be 0.
7614
 *
7615
 * It is hypervisor specific whether this returns the live or
7616
 * persistent state; for more control, use
7617
 * virDomainGetSchedulerParametersFlags().
7618 7619 7620 7621 7622
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetSchedulerParameters(virDomainPtr domain,
7623
                                virTypedParameterPtr params, int *nparams)
7624 7625
{
    virConnectPtr conn;
7626 7627

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%p", params, nparams);
7628

7629 7630
    virResetLastError();

7631
    virCheckDomainReturn(domain, -1);
7632

7633 7634 7635
    virCheckNonNullArgGoto(params, error);
    virCheckNonNullArgGoto(nparams, error);
    virCheckPositiveArgGoto(*nparams, error);
7636

7637 7638
    conn = domain->conn;

7639 7640
    if (conn->driver->domainGetSchedulerParameters) {
        int ret;
7641
        ret = conn->driver->domainGetSchedulerParameters(domain, params, nparams);
7642 7643 7644 7645
        if (ret < 0)
            goto error;
        return ret;
    }
7646

7647
    virReportUnsupportedError();
7648

7649
 error:
7650
    virDispatchError(domain->conn);
7651 7652 7653
    return -1;
}

7654

7655 7656 7657 7658 7659 7660 7661
/**
 * virDomainGetSchedulerParametersFlags:
 * @domain: pointer to domain object
 * @params: pointer to scheduler parameter object
 *          (return value)
 * @nparams: pointer to number of scheduler parameter
 *          (this value should be same than the returned value
7662
 *           nparams of virDomainGetSchedulerType()); input and output
E
Eric Blake 已提交
7663
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
7664
 *
7665 7666 7667 7668
 * Get all scheduler parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.  @nparams cannot be 0.
7669
 *
7670 7671
 * The value of @flags can be exactly VIR_DOMAIN_AFFECT_CURRENT,
 * VIR_DOMAIN_AFFECT_LIVE, or VIR_DOMAIN_AFFECT_CONFIG.
7672
 *
7673 7674
 * Here is a sample code snippet:
 *
E
Eric Blake 已提交
7675 7676 7677 7678 7679 7680 7681 7682
 *   char *ret = virDomainGetSchedulerType(dom, &nparams);
 *   if (ret && nparams != 0) {
 *       if ((params = malloc(sizeof(*params) * nparams)) == NULL)
 *           goto error;
 *       memset(params, 0, sizeof(*params) * nparams);
 *       if (virDomainGetSchedulerParametersFlags(dom, params, &nparams, 0))
 *           goto error;
 *   }
7683
 *
7684 7685 7686 7687 7688 7689 7690 7691 7692
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetSchedulerParametersFlags(virDomainPtr domain,
                                     virTypedParameterPtr params, int *nparams,
                                     unsigned int flags)
{
    virConnectPtr conn;

7693
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%p, flags=%x",
7694 7695 7696 7697
                     params, nparams, flags);

    virResetLastError();

7698
    virCheckDomainReturn(domain, -1);
7699

7700 7701 7702
    virCheckNonNullArgGoto(params, error);
    virCheckNonNullArgGoto(nparams, error);
    virCheckPositiveArgGoto(*nparams, error);
7703

E
Eric Blake 已提交
7704 7705 7706
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
7707 7708 7709 7710

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
7711
        virReportInvalidArg(flags,
7712 7713
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
7714
                            __FUNCTION__);
7715 7716
        goto error;
    }
7717 7718 7719 7720
    conn = domain->conn;

    if (conn->driver->domainGetSchedulerParametersFlags) {
        int ret;
7721 7722
        ret = conn->driver->domainGetSchedulerParametersFlags(domain, params,
                                                              nparams, flags);
7723 7724 7725 7726 7727
        if (ret < 0)
            goto error;
        return ret;
    }

7728
    virReportUnsupportedError();
7729

7730
 error:
7731 7732 7733 7734
    virDispatchError(domain->conn);
    return -1;
}

7735

7736 7737 7738 7739
/**
 * virDomainSetSchedulerParameters:
 * @domain: pointer to domain object
 * @params: pointer to scheduler parameter objects
7740 7741
 * @nparams: number of scheduler parameter objects
 *          (this value can be the same or less than the returned value
7742 7743
 *           nparams of virDomainGetSchedulerType)
 *
7744 7745 7746 7747
 * Change all or a subset or the scheduler parameters.  It is
 * hypervisor-specific whether this sets live, persistent, or both
 * settings; for more control, use
 * virDomainSetSchedulerParametersFlags.
7748 7749 7750 7751
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
7752
virDomainSetSchedulerParameters(virDomainPtr domain,
7753
                                virTypedParameterPtr params, int nparams)
7754 7755
{
    virConnectPtr conn;
7756 7757

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d", params, nparams);
7758
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
7759

7760 7761
    virResetLastError();

7762 7763
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
7764

7765
    virCheckReadOnlyGoto(conn->flags, error);
7766 7767 7768
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

7769
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
7770
        goto error;
7771

7772 7773
    if (conn->driver->domainSetSchedulerParameters) {
        int ret;
7774
        ret = conn->driver->domainSetSchedulerParameters(domain, params, nparams);
7775 7776 7777 7778
        if (ret < 0)
            goto error;
        return ret;
    }
7779

7780
    virReportUnsupportedError();
7781

7782
 error:
7783 7784 7785 7786 7787 7788 7789 7790 7791
    virDispatchError(domain->conn);
    return -1;
}


/**
 * virDomainSetSchedulerParametersFlags:
 * @domain: pointer to domain object
 * @params: pointer to scheduler parameter objects
7792 7793
 * @nparams: number of scheduler parameter objects
 *          (this value can be the same or less than the returned value
7794
 *           nparams of virDomainGetSchedulerType)
7795
 * @flags: bitwise-OR of virDomainModificationImpact
7796
 *
7797
 * Change a subset or all scheduler parameters.  The value of @flags
7798 7799 7800
 * should be either VIR_DOMAIN_AFFECT_CURRENT, or a bitwise-or of
 * values from VIR_DOMAIN_AFFECT_LIVE and
 * VIR_DOMAIN_AFFECT_CURRENT, although hypervisors vary in which
7801
 * flags are supported.
7802 7803 7804 7805 7806
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetSchedulerParametersFlags(virDomainPtr domain,
7807
                                     virTypedParameterPtr params,
7808 7809 7810 7811 7812
                                     int nparams,
                                     unsigned int flags)
{
    virConnectPtr conn;

7813
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
7814
                     params, nparams, flags);
7815
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
7816 7817 7818

    virResetLastError();

7819 7820
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
7821

7822
    virCheckReadOnlyGoto(conn->flags, error);
7823 7824 7825
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

7826
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
7827
        goto error;
7828

7829 7830 7831 7832 7833 7834 7835 7836 7837 7838 7839
    if (conn->driver->domainSetSchedulerParametersFlags) {
        int ret;
        ret = conn->driver->domainSetSchedulerParametersFlags(domain,
                                                              params,
                                                              nparams,
                                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7840
    virReportUnsupportedError();
7841

7842
 error:
7843
    virDispatchError(domain->conn);
7844 7845 7846 7847
    return -1;
}


7848
/**
7849
 * virDomainBlockStats:
7850
 * @dom: pointer to the domain object
7851
 * @disk: path to the block device, or device shorthand
7852 7853 7854 7855 7856 7857
 * @stats: block device stats (returned)
 * @size: size of stats structure
 *
 * This function returns block device (disk) stats for block
 * devices attached to the domain.
 *
7858
 * The @disk parameter is either the device target shorthand (the
7859
 * <target dev='...'/> sub-element, such as "vda"), or (since 0.9.8)
7860 7861 7862
 * an unambiguous source name of the block device (the <source
 * file='...'/> sub-element, such as "/path/to/image").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
7863 7864 7865
 * elements within //domain/devices/disk. Some drivers might also
 * accept the empty string for the @disk parameter, and then yield
 * summary stats for the entire domain.
7866 7867 7868 7869 7870 7871 7872 7873 7874 7875 7876
 *
 * Domains may have more than one block device.  To get stats for
 * each you should make multiple calls to this function.
 *
 * Individual fields within the stats structure may be returned
 * as -1, which indicates that the hypervisor does not support
 * that particular statistic.
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
7877 7878
virDomainBlockStats(virDomainPtr dom, const char *disk,
                    virDomainBlockStatsPtr stats, size_t size)
7879 7880 7881
{
    virConnectPtr conn;
    struct _virDomainBlockStats stats2 = { -1, -1, -1, -1, -1 };
7882

7883
    VIR_DOMAIN_DEBUG(dom, "disk=%s, stats=%p, size=%zi", disk, stats, size);
7884

7885 7886
    virResetLastError();

7887
    virCheckDomainReturn(dom, -1);
7888 7889 7890 7891 7892 7893
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(stats, error);
    if (size > sizeof(stats2)) {
        virReportInvalidArg(size,
                            _("size in %s must not exceed %zu"),
                            __FUNCTION__, sizeof(stats2));
7894 7895
        goto error;
    }
7896 7897 7898
    conn = dom->conn;

    if (conn->driver->domainBlockStats) {
7899
        if (conn->driver->domainBlockStats(dom, disk, &stats2) == -1)
7900
            goto error;
7901

7902
        memcpy(stats, &stats2, size);
7903 7904 7905
        return 0;
    }

7906
    virReportUnsupportedError();
7907

7908
 error:
7909
    virDispatchError(dom->conn);
7910 7911 7912
    return -1;
}

7913

O
Osier Yang 已提交
7914 7915 7916
/**
 * virDomainBlockStatsFlags:
 * @dom: pointer to domain object
7917
 * @disk: path to the block device, or device shorthand
O
Osier Yang 已提交
7918 7919
 * @params: pointer to block stats parameter object
 *          (return value)
7920
 * @nparams: pointer to number of block stats; input and output
E
Eric Blake 已提交
7921
 * @flags: bitwise-OR of virTypedParameterFlags
O
Osier Yang 已提交
7922 7923 7924 7925
 *
 * This function is to get block stats parameters for block
 * devices attached to the domain.
 *
7926
 * The @disk parameter is either the device target shorthand (the
7927
 * <target dev='...'/> sub-element, such as "vda"), or (since 0.9.8)
7928 7929 7930
 * an unambiguous source name of the block device (the <source
 * file='...'/> sub-element, such as "/path/to/image").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
7931 7932 7933
 * elements within //domain/devices/disk. Some drivers might also
 * accept the empty string for the @disk parameter, and then yield
 * summary stats for the entire domain.
O
Osier Yang 已提交
7934 7935 7936 7937
 *
 * Domains may have more than one block device.  To get stats for
 * each you should make multiple calls to this function.
 *
7938 7939 7940 7941
 * On input, @nparams gives the size of the @params array; on output,
 * @nparams gives how many slots were filled with parameter
 * information, which might be less but will not exceed the input
 * value.
O
Osier Yang 已提交
7942
 *
7943 7944 7945 7946 7947
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. (Note that block devices of different types
 * might support different parameters, so it might be necessary to compute
 * @nparams for each block device). The caller should then allocate @params
O
Osier Yang 已提交
7948
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
7949
 * again. See virDomainGetMemoryParameters() for more details.
O
Osier Yang 已提交
7950 7951 7952
 *
 * Returns -1 in case of error, 0 in case of success.
 */
7953 7954 7955 7956 7957 7958
int
virDomainBlockStatsFlags(virDomainPtr dom,
                         const char *disk,
                         virTypedParameterPtr params,
                         int *nparams,
                         unsigned int flags)
O
Osier Yang 已提交
7959 7960 7961
{
    virConnectPtr conn;

7962 7963
    VIR_DOMAIN_DEBUG(dom, "disk=%s, params=%p, nparams=%d, flags=%x",
                     disk, params, nparams ? *nparams : -1, flags);
O
Osier Yang 已提交
7964 7965 7966

    virResetLastError();

7967
    virCheckDomainReturn(dom, -1);
7968 7969 7970 7971 7972 7973
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

E
Eric Blake 已提交
7974 7975 7976
    if (VIR_DRV_SUPPORTS_FEATURE(dom->conn->driver, dom->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
O
Osier Yang 已提交
7977 7978 7979 7980
    conn = dom->conn;

    if (conn->driver->domainBlockStatsFlags) {
        int ret;
7981
        ret = conn->driver->domainBlockStatsFlags(dom, disk, params, nparams, flags);
O
Osier Yang 已提交
7982 7983 7984 7985
        if (ret < 0)
            goto error;
        return ret;
    }
7986
    virReportUnsupportedError();
O
Osier Yang 已提交
7987

7988
 error:
O
Osier Yang 已提交
7989 7990 7991 7992 7993
    virDispatchError(dom->conn);
    return -1;
}


7994
/**
7995
 * virDomainInterfaceStats:
7996 7997 7998 7999 8000 8001 8002 8003 8004 8005
 * @dom: pointer to the domain object
 * @path: path to the interface
 * @stats: network interface stats (returned)
 * @size: size of stats structure
 *
 * This function returns network interface stats for interfaces
 * attached to the domain.
 *
 * The path parameter is the name of the network interface.
 *
D
Dan Kenigsberg 已提交
8006
 * Domains may have more than one network interface.  To get stats for
8007 8008 8009 8010 8011 8012 8013 8014 8015
 * each you should make multiple calls to this function.
 *
 * Individual fields within the stats structure may be returned
 * as -1, which indicates that the hypervisor does not support
 * that particular statistic.
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8016 8017
virDomainInterfaceStats(virDomainPtr dom, const char *path,
                        virDomainInterfaceStatsPtr stats, size_t size)
8018 8019 8020 8021
{
    virConnectPtr conn;
    struct _virDomainInterfaceStats stats2 = { -1, -1, -1, -1,
                                               -1, -1, -1, -1 };
8022 8023 8024

    VIR_DOMAIN_DEBUG(dom, "path=%s, stats=%p, size=%zi",
                     path, stats, size);
8025

8026 8027
    virResetLastError();

8028
    virCheckDomainReturn(dom, -1);
8029 8030 8031 8032 8033 8034
    virCheckNonNullArgGoto(path, error);
    virCheckNonNullArgGoto(stats, error);
    if (size > sizeof(stats2)) {
        virReportInvalidArg(size,
                            _("size in %s must not exceed %zu"),
                            __FUNCTION__, sizeof(stats2));
8035 8036
        goto error;
    }
8037

8038 8039 8040
    conn = dom->conn;

    if (conn->driver->domainInterfaceStats) {
8041
        if (conn->driver->domainInterfaceStats(dom, path, &stats2) == -1)
8042
            goto error;
8043

8044
        memcpy(stats, &stats2, size);
8045 8046 8047
        return 0;
    }

8048
    virReportUnsupportedError();
8049

8050
 error:
8051
    virDispatchError(dom->conn);
8052 8053 8054
    return -1;
}

8055 8056

/**
8057 8058 8059 8060 8061 8062 8063 8064
 * virDomainSetInterfaceParameters:
 * @domain: pointer to domain object
 * @device: the interface name or mac address
 * @params: pointer to interface parameter objects
 * @nparams: number of interface parameter (this value can be the same or
 *          less than the number of parameters supported)
 * @flags: bitwise-OR of virDomainModificationImpact
 *
8065 8066
 * Change a subset or all parameters of interface; currently this
 * includes bandwidth parameters.  The value of @flags should be
8067 8068
 * either VIR_DOMAIN_AFFECT_CURRENT, or a bitwise-or of values
 * VIR_DOMAIN_AFFECT_LIVE and VIR_DOMAIN_AFFECT_CONFIG, although
8069 8070
 * hypervisors vary in which flags are supported.
 *
8071 8072 8073 8074 8075 8076 8077 8078 8079 8080 8081 8082 8083 8084
 * This function may require privileged access to the hypervisor.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetInterfaceParameters(virDomainPtr domain,
                                const char *device,
                                virTypedParameterPtr params,
                                int nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "device=%s, params=%p, nparams=%d, flags=%x",
                     device, params, nparams, flags);
8085
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
8086 8087 8088

    virResetLastError();

8089 8090 8091 8092
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
8093 8094 8095
    virCheckNonNullArgGoto(params, error);
    virCheckPositiveArgGoto(nparams, error);

8096
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
8097
        goto error;
8098 8099 8100

    if (conn->driver->domainSetInterfaceParameters) {
        int ret;
8101 8102 8103
        ret = conn->driver->domainSetInterfaceParameters(domain, device,
                                                         params, nparams,
                                                         flags);
8104 8105 8106 8107 8108
        if (ret < 0)
            goto error;
        return ret;
    }

8109
    virReportUnsupportedError();
8110

8111
 error:
8112 8113 8114 8115
    virDispatchError(domain->conn);
    return -1;
}

8116 8117

/**
8118 8119 8120 8121 8122
 * virDomainGetInterfaceParameters:
 * @domain: pointer to domain object
 * @device: the interface name or mac address
 * @params: pointer to interface parameter objects
 *          (return value, allocated by the caller)
8123 8124
 * @nparams: pointer to number of interface parameter; input and output
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
8125 8126 8127 8128 8129 8130 8131 8132 8133 8134 8135 8136 8137 8138 8139 8140 8141 8142 8143 8144 8145 8146 8147 8148 8149 8150 8151 8152 8153 8154 8155
 *
 * Get all interface parameters. On input, @nparams gives the size of
 * the @params array; on output, @nparams gives how many slots were
 * filled with parameter information, which might be less but will not
 * exceed the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the
 * API again. See virDomainGetMemoryParameters() for an equivalent usage
 * example.
 *
 * This function may require privileged access to the hypervisor. This function
 * expects the caller to allocate the @params.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetInterfaceParameters(virDomainPtr domain,
                                const char *device,
                                virTypedParameterPtr params,
                                int *nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "device=%s, params=%p, nparams=%d, flags=%x",
                     device, params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

8156
    virCheckDomainReturn(domain, -1);
8157 8158 8159 8160 8161
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

8162 8163 8164 8165 8166 8167 8168 8169
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    conn = domain->conn;

    if (conn->driver->domainGetInterfaceParameters) {
        int ret;
8170 8171 8172
        ret = conn->driver->domainGetInterfaceParameters(domain, device,
                                                         params, nparams,
                                                         flags);
8173 8174 8175 8176
        if (ret < 0)
            goto error;
        return ret;
    }
8177
    virReportUnsupportedError();
8178

8179
 error:
8180 8181 8182 8183
    virDispatchError(domain->conn);
    return -1;
}

8184

8185 8186 8187 8188 8189
/**
 * virDomainMemoryStats:
 * @dom: pointer to the domain object
 * @stats: nr_stats-sized array of stat structures (returned)
 * @nr_stats: number of memory statistics requested
8190
 * @flags: extra flags; not used yet, so callers should always pass 0
8191 8192 8193 8194 8195 8196 8197 8198 8199 8200 8201 8202 8203 8204 8205 8206 8207 8208 8209 8210 8211
 *
 * This function provides memory statistics for the domain.
 *
 * Up to 'nr_stats' elements of 'stats' will be populated with memory statistics
 * from the domain.  Only statistics supported by the domain, the driver, and
 * this version of libvirt will be returned.
 *
 * Memory Statistics:
 *
 * VIR_DOMAIN_MEMORY_STAT_SWAP_IN:
 *     The total amount of data read from swap space (in kb).
 * VIR_DOMAIN_MEMORY_STAT_SWAP_OUT:
 *     The total amount of memory written out to swap space (in kb).
 * VIR_DOMAIN_MEMORY_STAT_MAJOR_FAULT:
 *     The number of page faults that required disk IO to service.
 * VIR_DOMAIN_MEMORY_STAT_MINOR_FAULT:
 *     The number of page faults serviced without disk IO.
 * VIR_DOMAIN_MEMORY_STAT_UNUSED:
 *     The amount of memory which is not being used for any purpose (in kb).
 * VIR_DOMAIN_MEMORY_STAT_AVAILABLE:
 *     The total amount of memory available to the domain's OS (in kb).
8212 8213
 * VIR_DOMAIN_MEMORY_STAT_ACTUAL_BALLOON:
 *     Current balloon value (in kb).
8214 8215 8216
 *
 * Returns: The number of stats provided or -1 in case of failure.
 */
8217 8218 8219
int
virDomainMemoryStats(virDomainPtr dom, virDomainMemoryStatPtr stats,
                     unsigned int nr_stats, unsigned int flags)
8220 8221 8222
{
    virConnectPtr conn;
    unsigned long nr_stats_ret = 0;
8223

E
Eric Blake 已提交
8224 8225
    VIR_DOMAIN_DEBUG(dom, "stats=%p, nr_stats=%u, flags=%x",
                     stats, nr_stats, flags);
8226 8227 8228

    virResetLastError();

8229
    virCheckDomainReturn(dom, -1);
8230

8231 8232 8233 8234 8235 8236 8237 8238
    if (!stats || nr_stats == 0)
        return 0;

    if (nr_stats > VIR_DOMAIN_MEMORY_STAT_NR)
        nr_stats = VIR_DOMAIN_MEMORY_STAT_NR;

    conn = dom->conn;
    if (conn->driver->domainMemoryStats) {
8239 8240
        nr_stats_ret = conn->driver->domainMemoryStats(dom, stats, nr_stats,
                                                       flags);
8241 8242 8243 8244 8245
        if (nr_stats_ret == -1)
            goto error;
        return nr_stats_ret;
    }

8246
    virReportUnsupportedError();
8247

8248
 error:
8249
    virDispatchError(dom->conn);
8250 8251 8252
    return -1;
}

8253

R
Richard W.M. Jones 已提交
8254 8255 8256
/**
 * virDomainBlockPeek:
 * @dom: pointer to the domain object
8257
 * @disk: path to the block device, or device shorthand
R
Richard W.M. Jones 已提交
8258 8259 8260
 * @offset: offset within block device
 * @size: size to read
 * @buffer: return buffer (must be at least size bytes)
8261
 * @flags: extra flags; not used yet, so callers should always pass 0
R
Richard W.M. Jones 已提交
8262 8263 8264 8265 8266 8267 8268 8269 8270 8271 8272 8273 8274 8275
 *
 * This function allows you to read the contents of a domain's
 * disk device.
 *
 * Typical uses for this are to determine if the domain has
 * written a Master Boot Record (indicating that the domain
 * has completed installation), or to try to work out the state
 * of the domain's filesystems.
 *
 * (Note that in the local case you might try to open the
 * block device or file directly, but that won't work in the
 * remote case, nor if you don't have sufficient permission.
 * Hence the need for this call).
 *
8276
 * The @disk parameter is either an unambiguous source name of the
8277 8278
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
8279
 * (the <target dev='...'/> sub-element, such as "vda").  Valid names
8280 8281
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
R
Richard W.M. Jones 已提交
8282 8283 8284 8285 8286 8287 8288
 *
 * 'offset' and 'size' represent an area which must lie entirely
 * within the device or file.  'size' may be 0 to test if the
 * call would succeed.
 *
 * 'buffer' is the return buffer and must be at least 'size' bytes.
 *
R
Richard W.M. Jones 已提交
8289 8290 8291
 * NB. The remote driver imposes a 64K byte limit on 'size'.
 * For your program to be able to work reliably over a remote
 * connection you should split large requests to <= 65536 bytes.
M
Michal Privoznik 已提交
8292
 * However, with 0.9.13 this RPC limit has been raised to 1M byte.
8293 8294
 * Starting with version 1.0.6 the RPC limit has been raised again.
 * Now large requests up to 16M byte are supported.
R
Richard W.M. Jones 已提交
8295
 *
R
Richard W.M. Jones 已提交
8296 8297 8298
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8299 8300 8301 8302 8303 8304
virDomainBlockPeek(virDomainPtr dom,
                   const char *disk,
                   unsigned long long offset /* really 64 bits */,
                   size_t size,
                   void *buffer,
                   unsigned int flags)
R
Richard W.M. Jones 已提交
8305 8306
{
    virConnectPtr conn;
8307

8308 8309
    VIR_DOMAIN_DEBUG(dom, "disk=%s, offset=%lld, size=%zi, buffer=%p, flags=%x",
                     disk, offset, size, buffer, flags);
R
Richard W.M. Jones 已提交
8310

8311 8312
    virResetLastError();

8313
    virCheckDomainReturn(dom, -1);
R
Richard W.M. Jones 已提交
8314
    conn = dom->conn;
8315

8316
    virCheckReadOnlyGoto(conn->flags, error);
8317
    virCheckNonNullArgGoto(disk, error);
R
Richard W.M. Jones 已提交
8318 8319

    /* Allow size == 0 as an access test. */
8320 8321
    if (size > 0)
        virCheckNonNullArgGoto(buffer, error);
R
Richard W.M. Jones 已提交
8322

8323 8324
    if (conn->driver->domainBlockPeek) {
        int ret;
8325
        ret = conn->driver->domainBlockPeek(dom, disk, offset, size,
8326 8327 8328 8329 8330
                                            buffer, flags);
        if (ret < 0)
            goto error;
        return ret;
    }
R
Richard W.M. Jones 已提交
8331

8332
    virReportUnsupportedError();
8333

8334
 error:
8335
    virDispatchError(dom->conn);
R
Richard W.M. Jones 已提交
8336 8337
    return -1;
}
8338

8339

O
Osier Yang 已提交
8340 8341 8342 8343
/**
 * virDomainBlockResize:
 * @dom: pointer to the domain object
 * @disk: path to the block image, or shorthand
E
Eric Blake 已提交
8344 8345
 * @size: new size of the block image, see below for unit
 * @flags: bitwise-OR of virDomainBlockResizeFlags
O
Osier Yang 已提交
8346
 *
E
Eric Blake 已提交
8347
 * Resize a block device of domain while the domain is running.  If
8348 8349 8350 8351 8352
 * @flags is 0, then @size is in kibibytes (blocks of 1024 bytes);
 * since 0.9.11, if @flags includes VIR_DOMAIN_BLOCK_RESIZE_BYTES,
 * @size is in bytes instead.  @size is taken directly as the new
 * size.  Depending on the file format, the hypervisor may round up
 * to the next alignment boundary.
O
Osier Yang 已提交
8353 8354 8355 8356
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
8357
 * (the <target dev='...'/> sub-element, such as "vda").  Valid names
O
Osier Yang 已提交
8358 8359 8360
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
E
Eric Blake 已提交
8361 8362 8363
 * Note that this call may fail if the underlying virtualization hypervisor
 * does not support it; this call requires privileged access to the
 * hypervisor.
O
Osier Yang 已提交
8364 8365 8366 8367
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8368 8369 8370 8371
virDomainBlockResize(virDomainPtr dom,
                     const char *disk,
                     unsigned long long size,
                     unsigned int flags)
O
Osier Yang 已提交
8372 8373 8374 8375 8376 8377 8378
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "disk=%s, size=%llu, flags=%x", disk, size, flags);

    virResetLastError();

8379
    virCheckDomainReturn(dom, -1);
O
Osier Yang 已提交
8380 8381
    conn = dom->conn;

8382
    virCheckReadOnlyGoto(conn->flags, error);
8383
    virCheckNonNullArgGoto(disk, error);
O
Osier Yang 已提交
8384 8385 8386

    if (conn->driver->domainBlockResize) {
        int ret;
8387
        ret = conn->driver->domainBlockResize(dom, disk, size, flags);
O
Osier Yang 已提交
8388 8389 8390 8391 8392
        if (ret < 0)
            goto error;
        return ret;
    }

8393
    virReportUnsupportedError();
O
Osier Yang 已提交
8394

8395
 error:
O
Osier Yang 已提交
8396 8397 8398 8399
    virDispatchError(dom->conn);
    return -1;
}

8400

R
Richard W.M. Jones 已提交
8401 8402 8403 8404 8405 8406
/**
 * virDomainMemoryPeek:
 * @dom: pointer to the domain object
 * @start: start of memory to peek
 * @size: size of memory to peek
 * @buffer: return buffer (must be at least size bytes)
8407
 * @flags: bitwise-OR of virDomainMemoryFlags
R
Richard W.M. Jones 已提交
8408 8409 8410 8411 8412 8413 8414 8415 8416 8417 8418 8419 8420 8421 8422 8423 8424 8425 8426 8427 8428
 *
 * This function allows you to read the contents of a domain's
 * memory.
 *
 * The memory which is read is controlled by the 'start', 'size'
 * and 'flags' parameters.
 *
 * If 'flags' is VIR_MEMORY_VIRTUAL then the 'start' and 'size'
 * parameters are interpreted as virtual memory addresses for
 * whichever task happens to be running on the domain at the
 * moment.  Although this sounds haphazard it is in fact what
 * you want in order to read Linux kernel state, because it
 * ensures that pointers in the kernel image can be interpreted
 * coherently.
 *
 * 'buffer' is the return buffer and must be at least 'size' bytes.
 * 'size' may be 0 to test if the call would succeed.
 *
 * NB. The remote driver imposes a 64K byte limit on 'size'.
 * For your program to be able to work reliably over a remote
 * connection you should split large requests to <= 65536 bytes.
M
Michal Privoznik 已提交
8429
 * However, with 0.9.13 this RPC limit has been raised to 1M byte.
8430 8431
 * Starting with version 1.0.6 the RPC limit has been raised again.
 * Now large requests up to 16M byte are supported.
R
Richard W.M. Jones 已提交
8432 8433 8434 8435
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8436 8437 8438 8439 8440
virDomainMemoryPeek(virDomainPtr dom,
                    unsigned long long start /* really 64 bits */,
                    size_t size,
                    void *buffer,
                    unsigned int flags)
R
Richard W.M. Jones 已提交
8441 8442
{
    virConnectPtr conn;
8443

8444
    VIR_DOMAIN_DEBUG(dom, "start=%lld, size=%zi, buffer=%p, flags=%x",
8445
                     start, size, buffer, flags);
R
Richard W.M. Jones 已提交
8446

8447 8448
    virResetLastError();

8449
    virCheckDomainReturn(dom, -1);
R
Richard W.M. Jones 已提交
8450 8451
    conn = dom->conn;

8452
    virCheckReadOnlyGoto(conn->flags, error);
8453

8454
    /* Note on access to physical memory: A VIR_MEMORY_PHYSICAL flag is
R
Richard W.M. Jones 已提交
8455 8456 8457 8458 8459 8460
     * a possibility.  However it isn't really useful unless the caller
     * can also access registers, particularly CR3 on x86 in order to
     * get the Page Table Directory.  Since registers are different on
     * every architecture, that would imply another call to get the
     * machine registers.
     *
8461
     * The QEMU driver handles VIR_MEMORY_VIRTUAL, mapping it
R
Richard W.M. Jones 已提交
8462 8463 8464
     * to the qemu 'memsave' command which does the virtual to physical
     * mapping inside qemu.
     *
8465 8466 8467
     * The QEMU driver also handles VIR_MEMORY_PHYSICAL, mapping it
     * to the qemu 'pmemsave' command.
     *
R
Richard W.M. Jones 已提交
8468 8469 8470 8471 8472 8473 8474 8475
     * At time of writing there is no Xen driver.  However the Xen
     * hypervisor only lets you map physical pages from other domains,
     * and so the Xen driver would have to do the virtual to physical
     * mapping by chasing 2, 3 or 4-level page tables from the PTD.
     * There is example code in libxc (xc_translate_foreign_address)
     * which does this, although we cannot copy this code directly
     * because of incompatible licensing.
     */
8476

8477 8478
    /* Exactly one of these two flags must be set.  */
    if (!(flags & VIR_MEMORY_VIRTUAL) == !(flags & VIR_MEMORY_PHYSICAL)) {
8479
        virReportInvalidArg(flags,
8480 8481
                            _("flags in %s must include VIR_MEMORY_VIRTUAL or "
                              "VIR_MEMORY_PHYSICAL"),
8482
                            __FUNCTION__);
8483
        goto error;
R
Richard W.M. Jones 已提交
8484 8485 8486
    }

    /* Allow size == 0 as an access test. */
8487 8488
    if (size > 0)
        virCheckNonNullArgGoto(buffer, error);
R
Richard W.M. Jones 已提交
8489

8490 8491
    if (conn->driver->domainMemoryPeek) {
        int ret;
8492 8493
        ret = conn->driver->domainMemoryPeek(dom, start, size,
                                             buffer, flags);
8494 8495 8496 8497
        if (ret < 0)
            goto error;
        return ret;
    }
R
Richard W.M. Jones 已提交
8498

8499
    virReportUnsupportedError();
8500

8501
 error:
8502
    virDispatchError(dom->conn);
R
Richard W.M. Jones 已提交
8503 8504 8505
    return -1;
}

8506

8507 8508 8509
/**
 * virDomainGetBlockInfo:
 * @domain: a domain object
8510
 * @disk: path to the block device, or device shorthand
8511
 * @info: pointer to a virDomainBlockInfo structure allocated by the user
8512
 * @flags: extra flags; not used yet, so callers should always pass 0
8513 8514 8515
 *
 * Extract information about a domain's block device.
 *
8516
 * The @disk parameter is either an unambiguous source name of the
8517 8518
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
8519
 * (the <target dev='...'/> sub-element, such as "vda").  Valid names
8520 8521
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
8522 8523 8524 8525 8526 8527 8528 8529 8530 8531 8532 8533 8534 8535 8536 8537 8538 8539 8540 8541 8542 8543 8544 8545 8546 8547 8548 8549 8550 8551 8552 8553 8554 8555 8556 8557 8558 8559 8560 8561 8562 8563 8564 8565 8566 8567 8568 8569 8570 8571 8572 8573 8574
 *
 * For QEMU domains, the allocation and physical virDomainBlockInfo
 * values returned will generally be the same, except when using a
 * non raw, block backing device, such as qcow2 for an active domain.
 * When the persistent domain is not active, QEMU will return the
 * default which is the same value for allocation and physical.
 *
 * Active QEMU domains can return an allocation value which is more
 * representative of the currently used blocks by the device compared
 * to the physical size of the device. Applications can use/monitor
 * the allocation value with the understanding that if the domain
 * becomes inactive during an attempt to get the value, the default
 * values will be returned. Thus, the application should check
 * after the call for the domain being inactive if the values are
 * the same. Optionally, the application could be watching for a
 * shutdown event and then ignore any values received afterwards.
 * This can be an issue when a domain is being migrated and the
 * exact timing of the domain being made inactive and check of
 * the allocation value results the default being returned. For
 * a transient domain in the similar situation, this call will return
 * -1 and an error message indicating the "domain is not running".
 *
 * The following is some pseudo code illustrating the call sequence:
 *
 *   ...
 *   virDomainPtr dom;
 *   virDomainBlockInfo info;
 *   char *device;
 *   ...
 *   // Either get a list of all domains or a specific domain
 *   // via a virDomainLookupBy*() call.
 *   //
 *   // It's also required to fill in the device pointer, but that's
 *   // specific to the implementation. For the purposes of this example
 *   // a qcow2 backed device name string would need to be provided.
 *   ...
 *   // If the following call is made on a persistent domain with a
 *   // qcow2 block backed block device, then it's possible the returned
 *   // allocation equals the physical value. In that case, the domain
 *   // that may have been active prior to calling has become inactive,
 *   // such as is the case during a domain migration. Thus once we
 *   // get data returned, check for active domain when the values are
 *   // the same.
 *   if (virDomainGetBlockInfo(dom, device, &info, 0) < 0)
 *       goto failure;
 *   if (info.allocation == info.physical) {
 *       // If the domain is no longer active,
 *       // then the defaults are being returned.
 *       if (!virDomainIsActive())
 *               goto ignore_return;
 *   }
 *   // Do something with the allocation and physical values
 *   ...
8575
 *
8576 8577 8578
 * Returns 0 in case of success and -1 in case of failure.
 */
int
8579
virDomainGetBlockInfo(virDomainPtr domain, const char *disk,
8580
                      virDomainBlockInfoPtr info, unsigned int flags)
8581 8582
{
    virConnectPtr conn;
8583

E
Eric Blake 已提交
8584
    VIR_DOMAIN_DEBUG(domain, "info=%p, flags=%x", info, flags);
8585 8586 8587

    virResetLastError();

8588 8589 8590
    if (info)
        memset(info, 0, sizeof(*info));

8591
    virCheckDomainReturn(domain, -1);
8592 8593
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(info, error);
8594 8595 8596 8597 8598

    conn = domain->conn;

    if (conn->driver->domainGetBlockInfo) {
        int ret;
8599
        ret = conn->driver->domainGetBlockInfo(domain, disk, info, flags);
8600 8601 8602 8603 8604
        if (ret < 0)
            goto error;
        return ret;
    }

8605
    virReportUnsupportedError();
8606

8607
 error:
8608 8609 8610 8611 8612
    virDispatchError(domain->conn);
    return -1;
}


8613 8614 8615 8616 8617 8618 8619 8620 8621 8622 8623
/************************************************************************
 *									*
 *		Handling of defined but not running domains		*
 *									*
 ************************************************************************/

/**
 * virDomainDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xml: the XML description for the domain, preferably in UTF-8
 *
8624 8625
 * Define a domain, but does not start it.
 * This definition is persistent, until explicitly undefined with
8626
 * virDomainUndefine(). A previous definition for this domain would be
8627
 * overridden if it already exists.
8628
 *
E
Eric Blake 已提交
8629 8630 8631 8632 8633
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation on a transient domain with the same id as the
 * domain being defined; in that case, use virDomainBlockJobAbort() to
 * stop the block copy first.
 *
8634 8635 8636
 * Returns NULL in case of error, a pointer to the domain otherwise
 */
virDomainPtr
8637 8638
virDomainDefineXML(virConnectPtr conn, const char *xml)
{
8639
    VIR_DEBUG("conn=%p, xml=%s", conn, xml);
8640

8641 8642
    virResetLastError();

8643
    virCheckConnectReturn(conn, NULL);
8644
    virCheckReadOnlyGoto(conn->flags, error);
8645
    virCheckNonNullArgGoto(xml, error);
8646

8647 8648
    if (conn->driver->domainDefineXML) {
        virDomainPtr ret;
8649
        ret = conn->driver->domainDefineXML(conn, xml);
8650 8651 8652 8653
        if (!ret)
            goto error;
        return ret;
    }
8654

8655
    virReportUnsupportedError();
8656

8657
 error:
8658
    virDispatchError(conn);
8659
    return NULL;
8660 8661
}

8662

8663 8664 8665 8666
/**
 * virDomainUndefine:
 * @domain: pointer to a defined domain
 *
O
Osier Yang 已提交
8667 8668 8669 8670 8671
 * Undefine a domain. If the domain is running, it's converted to
 * transient domain, without stopping it. If the domain is inactive,
 * the domain configuration is removed.
 *
 * If the domain has a managed save image (see
8672 8673 8674
 * virDomainHasManagedSaveImage()), or if it is inactive and has any
 * snapshot metadata (see virDomainSnapshotNum()), then the undefine will
 * fail. See virDomainUndefineFlags() for more control.
8675 8676 8677 8678
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
8679 8680
virDomainUndefine(virDomainPtr domain)
{
8681
    virConnectPtr conn;
8682

8683
    VIR_DOMAIN_DEBUG(domain);
8684

8685 8686
    virResetLastError();

8687
    virCheckDomainReturn(domain, -1);
8688
    conn = domain->conn;
8689

8690
    virCheckReadOnlyGoto(conn->flags, error);
8691

8692 8693
    if (conn->driver->domainUndefine) {
        int ret;
8694
        ret = conn->driver->domainUndefine(domain);
8695 8696 8697 8698
        if (ret < 0)
            goto error;
        return ret;
    }
8699

8700
    virReportUnsupportedError();
8701

8702
 error:
8703
    virDispatchError(domain->conn);
8704
    return -1;
8705 8706
}

8707

O
Osier Yang 已提交
8708 8709 8710
/**
 * virDomainUndefineFlags:
 * @domain: pointer to a defined domain
8711
 * @flags: bitwise-OR of supported virDomainUndefineFlagsValues
O
Osier Yang 已提交
8712 8713 8714 8715 8716 8717 8718 8719 8720
 *
 * Undefine a domain. If the domain is running, it's converted to
 * transient domain, without stopping it. If the domain is inactive,
 * the domain configuration is removed.
 *
 * If the domain has a managed save image (see virDomainHasManagedSaveImage()),
 * then including VIR_DOMAIN_UNDEFINE_MANAGED_SAVE in @flags will also remove
 * that file, and omitting the flag will cause the undefine process to fail.
 *
8721 8722 8723 8724 8725 8726 8727 8728 8729
 * If the domain is inactive and has any snapshot metadata (see
 * virDomainSnapshotNum()), then including
 * VIR_DOMAIN_UNDEFINE_SNAPSHOTS_METADATA in @flags will also remove
 * that metadata.  Omitting the flag will cause the undefine of an
 * inactive domain to fail.  Active snapshots will retain snapshot
 * metadata until the (now-transient) domain halts, regardless of
 * whether this flag is present.  On hypervisors where snapshots do
 * not use libvirt metadata, this flag has no effect.
 *
O
Osier Yang 已提交
8730 8731 8732 8733 8734 8735 8736 8737 8738 8739 8740 8741
 * Returns 0 in case of success, -1 in case of error
 */
int
virDomainUndefineFlags(virDomainPtr domain,
                       unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);

    virResetLastError();

8742
    virCheckDomainReturn(domain, -1);
O
Osier Yang 已提交
8743
    conn = domain->conn;
8744

8745
    virCheckReadOnlyGoto(conn->flags, error);
O
Osier Yang 已提交
8746 8747 8748

    if (conn->driver->domainUndefineFlags) {
        int ret;
8749
        ret = conn->driver->domainUndefineFlags(domain, flags);
O
Osier Yang 已提交
8750 8751 8752 8753 8754
        if (ret < 0)
            goto error;
        return ret;
    }

8755
    virReportUnsupportedError();
O
Osier Yang 已提交
8756

8757
 error:
O
Osier Yang 已提交
8758 8759 8760 8761 8762
    virDispatchError(domain->conn);
    return -1;
}


8763 8764 8765 8766
/**
 * virConnectNumOfDefinedDomains:
 * @conn: pointer to the hypervisor connection
 *
8767
 * Provides the number of defined but inactive domains.
8768 8769 8770 8771 8772 8773
 *
 * Returns the number of domain found or -1 in case of error
 */
int
virConnectNumOfDefinedDomains(virConnectPtr conn)
{
8774
    VIR_DEBUG("conn=%p", conn);
8775

8776 8777
    virResetLastError();

8778
    virCheckConnectReturn(conn, -1);
8779

8780
    if (conn->driver->connectNumOfDefinedDomains) {
8781
        int ret;
8782
        ret = conn->driver->connectNumOfDefinedDomains(conn);
8783 8784 8785 8786
        if (ret < 0)
            goto error;
        return ret;
    }
8787

8788
    virReportUnsupportedError();
8789

8790
 error:
8791
    virDispatchError(conn);
8792
    return -1;
8793 8794
}

8795

8796 8797 8798 8799 8800 8801
/**
 * virConnectListDefinedDomains:
 * @conn: pointer to the hypervisor connection
 * @names: pointer to an array to store the names
 * @maxnames: size of the array
 *
8802 8803
 * list the defined but inactive domains, stores the pointers to the names
 * in @names
8804
 *
8805 8806 8807 8808 8809 8810 8811 8812
 * For active domains, see virConnectListDomains().  For more control over
 * the results, see virConnectListAllDomains().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a domain can be defined between
 * a call to virConnectNumOfDefinedDomains() and this call; you are only
 * guaranteed that all currently defined domains were listed if the return
 * is less than @maxids.  The client must call free() on each returned name.
8813 8814
 */
int
8815
virConnectListDefinedDomains(virConnectPtr conn, char **const names,
8816 8817
                             int maxnames)
{
8818
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
8819

8820 8821
    virResetLastError();

8822
    virCheckConnectReturn(conn, -1);
8823 8824
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
8825

8826
    if (conn->driver->connectListDefinedDomains) {
8827
        int ret;
8828
        ret = conn->driver->connectListDefinedDomains(conn, names, maxnames);
8829 8830 8831 8832
        if (ret < 0)
            goto error;
        return ret;
    }
8833

8834
    virReportUnsupportedError();
8835

8836
 error:
8837
    virDispatchError(conn);
8838
    return -1;
8839 8840
}

8841

8842 8843 8844 8845 8846 8847 8848 8849 8850 8851 8852 8853 8854 8855 8856 8857 8858 8859 8860 8861 8862 8863 8864 8865 8866 8867 8868 8869 8870 8871 8872 8873 8874 8875 8876 8877 8878 8879 8880 8881 8882 8883 8884 8885 8886 8887 8888 8889
/**
 * virConnectListAllDomains:
 * @conn: Pointer to the hypervisor connection.
 * @domains: Pointer to a variable to store the array containing domain objects
 *           or NULL if the list is not required (just returns number of guests).
 * @flags: bitwise-OR of virConnectListAllDomainsFlags
 *
 * Collect a possibly-filtered list of all domains, and return an allocated
 * array of information for each.  This API solves the race inherent in
 * virConnectListDomains() and virConnectListDefinedDomains().
 *
 * Normally, all domains are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted domains.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a domain, and where all bits
 * within a group describe all possible domains.  Some hypervisors might
 * reject explicit bits from a group where the hypervisor cannot make a
 * distinction (for example, not all hypervisors can tell whether domains
 * have snapshots).  For a group supported by a given hypervisor, the
 * behavior when no bits of a group are set is identical to the behavior
 * when all bits in that group are set.  When setting bits from more than
 * one group, it is possible to select an impossible combination (such
 * as an inactive transient domain), in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_CONNECT_LIST_DOMAINS_ACTIVE (online
 * domains) and VIR_CONNECT_LIST_DOMAINS_INACTIVE (offline domains).
 *
 * The next group of @flags is VIR_CONNECT_LIST_DOMAINS_PERSISTENT (defined
 * domains) and VIR_CONNECT_LIST_DOMAINS_TRANSIENT (running but not defined).
 *
 * The next group of @flags covers various domain states:
 * VIR_CONNECT_LIST_DOMAINS_RUNNING, VIR_CONNECT_LIST_DOMAINS_PAUSED,
 * VIR_CONNECT_LIST_DOMAINS_SHUTOFF, and a catch-all for all other states
 * (such as crashed, this catch-all covers the possibility of adding new
 * states).
 *
 * The remaining groups cover boolean attributes commonly asked about
 * domains; they include VIR_CONNECT_LIST_DOMAINS_MANAGEDSAVE and
 * VIR_CONNECT_LIST_DOMAINS_NO_MANAGEDSAVE, for filtering based on whether
 * a managed save image exists; VIR_CONNECT_LIST_DOMAINS_AUTOSTART and
 * VIR_CONNECT_LIST_DOMAINS_NO_AUTOSTART, for filtering based on autostart;
 * VIR_CONNECT_LIST_DOMAINS_HAS_SNAPSHOT and
 * VIR_CONNECT_LIST_DOMAINS_NO_SNAPSHOT, for filtering based on whether
 * a domain has snapshots.
 *
 * Example of usage:
 *
E
Eric Blake 已提交
8890 8891 8892 8893 8894 8895 8896 8897 8898 8899 8900 8901 8902 8903
 *   virDomainPtr *domains;
 *   size_t i;
 *   int ret;
 *   unsigned int flags = VIR_CONNECT_LIST_DOMAINS_RUNNING |
 *                        VIR_CONNECT_LIST_DOMAINS_PERSISTENT;
 *   ret = virConnectListAllDomains(conn, &domains, flags);
 *   if (ret < 0)
 *       error();
 *   for (i = 0; i < ret; i++) {
 *        do_something_with_domain(domains[i]);
 *        //here or in a separate loop if needed
 *        virDomainFree(domains[i]);
 *   }
 *   free(domains);
E
Eric Blake 已提交
8904 8905 8906 8907 8908 8909
 *
 * Returns the number of domains found or -1 and sets domains to NULL in case of
 * error.  On success, the array stored into @domains is guaranteed to have an
 * extra allocated element set to NULL but not included in the return count, to
 * make iteration easier. The caller is responsible for calling virDomainFree()
 * on each array element, then calling free() on @domains.
8910 8911 8912 8913 8914 8915 8916 8917 8918 8919 8920 8921 8922
 */
int
virConnectListAllDomains(virConnectPtr conn,
                         virDomainPtr **domains,
                         unsigned int flags)
{
    VIR_DEBUG("conn=%p, domains=%p, flags=%x", conn, domains, flags);

    virResetLastError();

    if (domains)
        *domains = NULL;

8923
    virCheckConnectReturn(conn, -1);
8924

8925
    if (conn->driver->connectListAllDomains) {
8926
        int ret;
8927
        ret = conn->driver->connectListAllDomains(conn, domains, flags);
8928 8929 8930 8931 8932
        if (ret < 0)
            goto error;
        return ret;
    }

8933
    virReportUnsupportedError();
8934

8935
 error:
8936 8937 8938 8939
    virDispatchError(conn);
    return -1;
}

8940

8941 8942 8943 8944
/**
 * virDomainCreate:
 * @domain: pointer to a defined domain
 *
8945
 * Launch a defined domain. If the call succeeds the domain moves from the
8946 8947 8948
 * defined to the running domains pools.  The domain will be paused only
 * if restoring from managed state created from a paused domain.  For more
 * control, see virDomainCreateWithFlags().
8949 8950 8951 8952
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
8953 8954
virDomainCreate(virDomainPtr domain)
{
8955
    virConnectPtr conn;
8956

8957
    VIR_DOMAIN_DEBUG(domain);
8958

8959 8960
    virResetLastError();

8961
    virCheckDomainReturn(domain, -1);
8962
    conn = domain->conn;
8963

8964
    virCheckReadOnlyGoto(conn->flags, error);
8965

8966 8967
    if (conn->driver->domainCreate) {
        int ret;
8968
        ret = conn->driver->domainCreate(domain);
8969 8970 8971 8972
        if (ret < 0)
            goto error;
        return ret;
    }
8973

8974
    virReportUnsupportedError();
8975

8976
 error:
8977
    virDispatchError(domain->conn);
8978
    return -1;
8979 8980
}

8981

8982 8983 8984
/**
 * virDomainCreateWithFlags:
 * @domain: pointer to a defined domain
8985
 * @flags: bitwise-OR of supported virDomainCreateFlags
8986 8987 8988 8989
 *
 * Launch a defined domain. If the call succeeds the domain moves from the
 * defined to the running domains pools.
 *
8990 8991 8992 8993 8994 8995
 * If the VIR_DOMAIN_START_PAUSED flag is set, or if the guest domain
 * has a managed save image that requested paused state (see
 * virDomainManagedSave()) the guest domain will be started, but its
 * CPUs will remain paused. The CPUs can later be manually started
 * using virDomainResume().  In all other cases, the guest domain will
 * be running.
8996 8997 8998 8999
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
E
Eric Blake 已提交
9000
 * client application crashes / loses its connection to the
9001
 * libvirtd daemon. Any domains marked for auto destroy will
9002
 * block attempts at migration, save-to-file, or snapshots.
9003
 *
9004 9005 9006 9007 9008 9009
 * If the VIR_DOMAIN_START_BYPASS_CACHE flag is set, and there is a
 * managed save file for this domain (created by virDomainManagedSave()),
 * then libvirt will attempt to bypass the file system cache while restoring
 * the file, or fail if it cannot do so for the given system; this can allow
 * less pressure on file system cache, but also risks slowing loads from NFS.
 *
9010 9011 9012
 * If the VIR_DOMAIN_START_FORCE_BOOT flag is set, then any managed save
 * file for this domain is discarded, and the domain boots from scratch.
 *
9013 9014 9015
 * Returns 0 in case of success, -1 in case of error
 */
int
9016 9017
virDomainCreateWithFlags(virDomainPtr domain, unsigned int flags)
{
9018
    virConnectPtr conn;
9019

9020
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
9021 9022 9023

    virResetLastError();

9024
    virCheckDomainReturn(domain, -1);
9025
    conn = domain->conn;
9026

9027
    virCheckReadOnlyGoto(conn->flags, error);
9028 9029 9030

    if (conn->driver->domainCreateWithFlags) {
        int ret;
9031
        ret = conn->driver->domainCreateWithFlags(domain, flags);
9032 9033 9034 9035 9036
        if (ret < 0)
            goto error;
        return ret;
    }

9037
    virReportUnsupportedError();
9038

9039
 error:
9040 9041 9042 9043
    virDispatchError(domain->conn);
    return -1;
}

9044

9045 9046 9047 9048 9049 9050 9051 9052 9053 9054 9055 9056 9057 9058 9059 9060 9061 9062 9063 9064 9065 9066 9067 9068 9069 9070 9071 9072 9073 9074 9075 9076 9077 9078 9079 9080 9081 9082 9083 9084 9085 9086 9087 9088 9089 9090 9091 9092 9093 9094 9095 9096 9097
/**
 * virDomainCreateWithFiles:
 * @domain: pointer to a defined domain
 * @nfiles: number of file descriptors passed
 * @files: list of file descriptors passed
 * @flags: bitwise-OR of supported virDomainCreateFlags
 *
 * Launch a defined domain. If the call succeeds the domain moves from the
 * defined to the running domains pools.
 *
 * @files provides an array of file descriptors which will be
 * made available to the 'init' process of the guest. The file
 * handles exposed to the guest will be renumbered to start
 * from 3 (ie immediately following stderr). This is only
 * supported for guests which use container based virtualization
 * technology.
 *
 * If the VIR_DOMAIN_START_PAUSED flag is set, or if the guest domain
 * has a managed save image that requested paused state (see
 * virDomainManagedSave()) the guest domain will be started, but its
 * CPUs will remain paused. The CPUs can later be manually started
 * using virDomainResume().  In all other cases, the guest domain will
 * be running.
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
 * client application crashes / loses its connection to the
 * libvirtd daemon. Any domains marked for auto destroy will
 * block attempts at migration, save-to-file, or snapshots.
 *
 * If the VIR_DOMAIN_START_BYPASS_CACHE flag is set, and there is a
 * managed save file for this domain (created by virDomainManagedSave()),
 * then libvirt will attempt to bypass the file system cache while restoring
 * the file, or fail if it cannot do so for the given system; this can allow
 * less pressure on file system cache, but also risks slowing loads from NFS.
 *
 * If the VIR_DOMAIN_START_FORCE_BOOT flag is set, then any managed save
 * file for this domain is discarded, and the domain boots from scratch.
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
virDomainCreateWithFiles(virDomainPtr domain, unsigned int nfiles,
                         int *files, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "nfiles=%u, files=%p, flags=%x",
                     nfiles, files, flags);

    virResetLastError();

9098
    virCheckDomainReturn(domain, -1);
9099
    conn = domain->conn;
9100

9101
    virCheckReadOnlyGoto(conn->flags, error);
9102 9103 9104 9105 9106 9107 9108 9109 9110 9111 9112

    if (conn->driver->domainCreateWithFiles) {
        int ret;
        ret = conn->driver->domainCreateWithFiles(domain,
                                                  nfiles, files,
                                                  flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9113
    virReportUnsupportedError();
9114

9115
 error:
9116 9117 9118 9119
    virDispatchError(domain->conn);
    return -1;
}

9120

9121 9122 9123
/**
 * virDomainGetAutostart:
 * @domain: a domain object
9124
 * @autostart: the value returned
9125
 *
9126
 * Provides a boolean value indicating whether the domain
9127 9128 9129 9130 9131 9132 9133
 * configured to be automatically started when the host
 * machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virDomainGetAutostart(virDomainPtr domain,
9134 9135 9136
                      int *autostart)
{
    virConnectPtr conn;
9137 9138

    VIR_DOMAIN_DEBUG(domain, "autostart=%p", autostart);
9139

9140 9141
    virResetLastError();

9142
    virCheckDomainReturn(domain, -1);
9143
    virCheckNonNullArgGoto(autostart, error);
9144

9145 9146
    conn = domain->conn;

9147 9148
    if (conn->driver->domainGetAutostart) {
        int ret;
9149
        ret = conn->driver->domainGetAutostart(domain, autostart);
9150 9151 9152 9153
        if (ret < 0)
            goto error;
        return ret;
    }
9154

9155
    virReportUnsupportedError();
9156

9157
 error:
9158
    virDispatchError(domain->conn);
9159
    return -1;
9160 9161
}

9162

9163 9164 9165
/**
 * virDomainSetAutostart:
 * @domain: a domain object
9166
 * @autostart: whether the domain should be automatically started 0 or 1
9167 9168 9169 9170 9171 9172 9173 9174
 *
 * Configure the domain to be automatically started
 * when the host machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virDomainSetAutostart(virDomainPtr domain,
9175 9176 9177
                      int autostart)
{
    virConnectPtr conn;
9178 9179

    VIR_DOMAIN_DEBUG(domain, "autostart=%d", autostart);
9180

9181 9182
    virResetLastError();

9183
    virCheckDomainReturn(domain, -1);
9184 9185
    conn = domain->conn;

9186
    virCheckReadOnlyGoto(conn->flags, error);
9187

9188 9189
    if (conn->driver->domainSetAutostart) {
        int ret;
9190
        ret = conn->driver->domainSetAutostart(domain, autostart);
9191 9192 9193 9194
        if (ret < 0)
            goto error;
        return ret;
    }
9195

9196
    virReportUnsupportedError();
9197

9198
 error:
9199
    virDispatchError(domain->conn);
9200
    return -1;
9201 9202
}

9203

9204 9205 9206
/**
 * virDomainInjectNMI:
 * @domain: pointer to domain object, or NULL for Domain0
9207
 * @flags: extra flags; not used yet, so callers should always pass 0
9208 9209 9210 9211 9212
 *
 * Send NMI to the guest
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
9213 9214
int
virDomainInjectNMI(virDomainPtr domain, unsigned int flags)
9215 9216
{
    virConnectPtr conn;
9217
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
9218 9219 9220

    virResetLastError();

9221
    virCheckDomainReturn(domain, -1);
9222 9223
    conn = domain->conn;

9224 9225
    virCheckReadOnlyGoto(conn->flags, error);

9226 9227 9228 9229 9230 9231 9232 9233
    if (conn->driver->domainInjectNMI) {
        int ret;
        ret = conn->driver->domainInjectNMI(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9234
    virReportUnsupportedError();
9235

9236
 error:
9237 9238 9239 9240
    virDispatchError(domain->conn);
    return -1;
}

9241

9242 9243 9244 9245 9246 9247 9248
/**
 * virDomainSendKey:
 * @domain:    pointer to domain object, or NULL for Domain0
 * @codeset:   the code set of keycodes, from virKeycodeSet
 * @holdtime:  the duration (in milliseconds) that the keys will be held
 * @keycodes:  array of keycodes
 * @nkeycodes: number of keycodes, up to VIR_DOMAIN_SEND_KEY_MAX_KEYS
9249
 * @flags: extra flags; not used yet, so callers should always pass 0
9250 9251 9252 9253 9254
 *
 * Send key(s) to the guest.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
9255 9256 9257 9258 9259 9260 9261
int
virDomainSendKey(virDomainPtr domain,
                 unsigned int codeset,
                 unsigned int holdtime,
                 unsigned int *keycodes,
                 int nkeycodes,
                 unsigned int flags)
9262 9263
{
    virConnectPtr conn;
9264
    VIR_DOMAIN_DEBUG(domain, "codeset=%u, holdtime=%u, nkeycodes=%u, flags=%x",
9265 9266 9267 9268
                     codeset, holdtime, nkeycodes, flags);

    virResetLastError();

9269
    virCheckDomainReturn(domain, -1);
9270 9271 9272
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
9273 9274 9275 9276 9277 9278 9279 9280 9281 9282
    virCheckNonNullArgGoto(keycodes, error);
    virCheckPositiveArgGoto(nkeycodes, error);

    if (nkeycodes > VIR_DOMAIN_SEND_KEY_MAX_KEYS) {
        virReportInvalidArg(nkeycodes,
                            _("nkeycodes in %s must be <= %d"),
                            __FUNCTION__, VIR_DOMAIN_SEND_KEY_MAX_KEYS);
        goto error;
    }

9283 9284 9285 9286 9287 9288 9289 9290 9291
    if (conn->driver->domainSendKey) {
        int ret;
        ret = conn->driver->domainSendKey(domain, codeset, holdtime,
                                          keycodes, nkeycodes, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9292
    virReportUnsupportedError();
9293

9294
 error:
9295 9296 9297 9298
    virDispatchError(domain->conn);
    return -1;
}

9299 9300 9301 9302 9303 9304 9305 9306 9307 9308 9309 9310 9311 9312 9313 9314 9315 9316 9317 9318 9319 9320 9321 9322 9323

/**
 * virDomainSendProcessSignal:
 * @domain: pointer to domain object
 * @pid_value: a positive integer process ID, or negative integer process group ID
 * @signum: a signal from the virDomainProcessSignal enum
 * @flags: one of the virDomainProcessSignalFlag values
 *
 * Send a signal to the designated process in the guest
 *
 * The signal numbers must be taken from the virDomainProcessSignal
 * enum. These will be translated to the corresponding signal
 * number for the guest OS, by the guest agent delivering the
 * signal. If there is no mapping from virDomainProcessSignal to
 * the native OS signals, this API will report an error.
 *
 * If @pid_value is an integer greater than zero, it is
 * treated as a process ID. If @pid_value is an integer
 * less than zero, it is treated as a process group ID.
 * All the @pid_value numbers are from the container/guest
 * namespace. The value zero is not valid.
 *
 * Not all hypervisors will support sending signals to
 * arbitrary processes or process groups. If this API is
 * implemented the minimum requirement is to be able to
9324
 * use @pid_value == 1 (i.e. kill init). No other value is
9325 9326 9327 9328 9329 9330 9331 9332
 * required to be supported.
 *
 * If the @signum is VIR_DOMAIN_PROCESS_SIGNAL_NOP then this
 * API will simply report whether the process is running in
 * the container/guest.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
9333 9334 9335 9336 9337
int
virDomainSendProcessSignal(virDomainPtr domain,
                           long long pid_value,
                           unsigned int signum,
                           unsigned int flags)
9338 9339 9340 9341 9342 9343 9344
{
    virConnectPtr conn;
    VIR_DOMAIN_DEBUG(domain, "pid=%lld, signum=%u flags=%x",
                     pid_value, signum, flags);

    virResetLastError();

9345 9346
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9347 9348

    virCheckNonZeroArgGoto(pid_value, error);
9349
    virCheckReadOnlyGoto(conn->flags, error);
9350 9351 9352 9353 9354 9355 9356 9357 9358 9359 9360 9361

    if (conn->driver->domainSendProcessSignal) {
        int ret;
        ret = conn->driver->domainSendProcessSignal(domain,
                                                    pid_value,
                                                    signum,
                                                    flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9362
    virReportUnsupportedError();
9363

9364
 error:
9365 9366 9367 9368 9369
    virDispatchError(domain->conn);
    return -1;
}


9370 9371 9372 9373 9374 9375 9376
/**
 * virDomainSetVcpus:
 * @domain: pointer to domain object, or NULL for Domain0
 * @nvcpus: the new number of virtual CPUs for this domain
 *
 * Dynamically change the number of virtual CPUs used by the domain.
 * Note that this call may fail if the underlying virtualization hypervisor
9377
 * does not support it or if growing the number is arbitrarily limited.
9378
 * This function may require privileged access to the hypervisor.
9379
 *
9380 9381 9382
 * Note that if this call is executed before the guest has finished booting,
 * the guest may fail to process the change.
 *
9383
 * This command only changes the runtime configuration of the domain,
E
Eric Blake 已提交
9384 9385 9386
 * so can only be called on an active domain.  It is hypervisor-dependent
 * whether it also affects persistent configuration; for more control,
 * use virDomainSetVcpusFlags().
9387
 *
9388 9389 9390 9391 9392
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetVcpus(virDomainPtr domain, unsigned int nvcpus)
{
9393
    virConnectPtr conn;
9394 9395

    VIR_DOMAIN_DEBUG(domain, "nvcpus=%u", nvcpus);
9396

9397 9398
    virResetLastError();

9399 9400
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9401

9402
    virCheckReadOnlyGoto(conn->flags, error);
9403 9404
    virCheckNonZeroArgGoto(nvcpus, error);

9405 9406
    if (conn->driver->domainSetVcpus) {
        int ret;
9407
        ret = conn->driver->domainSetVcpus(domain, nvcpus);
9408 9409 9410 9411
        if (ret < 0)
            goto error;
        return ret;
    }
9412

9413
    virReportUnsupportedError();
9414

9415
 error:
9416
    virDispatchError(domain->conn);
9417
    return -1;
9418 9419
}

9420

E
Eric Blake 已提交
9421 9422 9423 9424
/**
 * virDomainSetVcpusFlags:
 * @domain: pointer to domain object, or NULL for Domain0
 * @nvcpus: the new number of virtual CPUs for this domain, must be at least 1
9425
 * @flags: bitwise-OR of virDomainVcpuFlags
E
Eric Blake 已提交
9426 9427 9428
 *
 * Dynamically change the number of virtual CPUs used by the domain.
 * Note that this call may fail if the underlying virtualization hypervisor
9429
 * does not support it or if growing the number is arbitrarily limited.
9430
 * This function may require privileged access to the hypervisor.
E
Eric Blake 已提交
9431
 *
9432
 * @flags may include VIR_DOMAIN_AFFECT_LIVE to affect a running
E
Eric Blake 已提交
9433
 * domain (which may fail if domain is not active), or
9434
 * VIR_DOMAIN_AFFECT_CONFIG to affect the next boot via the XML
E
Eric Blake 已提交
9435
 * description of the domain.  Both flags may be set.
9436 9437 9438 9439
 * If neither flag is specified (that is, @flags is VIR_DOMAIN_AFFECT_CURRENT),
 * then an inactive domain modifies persistent setup, while an active domain
 * is hypervisor-dependent on whether just live or both live and persistent
 * state is changed.
E
Eric Blake 已提交
9440
 *
9441 9442 9443
 * Note that if this call is executed before the guest has finished booting,
 * the guest may fail to process the change.
 *
E
Eric Blake 已提交
9444
 * If @flags includes VIR_DOMAIN_VCPU_MAXIMUM, then
9445
 * VIR_DOMAIN_AFFECT_LIVE must be clear, and only the maximum virtual
E
Eric Blake 已提交
9446 9447 9448 9449
 * CPU limit is altered; generally, this value must be less than or
 * equal to virConnectGetMaxVcpus().  Otherwise, this call affects the
 * current virtual CPU limit, which must be less than or equal to the
 * maximum limit.
9450
 *
9451 9452 9453 9454
 * If @flags includes VIR_DOMAIN_VCPU_GUEST, then the state of processors is
 * modified inside the guest instead of the hypervisor. This flag can only
 * be used with live guests and is incompatible with VIR_DOMAIN_VCPU_MAXIMUM.
 * The usage of this flag may require a guest agent configured.
9455
 *
9456
 * Not all hypervisors can support all flag combinations.
E
Eric Blake 已提交
9457 9458 9459 9460 9461 9462 9463 9464
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetVcpusFlags(virDomainPtr domain, unsigned int nvcpus,
                       unsigned int flags)
{
    virConnectPtr conn;
9465

9466
    VIR_DOMAIN_DEBUG(domain, "nvcpus=%u, flags=%x", nvcpus, flags);
E
Eric Blake 已提交
9467 9468 9469

    virResetLastError();

9470
    virCheckDomainReturn(domain, -1);
9471
    virCheckReadOnlyGoto(domain->conn->flags, error);
E
Eric Blake 已提交
9472

9473
    if (flags & VIR_DOMAIN_VCPU_GUEST &&
9474 9475 9476
        flags & VIR_DOMAIN_VCPU_MAXIMUM) {
        virReportInvalidArg(flags,
                            _("flags 'VIR_DOMAIN_VCPU_MAXIMUM' and "
9477
                              "'VIR_DOMAIN_VCPU_GUEST' in '%s' are mutually "
9478 9479 9480 9481
                              "exclusive"), __FUNCTION__);
        goto error;
    }

9482 9483
    virCheckNonZeroArgGoto(nvcpus, error);

E
Eric Blake 已提交
9484
    if ((unsigned short) nvcpus != nvcpus) {
9485
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u"), nvcpus);
E
Eric Blake 已提交
9486 9487
        goto error;
    }
E
Eric Blake 已提交
9488 9489 9490 9491
    conn = domain->conn;

    if (conn->driver->domainSetVcpusFlags) {
        int ret;
9492
        ret = conn->driver->domainSetVcpusFlags(domain, nvcpus, flags);
E
Eric Blake 已提交
9493 9494 9495 9496 9497
        if (ret < 0)
            goto error;
        return ret;
    }

9498
    virReportUnsupportedError();
E
Eric Blake 已提交
9499

9500
 error:
E
Eric Blake 已提交
9501 9502 9503 9504
    virDispatchError(domain->conn);
    return -1;
}

9505

E
Eric Blake 已提交
9506 9507 9508
/**
 * virDomainGetVcpusFlags:
 * @domain: pointer to domain object, or NULL for Domain0
9509
 * @flags: bitwise-OR of virDomainVcpuFlags
E
Eric Blake 已提交
9510 9511 9512
 *
 * Query the number of virtual CPUs used by the domain.  Note that
 * this call may fail if the underlying virtualization hypervisor does
9513
 * not support it.  This function may require privileged access to the
E
Eric Blake 已提交
9514 9515
 * hypervisor.
 *
9516 9517 9518 9519 9520 9521 9522
 * If @flags includes VIR_DOMAIN_AFFECT_LIVE, this will query a
 * running domain (which will fail if domain is not active); if
 * it includes VIR_DOMAIN_AFFECT_CONFIG, this will query the XML
 * description of the domain.  It is an error to set both flags.
 * If neither flag is set (that is, VIR_DOMAIN_AFFECT_CURRENT),
 * then the configuration queried depends on whether the domain
 * is currently running.
E
Eric Blake 已提交
9523 9524 9525
 *
 * If @flags includes VIR_DOMAIN_VCPU_MAXIMUM, then the maximum
 * virtual CPU limit is queried.  Otherwise, this call queries the
9526 9527
 * current virtual CPU count.
 *
9528
 * If @flags includes VIR_DOMAIN_VCPU_GUEST, then the state of the processors
9529
 * is queried in the guest instead of the hypervisor. This flag is only usable
9530
 * on live domains. Guest agent may be needed for this flag to be available.
E
Eric Blake 已提交
9531
 *
9532
 * Returns the number of vCPUs in case of success, -1 in case of failure.
E
Eric Blake 已提交
9533 9534 9535 9536 9537
 */
int
virDomainGetVcpusFlags(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;
9538

9539
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
E
Eric Blake 已提交
9540 9541 9542

    virResetLastError();

9543
    virCheckDomainReturn(domain, -1);
9544 9545 9546 9547
    conn = domain->conn;

    if (flags & VIR_DOMAIN_VCPU_GUEST)
        virCheckReadOnlyGoto(conn->flags, error);
E
Eric Blake 已提交
9548

9549
    /* At most one of these two flags should be set.  */
9550 9551
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
9552
        virReportInvalidArg(flags,
9553 9554
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
9555
                            __FUNCTION__);
E
Eric Blake 已提交
9556 9557 9558 9559 9560
        goto error;
    }

    if (conn->driver->domainGetVcpusFlags) {
        int ret;
9561
        ret = conn->driver->domainGetVcpusFlags(domain, flags);
E
Eric Blake 已提交
9562 9563 9564 9565 9566
        if (ret < 0)
            goto error;
        return ret;
    }

9567
    virReportUnsupportedError();
E
Eric Blake 已提交
9568

9569
 error:
E
Eric Blake 已提交
9570 9571 9572 9573
    virDispatchError(domain->conn);
    return -1;
}

9574

9575 9576 9577 9578 9579
/**
 * virDomainPinVcpu:
 * @domain: pointer to domain object, or NULL for Domain0
 * @vcpu: virtual CPU number
 * @cpumap: pointer to a bit map of real CPUs (in 8-bit bytes) (IN)
E
Eric Blake 已提交
9580 9581 9582
 *      Each bit set to 1 means that corresponding CPU is usable.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
9583
 * @maplen: number of bytes in cpumap, from 1 up to size of CPU map in
O
Osier Yang 已提交
9584 9585 9586
 *      underlying virtualization system (Xen...).
 *      If maplen < size, missing bytes are set to zero.
 *      If maplen > size, failure code is returned.
9587
 *
9588
 * Dynamically change the real CPUs which can be allocated to a virtual CPU.
9589
 * This function may require privileged access to the hypervisor.
9590
 *
9591 9592 9593
 * This command only changes the runtime configuration of the domain,
 * so can only be called on an active domain.
 *
9594 9595 9596 9597 9598 9599
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainPinVcpu(virDomainPtr domain, unsigned int vcpu,
                 unsigned char *cpumap, int maplen)
{
9600
    virConnectPtr conn;
9601 9602 9603

    VIR_DOMAIN_DEBUG(domain, "vcpu=%u, cpumap=%p, maplen=%d",
                     vcpu, cpumap, maplen);
9604

9605 9606
    virResetLastError();

9607 9608
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9609

9610
    virCheckReadOnlyGoto(conn->flags, error);
9611 9612 9613 9614
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);

    if ((unsigned short) vcpu != vcpu) {
9615
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u"), vcpu);
9616
        goto error;
9617
    }
9618

9619 9620
    if (conn->driver->domainPinVcpu) {
        int ret;
9621
        ret = conn->driver->domainPinVcpu(domain, vcpu, cpumap, maplen);
9622 9623 9624 9625
        if (ret < 0)
            goto error;
        return ret;
    }
9626

9627
    virReportUnsupportedError();
9628

9629
 error:
9630
    virDispatchError(domain->conn);
9631
    return -1;
9632 9633
}

9634

9635 9636 9637 9638 9639 9640 9641 9642 9643 9644 9645 9646
/**
 * virDomainPinVcpuFlags:
 * @domain: pointer to domain object, or NULL for Domain0
 * @vcpu: virtual CPU number
 * @cpumap: pointer to a bit map of real CPUs (in 8-bit bytes) (IN)
 *      Each bit set to 1 means that corresponding CPU is usable.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
 * @maplen: number of bytes in cpumap, from 1 up to size of CPU map in
 *      underlying virtualization system (Xen...).
 *      If maplen < size, missing bytes are set to zero.
 *      If maplen > size, failure code is returned.
9647
 * @flags: bitwise-OR of virDomainModificationImpact
9648 9649
 *
 * Dynamically change the real CPUs which can be allocated to a virtual CPU.
9650
 * This function may require privileged access to the hypervisor.
9651 9652 9653 9654 9655 9656 9657 9658 9659 9660 9661 9662
 *
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set.
 * If VIR_DOMAIN_AFFECT_LIVE is set, the change affects a running domain
 * and may fail if domain is not alive.
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
 * and will fail for transient domains. If neither flag is specified (that is,
 * @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain modifies
 * persistent setup, while an active domain is hypervisor-dependent on whether
 * just live or both live and persistent state is changed.
 * Not all hypervisors can support all flag combinations.
 *
E
Eric Blake 已提交
9663
 * See also virDomainGetVcpuPinInfo for querying this information.
9664
 *
9665 9666 9667 9668 9669 9670 9671 9672 9673
 * Returns 0 in case of success, -1 in case of failure.
 *
 */
int
virDomainPinVcpuFlags(virDomainPtr domain, unsigned int vcpu,
                      unsigned char *cpumap, int maplen, unsigned int flags)
{
    virConnectPtr conn;

9674
    VIR_DOMAIN_DEBUG(domain, "vcpu=%u, cpumap=%p, maplen=%d, flags=%x",
9675 9676
                     vcpu, cpumap, maplen, flags);

9677 9678 9679 9680
    virResetLastError();

    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9681

9682
    virCheckReadOnlyGoto(conn->flags, error);
9683 9684 9685 9686
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);

    if ((unsigned short) vcpu != vcpu) {
9687
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u"), vcpu);
9688 9689 9690 9691 9692
        goto error;
    }

    if (conn->driver->domainPinVcpuFlags) {
        int ret;
9693
        ret = conn->driver->domainPinVcpuFlags(domain, vcpu, cpumap, maplen, flags);
9694 9695 9696 9697 9698
        if (ret < 0)
            goto error;
        return ret;
    }

9699
    virReportUnsupportedError();
9700

9701
 error:
9702 9703 9704 9705
    virDispatchError(domain->conn);
    return -1;
}

9706

9707
/**
E
Eric Blake 已提交
9708
 * virDomainGetVcpuPinInfo:
9709 9710 9711 9712 9713 9714 9715 9716 9717 9718 9719 9720
 * @domain: pointer to domain object, or NULL for Domain0
 * @ncpumaps: the number of cpumap (listed first to match virDomainGetVcpus)
 * @cpumaps: pointer to a bit map of real CPUs for all vcpus of this
 *     domain (in 8-bit bytes) (OUT)
 *     It's assumed there is <ncpumaps> cpumap in cpumaps array.
 *     The memory allocated to cpumaps must be (ncpumaps * maplen) bytes
 *     (ie: calloc(ncpumaps, maplen)).
 *     One cpumap inside cpumaps has the format described in
 *     virDomainPinVcpu() API.
 *     Must not be NULL.
 * @maplen: the number of bytes in one cpumap, from 1 up to size of CPU map.
 *     Must be positive.
9721
 * @flags: bitwise-OR of virDomainModificationImpact
9722 9723 9724 9725 9726 9727 9728 9729 9730 9731
 *     Must not be VIR_DOMAIN_AFFECT_LIVE and
 *     VIR_DOMAIN_AFFECT_CONFIG concurrently.
 *
 * Query the CPU affinity setting of all virtual CPUs of domain, store it
 * in cpumaps.
 *
 * Returns the number of virtual CPUs in case of success,
 * -1 in case of failure.
 */
int
9732 9733
virDomainGetVcpuPinInfo(virDomainPtr domain, int ncpumaps,
                        unsigned char *cpumaps, int maplen, unsigned int flags)
9734 9735 9736
{
    virConnectPtr conn;

9737
    VIR_DOMAIN_DEBUG(domain, "ncpumaps=%d, cpumaps=%p, maplen=%d, flags=%x",
9738 9739 9740 9741
                     ncpumaps, cpumaps, maplen, flags);

    virResetLastError();

9742 9743
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9744

9745 9746 9747 9748
    virCheckNonNullArgGoto(cpumaps, error);
    virCheckPositiveArgGoto(ncpumaps, error);
    virCheckPositiveArgGoto(maplen, error);

E
Eric Blake 已提交
9749
    if (INT_MULTIPLY_OVERFLOW(ncpumaps, maplen)) {
9750 9751
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %d * %d"),
                       ncpumaps, maplen);
E
Eric Blake 已提交
9752 9753
        goto error;
    }
9754

9755 9756 9757
    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
9758
        virReportInvalidArg(flags,
9759 9760
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
9761
                            __FUNCTION__);
9762 9763
        goto error;
    }
9764

E
Eric Blake 已提交
9765
    if (conn->driver->domainGetVcpuPinInfo) {
9766
        int ret;
9767 9768
        ret = conn->driver->domainGetVcpuPinInfo(domain, ncpumaps,
                                                 cpumaps, maplen, flags);
9769 9770 9771 9772 9773
        if (ret < 0)
            goto error;
        return ret;
    }

9774
    virReportUnsupportedError();
9775

9776
 error:
9777 9778 9779 9780
    virDispatchError(domain->conn);
    return -1;
}

9781

9782 9783 9784 9785 9786 9787 9788 9789 9790 9791 9792 9793 9794 9795 9796 9797 9798 9799 9800 9801 9802 9803 9804 9805 9806 9807 9808 9809 9810 9811 9812 9813 9814 9815 9816 9817 9818 9819 9820 9821 9822 9823 9824
/**
 * virDomainPinEmulator:
 * @domain: pointer to domain object, or NULL for Domain0
 * @cpumap: pointer to a bit map of real CPUs (in 8-bit bytes) (IN)
 *      Each bit set to 1 means that corresponding CPU is usable.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
 * @maplen: number of bytes in cpumap, from 1 up to size of CPU map in
 *      underlying virtualization system (Xen...).
 *      If maplen < size, missing bytes are set to zero.
 *      If maplen > size, failure code is returned.
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Dynamically change the real CPUs which can be allocated to all emulator
 * threads. This function may require privileged access to the hypervisor.
 *
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set.
 * If VIR_DOMAIN_AFFECT_LIVE is set, the change affects a running domain
 * and may fail if domain is not alive.
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
 * and will fail for transient domains. If neither flag is specified (that is,
 * @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain modifies
 * persistent setup, while an active domain is hypervisor-dependent on whether
 * just live or both live and persistent state is changed.
 * Not all hypervisors can support all flag combinations.
 *
 * See also virDomainGetEmulatorPinInfo for querying this information.
 *
 * Returns 0 in case of success, -1 in case of failure.
 *
 */
int
virDomainPinEmulator(virDomainPtr domain, unsigned char *cpumap,
                     int maplen, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cpumap=%p, maplen=%d, flags=%x",
                     cpumap, maplen, flags);

    virResetLastError();

9825 9826
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9827

9828
    virCheckReadOnlyGoto(conn->flags, error);
9829

9830 9831
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);
9832 9833 9834

    if (conn->driver->domainPinEmulator) {
        int ret;
9835
        ret = conn->driver->domainPinEmulator(domain, cpumap, maplen, flags);
9836 9837 9838 9839 9840
        if (ret < 0)
            goto error;
        return ret;
    }

9841
    virReportUnsupportedError();
9842

9843
 error:
9844 9845 9846 9847
    virDispatchError(domain->conn);
    return -1;
}

9848

9849 9850 9851 9852 9853 9854 9855 9856 9857 9858 9859 9860 9861 9862 9863 9864 9865 9866 9867 9868 9869 9870 9871 9872 9873 9874 9875 9876 9877 9878 9879
/**
 * virDomainGetEmulatorPinInfo:
 * @domain: pointer to domain object, or NULL for Domain0
 * @cpumap: pointer to a bit map of real CPUs for all emulator threads of
 *     this domain (in 8-bit bytes) (OUT)
 *     There is only one cpumap for all emulator threads.
 *     Must not be NULL.
 * @maplen: the number of bytes in one cpumap, from 1 up to size of CPU map.
 *     Must be positive.
 * @flags: bitwise-OR of virDomainModificationImpact
 *     Must not be VIR_DOMAIN_AFFECT_LIVE and
 *     VIR_DOMAIN_AFFECT_CONFIG concurrently.
 *
 * Query the CPU affinity setting of all emulator threads of domain, store
 * it in cpumap.
 *
 * Returns 1 in case of success,
 * 0 in case of no emulator threads are pined to pcpus,
 * -1 in case of failure.
 */
int
virDomainGetEmulatorPinInfo(virDomainPtr domain, unsigned char *cpumap,
                            int maplen, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cpumap=%p, maplen=%d, flags=%x",
                     cpumap, maplen, flags);

    virResetLastError();

9880
    virCheckDomainReturn(domain, -1);
9881

9882 9883
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);
9884 9885 9886 9887

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
9888 9889 9890 9891
        virReportInvalidArg(flags,
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
                            __FUNCTION__);
9892 9893 9894 9895 9896 9897 9898 9899 9900 9901 9902 9903 9904
        goto error;
    }
    conn = domain->conn;

    if (conn->driver->domainGetEmulatorPinInfo) {
        int ret;
        ret = conn->driver->domainGetEmulatorPinInfo(domain, cpumap,
                                                     maplen, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9905
    virReportUnsupportedError();
9906

9907
 error:
9908 9909 9910 9911
    virDispatchError(domain->conn);
    return -1;
}

9912

9913 9914 9915 9916 9917
/**
 * virDomainGetVcpus:
 * @domain: pointer to domain object, or NULL for Domain0
 * @info: pointer to an array of virVcpuInfo structures (OUT)
 * @maxinfo: number of structures in info array
D
Dan Kenigsberg 已提交
9918
 * @cpumaps: pointer to a bit map of real CPUs for all vcpus of this
9919
 *      domain (in 8-bit bytes) (OUT)
O
Osier Yang 已提交
9920 9921 9922 9923 9924
 *      If cpumaps is NULL, then no cpumap information is returned by the API.
 *      It's assumed there is <maxinfo> cpumap in cpumaps array.
 *      The memory allocated to cpumaps must be (maxinfo * maplen) bytes
 *      (ie: calloc(maxinfo, maplen)).
 *      One cpumap inside cpumaps has the format described in
9925 9926
 *      virDomainPinVcpu() API.
 * @maplen: number of bytes in one cpumap, from 1 up to size of CPU map in
O
Osier Yang 已提交
9927 9928
 *      underlying virtualization system (Xen...).
 *      Must be zero when cpumaps is NULL and positive when it is non-NULL.
9929
 *
9930
 * Extract information about virtual CPUs of domain, store it in info array
9931 9932 9933
 * and also in cpumaps if this pointer isn't NULL.  This call may fail
 * on an inactive domain.
 *
E
Eric Blake 已提交
9934
 * See also virDomainGetVcpuPinInfo for querying just cpumaps, including on
9935
 * an inactive domain.
9936 9937 9938 9939 9940
 *
 * Returns the number of info filled in case of success, -1 in case of failure.
 */
int
virDomainGetVcpus(virDomainPtr domain, virVcpuInfoPtr info, int maxinfo,
9941
                  unsigned char *cpumaps, int maplen)
9942
{
9943
    virConnectPtr conn;
9944 9945 9946

    VIR_DOMAIN_DEBUG(domain, "info=%p, maxinfo=%d, cpumaps=%p, maplen=%d",
                     info, maxinfo, cpumaps, maplen);
9947

9948 9949
    virResetLastError();

9950
    virCheckDomainReturn(domain, -1);
9951 9952
    virCheckNonNullArgGoto(info, error);
    virCheckPositiveArgGoto(maxinfo, error);
9953 9954 9955

    /* Ensure that domainGetVcpus (aka remoteDomainGetVcpus) does not
       try to memcpy anything into a NULL pointer.  */
9956 9957 9958 9959 9960
    if (cpumaps)
        virCheckPositiveArgGoto(maplen, error);
    else
        virCheckZeroArgGoto(maplen, error);

E
Eric Blake 已提交
9961
    if (cpumaps && INT_MULTIPLY_OVERFLOW(maxinfo, maplen)) {
9962 9963
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %d * %d"),
                       maxinfo, maplen);
E
Eric Blake 已提交
9964 9965
        goto error;
    }
9966

9967 9968
    conn = domain->conn;

9969 9970
    if (conn->driver->domainGetVcpus) {
        int ret;
9971 9972
        ret = conn->driver->domainGetVcpus(domain, info, maxinfo,
                                           cpumaps, maplen);
9973 9974 9975 9976
        if (ret < 0)
            goto error;
        return ret;
    }
9977

9978
    virReportUnsupportedError();
9979

9980
 error:
9981
    virDispatchError(domain->conn);
9982
    return -1;
9983
}
9984

9985

9986 9987 9988
/**
 * virDomainGetMaxVcpus:
 * @domain: pointer to domain object
9989
 *
9990 9991
 * Provides the maximum number of virtual CPUs supported for
 * the guest VM. If the guest is inactive, this is basically
E
Eric Blake 已提交
9992
 * the same as virConnectGetMaxVcpus(). If the guest is running
9993
 * this will reflect the maximum number of virtual CPUs the
E
Eric Blake 已提交
9994
 * guest was booted with.  For more details, see virDomainGetVcpusFlags().
9995 9996 9997 9998
 *
 * Returns the maximum of virtual CPU or -1 in case of error.
 */
int
9999 10000
virDomainGetMaxVcpus(virDomainPtr domain)
{
10001
    virConnectPtr conn;
10002

10003
    VIR_DOMAIN_DEBUG(domain);
10004

10005 10006
    virResetLastError();

10007
    virCheckDomainReturn(domain, -1);
10008 10009
    conn = domain->conn;

10010 10011
    if (conn->driver->domainGetMaxVcpus) {
        int ret;
10012
        ret = conn->driver->domainGetMaxVcpus(domain);
10013 10014 10015 10016
        if (ret < 0)
            goto error;
        return ret;
    }
10017

10018
    virReportUnsupportedError();
10019

10020
 error:
10021
    virDispatchError(domain->conn);
10022
    return -1;
10023 10024
}

10025

10026 10027 10028 10029 10030
/**
 * virDomainGetSecurityLabel:
 * @domain: a domain object
 * @seclabel: pointer to a virSecurityLabel structure
 *
10031 10032 10033
 * Extract security label of an active domain. The 'label' field
 * in the @seclabel argument will be initialized to the empty
 * string if the domain is not running under a security model.
10034
 *
10035
 * Returns 0 in case of success, -1 in case of failure
10036 10037 10038 10039 10040 10041
 */
int
virDomainGetSecurityLabel(virDomainPtr domain, virSecurityLabelPtr seclabel)
{
    virConnectPtr conn;

10042 10043
    VIR_DOMAIN_DEBUG(domain, "seclabel=%p", seclabel);

10044 10045
    virResetLastError();

10046 10047
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10048

10049
    virCheckNonNullArgGoto(seclabel, error);
10050

10051 10052 10053 10054 10055 10056 10057 10058
    if (conn->driver->domainGetSecurityLabel) {
        int ret;
        ret = conn->driver->domainGetSecurityLabel(domain, seclabel);
        if (ret < 0)
            goto error;
        return ret;
    }

10059
    virReportUnsupportedError();
10060

10061
 error:
10062
    virDispatchError(domain->conn);
10063
    return -1;
10064 10065
}

10066

M
Marcelo Cerri 已提交
10067 10068 10069 10070 10071 10072 10073 10074 10075 10076 10077 10078 10079 10080 10081 10082 10083 10084 10085 10086
/**
 * virDomainGetSecurityLabelList:
 * @domain: a domain object
 * @seclabels: will be auto-allocated and filled with domains' security labels.
 * Caller must free memory on return.
 *
 * Extract the security labels of an active domain. The 'label' field
 * in the @seclabels argument will be initialized to the empty
 * string if the domain is not running under a security model.
 *
 * Returns number of elemnets in @seclabels on success, -1 in case of failure.
 */
int
virDomainGetSecurityLabelList(virDomainPtr domain,
                              virSecurityLabelPtr* seclabels)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "seclabels=%p", seclabels);

10087 10088
    virResetLastError();

10089
    virCheckDomainReturn(domain, -1);
M
Marcelo Cerri 已提交
10090

10091
    virCheckNonNullArgGoto(seclabels, error);
M
Marcelo Cerri 已提交
10092 10093 10094 10095 10096 10097 10098 10099 10100 10101 10102

    conn = domain->conn;

    if (conn->driver->domainGetSecurityLabelList) {
        int ret;
        ret = conn->driver->domainGetSecurityLabelList(domain, seclabels);
        if (ret < 0)
            goto error;
        return ret;
    }

10103
    virReportUnsupportedError();
M
Marcelo Cerri 已提交
10104

10105
 error:
M
Marcelo Cerri 已提交
10106 10107 10108
    virDispatchError(domain->conn);
    return -1;
}
10109 10110 10111 10112 10113 10114 10115 10116 10117 10118 10119 10120 10121 10122 10123 10124 10125 10126 10127 10128 10129 10130 10131 10132 10133 10134 10135 10136 10137 10138 10139 10140 10141 10142 10143 10144 10145 10146 10147 10148 10149 10150 10151 10152 10153
/**
 * virDomainSetMetadata:
 * @domain: a domain object
 * @type: type of description, from virDomainMetadataType
 * @metadata: new metadata text
 * @key: XML namespace key, or NULL
 * @uri: XML namespace URI, or NULL
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Sets the appropriate domain element given by @type to the
 * value of @description.  A @type of VIR_DOMAIN_METADATA_DESCRIPTION
 * is free-form text; VIR_DOMAIN_METADATA_TITLE is free-form, but no
 * newlines are permitted, and should be short (although the length is
 * not enforced). For these two options @key and @uri are irrelevant and
 * must be set to NULL.
 *
 * For type VIR_DOMAIN_METADATA_ELEMENT @metadata  must be well-formed
 * XML belonging to namespace defined by @uri with local name @key.
 *
 * Passing NULL for @metadata says to remove that element from the
 * domain XML (passing the empty string leaves the element present).
 *
 * The resulting metadata will be present in virDomainGetXMLDesc(),
 * as well as quick access through virDomainGetMetadata().
 *
 * @flags controls whether the live domain, persistent configuration,
 * or both will be modified.
 *
 * Returns 0 on success, -1 in case of failure.
 */
int
virDomainSetMetadata(virDomainPtr domain,
                     int type,
                     const char *metadata,
                     const char *key,
                     const char *uri,
                     unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain,
                     "type=%d, metadata='%s', key='%s', uri='%s', flags=%x",
                     type, NULLSTR(metadata), NULLSTR(key), NULLSTR(uri),
                     flags);

10154 10155
    virResetLastError();

10156
    virCheckDomainReturn(domain, -1);
10157 10158
    conn = domain->conn;

10159
    virCheckReadOnlyGoto(conn->flags, error);
10160 10161 10162 10163

    switch (type) {
    case VIR_DOMAIN_METADATA_TITLE:
        if (metadata && strchr(metadata, '\n')) {
10164
            virReportInvalidArg(metadata,
10165 10166
                                _("metadata title in %s can't contain "
                                  "newlines"),
10167 10168
                                __FUNCTION__);
            goto error;
10169 10170 10171
        }
        /* fallthrough */
    case VIR_DOMAIN_METADATA_DESCRIPTION:
10172 10173
        virCheckNullArgGoto(uri, error);
        virCheckNullArgGoto(key, error);
10174 10175
        break;
    case VIR_DOMAIN_METADATA_ELEMENT:
10176
        virCheckNonNullArgGoto(uri, error);
10177 10178
        if (metadata)
            virCheckNonNullArgGoto(key, error);
10179 10180 10181 10182 10183 10184 10185 10186 10187 10188 10189 10190 10191 10192 10193
        break;
    default:
        /* For future expansion */
        break;
    }

    if (conn->driver->domainSetMetadata) {
        int ret;
        ret = conn->driver->domainSetMetadata(domain, type, metadata, key, uri,
                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

10194
    virReportUnsupportedError();
10195

10196
 error:
10197 10198 10199 10200
    virDispatchError(domain->conn);
    return -1;
}

10201

10202 10203 10204 10205 10206 10207 10208 10209 10210 10211 10212 10213 10214 10215 10216 10217 10218 10219 10220 10221 10222 10223 10224 10225 10226 10227 10228 10229 10230 10231 10232 10233 10234 10235
/**
 * virDomainGetMetadata:
 * @domain: a domain object
 * @type: type of description, from virDomainMetadataType
 * @uri: XML namespace identifier
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Retrieves the appropriate domain element given by @type.
 * If VIR_DOMAIN_METADATA_ELEMENT is requested parameter @uri
 * must be set to the name of the namespace the requested elements
 * belong to, otherwise must be NULL.
 *
 * If an element of the domain XML is not present, the resulting
 * error will be VIR_ERR_NO_DOMAIN_METADATA.  This method forms
 * a shortcut for seeing information from virDomainSetMetadata()
 * without having to go through virDomainGetXMLDesc().
 *
 * @flags controls whether the live domain or persistent
 * configuration will be queried.
 *
 * Returns the metadata string on success (caller must free),
 * or NULL in case of failure.
 */
char *
virDomainGetMetadata(virDomainPtr domain,
                     int type,
                     const char *uri,
                     unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "type=%d, uri='%s', flags=%x",
                     type, NULLSTR(uri), flags);

10236 10237
    virResetLastError();

10238
    virCheckDomainReturn(domain, NULL);
10239 10240 10241

    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
10242
        virReportInvalidArg(flags,
10243 10244
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
10245
                            __FUNCTION__);
10246 10247 10248 10249 10250 10251
        goto error;
    }

    switch (type) {
    case VIR_DOMAIN_METADATA_TITLE:
    case VIR_DOMAIN_METADATA_DESCRIPTION:
10252
        virCheckNullArgGoto(uri, error);
10253 10254
        break;
    case VIR_DOMAIN_METADATA_ELEMENT:
10255
        virCheckNonNullArgGoto(uri, error);
10256 10257 10258 10259 10260 10261 10262 10263 10264 10265 10266 10267 10268 10269 10270
        break;
    default:
        /* For future expansion */
        break;
    }

    conn = domain->conn;

    if (conn->driver->domainGetMetadata) {
        char *ret;
        if (!(ret = conn->driver->domainGetMetadata(domain, type, uri, flags)))
            goto error;
        return ret;
    }

10271
    virReportUnsupportedError();
10272

10273
 error:
10274 10275 10276 10277
    virDispatchError(domain->conn);
    return NULL;
}

10278

10279 10280 10281 10282 10283
/**
 * virNodeGetSecurityModel:
 * @conn: a connection object
 * @secmodel: pointer to a virSecurityModel structure
 *
10284 10285 10286
 * Extract the security model of a hypervisor. The 'model' field
 * in the @secmodel argument may be initialized to the empty
 * string if the driver has not activated a security model.
10287
 *
10288
 * Returns 0 in case of success, -1 in case of failure
10289 10290 10291 10292
 */
int
virNodeGetSecurityModel(virConnectPtr conn, virSecurityModelPtr secmodel)
{
10293
    VIR_DEBUG("conn=%p secmodel=%p", conn, secmodel);
10294

10295 10296
    virResetLastError();

10297
    virCheckConnectReturn(conn, -1);
10298
    virCheckNonNullArgGoto(secmodel, error);
10299 10300 10301 10302 10303 10304 10305

    if (conn->driver->nodeGetSecurityModel) {
        int ret;
        ret = conn->driver->nodeGetSecurityModel(conn, secmodel);
        if (ret < 0)
            goto error;
        return ret;
10306 10307
    }

10308
    virReportUnsupportedError();
10309

10310
 error:
10311
    virDispatchError(conn);
10312
    return -1;
10313
}
10314

10315

10316 10317 10318 10319
/**
 * virDomainAttachDevice:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10320
 *
10321 10322
 * Create a virtual device attachment to backend.  This function,
 * having hotplug semantics, is only allowed on an active domain.
10323
 *
10324 10325 10326 10327
 * For compatibility, this method can also be used to change the media
 * in an existing CDROM/Floppy device, however, applications are
 * recommended to use the virDomainUpdateDeviceFlag method instead.
 *
10328 10329 10330 10331
 * Be aware that hotplug changes might not persist across a domain going
 * into S4 state (also known as hibernation) unless you also modify the
 * persistent domain definition.
 *
10332 10333 10334
 * Returns 0 in case of success, -1 in case of failure.
 */
int
10335
virDomainAttachDevice(virDomainPtr domain, const char *xml)
10336 10337
{
    virConnectPtr conn;
10338 10339

    VIR_DOMAIN_DEBUG(domain, "xml=%s", xml);
10340

10341 10342
    virResetLastError();

10343 10344
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10345

10346
    virCheckNonNullArgGoto(xml, error);
10347
    virCheckReadOnlyGoto(conn->flags, error);
10348

10349
    if (conn->driver->domainAttachDevice) {
J
Jim Fehlig 已提交
10350
       int ret;
10351
       ret = conn->driver->domainAttachDevice(domain, xml);
J
Jim Fehlig 已提交
10352 10353 10354 10355 10356
       if (ret < 0)
          goto error;
       return ret;
    }

10357
    virReportUnsupportedError();
J
Jim Fehlig 已提交
10358

10359
 error:
J
Jim Fehlig 已提交
10360 10361 10362 10363
    virDispatchError(domain->conn);
    return -1;
}

10364

J
Jim Fehlig 已提交
10365 10366 10367 10368
/**
 * virDomainAttachDeviceFlags:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10369
 * @flags: bitwise-OR of virDomainDeviceModifyFlags
J
Jim Fehlig 已提交
10370 10371
 *
 * Attach a virtual device to a domain, using the flags parameter
10372
 * to control how the device is attached.  VIR_DOMAIN_AFFECT_CURRENT
J
Jim Fehlig 已提交
10373
 * specifies that the device allocation is made based on current domain
10374
 * state.  VIR_DOMAIN_AFFECT_LIVE specifies that the device shall be
J
Jim Fehlig 已提交
10375
 * allocated to the active domain instance only and is not added to the
10376
 * persisted domain configuration.  VIR_DOMAIN_AFFECT_CONFIG
J
Jim Fehlig 已提交
10377 10378 10379 10380 10381 10382
 * specifies that the device shall be allocated to the persisted domain
 * configuration only.  Note that the target hypervisor must return an
 * error if unable to satisfy flags.  E.g. the hypervisor driver will
 * return failure if LIVE is specified but it only supports modifying the
 * persisted device allocation.
 *
10383 10384 10385 10386
 * For compatibility, this method can also be used to change the media
 * in an existing CDROM/Floppy device, however, applications are
 * recommended to use the virDomainUpdateDeviceFlag method instead.
 *
10387 10388 10389 10390
 * Be aware that hotplug changes might not persist across a domain going
 * into S4 state (also known as hibernation) unless you also modify the
 * persistent domain definition.
 *
J
Jim Fehlig 已提交
10391 10392 10393 10394 10395 10396 10397
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainAttachDeviceFlags(virDomainPtr domain,
                           const char *xml, unsigned int flags)
{
    virConnectPtr conn;
10398

10399
    VIR_DOMAIN_DEBUG(domain, "xml=%s, flags=%x", xml, flags);
J
Jim Fehlig 已提交
10400 10401 10402

    virResetLastError();

10403 10404
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10405

10406
    virCheckNonNullArgGoto(xml, error);
10407
    virCheckReadOnlyGoto(conn->flags, error);
J
Jim Fehlig 已提交
10408 10409

    if (conn->driver->domainAttachDeviceFlags) {
10410
        int ret;
J
Jim Fehlig 已提交
10411
        ret = conn->driver->domainAttachDeviceFlags(domain, xml, flags);
10412 10413 10414 10415
        if (ret < 0)
            goto error;
        return ret;
    }
10416

10417
    virReportUnsupportedError();
10418

10419
 error:
10420
    virDispatchError(domain->conn);
10421
    return -1;
10422 10423
}

10424

10425 10426 10427 10428
/**
 * virDomainDetachDevice:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10429
 *
10430 10431
 * Destroy a virtual device attachment to backend.  This function,
 * having hot-unplug semantics, is only allowed on an active domain.
10432
 *
10433 10434 10435 10436
 * Be aware that hotplug changes might not persist across a domain going
 * into S4 state (also known as hibernation) unless you also modify the
 * persistent domain definition.
 *
10437 10438 10439
 * Returns 0 in case of success, -1 in case of failure.
 */
int
10440
virDomainDetachDevice(virDomainPtr domain, const char *xml)
10441 10442
{
    virConnectPtr conn;
10443 10444

    VIR_DOMAIN_DEBUG(domain, "xml=%s", xml);
10445

10446 10447
    virResetLastError();

10448 10449
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10450

10451
    virCheckNonNullArgGoto(xml, error);
10452
    virCheckReadOnlyGoto(conn->flags, error);
10453

10454 10455
    if (conn->driver->domainDetachDevice) {
        int ret;
10456
        ret = conn->driver->domainDetachDevice(domain, xml);
J
Jim Fehlig 已提交
10457 10458 10459 10460 10461
         if (ret < 0)
             goto error;
         return ret;
     }

10462
    virReportUnsupportedError();
J
Jim Fehlig 已提交
10463

10464
 error:
J
Jim Fehlig 已提交
10465 10466 10467 10468
    virDispatchError(domain->conn);
    return -1;
}

10469

J
Jim Fehlig 已提交
10470 10471 10472 10473
/**
 * virDomainDetachDeviceFlags:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10474
 * @flags: bitwise-OR of virDomainDeviceModifyFlags
J
Jim Fehlig 已提交
10475 10476
 *
 * Detach a virtual device from a domain, using the flags parameter
10477
 * to control how the device is detached.  VIR_DOMAIN_AFFECT_CURRENT
J
Jim Fehlig 已提交
10478
 * specifies that the device allocation is removed based on current domain
10479
 * state.  VIR_DOMAIN_AFFECT_LIVE specifies that the device shall be
J
Jim Fehlig 已提交
10480
 * deallocated from the active domain instance only and is not from the
10481
 * persisted domain configuration.  VIR_DOMAIN_AFFECT_CONFIG
J
Jim Fehlig 已提交
10482 10483 10484 10485 10486 10487
 * specifies that the device shall be deallocated from the persisted domain
 * configuration only.  Note that the target hypervisor must return an
 * error if unable to satisfy flags.  E.g. the hypervisor driver will
 * return failure if LIVE is specified but it only supports removing the
 * persisted device allocation.
 *
E
Eric Blake 已提交
10488 10489 10490 10491
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation on the device being detached; in that case,
 * use virDomainBlockJobAbort() to stop the block copy first.
 *
10492 10493 10494 10495 10496 10497 10498 10499 10500 10501 10502 10503 10504 10505 10506 10507
 * Beware that depending on the hypervisor and device type, detaching a device
 * from a running domain may be asynchronous. That is, calling
 * virDomainDetachDeviceFlags may just request device removal while the device
 * is actually removed later (in cooperation with a guest OS). Previously,
 * this fact was ignored and the device could have been removed from domain
 * configuration before it was actually removed by the hypervisor causing
 * various failures on subsequent operations. To check whether the device was
 * successfully removed, either recheck domain configuration using
 * virDomainGetXMLDesc() or add handler for VIR_DOMAIN_EVENT_ID_DEVICE_REMOVED
 * event. In case the device is already gone when virDomainDetachDeviceFlags
 * returns, the event is delivered before this API call ends. To help existing
 * clients work better in most cases, this API will try to transform an
 * asynchronous device removal that finishes shortly after the request into
 * a synchronous removal. In other words, this API may wait a bit for the
 * removal to complete in case it was not synchronous.
 *
10508 10509 10510 10511
 * Be aware that hotplug changes might not persist across a domain going
 * into S4 state (also known as hibernation) unless you also modify the
 * persistent domain definition.
 *
J
Jim Fehlig 已提交
10512 10513 10514 10515 10516 10517 10518
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainDetachDeviceFlags(virDomainPtr domain,
                           const char *xml, unsigned int flags)
{
    virConnectPtr conn;
10519

10520
    VIR_DOMAIN_DEBUG(domain, "xml=%s, flags=%x", xml, flags);
J
Jim Fehlig 已提交
10521 10522 10523

    virResetLastError();

10524 10525
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10526

10527
    virCheckNonNullArgGoto(xml, error);
10528
    virCheckReadOnlyGoto(conn->flags, error);
J
Jim Fehlig 已提交
10529 10530 10531 10532

    if (conn->driver->domainDetachDeviceFlags) {
        int ret;
        ret = conn->driver->domainDetachDeviceFlags(domain, xml, flags);
10533 10534 10535 10536 10537
        if (ret < 0)
            goto error;
        return ret;
    }

10538
    virReportUnsupportedError();
10539

10540
 error:
10541 10542 10543 10544
    virDispatchError(domain->conn);
    return -1;
}

10545

10546 10547 10548 10549
/**
 * virDomainUpdateDeviceFlags:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10550
 * @flags: bitwise-OR of virDomainDeviceModifyFlags
10551 10552
 *
 * Change a virtual device on a domain, using the flags parameter
10553
 * to control how the device is changed.  VIR_DOMAIN_AFFECT_CURRENT
10554
 * specifies that the device change is made based on current domain
10555
 * state.  VIR_DOMAIN_AFFECT_LIVE specifies that the device shall be
10556
 * changed on the active domain instance only and is not added to the
10557
 * persisted domain configuration. VIR_DOMAIN_AFFECT_CONFIG
10558 10559 10560 10561 10562 10563 10564 10565 10566 10567 10568 10569 10570 10571 10572 10573 10574
 * specifies that the device shall be changed on the persisted domain
 * configuration only.  Note that the target hypervisor must return an
 * error if unable to satisfy flags.  E.g. the hypervisor driver will
 * return failure if LIVE is specified but it only supports modifying the
 * persisted device allocation.
 *
 * This method is used for actions such changing CDROM/Floppy device
 * media, altering the graphics configuration such as password,
 * reconfiguring the NIC device backend connectivity, etc.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainUpdateDeviceFlags(virDomainPtr domain,
                           const char *xml, unsigned int flags)
{
    virConnectPtr conn;
10575

10576
    VIR_DOMAIN_DEBUG(domain, "xml=%s, flags=%x", xml, flags);
10577 10578 10579

    virResetLastError();

10580 10581
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10582

10583
    virCheckNonNullArgGoto(xml, error);
10584
    virCheckReadOnlyGoto(conn->flags, error);
10585 10586 10587 10588

    if (conn->driver->domainUpdateDeviceFlags) {
        int ret;
        ret = conn->driver->domainUpdateDeviceFlags(domain, xml, flags);
10589 10590 10591 10592
        if (ret < 0)
            goto error;
        return ret;
    }
10593

10594
    virReportUnsupportedError();
10595

10596
 error:
10597
    virDispatchError(domain->conn);
10598
    return -1;
10599
}
10600

10601

10602 10603 10604 10605 10606 10607 10608 10609 10610 10611
/**
 * virNodeGetCellsFreeMemory:
 * @conn: pointer to the hypervisor connection
 * @freeMems: pointer to the array of unsigned long long
 * @startCell: index of first cell to return freeMems info on.
 * @maxCells: Maximum number of cells for which freeMems information can
 *            be returned.
 *
 * This call returns the amount of free memory in one or more NUMA cells.
 * The @freeMems array must be allocated by the caller and will be filled
10612
 * with the amount of free memory in bytes for each cell requested,
10613 10614 10615 10616 10617 10618 10619 10620 10621 10622
 * starting with startCell (in freeMems[0]), up to either
 * (startCell + maxCells), or the number of additional cells in the node,
 * whichever is smaller.
 *
 * Returns the number of entries filled in freeMems, or -1 in case of error.
 */
int
virNodeGetCellsFreeMemory(virConnectPtr conn, unsigned long long *freeMems,
                          int startCell, int maxCells)
{
10623
    VIR_DEBUG("conn=%p, freeMems=%p, startCell=%d, maxCells=%d",
10624 10625
          conn, freeMems, startCell, maxCells);

10626 10627
    virResetLastError();

10628
    virCheckConnectReturn(conn, -1);
10629 10630 10631
    virCheckNonNullArgGoto(freeMems, error);
    virCheckPositiveArgGoto(maxCells, error);
    virCheckNonNegativeArgGoto(startCell, error);
10632

10633 10634
    if (conn->driver->nodeGetCellsFreeMemory) {
        int ret;
10635
        ret = conn->driver->nodeGetCellsFreeMemory(conn, freeMems, startCell, maxCells);
10636 10637 10638 10639
        if (ret < 0)
            goto error;
        return ret;
    }
10640

10641
    virReportUnsupportedError();
10642

10643
 error:
10644
    virDispatchError(conn);
10645 10646 10647
    return -1;
}

10648

10649 10650 10651 10652
/**
 * virNetworkGetConnect:
 * @net: pointer to a network
 *
10653
 * Provides the connection pointer associated with a network.  The
10654 10655 10656
 * reference counter on the connection is not increased by this
 * call.
 *
10657 10658 10659 10660
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the network object together.
 *
10661 10662 10663
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
10664
virNetworkGetConnect(virNetworkPtr net)
10665
{
10666
    VIR_DEBUG("net=%p", net);
10667

10668 10669
    virResetLastError();

10670 10671
    virCheckNetworkReturn(net, NULL);

10672 10673 10674
    return net->conn;
}

10675

10676 10677 10678 10679 10680 10681 10682 10683 10684 10685 10686 10687 10688 10689 10690 10691 10692 10693 10694 10695 10696 10697 10698 10699 10700 10701 10702 10703 10704 10705 10706 10707 10708 10709 10710 10711 10712 10713 10714 10715 10716 10717 10718 10719 10720 10721 10722
/**
 * virConnectListAllNetworks:
 * @conn: Pointer to the hypervisor connection.
 * @nets: Pointer to a variable to store the array containing the network
 *        objects or NULL if the list is not required (just returns number
 *        of networks).
 * @flags: bitwise-OR of virConnectListAllNetworksFlags.
 *
 * Collect the list of networks, and allocate an array to store those
 * objects. This API solves the race inherent between virConnectListNetworks
 * and virConnectListDefinedNetworks.
 *
 * Normally, all networks are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted networks.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a network, and where all bits
 * within a group describe all possible networks.
 *
 * The first group of @flags is VIR_CONNECT_LIST_NETWORKS_ACTIVE (up) and
 * VIR_CONNECT_LIST_NETWORKS_INACTIVE (down) to filter the networks by state.
 *
 * The second group of @flags is VIR_CONNECT_LIST_NETWORKS_PERSISTENT (defined)
 * and VIR_CONNECT_LIST_NETWORKS_TRANSIENT (running but not defined), to filter
 * the networks by whether they have persistent config or not.
 *
 * The third group of @flags is VIR_CONNECT_LIST_NETWORKS_AUTOSTART
 * and VIR_CONNECT_LIST_NETWORKS_NO_AUTOSTART, to filter the networks by
 * whether they are marked as autostart or not.
 *
 * Returns the number of networks found or -1 and sets @nets to  NULL in case
 * of error.  On success, the array stored into @nets is guaranteed to have an
 * extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virNetworkFree() on each array element, then calling free() on @nets.
 */
int
virConnectListAllNetworks(virConnectPtr conn,
                          virNetworkPtr **nets,
                          unsigned int flags)
{
    VIR_DEBUG("conn=%p, nets=%p, flags=%x", conn, nets, flags);

    virResetLastError();

    if (nets)
        *nets = NULL;

10723
    virCheckConnectReturn(conn, -1);
10724 10725

    if (conn->networkDriver &&
10726
        conn->networkDriver->connectListAllNetworks) {
10727
        int ret;
10728
        ret = conn->networkDriver->connectListAllNetworks(conn, nets, flags);
10729 10730 10731 10732 10733
        if (ret < 0)
            goto error;
        return ret;
    }

10734
    virReportUnsupportedError();
10735

10736
 error:
10737 10738 10739 10740 10741
    virDispatchError(conn);
    return -1;
}


10742 10743 10744 10745 10746 10747 10748 10749 10750 10751 10752
/**
 * virConnectNumOfNetworks:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of active networks.
 *
 * Returns the number of network found or -1 in case of error
 */
int
virConnectNumOfNetworks(virConnectPtr conn)
{
10753
    VIR_DEBUG("conn=%p", conn);
10754

10755 10756
    virResetLastError();

10757
    virCheckConnectReturn(conn, -1);
10758

10759
    if (conn->networkDriver && conn->networkDriver->connectNumOfNetworks) {
10760
        int ret;
10761
        ret = conn->networkDriver->connectNumOfNetworks(conn);
10762 10763 10764 10765
        if (ret < 0)
            goto error;
        return ret;
    }
10766

10767
    virReportUnsupportedError();
10768

10769
 error:
10770
    virDispatchError(conn);
10771
    return -1;
10772 10773
}

10774

10775 10776 10777 10778 10779 10780 10781 10782
/**
 * virConnectListNetworks:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of active networks
 * @maxnames: size of @names
 *
 * Collect the list of active networks, and store their names in @names
 *
10783 10784 10785 10786 10787 10788
 * For more control over the results, see virConnectListAllNetworks().
 *
 * Returns the number of networks found or -1 in case of error.  Note that
 * this command is inherently racy; a network can be started between a call
 * to virConnectNumOfNetworks() and this call; you are only guaranteed that
 * all currently active networks were listed if the return is less than
J
John Ferlan 已提交
10789
 * @maxnames. The client must call free() on each returned name.
10790 10791
 */
int
10792
virConnectListNetworks(virConnectPtr conn, char **const names, int maxnames)
10793
{
10794
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
10795

10796 10797
    virResetLastError();

10798
    virCheckConnectReturn(conn, -1);
10799 10800
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
10801

10802
    if (conn->networkDriver && conn->networkDriver->connectListNetworks) {
10803
        int ret;
10804
        ret = conn->networkDriver->connectListNetworks(conn, names, maxnames);
10805 10806 10807 10808
        if (ret < 0)
            goto error;
        return ret;
    }
10809

10810
    virReportUnsupportedError();
10811

10812
 error:
10813
    virDispatchError(conn);
10814
    return -1;
10815 10816
}

10817

10818 10819 10820 10821 10822 10823 10824 10825 10826 10827 10828
/**
 * virConnectNumOfDefinedNetworks:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of inactive networks.
 *
 * Returns the number of networks found or -1 in case of error
 */
int
virConnectNumOfDefinedNetworks(virConnectPtr conn)
{
10829
    VIR_DEBUG("conn=%p", conn);
10830

10831 10832
    virResetLastError();

10833
    virCheckConnectReturn(conn, -1);
10834

10835
    if (conn->networkDriver && conn->networkDriver->connectNumOfDefinedNetworks) {
10836
        int ret;
10837
        ret = conn->networkDriver->connectNumOfDefinedNetworks(conn);
10838 10839 10840 10841
        if (ret < 0)
            goto error;
        return ret;
    }
10842

10843
    virReportUnsupportedError();
10844

10845
 error:
10846
    virDispatchError(conn);
10847
    return -1;
10848 10849
}

10850

10851 10852 10853 10854 10855 10856 10857 10858
/**
 * virConnectListDefinedNetworks:
 * @conn: pointer to the hypervisor connection
 * @names: pointer to an array to store the names
 * @maxnames: size of the array
 *
 * list the inactive networks, stores the pointers to the names in @names
 *
10859 10860 10861 10862 10863 10864 10865
 * For more control over the results, see virConnectListAllNetworks().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a network can be defined between
 * a call to virConnectNumOfDefinedNetworks() and this call; you are only
 * guaranteed that all currently defined networks were listed if the return
 * is less than @maxnames.  The client must call free() on each returned name.
10866 10867
 */
int
10868
virConnectListDefinedNetworks(virConnectPtr conn, char **const names,
10869 10870
                              int maxnames)
{
10871
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
10872

10873 10874
    virResetLastError();

10875
    virCheckConnectReturn(conn, -1);
10876 10877
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
10878

10879
    if (conn->networkDriver && conn->networkDriver->connectListDefinedNetworks) {
10880
        int ret;
10881
        ret = conn->networkDriver->connectListDefinedNetworks(conn, names, maxnames);
10882 10883 10884 10885
        if (ret < 0)
            goto error;
        return ret;
    }
10886

10887
    virReportUnsupportedError();
10888

10889
 error:
10890
    virDispatchError(conn);
10891
    return -1;
10892 10893
}

10894

10895 10896 10897 10898 10899 10900 10901
/**
 * virNetworkLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the network
 *
 * Try to lookup a network on the given hypervisor based on its name.
 *
10902 10903
 * Returns a new network object or NULL in case of failure.  If the
 * network cannot be found, then VIR_ERR_NO_NETWORK error is raised.
10904 10905 10906 10907
 */
virNetworkPtr
virNetworkLookupByName(virConnectPtr conn, const char *name)
{
10908
    VIR_DEBUG("conn=%p, name=%s", conn, name);
10909

10910 10911
    virResetLastError();

10912
    virCheckConnectReturn(conn, NULL);
10913
    virCheckNonNullArgGoto(name, error);
10914

10915 10916
    if (conn->networkDriver && conn->networkDriver->networkLookupByName) {
        virNetworkPtr ret;
10917
        ret = conn->networkDriver->networkLookupByName(conn, name);
10918 10919 10920 10921
        if (!ret)
            goto error;
        return ret;
    }
10922

10923
    virReportUnsupportedError();
10924

10925
 error:
10926
    virDispatchError(conn);
10927
    return NULL;
10928 10929
}

10930

10931 10932 10933 10934 10935 10936 10937
/**
 * virNetworkLookupByUUID:
 * @conn: pointer to the hypervisor connection
 * @uuid: the raw UUID for the network
 *
 * Try to lookup a network on the given hypervisor based on its UUID.
 *
10938 10939
 * Returns a new network object or NULL in case of failure.  If the
 * network cannot be found, then VIR_ERR_NO_NETWORK error is raised.
10940 10941 10942 10943
 */
virNetworkPtr
virNetworkLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
{
10944
    VIR_UUID_DEBUG(conn, uuid);
10945

10946 10947
    virResetLastError();

10948
    virCheckConnectReturn(conn, NULL);
10949
    virCheckNonNullArgGoto(uuid, error);
10950

10951 10952
    if (conn->networkDriver && conn->networkDriver->networkLookupByUUID){
        virNetworkPtr ret;
10953
        ret = conn->networkDriver->networkLookupByUUID(conn, uuid);
10954 10955 10956 10957
        if (!ret)
            goto error;
        return ret;
    }
10958

10959
    virReportUnsupportedError();
10960

10961
 error:
10962
    virDispatchError(conn);
10963
    return NULL;
10964 10965
}

10966

10967 10968 10969 10970 10971 10972 10973
/**
 * virNetworkLookupByUUIDString:
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the network
 *
 * Try to lookup a network on the given hypervisor based on its UUID.
 *
10974 10975
 * Returns a new network object or NULL in case of failure.  If the
 * network cannot be found, then VIR_ERR_NO_NETWORK error is raised.
10976 10977 10978 10979 10980
 */
virNetworkPtr
virNetworkLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
    unsigned char uuid[VIR_UUID_BUFLEN];
10981
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
10982

10983 10984
    virResetLastError();

10985
    virCheckConnectReturn(conn, NULL);
10986
    virCheckNonNullArgGoto(uuidstr, error);
10987

10988
    if (virUUIDParse(uuidstr, uuid) < 0) {
10989 10990 10991
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
10992
        goto error;
10993 10994 10995
    }

    return virNetworkLookupByUUID(conn, &uuid[0]);
10996

10997
 error:
10998
    virDispatchError(conn);
10999
    return NULL;
11000 11001
}

11002

11003 11004 11005 11006 11007 11008 11009 11010 11011 11012 11013 11014 11015
/**
 * virNetworkCreateXML:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: an XML description of the network
 *
 * Create and start a new virtual network, based on an XML description
 * similar to the one returned by virNetworkGetXMLDesc()
 *
 * Returns a new network object or NULL in case of failure
 */
virNetworkPtr
virNetworkCreateXML(virConnectPtr conn, const char *xmlDesc)
{
11016
    VIR_DEBUG("conn=%p, xmlDesc=%s", conn, xmlDesc);
11017

11018 11019
    virResetLastError();

11020
    virCheckConnectReturn(conn, NULL);
11021
    virCheckNonNullArgGoto(xmlDesc, error);
11022
    virCheckReadOnlyGoto(conn->flags, error);
11023

11024 11025
    if (conn->networkDriver && conn->networkDriver->networkCreateXML) {
        virNetworkPtr ret;
11026
        ret = conn->networkDriver->networkCreateXML(conn, xmlDesc);
11027 11028 11029 11030
        if (!ret)
            goto error;
        return ret;
    }
11031

11032
    virReportUnsupportedError();
11033

11034
 error:
11035
    virDispatchError(conn);
11036
    return NULL;
11037 11038
}

11039

11040 11041 11042 11043 11044 11045 11046 11047 11048 11049
/**
 * virNetworkDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xml: the XML description for the network, preferably in UTF-8
 *
 * Define a network, but does not create it
 *
 * Returns NULL in case of error, a pointer to the network otherwise
 */
virNetworkPtr
11050 11051
virNetworkDefineXML(virConnectPtr conn, const char *xml)
{
11052
    VIR_DEBUG("conn=%p, xml=%s", conn, xml);
11053

11054 11055
    virResetLastError();

11056
    virCheckConnectReturn(conn, NULL);
11057
    virCheckReadOnlyGoto(conn->flags, error);
11058
    virCheckNonNullArgGoto(xml, error);
11059

11060 11061
    if (conn->networkDriver && conn->networkDriver->networkDefineXML) {
        virNetworkPtr ret;
11062
        ret = conn->networkDriver->networkDefineXML(conn, xml);
11063 11064 11065 11066
        if (!ret)
            goto error;
        return ret;
    }
11067

11068
    virReportUnsupportedError();
11069

11070
 error:
11071
    virDispatchError(conn);
11072
    return NULL;
11073 11074
}

11075

11076 11077 11078 11079 11080 11081 11082 11083 11084
/**
 * virNetworkUndefine:
 * @network: pointer to a defined network
 *
 * Undefine a network but does not stop it if it is running
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
11085 11086
virNetworkUndefine(virNetworkPtr network)
{
11087
    virConnectPtr conn;
11088
    VIR_DEBUG("network=%p", network);
11089

11090 11091
    virResetLastError();

11092
    virCheckNetworkReturn(network, -1);
11093
    conn = network->conn;
11094

11095
    virCheckReadOnlyGoto(conn->flags, error);
11096

11097 11098
    if (conn->networkDriver && conn->networkDriver->networkUndefine) {
        int ret;
11099
        ret = conn->networkDriver->networkUndefine(network);
11100 11101 11102 11103
        if (ret < 0)
            goto error;
        return ret;
    }
11104

11105
    virReportUnsupportedError();
11106

11107
 error:
11108 11109 11110 11111
    virDispatchError(network->conn);
    return -1;
}

11112

11113 11114 11115 11116 11117 11118 11119 11120 11121 11122 11123 11124 11125 11126 11127 11128 11129 11130 11131 11132 11133 11134 11135 11136 11137 11138 11139 11140 11141 11142 11143 11144 11145
/**
 * virNetworkUpdate:
 * @network: pointer to a defined network
 * @section: which section of the network to update
 *           (see virNetworkUpdateSection for descriptions)
 * @command: what action to perform (add/delete/modify)
 *           (see virNetworkUpdateCommand for descriptions)
 * @parentIndex: which parent element, if there are multiple parents
 *           of the same type (e.g. which <ip> element when modifying
 *           a <dhcp>/<host> element), or "-1" for "don't care" or
 *           "automatically find appropriate one".
 * @xml: the XML description for the network, preferably in UTF-8
 * @flags: bitwise OR of virNetworkUpdateFlags.
 *
 * Update the definition of an existing network, either its live
 * running state, its persistent configuration, or both.
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
virNetworkUpdate(virNetworkPtr network,
                 unsigned int command, /* virNetworkUpdateCommand */
                 unsigned int section, /* virNetworkUpdateSection */
                 int parentIndex,
                 const char *xml,
                 unsigned int flags)
{
    virConnectPtr conn;
    VIR_DEBUG("network=%p, section=%d, parentIndex=%d, xml=%s, flags=0x%x",
              network, section, parentIndex, xml, flags);

    virResetLastError();

11146
    virCheckNetworkReturn(network, -1);
11147 11148
    conn = network->conn;

11149
    virCheckReadOnlyGoto(conn->flags, error);
11150 11151 11152 11153 11154 11155 11156 11157 11158 11159 11160
    virCheckNonNullArgGoto(xml, error);

    if (conn->networkDriver && conn->networkDriver->networkUpdate) {
        int ret;
        ret = conn->networkDriver->networkUpdate(network, section, command,
                                                 parentIndex, xml, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

11161
    virReportUnsupportedError();
11162

11163
 error:
11164
    virDispatchError(network->conn);
11165
    return -1;
11166 11167
}

11168

11169 11170 11171 11172 11173 11174 11175 11176 11177 11178
/**
 * virNetworkCreate:
 * @network: pointer to a defined network
 *
 * Create and start a defined network. If the call succeed the network
 * moves from the defined to the running networks pools.
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
11179 11180
virNetworkCreate(virNetworkPtr network)
{
11181
    virConnectPtr conn;
11182
    VIR_DEBUG("network=%p", network);
11183

11184 11185
    virResetLastError();

11186
    virCheckNetworkReturn(network, -1);
11187
    conn = network->conn;
11188

11189
    virCheckReadOnlyGoto(conn->flags, error);
11190

11191 11192
    if (conn->networkDriver && conn->networkDriver->networkCreate) {
        int ret;
11193
        ret = conn->networkDriver->networkCreate(network);
11194 11195 11196 11197
        if (ret < 0)
            goto error;
        return ret;
    }
11198

11199
    virReportUnsupportedError();
11200

11201
 error:
11202
    virDispatchError(network->conn);
11203
    return -1;
11204 11205
}

11206

11207 11208 11209 11210 11211
/**
 * virNetworkDestroy:
 * @network: a network object
 *
 * Destroy the network object. The running instance is shutdown if not down
11212 11213 11214
 * already and all resources used by it are given back to the hypervisor. This
 * does not free the associated virNetworkPtr object.
 * This function may require privileged access
11215 11216 11217 11218 11219 11220 11221
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNetworkDestroy(virNetworkPtr network)
{
    virConnectPtr conn;
11222
    VIR_DEBUG("network=%p", network);
11223

11224 11225
    virResetLastError();

11226
    virCheckNetworkReturn(network, -1);
11227
    conn = network->conn;
11228

11229
    virCheckReadOnlyGoto(conn->flags, error);
11230

11231 11232
    if (conn->networkDriver && conn->networkDriver->networkDestroy) {
        int ret;
11233
        ret = conn->networkDriver->networkDestroy(network);
11234 11235 11236 11237
        if (ret < 0)
            goto error;
        return ret;
    }
11238

11239
    virReportUnsupportedError();
11240

11241
 error:
11242
    virDispatchError(network->conn);
11243
    return -1;
11244 11245
}

11246

11247 11248 11249 11250 11251 11252 11253 11254 11255 11256 11257 11258
/**
 * virNetworkFree:
 * @network: a network object
 *
 * Free the network object. The running instance is kept alive.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNetworkFree(virNetworkPtr network)
{
11259
    VIR_DEBUG("network=%p", network);
11260

11261 11262
    virResetLastError();

11263 11264
    virCheckNetworkReturn(network, -1);

11265
    virObjectUnref(network);
11266
    return 0;
11267 11268
}

11269

11270 11271
/**
 * virNetworkRef:
D
Daniel Veillard 已提交
11272
 * @network: the network to hold a reference on
11273 11274 11275 11276 11277 11278 11279 11280 11281 11282 11283
 *
 * Increment the reference count on the network. For each
 * additional call to this method, there shall be a corresponding
 * call to virNetworkFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a network would increment
 * the reference count.
D
Daniel Veillard 已提交
11284 11285
 *
 * Returns 0 in case of success, -1 in case of failure.
11286 11287 11288 11289
 */
int
virNetworkRef(virNetworkPtr network)
{
11290 11291 11292
    VIR_DEBUG("network=%p refs=%d", network,
              network ? network->object.u.s.refs : 0);

11293 11294
    virResetLastError();

11295 11296
    virCheckNetworkReturn(network, -1);

11297
    virObjectRef(network);
11298 11299 11300
    return 0;
}

11301

11302 11303 11304 11305 11306 11307 11308 11309 11310 11311 11312 11313
/**
 * virNetworkGetName:
 * @network: a network object
 *
 * Get the public name for that network
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the network object.
 */
const char *
virNetworkGetName(virNetworkPtr network)
{
11314
    VIR_DEBUG("network=%p", network);
11315

11316 11317
    virResetLastError();

11318 11319
    virCheckNetworkReturn(network, NULL);

11320
    return network->name;
11321 11322
}

11323

11324 11325 11326 11327 11328 11329 11330 11331 11332 11333 11334 11335
/**
 * virNetworkGetUUID:
 * @network: a network object
 * @uuid: pointer to a VIR_UUID_BUFLEN bytes array
 *
 * Get the UUID for a network
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkGetUUID(virNetworkPtr network, unsigned char *uuid)
{
11336
    VIR_DEBUG("network=%p, uuid=%p", network, uuid);
11337

11338 11339
    virResetLastError();

11340
    virCheckNetworkReturn(network, -1);
11341
    virCheckNonNullArgGoto(uuid, error);
11342 11343 11344

    memcpy(uuid, &network->uuid[0], VIR_UUID_BUFLEN);

11345
    return 0;
11346

11347
 error:
11348
    virDispatchError(network->conn);
11349
    return -1;
11350 11351
}

11352

11353 11354 11355 11356 11357 11358 11359 11360 11361 11362 11363 11364 11365
/**
 * virNetworkGetUUIDString:
 * @network: a network object
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
 *
 * Get the UUID for a network as string. For more information about
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkGetUUIDString(virNetworkPtr network, char *buf)
{
11366
    VIR_DEBUG("network=%p, buf=%p", network, buf);
11367

11368 11369
    virResetLastError();

11370
    virCheckNetworkReturn(network, -1);
11371
    virCheckNonNullArgGoto(buf, error);
11372

E
Eric Blake 已提交
11373
    virUUIDFormat(network->uuid, buf);
11374
    return 0;
11375

11376
 error:
11377
    virDispatchError(network->conn);
11378
    return -1;
11379 11380
}

11381

11382 11383 11384
/**
 * virNetworkGetXMLDesc:
 * @network: a network object
11385
 * @flags: bitwise-OR of virNetworkXMLFlags
11386 11387 11388 11389
 *
 * Provide an XML description of the network. The description may be reused
 * later to relaunch the network with virNetworkCreateXML().
 *
11390 11391 11392 11393 11394
 * Normally, if a network included a physical function, the output includes
 * all virtual functions tied to that physical interface.  If @flags includes
 * VIR_NETWORK_XML_INACTIVE, then the expansion of virtual interfaces is
 * not performed.
 *
11395 11396 11397 11398
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
11399
virNetworkGetXMLDesc(virNetworkPtr network, unsigned int flags)
11400
{
11401
    virConnectPtr conn;
11402
    VIR_DEBUG("network=%p, flags=%x", network, flags);
11403

11404 11405
    virResetLastError();

11406
    virCheckNetworkReturn(network, NULL);
11407 11408
    conn = network->conn;

11409
    if (conn->networkDriver && conn->networkDriver->networkGetXMLDesc) {
11410
        char *ret;
11411
        ret = conn->networkDriver->networkGetXMLDesc(network, flags);
11412 11413 11414 11415
        if (!ret)
            goto error;
        return ret;
    }
11416

11417
    virReportUnsupportedError();
11418

11419
 error:
11420
    virDispatchError(network->conn);
11421
    return NULL;
11422
}
11423

11424

11425 11426 11427 11428
/**
 * virNetworkGetBridgeName:
 * @network: a network object
 *
11429
 * Provides a bridge interface name to which a domain may connect
11430 11431 11432 11433 11434 11435 11436 11437
 * a network interface in order to join the network.
 *
 * Returns a 0 terminated interface name, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
virNetworkGetBridgeName(virNetworkPtr network)
{
11438
    virConnectPtr conn;
11439
    VIR_DEBUG("network=%p", network);
11440

11441 11442
    virResetLastError();

11443
    virCheckNetworkReturn(network, NULL);
11444 11445
    conn = network->conn;

11446 11447
    if (conn->networkDriver && conn->networkDriver->networkGetBridgeName) {
        char *ret;
11448
        ret = conn->networkDriver->networkGetBridgeName(network);
11449 11450 11451 11452
        if (!ret)
            goto error;
        return ret;
    }
11453

11454
    virReportUnsupportedError();
11455

11456
 error:
11457
    virDispatchError(network->conn);
11458
    return NULL;
11459
}
11460

11461

11462 11463 11464
/**
 * virNetworkGetAutostart:
 * @network: a network object
11465
 * @autostart: the value returned
11466
 *
11467
 * Provides a boolean value indicating whether the network
11468 11469 11470 11471 11472 11473 11474
 * configured to be automatically started when the host
 * machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkGetAutostart(virNetworkPtr network,
11475 11476 11477
                       int *autostart)
{
    virConnectPtr conn;
11478
    VIR_DEBUG("network=%p, autostart=%p", network, autostart);
11479

11480 11481
    virResetLastError();

11482
    virCheckNetworkReturn(network, -1);
11483
    virCheckNonNullArgGoto(autostart, error);
11484

11485 11486
    conn = network->conn;

11487 11488
    if (conn->networkDriver && conn->networkDriver->networkGetAutostart) {
        int ret;
11489
        ret = conn->networkDriver->networkGetAutostart(network, autostart);
11490 11491 11492 11493
        if (ret < 0)
            goto error;
        return ret;
    }
11494

11495
    virReportUnsupportedError();
11496

11497
 error:
11498
    virDispatchError(network->conn);
11499
    return -1;
11500 11501
}

11502

11503 11504 11505
/**
 * virNetworkSetAutostart:
 * @network: a network object
11506
 * @autostart: whether the network should be automatically started 0 or 1
11507 11508 11509 11510 11511 11512 11513 11514
 *
 * Configure the network to be automatically started
 * when the host machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkSetAutostart(virNetworkPtr network,
11515 11516 11517
                       int autostart)
{
    virConnectPtr conn;
11518
    VIR_DEBUG("network=%p, autostart=%d", network, autostart);
11519

11520 11521
    virResetLastError();

11522
    virCheckNetworkReturn(network, -1);
11523 11524
    conn = network->conn;

11525 11526
    virCheckReadOnlyGoto(conn->flags, error);

11527 11528
    if (conn->networkDriver && conn->networkDriver->networkSetAutostart) {
        int ret;
11529
        ret = conn->networkDriver->networkSetAutostart(network, autostart);
11530 11531 11532 11533
        if (ret < 0)
            goto error;
        return ret;
    }
11534

11535
    virReportUnsupportedError();
11536

11537
 error:
11538
    virDispatchError(network->conn);
11539
    return -1;
11540
}
11541

11542

D
Daniel Veillard 已提交
11543 11544
/**
 * virInterfaceGetConnect:
L
Laine Stump 已提交
11545
 * @iface: pointer to an interface
D
Daniel Veillard 已提交
11546 11547 11548 11549 11550 11551 11552 11553 11554 11555 11556 11557
 *
 * Provides the connection pointer associated with an interface.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the interface object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
11558
virInterfaceGetConnect(virInterfacePtr iface)
D
Daniel Veillard 已提交
11559
{
11560
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11561 11562 11563

    virResetLastError();

11564 11565
    virCheckInterfaceReturn(iface, NULL);

11566
    return iface->conn;
D
Daniel Veillard 已提交
11567 11568
}

11569

11570 11571 11572 11573 11574 11575 11576 11577 11578 11579 11580 11581 11582 11583 11584 11585 11586 11587 11588 11589 11590 11591 11592 11593 11594 11595 11596 11597 11598 11599 11600 11601 11602 11603 11604 11605 11606 11607 11608
/**
 * virConnectListAllInterfaces:
 * @conn: Pointer to the hypervisor connection.
 * @ifaces: Pointer to a variable to store the array containing the interface
 *          objects or NULL if the list is not required (just returns number
 *          of interfaces).
 * @flags: bitwise-OR of virConnectListAllInterfacesFlags.
 *
 * Collect the list of interfaces, and allocate an array to store those
 * objects. This API solves the race inherent between virConnectListInterfaces
 * and virConnectListDefinedInterfaces.
 *
 * Normally, all interfaces are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted interfaces.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a interface, and where all bits
 * within a group describe all possible interfaces.
 *
 * The only group of @flags is VIR_CONNECT_LIST_INTERFACES_ACTIVE (up) and
 * VIR_CONNECT_LIST_INTERFACES_INACTIVE (down) to filter the interfaces by state.
 *
 * Returns the number of interfaces found or -1 and sets @ifaces to  NULL in case
 * of error.  On success, the array stored into @ifaces is guaranteed to have an
 * extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virStorageInterfaceFree() on each array element, then calling free() on @ifaces.
 */
int
virConnectListAllInterfaces(virConnectPtr conn,
                            virInterfacePtr **ifaces,
                            unsigned int flags)
{
    VIR_DEBUG("conn=%p, ifaces=%p, flags=%x", conn, ifaces, flags);

    virResetLastError();

    if (ifaces)
        *ifaces = NULL;

11609
    virCheckConnectReturn(conn, -1);
11610 11611

    if (conn->interfaceDriver &&
11612
        conn->interfaceDriver->connectListAllInterfaces) {
11613
        int ret;
11614
        ret = conn->interfaceDriver->connectListAllInterfaces(conn, ifaces, flags);
11615 11616 11617 11618 11619
        if (ret < 0)
            goto error;
        return ret;
    }

11620
    virReportUnsupportedError();
11621

11622
 error:
11623 11624 11625 11626
    virDispatchError(conn);
    return -1;
}

11627

D
Daniel Veillard 已提交
11628 11629 11630 11631
/**
 * virConnectNumOfInterfaces:
 * @conn: pointer to the hypervisor connection
 *
11632
 * Provides the number of active interfaces on the physical host.
D
Daniel Veillard 已提交
11633
 *
11634
 * Returns the number of active interfaces found or -1 in case of error
D
Daniel Veillard 已提交
11635 11636 11637 11638
 */
int
virConnectNumOfInterfaces(virConnectPtr conn)
{
11639
    VIR_DEBUG("conn=%p", conn);
D
Daniel Veillard 已提交
11640 11641 11642

    virResetLastError();

11643
    virCheckConnectReturn(conn, -1);
D
Daniel Veillard 已提交
11644

11645
    if (conn->interfaceDriver && conn->interfaceDriver->connectNumOfInterfaces) {
D
Daniel Veillard 已提交
11646
        int ret;
11647
        ret = conn->interfaceDriver->connectNumOfInterfaces(conn);
D
Daniel Veillard 已提交
11648 11649 11650 11651 11652
        if (ret < 0)
            goto error;
        return ret;
    }

11653
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11654

11655
 error:
11656
    virDispatchError(conn);
D
Daniel Veillard 已提交
11657 11658 11659
    return -1;
}

11660

D
Daniel Veillard 已提交
11661 11662 11663 11664 11665 11666
/**
 * virConnectListInterfaces:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of interfaces
 * @maxnames: size of @names
 *
11667 11668
 * Collect the list of active physical host interfaces,
 * and store their names in @names
D
Daniel Veillard 已提交
11669
 *
11670 11671 11672 11673 11674 11675
 * For more control over the results, see virConnectListAllInterfaces().
 *
 * Returns the number of interfaces found or -1 in case of error.  Note that
 * this command is inherently racy; a interface can be started between a call
 * to virConnectNumOfInterfaces() and this call; you are only guaranteed that
 * all currently active interfaces were listed if the return is less than
J
John Ferlan 已提交
11676
 * @maxnames. The client must call free() on each returned name.
D
Daniel Veillard 已提交
11677 11678 11679 11680
 */
int
virConnectListInterfaces(virConnectPtr conn, char **const names, int maxnames)
{
11681
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
D
Daniel Veillard 已提交
11682 11683 11684

    virResetLastError();

11685
    virCheckConnectReturn(conn, -1);
11686 11687
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
D
Daniel Veillard 已提交
11688

11689
    if (conn->interfaceDriver && conn->interfaceDriver->connectListInterfaces) {
D
Daniel Veillard 已提交
11690
        int ret;
11691
        ret = conn->interfaceDriver->connectListInterfaces(conn, names, maxnames);
D
Daniel Veillard 已提交
11692 11693 11694 11695 11696
        if (ret < 0)
            goto error;
        return ret;
    }

11697
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11698

11699
 error:
11700
    virDispatchError(conn);
D
Daniel Veillard 已提交
11701 11702 11703
    return -1;
}

11704

11705 11706 11707 11708 11709 11710 11711 11712 11713 11714 11715
/**
 * virConnectNumOfDefinedInterfaces:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of defined (inactive) interfaces on the physical host.
 *
 * Returns the number of defined interface found or -1 in case of error
 */
int
virConnectNumOfDefinedInterfaces(virConnectPtr conn)
{
11716
    VIR_DEBUG("conn=%p", conn);
11717 11718 11719

    virResetLastError();

11720
    virCheckConnectReturn(conn, -1);
11721

11722
    if (conn->interfaceDriver && conn->interfaceDriver->connectNumOfDefinedInterfaces) {
11723
        int ret;
11724
        ret = conn->interfaceDriver->connectNumOfDefinedInterfaces(conn);
11725 11726 11727 11728 11729
        if (ret < 0)
            goto error;
        return ret;
    }

11730
    virReportUnsupportedError();
11731

11732
 error:
11733
    virDispatchError(conn);
11734 11735 11736
    return -1;
}

11737

11738 11739 11740 11741 11742 11743 11744 11745 11746
/**
 * virConnectListDefinedInterfaces:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of interfaces
 * @maxnames: size of @names
 *
 * Collect the list of defined (inactive) physical host interfaces,
 * and store their names in @names.
 *
11747 11748 11749 11750 11751 11752 11753
 * For more control over the results, see virConnectListAllInterfaces().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a interface can be defined between
 * a call to virConnectNumOfDefinedInterfaces() and this call; you are only
 * guaranteed that all currently defined interfaces were listed if the return
 * is less than @maxnames.  The client must call free() on each returned name.
11754 11755 11756 11757 11758 11759
 */
int
virConnectListDefinedInterfaces(virConnectPtr conn,
                                char **const names,
                                int maxnames)
{
11760
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
11761 11762 11763

    virResetLastError();

11764
    virCheckConnectReturn(conn, -1);
11765 11766
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
11767

11768
    if (conn->interfaceDriver && conn->interfaceDriver->connectListDefinedInterfaces) {
11769
        int ret;
11770
        ret = conn->interfaceDriver->connectListDefinedInterfaces(conn, names, maxnames);
11771 11772 11773 11774 11775
        if (ret < 0)
            goto error;
        return ret;
    }

11776
    virReportUnsupportedError();
11777

11778
 error:
11779
    virDispatchError(conn);
11780 11781 11782
    return -1;
}

11783

D
Daniel Veillard 已提交
11784 11785 11786 11787 11788 11789 11790 11791 11792 11793 11794 11795 11796
/**
 * virInterfaceLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the interface
 *
 * Try to lookup an interface on the given hypervisor based on its name.
 *
 * Returns a new interface object or NULL in case of failure.  If the
 * interface cannot be found, then VIR_ERR_NO_INTERFACE error is raised.
 */
virInterfacePtr
virInterfaceLookupByName(virConnectPtr conn, const char *name)
{
11797
    VIR_DEBUG("conn=%p, name=%s", conn, name);
D
Daniel Veillard 已提交
11798 11799 11800

    virResetLastError();

11801
    virCheckConnectReturn(conn, NULL);
11802
    virCheckNonNullArgGoto(name, error);
D
Daniel Veillard 已提交
11803 11804 11805

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceLookupByName) {
        virInterfacePtr ret;
11806
        ret = conn->interfaceDriver->interfaceLookupByName(conn, name);
D
Daniel Veillard 已提交
11807 11808 11809 11810 11811
        if (!ret)
            goto error;
        return ret;
    }

11812
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11813

11814
 error:
11815
    virDispatchError(conn);
D
Daniel Veillard 已提交
11816 11817 11818
    return NULL;
}

11819

D
Daniel Veillard 已提交
11820 11821 11822 11823 11824 11825 11826 11827 11828 11829 11830 11831 11832
/**
 * virInterfaceLookupByMACString:
 * @conn: pointer to the hypervisor connection
 * @macstr: the MAC for the interface (null-terminated ASCII format)
 *
 * Try to lookup an interface on the given hypervisor based on its MAC.
 *
 * Returns a new interface object or NULL in case of failure.  If the
 * interface cannot be found, then VIR_ERR_NO_INTERFACE error is raised.
 */
virInterfacePtr
virInterfaceLookupByMACString(virConnectPtr conn, const char *macstr)
{
11833
    VIR_DEBUG("conn=%p, macstr=%s", conn, macstr);
D
Daniel Veillard 已提交
11834 11835 11836

    virResetLastError();

11837
    virCheckConnectReturn(conn, NULL);
11838
    virCheckNonNullArgGoto(macstr, error);
D
Daniel Veillard 已提交
11839 11840 11841

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceLookupByMACString) {
        virInterfacePtr ret;
11842
        ret = conn->interfaceDriver->interfaceLookupByMACString(conn, macstr);
D
Daniel Veillard 已提交
11843 11844 11845 11846 11847
        if (!ret)
            goto error;
        return ret;
    }

11848
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11849

11850
 error:
11851
    virDispatchError(conn);
D
Daniel Veillard 已提交
11852 11853 11854
    return NULL;
}

11855

D
Daniel Veillard 已提交
11856 11857
/**
 * virInterfaceGetName:
L
Laine Stump 已提交
11858
 * @iface: an interface object
D
Daniel Veillard 已提交
11859 11860 11861 11862 11863 11864 11865
 *
 * Get the public name for that interface
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the interface object.
 */
const char *
11866
virInterfaceGetName(virInterfacePtr iface)
D
Daniel Veillard 已提交
11867
{
11868
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11869 11870 11871

    virResetLastError();

11872 11873
    virCheckInterfaceReturn(iface, NULL);

11874
    return iface->name;
D
Daniel Veillard 已提交
11875 11876
}

11877

D
Daniel Veillard 已提交
11878 11879
/**
 * virInterfaceGetMACString:
L
Laine Stump 已提交
11880
 * @iface: an interface object
D
Daniel Veillard 已提交
11881
 *
L
Laine Stump 已提交
11882
 * Get the MAC for an interface as string. For more information about
D
Daniel Veillard 已提交
11883 11884 11885 11886 11887 11888 11889
 * MAC see RFC4122.
 *
 * Returns a pointer to the MAC address (in null-terminated ASCII
 * format) or NULL, the string need not be deallocated its lifetime
 * will be the same as the interface object.
 */
const char *
11890
virInterfaceGetMACString(virInterfacePtr iface)
D
Daniel Veillard 已提交
11891
{
11892
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11893 11894 11895

    virResetLastError();

11896 11897
    virCheckInterfaceReturn(iface, NULL);

11898
    return iface->mac;
D
Daniel Veillard 已提交
11899 11900
}

11901

D
Daniel Veillard 已提交
11902 11903
/**
 * virInterfaceGetXMLDesc:
L
Laine Stump 已提交
11904
 * @iface: an interface object
11905
 * @flags: bitwise-OR of extraction flags. Current valid bits:
11906 11907 11908 11909
 *
 *      VIR_INTERFACE_XML_INACTIVE - return the static configuration,
 *                                   suitable for use redefining the
 *                                   interface via virInterfaceDefineXML()
D
Daniel Veillard 已提交
11910
 *
11911 11912 11913 11914 11915
 * Provide an XML description of the interface. If
 * VIR_INTERFACE_XML_INACTIVE is set, the description may be reused
 * later to redefine the interface with virInterfaceDefineXML(). If it
 * is not set, the ip address and netmask will be the current live
 * setting of the interface, not the settings from the config files.
D
Daniel Veillard 已提交
11916 11917 11918 11919 11920
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
11921
virInterfaceGetXMLDesc(virInterfacePtr iface, unsigned int flags)
D
Daniel Veillard 已提交
11922 11923
{
    virConnectPtr conn;
11924
    VIR_DEBUG("iface=%p, flags=%x", iface, flags);
D
Daniel Veillard 已提交
11925 11926 11927

    virResetLastError();

11928
    virCheckInterfaceReturn(iface, NULL);
11929
    conn = iface->conn;
D
Daniel Veillard 已提交
11930 11931 11932

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceGetXMLDesc) {
        char *ret;
11933
        ret = conn->interfaceDriver->interfaceGetXMLDesc(iface, flags);
D
Daniel Veillard 已提交
11934 11935 11936 11937 11938
        if (!ret)
            goto error;
        return ret;
    }

11939
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11940

11941
 error:
11942
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
11943 11944 11945
    return NULL;
}

11946

D
Daniel Veillard 已提交
11947 11948 11949 11950
/**
 * virInterfaceDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xml: the XML description for the interface, preferably in UTF-8
11951
 * @flags: extra flags; not used yet, so callers should always pass 0
D
Daniel Veillard 已提交
11952
 *
11953 11954 11955 11956 11957 11958 11959 11960 11961 11962 11963
 * Define an interface (or modify existing interface configuration).
 *
 * Normally this change in the interface configuration is immediately
 * permanent/persistent, but if virInterfaceChangeBegin() has been
 * previously called (i.e. if an interface config transaction is
 * open), the new interface definition will only become permanent if
 * virInterfaceChangeCommit() is called prior to the next reboot of
 * the system running libvirtd. Prior to that time, it can be
 * explicitly removed using virInterfaceChangeRollback(), or will be
 * automatically removed during the next reboot of the system running
 * libvirtd.
D
Daniel Veillard 已提交
11964 11965 11966 11967 11968 11969
 *
 * Returns NULL in case of error, a pointer to the interface otherwise
 */
virInterfacePtr
virInterfaceDefineXML(virConnectPtr conn, const char *xml, unsigned int flags)
{
11970
    VIR_DEBUG("conn=%p, xml=%s, flags=%x", conn, xml, flags);
D
Daniel Veillard 已提交
11971 11972 11973

    virResetLastError();

11974
    virCheckConnectReturn(conn, NULL);
11975
    virCheckReadOnlyGoto(conn->flags, error);
11976
    virCheckNonNullArgGoto(xml, error);
D
Daniel Veillard 已提交
11977 11978 11979

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceDefineXML) {
        virInterfacePtr ret;
11980
        ret = conn->interfaceDriver->interfaceDefineXML(conn, xml, flags);
D
Daniel Veillard 已提交
11981 11982 11983 11984 11985
        if (!ret)
            goto error;
        return ret;
    }

11986
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11987

11988
 error:
11989
    virDispatchError(conn);
D
Daniel Veillard 已提交
11990 11991 11992
    return NULL;
}

11993

D
Daniel Veillard 已提交
11994 11995
/**
 * virInterfaceUndefine:
11996
 * @iface: pointer to a defined interface
D
Daniel Veillard 已提交
11997 11998 11999 12000
 *
 * Undefine an interface, ie remove it from the config.
 * This does not free the associated virInterfacePtr object.
 *
12001 12002 12003 12004 12005 12006 12007 12008 12009 12010
 * Normally this change in the interface configuration is
 * permanent/persistent, but if virInterfaceChangeBegin() has been
 * previously called (i.e. if an interface config transaction is
 * open), the removal of the interface definition will only become
 * permanent if virInterfaceChangeCommit() is called prior to the next
 * reboot of the system running libvirtd. Prior to that time, the
 * definition can be explicitly restored using
 * virInterfaceChangeRollback(), or will be automatically restored
 * during the next reboot of the system running libvirtd.
 *
D
Daniel Veillard 已提交
12011 12012 12013
 * Returns 0 in case of success, -1 in case of error
 */
int
12014 12015
virInterfaceUndefine(virInterfacePtr iface)
{
D
Daniel Veillard 已提交
12016
    virConnectPtr conn;
12017
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
12018 12019 12020

    virResetLastError();

12021
    virCheckInterfaceReturn(iface, -1);
12022
    conn = iface->conn;
12023

12024
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
12025 12026 12027

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceUndefine) {
        int ret;
12028
        ret = conn->interfaceDriver->interfaceUndefine(iface);
D
Daniel Veillard 已提交
12029 12030 12031 12032 12033
        if (ret < 0)
            goto error;
        return ret;
    }

12034
    virReportUnsupportedError();
D
Daniel Veillard 已提交
12035

12036
 error:
12037
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
12038 12039 12040
    return -1;
}

12041

D
Daniel Veillard 已提交
12042 12043
/**
 * virInterfaceCreate:
12044
 * @iface: pointer to a defined interface
12045
 * @flags: extra flags; not used yet, so callers should always pass 0
D
Daniel Veillard 已提交
12046
 *
12047
 * Activate an interface (i.e. call "ifup").
D
Daniel Veillard 已提交
12048
 *
12049 12050 12051 12052
 * If there was an open network config transaction at the time this
 * interface was defined (that is, if virInterfaceChangeBegin() had
 * been called), the interface will be brought back down (and then
 * undefined) if virInterfaceChangeRollback() is called.
W
Wangyufei (A) 已提交
12053
 *
D
Daniel Veillard 已提交
12054 12055 12056
 * Returns 0 in case of success, -1 in case of error
 */
int
12057
virInterfaceCreate(virInterfacePtr iface, unsigned int flags)
D
Daniel Veillard 已提交
12058 12059
{
    virConnectPtr conn;
12060
    VIR_DEBUG("iface=%p, flags=%x", iface, flags);
D
Daniel Veillard 已提交
12061 12062 12063

    virResetLastError();

12064
    virCheckInterfaceReturn(iface, -1);
12065
    conn = iface->conn;
12066

12067
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
12068 12069 12070

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceCreate) {
        int ret;
12071
        ret = conn->interfaceDriver->interfaceCreate(iface, flags);
D
Daniel Veillard 已提交
12072 12073 12074 12075 12076
        if (ret < 0)
            goto error;
        return ret;
    }

12077
    virReportUnsupportedError();
D
Daniel Veillard 已提交
12078

12079
 error:
12080
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
12081 12082 12083
    return -1;
}

12084

D
Daniel Veillard 已提交
12085 12086
/**
 * virInterfaceDestroy:
12087
 * @iface: an interface object
12088
 * @flags: extra flags; not used yet, so callers should always pass 0
D
Daniel Veillard 已提交
12089 12090 12091 12092 12093
 *
 * deactivate an interface (ie call "ifdown")
 * This does not remove the interface from the config, and
 * does not free the associated virInterfacePtr object.
 *
12094 12095 12096 12097 12098 12099 12100

 * If there is an open network config transaction at the time this
 * interface is destroyed (that is, if virInterfaceChangeBegin() had
 * been called), and if the interface is later undefined and then
 * virInterfaceChangeRollback() is called, the restoral of the
 * interface definition will also bring the interface back up.
 *
D
Daniel Veillard 已提交
12101 12102 12103
 * Returns 0 in case of success and -1 in case of failure.
 */
int
12104
virInterfaceDestroy(virInterfacePtr iface, unsigned int flags)
D
Daniel Veillard 已提交
12105 12106
{
    virConnectPtr conn;
12107
    VIR_DEBUG("iface=%p, flags=%x", iface, flags);
D
Daniel Veillard 已提交
12108 12109 12110

    virResetLastError();

12111
    virCheckInterfaceReturn(iface, -1);
12112
    conn = iface->conn;
12113

12114
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
12115 12116 12117

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceDestroy) {
        int ret;
12118
        ret = conn->interfaceDriver->interfaceDestroy(iface, flags);
D
Daniel Veillard 已提交
12119 12120 12121 12122 12123
        if (ret < 0)
            goto error;
        return ret;
    }

12124
    virReportUnsupportedError();
D
Daniel Veillard 已提交
12125

12126
 error:
12127
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
12128 12129 12130
    return -1;
}

12131

D
Daniel Veillard 已提交
12132 12133
/**
 * virInterfaceRef:
12134
 * @iface: the interface to hold a reference on
D
Daniel Veillard 已提交
12135 12136 12137 12138 12139 12140 12141 12142 12143
 *
 * Increment the reference count on the interface. For each
 * additional call to this method, there shall be a corresponding
 * call to virInterfaceFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
L
Laine Stump 已提交
12144
 * it. ie, each new thread using an interface would increment
D
Daniel Veillard 已提交
12145 12146 12147 12148 12149
 * the reference count.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
12150
virInterfaceRef(virInterfacePtr iface)
D
Daniel Veillard 已提交
12151
{
12152 12153
    VIR_DEBUG("iface=%p refs=%d", iface, iface ? iface->object.u.s.refs : 0);

12154 12155
    virResetLastError();

12156 12157
    virCheckInterfaceReturn(iface, -1);

12158
    virObjectRef(iface);
D
Daniel Veillard 已提交
12159 12160 12161
    return 0;
}

12162

D
Daniel Veillard 已提交
12163 12164
/**
 * virInterfaceFree:
L
Laine Stump 已提交
12165
 * @iface: an interface object
D
Daniel Veillard 已提交
12166 12167 12168 12169 12170 12171 12172
 *
 * Free the interface object. The interface itself is unaltered.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
12173
virInterfaceFree(virInterfacePtr iface)
D
Daniel Veillard 已提交
12174
{
12175
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
12176 12177 12178

    virResetLastError();

12179 12180
    virCheckInterfaceReturn(iface, -1);

12181
    virObjectUnref(iface);
12182
    return 0;
D
Daniel Veillard 已提交
12183 12184
}

12185

12186 12187 12188
/**
 * virInterfaceChangeBegin:
 * @conn: pointer to hypervisor connection
12189
 * @flags: extra flags; not used yet, so callers should always pass 0
12190
 *
Y
Yuri Chornoivan 已提交
12191
 * This function creates a restore point to which one can return
12192 12193
 * later by calling virInterfaceChangeRollback(). This function should
 * be called before any transaction with interface configuration.
Y
Yuri Chornoivan 已提交
12194
 * Once it is known that a new configuration works, it can be committed via
12195 12196 12197 12198 12199 12200 12201 12202 12203 12204 12205
 * virInterfaceChangeCommit(), which frees the restore point.
 *
 * If virInterfaceChangeBegin() is called when a transaction is
 * already opened, this function will fail, and a
 * VIR_ERR_INVALID_OPERATION will be logged.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virInterfaceChangeBegin(virConnectPtr conn, unsigned int flags)
{
12206
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
12207 12208 12209

    virResetLastError();

12210
    virCheckConnectReturn(conn, -1);
12211
    virCheckReadOnlyGoto(conn->flags, error);
12212 12213 12214 12215 12216 12217 12218 12219 12220

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceChangeBegin) {
        int ret;
        ret = conn->interfaceDriver->interfaceChangeBegin(conn, flags);
        if (ret < 0)
           goto error;
        return ret;
    }

12221
    virReportUnsupportedError();
12222

12223
 error:
12224 12225 12226 12227
    virDispatchError(conn);
    return -1;
}

12228

12229 12230 12231
/**
 * virInterfaceChangeCommit:
 * @conn: pointer to hypervisor connection
12232
 * @flags: extra flags; not used yet, so callers should always pass 0
12233 12234 12235 12236 12237 12238 12239 12240 12241 12242 12243 12244 12245
 *
 * This commits the changes made to interfaces and frees the restore point
 * created by virInterfaceChangeBegin().
 *
 * If virInterfaceChangeCommit() is called when a transaction is not
 * opened, this function will fail, and a VIR_ERR_INVALID_OPERATION
 * will be logged.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virInterfaceChangeCommit(virConnectPtr conn, unsigned int flags)
{
12246
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
12247 12248 12249

    virResetLastError();

12250
    virCheckConnectReturn(conn, -1);
12251
    virCheckReadOnlyGoto(conn->flags, error);
12252 12253 12254 12255 12256 12257 12258 12259 12260

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceChangeCommit) {
        int ret;
        ret = conn->interfaceDriver->interfaceChangeCommit(conn, flags);
        if (ret < 0)
           goto error;
        return ret;
    }

12261
    virReportUnsupportedError();
12262

12263
 error:
12264 12265 12266 12267
    virDispatchError(conn);
    return -1;
}

12268

12269 12270 12271
/**
 * virInterfaceChangeRollback:
 * @conn: pointer to hypervisor connection
12272
 * @flags: extra flags; not used yet, so callers should always pass 0
12273 12274 12275 12276 12277 12278 12279 12280 12281 12282 12283 12284 12285
 *
 * This cancels changes made to interfaces settings by restoring previous
 * state created by virInterfaceChangeBegin().
 *
 * If virInterfaceChangeRollback() is called when a transaction is not
 * opened, this function will fail, and a VIR_ERR_INVALID_OPERATION
 * will be logged.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virInterfaceChangeRollback(virConnectPtr conn, unsigned int flags)
{
12286
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
12287 12288 12289

    virResetLastError();

12290
    virCheckConnectReturn(conn, -1);
12291
    virCheckReadOnlyGoto(conn->flags, error);
12292 12293 12294 12295 12296 12297 12298 12299 12300 12301

    if (conn->interfaceDriver &&
        conn->interfaceDriver->interfaceChangeRollback) {
        int ret;
        ret = conn->interfaceDriver->interfaceChangeRollback(conn, flags);
        if (ret < 0)
           goto error;
        return ret;
    }

12302
    virReportUnsupportedError();
12303

12304
 error:
12305 12306 12307 12308
    virDispatchError(conn);
    return -1;
}

12309 12310 12311

/**
 * virStoragePoolGetConnect:
12312
 * @pool: pointer to a pool
12313 12314 12315 12316 12317 12318 12319 12320 12321 12322 12323 12324
 *
 * Provides the connection pointer associated with a storage pool.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the pool object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
12325
virStoragePoolGetConnect(virStoragePoolPtr pool)
12326
{
12327
    VIR_DEBUG("pool=%p", pool);
12328

12329 12330
    virResetLastError();

12331 12332
    virCheckStoragePoolReturn(pool, NULL);

12333 12334 12335
    return pool->conn;
}

12336

12337 12338 12339 12340 12341 12342 12343 12344 12345 12346 12347 12348 12349 12350 12351 12352 12353 12354 12355 12356 12357 12358 12359 12360 12361 12362 12363 12364 12365 12366 12367 12368 12369 12370 12371 12372 12373 12374 12375 12376 12377 12378 12379 12380 12381 12382 12383 12384 12385 12386 12387 12388 12389 12390 12391 12392 12393 12394 12395 12396 12397 12398
/**
 * virConnectListAllStoragePools:
 * @conn: Pointer to the hypervisor connection.
 * @pools: Pointer to a variable to store the array containing storage pool
 *         objects or NULL if the list is not required (just returns number
 *         of pools).
 * @flags: bitwise-OR of virConnectListAllStoragePoolsFlags.
 *
 * Collect the list of storage pools, and allocate an array to store those
 * objects. This API solves the race inherent between
 * virConnectListStoragePools and virConnectListDefinedStoragePools.
 *
 * Normally, all storage pools are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted pools.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a pool, and where all bits
 * within a group describe all possible pools.
 *
 * The first group of @flags is VIR_CONNECT_LIST_STORAGE_POOLS_ACTIVE (online)
 * and VIR_CONNECT_LIST_STORAGE_POOLS_INACTIVE (offline) to filter the pools
 * by state.
 *
 * The second group of @flags is VIR_CONNECT_LIST_STORAGE_POOLS_PERSITENT
 * (defined) and VIR_CONNECT_LIST_STORAGE_POOLS_TRANSIENT (running but not
 * defined), to filter the pools by whether they have persistent config or not.
 *
 * The third group of @flags is VIR_CONNECT_LIST_STORAGE_POOLS_AUTOSTART
 * and VIR_CONNECT_LIST_STORAGE_POOLS_NO_AUTOSTART, to filter the pools by
 * whether they are marked as autostart or not.
 *
 * The last group of @flags is provided to filter the pools by the types,
 * the flags include:
 * VIR_CONNECT_LIST_STORAGE_POOLS_DIR
 * VIR_CONNECT_LIST_STORAGE_POOLS_FS
 * VIR_CONNECT_LIST_STORAGE_POOLS_NETFS
 * VIR_CONNECT_LIST_STORAGE_POOLS_LOGICAL
 * VIR_CONNECT_LIST_STORAGE_POOLS_DISK
 * VIR_CONNECT_LIST_STORAGE_POOLS_ISCSI
 * VIR_CONNECT_LIST_STORAGE_POOLS_SCSI
 * VIR_CONNECT_LIST_STORAGE_POOLS_MPATH
 * VIR_CONNECT_LIST_STORAGE_POOLS_RBD
 * VIR_CONNECT_LIST_STORAGE_POOLS_SHEEPDOG
 *
 * Returns the number of storage pools found or -1 and sets @pools to
 * NULL in case of error.  On success, the array stored into @pools is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virStoragePoolFree() on each array element, then calling
 * free() on @pools.
 */
int
virConnectListAllStoragePools(virConnectPtr conn,
                              virStoragePoolPtr **pools,
                              unsigned int flags)
{
    VIR_DEBUG("conn=%p, pools=%p, flags=%x", conn, pools, flags);

    virResetLastError();

    if (pools)
        *pools = NULL;

12399
    virCheckConnectReturn(conn, -1);
12400 12401

    if (conn->storageDriver &&
12402
        conn->storageDriver->connectListAllStoragePools) {
12403
        int ret;
12404
        ret = conn->storageDriver->connectListAllStoragePools(conn, pools, flags);
12405 12406 12407 12408 12409
        if (ret < 0)
            goto error;
        return ret;
    }

12410
    virReportUnsupportedError();
12411

12412
 error:
12413 12414 12415 12416
    virDispatchError(conn);
    return -1;
}

12417

12418 12419 12420 12421 12422 12423 12424 12425 12426
/**
 * virConnectNumOfStoragePools:
 * @conn: pointer to hypervisor connection
 *
 * Provides the number of active storage pools
 *
 * Returns the number of pools found, or -1 on error
 */
int
O
Osier Yang 已提交
12427
virConnectNumOfStoragePools(virConnectPtr conn)
12428
{
12429
    VIR_DEBUG("conn=%p", conn);
12430

12431 12432
    virResetLastError();

12433
    virCheckConnectReturn(conn, -1);
12434

12435
    if (conn->storageDriver && conn->storageDriver->connectNumOfStoragePools) {
12436
        int ret;
12437
        ret = conn->storageDriver->connectNumOfStoragePools(conn);
12438 12439 12440 12441
        if (ret < 0)
            goto error;
        return ret;
    }
12442

12443
    virReportUnsupportedError();
12444

12445
 error:
12446
    virDispatchError(conn);
12447 12448 12449
    return -1;
}

12450

12451 12452 12453 12454 12455 12456
/**
 * virConnectListStoragePools:
 * @conn: pointer to hypervisor connection
 * @names: array of char * to fill with pool names (allocated by caller)
 * @maxnames: size of the names array
 *
12457 12458 12459 12460 12461
 * Provides the list of names of active storage pools up to maxnames.
 * If there are more than maxnames, the remaining names will be silently
 * ignored.
 *
 * For more control over the results, see virConnectListAllStoragePools().
12462
 *
12463 12464 12465 12466
 * Returns the number of pools found or -1 in case of error.  Note that
 * this command is inherently racy; a pool can be started between a call to
 * virConnectNumOfStoragePools() and this call; you are only guaranteed
 * that all currently active pools were listed if the return is less than
J
John Ferlan 已提交
12467
 * @maxnames. The client must call free() on each returned name.
12468 12469
 */
int
O
Osier Yang 已提交
12470 12471 12472
virConnectListStoragePools(virConnectPtr conn,
                           char **const names,
                           int maxnames)
12473
{
12474
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
12475

12476 12477
    virResetLastError();

12478
    virCheckConnectReturn(conn, -1);
12479 12480
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
12481

12482
    if (conn->storageDriver && conn->storageDriver->connectListStoragePools) {
12483
        int ret;
12484
        ret = conn->storageDriver->connectListStoragePools(conn, names, maxnames);
12485 12486 12487 12488
        if (ret < 0)
            goto error;
        return ret;
    }
12489

12490
    virReportUnsupportedError();
12491

12492
 error:
12493
    virDispatchError(conn);
12494
    return -1;
12495 12496 12497 12498 12499 12500 12501 12502 12503 12504 12505 12506 12507 12508
}


/**
 * virConnectNumOfDefinedStoragePools:
 * @conn: pointer to hypervisor connection
 *
 * Provides the number of inactive storage pools
 *
 * Returns the number of pools found, or -1 on error
 */
int
virConnectNumOfDefinedStoragePools(virConnectPtr conn)
{
12509
    VIR_DEBUG("conn=%p", conn);
12510

12511 12512
    virResetLastError();

12513
    virCheckConnectReturn(conn, -1);
12514

12515
    if (conn->storageDriver && conn->storageDriver->connectNumOfDefinedStoragePools) {
12516
        int ret;
12517
        ret = conn->storageDriver->connectNumOfDefinedStoragePools(conn);
12518 12519 12520 12521
        if (ret < 0)
            goto error;
        return ret;
    }
12522

12523
    virReportUnsupportedError();
12524

12525
 error:
12526
    virDispatchError(conn);
12527 12528 12529 12530 12531 12532 12533 12534 12535 12536
    return -1;
}


/**
 * virConnectListDefinedStoragePools:
 * @conn: pointer to hypervisor connection
 * @names: array of char * to fill with pool names (allocated by caller)
 * @maxnames: size of the names array
 *
12537 12538 12539
 * Provides the list of names of inactive storage pools up to maxnames.
 * If there are more than maxnames, the remaining names will be silently
 * ignored.
12540
 *
12541 12542 12543 12544 12545 12546 12547
 * For more control over the results, see virConnectListAllStoragePools().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a pool can be defined between
 * a call to virConnectNumOfDefinedStoragePools() and this call; you are only
 * guaranteed that all currently defined pools were listed if the return
 * is less than @maxnames.  The client must call free() on each returned name.
12548 12549 12550 12551 12552 12553
 */
int
virConnectListDefinedStoragePools(virConnectPtr conn,
                                  char **const names,
                                  int maxnames)
{
12554
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
12555

12556 12557
    virResetLastError();

12558
    virCheckConnectReturn(conn, -1);
12559 12560
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
12561

12562
    if (conn->storageDriver && conn->storageDriver->connectListDefinedStoragePools) {
12563
        int ret;
12564
        ret = conn->storageDriver->connectListDefinedStoragePools(conn, names, maxnames);
12565 12566 12567 12568
        if (ret < 0)
            goto error;
        return ret;
    }
12569

12570
    virReportUnsupportedError();
12571

12572
 error:
12573
    virDispatchError(conn);
12574 12575 12576 12577
    return -1;
}


12578 12579 12580 12581 12582
/**
 * virConnectFindStoragePoolSources:
 * @conn: pointer to hypervisor connection
 * @type: type of storage pool sources to discover
 * @srcSpec: XML document specifying discovery source
12583
 * @flags: extra flags; not used yet, so callers should always pass 0
12584 12585 12586 12587 12588 12589 12590 12591 12592 12593 12594 12595 12596 12597 12598 12599 12600 12601 12602 12603 12604
 *
 * Talks to a storage backend and attempts to auto-discover the set of
 * available storage pool sources. e.g. For iSCSI this would be a set of
 * iSCSI targets. For NFS this would be a list of exported paths.  The
 * srcSpec (optional for some storage pool types, e.g. local ones) is
 * an instance of the storage pool's source element specifying where
 * to look for the pools.
 *
 * srcSpec is not required for some types (e.g., those querying
 * local storage resources only)
 *
 * Returns an xml document consisting of a SourceList element
 * containing a source document appropriate to the given pool
 * type for each discovered source.
 */
char *
virConnectFindStoragePoolSources(virConnectPtr conn,
                                 const char *type,
                                 const char *srcSpec,
                                 unsigned int flags)
{
12605
    VIR_DEBUG("conn=%p, type=%s, src=%s, flags=%x",
O
Osier Yang 已提交
12606
              conn, NULLSTR(type), NULLSTR(srcSpec), flags);
12607 12608 12609

    virResetLastError();

12610
    virCheckConnectReturn(conn, NULL);
12611
    virCheckNonNullArgGoto(type, error);
12612
    virCheckReadOnlyGoto(conn->flags, error);
12613

12614
    if (conn->storageDriver && conn->storageDriver->connectFindStoragePoolSources) {
12615
        char *ret;
12616
        ret = conn->storageDriver->connectFindStoragePoolSources(conn, type, srcSpec, flags);
12617 12618 12619 12620
        if (!ret)
            goto error;
        return ret;
    }
12621

12622
    virReportUnsupportedError();
12623

12624
 error:
12625
    virDispatchError(conn);
12626 12627 12628 12629
    return NULL;
}


12630 12631 12632 12633 12634 12635 12636 12637 12638 12639 12640 12641 12642
/**
 * virStoragePoolLookupByName:
 * @conn: pointer to hypervisor connection
 * @name: name of pool to fetch
 *
 * Fetch a storage pool based on its unique name
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByName(virConnectPtr conn,
                           const char *name)
{
12643
    VIR_DEBUG("conn=%p, name=%s", conn, name);
12644

12645 12646
    virResetLastError();

12647
    virCheckConnectReturn(conn, NULL);
12648
    virCheckNonNullArgGoto(name, error);
12649

12650
    if (conn->storageDriver && conn->storageDriver->storagePoolLookupByName) {
12651
        virStoragePoolPtr ret;
12652
        ret = conn->storageDriver->storagePoolLookupByName(conn, name);
12653 12654 12655 12656
        if (!ret)
            goto error;
        return ret;
    }
12657

12658
    virReportUnsupportedError();
12659

12660
 error:
12661
    virDispatchError(conn);
12662 12663 12664 12665 12666 12667 12668 12669 12670 12671 12672 12673 12674 12675 12676 12677 12678
    return NULL;
}


/**
 * virStoragePoolLookupByUUID:
 * @conn: pointer to hypervisor connection
 * @uuid: globally unique id of pool to fetch
 *
 * Fetch a storage pool based on its globally unique id
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByUUID(virConnectPtr conn,
                           const unsigned char *uuid)
{
12679
    VIR_UUID_DEBUG(conn, uuid);
12680

12681 12682
    virResetLastError();

12683
    virCheckConnectReturn(conn, NULL);
12684
    virCheckNonNullArgGoto(uuid, error);
12685

12686
    if (conn->storageDriver && conn->storageDriver->storagePoolLookupByUUID) {
12687
        virStoragePoolPtr ret;
12688
        ret = conn->storageDriver->storagePoolLookupByUUID(conn, uuid);
12689 12690 12691 12692
        if (!ret)
            goto error;
        return ret;
    }
12693

12694
    virReportUnsupportedError();
12695

12696
 error:
12697
    virDispatchError(conn);
12698
    return NULL;
12699 12700 12701 12702 12703 12704 12705 12706 12707 12708 12709 12710 12711 12712
}


/**
 * virStoragePoolLookupByUUIDString:
 * @conn: pointer to hypervisor connection
 * @uuidstr: globally unique id of pool to fetch
 *
 * Fetch a storage pool based on its globally unique id
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByUUIDString(virConnectPtr conn,
12713
                                 const char *uuidstr)
12714 12715
{
    unsigned char uuid[VIR_UUID_BUFLEN];
12716
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
12717

12718 12719
    virResetLastError();

12720
    virCheckConnectReturn(conn, NULL);
12721
    virCheckNonNullArgGoto(uuidstr, error);
12722 12723

    if (virUUIDParse(uuidstr, uuid) < 0) {
12724 12725 12726
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
12727
        goto error;
12728 12729 12730
    }

    return virStoragePoolLookupByUUID(conn, uuid);
12731

12732
 error:
12733
    virDispatchError(conn);
12734
    return NULL;
12735 12736 12737 12738 12739 12740 12741 12742 12743 12744 12745 12746 12747 12748
}


/**
 * virStoragePoolLookupByVolume:
 * @vol: pointer to storage volume
 *
 * Fetch a storage pool which contains a particular volume
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByVolume(virStorageVolPtr vol)
{
12749
    VIR_DEBUG("vol=%p", vol);
12750

12751 12752
    virResetLastError();

12753
    virCheckStorageVolReturn(vol, NULL);
12754

12755
    if (vol->conn->storageDriver && vol->conn->storageDriver->storagePoolLookupByVolume) {
12756
        virStoragePoolPtr ret;
12757
        ret = vol->conn->storageDriver->storagePoolLookupByVolume(vol);
12758 12759 12760 12761
        if (!ret)
            goto error;
        return ret;
    }
12762

12763
    virReportUnsupportedError();
12764

12765
 error:
12766
    virDispatchError(vol->conn);
12767
    return NULL;
12768 12769
}

12770

12771 12772 12773 12774
/**
 * virStoragePoolCreateXML:
 * @conn: pointer to hypervisor connection
 * @xmlDesc: XML description for new pool
12775
 * @flags: extra flags; not used yet, so callers should always pass 0
12776 12777
 *
 * Create a new storage based on its XML description. The
D
Daniel Veillard 已提交
12778
 * pool is not persistent, so its definition will disappear
12779 12780 12781 12782 12783 12784 12785 12786 12787
 * when it is destroyed, or if the host is restarted
 *
 * Returns a virStoragePoolPtr object, or NULL if creation failed
 */
virStoragePoolPtr
virStoragePoolCreateXML(virConnectPtr conn,
                        const char *xmlDesc,
                        unsigned int flags)
{
E
Eric Blake 已提交
12788
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
12789

12790 12791
    virResetLastError();

12792
    virCheckConnectReturn(conn, NULL);
12793
    virCheckNonNullArgGoto(xmlDesc, error);
12794
    virCheckReadOnlyGoto(conn->flags, error);
12795

12796
    if (conn->storageDriver && conn->storageDriver->storagePoolCreateXML) {
12797
        virStoragePoolPtr ret;
12798
        ret = conn->storageDriver->storagePoolCreateXML(conn, xmlDesc, flags);
12799 12800 12801 12802
        if (!ret)
            goto error;
        return ret;
    }
12803

12804
    virReportUnsupportedError();
12805

12806
 error:
12807
    virDispatchError(conn);
12808 12809 12810
    return NULL;
}

12811

12812 12813 12814 12815
/**
 * virStoragePoolDefineXML:
 * @conn: pointer to hypervisor connection
 * @xml: XML description for new pool
12816
 * @flags: extra flags; not used yet, so callers should always pass 0
12817 12818
 *
 * Define a new inactive storage pool based on its XML description. The
D
Daniel Veillard 已提交
12819
 * pool is persistent, until explicitly undefined.
12820 12821 12822 12823 12824 12825 12826 12827
 *
 * Returns a virStoragePoolPtr object, or NULL if creation failed
 */
virStoragePoolPtr
virStoragePoolDefineXML(virConnectPtr conn,
                        const char *xml,
                        unsigned int flags)
{
E
Eric Blake 已提交
12828
    VIR_DEBUG("conn=%p, xml=%s, flags=%x", conn, xml, flags);
12829

12830 12831
    virResetLastError();

12832
    virCheckConnectReturn(conn, NULL);
12833
    virCheckReadOnlyGoto(conn->flags, error);
12834
    virCheckNonNullArgGoto(xml, error);
12835

12836
    if (conn->storageDriver && conn->storageDriver->storagePoolDefineXML) {
12837
        virStoragePoolPtr ret;
12838
        ret = conn->storageDriver->storagePoolDefineXML(conn, xml, flags);
12839 12840 12841 12842
        if (!ret)
            goto error;
        return ret;
    }
12843

12844
    virReportUnsupportedError();
12845

12846
 error:
12847
    virDispatchError(conn);
12848
    return NULL;
12849 12850
}

12851

12852 12853 12854
/**
 * virStoragePoolBuild:
 * @pool: pointer to storage pool
12855
 * @flags: bitwise-OR of virStoragePoolBuildFlags
O
Osier Yang 已提交
12856 12857 12858
 *
 * Currently only filesystem pool accepts flags VIR_STORAGE_POOL_BUILD_OVERWRITE
 * and VIR_STORAGE_POOL_BUILD_NO_OVERWRITE.
12859 12860 12861 12862 12863 12864 12865 12866 12867 12868
 *
 * Build the underlying storage pool
 *
 * Returns 0 on success, or -1 upon failure
 */
int
virStoragePoolBuild(virStoragePoolPtr pool,
                    unsigned int flags)
{
    virConnectPtr conn;
12869
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
12870

12871 12872
    virResetLastError();

12873
    virCheckStoragePoolReturn(pool, -1);
12874
    conn = pool->conn;
12875

12876
    virCheckReadOnlyGoto(conn->flags, error);
12877

12878
    if (conn->storageDriver && conn->storageDriver->storagePoolBuild) {
12879
        int ret;
12880
        ret = conn->storageDriver->storagePoolBuild(pool, flags);
12881 12882 12883 12884
        if (ret < 0)
            goto error;
        return ret;
    }
12885

12886
    virReportUnsupportedError();
12887

12888
 error:
12889
    virDispatchError(pool->conn);
12890
    return -1;
12891 12892 12893 12894 12895 12896 12897 12898 12899
}


/**
 * virStoragePoolUndefine:
 * @pool: pointer to storage pool
 *
 * Undefine an inactive storage pool
 *
12900
 * Returns 0 on success, -1 on failure
12901 12902 12903 12904 12905
 */
int
virStoragePoolUndefine(virStoragePoolPtr pool)
{
    virConnectPtr conn;
12906
    VIR_DEBUG("pool=%p", pool);
12907

12908 12909
    virResetLastError();

12910
    virCheckStoragePoolReturn(pool, -1);
12911
    conn = pool->conn;
12912

12913
    virCheckReadOnlyGoto(conn->flags, error);
12914

12915
    if (conn->storageDriver && conn->storageDriver->storagePoolUndefine) {
12916
        int ret;
12917
        ret = conn->storageDriver->storagePoolUndefine(pool);
12918 12919 12920 12921
        if (ret < 0)
            goto error;
        return ret;
    }
12922

12923
    virReportUnsupportedError();
12924

12925
 error:
12926
    virDispatchError(pool->conn);
12927
    return -1;
12928 12929 12930 12931 12932 12933
}


/**
 * virStoragePoolCreate:
 * @pool: pointer to storage pool
12934
 * @flags: extra flags; not used yet, so callers should always pass 0
12935 12936 12937 12938 12939 12940 12941 12942 12943 12944
 *
 * Starts an inactive storage pool
 *
 * Returns 0 on success, or -1 if it could not be started
 */
int
virStoragePoolCreate(virStoragePoolPtr pool,
                     unsigned int flags)
{
    virConnectPtr conn;
E
Eric Blake 已提交
12945
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
12946

12947 12948
    virResetLastError();

12949
    virCheckStoragePoolReturn(pool, -1);
12950
    conn = pool->conn;
12951

12952
    virCheckReadOnlyGoto(conn->flags, error);
12953

12954
    if (conn->storageDriver && conn->storageDriver->storagePoolCreate) {
12955
        int ret;
12956
        ret = conn->storageDriver->storagePoolCreate(pool, flags);
12957 12958 12959 12960
        if (ret < 0)
            goto error;
        return ret;
    }
12961

12962
    virReportUnsupportedError();
12963

12964
 error:
12965
    virDispatchError(pool->conn);
12966
    return -1;
12967 12968 12969 12970 12971 12972 12973 12974 12975 12976 12977 12978 12979 12980 12981 12982 12983 12984 12985
}


/**
 * virStoragePoolDestroy:
 * @pool: pointer to storage pool
 *
 * Destroy an active storage pool. This will deactivate the
 * pool on the host, but keep any persistent config associated
 * with it. If it has a persistent config it can later be
 * restarted with virStoragePoolCreate(). This does not free
 * the associated virStoragePoolPtr object.
 *
 * Returns 0 on success, or -1 if it could not be destroyed
 */
int
virStoragePoolDestroy(virStoragePoolPtr pool)
{
    virConnectPtr conn;
12986
    VIR_DEBUG("pool=%p", pool);
12987

12988 12989
    virResetLastError();

12990
    virCheckStoragePoolReturn(pool, -1);
12991
    conn = pool->conn;
12992

12993
    virCheckReadOnlyGoto(conn->flags, error);
12994

12995
    if (conn->storageDriver && conn->storageDriver->storagePoolDestroy) {
12996
        int ret;
12997
        ret = conn->storageDriver->storagePoolDestroy(pool);
12998 12999 13000 13001
        if (ret < 0)
            goto error;
        return ret;
    }
13002

13003
    virReportUnsupportedError();
13004

13005
 error:
13006
    virDispatchError(pool->conn);
13007 13008 13009
    return -1;
}

13010

13011 13012 13013
/**
 * virStoragePoolDelete:
 * @pool: pointer to storage pool
13014
 * @flags: bitwise-OR of virStoragePoolDeleteFlags
13015 13016 13017 13018 13019 13020 13021 13022 13023 13024 13025 13026
 *
 * Delete the underlying pool resources. This is
 * a non-recoverable operation. The virStoragePoolPtr object
 * itself is not free'd.
 *
 * Returns 0 on success, or -1 if it could not be obliterate
 */
int
virStoragePoolDelete(virStoragePoolPtr pool,
                     unsigned int flags)
{
    virConnectPtr conn;
13027
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
13028

13029 13030
    virResetLastError();

13031
    virCheckStoragePoolReturn(pool, -1);
13032
    conn = pool->conn;
13033

13034
    virCheckReadOnlyGoto(conn->flags, error);
13035

13036
    if (conn->storageDriver && conn->storageDriver->storagePoolDelete) {
13037
        int ret;
13038
        ret = conn->storageDriver->storagePoolDelete(pool, flags);
13039 13040 13041 13042
        if (ret < 0)
            goto error;
        return ret;
    }
13043

13044
    virReportUnsupportedError();
13045

13046
 error:
13047
    virDispatchError(pool->conn);
13048 13049 13050 13051 13052 13053 13054 13055 13056 13057 13058 13059 13060 13061 13062 13063
    return -1;
}


/**
 * virStoragePoolFree:
 * @pool: pointer to storage pool
 *
 * Free a storage pool object, releasing all memory associated with
 * it. Does not change the state of the pool on the host.
 *
 * Returns 0 on success, or -1 if it could not be free'd.
 */
int
virStoragePoolFree(virStoragePoolPtr pool)
{
13064
    VIR_DEBUG("pool=%p", pool);
13065

13066 13067
    virResetLastError();

13068 13069
    virCheckStoragePoolReturn(pool, -1);

13070
    virObjectUnref(pool);
13071
    return 0;
13072 13073 13074 13075

}


13076 13077
/**
 * virStoragePoolRef:
D
Daniel Veillard 已提交
13078
 * @pool: the pool to hold a reference on
13079 13080 13081 13082 13083 13084 13085 13086 13087 13088 13089
 *
 * Increment the reference count on the pool. For each
 * additional call to this method, there shall be a corresponding
 * call to virStoragePoolFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a pool would increment
 * the reference count.
D
Daniel Veillard 已提交
13090 13091
 *
 * Returns 0 in case of success, -1 in case of failure.
13092 13093 13094 13095
 */
int
virStoragePoolRef(virStoragePoolPtr pool)
{
13096 13097
    VIR_DEBUG("pool=%p refs=%d", pool, pool ? pool->object.u.s.refs : 0);

13098 13099
    virResetLastError();

13100 13101
    virCheckStoragePoolReturn(pool, -1);

13102
    virObjectRef(pool);
13103 13104 13105
    return 0;
}

13106

13107 13108 13109
/**
 * virStoragePoolRefresh:
 * @pool: pointer to storage pool
13110
 * @flags: extra flags; not used yet, so callers should always pass 0
13111 13112 13113 13114 13115
 *
 * Request that the pool refresh its list of volumes. This may
 * involve communicating with a remote server, and/or initializing
 * new devices at the OS layer
 *
13116
 * Returns 0 if the volume list was refreshed, -1 on failure
13117 13118 13119 13120 13121 13122
 */
int
virStoragePoolRefresh(virStoragePoolPtr pool,
                      unsigned int flags)
{
    virConnectPtr conn;
E
Eric Blake 已提交
13123
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
13124

13125 13126
    virResetLastError();

13127
    virCheckStoragePoolReturn(pool, -1);
13128
    conn = pool->conn;
13129

13130
    virCheckReadOnlyGoto(conn->flags, error);
13131

13132
    if (conn->storageDriver && conn->storageDriver->storagePoolRefresh) {
13133
        int ret;
13134
        ret = conn->storageDriver->storagePoolRefresh(pool, flags);
13135 13136 13137 13138
        if (ret < 0)
            goto error;
        return ret;
    }
13139

13140
    virReportUnsupportedError();
13141

13142
 error:
13143
    virDispatchError(pool->conn);
13144 13145 13146 13147 13148 13149 13150 13151 13152 13153
    return -1;
}


/**
 * virStoragePoolGetName:
 * @pool: pointer to storage pool
 *
 * Fetch the locally unique name of the storage pool
 *
13154
 * Returns the name of the pool, or NULL on error
13155 13156 13157 13158
 */
const char*
virStoragePoolGetName(virStoragePoolPtr pool)
{
13159
    VIR_DEBUG("pool=%p", pool);
13160

13161 13162
    virResetLastError();

13163 13164
    virCheckStoragePoolReturn(pool, NULL);

13165
    return pool->name;
13166 13167 13168 13169 13170 13171 13172 13173 13174 13175
}


/**
 * virStoragePoolGetUUID:
 * @pool: pointer to storage pool
 * @uuid: buffer of VIR_UUID_BUFLEN bytes in size
 *
 * Fetch the globally unique ID of the storage pool
 *
13176
 * Returns 0 on success, or -1 on error;
13177 13178 13179 13180 13181
 */
int
virStoragePoolGetUUID(virStoragePoolPtr pool,
                      unsigned char *uuid)
{
13182
    VIR_DEBUG("pool=%p, uuid=%p", pool, uuid);
13183

13184 13185
    virResetLastError();

13186
    virCheckStoragePoolReturn(pool, -1);
13187
    virCheckNonNullArgGoto(uuid, error);
13188 13189 13190

    memcpy(uuid, &pool->uuid[0], VIR_UUID_BUFLEN);

13191
    return 0;
13192

13193
 error:
13194
    virDispatchError(pool->conn);
13195
    return -1;
13196 13197
}

13198

13199 13200 13201 13202 13203 13204 13205
/**
 * virStoragePoolGetUUIDString:
 * @pool: pointer to storage pool
 * @buf: buffer of VIR_UUID_STRING_BUFLEN bytes in size
 *
 * Fetch the globally unique ID of the storage pool as a string
 *
13206
 * Returns 0 on success, or -1 on error;
13207 13208 13209 13210 13211
 */
int
virStoragePoolGetUUIDString(virStoragePoolPtr pool,
                            char *buf)
{
13212
    VIR_DEBUG("pool=%p, buf=%p", pool, buf);
13213

13214 13215
    virResetLastError();

13216
    virCheckStoragePoolReturn(pool, -1);
13217
    virCheckNonNullArgGoto(buf, error);
13218

E
Eric Blake 已提交
13219
    virUUIDFormat(pool->uuid, buf);
13220
    return 0;
13221

13222
 error:
13223
    virDispatchError(pool->conn);
13224
    return -1;
13225 13226 13227 13228 13229 13230 13231 13232 13233 13234 13235
}


/**
 * virStoragePoolGetInfo:
 * @pool: pointer to storage pool
 * @info: pointer at which to store info
 *
 * Get volatile information about the storage pool
 * such as free space / usage summary
 *
13236
 * Returns 0 on success, or -1 on failure.
13237 13238 13239 13240 13241 13242
 */
int
virStoragePoolGetInfo(virStoragePoolPtr pool,
                      virStoragePoolInfoPtr info)
{
    virConnectPtr conn;
13243
    VIR_DEBUG("pool=%p, info=%p", pool, info);
13244

13245 13246
    virResetLastError();

13247 13248 13249
    if (info)
        memset(info, 0, sizeof(*info));

13250
    virCheckStoragePoolReturn(pool, -1);
13251
    virCheckNonNullArgGoto(info, error);
13252 13253 13254

    conn = pool->conn;

13255
    if (conn->storageDriver->storagePoolGetInfo) {
13256
        int ret;
13257
        ret = conn->storageDriver->storagePoolGetInfo(pool, info);
13258 13259 13260 13261
        if (ret < 0)
            goto error;
        return ret;
    }
13262

13263
    virReportUnsupportedError();
13264

13265
 error:
13266
    virDispatchError(pool->conn);
13267
    return -1;
13268 13269 13270 13271 13272 13273
}


/**
 * virStoragePoolGetXMLDesc:
 * @pool: pointer to storage pool
13274
 * @flags: bitwise-OR of virStorageXMLFlags
13275 13276 13277 13278 13279
 *
 * Fetch an XML document describing all aspects of the
 * storage pool. This is suitable for later feeding back
 * into the virStoragePoolCreateXML method.
 *
13280
 * Returns a XML document, or NULL on error
13281 13282 13283 13284 13285 13286
 */
char *
virStoragePoolGetXMLDesc(virStoragePoolPtr pool,
                         unsigned int flags)
{
    virConnectPtr conn;
13287
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
13288

13289 13290
    virResetLastError();

13291
    virCheckStoragePoolReturn(pool, NULL);
13292 13293
    conn = pool->conn;

13294
    if (conn->storageDriver && conn->storageDriver->storagePoolGetXMLDesc) {
13295
        char *ret;
13296
        ret = conn->storageDriver->storagePoolGetXMLDesc(pool, flags);
13297 13298 13299 13300
        if (!ret)
            goto error;
        return ret;
    }
13301

13302
    virReportUnsupportedError();
13303

13304
 error:
13305
    virDispatchError(pool->conn);
13306
    return NULL;
13307 13308 13309 13310 13311 13312 13313 13314 13315 13316 13317
}


/**
 * virStoragePoolGetAutostart:
 * @pool: pointer to storage pool
 * @autostart: location in which to store autostart flag
 *
 * Fetches the value of the autostart flag, which determines
 * whether the pool is automatically started at boot time
 *
13318
 * Returns 0 on success, -1 on failure
13319 13320 13321 13322 13323 13324
 */
int
virStoragePoolGetAutostart(virStoragePoolPtr pool,
                           int *autostart)
{
    virConnectPtr conn;
13325
    VIR_DEBUG("pool=%p, autostart=%p", pool, autostart);
13326

13327 13328
    virResetLastError();

13329
    virCheckStoragePoolReturn(pool, -1);
13330
    virCheckNonNullArgGoto(autostart, error);
13331 13332 13333

    conn = pool->conn;

13334
    if (conn->storageDriver && conn->storageDriver->storagePoolGetAutostart) {
13335
        int ret;
13336
        ret = conn->storageDriver->storagePoolGetAutostart(pool, autostart);
13337 13338 13339 13340
        if (ret < 0)
            goto error;
        return ret;
    }
13341

13342
    virReportUnsupportedError();
13343

13344
 error:
13345
    virDispatchError(pool->conn);
13346 13347 13348 13349 13350 13351 13352 13353 13354 13355 13356
    return -1;
}


/**
 * virStoragePoolSetAutostart:
 * @pool: pointer to storage pool
 * @autostart: new flag setting
 *
 * Sets the autostart flag
 *
13357
 * Returns 0 on success, -1 on failure
13358 13359 13360 13361 13362 13363
 */
int
virStoragePoolSetAutostart(virStoragePoolPtr pool,
                           int autostart)
{
    virConnectPtr conn;
13364
    VIR_DEBUG("pool=%p, autostart=%d", pool, autostart);
13365

13366 13367
    virResetLastError();

13368
    virCheckStoragePoolReturn(pool, -1);
13369 13370
    conn = pool->conn;

13371 13372
    virCheckReadOnlyGoto(conn->flags, error);

13373
    if (conn->storageDriver && conn->storageDriver->storagePoolSetAutostart) {
13374
        int ret;
13375
        ret = conn->storageDriver->storagePoolSetAutostart(pool, autostart);
13376 13377 13378 13379
        if (ret < 0)
            goto error;
        return ret;
    }
13380

13381
    virReportUnsupportedError();
13382

13383
 error:
13384
    virDispatchError(pool->conn);
13385 13386 13387
    return -1;
}

13388

13389 13390 13391 13392 13393 13394 13395 13396 13397 13398 13399 13400 13401 13402 13403 13404 13405 13406 13407 13408 13409 13410 13411 13412 13413 13414 13415
/**
 * virStoragePoolListAllVolumes:
 * @pool: Pointer to storage pool
 * @vols: Pointer to a variable to store the array containing storage volume
 *        objects or NULL if the list is not required (just returns number
 *        of volumes).
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Collect the list of storage volumes, and allocate an array to store those
 * objects.
 *
 * Returns the number of storage volumes found or -1 and sets @vols to
 * NULL in case of error.  On success, the array stored into @vols is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virStorageVolFree() on each array element, then calling
 * free() on @vols.
 */
int
virStoragePoolListAllVolumes(virStoragePoolPtr pool,
                             virStorageVolPtr **vols,
                             unsigned int flags)
{
    VIR_DEBUG("pool=%p, vols=%p, flags=%x", pool, vols, flags);

    virResetLastError();

13416
    virCheckStoragePoolReturn(pool, -1);
13417 13418

    if (pool->conn->storageDriver &&
13419
        pool->conn->storageDriver->storagePoolListAllVolumes) {
13420
        int ret;
13421
        ret = pool->conn->storageDriver->storagePoolListAllVolumes(pool, vols, flags);
13422 13423 13424 13425 13426
        if (ret < 0)
            goto error;
        return ret;
    }

13427
    virReportUnsupportedError();
13428

13429
 error:
13430 13431 13432
    virDispatchError(pool->conn);
    return -1;
}
13433

13434

13435 13436 13437 13438 13439 13440 13441 13442 13443 13444 13445
/**
 * virStoragePoolNumOfVolumes:
 * @pool: pointer to storage pool
 *
 * Fetch the number of storage volumes within a pool
 *
 * Returns the number of storage pools, or -1 on failure
 */
int
virStoragePoolNumOfVolumes(virStoragePoolPtr pool)
{
13446
    VIR_DEBUG("pool=%p", pool);
13447

13448 13449
    virResetLastError();

13450
    virCheckStoragePoolReturn(pool, -1);
13451

13452
    if (pool->conn->storageDriver && pool->conn->storageDriver->storagePoolNumOfVolumes) {
13453
        int ret;
13454
        ret = pool->conn->storageDriver->storagePoolNumOfVolumes(pool);
13455 13456 13457 13458
        if (ret < 0)
            goto error;
        return ret;
    }
13459

13460
    virReportUnsupportedError();
13461

13462
 error:
13463
    virDispatchError(pool->conn);
13464 13465 13466 13467 13468 13469 13470 13471 13472 13473 13474 13475 13476
    return -1;
}


/**
 * virStoragePoolListVolumes:
 * @pool: pointer to storage pool
 * @names: array in which to storage volume names
 * @maxnames: size of names array
 *
 * Fetch list of storage volume names, limiting to
 * at most maxnames.
 *
13477 13478
 * To list the volume objects directly, see virStoragePoolListAllVolumes().
 *
13479 13480 13481 13482 13483 13484 13485
 * Returns the number of names fetched, or -1 on error
 */
int
virStoragePoolListVolumes(virStoragePoolPtr pool,
                          char **const names,
                          int maxnames)
{
13486
    VIR_DEBUG("pool=%p, names=%p, maxnames=%d", pool, names, maxnames);
13487

13488 13489
    virResetLastError();

13490
    virCheckStoragePoolReturn(pool, -1);
13491 13492
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
13493

13494
    if (pool->conn->storageDriver && pool->conn->storageDriver->storagePoolListVolumes) {
13495
        int ret;
13496
        ret = pool->conn->storageDriver->storagePoolListVolumes(pool, names, maxnames);
13497 13498 13499 13500
        if (ret < 0)
            goto error;
        return ret;
    }
13501

13502
    virReportUnsupportedError();
13503

13504
 error:
13505
    virDispatchError(pool->conn);
13506 13507 13508 13509 13510 13511
    return -1;
}


/**
 * virStorageVolGetConnect:
13512
 * @vol: pointer to a pool
13513 13514 13515 13516 13517 13518 13519 13520 13521 13522 13523 13524
 *
 * Provides the connection pointer associated with a storage volume.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the volume object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
13525
virStorageVolGetConnect(virStorageVolPtr vol)
13526
{
13527
    VIR_DEBUG("vol=%p", vol);
13528

13529 13530
    virResetLastError();

13531 13532
    virCheckStorageVolReturn(vol, NULL);

13533 13534 13535 13536 13537 13538 13539 13540 13541 13542 13543 13544
    return vol->conn;
}


/**
 * virStorageVolLookupByName:
 * @pool: pointer to storage pool
 * @name: name of storage volume
 *
 * Fetch a pointer to a storage volume based on its name
 * within a pool
 *
13545
 * Returns a storage volume, or NULL if not found / error
13546 13547 13548 13549 13550
 */
virStorageVolPtr
virStorageVolLookupByName(virStoragePoolPtr pool,
                          const char *name)
{
13551
    VIR_DEBUG("pool=%p, name=%s", pool, name);
13552

13553 13554
    virResetLastError();

13555
    virCheckStoragePoolReturn(pool, NULL);
13556
    virCheckNonNullArgGoto(name, error);
13557

13558
    if (pool->conn->storageDriver && pool->conn->storageDriver->storageVolLookupByName) {
13559
        virStorageVolPtr ret;
13560
        ret = pool->conn->storageDriver->storageVolLookupByName(pool, name);
13561 13562 13563 13564
        if (!ret)
            goto error;
        return ret;
    }
13565

13566
    virReportUnsupportedError();
13567

13568
 error:
13569
    virDispatchError(pool->conn);
13570 13571 13572 13573 13574 13575 13576 13577 13578 13579 13580 13581
    return NULL;
}


/**
 * virStorageVolLookupByKey:
 * @conn: pointer to hypervisor connection
 * @key: globally unique key
 *
 * Fetch a pointer to a storage volume based on its
 * globally unique key
 *
13582
 * Returns a storage volume, or NULL if not found / error
13583 13584 13585 13586 13587
 */
virStorageVolPtr
virStorageVolLookupByKey(virConnectPtr conn,
                         const char *key)
{
13588
    VIR_DEBUG("conn=%p, key=%s", conn, key);
13589

13590 13591
    virResetLastError();

13592
    virCheckConnectReturn(conn, NULL);
13593
    virCheckNonNullArgGoto(key, error);
13594

13595
    if (conn->storageDriver && conn->storageDriver->storageVolLookupByKey) {
13596
        virStorageVolPtr ret;
13597
        ret = conn->storageDriver->storageVolLookupByKey(conn, key);
13598 13599 13600 13601
        if (!ret)
            goto error;
        return ret;
    }
13602

13603
    virReportUnsupportedError();
13604

13605
 error:
13606
    virDispatchError(conn);
13607 13608 13609
    return NULL;
}

13610

13611 13612 13613 13614 13615 13616 13617 13618
/**
 * virStorageVolLookupByPath:
 * @conn: pointer to hypervisor connection
 * @path: locally unique path
 *
 * Fetch a pointer to a storage volume based on its
 * locally (host) unique path
 *
13619
 * Returns a storage volume, or NULL if not found / error
13620 13621 13622 13623 13624
 */
virStorageVolPtr
virStorageVolLookupByPath(virConnectPtr conn,
                          const char *path)
{
13625
    VIR_DEBUG("conn=%p, path=%s", conn, path);
13626

13627 13628
    virResetLastError();

13629
    virCheckConnectReturn(conn, NULL);
13630
    virCheckNonNullArgGoto(path, error);
13631

13632
    if (conn->storageDriver && conn->storageDriver->storageVolLookupByPath) {
13633
        virStorageVolPtr ret;
13634
        ret = conn->storageDriver->storageVolLookupByPath(conn, path);
13635 13636 13637 13638
        if (!ret)
            goto error;
        return ret;
    }
13639

13640
    virReportUnsupportedError();
13641

13642
 error:
13643
    virDispatchError(conn);
13644 13645 13646 13647 13648 13649 13650 13651 13652 13653 13654
    return NULL;
}


/**
 * virStorageVolGetName:
 * @vol: pointer to storage volume
 *
 * Fetch the storage volume name. This is unique
 * within the scope of a pool
 *
13655
 * Returns the volume name, or NULL on error
13656 13657 13658 13659
 */
const char*
virStorageVolGetName(virStorageVolPtr vol)
{
13660
    VIR_DEBUG("vol=%p", vol);
13661

13662 13663
    virResetLastError();

13664 13665
    virCheckStorageVolReturn(vol, NULL);

13666
    return vol->name;
13667 13668 13669 13670 13671 13672 13673 13674
}


/**
 * virStorageVolGetKey:
 * @vol: pointer to storage volume
 *
 * Fetch the storage volume key. This is globally
13675
 * unique, so the same volume will have the same
13676 13677
 * key no matter what host it is accessed from
 *
13678
 * Returns the volume key, or NULL on error
13679 13680 13681 13682
 */
const char*
virStorageVolGetKey(virStorageVolPtr vol)
{
13683
    VIR_DEBUG("vol=%p", vol);
13684

13685 13686
    virResetLastError();

13687 13688
    virCheckStorageVolReturn(vol, NULL);

13689
    return vol->key;
13690 13691 13692 13693 13694 13695
}


/**
 * virStorageVolCreateXML:
 * @pool: pointer to storage pool
E
Eric Blake 已提交
13696
 * @xmlDesc: description of volume to create
13697
 * @flags: bitwise-OR of virStorageVolCreateFlags
13698 13699 13700
 *
 * Create a storage volume within a pool based
 * on an XML description. Not all pools support
13701 13702 13703 13704 13705 13706
 * creation of volumes.
 *
 * Since 1.0.1 VIR_STORAGE_VOL_CREATE_PREALLOC_METADATA
 * in flags can be used to get higher performance with
 * qcow2 image files which don't support full preallocation,
 * by creating a sparse image file with metadata.
13707
 *
13708
 * Returns the storage volume, or NULL on error
13709 13710 13711
 */
virStorageVolPtr
virStorageVolCreateXML(virStoragePoolPtr pool,
E
Eric Blake 已提交
13712
                       const char *xmlDesc,
13713 13714
                       unsigned int flags)
{
E
Eric Blake 已提交
13715
    VIR_DEBUG("pool=%p, xmlDesc=%s, flags=%x", pool, xmlDesc, flags);
13716

13717 13718
    virResetLastError();

13719
    virCheckStoragePoolReturn(pool, NULL);
E
Eric Blake 已提交
13720
    virCheckNonNullArgGoto(xmlDesc, error);
13721
    virCheckReadOnlyGoto(pool->conn->flags, error);
13722

13723
    if (pool->conn->storageDriver && pool->conn->storageDriver->storageVolCreateXML) {
13724
        virStorageVolPtr ret;
13725
        ret = pool->conn->storageDriver->storageVolCreateXML(pool, xmlDesc, flags);
13726 13727 13728 13729
        if (!ret)
            goto error;
        return ret;
    }
13730

13731
    virReportUnsupportedError();
13732

13733
 error:
13734
    virDispatchError(pool->conn);
13735 13736 13737 13738
    return NULL;
}


13739 13740 13741
/**
 * virStorageVolCreateXMLFrom:
 * @pool: pointer to parent pool for the new volume
E
Eric Blake 已提交
13742
 * @xmlDesc: description of volume to create
13743
 * @clonevol: storage volume to use as input
13744
 * @flags: bitwise-OR of virStorageVolCreateFlags
13745 13746 13747 13748 13749 13750
 *
 * Create a storage volume in the parent pool, using the
 * 'clonevol' volume as input. Information for the new
 * volume (name, perms)  are passed via a typical volume
 * XML description.
 *
13751 13752 13753 13754 13755
 * Since 1.0.1 VIR_STORAGE_VOL_CREATE_PREALLOC_METADATA
 * in flags can be used to get higher performance with
 * qcow2 image files which don't support full preallocation,
 * by creating a sparse image file with metadata.
 *
13756
 * Returns the storage volume, or NULL on error
13757 13758 13759
 */
virStorageVolPtr
virStorageVolCreateXMLFrom(virStoragePoolPtr pool,
E
Eric Blake 已提交
13760
                           const char *xmlDesc,
13761 13762 13763
                           virStorageVolPtr clonevol,
                           unsigned int flags)
{
E
Eric Blake 已提交
13764 13765
    VIR_DEBUG("pool=%p, xmlDesc=%s, clonevol=%p, flags=%x",
              pool, xmlDesc, clonevol, flags);
13766 13767 13768

    virResetLastError();

13769
    virCheckStoragePoolReturn(pool, NULL);
13770
    virCheckStorageVolGoto(clonevol, error);
E
Eric Blake 已提交
13771
    virCheckNonNullArgGoto(xmlDesc, error);
13772
    virCheckReadOnlyGoto(pool->conn->flags | clonevol->conn->flags, error);
13773 13774

    if (pool->conn->storageDriver &&
13775
        pool->conn->storageDriver->storageVolCreateXMLFrom) {
13776
        virStorageVolPtr ret;
13777
        ret = pool->conn->storageDriver->storageVolCreateXMLFrom(pool, xmlDesc,
13778
                                                          clonevol, flags);
13779 13780 13781 13782 13783
        if (!ret)
            goto error;
        return ret;
    }

13784
    virReportUnsupportedError();
13785

13786
 error:
13787
    virDispatchError(pool->conn);
13788 13789 13790 13791
    return NULL;
}


13792 13793 13794 13795 13796 13797
/**
 * virStorageVolDownload:
 * @vol: pointer to volume to download from
 * @stream: stream to use as output
 * @offset: position in @vol to start reading from
 * @length: limit on amount of data to download
13798
 * @flags: extra flags; not used yet, so callers should always pass 0
13799 13800 13801 13802 13803 13804 13805 13806 13807 13808 13809 13810 13811 13812 13813 13814 13815 13816 13817 13818
 *
 * Download the content of the volume as a stream. If @length
 * is zero, then the remaining contents of the volume after
 * @offset will be downloaded.
 *
 * This call sets up an asynchronous stream; subsequent use of
 * stream APIs is necessary to transfer the actual data,
 * determine how much data is successfully transferred, and
 * detect any errors. The results will be unpredictable if
 * another active stream is writing to the storage volume.
 *
 * Returns 0, or -1 upon error.
 */
int
virStorageVolDownload(virStorageVolPtr vol,
                      virStreamPtr stream,
                      unsigned long long offset,
                      unsigned long long length,
                      unsigned int flags)
{
E
Eric Blake 已提交
13819
    VIR_DEBUG("vol=%p, stream=%p, offset=%llu, length=%llu, flags=%x",
13820 13821 13822 13823
              vol, stream, offset, length, flags);

    virResetLastError();

13824
    virCheckStorageVolReturn(vol, -1);
13825 13826
    virCheckStreamGoto(stream, error);
    virCheckReadOnlyGoto(vol->conn->flags, error);
13827

13828 13829 13830 13831 13832
    if (vol->conn != stream->conn) {
        virReportInvalidArg(stream,
                            _("stream in %s must match connection of volume '%s'"),
                            __FUNCTION__, vol->name);
        goto error;
13833 13834 13835
    }

    if (vol->conn->storageDriver &&
13836
        vol->conn->storageDriver->storageVolDownload) {
13837
        int ret;
13838
        ret = vol->conn->storageDriver->storageVolDownload(vol,
O
Osier Yang 已提交
13839 13840 13841 13842
                                                           stream,
                                                           offset,
                                                           length,
                                                           flags);
13843 13844 13845 13846 13847
        if (ret < 0)
            goto error;
        return ret;
    }

13848
    virReportUnsupportedError();
13849

13850
 error:
13851 13852 13853 13854 13855 13856 13857 13858 13859 13860 13861
    virDispatchError(vol->conn);
    return -1;
}


/**
 * virStorageVolUpload:
 * @vol: pointer to volume to upload
 * @stream: stream to use as input
 * @offset: position to start writing to
 * @length: limit on amount of data to upload
13862
 * @flags: extra flags; not used yet, so callers should always pass 0
13863 13864 13865 13866 13867 13868 13869 13870 13871 13872 13873 13874 13875 13876 13877 13878 13879 13880 13881 13882 13883 13884
 *
 * Upload new content to the volume from a stream. This call
 * will fail if @offset + @length exceeds the size of the
 * volume. Otherwise, if @length is non-zero, an error
 * will be raised if an attempt is made to upload greater
 * than @length bytes of data.
 *
 * This call sets up an asynchronous stream; subsequent use of
 * stream APIs is necessary to transfer the actual data,
 * determine how much data is successfully transferred, and
 * detect any errors. The results will be unpredictable if
 * another active stream is writing to the storage volume.
 *
 * Returns 0, or -1 upon error.
 */
int
virStorageVolUpload(virStorageVolPtr vol,
                    virStreamPtr stream,
                    unsigned long long offset,
                    unsigned long long length,
                    unsigned int flags)
{
E
Eric Blake 已提交
13885
    VIR_DEBUG("vol=%p, stream=%p, offset=%llu, length=%llu, flags=%x",
13886 13887 13888 13889
              vol, stream, offset, length, flags);

    virResetLastError();

13890
    virCheckStorageVolReturn(vol, -1);
13891 13892
    virCheckStreamGoto(stream, error);
    virCheckReadOnlyGoto(vol->conn->flags, error);
13893

13894 13895 13896 13897 13898
    if (vol->conn != stream->conn) {
        virReportInvalidArg(stream,
                            _("stream in %s must match connection of volume '%s'"),
                            __FUNCTION__, vol->name);
        goto error;
13899 13900 13901
    }

    if (vol->conn->storageDriver &&
13902
        vol->conn->storageDriver->storageVolUpload) {
13903
        int ret;
13904
        ret = vol->conn->storageDriver->storageVolUpload(vol,
13905 13906 13907 13908 13909 13910 13911 13912 13913
                                                  stream,
                                                  offset,
                                                  length,
                                                  flags);
        if (ret < 0)
            goto error;
        return ret;
    }

13914
    virReportUnsupportedError();
13915

13916
 error:
13917 13918 13919 13920 13921
    virDispatchError(vol->conn);
    return -1;
}


13922 13923 13924
/**
 * virStorageVolDelete:
 * @vol: pointer to storage volume
13925
 * @flags: extra flags; not used yet, so callers should always pass 0
13926 13927 13928
 *
 * Delete the storage volume from the pool
 *
13929
 * Returns 0 on success, or -1 on error
13930 13931 13932 13933 13934 13935
 */
int
virStorageVolDelete(virStorageVolPtr vol,
                    unsigned int flags)
{
    virConnectPtr conn;
13936
    VIR_DEBUG("vol=%p, flags=%x", vol, flags);
13937

13938 13939
    virResetLastError();

13940
    virCheckStorageVolReturn(vol, -1);
13941
    conn = vol->conn;
13942

13943
    virCheckReadOnlyGoto(conn->flags, error);
13944

13945
    if (conn->storageDriver && conn->storageDriver->storageVolDelete) {
13946
        int ret;
13947
        ret = conn->storageDriver->storageVolDelete(vol, flags);
13948 13949 13950 13951
        if (ret < 0)
            goto error;
        return ret;
    }
13952

13953
    virReportUnsupportedError();
13954

13955
 error:
13956
    virDispatchError(vol->conn);
13957 13958 13959 13960
    return -1;
}


13961 13962 13963
/**
 * virStorageVolWipe:
 * @vol: pointer to storage volume
13964
 * @flags: extra flags; not used yet, so callers should always pass 0
13965 13966 13967 13968 13969 13970 13971 13972 13973 13974
 *
 * Ensure data previously on a volume is not accessible to future reads
 *
 * Returns 0 on success, or -1 on error
 */
int
virStorageVolWipe(virStorageVolPtr vol,
                  unsigned int flags)
{
    virConnectPtr conn;
13975
    VIR_DEBUG("vol=%p, flags=%x", vol, flags);
13976 13977 13978

    virResetLastError();

13979
    virCheckStorageVolReturn(vol, -1);
13980
    conn = vol->conn;
13981

13982
    virCheckReadOnlyGoto(conn->flags, error);
13983

13984
    if (conn->storageDriver && conn->storageDriver->storageVolWipe) {
13985
        int ret;
13986
        ret = conn->storageDriver->storageVolWipe(vol, flags);
13987 13988 13989 13990 13991 13992
        if (ret < 0) {
            goto error;
        }
        return ret;
    }

13993
    virReportUnsupportedError();
13994

13995
 error:
13996 13997 13998 13999 14000
    virDispatchError(vol->conn);
    return -1;
}


14001 14002 14003 14004 14005 14006 14007 14008 14009 14010 14011 14012 14013 14014 14015 14016 14017 14018 14019 14020 14021
/**
 * virStorageVolWipePattern:
 * @vol: pointer to storage volume
 * @algorithm: one of virStorageVolWipeAlgorithm
 * @flags: future flags, use 0 for now
 *
 * Similar to virStorageVolWipe, but one can choose
 * between different wiping algorithms.
 *
 * Returns 0 on success, or -1 on error.
 */
int
virStorageVolWipePattern(virStorageVolPtr vol,
                         unsigned int algorithm,
                         unsigned int flags)
{
    virConnectPtr conn;
    VIR_DEBUG("vol=%p, algorithm=%u, flags=%x", vol, algorithm, flags);

    virResetLastError();

14022
    virCheckStorageVolReturn(vol, -1);
14023
    conn = vol->conn;
14024

14025
    virCheckReadOnlyGoto(conn->flags, error);
14026

14027
    if (conn->storageDriver && conn->storageDriver->storageVolWipePattern) {
14028
        int ret;
14029
        ret = conn->storageDriver->storageVolWipePattern(vol, algorithm, flags);
14030 14031 14032 14033 14034 14035
        if (ret < 0) {
            goto error;
        }
        return ret;
    }

14036
    virReportUnsupportedError();
14037

14038
 error:
14039 14040 14041 14042
    virDispatchError(vol->conn);
    return -1;
}

14043

14044 14045 14046 14047 14048
/**
 * virStorageVolFree:
 * @vol: pointer to storage volume
 *
 * Release the storage volume handle. The underlying
14049
 * storage volume continues to exist.
14050
 *
14051
 * Returns 0 on success, or -1 on error
14052 14053 14054 14055
 */
int
virStorageVolFree(virStorageVolPtr vol)
{
14056
    VIR_DEBUG("vol=%p", vol);
14057

14058 14059
    virResetLastError();

14060 14061
    virCheckStorageVolReturn(vol, -1);

14062
    virObjectUnref(vol);
14063
    return 0;
14064 14065 14066
}


14067 14068
/**
 * virStorageVolRef:
D
Daniel Veillard 已提交
14069
 * @vol: the vol to hold a reference on
14070 14071 14072 14073 14074 14075 14076 14077 14078 14079 14080
 *
 * Increment the reference count on the vol. For each
 * additional call to this method, there shall be a corresponding
 * call to virStorageVolFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a vol would increment
 * the reference count.
D
Daniel Veillard 已提交
14081 14082
 *
 * Returns 0 in case of success, -1 in case of failure.
14083 14084 14085 14086
 */
int
virStorageVolRef(virStorageVolPtr vol)
{
14087 14088
    VIR_DEBUG("vol=%p refs=%d", vol, vol ? vol->object.u.s.refs : 0);

14089 14090
    virResetLastError();

14091 14092
    virCheckStorageVolReturn(vol, -1);

14093
    virObjectRef(vol);
14094 14095 14096
    return 0;
}

14097

14098 14099 14100 14101 14102 14103 14104 14105
/**
 * virStorageVolGetInfo:
 * @vol: pointer to storage volume
 * @info: pointer at which to store info
 *
 * Fetches volatile information about the storage
 * volume such as its current allocation
 *
14106
 * Returns 0 on success, or -1 on failure
14107 14108 14109 14110 14111 14112
 */
int
virStorageVolGetInfo(virStorageVolPtr vol,
                     virStorageVolInfoPtr info)
{
    virConnectPtr conn;
14113
    VIR_DEBUG("vol=%p, info=%p", vol, info);
14114

14115 14116
    virResetLastError();

14117 14118 14119
    if (info)
        memset(info, 0, sizeof(*info));

14120
    virCheckStorageVolReturn(vol, -1);
14121
    virCheckNonNullArgGoto(info, error);
14122 14123 14124

    conn = vol->conn;

14125
    if (conn->storageDriver->storageVolGetInfo){
14126
        int ret;
14127
        ret = conn->storageDriver->storageVolGetInfo(vol, info);
14128 14129 14130 14131
        if (ret < 0)
            goto error;
        return ret;
    }
14132

14133
    virReportUnsupportedError();
14134

14135
 error:
14136
    virDispatchError(vol->conn);
14137 14138 14139 14140 14141 14142 14143
    return -1;
}


/**
 * virStorageVolGetXMLDesc:
 * @vol: pointer to storage volume
14144
 * @flags: extra flags; not used yet, so callers should always pass 0
14145 14146 14147 14148
 *
 * Fetch an XML document describing all aspects of
 * the storage volume
 *
14149
 * Returns the XML document, or NULL on error
14150 14151 14152 14153 14154 14155
 */
char *
virStorageVolGetXMLDesc(virStorageVolPtr vol,
                        unsigned int flags)
{
    virConnectPtr conn;
14156
    VIR_DEBUG("vol=%p, flags=%x", vol, flags);
14157

14158 14159
    virResetLastError();

14160
    virCheckStorageVolReturn(vol, NULL);
14161 14162
    conn = vol->conn;

14163
    if (conn->storageDriver && conn->storageDriver->storageVolGetXMLDesc) {
14164
        char *ret;
14165
        ret = conn->storageDriver->storageVolGetXMLDesc(vol, flags);
14166 14167 14168 14169
        if (!ret)
            goto error;
        return ret;
    }
14170

14171
    virReportUnsupportedError();
14172

14173
 error:
14174
    virDispatchError(vol->conn);
14175
    return NULL;
14176 14177 14178 14179 14180 14181 14182 14183 14184 14185 14186 14187 14188
}


/**
 * virStorageVolGetPath:
 * @vol: pointer to storage volume
 *
 * Fetch the storage volume path. Depending on the pool
 * configuration this is either persistent across hosts,
 * or dynamically assigned at pool startup. Consult
 * pool documentation for information on getting the
 * persistent naming
 *
14189 14190
 * Returns the storage volume path, or NULL on error. The
 * caller must free() the returned path after use.
14191 14192 14193 14194 14195
 */
char *
virStorageVolGetPath(virStorageVolPtr vol)
{
    virConnectPtr conn;
14196
    VIR_DEBUG("vol=%p", vol);
14197

14198 14199
    virResetLastError();

14200
    virCheckStorageVolReturn(vol, NULL);
14201 14202
    conn = vol->conn;

14203
    if (conn->storageDriver && conn->storageDriver->storageVolGetPath) {
14204
        char *ret;
14205
        ret = conn->storageDriver->storageVolGetPath(vol);
14206 14207 14208 14209
        if (!ret)
            goto error;
        return ret;
    }
14210

14211
    virReportUnsupportedError();
14212

14213
 error:
14214
    virDispatchError(vol->conn);
14215 14216
    return NULL;
}
14217

14218

14219 14220 14221 14222 14223 14224 14225 14226 14227
/**
 * virStorageVolResize:
 * @vol: pointer to storage volume
 * @capacity: new capacity, in bytes
 * @flags: bitwise-OR of virStorageVolResizeFlags
 *
 * Changes the capacity of the storage volume @vol to @capacity. The
 * operation will fail if the new capacity requires allocation that would
 * exceed the remaining free space in the parent pool.  The contents of
14228 14229
 * the new capacity will appear as all zero bytes. The capacity value will
 * be rounded to the granularity supported by the hypervisor.
14230 14231 14232 14233 14234 14235 14236 14237
 *
 * Normally, the operation will attempt to affect capacity with a minimum
 * impact on allocation (that is, the default operation favors a sparse
 * resize).  If @flags contains VIR_STORAGE_VOL_RESIZE_ALLOCATE, then the
 * operation will ensure that allocation is sufficient for the new
 * capacity; this may make the operation take noticeably longer.
 *
 * Normally, the operation treats @capacity as the new size in bytes;
A
Alex Jia 已提交
14238
 * but if @flags contains VIR_STORAGE_VOL_RESIZE_DELTA, then @capacity
14239 14240 14241 14242 14243
 * represents the size difference to add to the current size.  It is
 * up to the storage pool implementation whether unaligned requests are
 * rounded up to the next valid boundary, or rejected.
 *
 * Normally, this operation should only be used to enlarge capacity;
A
Alex Jia 已提交
14244
 * but if @flags contains VIR_STORAGE_VOL_RESIZE_SHRINK, it is possible to
14245
 * attempt a reduction in capacity even though it might cause data loss.
A
Alex Jia 已提交
14246
 * If VIR_STORAGE_VOL_RESIZE_DELTA is also present, then @capacity is
E
Eric Blake 已提交
14247 14248 14249
 * subtracted from the current size; without it, @capacity represents
 * the absolute new size regardless of whether it is larger or smaller
 * than the current size.
14250 14251 14252 14253 14254
 *
 * Returns 0 on success, or -1 on error.
 */
int
virStorageVolResize(virStorageVolPtr vol,
E
Eric Blake 已提交
14255
                    unsigned long long capacity,
14256 14257 14258
                    unsigned int flags)
{
    virConnectPtr conn;
E
Eric Blake 已提交
14259
    VIR_DEBUG("vol=%p capacity=%llu flags=%x", vol, capacity, flags);
14260 14261 14262

    virResetLastError();

14263
    virCheckStorageVolReturn(vol, -1);
14264 14265
    conn = vol->conn;

14266
    virCheckReadOnlyGoto(conn->flags, error);
14267

E
Eric Blake 已提交
14268 14269 14270
    /* Zero capacity is only valid with either delta or shrink.  */
    if (capacity == 0 && !((flags & VIR_STORAGE_VOL_RESIZE_DELTA) ||
                           (flags & VIR_STORAGE_VOL_RESIZE_SHRINK))) {
14271
        virReportInvalidArg(capacity,
14272 14273
                            _("capacity in %s cannot be zero without 'delta' "
                              "or 'shrink' flags set"),
14274
                            __FUNCTION__);
14275 14276 14277
        goto error;
    }

14278
    if (conn->storageDriver && conn->storageDriver->storageVolResize) {
14279
        int ret;
14280
        ret = conn->storageDriver->storageVolResize(vol, capacity, flags);
14281 14282 14283 14284 14285
        if (ret < 0)
            goto error;
        return ret;
    }

14286
    virReportUnsupportedError();
14287

14288
 error:
14289 14290 14291
    virDispatchError(vol->conn);
    return -1;
}
14292

14293

14294 14295 14296 14297
/**
 * virNodeNumOfDevices:
 * @conn: pointer to the hypervisor connection
 * @cap: capability name
14298
 * @flags: extra flags; not used yet, so callers should always pass 0
14299 14300 14301 14302 14303 14304 14305 14306 14307 14308 14309
 *
 * Provides the number of node devices.
 *
 * If the optional 'cap'  argument is non-NULL, then the count
 * will be restricted to devices with the specified capability
 *
 * Returns the number of node devices or -1 in case of error
 */
int
virNodeNumOfDevices(virConnectPtr conn, const char *cap, unsigned int flags)
{
14310
    VIR_DEBUG("conn=%p, cap=%s, flags=%x", conn, NULLSTR(cap), flags);
14311

14312 14313
    virResetLastError();

14314
    virCheckConnectReturn(conn, -1);
14315

14316
    if (conn->nodeDeviceDriver && conn->nodeDeviceDriver->nodeNumOfDevices) {
14317
        int ret;
14318
        ret = conn->nodeDeviceDriver->nodeNumOfDevices(conn, cap, flags);
14319 14320 14321 14322
        if (ret < 0)
            goto error;
        return ret;
    }
14323

14324
    virReportUnsupportedError();
14325

14326
 error:
14327
    virDispatchError(conn);
14328 14329 14330
    return -1;
}

14331

14332 14333 14334 14335 14336 14337 14338 14339 14340 14341 14342 14343 14344 14345 14346 14347 14348 14349 14350 14351 14352 14353 14354 14355 14356 14357 14358 14359
/**
 * virConnectListAllNodeDevices:
 * @conn: Pointer to the hypervisor connection.
 * @devices: Pointer to a variable to store the array containing the node
 *           device objects or NULL if the list is not required (just returns
 *           number of node devices).
 * @flags: bitwise-OR of virConnectListAllNodeDevices.
 *
 * Collect the list of node devices, and allocate an array to store those
 * objects.
 *
 * Normally, all node devices are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted node devices.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a node device, and where all bits
 * within a group describe all possible node devices.
 *
 * Only one group of the @flags is provided to filter the node devices by
 * capability type, flags include:
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SYSTEM
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_PCI_DEV
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_USB_DEV
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_USB_INTERFACE
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_NET
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI_HOST
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI_TARGET
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_STORAGE
14360 14361
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_FC_HOST
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_VPORTS
14362
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI_GENERIC
14363 14364 14365 14366 14367 14368 14369 14370 14371 14372 14373 14374 14375 14376 14377 14378 14379 14380 14381 14382
 *
 * Returns the number of node devices found or -1 and sets @devices to NULL in
 * case of error.  On success, the array stored into @devices is guaranteed to
 * have an extra allocated element set to NULL but not included in the return
 * count, to make iteration easier.  The caller is responsible for calling
 * virNodeDeviceFree() on each array element, then calling free() on
 * @devices.
 */
int
virConnectListAllNodeDevices(virConnectPtr conn,
                             virNodeDevicePtr **devices,
                             unsigned int flags)
{
    VIR_DEBUG("conn=%p, devices=%p, flags=%x", conn, devices, flags);

    virResetLastError();

    if (devices)
        *devices = NULL;

14383
    virCheckConnectReturn(conn, -1);
14384

14385 14386
    if (conn->nodeDeviceDriver &&
        conn->nodeDeviceDriver->connectListAllNodeDevices) {
14387
        int ret;
14388
        ret = conn->nodeDeviceDriver->connectListAllNodeDevices(conn, devices, flags);
14389 14390 14391 14392 14393
        if (ret < 0)
            goto error;
        return ret;
    }

14394
    virReportUnsupportedError();
14395

14396
 error:
14397 14398 14399
    virDispatchError(conn);
    return -1;
}
14400

14401

14402 14403 14404 14405 14406 14407
/**
 * virNodeListDevices:
 * @conn: pointer to the hypervisor connection
 * @cap: capability name
 * @names: array to collect the list of node device names
 * @maxnames: size of @names
14408
 * @flags: extra flags; not used yet, so callers should always pass 0
14409 14410 14411
 *
 * Collect the list of node devices, and store their names in @names
 *
14412 14413
 * For more control over the results, see virConnectListAllNodeDevices().
 *
14414 14415 14416 14417 14418 14419 14420 14421 14422 14423 14424
 * If the optional 'cap'  argument is non-NULL, then the count
 * will be restricted to devices with the specified capability
 *
 * Returns the number of node devices found or -1 in case of error
 */
int
virNodeListDevices(virConnectPtr conn,
                   const char *cap,
                   char **const names, int maxnames,
                   unsigned int flags)
{
14425
    VIR_DEBUG("conn=%p, cap=%s, names=%p, maxnames=%d, flags=%x",
14426 14427
          conn, cap, names, maxnames, flags);

14428 14429
    virResetLastError();

14430
    virCheckConnectReturn(conn, -1);
14431 14432
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
14433

14434
    if (conn->nodeDeviceDriver && conn->nodeDeviceDriver->nodeListDevices) {
14435
        int ret;
14436
        ret = conn->nodeDeviceDriver->nodeListDevices(conn, cap, names, maxnames, flags);
14437 14438 14439 14440
        if (ret < 0)
            goto error;
        return ret;
    }
14441

14442
    virReportUnsupportedError();
14443

14444
 error:
14445
    virDispatchError(conn);
14446 14447 14448 14449 14450 14451 14452 14453 14454 14455 14456 14457 14458
    return -1;
}


/**
 * virNodeDeviceLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: unique device name
 *
 * Lookup a node device by its name.
 *
 * Returns a virNodeDevicePtr if found, NULL otherwise.
 */
14459 14460
virNodeDevicePtr
virNodeDeviceLookupByName(virConnectPtr conn, const char *name)
14461
{
14462
    VIR_DEBUG("conn=%p, name=%p", conn, name);
14463

14464 14465
    virResetLastError();

14466
    virCheckConnectReturn(conn, NULL);
14467
    virCheckNonNullArgGoto(name, error);
14468

14469
    if (conn->nodeDeviceDriver && conn->nodeDeviceDriver->nodeDeviceLookupByName) {
14470
        virNodeDevicePtr ret;
14471
        ret = conn->nodeDeviceDriver->nodeDeviceLookupByName(conn, name);
14472 14473 14474 14475
        if (!ret)
            goto error;
        return ret;
    }
14476

14477
    virReportUnsupportedError();
14478

14479
 error:
14480
    virDispatchError(conn);
14481 14482 14483
    return NULL;
}

14484

14485 14486 14487 14488 14489 14490 14491 14492 14493 14494 14495 14496 14497 14498 14499 14500 14501 14502 14503 14504 14505
/**
 * virNodeDeviceLookupSCSIHostByWWN:
 * @conn: pointer to the hypervisor connection
 * @wwnn: WWNN of the SCSI Host.
 * @wwpn: WWPN of the SCSI Host.
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Lookup SCSI Host which is capable with 'fc_host' by its WWNN and WWPN.
 *
 * Returns a virNodeDevicePtr if found, NULL otherwise.
 */
virNodeDevicePtr
virNodeDeviceLookupSCSIHostByWWN(virConnectPtr conn,
                                 const char *wwnn,
                                 const char *wwpn,
                                 unsigned int flags)
{
    VIR_DEBUG("conn=%p, wwnn=%p, wwpn=%p, flags=%x", conn, wwnn, wwpn, flags);

    virResetLastError();

14506
    virCheckConnectReturn(conn, NULL);
14507 14508 14509
    virCheckNonNullArgGoto(wwnn, error);
    virCheckNonNullArgGoto(wwpn, error);

14510 14511
    if (conn->nodeDeviceDriver &&
        conn->nodeDeviceDriver->nodeDeviceLookupSCSIHostByWWN) {
14512
        virNodeDevicePtr ret;
14513
        ret = conn->nodeDeviceDriver->nodeDeviceLookupSCSIHostByWWN(conn, wwnn,
14514 14515 14516 14517 14518 14519
                                                             wwpn, flags);
        if (!ret)
            goto error;
        return ret;
    }

14520
    virReportUnsupportedError();
14521

14522
 error:
14523 14524 14525
    virDispatchError(conn);
    return NULL;
}
14526

14527

14528 14529 14530
/**
 * virNodeDeviceGetXMLDesc:
 * @dev: pointer to the node device
14531
 * @flags: extra flags; not used yet, so callers should always pass 0
14532 14533 14534 14535
 *
 * Fetch an XML document describing all aspects of
 * the device.
 *
14536
 * Returns the XML document, or NULL on error
14537
 */
14538 14539
char *
virNodeDeviceGetXMLDesc(virNodeDevicePtr dev, unsigned int flags)
14540
{
E
Eric Blake 已提交
14541
    VIR_DEBUG("dev=%p, conn=%p, flags=%x", dev, dev ? dev->conn : NULL, flags);
14542

14543 14544
    virResetLastError();

14545
    virCheckNodeDeviceReturn(dev, NULL);
14546

14547
    if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceGetXMLDesc) {
14548
        char *ret;
14549
        ret = dev->conn->nodeDeviceDriver->nodeDeviceGetXMLDesc(dev, flags);
14550 14551 14552 14553
        if (!ret)
            goto error;
        return ret;
    }
14554

14555
    virReportUnsupportedError();
14556

14557
 error:
14558
    virDispatchError(dev->conn);
14559 14560 14561 14562 14563 14564 14565 14566
    return NULL;
}


/**
 * virNodeDeviceGetName:
 * @dev: the device
 *
D
Daniel Veillard 已提交
14567 14568 14569
 * Just return the device name
 *
 * Returns the device name or NULL in case of error
14570
 */
14571 14572
const char *
virNodeDeviceGetName(virNodeDevicePtr dev)
14573
{
14574
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14575

14576 14577
    virResetLastError();

14578
    virCheckNodeDeviceReturn(dev, NULL);
14579 14580 14581 14582

    return dev->name;
}

14583

14584 14585 14586 14587
/**
 * virNodeDeviceGetParent:
 * @dev: the device
 *
D
Daniel Veillard 已提交
14588 14589
 * Accessor for the parent of the device
 *
14590 14591
 * Returns the name of the device's parent, or NULL if an
 * error occurred or when the device has no parent.
14592
 */
14593 14594
const char *
virNodeDeviceGetParent(virNodeDevicePtr dev)
14595
{
14596
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14597

14598 14599
    virResetLastError();

14600
    virCheckNodeDeviceReturn(dev, NULL);
14601

14602
    if (!dev->parent) {
14603 14604
        if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceGetParent) {
            dev->parent = dev->conn->nodeDeviceDriver->nodeDeviceGetParent(dev);
14605
        } else {
14606
            virReportUnsupportedError();
14607
            virDispatchError(dev->conn);
14608 14609 14610 14611
            return NULL;
        }
    }
    return dev->parent;
14612 14613
}

14614

14615 14616 14617 14618
/**
 * virNodeDeviceNumOfCaps:
 * @dev: the device
 *
D
Daniel Veillard 已提交
14619 14620
 * Accessor for the number of capabilities supported by the device.
 *
14621 14622
 * Returns the number of capabilities supported by the device or -1
 * in case of error.
14623
 */
14624 14625
int
virNodeDeviceNumOfCaps(virNodeDevicePtr dev)
14626
{
14627
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14628

14629 14630
    virResetLastError();

14631
    virCheckNodeDeviceReturn(dev, -1);
14632

14633
    if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceNumOfCaps) {
14634
        int ret;
14635
        ret = dev->conn->nodeDeviceDriver->nodeDeviceNumOfCaps(dev);
14636 14637 14638 14639
        if (ret < 0)
            goto error;
        return ret;
    }
14640

14641
    virReportUnsupportedError();
14642

14643
 error:
14644
    virDispatchError(dev->conn);
14645 14646 14647
    return -1;
}

14648

14649 14650 14651 14652 14653 14654 14655 14656
/**
 * virNodeDeviceListCaps:
 * @dev: the device
 * @names: array to collect the list of capability names
 * @maxnames: size of @names
 *
 * Lists the names of the capabilities supported by the device.
 *
14657 14658
 * Returns the number of capability names listed in @names or -1
 * in case of error.
14659
 */
14660 14661 14662 14663
int
virNodeDeviceListCaps(virNodeDevicePtr dev,
                      char **const names,
                      int maxnames)
14664
{
14665
    VIR_DEBUG("dev=%p, conn=%p, names=%p, maxnames=%d",
14666 14667
          dev, dev ? dev->conn : NULL, names, maxnames);

14668 14669
    virResetLastError();

14670
    virCheckNodeDeviceReturn(dev, -1);
14671 14672
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
14673

14674
    if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceListCaps) {
14675
        int ret;
14676
        ret = dev->conn->nodeDeviceDriver->nodeDeviceListCaps(dev, names, maxnames);
14677 14678 14679 14680
        if (ret < 0)
            goto error;
        return ret;
    }
14681

14682
    virReportUnsupportedError();
14683

14684
 error:
14685
    virDispatchError(dev->conn);
14686 14687 14688 14689 14690 14691 14692 14693 14694 14695 14696 14697 14698
    return -1;
}


/**
 * virNodeDeviceFree:
 * @dev: pointer to the node device
 *
 * Drops a reference to the node device, freeing it if
 * this was the last reference.
 *
 * Returns the 0 for success, -1 for error.
 */
14699 14700
int
virNodeDeviceFree(virNodeDevicePtr dev)
14701
{
14702
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14703

14704 14705
    virResetLastError();

14706 14707
    virCheckNodeDeviceReturn(dev, -1);

14708
    virObjectUnref(dev);
14709
    return 0;
14710 14711 14712
}


14713 14714
/**
 * virNodeDeviceRef:
D
Daniel Veillard 已提交
14715
 * @dev: the dev to hold a reference on
14716 14717 14718 14719 14720 14721 14722 14723 14724 14725 14726
 *
 * Increment the reference count on the dev. For each
 * additional call to this method, there shall be a corresponding
 * call to virNodeDeviceFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a dev would increment
 * the reference count.
D
Daniel Veillard 已提交
14727 14728
 *
 * Returns 0 in case of success, -1 in case of failure.
14729 14730 14731 14732
 */
int
virNodeDeviceRef(virNodeDevicePtr dev)
{
14733 14734
    VIR_DEBUG("dev=%p refs=%d", dev, dev ? dev->object.u.s.refs : 0);

14735 14736
    virResetLastError();

14737 14738
    virCheckNodeDeviceReturn(dev, -1);

14739
    virObjectRef(dev);
14740 14741 14742
    return 0;
}

14743

14744
/**
D
Daniel Veillard 已提交
14745
 * virNodeDeviceDettach:
14746 14747 14748 14749 14750 14751 14752 14753 14754 14755 14756 14757 14758 14759
 * @dev: pointer to the node device
 *
 * Dettach the node device from the node itself so that it may be
 * assigned to a guest domain.
 *
 * Depending on the hypervisor, this may involve operations such
 * as unbinding any device drivers from the device, binding the
 * device to a dummy device driver and resetting the device.
 *
 * If the device is currently in use by the node, this method may
 * fail.
 *
 * Once the device is not assigned to any guest, it may be re-attached
 * to the node using the virNodeDeviceReattach() method.
D
Daniel Veillard 已提交
14760
 *
14761 14762 14763 14764 14765
 * If the caller needs control over which backend driver will be used
 * during PCI device assignment (to use something other than the
 * default, for example VFIO), the newer virNodeDeviceDetachFlags()
 * API should be used instead.
 *
D
Daniel Veillard 已提交
14766
 * Returns 0 in case of success, -1 in case of failure.
14767 14768 14769 14770
 */
int
virNodeDeviceDettach(virNodeDevicePtr dev)
{
14771
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14772 14773 14774

    virResetLastError();

14775
    virCheckNodeDeviceReturn(dev, -1);
14776
    virCheckReadOnlyGoto(dev->conn->flags, error);
14777

14778 14779
    if (dev->conn->driver->nodeDeviceDettach) {
        int ret;
14780
        ret = dev->conn->driver->nodeDeviceDettach(dev);
14781 14782 14783 14784 14785
        if (ret < 0)
            goto error;
        return ret;
    }

14786
    virReportUnsupportedError();
14787

14788
 error:
14789
    virDispatchError(dev->conn);
14790
    return -1;
14791 14792
}

14793

14794 14795 14796 14797 14798 14799 14800 14801 14802 14803 14804 14805 14806 14807 14808 14809 14810 14811 14812 14813 14814 14815 14816 14817 14818 14819 14820 14821 14822 14823 14824 14825 14826 14827 14828 14829 14830 14831
/**
 * virNodeDeviceDetachFlags:
 * @dev: pointer to the node device
 * @driverName: name of backend driver that will be used
 *              for later device assignment to a domain. NULL
 *              means "use the hypervisor default driver"
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Detach the node device from the node itself so that it may be
 * assigned to a guest domain.
 *
 * Depending on the hypervisor, this may involve operations such as
 * unbinding any device drivers from the device, binding the device to
 * a dummy device driver and resetting the device. Different backend
 * drivers expect the device to be bound to different dummy
 * devices. For example, QEMU's "kvm" backend driver (the default)
 * expects the device to be bound to "pci-stub", but its "vfio"
 * backend driver expects the device to be bound to "vfio-pci".
 *
 * If the device is currently in use by the node, this method may
 * fail.
 *
 * Once the device is not assigned to any guest, it may be re-attached
 * to the node using the virNodeDeviceReAttach() method.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virNodeDeviceDetachFlags(virNodeDevicePtr dev,
                         const char *driverName,
                         unsigned int flags)
{
    VIR_DEBUG("dev=%p, conn=%p driverName=%s flags=%x",
              dev, dev ? dev->conn : NULL,
              driverName ? driverName : "(default)", flags);

    virResetLastError();

14832
    virCheckNodeDeviceReturn(dev, -1);
14833
    virCheckReadOnlyGoto(dev->conn->flags, error);
14834 14835 14836 14837 14838 14839 14840 14841 14842

    if (dev->conn->driver->nodeDeviceDetachFlags) {
        int ret;
        ret = dev->conn->driver->nodeDeviceDetachFlags(dev, driverName, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

14843
    virReportUnsupportedError();
14844

14845
 error:
14846 14847 14848 14849
    virDispatchError(dev->conn);
    return -1;
}

14850

14851 14852 14853 14854 14855 14856 14857 14858 14859 14860 14861 14862
/**
 * virNodeDeviceReAttach:
 * @dev: pointer to the node device
 *
 * Re-attach a previously dettached node device to the node so that it
 * may be used by the node again.
 *
 * Depending on the hypervisor, this may involve operations such
 * as resetting the device, unbinding it from a dummy device driver
 * and binding it to its appropriate driver.
 *
 * If the device is currently in use by a guest, this method may fail.
D
Daniel Veillard 已提交
14863 14864
 *
 * Returns 0 in case of success, -1 in case of failure.
14865 14866 14867 14868
 */
int
virNodeDeviceReAttach(virNodeDevicePtr dev)
{
14869
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14870 14871 14872

    virResetLastError();

14873
    virCheckNodeDeviceReturn(dev, -1);
14874
    virCheckReadOnlyGoto(dev->conn->flags, error);
14875

14876 14877
    if (dev->conn->driver->nodeDeviceReAttach) {
        int ret;
14878
        ret = dev->conn->driver->nodeDeviceReAttach(dev);
14879 14880 14881 14882 14883
        if (ret < 0)
            goto error;
        return ret;
    }

14884
    virReportUnsupportedError();
14885

14886
 error:
14887
    virDispatchError(dev->conn);
14888
    return -1;
14889 14890
}

14891

14892 14893 14894 14895 14896 14897 14898 14899 14900 14901 14902 14903 14904 14905
/**
 * virNodeDeviceReset:
 * @dev: pointer to the node device
 *
 * Reset a previously dettached node device to the node before or
 * after assigning it to a guest.
 *
 * The exact reset semantics depends on the hypervisor and device
 * type but, for example, KVM will attempt to reset PCI devices with
 * a Function Level Reset, Secondary Bus Reset or a Power Management
 * D-State reset.
 *
 * If the reset will affect other devices which are currently in use,
 * this function may fail.
D
Daniel Veillard 已提交
14906 14907
 *
 * Returns 0 in case of success, -1 in case of failure.
14908 14909 14910 14911
 */
int
virNodeDeviceReset(virNodeDevicePtr dev)
{
14912
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14913 14914 14915

    virResetLastError();

14916
    virCheckNodeDeviceReturn(dev, -1);
14917
    virCheckReadOnlyGoto(dev->conn->flags, error);
14918

14919 14920
    if (dev->conn->driver->nodeDeviceReset) {
        int ret;
14921
        ret = dev->conn->driver->nodeDeviceReset(dev);
14922 14923 14924 14925 14926
        if (ret < 0)
            goto error;
        return ret;
    }

14927
    virReportUnsupportedError();
14928

14929
 error:
14930
    virDispatchError(dev->conn);
14931
    return -1;
14932 14933
}

14934

14935 14936 14937 14938
/**
 * virNodeDeviceCreateXML:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: string containing an XML description of the device to be created
14939
 * @flags: extra flags; not used yet, so callers should always pass 0
14940 14941 14942 14943 14944 14945 14946 14947 14948 14949 14950
 *
 * Create a new device on the VM host machine, for example, virtual
 * HBAs created using vport_create.
 *
 * Returns a node device object if successful, NULL in case of failure
 */
virNodeDevicePtr
virNodeDeviceCreateXML(virConnectPtr conn,
                       const char *xmlDesc,
                       unsigned int flags)
{
14951
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
14952 14953 14954

    virResetLastError();

14955
    virCheckConnectReturn(conn, NULL);
14956
    virCheckReadOnlyGoto(conn->flags, error);
14957
    virCheckNonNullArgGoto(xmlDesc, error);
14958

14959 14960 14961
    if (conn->nodeDeviceDriver &&
        conn->nodeDeviceDriver->nodeDeviceCreateXML) {
        virNodeDevicePtr dev = conn->nodeDeviceDriver->nodeDeviceCreateXML(conn, xmlDesc, flags);
14962 14963 14964 14965 14966
        if (dev == NULL)
            goto error;
        return dev;
    }

14967
    virReportUnsupportedError();
14968

14969
 error:
14970
    virDispatchError(conn);
14971 14972 14973 14974 14975 14976 14977 14978
    return NULL;
}


/**
 * virNodeDeviceDestroy:
 * @dev: a device object
 *
14979 14980 14981
 * Destroy the device object. The virtual device (only works for vHBA
 * currently) is removed from the host operating system.  This function
 * may require privileged access.
14982 14983 14984 14985 14986 14987
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNodeDeviceDestroy(virNodeDevicePtr dev)
{
14988
    VIR_DEBUG("dev=%p", dev);
14989 14990 14991

    virResetLastError();

14992
    virCheckNodeDeviceReturn(dev, -1);
14993
    virCheckReadOnlyGoto(dev->conn->flags, error);
14994

14995 14996 14997
    if (dev->conn->nodeDeviceDriver &&
        dev->conn->nodeDeviceDriver->nodeDeviceDestroy) {
        int retval = dev->conn->nodeDeviceDriver->nodeDeviceDestroy(dev);
14998 14999 15000 15001 15002 15003 15004
        if (retval < 0) {
            goto error;
        }

        return 0;
    }

15005
    virReportUnsupportedError();
15006

15007
 error:
15008
    virDispatchError(dev->conn);
15009 15010 15011 15012
    return -1;
}


15013 15014 15015 15016 15017 15018 15019 15020 15021
/*
 * Domain Event Notification
 */

/**
 * virConnectDomainEventRegister:
 * @conn: pointer to the connection
 * @cb: callback to the function handling domain events
 * @opaque: opaque data to pass on to the callback
D
Daniel Veillard 已提交
15022
 * @freecb: optional function to deallocate opaque when not used anymore
15023
 *
15024
 * Adds a callback to receive notifications of domain lifecycle events
E
Eric Blake 已提交
15025 15026 15027
 * occurring on a connection.  This function requires that an event loop
 * has been previously registered with virEventRegisterImpl() or
 * virEventRegisterDefaultImpl().
15028 15029
 *
 * Use of this method is no longer recommended. Instead applications
15030
 * should try virConnectDomainEventRegisterAny() which has a more flexible
E
Eric Blake 已提交
15031
 * API contract.
15032
 *
15033 15034
 * The virDomainPtr object handle passed into the callback upon delivery
 * of an event is only valid for the duration of execution of the callback.
15035 15036
 * If the callback wishes to keep the domain object after the callback returns,
 * it shall take a reference to it, by calling virDomainRef.
15037 15038 15039
 * The reference can be released once the object is no longer required
 * by calling virDomainFree.
 *
15040 15041 15042
 * Returns 0 on success, -1 on failure.  Older versions of some hypervisors
 * sometimes returned a positive number on success, but without any reliable
 * semantics on what that number represents.
15043 15044 15045 15046
 */
int
virConnectDomainEventRegister(virConnectPtr conn,
                              virConnectDomainEventCallback cb,
15047 15048
                              void *opaque,
                              virFreeCallback freecb)
15049
{
15050
    VIR_DEBUG("conn=%p, cb=%p, opaque=%p, freecb=%p", conn, cb, opaque, freecb);
15051
    virResetLastError();
15052

15053
    virCheckConnectReturn(conn, -1);
15054
    virCheckNonNullArgGoto(cb, error);
15055

15056
    if (conn->driver && conn->driver->connectDomainEventRegister) {
15057
        int ret;
15058
        ret = conn->driver->connectDomainEventRegister(conn, cb, opaque, freecb);
15059 15060 15061 15062 15063
        if (ret < 0)
            goto error;
        return ret;
    }

15064
    virReportUnsupportedError();
15065
 error:
15066
    virDispatchError(conn);
15067 15068 15069
    return -1;
}

15070

15071 15072 15073 15074 15075
/**
 * virConnectDomainEventDeregister:
 * @conn: pointer to the connection
 * @cb: callback to the function handling domain events
 *
15076 15077
 * Removes a callback previously registered with the
 * virConnectDomainEventRegister() function.
15078 15079
 *
 * Use of this method is no longer recommended. Instead applications
15080
 * should try virConnectDomainEventDeregisterAny() which has a more flexible
15081
 * API contract
15082
 *
15083 15084 15085
 * Returns 0 on success, -1 on failure.  Older versions of some hypervisors
 * sometimes returned a positive number on success, but without any reliable
 * semantics on what that number represents.
15086 15087 15088 15089 15090
 */
int
virConnectDomainEventDeregister(virConnectPtr conn,
                                virConnectDomainEventCallback cb)
{
15091
    VIR_DEBUG("conn=%p, cb=%p", conn, cb);
15092 15093

    virResetLastError();
15094

15095
    virCheckConnectReturn(conn, -1);
15096 15097
    virCheckNonNullArgGoto(cb, error);

15098
    if (conn->driver && conn->driver->connectDomainEventDeregister) {
15099
        int ret;
15100
        ret = conn->driver->connectDomainEventDeregister(conn, cb);
15101 15102 15103
        if (ret < 0)
            goto error;
        return ret;
15104 15105
    }

15106
    virReportUnsupportedError();
15107
 error:
15108
    virDispatchError(conn);
15109 15110
    return -1;
}
15111

15112

15113 15114 15115 15116 15117 15118 15119 15120 15121 15122 15123 15124 15125
/**
 * virSecretGetConnect:
 * @secret: A virSecret secret
 *
 * Provides the connection pointer associated with a secret.  The reference
 * counter on the connection is not increased by this call.
 *
 * WARNING: When writing libvirt bindings in other languages, do not use this
 * function.  Instead, store the connection and the secret object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
15126
virSecretGetConnect(virSecretPtr secret)
15127
{
15128
    VIR_DEBUG("secret=%p", secret);
15129 15130 15131

    virResetLastError();

15132 15133
    virCheckSecretReturn(secret, NULL);

15134 15135 15136
    return secret->conn;
}

15137

15138 15139 15140 15141 15142 15143 15144 15145 15146 15147 15148 15149 15150 15151 15152
/**
 * virConnectNumOfSecrets:
 * @conn: virConnect connection
 *
 * Fetch number of currently defined secrets.
 *
 * Returns the number currently defined secrets.
 */
int
virConnectNumOfSecrets(virConnectPtr conn)
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

15153
    virCheckConnectReturn(conn, -1);
15154 15155

    if (conn->secretDriver != NULL &&
15156
        conn->secretDriver->connectNumOfSecrets != NULL) {
15157 15158
        int ret;

15159
        ret = conn->secretDriver->connectNumOfSecrets(conn);
15160 15161 15162 15163 15164
        if (ret < 0)
            goto error;
        return ret;
    }

15165
    virReportUnsupportedError();
15166

15167
 error:
15168
    virDispatchError(conn);
15169 15170 15171
    return -1;
}

15172

15173 15174 15175 15176 15177 15178 15179 15180 15181 15182 15183 15184 15185 15186 15187 15188 15189 15190 15191 15192 15193 15194 15195 15196 15197 15198 15199 15200 15201 15202 15203 15204 15205 15206 15207 15208 15209 15210 15211 15212 15213 15214 15215 15216 15217
/**
 * virConnectListAllSecrets:
 * @conn: Pointer to the hypervisor connection.
 * @secrets: Pointer to a variable to store the array containing the secret
 *           objects or NULL if the list is not required (just returns the
 *           number of secrets).
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Collect the list of secrets, and allocate an array to store those
 * objects.
 *
 * Normally, all secrets are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted secrets. The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a secret, and where all bits
 * within a group describe all possible secrets.
 *
 * The first group of @flags is used to filter secrets by its storage
 * location. Flag VIR_CONNECT_LIST_SECRETS_EPHEMERAL selects secrets that
 * are kept only in memory. Flag VIR_CONNECT_LIST_SECRETS_NO_EPHEMERAL
 * selects secrets that are kept in persistent storage.
 *
 * The second group of @flags is used to filter secrets by privacy. Flag
 * VIR_CONNECT_LIST_SECRETS_PRIVATE seclets secrets that are never revealed
 * to any caller of libvirt nor to any other node. Flag
 * VIR_CONNECT_LIST_SECRETS_NO_PRIVATE selects non-private secrets.
 *
 * Returns the number of secrets found or -1 and sets @secrets to NULL in case
 * of error.  On success, the array stored into @secrets is guaranteed to
 * have an extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virSecretFree() on each array element, then calling free() on @secrets.
 */
int
virConnectListAllSecrets(virConnectPtr conn,
                         virSecretPtr **secrets,
                         unsigned int flags)
{
    VIR_DEBUG("conn=%p, secrets=%p, flags=%x", conn, secrets, flags);

    virResetLastError();

    if (secrets)
        *secrets = NULL;

15218
    virCheckConnectReturn(conn, -1);
15219 15220

    if (conn->secretDriver &&
15221
        conn->secretDriver->connectListAllSecrets) {
15222
        int ret;
15223
        ret = conn->secretDriver->connectListAllSecrets(conn, secrets, flags);
15224 15225 15226 15227 15228
        if (ret < 0)
            goto error;
        return ret;
    }

15229
    virReportUnsupportedError();
15230

15231
 error:
15232 15233 15234 15235
    virDispatchError(conn);
    return -1;
}

15236

15237 15238 15239 15240 15241 15242 15243 15244 15245 15246 15247 15248 15249 15250 15251 15252 15253
/**
 * virConnectListSecrets:
 * @conn: virConnect connection
 * @uuids: Pointer to an array to store the UUIDs
 * @maxuuids: size of the array.
 *
 * List UUIDs of defined secrets, store pointers to names in uuids.
 *
 * Returns the number of UUIDs provided in the array, or -1 on failure.
 */
int
virConnectListSecrets(virConnectPtr conn, char **uuids, int maxuuids)
{
    VIR_DEBUG("conn=%p, uuids=%p, maxuuids=%d", conn, uuids, maxuuids);

    virResetLastError();

15254
    virCheckConnectReturn(conn, -1);
15255 15256
    virCheckNonNullArgGoto(uuids, error);
    virCheckNonNegativeArgGoto(maxuuids, error);
15257

15258
    if (conn->secretDriver != NULL && conn->secretDriver->connectListSecrets != NULL) {
15259 15260
        int ret;

15261
        ret = conn->secretDriver->connectListSecrets(conn, uuids, maxuuids);
15262 15263 15264 15265 15266
        if (ret < 0)
            goto error;
        return ret;
    }

15267
    virReportUnsupportedError();
15268

15269
 error:
15270
    virDispatchError(conn);
15271 15272 15273
    return -1;
}

15274

15275
/**
15276 15277 15278
 * virSecretLookupByUUID:
 * @conn: pointer to the hypervisor connection
 * @uuid: the raw UUID for the secret
15279
 *
15280 15281
 * Try to lookup a secret on the given hypervisor based on its UUID.
 * Uses the 16 bytes of raw data to describe the UUID
15282
 *
15283 15284
 * Returns a new secret object or NULL in case of failure.  If the
 * secret cannot be found, then VIR_ERR_NO_SECRET error is raised.
15285 15286
 */
virSecretPtr
15287
virSecretLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
15288
{
15289
    VIR_UUID_DEBUG(conn, uuid);
15290 15291 15292

    virResetLastError();

15293
    virCheckConnectReturn(conn, NULL);
15294
    virCheckNonNullArgGoto(uuid, error);
15295

15296
    if (conn->secretDriver &&
15297
        conn->secretDriver->secretLookupByUUID) {
15298
        virSecretPtr ret;
15299
        ret = conn->secretDriver->secretLookupByUUID(conn, uuid);
15300
        if (!ret)
15301 15302 15303 15304
            goto error;
        return ret;
    }

15305
    virReportUnsupportedError();
15306

15307
 error:
15308
    virDispatchError(conn);
15309 15310 15311
    return NULL;
}

15312

15313 15314 15315 15316 15317 15318 15319 15320 15321 15322 15323 15324 15325 15326 15327
/**
 * virSecretLookupByUUIDString:
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the secret
 *
 * Try to lookup a secret on the given hypervisor based on its UUID.
 * Uses the printable string value to describe the UUID
 *
 * Returns a new secret object or NULL in case of failure.  If the
 * secret cannot be found, then VIR_ERR_NO_SECRET error is raised.
 */
virSecretPtr
virSecretLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
    unsigned char uuid[VIR_UUID_BUFLEN];
15328
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
15329 15330 15331

    virResetLastError();

15332
    virCheckConnectReturn(conn, NULL);
15333
    virCheckNonNullArgGoto(uuidstr, error);
15334 15335

    if (virUUIDParse(uuidstr, uuid) < 0) {
15336 15337 15338
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
15339 15340 15341 15342 15343
        goto error;
    }

    return virSecretLookupByUUID(conn, &uuid[0]);

15344
 error:
15345
    virDispatchError(conn);
15346 15347 15348 15349
    return NULL;
}


15350 15351 15352 15353 15354 15355 15356 15357 15358 15359 15360 15361 15362 15363 15364 15365 15366 15367
/**
 * virSecretLookupByUsage:
 * @conn: pointer to the hypervisor connection
 * @usageType: the type of secret usage
 * @usageID: identifier of the object using the secret
 *
 * Try to lookup a secret on the given hypervisor based on its usage
 * The usageID is unique within the set of secrets sharing the
 * same usageType value.
 *
 * Returns a new secret object or NULL in case of failure.  If the
 * secret cannot be found, then VIR_ERR_NO_SECRET error is raised.
 */
virSecretPtr
virSecretLookupByUsage(virConnectPtr conn,
                       int usageType,
                       const char *usageID)
{
15368
    VIR_DEBUG("conn=%p, usageType=%d usageID=%s", conn, usageType, NULLSTR(usageID));
15369 15370 15371

    virResetLastError();

15372
    virCheckConnectReturn(conn, NULL);
15373
    virCheckNonNullArgGoto(usageID, error);
15374 15375

    if (conn->secretDriver &&
15376
        conn->secretDriver->secretLookupByUsage) {
15377
        virSecretPtr ret;
15378
        ret = conn->secretDriver->secretLookupByUsage(conn, usageType, usageID);
15379 15380 15381 15382 15383
        if (!ret)
            goto error;
        return ret;
    }

15384
    virReportUnsupportedError();
15385

15386
 error:
15387
    virDispatchError(conn);
15388 15389 15390 15391
    return NULL;
}


15392 15393 15394 15395
/**
 * virSecretDefineXML:
 * @conn: virConnect connection
 * @xml: XML describing the secret.
15396
 * @flags: extra flags; not used yet, so callers should always pass 0
15397
 *
D
Dan Kenigsberg 已提交
15398
 * If XML specifies a UUID, locates the specified secret and replaces all
15399 15400 15401 15402 15403 15404
 * attributes of the secret specified by UUID by attributes specified in xml
 * (any attributes not specified in xml are discarded).
 *
 * Otherwise, creates a new secret with an automatically chosen UUID, and
 * initializes its attributes from xml.
 *
W
Wang Yufei 已提交
15405
 * Returns a secret on success, NULL on failure.
15406 15407 15408 15409
 */
virSecretPtr
virSecretDefineXML(virConnectPtr conn, const char *xml, unsigned int flags)
{
15410
    VIR_DEBUG("conn=%p, xml=%s, flags=%x", conn, xml, flags);
15411 15412 15413

    virResetLastError();

15414
    virCheckConnectReturn(conn, NULL);
15415
    virCheckReadOnlyGoto(conn->flags, error);
15416
    virCheckNonNullArgGoto(xml, error);
15417

15418
    if (conn->secretDriver != NULL && conn->secretDriver->secretDefineXML != NULL) {
15419 15420
        virSecretPtr ret;

15421
        ret = conn->secretDriver->secretDefineXML(conn, xml, flags);
15422 15423 15424 15425 15426
        if (ret == NULL)
            goto error;
        return ret;
    }

15427
    virReportUnsupportedError();
15428

15429
 error:
15430
    virDispatchError(conn);
15431 15432 15433
    return NULL;
}

15434

15435
/**
15436
 * virSecretGetUUID:
15437
 * @secret: A virSecret secret
15438
 * @uuid: buffer of VIR_UUID_BUFLEN bytes in size
15439 15440 15441
 *
 * Fetches the UUID of the secret.
 *
15442 15443
 * Returns 0 on success with the uuid buffer being filled, or
 * -1 upon failure.
15444
 */
15445 15446
int
virSecretGetUUID(virSecretPtr secret, unsigned char *uuid)
15447 15448 15449 15450 15451
{
    VIR_DEBUG("secret=%p", secret);

    virResetLastError();

15452
    virCheckSecretReturn(secret, -1);
15453
    virCheckNonNullArgGoto(uuid, error);
15454

15455 15456 15457
    memcpy(uuid, &secret->uuid[0], VIR_UUID_BUFLEN);

    return 0;
15458

15459
 error:
15460 15461
    virDispatchError(secret->conn);
    return -1;
15462 15463
}

15464

15465 15466 15467 15468 15469 15470 15471 15472 15473 15474 15475 15476 15477
/**
 * virSecretGetUUIDString:
 * @secret: a secret object
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
 *
 * Get the UUID for a secret as string. For more information about
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virSecretGetUUIDString(virSecretPtr secret, char *buf)
{
15478
    VIR_DEBUG("secret=%p, buf=%p", secret, buf);
15479 15480

    virResetLastError();
15481

15482
    virCheckSecretReturn(secret, -1);
15483
    virCheckNonNullArgGoto(buf, error);
15484

E
Eric Blake 已提交
15485
    virUUIDFormat(secret->uuid, buf);
15486
    return 0;
15487

15488
 error:
15489
    virDispatchError(secret->conn);
15490
    return -1;
15491 15492
}

15493

15494 15495 15496 15497 15498 15499 15500 15501 15502 15503 15504 15505 15506 15507 15508 15509
/**
 * virSecretGetUsageType:
 * @secret: a secret object
 *
 * Get the type of object which uses this secret. The returned
 * value is one of the constants defined in the virSecretUsageType
 * enumeration. More values may be added to this enumeration in
 * the future, so callers should expect to see usage types they
 * do not explicitly know about.
 *
 * Returns a positive integer identifying the type of object,
 * or -1 upon error.
 */
int
virSecretGetUsageType(virSecretPtr secret)
{
15510
    VIR_DEBUG("secret=%p", secret);
15511 15512 15513

    virResetLastError();

15514 15515
    virCheckSecretReturn(secret, -1);

15516
    return secret->usageType;
15517 15518
}

15519

15520 15521 15522 15523 15524 15525 15526 15527 15528 15529 15530 15531 15532 15533 15534 15535 15536 15537 15538
/**
 * virSecretGetUsageID:
 * @secret: a secret object
 *
 * Get the unique identifier of the object with which this
 * secret is to be used. The format of the identifier is
 * dependant on the usage type of the secret. For a secret
 * with a usage type of VIR_SECRET_USAGE_TYPE_VOLUME the
 * identifier will be a fully qualfied path name. The
 * identifiers are intended to be unique within the set of
 * all secrets sharing the same usage type. ie, there shall
 * only ever be one secret for each volume path.
 *
 * Returns a string identifying the object using the secret,
 * or NULL upon error
 */
const char *
virSecretGetUsageID(virSecretPtr secret)
{
15539
    VIR_DEBUG("secret=%p", secret);
15540 15541 15542

    virResetLastError();

15543 15544
    virCheckSecretReturn(secret, NULL);

15545
    return secret->usageID;
15546 15547
}

15548

15549 15550 15551
/**
 * virSecretGetXMLDesc:
 * @secret: A virSecret secret
15552
 * @flags: extra flags; not used yet, so callers should always pass 0
15553 15554 15555 15556 15557 15558 15559 15560 15561 15562 15563
 *
 * Fetches an XML document describing attributes of the secret.
 *
 * Returns the XML document on success, NULL on failure.  The caller must
 * free() the XML.
 */
char *
virSecretGetXMLDesc(virSecretPtr secret, unsigned int flags)
{
    virConnectPtr conn;

15564
    VIR_DEBUG("secret=%p, flags=%x", secret, flags);
15565 15566 15567

    virResetLastError();

15568
    virCheckSecretReturn(secret, NULL);
15569
    conn = secret->conn;
15570

15571
    if (conn->secretDriver != NULL && conn->secretDriver->secretGetXMLDesc != NULL) {
15572 15573
        char *ret;

15574
        ret = conn->secretDriver->secretGetXMLDesc(secret, flags);
15575 15576 15577 15578 15579
        if (ret == NULL)
            goto error;
        return ret;
    }

15580
    virReportUnsupportedError();
15581

15582
 error:
15583
    virDispatchError(conn);
15584 15585 15586
    return NULL;
}

15587

15588 15589 15590 15591 15592
/**
 * virSecretSetValue:
 * @secret: A virSecret secret
 * @value: Value of the secret
 * @value_size: Size of the value
15593
 * @flags: extra flags; not used yet, so callers should always pass 0
15594 15595 15596 15597 15598 15599 15600 15601 15602 15603 15604
 *
 * Sets the value of a secret.
 *
 * Returns 0 on success, -1 on failure.
 */
int
virSecretSetValue(virSecretPtr secret, const unsigned char *value,
                  size_t value_size, unsigned int flags)
{
    virConnectPtr conn;

15605
    VIR_DEBUG("secret=%p, value=%p, value_size=%zu, flags=%x", secret, value,
15606 15607 15608 15609
              value_size, flags);

    virResetLastError();

15610
    virCheckSecretReturn(secret, -1);
15611
    conn = secret->conn;
15612

15613
    virCheckReadOnlyGoto(conn->flags, error);
15614
    virCheckNonNullArgGoto(value, error);
15615

15616
    if (conn->secretDriver != NULL && conn->secretDriver->secretSetValue != NULL) {
15617 15618
        int ret;

15619
        ret = conn->secretDriver->secretSetValue(secret, value, value_size, flags);
15620 15621 15622 15623 15624
        if (ret < 0)
            goto error;
        return ret;
    }

15625
    virReportUnsupportedError();
15626

15627
 error:
15628
    virDispatchError(conn);
15629 15630 15631
    return -1;
}

15632

15633 15634 15635 15636
/**
 * virSecretGetValue:
 * @secret: A virSecret connection
 * @value_size: Place for storing size of the secret value
15637
 * @flags: extra flags; not used yet, so callers should always pass 0
15638 15639 15640 15641 15642 15643 15644 15645 15646 15647 15648
 *
 * Fetches the value of a secret.
 *
 * Returns the secret value on success, NULL on failure.  The caller must
 * free() the secret value.
 */
unsigned char *
virSecretGetValue(virSecretPtr secret, size_t *value_size, unsigned int flags)
{
    virConnectPtr conn;

15649
    VIR_DEBUG("secret=%p, value_size=%p, flags=%x", secret, value_size, flags);
15650 15651 15652

    virResetLastError();

15653
    virCheckSecretReturn(secret, NULL);
15654
    conn = secret->conn;
15655

15656
    virCheckReadOnlyGoto(conn->flags, error);
15657
    virCheckNonNullArgGoto(value_size, error);
15658

15659
    if (conn->secretDriver != NULL && conn->secretDriver->secretGetValue != NULL) {
15660 15661
        unsigned char *ret;

15662
        ret = conn->secretDriver->secretGetValue(secret, value_size, flags, 0);
15663 15664 15665 15666 15667
        if (ret == NULL)
            goto error;
        return ret;
    }

15668
    virReportUnsupportedError();
15669

15670
 error:
15671
    virDispatchError(conn);
15672 15673 15674
    return NULL;
}

15675

15676 15677 15678 15679 15680 15681 15682 15683 15684 15685 15686 15687 15688 15689 15690 15691 15692 15693
/**
 * virSecretUndefine:
 * @secret: A virSecret secret
 *
 * Deletes the specified secret.  This does not free the associated
 * virSecretPtr object.
 *
 * Returns 0 on success, -1 on failure.
 */
int
virSecretUndefine(virSecretPtr secret)
{
    virConnectPtr conn;

    VIR_DEBUG("secret=%p", secret);

    virResetLastError();

15694
    virCheckSecretReturn(secret, -1);
15695
    conn = secret->conn;
15696

15697
    virCheckReadOnlyGoto(conn->flags, error);
15698

15699
    if (conn->secretDriver != NULL && conn->secretDriver->secretUndefine != NULL) {
15700 15701
        int ret;

15702
        ret = conn->secretDriver->secretUndefine(secret);
15703 15704 15705 15706 15707
        if (ret < 0)
            goto error;
        return ret;
    }

15708
    virReportUnsupportedError();
15709

15710
 error:
15711
    virDispatchError(conn);
15712 15713 15714
    return -1;
}

15715

15716 15717 15718 15719 15720 15721 15722 15723 15724 15725 15726 15727 15728 15729 15730 15731 15732 15733 15734
/**
 * virSecretRef:
 * @secret: the secret to hold a reference on
 *
 * Increment the reference count on the secret. For each additional call to
 * this method, there shall be a corresponding call to virSecretFree to release
 * the reference count, once the caller no longer needs the reference to this
 * object.
 *
 * This method is typically useful for applications where multiple threads are
 * using a connection, and it is required that the connection remain open until
 * all threads have finished using it. ie, each new thread using a secret would
 * increment the reference count.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virSecretRef(virSecretPtr secret)
{
15735 15736 15737
    VIR_DEBUG("secret=%p refs=%d", secret,
              secret ? secret->object.u.s.refs : 0);

15738 15739
    virResetLastError();

15740 15741
    virCheckSecretReturn(secret, -1);

15742
    virObjectRef(secret);
15743 15744 15745
    return 0;
}

15746

15747 15748 15749 15750 15751 15752
/**
 * virSecretFree:
 * @secret: pointer to a secret
 *
 * Release the secret handle. The underlying secret continues to exist.
 *
15753
 * Returns 0 on success, or -1 on error
15754 15755 15756 15757
 */
int
virSecretFree(virSecretPtr secret)
{
15758
    VIR_DEBUG("secret=%p", secret);
15759 15760 15761

    virResetLastError();

15762 15763
    virCheckSecretReturn(secret, -1);

15764
    virObjectUnref(secret);
15765 15766
    return 0;
}
15767 15768 15769 15770 15771


/**
 * virStreamNew:
 * @conn: pointer to the connection
15772
 * @flags: bitwise-OR of virStreamFlags
15773 15774 15775 15776 15777 15778 15779 15780 15781 15782 15783 15784 15785 15786 15787 15788 15789 15790 15791 15792 15793
 *
 * Creates a new stream object which can be used to perform
 * streamed I/O with other public API function.
 *
 * When no longer needed, a stream object must be released
 * with virStreamFree. If a data stream has been used,
 * then the application must call virStreamFinish or
 * virStreamAbort before free'ing to, in order to notify
 * the driver of termination.
 *
 * If a non-blocking data stream is required passed
 * VIR_STREAM_NONBLOCK for flags, otherwise pass 0.
 *
 * Returns the new stream, or NULL upon error
 */
virStreamPtr
virStreamNew(virConnectPtr conn,
             unsigned int flags)
{
    virStreamPtr st;

15794
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
15795 15796 15797

    virResetLastError();

15798
    virCheckConnectReturn(conn, NULL);
15799 15800 15801 15802

    st = virGetStream(conn);
    if (st)
        st->flags = flags;
15803 15804
    else
        virDispatchError(conn);
15805 15806 15807 15808 15809 15810 15811 15812 15813 15814 15815 15816 15817 15818 15819 15820 15821 15822 15823

    return st;
}


/**
 * virStreamRef:
 * @stream: pointer to the stream
 *
 * Increment the reference count on the stream. For each
 * additional call to this method, there shall be a corresponding
 * call to virStreamFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * Returns 0 in case of success, -1 in case of failure
 */
int
virStreamRef(virStreamPtr stream)
{
15824 15825 15826
    VIR_DEBUG("stream=%p refs=%d", stream,
              stream ? stream->object.u.s.refs : 0);

15827 15828
    virResetLastError();

15829 15830
    virCheckStreamReturn(stream, -1);

15831
    virObjectRef(stream);
15832 15833 15834 15835 15836 15837 15838 15839 15840 15841 15842 15843 15844
    return 0;
}


/**
 * virStreamSend:
 * @stream: pointer to the stream object
 * @data: buffer to write to stream
 * @nbytes: size of @data buffer
 *
 * Write a series of bytes to the stream. This method may
 * block the calling application for an arbitrary amount
 * of time. Once an application has finished sending data
15845
 * it should call virStreamFinish to wait for successful
15846
 * confirmation from the driver, or detect any error.
15847 15848
 *
 * This method may not be used if a stream source has been
15849
 * registered.
15850 15851 15852 15853 15854
 *
 * Errors are not guaranteed to be reported synchronously
 * with the call, but may instead be delayed until a
 * subsequent call.
 *
D
Dan Kenigsberg 已提交
15855
 * An example using this with a hypothetical file upload
15856 15857
 * API looks like
 *
15858
 *     virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
15859
 *     int fd = open("demo.iso", O_RDONLY);
15860 15861 15862 15863 15864 15865 15866
 *
 *     virConnectUploadFile(conn, "demo.iso", st);
 *
 *     while (1) {
 *          char buf[1024];
 *          int got = read(fd, buf, 1024);
 *          if (got < 0) {
15867
 *             virStreamAbort(st);
15868 15869 15870 15871 15872
 *             break;
 *          }
 *          if (got == 0) {
 *             virStreamFinish(st);
 *             break;
15873
 *          }
15874 15875
 *          int offset = 0;
 *          while (offset < got) {
E
Eric Blake 已提交
15876
 *             int sent = virStreamSend(st, buf+offset, got-offset);
15877 15878 15879 15880 15881 15882 15883 15884 15885 15886 15887 15888
 *             if (sent < 0) {
 *                virStreamAbort(st);
 *                goto done;
 *             }
 *             offset += sent;
 *          }
 *      }
 *      if (virStreamFinish(st) < 0)
 *         ... report an error ....
 *    done:
 *      virStreamFree(st);
 *      close(fd);
15889 15890 15891 15892 15893 15894 15895 15896 15897 15898 15899
 *
 * Returns the number of bytes written, which may be less
 * than requested.
 *
 * Returns -1 upon error, at which time the stream will
 * be marked as aborted, and the caller should now release
 * the stream with virStreamFree.
 *
 * Returns -2 if the outgoing transmit buffers are full &
 * the stream is marked as non-blocking.
 */
15900 15901 15902 15903
int
virStreamSend(virStreamPtr stream,
              const char *data,
              size_t nbytes)
15904
{
15905
    VIR_DEBUG("stream=%p, data=%p, nbytes=%zi", stream, data, nbytes);
15906 15907 15908

    virResetLastError();

15909
    virCheckStreamReturn(stream, -1);
15910
    virCheckNonNullArgGoto(data, error);
15911

15912 15913 15914 15915 15916 15917 15918 15919 15920 15921 15922
    if (stream->driver &&
        stream->driver->streamSend) {
        int ret;
        ret = (stream->driver->streamSend)(stream, data, nbytes);
        if (ret == -2)
            return -2;
        if (ret < 0)
            goto error;
        return ret;
    }

15923
    virReportUnsupportedError();
15924

15925
 error:
15926
    virDispatchError(stream->conn);
15927 15928 15929 15930 15931 15932 15933
    return -1;
}


/**
 * virStreamRecv:
 * @stream: pointer to the stream object
15934
 * @data: buffer to read into from stream
15935 15936
 * @nbytes: size of @data buffer
 *
15937
 * Reads a series of bytes from the stream. This method may
15938 15939 15940 15941 15942 15943 15944
 * block the calling application for an arbitrary amount
 * of time.
 *
 * Errors are not guaranteed to be reported synchronously
 * with the call, but may instead be delayed until a
 * subsequent call.
 *
D
Dan Kenigsberg 已提交
15945
 * An example using this with a hypothetical file download
15946 15947
 * API looks like
 *
15948
 *     virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
15949
 *     int fd = open("demo.iso", O_WRONLY, 0600);
15950 15951 15952 15953 15954 15955 15956 15957 15958 15959 15960 15961 15962 15963
 *
 *     virConnectDownloadFile(conn, "demo.iso", st);
 *
 *     while (1) {
 *         char buf[1024];
 *         int got = virStreamRecv(st, buf, 1024);
 *         if (got < 0)
 *            break;
 *         if (got == 0) {
 *            virStreamFinish(st);
 *            break;
 *         }
 *         int offset = 0;
 *         while (offset < got) {
E
Eric Blake 已提交
15964
 *            int sent = write(fd, buf + offset, got - offset);
15965 15966 15967 15968 15969 15970 15971 15972 15973 15974 15975 15976
 *            if (sent < 0) {
 *               virStreamAbort(st);
 *               goto done;
 *            }
 *            offset += sent;
 *         }
 *     }
 *     if (virStreamFinish(st) < 0)
 *        ... report an error ....
 *   done:
 *     virStreamFree(st);
 *     close(fd);
15977 15978 15979 15980 15981 15982 15983 15984 15985 15986 15987 15988 15989 15990 15991 15992
 *
 *
 * Returns the number of bytes read, which may be less
 * than requested.
 *
 * Returns 0 when the end of the stream is reached, at
 * which time the caller should invoke virStreamFinish()
 * to get confirmation of stream completion.
 *
 * Returns -1 upon error, at which time the stream will
 * be marked as aborted, and the caller should now release
 * the stream with virStreamFree.
 *
 * Returns -2 if there is no data pending to be read & the
 * stream is marked as non-blocking.
 */
15993 15994 15995 15996
int
virStreamRecv(virStreamPtr stream,
              char *data,
              size_t nbytes)
15997
{
15998
    VIR_DEBUG("stream=%p, data=%p, nbytes=%zi", stream, data, nbytes);
15999 16000 16001

    virResetLastError();

16002
    virCheckStreamReturn(stream, -1);
16003
    virCheckNonNullArgGoto(data, error);
16004

16005 16006 16007 16008 16009 16010 16011 16012 16013 16014 16015
    if (stream->driver &&
        stream->driver->streamRecv) {
        int ret;
        ret = (stream->driver->streamRecv)(stream, data, nbytes);
        if (ret == -2)
            return -2;
        if (ret < 0)
            goto error;
        return ret;
    }

16016
    virReportUnsupportedError();
16017

16018
 error:
16019
    virDispatchError(stream->conn);
16020 16021 16022 16023 16024 16025 16026 16027 16028 16029 16030 16031
    return -1;
}


/**
 * virStreamSendAll:
 * @stream: pointer to the stream object
 * @handler: source callback for reading data from application
 * @opaque: application defined data
 *
 * Send the entire data stream, reading the data from the
 * requested data source. This is simply a convenient alternative
16032
 * to virStreamSend, for apps that do blocking-I/O.
16033
 *
D
Dan Kenigsberg 已提交
16034
 * An example using this with a hypothetical file upload
16035 16036 16037 16038 16039 16040 16041 16042 16043
 * API looks like
 *
 *   int mysource(virStreamPtr st, char *buf, int nbytes, void *opaque) {
 *       int *fd = opaque;
 *
 *       return read(*fd, buf, nbytes);
 *   }
 *
 *   virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
16044
 *   int fd = open("demo.iso", O_RDONLY);
16045 16046 16047 16048 16049 16050 16051 16052 16053 16054 16055
 *
 *   virConnectUploadFile(conn, st);
 *   if (virStreamSendAll(st, mysource, &fd) < 0) {
 *      ...report an error ...
 *      goto done;
 *   }
 *   if (virStreamFinish(st) < 0)
 *      ...report an error...
 *   virStreamFree(st);
 *   close(fd);
 *
16056
 * Returns 0 if all the data was successfully sent. The caller
16057 16058 16059 16060 16061 16062 16063
 * should invoke virStreamFinish(st) to flush the stream upon
 * success and then virStreamFree
 *
 * Returns -1 upon any error, with virStreamAbort() already
 * having been called,  so the caller need only call
 * virStreamFree()
 */
16064 16065 16066 16067
int
virStreamSendAll(virStreamPtr stream,
                 virStreamSourceFunc handler,
                 void *opaque)
16068 16069 16070 16071
{
    char *bytes = NULL;
    int want = 1024*64;
    int ret = -1;
16072
    VIR_DEBUG("stream=%p, handler=%p, opaque=%p", stream, handler, opaque);
16073 16074 16075

    virResetLastError();

16076
    virCheckStreamReturn(stream, -1);
16077
    virCheckNonNullArgGoto(handler, cleanup);
16078

16079
    if (stream->flags & VIR_STREAM_NONBLOCK) {
16080 16081
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("data sources cannot be used for non-blocking streams"));
16082 16083 16084
        goto cleanup;
    }

16085
    if (VIR_ALLOC_N(bytes, want) < 0)
16086 16087 16088 16089 16090 16091 16092 16093 16094 16095 16096 16097 16098 16099 16100 16101 16102 16103 16104 16105 16106
        goto cleanup;

    for (;;) {
        int got, offset = 0;
        got = (handler)(stream, bytes, want, opaque);
        if (got < 0) {
            virStreamAbort(stream);
            goto cleanup;
        }
        if (got == 0)
            break;
        while (offset < got) {
            int done;
            done = virStreamSend(stream, bytes + offset, got - offset);
            if (done < 0)
                goto cleanup;
            offset += done;
        }
    }
    ret = 0;

16107
 cleanup:
16108 16109 16110
    VIR_FREE(bytes);

    if (ret != 0)
16111
        virDispatchError(stream->conn);
16112 16113 16114 16115 16116 16117 16118 16119 16120 16121 16122 16123 16124

    return ret;
}


/**
 * virStreamRecvAll:
 * @stream: pointer to the stream object
 * @handler: sink callback for writing data to application
 * @opaque: application defined data
 *
 * Receive the entire data stream, sending the data to the
 * requested data sink. This is simply a convenient alternative
16125
 * to virStreamRecv, for apps that do blocking-I/O.
16126
 *
D
Dan Kenigsberg 已提交
16127
 * An example using this with a hypothetical file download
16128 16129 16130 16131 16132 16133 16134 16135 16136
 * API looks like
 *
 *   int mysink(virStreamPtr st, const char *buf, int nbytes, void *opaque) {
 *       int *fd = opaque;
 *
 *       return write(*fd, buf, nbytes);
 *   }
 *
 *   virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
16137
 *   int fd = open("demo.iso", O_WRONLY);
16138 16139 16140 16141 16142 16143 16144 16145 16146 16147 16148
 *
 *   virConnectUploadFile(conn, st);
 *   if (virStreamRecvAll(st, mysink, &fd) < 0) {
 *      ...report an error ...
 *      goto done;
 *   }
 *   if (virStreamFinish(st) < 0)
 *      ...report an error...
 *   virStreamFree(st);
 *   close(fd);
 *
16149
 * Returns 0 if all the data was successfully received. The caller
16150 16151 16152 16153 16154 16155 16156
 * should invoke virStreamFinish(st) to flush the stream upon
 * success and then virStreamFree
 *
 * Returns -1 upon any error, with virStreamAbort() already
 * having been called,  so the caller need only call
 * virStreamFree()
 */
16157 16158 16159 16160
int
virStreamRecvAll(virStreamPtr stream,
                 virStreamSinkFunc handler,
                 void *opaque)
16161 16162 16163 16164
{
    char *bytes = NULL;
    int want = 1024*64;
    int ret = -1;
16165
    VIR_DEBUG("stream=%p, handler=%p, opaque=%p", stream, handler, opaque);
16166 16167 16168

    virResetLastError();

16169
    virCheckStreamReturn(stream, -1);
16170
    virCheckNonNullArgGoto(handler, cleanup);
16171

16172
    if (stream->flags & VIR_STREAM_NONBLOCK) {
16173 16174
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("data sinks cannot be used for non-blocking streams"));
16175 16176 16177 16178
        goto cleanup;
    }


16179
    if (VIR_ALLOC_N(bytes, want) < 0)
16180 16181 16182 16183 16184 16185 16186 16187 16188 16189 16190 16191 16192 16193 16194 16195 16196 16197 16198 16199 16200
        goto cleanup;

    for (;;) {
        int got, offset = 0;
        got = virStreamRecv(stream, bytes, want);
        if (got < 0)
            goto cleanup;
        if (got == 0)
            break;
        while (offset < got) {
            int done;
            done = (handler)(stream, bytes + offset, got - offset, opaque);
            if (done < 0) {
                virStreamAbort(stream);
                goto cleanup;
            }
            offset += done;
        }
    }
    ret = 0;

16201
 cleanup:
16202 16203 16204
    VIR_FREE(bytes);

    if (ret != 0)
16205
        virDispatchError(stream->conn);
16206 16207 16208 16209 16210 16211

    return ret;
}


/**
M
Matthias Bolte 已提交
16212
 * virStreamEventAddCallback:
16213 16214 16215 16216 16217 16218 16219 16220 16221 16222 16223 16224 16225
 * @stream: pointer to the stream object
 * @events: set of events to monitor
 * @cb: callback to invoke when an event occurs
 * @opaque: application defined data
 * @ff: callback to free @opaque data
 *
 * Register a callback to be notified when a stream
 * becomes writable, or readable. This is most commonly
 * used in conjunction with non-blocking data streams
 * to integrate into an event loop
 *
 * Returns 0 on success, -1 upon error
 */
16226 16227 16228 16229 16230 16231
int
virStreamEventAddCallback(virStreamPtr stream,
                          int events,
                          virStreamEventCallback cb,
                          void *opaque,
                          virFreeCallback ff)
16232
{
16233 16234
    VIR_DEBUG("stream=%p, events=%d, cb=%p, opaque=%p, ff=%p",
              stream, events, cb, opaque, ff);
16235 16236 16237

    virResetLastError();

16238
    virCheckStreamReturn(stream, -1);
16239 16240

    if (stream->driver &&
16241
        stream->driver->streamEventAddCallback) {
16242
        int ret;
16243
        ret = (stream->driver->streamEventAddCallback)(stream, events, cb, opaque, ff);
16244 16245 16246 16247 16248
        if (ret < 0)
            goto error;
        return ret;
    }

16249
    virReportUnsupportedError();
16250

16251
 error:
16252
    virDispatchError(stream->conn);
16253 16254 16255 16256 16257
    return -1;
}


/**
M
Matthias Bolte 已提交
16258
 * virStreamEventUpdateCallback:
16259 16260 16261 16262 16263 16264
 * @stream: pointer to the stream object
 * @events: set of events to monitor
 *
 * Changes the set of events to monitor for a stream. This allows
 * for event notification to be changed without having to
 * unregister & register the callback completely. This method
E
Eric Blake 已提交
16265
 * is guaranteed to succeed if a callback is already registered
16266 16267 16268
 *
 * Returns 0 on success, -1 if no callback is registered
 */
16269 16270 16271
int
virStreamEventUpdateCallback(virStreamPtr stream,
                             int events)
16272
{
16273
    VIR_DEBUG("stream=%p, events=%d", stream, events);
16274 16275 16276

    virResetLastError();

16277
    virCheckStreamReturn(stream, -1);
16278 16279

    if (stream->driver &&
16280
        stream->driver->streamEventUpdateCallback) {
16281
        int ret;
16282
        ret = (stream->driver->streamEventUpdateCallback)(stream, events);
16283 16284 16285 16286 16287
        if (ret < 0)
            goto error;
        return ret;
    }

16288
    virReportUnsupportedError();
16289

16290
 error:
16291
    virDispatchError(stream->conn);
16292 16293 16294
    return -1;
}

16295

16296
/**
M
Matthias Bolte 已提交
16297
 * virStreamEventRemoveCallback:
16298 16299
 * @stream: pointer to the stream object
 *
D
Dan Kenigsberg 已提交
16300
 * Remove an event callback from the stream
16301 16302 16303
 *
 * Returns 0 on success, -1 on error
 */
16304 16305
int
virStreamEventRemoveCallback(virStreamPtr stream)
16306
{
16307
    VIR_DEBUG("stream=%p", stream);
16308 16309 16310

    virResetLastError();

16311
    virCheckStreamReturn(stream, -1);
16312 16313

    if (stream->driver &&
16314
        stream->driver->streamEventRemoveCallback) {
16315
        int ret;
16316
        ret = (stream->driver->streamEventRemoveCallback)(stream);
16317 16318 16319 16320 16321
        if (ret < 0)
            goto error;
        return ret;
    }

16322
    virReportUnsupportedError();
16323

16324
 error:
16325
    virDispatchError(stream->conn);
16326 16327 16328
    return -1;
}

16329

16330 16331 16332 16333
/**
 * virStreamFinish:
 * @stream: pointer to the stream object
 *
16334
 * Indicate that there is no further data to be transmitted
16335 16336 16337 16338 16339 16340 16341 16342 16343 16344
 * on the stream. For output streams this should be called once
 * all data has been written. For input streams this should be
 * called once virStreamRecv returns end-of-file.
 *
 * This method is a synchronization point for all asynchronous
 * errors, so if this returns a success code the application can
 * be sure that all data has been successfully processed.
 *
 * Returns 0 on success, -1 upon error
 */
16345 16346
int
virStreamFinish(virStreamPtr stream)
16347
{
16348
    VIR_DEBUG("stream=%p", stream);
16349 16350 16351

    virResetLastError();

16352
    virCheckStreamReturn(stream, -1);
16353 16354 16355 16356 16357 16358 16359 16360 16361 16362

    if (stream->driver &&
        stream->driver->streamFinish) {
        int ret;
        ret = (stream->driver->streamFinish)(stream);
        if (ret < 0)
            goto error;
        return ret;
    }

16363
    virReportUnsupportedError();
16364

16365
 error:
16366
    virDispatchError(stream->conn);
16367 16368 16369
    return -1;
}

16370

16371 16372 16373 16374 16375 16376 16377 16378 16379 16380 16381 16382 16383
/**
 * virStreamAbort:
 * @stream: pointer to the stream object
 *
 * Request that the in progress data transfer be cancelled
 * abnormally before the end of the stream has been reached.
 * For output streams this can be used to inform the driver
 * that the stream is being terminated early. For input
 * streams this can be used to inform the driver that it
 * should stop sending data.
 *
 * Returns 0 on success, -1 upon error
 */
16384 16385
int
virStreamAbort(virStreamPtr stream)
16386
{
16387
    VIR_DEBUG("stream=%p", stream);
16388 16389 16390

    virResetLastError();

16391
    virCheckStreamReturn(stream, -1);
16392

16393 16394 16395 16396 16397 16398
    if (!stream->driver) {
        VIR_DEBUG("aborting unused stream");
        return 0;
    }

    if (stream->driver->streamAbort) {
16399 16400 16401 16402 16403 16404 16405
        int ret;
        ret = (stream->driver->streamAbort)(stream);
        if (ret < 0)
            goto error;
        return ret;
    }

16406
    virReportUnsupportedError();
16407

16408
 error:
16409
    virDispatchError(stream->conn);
16410 16411 16412
    return -1;
}

16413

16414 16415 16416 16417 16418 16419 16420
/**
 * virStreamFree:
 * @stream: pointer to the stream object
 *
 * Decrement the reference count on a stream, releasing
 * the stream object if the reference count has hit zero.
 *
D
Dan Kenigsberg 已提交
16421
 * There must not be an active data transfer in progress
16422 16423 16424 16425 16426 16427
 * when releasing the stream. If a stream needs to be
 * disposed of prior to end of stream being reached, then
 * the virStreamAbort function should be called first.
 *
 * Returns 0 upon success, or -1 on error
 */
16428 16429
int
virStreamFree(virStreamPtr stream)
16430
{
16431
    VIR_DEBUG("stream=%p", stream);
16432 16433 16434

    virResetLastError();

16435
    virCheckStreamReturn(stream, -1);
16436 16437 16438

    /* XXX Enforce shutdown before free'ing resources ? */

16439
    virObjectUnref(stream);
16440
    return 0;
16441
}
16442 16443 16444 16445 16446 16447 16448 16449 16450 16451


/**
 * virDomainIsActive:
 * @dom: pointer to the domain object
 *
 * Determine if the domain is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
16452 16453
int
virDomainIsActive(virDomainPtr dom)
16454
{
16455
    VIR_DEBUG("dom=%p", dom);
16456 16457 16458

    virResetLastError();

16459 16460
    virCheckDomainReturn(dom, -1);

16461 16462 16463 16464 16465 16466 16467 16468
    if (dom->conn->driver->domainIsActive) {
        int ret;
        ret = dom->conn->driver->domainIsActive(dom);
        if (ret < 0)
            goto error;
        return ret;
    }

16469
    virReportUnsupportedError();
16470
 error:
16471
    virDispatchError(dom->conn);
16472 16473 16474
    return -1;
}

16475

16476 16477 16478 16479 16480 16481 16482 16483 16484
/**
 * virDomainIsPersistent:
 * @dom: pointer to the domain object
 *
 * Determine if the domain has a persistent configuration
 * which means it will still exist after shutting down
 *
 * Returns 1 if persistent, 0 if transient, -1 on error
 */
16485 16486
int
virDomainIsPersistent(virDomainPtr dom)
16487
{
16488
    VIR_DOMAIN_DEBUG(dom);
16489 16490 16491

    virResetLastError();

16492 16493
    virCheckDomainReturn(dom, -1);

16494 16495 16496 16497 16498 16499 16500 16501
    if (dom->conn->driver->domainIsPersistent) {
        int ret;
        ret = dom->conn->driver->domainIsPersistent(dom);
        if (ret < 0)
            goto error;
        return ret;
    }

16502
    virReportUnsupportedError();
16503
 error:
16504
    virDispatchError(dom->conn);
16505 16506 16507
    return -1;
}

16508

16509 16510 16511 16512 16513 16514 16515 16516
/**
 * virDomainIsUpdated:
 * @dom: pointer to the domain object
 *
 * Determine if the domain has been updated.
 *
 * Returns 1 if updated, 0 if not, -1 on error
 */
16517 16518
int
virDomainIsUpdated(virDomainPtr dom)
16519
{
16520
    VIR_DOMAIN_DEBUG(dom);
16521 16522 16523

    virResetLastError();

16524 16525
    virCheckDomainReturn(dom, -1);

16526 16527 16528 16529 16530 16531 16532 16533
    if (dom->conn->driver->domainIsUpdated) {
        int ret;
        ret = dom->conn->driver->domainIsUpdated(dom);
        if (ret < 0)
            goto error;
        return ret;
    }

16534
    virReportUnsupportedError();
16535
 error:
16536 16537 16538 16539
    virDispatchError(dom->conn);
    return -1;
}

16540

16541 16542 16543 16544 16545 16546 16547 16548
/**
 * virNetworkIsActive:
 * @net: pointer to the network object
 *
 * Determine if the network is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
16549 16550
int
virNetworkIsActive(virNetworkPtr net)
16551
{
16552
    VIR_DEBUG("net=%p", net);
16553 16554 16555

    virResetLastError();

16556 16557
    virCheckNetworkReturn(net, -1);

16558 16559 16560 16561 16562 16563 16564 16565
    if (net->conn->networkDriver->networkIsActive) {
        int ret;
        ret = net->conn->networkDriver->networkIsActive(net);
        if (ret < 0)
            goto error;
        return ret;
    }

16566
    virReportUnsupportedError();
16567
 error:
16568
    virDispatchError(net->conn);
16569 16570 16571 16572 16573 16574 16575 16576 16577 16578 16579 16580 16581
    return -1;
}


/**
 * virNetworkIsPersistent:
 * @net: pointer to the network object
 *
 * Determine if the network has a persistent configuration
 * which means it will still exist after shutting down
 *
 * Returns 1 if persistent, 0 if transient, -1 on error
 */
16582 16583
int
virNetworkIsPersistent(virNetworkPtr net)
16584
{
16585
    VIR_DEBUG("net=%p", net);
16586 16587 16588

    virResetLastError();

16589 16590
    virCheckNetworkReturn(net, -1);

16591 16592 16593 16594 16595 16596 16597 16598
    if (net->conn->networkDriver->networkIsPersistent) {
        int ret;
        ret = net->conn->networkDriver->networkIsPersistent(net);
        if (ret < 0)
            goto error;
        return ret;
    }

16599
    virReportUnsupportedError();
16600
 error:
16601
    virDispatchError(net->conn);
16602 16603 16604 16605 16606 16607 16608 16609 16610 16611 16612 16613
    return -1;
}


/**
 * virStoragePoolIsActive:
 * @pool: pointer to the storage pool object
 *
 * Determine if the storage pool is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
16614 16615
int
virStoragePoolIsActive(virStoragePoolPtr pool)
16616
{
16617
    VIR_DEBUG("pool=%p", pool);
16618 16619 16620

    virResetLastError();

16621 16622
    virCheckStoragePoolReturn(pool, -1);

16623
    if (pool->conn->storageDriver->storagePoolIsActive) {
16624
        int ret;
16625
        ret = pool->conn->storageDriver->storagePoolIsActive(pool);
16626 16627 16628 16629 16630
        if (ret < 0)
            goto error;
        return ret;
    }

16631
    virReportUnsupportedError();
16632
 error:
16633
    virDispatchError(pool->conn);
16634 16635 16636 16637 16638 16639 16640 16641 16642 16643 16644 16645 16646
    return -1;
}


/**
 * virStoragePoolIsPersistent:
 * @pool: pointer to the storage pool object
 *
 * Determine if the storage pool has a persistent configuration
 * which means it will still exist after shutting down
 *
 * Returns 1 if persistent, 0 if transient, -1 on error
 */
16647 16648
int
virStoragePoolIsPersistent(virStoragePoolPtr pool)
16649
{
16650
    VIR_DEBUG("pool=%p", pool);
16651 16652 16653

    virResetLastError();

16654 16655
    virCheckStoragePoolReturn(pool, -1);

16656
    if (pool->conn->storageDriver->storagePoolIsPersistent) {
16657
        int ret;
16658
        ret = pool->conn->storageDriver->storagePoolIsPersistent(pool);
16659 16660 16661 16662 16663
        if (ret < 0)
            goto error;
        return ret;
    }

16664
    virReportUnsupportedError();
16665
 error:
16666
    virDispatchError(pool->conn);
16667 16668 16669 16670
    return -1;
}


S
Stefan Berger 已提交
16671 16672 16673 16674 16675 16676 16677 16678 16679 16680 16681
/**
 * virConnectNumOfNWFilters:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of nwfilters.
 *
 * Returns the number of nwfilters found or -1 in case of error
 */
int
virConnectNumOfNWFilters(virConnectPtr conn)
{
16682
    VIR_DEBUG("conn=%p", conn);
S
Stefan Berger 已提交
16683 16684 16685

    virResetLastError();

16686
    virCheckConnectReturn(conn, -1);
S
Stefan Berger 已提交
16687

16688
    if (conn->nwfilterDriver && conn->nwfilterDriver->connectNumOfNWFilters) {
S
Stefan Berger 已提交
16689
        int ret;
16690
        ret = conn->nwfilterDriver->connectNumOfNWFilters(conn);
S
Stefan Berger 已提交
16691 16692 16693 16694 16695
        if (ret < 0)
            goto error;
        return ret;
    }

16696
    virReportUnsupportedError();
S
Stefan Berger 已提交
16697

16698
 error:
S
Stefan Berger 已提交
16699 16700 16701 16702
    virDispatchError(conn);
    return -1;
}

16703

16704 16705 16706 16707 16708 16709 16710 16711 16712 16713 16714 16715 16716 16717 16718 16719 16720 16721 16722 16723 16724 16725 16726 16727 16728 16729 16730 16731 16732
/**
 * virConnectListAllNWFilters:
 * @conn: Pointer to the hypervisor connection.
 * @filters: Pointer to a variable to store the array containing the network
 *           filter objects or NULL if the list is not required (just returns
 *           number of network filters).
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Collect the list of network filters, and allocate an array to store those
 * objects.
 *
 * Returns the number of network filters found or -1 and sets @filters to  NULL
 * in case of error.  On success, the array stored into @filters is guaranteed to
 * have an extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virNWFilterFree() on each array element, then calling free() on @filters.
 */
int
virConnectListAllNWFilters(virConnectPtr conn,
                           virNWFilterPtr **filters,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, filters=%p, flags=%x", conn, filters, flags);

    virResetLastError();

    if (filters)
        *filters = NULL;

16733
    virCheckConnectReturn(conn, -1);
16734 16735

    if (conn->nwfilterDriver &&
16736
        conn->nwfilterDriver->connectListAllNWFilters) {
16737
        int ret;
16738
        ret = conn->nwfilterDriver->connectListAllNWFilters(conn, filters, flags);
16739 16740 16741 16742 16743
        if (ret < 0)
            goto error;
        return ret;
    }

16744
    virReportUnsupportedError();
16745

16746
 error:
16747 16748 16749
    virDispatchError(conn);
    return -1;
}
S
Stefan Berger 已提交
16750

16751

S
Stefan Berger 已提交
16752 16753 16754 16755 16756 16757 16758 16759 16760 16761 16762 16763 16764
/**
 * virConnectListNWFilters:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of network filters
 * @maxnames: size of @names
 *
 * Collect the list of network filters, and store their names in @names
 *
 * Returns the number of network filters found or -1 in case of error
 */
int
virConnectListNWFilters(virConnectPtr conn, char **const names, int maxnames)
{
16765
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
S
Stefan Berger 已提交
16766 16767 16768

    virResetLastError();

16769
    virCheckConnectReturn(conn, -1);
16770 16771
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
S
Stefan Berger 已提交
16772

16773
    if (conn->nwfilterDriver && conn->nwfilterDriver->connectListNWFilters) {
S
Stefan Berger 已提交
16774
        int ret;
16775
        ret = conn->nwfilterDriver->connectListNWFilters(conn, names, maxnames);
S
Stefan Berger 已提交
16776 16777 16778 16779 16780
        if (ret < 0)
            goto error;
        return ret;
    }

16781
    virReportUnsupportedError();
S
Stefan Berger 已提交
16782

16783
 error:
S
Stefan Berger 已提交
16784 16785 16786 16787 16788 16789 16790 16791 16792 16793 16794 16795 16796 16797 16798 16799 16800 16801
    virDispatchError(conn);
    return -1;
}


/**
 * virNWFilterLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the network filter
 *
 * Try to lookup a network filter on the given hypervisor based on its name.
 *
 * Returns a new nwfilter object or NULL in case of failure.  If the
 * network filter cannot be found, then VIR_ERR_NO_NWFILTER error is raised.
 */
virNWFilterPtr
virNWFilterLookupByName(virConnectPtr conn, const char *name)
{
16802
    VIR_DEBUG("conn=%p, name=%s", conn, name);
S
Stefan Berger 已提交
16803 16804 16805

    virResetLastError();

16806
    virCheckConnectReturn(conn, NULL);
16807
    virCheckNonNullArgGoto(name, error);
S
Stefan Berger 已提交
16808 16809 16810

    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterLookupByName) {
        virNWFilterPtr ret;
16811
        ret = conn->nwfilterDriver->nwfilterLookupByName(conn, name);
S
Stefan Berger 已提交
16812 16813 16814 16815 16816
        if (!ret)
            goto error;
        return ret;
    }

16817
    virReportUnsupportedError();
S
Stefan Berger 已提交
16818

16819
 error:
S
Stefan Berger 已提交
16820 16821 16822 16823
    virDispatchError(conn);
    return NULL;
}

16824

S
Stefan Berger 已提交
16825 16826 16827 16828 16829 16830 16831 16832 16833 16834 16835 16836 16837
/**
 * virNWFilterLookupByUUID:
 * @conn: pointer to the hypervisor connection
 * @uuid: the raw UUID for the network filter
 *
 * Try to lookup a network filter on the given hypervisor based on its UUID.
 *
 * Returns a new nwfilter object or NULL in case of failure.  If the
 * nwfdilter cannot be found, then VIR_ERR_NO_NWFILTER error is raised.
 */
virNWFilterPtr
virNWFilterLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
{
16838
    VIR_UUID_DEBUG(conn, uuid);
S
Stefan Berger 已提交
16839 16840 16841

    virResetLastError();

16842
    virCheckConnectReturn(conn, NULL);
16843
    virCheckNonNullArgGoto(uuid, error);
S
Stefan Berger 已提交
16844 16845 16846

    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterLookupByUUID){
        virNWFilterPtr ret;
16847
        ret = conn->nwfilterDriver->nwfilterLookupByUUID(conn, uuid);
S
Stefan Berger 已提交
16848 16849 16850 16851 16852
        if (!ret)
            goto error;
        return ret;
    }

16853
    virReportUnsupportedError();
S
Stefan Berger 已提交
16854

16855
 error:
S
Stefan Berger 已提交
16856 16857 16858 16859
    virDispatchError(conn);
    return NULL;
}

16860

S
Stefan Berger 已提交
16861
/**
16862
 * virNWFilterLookupByUUIDString:
S
Stefan Berger 已提交
16863 16864 16865 16866 16867 16868 16869 16870 16871 16872 16873 16874
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the nwfilter
 *
 * Try to lookup an nwfilter on the given hypervisor based on its UUID.
 *
 * Returns a new nwfilter object or NULL in case of failure.  If the
 * nwfilter cannot be found, then VIR_ERR_NO_NWFILTER error is raised.
 */
virNWFilterPtr
virNWFilterLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
    unsigned char uuid[VIR_UUID_BUFLEN];
16875
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
S
Stefan Berger 已提交
16876 16877 16878

    virResetLastError();

16879
    virCheckConnectReturn(conn, NULL);
16880
    virCheckNonNullArgGoto(uuidstr, error);
S
Stefan Berger 已提交
16881 16882

    if (virUUIDParse(uuidstr, uuid) < 0) {
16883 16884 16885
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
S
Stefan Berger 已提交
16886 16887 16888 16889 16890
        goto error;
    }

    return virNWFilterLookupByUUID(conn, &uuid[0]);

16891
 error:
S
Stefan Berger 已提交
16892 16893 16894 16895
    virDispatchError(conn);
    return NULL;
}

16896

S
Stefan Berger 已提交
16897 16898 16899 16900 16901 16902 16903 16904 16905 16906 16907 16908
/**
 * virNWFilterFree:
 * @nwfilter: a nwfilter object
 *
 * Free the nwfilter object. The running instance is kept alive.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNWFilterFree(virNWFilterPtr nwfilter)
{
16909
    VIR_DEBUG("nwfilter=%p", nwfilter);
S
Stefan Berger 已提交
16910 16911 16912

    virResetLastError();

16913
    virCheckNWFilterReturn(nwfilter, -1);
16914 16915

    virObjectUnref(nwfilter);
S
Stefan Berger 已提交
16916 16917 16918
    return 0;
}

16919

S
Stefan Berger 已提交
16920 16921 16922 16923 16924 16925 16926 16927 16928 16929 16930 16931
/**
 * virNWFilterGetName:
 * @nwfilter: a nwfilter object
 *
 * Get the public name for the network filter
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the nwfilter object.
 */
const char *
virNWFilterGetName(virNWFilterPtr nwfilter)
{
16932
    VIR_DEBUG("nwfilter=%p", nwfilter);
S
Stefan Berger 已提交
16933 16934 16935

    virResetLastError();

16936 16937
    virCheckNWFilterReturn(nwfilter, NULL);

16938
    return nwfilter->name;
S
Stefan Berger 已提交
16939 16940
}

16941

S
Stefan Berger 已提交
16942 16943 16944 16945 16946 16947 16948 16949 16950 16951 16952 16953
/**
 * virNWFilterGetUUID:
 * @nwfilter: a nwfilter object
 * @uuid: pointer to a VIR_UUID_BUFLEN bytes array
 *
 * Get the UUID for a network filter
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNWFilterGetUUID(virNWFilterPtr nwfilter, unsigned char *uuid)
{
16954
    VIR_DEBUG("nwfilter=%p, uuid=%p", nwfilter, uuid);
S
Stefan Berger 已提交
16955 16956 16957

    virResetLastError();

16958
    virCheckNWFilterReturn(nwfilter, -1);
16959
    virCheckNonNullArgGoto(uuid, error);
S
Stefan Berger 已提交
16960 16961 16962 16963 16964

    memcpy(uuid, &nwfilter->uuid[0], VIR_UUID_BUFLEN);

    return 0;

16965
 error:
S
Stefan Berger 已提交
16966 16967 16968 16969
    virDispatchError(nwfilter->conn);
    return -1;
}

16970

S
Stefan Berger 已提交
16971 16972 16973 16974 16975 16976 16977 16978 16979 16980 16981 16982 16983
/**
 * virNWFilterGetUUIDString:
 * @nwfilter: a nwfilter object
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
 *
 * Get the UUID for a network filter as string. For more information about
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNWFilterGetUUIDString(virNWFilterPtr nwfilter, char *buf)
{
16984
    VIR_DEBUG("nwfilter=%p, buf=%p", nwfilter, buf);
S
Stefan Berger 已提交
16985 16986 16987

    virResetLastError();

16988
    virCheckNWFilterReturn(nwfilter, -1);
16989
    virCheckNonNullArgGoto(buf, error);
S
Stefan Berger 已提交
16990

E
Eric Blake 已提交
16991
    virUUIDFormat(nwfilter->uuid, buf);
S
Stefan Berger 已提交
16992 16993
    return 0;

16994
 error:
S
Stefan Berger 已提交
16995 16996 16997 16998 16999 17000 17001 17002 17003 17004 17005 17006 17007 17008 17009 17010 17011 17012
    virDispatchError(nwfilter->conn);
    return -1;
}


/**
 * virNWFilterDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: an XML description of the nwfilter
 *
 * Define a new network filter, based on an XML description
 * similar to the one returned by virNWFilterGetXMLDesc()
 *
 * Returns a new nwfilter object or NULL in case of failure
 */
virNWFilterPtr
virNWFilterDefineXML(virConnectPtr conn, const char *xmlDesc)
{
17013
    VIR_DEBUG("conn=%p, xmlDesc=%s", conn, xmlDesc);
S
Stefan Berger 已提交
17014 17015 17016

    virResetLastError();

17017
    virCheckConnectReturn(conn, NULL);
17018
    virCheckNonNullArgGoto(xmlDesc, error);
17019
    virCheckReadOnlyGoto(conn->flags, error);
S
Stefan Berger 已提交
17020

17021
    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterDefineXML) {
S
Stefan Berger 已提交
17022
        virNWFilterPtr ret;
17023
        ret = conn->nwfilterDriver->nwfilterDefineXML(conn, xmlDesc);
S
Stefan Berger 已提交
17024 17025 17026 17027 17028
        if (!ret)
            goto error;
        return ret;
    }

17029
    virReportUnsupportedError();
S
Stefan Berger 已提交
17030

17031
 error:
S
Stefan Berger 已提交
17032 17033 17034 17035 17036 17037 17038 17039 17040 17041 17042 17043 17044 17045 17046 17047 17048 17049 17050
    virDispatchError(conn);
    return NULL;
}


/**
 * virNWFilterUndefine:
 * @nwfilter: a nwfilter object
 *
 * Undefine the nwfilter object. This call will not succeed if
 * a running VM is referencing the filter. This does not free the
 * associated virNWFilterPtr object.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNWFilterUndefine(virNWFilterPtr nwfilter)
{
    virConnectPtr conn;
17051
    VIR_DEBUG("nwfilter=%p", nwfilter);
S
Stefan Berger 已提交
17052 17053 17054

    virResetLastError();

17055
    virCheckNWFilterReturn(nwfilter, -1);
S
Stefan Berger 已提交
17056
    conn = nwfilter->conn;
17057

17058
    virCheckReadOnlyGoto(conn->flags, error);
S
Stefan Berger 已提交
17059

17060
    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterUndefine) {
S
Stefan Berger 已提交
17061
        int ret;
17062
        ret = conn->nwfilterDriver->nwfilterUndefine(nwfilter);
S
Stefan Berger 已提交
17063 17064 17065 17066 17067
        if (ret < 0)
            goto error;
        return ret;
    }

17068
    virReportUnsupportedError();
S
Stefan Berger 已提交
17069

17070
 error:
S
Stefan Berger 已提交
17071 17072 17073 17074 17075 17076 17077 17078
    virDispatchError(nwfilter->conn);
    return -1;
}


/**
 * virNWFilterGetXMLDesc:
 * @nwfilter: a nwfilter object
17079
 * @flags: extra flags; not used yet, so callers should always pass 0
S
Stefan Berger 已提交
17080 17081 17082 17083 17084 17085 17086 17087
 *
 * Provide an XML description of the network filter. The description may be
 * reused later to redefine the network filter with virNWFilterCreateXML().
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
17088
virNWFilterGetXMLDesc(virNWFilterPtr nwfilter, unsigned int flags)
S
Stefan Berger 已提交
17089 17090
{
    virConnectPtr conn;
17091
    VIR_DEBUG("nwfilter=%p, flags=%x", nwfilter, flags);
S
Stefan Berger 已提交
17092 17093 17094

    virResetLastError();

17095
    virCheckNWFilterReturn(nwfilter, NULL);
S
Stefan Berger 已提交
17096 17097
    conn = nwfilter->conn;

17098
    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterGetXMLDesc) {
S
Stefan Berger 已提交
17099
        char *ret;
17100
        ret = conn->nwfilterDriver->nwfilterGetXMLDesc(nwfilter, flags);
S
Stefan Berger 已提交
17101 17102 17103 17104 17105
        if (!ret)
            goto error;
        return ret;
    }

17106
    virReportUnsupportedError();
S
Stefan Berger 已提交
17107

17108
 error:
S
Stefan Berger 已提交
17109 17110 17111 17112 17113 17114 17115 17116 17117 17118 17119 17120 17121 17122 17123 17124 17125 17126 17127 17128 17129 17130 17131 17132 17133
    virDispatchError(nwfilter->conn);
    return NULL;
}


/**
 * virNWFilterRef:
 * @nwfilter: the nwfilter to hold a reference on
 *
 * Increment the reference count on the nwfilter. For each
 * additional call to this method, there shall be a corresponding
 * call to virNWFilterFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using an nwfilter would increment
 * the reference count.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virNWFilterRef(virNWFilterPtr nwfilter)
{
17134 17135 17136
    VIR_DEBUG("nwfilter=%p refs=%d", nwfilter,
              nwfilter ? nwfilter->object.u.s.refs : 0);

17137 17138
    virResetLastError();

17139 17140
    virCheckNWFilterReturn(nwfilter, -1);

17141
    virObjectRef(nwfilter);
S
Stefan Berger 已提交
17142 17143 17144 17145
    return 0;
}


17146 17147 17148 17149 17150 17151 17152 17153
/**
 * virInterfaceIsActive:
 * @iface: pointer to the interface object
 *
 * Determine if the interface is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
17154 17155
int
virInterfaceIsActive(virInterfacePtr iface)
17156
{
17157
    VIR_DEBUG("iface=%p", iface);
17158 17159 17160

    virResetLastError();

17161 17162
    virCheckInterfaceReturn(iface, -1);

17163 17164 17165 17166 17167 17168 17169 17170
    if (iface->conn->interfaceDriver->interfaceIsActive) {
        int ret;
        ret = iface->conn->interfaceDriver->interfaceIsActive(iface);
        if (ret < 0)
            goto error;
        return ret;
    }

17171
    virReportUnsupportedError();
17172
 error:
17173
    virDispatchError(iface->conn);
17174 17175 17176 17177 17178 17179 17180 17181 17182 17183 17184 17185
    return -1;
}


/**
 * virConnectIsEncrypted:
 * @conn: pointer to the connection object
 *
 * Determine if the connection to the hypervisor is encrypted
 *
 * Returns 1 if encrypted, 0 if not encrypted, -1 on error
 */
17186 17187
int
virConnectIsEncrypted(virConnectPtr conn)
17188
{
17189
    VIR_DEBUG("conn=%p", conn);
17190 17191 17192

    virResetLastError();

17193
    virCheckConnectReturn(conn, -1);
17194
    if (conn->driver->connectIsEncrypted) {
17195
        int ret;
17196
        ret = conn->driver->connectIsEncrypted(conn);
17197 17198 17199 17200 17201
        if (ret < 0)
            goto error;
        return ret;
    }

17202
    virReportUnsupportedError();
17203
 error:
17204
    virDispatchError(conn);
17205 17206 17207
    return -1;
}

17208

17209 17210 17211 17212 17213 17214 17215 17216 17217 17218
/**
 * virConnectIsSecure:
 * @conn: pointer to the connection object
 *
 * Determine if the connection to the hypervisor is secure
 *
 * A connection will be classed as secure if it is either
 * encrypted, or running over a channel which is not exposed
 * to eavesdropping (eg a UNIX domain socket, or pipe)
 *
C
Claudio Bley 已提交
17219
 * Returns 1 if secure, 0 if not secure, -1 on error
17220
 */
17221 17222
int
virConnectIsSecure(virConnectPtr conn)
17223
{
17224
    VIR_DEBUG("conn=%p", conn);
17225 17226 17227

    virResetLastError();

17228
    virCheckConnectReturn(conn, -1);
17229
    if (conn->driver->connectIsSecure) {
17230
        int ret;
17231
        ret = conn->driver->connectIsSecure(conn);
17232 17233 17234 17235 17236
        if (ret < 0)
            goto error;
        return ret;
    }

17237
    virReportUnsupportedError();
17238
 error:
17239
    virDispatchError(conn);
17240 17241
    return -1;
}
J
Jiri Denemark 已提交
17242 17243 17244 17245 17246


/**
 * virConnectCompareCPU:
 * @conn: virConnect connection
17247
 * @xmlDesc: XML describing the CPU to compare with host CPU
17248
 * @flags: extra flags; not used yet, so callers should always pass 0
17249 17250
 *
 * Compares the given CPU description with the host CPU
J
Jiri Denemark 已提交
17251 17252 17253 17254 17255 17256 17257 17258
 *
 * Returns comparison result according to enum virCPUCompareResult
 */
int
virConnectCompareCPU(virConnectPtr conn,
                     const char *xmlDesc,
                     unsigned int flags)
{
17259
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
J
Jiri Denemark 已提交
17260 17261 17262

    virResetLastError();

17263
    virCheckConnectReturn(conn, VIR_CPU_COMPARE_ERROR);
17264
    virCheckNonNullArgGoto(xmlDesc, error);
J
Jiri Denemark 已提交
17265

17266
    if (conn->driver->connectCompareCPU) {
J
Jiri Denemark 已提交
17267 17268
        int ret;

17269
        ret = conn->driver->connectCompareCPU(conn, xmlDesc, flags);
J
Jiri Denemark 已提交
17270 17271 17272 17273 17274
        if (ret == VIR_CPU_COMPARE_ERROR)
            goto error;
        return ret;
    }

17275
    virReportUnsupportedError();
J
Jiri Denemark 已提交
17276

17277
 error:
17278
    virDispatchError(conn);
J
Jiri Denemark 已提交
17279 17280
    return VIR_CPU_COMPARE_ERROR;
}
17281 17282


17283 17284 17285 17286 17287 17288 17289 17290 17291 17292 17293 17294 17295 17296 17297 17298 17299 17300 17301 17302 17303 17304 17305 17306 17307 17308
/**
 * virConnectGetCPUModelNames:
 *
 * @conn: virConnect connection
 * @arch: Architecture
 * @models: Pointer to a variable to store the NULL-terminated array of the
 *          CPU models supported for the specified architecture.  Each element
 *          and the array itself must be freed by the caller with free.  Pass
 *          NULL if only the list length is needed.
 * @flags: extra flags; not used yet, so callers should always pass 0.
 *
 * Get the list of supported CPU models for a specific architecture.
 *
 * Returns -1 on error, number of elements in @models on success.
 */
int
virConnectGetCPUModelNames(virConnectPtr conn, const char *arch, char ***models,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, arch=%s, models=%p, flags=%x",
              conn, arch, models, flags);
    virResetLastError();

    if (models)
        *models = NULL;

17309
    virCheckConnectReturn(conn, -1);
17310
    virCheckNonNullArgGoto(arch, error);
17311 17312 17313 17314 17315 17316 17317 17318 17319 17320 17321

    if (conn->driver->connectGetCPUModelNames) {
        int ret;

        ret = conn->driver->connectGetCPUModelNames(conn, arch, models, flags);
        if (ret < 0)
            goto error;

        return ret;
    }

17322
    virReportUnsupportedError();
17323

17324
 error:
17325 17326 17327 17328 17329
    virDispatchError(conn);
    return -1;
}


17330 17331 17332 17333 17334 17335
/**
 * virConnectBaselineCPU:
 *
 * @conn: virConnect connection
 * @xmlCPUs: array of XML descriptions of host CPUs
 * @ncpus: number of CPUs in xmlCPUs
17336
 * @flags: bitwise-OR of virConnectBaselineCPUFlags
17337 17338 17339 17340
 *
 * Computes the most feature-rich CPU which is compatible with all given
 * host CPUs.
 *
17341 17342 17343 17344 17345
 * If @flags includes VIR_CONNECT_BASELINE_CPU_EXPAND_FEATURES then libvirt
 * will explicitly list all CPU features that are part of the host CPU,
 * without this flag features that are part of the CPU model will not be
 * listed.
 *
17346 17347 17348 17349 17350 17351 17352 17353
 * Returns XML description of the computed CPU or NULL on error.
 */
char *
virConnectBaselineCPU(virConnectPtr conn,
                      const char **xmlCPUs,
                      unsigned int ncpus,
                      unsigned int flags)
{
17354
    size_t i;
17355

17356
    VIR_DEBUG("conn=%p, xmlCPUs=%p, ncpus=%u, flags=%x",
17357 17358 17359
              conn, xmlCPUs, ncpus, flags);
    if (xmlCPUs) {
        for (i = 0; i < ncpus; i++)
17360
            VIR_DEBUG("xmlCPUs[%zu]=%s", i, NULLSTR(xmlCPUs[i]));
17361 17362 17363 17364
    }

    virResetLastError();

17365
    virCheckConnectReturn(conn, NULL);
17366
    virCheckNonNullArgGoto(xmlCPUs, error);
17367

17368
    if (conn->driver->connectBaselineCPU) {
17369 17370
        char *cpu;

17371
        cpu = conn->driver->connectBaselineCPU(conn, xmlCPUs, ncpus, flags);
17372 17373 17374 17375 17376
        if (!cpu)
            goto error;
        return cpu;
    }

17377
    virReportUnsupportedError();
17378

17379
 error:
17380 17381 17382
    virDispatchError(conn);
    return NULL;
}
17383 17384 17385 17386 17387 17388 17389 17390 17391 17392


/**
 * virDomainGetJobInfo:
 * @domain: a domain object
 * @info: pointer to a virDomainJobInfo structure allocated by the user
 *
 * Extract information about progress of a background job on a domain.
 * Will return an error if the domain is not active.
 *
E
Eric Blake 已提交
17393 17394 17395
 * This function returns a limited amount of information in comparison
 * to virDomainGetJobStats().
 *
17396 17397 17398 17399 17400 17401
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetJobInfo(virDomainPtr domain, virDomainJobInfoPtr info)
{
    virConnectPtr conn;
17402 17403

    VIR_DOMAIN_DEBUG(domain, "info=%p", info);
17404 17405 17406

    virResetLastError();

17407 17408 17409
    if (info)
        memset(info, 0, sizeof(*info));

17410
    virCheckDomainReturn(domain, -1);
17411
    virCheckNonNullArgGoto(info, error);
17412 17413 17414 17415 17416

    conn = domain->conn;

    if (conn->driver->domainGetJobInfo) {
        int ret;
17417
        ret = conn->driver->domainGetJobInfo(domain, info);
17418 17419 17420 17421 17422
        if (ret < 0)
            goto error;
        return ret;
    }

17423
    virReportUnsupportedError();
17424

17425
 error:
17426 17427
    virDispatchError(domain->conn);
    return -1;
17428 17429 17430 17431 17432 17433 17434 17435 17436 17437 17438 17439 17440 17441 17442 17443 17444 17445 17446 17447 17448 17449 17450 17451 17452 17453 17454 17455 17456 17457 17458 17459 17460 17461 17462
}


/**
 * virDomainGetJobStats:
 * @domain: a domain object
 * @type: where to store the job type (one of virDomainJobType)
 * @params: where to store job statistics
 * @nparams: number of items in @params
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Extract information about progress of a background job on a domain.
 * Will return an error if the domain is not active. The function returns
 * a superset of progress information provided by virDomainGetJobInfo.
 * Possible fields returned in @params are defined by VIR_DOMAIN_JOB_*
 * macros and new fields will likely be introduced in the future so callers
 * may receive fields that they do not understand in case they talk to a
 * newer server.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetJobStats(virDomainPtr domain,
                     int *type,
                     virTypedParameterPtr *params,
                     int *nparams,
                     unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "type=%p, params=%p, nparams=%p, flags=%x",
                     type, params, nparams, flags);

    virResetLastError();

17463
    virCheckDomainReturn(domain, -1);
17464 17465 17466 17467 17468 17469 17470 17471 17472 17473 17474 17475 17476 17477 17478
    virCheckNonNullArgGoto(type, error);
    virCheckNonNullArgGoto(params, error);
    virCheckNonNullArgGoto(nparams, error);

    conn = domain->conn;

    if (conn->driver->domainGetJobStats) {
        int ret;
        ret = conn->driver->domainGetJobStats(domain, type, params,
                                              nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

17479
    virReportUnsupportedError();
17480

17481
 error:
17482 17483
    virDispatchError(domain->conn);
    return -1;
17484
}
17485 17486 17487 17488 17489 17490 17491


/**
 * virDomainAbortJob:
 * @domain: a domain object
 *
 * Requests that the current background job be aborted at the
M
Michal Privoznik 已提交
17492
 * soonest opportunity.
17493 17494 17495 17496 17497 17498 17499 17500
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainAbortJob(virDomainPtr domain)
{
    virConnectPtr conn;

17501
    VIR_DOMAIN_DEBUG(domain);
17502 17503 17504

    virResetLastError();

17505
    virCheckDomainReturn(domain, -1);
17506
    conn = domain->conn;
17507

17508
    virCheckReadOnlyGoto(conn->flags, error);
17509 17510 17511 17512 17513 17514 17515 17516 17517

    if (conn->driver->domainAbortJob) {
        int ret;
        ret = conn->driver->domainAbortJob(domain);
        if (ret < 0)
            goto error;
        return ret;
    }

17518
    virReportUnsupportedError();
17519

17520
 error:
17521 17522 17523
    virDispatchError(conn);
    return -1;
}
17524 17525 17526 17527 17528 17529


/**
 * virDomainMigrateSetMaxDowntime:
 * @domain: a domain object
 * @downtime: maximum tolerable downtime for live migration, in milliseconds
17530
 * @flags: extra flags; not used yet, so callers should always pass 0
17531 17532 17533 17534 17535 17536 17537 17538 17539 17540 17541 17542 17543 17544
 *
 * Sets maximum tolerable time for which the domain is allowed to be paused
 * at the end of live migration. It's supposed to be called while the domain is
 * being live-migrated as a reaction to migration progress.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateSetMaxDowntime(virDomainPtr domain,
                               unsigned long long downtime,
                               unsigned int flags)
{
    virConnectPtr conn;

17545
    VIR_DOMAIN_DEBUG(domain, "downtime=%llu, flags=%x", downtime, flags);
17546 17547 17548

    virResetLastError();

17549
    virCheckDomainReturn(domain, -1);
17550
    conn = domain->conn;
17551

17552
    virCheckReadOnlyGoto(conn->flags, error);
17553 17554 17555 17556 17557 17558 17559

    if (conn->driver->domainMigrateSetMaxDowntime) {
        if (conn->driver->domainMigrateSetMaxDowntime(domain, downtime, flags) < 0)
            goto error;
        return 0;
    }

17560
    virReportUnsupportedError();
17561
 error:
17562 17563 17564 17565
    virDispatchError(conn);
    return -1;
}

17566

17567 17568 17569 17570 17571 17572 17573 17574 17575 17576 17577 17578 17579 17580 17581 17582 17583 17584 17585 17586 17587 17588
/**
 * virDomainMigrateGetCompressionCache:
 * @domain: a domain object
 * @cacheSize: return value of current size of the cache (in bytes)
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Gets current size of the cache (in bytes) used for compressing repeatedly
 * transferred memory pages during live migration.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateGetCompressionCache(virDomainPtr domain,
                                    unsigned long long *cacheSize,
                                    unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cacheSize=%p, flags=%x", cacheSize, flags);

    virResetLastError();

17589
    virCheckDomainReturn(domain, -1);
17590 17591 17592 17593 17594 17595 17596 17597 17598 17599 17600
    conn = domain->conn;

    virCheckNonNullArgGoto(cacheSize, error);

    if (conn->driver->domainMigrateGetCompressionCache) {
        if (conn->driver->domainMigrateGetCompressionCache(domain, cacheSize,
                                                           flags) < 0)
            goto error;
        return 0;
    }

17601
    virReportUnsupportedError();
17602
 error:
17603 17604 17605 17606
    virDispatchError(conn);
    return -1;
}

17607

17608 17609 17610 17611 17612 17613 17614 17615 17616 17617 17618 17619 17620 17621 17622 17623 17624 17625 17626 17627 17628 17629 17630 17631 17632
/**
 * virDomainMigrateSetCompressionCache:
 * @domain: a domain object
 * @cacheSize: size of the cache (in bytes) used for compression
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Sets size of the cache (in bytes) used for compressing repeatedly
 * transferred memory pages during live migration. It's supposed to be called
 * while the domain is being live-migrated as a reaction to migration progress
 * and increasing number of compression cache misses obtained from
 * virDomainGetJobStats.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateSetCompressionCache(virDomainPtr domain,
                                    unsigned long long cacheSize,
                                    unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cacheSize=%llu, flags=%x", cacheSize, flags);

    virResetLastError();

17633
    virCheckDomainReturn(domain, -1);
17634
    conn = domain->conn;
17635

17636
    virCheckReadOnlyGoto(conn->flags, error);
17637 17638 17639 17640 17641 17642 17643 17644

    if (conn->driver->domainMigrateSetCompressionCache) {
        if (conn->driver->domainMigrateSetCompressionCache(domain, cacheSize,
                                                           flags) < 0)
            goto error;
        return 0;
    }

17645
    virReportUnsupportedError();
17646
 error:
17647 17648 17649 17650
    virDispatchError(conn);
    return -1;
}

17651

17652 17653 17654
/**
 * virDomainMigrateSetMaxSpeed:
 * @domain: a domain object
17655
 * @bandwidth: migration bandwidth limit in MiB/s
17656
 * @flags: extra flags; not used yet, so callers should always pass 0
17657
 *
17658
 * The maximum bandwidth (in MiB/s) that will be used to do migration
17659 17660 17661 17662 17663 17664 17665 17666 17667 17668 17669 17670
 * can be specified with the bandwidth parameter. Not all hypervisors
 * will support a bandwidth cap
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateSetMaxSpeed(virDomainPtr domain,
                            unsigned long bandwidth,
                            unsigned int flags)
{
    virConnectPtr conn;

17671
    VIR_DOMAIN_DEBUG(domain, "bandwidth=%lu, flags=%x", bandwidth, flags);
17672 17673 17674

    virResetLastError();

17675
    virCheckDomainReturn(domain, -1);
17676
    conn = domain->conn;
17677

17678
    virCheckReadOnlyGoto(conn->flags, error);
17679 17680 17681 17682 17683 17684 17685

    if (conn->driver->domainMigrateSetMaxSpeed) {
        if (conn->driver->domainMigrateSetMaxSpeed(domain, bandwidth, flags) < 0)
            goto error;
        return 0;
    }

17686
    virReportUnsupportedError();
17687
 error:
17688 17689 17690 17691
    virDispatchError(conn);
    return -1;
}

17692

17693 17694 17695
/**
 * virDomainMigrateGetMaxSpeed:
 * @domain: a domain object
17696
 * @bandwidth: return value of current migration bandwidth limit in MiB/s
17697
 * @flags: extra flags; not used yet, so callers should always pass 0
17698
 *
17699
 * Get the current maximum bandwidth (in MiB/s) that will be used if the
17700 17701 17702 17703 17704 17705 17706 17707 17708 17709 17710 17711 17712 17713 17714
 * domain is migrated.  Not all hypervisors will support a bandwidth limit.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateGetMaxSpeed(virDomainPtr domain,
                            unsigned long *bandwidth,
                            unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "bandwidth = %p, flags=%x", bandwidth, flags);

    virResetLastError();

17715
    virCheckDomainReturn(domain, -1);
17716 17717
    conn = domain->conn;

17718
    virCheckNonNullArgGoto(bandwidth, error);
17719
    virCheckReadOnlyGoto(conn->flags, error);
17720 17721 17722 17723 17724 17725 17726

    if (conn->driver->domainMigrateGetMaxSpeed) {
        if (conn->driver->domainMigrateGetMaxSpeed(domain, bandwidth, flags) < 0)
            goto error;
        return 0;
    }

17727
    virReportUnsupportedError();
17728
 error:
17729 17730 17731 17732
    virDispatchError(conn);
    return -1;
}

17733

17734 17735 17736 17737 17738 17739 17740 17741 17742 17743
/**
 * virConnectDomainEventRegisterAny:
 * @conn: pointer to the connection
 * @dom: pointer to the domain
 * @eventID: the event type to receive
 * @cb: callback to the function handling domain events
 * @opaque: opaque data to pass on to the callback
 * @freecb: optional function to deallocate opaque when not used anymore
 *
 * Adds a callback to receive notifications of arbitrary domain events
E
Eric Blake 已提交
17744 17745 17746
 * occurring on a domain.  This function requires that an event loop
 * has been previously registered with virEventRegisterImpl() or
 * virEventRegisterDefaultImpl().
17747
 *
17748
 * If @dom is NULL, then events will be monitored for any domain. If @dom
E
Eric Blake 已提交
17749
 * is non-NULL, then only the specific domain will be monitored.
17750 17751
 *
 * Most types of event have a callback providing a custom set of parameters
17752
 * for the event. When registering an event, it is thus necessary to use
17753 17754 17755 17756 17757
 * the VIR_DOMAIN_EVENT_CALLBACK() macro to cast the supplied function pointer
 * to match the signature of this method.
 *
 * The virDomainPtr object handle passed into the callback upon delivery
 * of an event is only valid for the duration of execution of the callback.
17758
 * If the callback wishes to keep the domain object after the callback returns,
17759
 * it shall take a reference to it, by calling virDomainRef().
17760
 * The reference can be released once the object is no longer required
17761
 * by calling virDomainFree().
17762 17763 17764
 *
 * The return value from this method is a positive integer identifier
 * for the callback. To unregister a callback, this callback ID should
17765
 * be passed to the virConnectDomainEventDeregisterAny() method.
17766
 *
E
Eric Blake 已提交
17767
 * Returns a callback identifier on success, -1 on failure.
17768 17769 17770 17771 17772 17773 17774 17775 17776
 */
int
virConnectDomainEventRegisterAny(virConnectPtr conn,
                                 virDomainPtr dom,
                                 int eventID,
                                 virConnectDomainEventGenericCallback cb,
                                 void *opaque,
                                 virFreeCallback freecb)
{
17777 17778 17779
    VIR_DOMAIN_DEBUG(dom, "conn=%p, eventID=%d, cb=%p, opaque=%p, freecb=%p",
                     conn, eventID, cb, opaque, freecb);

17780 17781
    virResetLastError();

17782
    virCheckConnectReturn(conn, -1);
17783 17784 17785 17786 17787 17788 17789 17790
    if (dom) {
        virCheckDomainGoto(dom, error);
        if (dom->conn != conn) {
            virReportInvalidArg(dom,
                                _("domain '%s' in %s must match connection"),
                                dom->name, __FUNCTION__);
            goto error;
        }
17791
    }
17792 17793 17794 17795 17796 17797
    virCheckNonNullArgGoto(cb, error);
    virCheckNonNegativeArgGoto(eventID, error);
    if (eventID >= VIR_DOMAIN_EVENT_ID_LAST) {
        virReportInvalidArg(eventID,
                            _("eventID in %s must be less than %d"),
                            __FUNCTION__, VIR_DOMAIN_EVENT_ID_LAST);
17798 17799 17800
        goto error;
    }

17801
    if (conn->driver && conn->driver->connectDomainEventRegisterAny) {
17802
        int ret;
17803
        ret = conn->driver->connectDomainEventRegisterAny(conn, dom, eventID, cb, opaque, freecb);
17804 17805 17806 17807 17808
        if (ret < 0)
            goto error;
        return ret;
    }

17809
    virReportUnsupportedError();
17810
 error:
17811 17812 17813
    virDispatchError(conn);
    return -1;
}
17814

17815

17816 17817 17818 17819 17820 17821
/**
 * virConnectDomainEventDeregisterAny:
 * @conn: pointer to the connection
 * @callbackID: the callback identifier
 *
 * Removes an event callback. The callbackID parameter should be the
17822
 * value obtained from a previous virConnectDomainEventRegisterAny() method.
17823
 *
17824 17825 17826
 * Returns 0 on success, -1 on failure.  Older versions of some hypervisors
 * sometimes returned a positive number on success, but without any reliable
 * semantics on what that number represents. */
17827 17828 17829 17830
int
virConnectDomainEventDeregisterAny(virConnectPtr conn,
                                   int callbackID)
{
17831
    VIR_DEBUG("conn=%p, callbackID=%d", conn, callbackID);
17832 17833 17834

    virResetLastError();

17835
    virCheckConnectReturn(conn, -1);
17836 17837
    virCheckNonNegativeArgGoto(callbackID, error);

17838
    if (conn->driver && conn->driver->connectDomainEventDeregisterAny) {
17839
        int ret;
17840
        ret = conn->driver->connectDomainEventDeregisterAny(conn, callbackID);
17841 17842 17843 17844 17845
        if (ret < 0)
            goto error;
        return ret;
    }

17846
    virReportUnsupportedError();
17847
 error:
17848 17849 17850
    virDispatchError(conn);
    return -1;
}
17851

17852

17853 17854 17855 17856 17857 17858 17859 17860 17861 17862
/**
 * virConnectNetworkEventRegisterAny:
 * @conn: pointer to the connection
 * @net: pointer to the network
 * @eventID: the event type to receive
 * @cb: callback to the function handling network events
 * @opaque: opaque data to pass on to the callback
 * @freecb: optional function to deallocate opaque when not used anymore
 *
 * Adds a callback to receive notifications of arbitrary network events
E
Eric Blake 已提交
17863 17864 17865
 * occurring on a network.  This function requires that an event loop
 * has been previously registered with virEventRegisterImpl() or
 * virEventRegisterDefaultImpl().
17866
 *
17867
 * If @net is NULL, then events will be monitored for any network. If @net
E
Eric Blake 已提交
17868
 * is non-NULL, then only the specific network will be monitored.
17869 17870 17871 17872 17873 17874 17875 17876 17877
 *
 * Most types of event have a callback providing a custom set of parameters
 * for the event. When registering an event, it is thus necessary to use
 * the VIR_NETWORK_EVENT_CALLBACK() macro to cast the supplied function pointer
 * to match the signature of this method.
 *
 * The virNetworkPtr object handle passed into the callback upon delivery
 * of an event is only valid for the duration of execution of the callback.
 * If the callback wishes to keep the network object after the callback
17878
 * returns, it shall take a reference to it, by calling virNetworkRef().
17879
 * The reference can be released once the object is no longer required
17880
 * by calling virNetworkFree().
17881 17882 17883
 *
 * The return value from this method is a positive integer identifier
 * for the callback. To unregister a callback, this callback ID should
17884
 * be passed to the virConnectNetworkEventDeregisterAny() method.
17885
 *
E
Eric Blake 已提交
17886
 * Returns a callback identifier on success, -1 on failure.
17887 17888 17889 17890 17891 17892 17893 17894 17895 17896 17897 17898 17899 17900
 */
int
virConnectNetworkEventRegisterAny(virConnectPtr conn,
                                  virNetworkPtr net,
                                  int eventID,
                                  virConnectNetworkEventGenericCallback cb,
                                  void *opaque,
                                  virFreeCallback freecb)
{
    VIR_DEBUG("conn=%p, eventID=%d, cb=%p, opaque=%p, freecb=%p",
              conn, eventID, cb, opaque, freecb);

    virResetLastError();

17901
    virCheckConnectReturn(conn, -1);
17902 17903 17904 17905 17906 17907 17908 17909
    if (net) {
        virCheckNetworkGoto(net, error);
        if (net->conn != conn) {
            virReportInvalidArg(net,
                                _("network '%s' in %s must match connection"),
                                net->name, __FUNCTION__);
            goto error;
        }
17910 17911 17912 17913 17914 17915 17916 17917 17918 17919 17920
    }
    virCheckNonNullArgGoto(cb, error);
    virCheckNonNegativeArgGoto(eventID, error);

    if (eventID >= VIR_NETWORK_EVENT_ID_LAST) {
        virReportInvalidArg(eventID,
                            _("eventID in %s must be less than %d"),
                            __FUNCTION__, VIR_NETWORK_EVENT_ID_LAST);
        goto error;
    }

17921
    if (conn->networkDriver && conn->networkDriver->connectNetworkEventRegisterAny) {
17922 17923 17924 17925 17926 17927 17928 17929 17930 17931
        int ret;
        ret = conn->networkDriver->connectNetworkEventRegisterAny(conn, net,
                                                                  eventID,
                                                                  cb, opaque,
                                                                  freecb);
        if (ret < 0)
            goto error;
        return ret;
    }

17932
    virReportUnsupportedError();
17933
 error:
17934 17935 17936 17937
    virDispatchError(conn);
    return -1;
}

17938

17939 17940 17941 17942 17943 17944
/**
 * virConnectNetworkEventDeregisterAny:
 * @conn: pointer to the connection
 * @callbackID: the callback identifier
 *
 * Removes an event callback. The callbackID parameter should be the
17945
 * value obtained from a previous virConnectNetworkEventRegisterAny() method.
17946 17947 17948 17949 17950 17951 17952 17953 17954 17955 17956
 *
 * Returns 0 on success, -1 on failure
 */
int
virConnectNetworkEventDeregisterAny(virConnectPtr conn,
                                    int callbackID)
{
    VIR_DEBUG("conn=%p, callbackID=%d", conn, callbackID);

    virResetLastError();

17957
    virCheckConnectReturn(conn, -1);
17958 17959
    virCheckNonNegativeArgGoto(callbackID, error);

17960 17961
    if (conn->networkDriver &&
        conn->networkDriver->connectNetworkEventDeregisterAny) {
17962 17963 17964 17965 17966 17967 17968 17969
        int ret;
        ret = conn->networkDriver->connectNetworkEventDeregisterAny(conn,
                                                                    callbackID);
        if (ret < 0)
            goto error;
        return ret;
    }

17970
    virReportUnsupportedError();
17971
 error:
17972 17973 17974 17975
    virDispatchError(conn);
    return -1;
}

17976

17977 17978 17979
/**
 * virDomainManagedSave:
 * @dom: pointer to the domain
17980
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
17981 17982 17983 17984 17985 17986 17987 17988
 *
 * This method will suspend a domain and save its memory contents to
 * a file on disk. After the call, if successful, the domain is not
 * listed as running anymore.
 * The difference from virDomainSave() is that libvirt is keeping track of
 * the saved state itself, and will reuse it once the domain is being
 * restarted (automatically or via an explicit libvirt call).
 * As a result any running domain is sure to not have a managed saved image.
17989 17990 17991
 * This also implies that managed save only works on persistent domains,
 * since the domain must still exist in order to use virDomainCreate() to
 * restart it.
17992
 *
17993 17994 17995 17996 17997
 * If @flags includes VIR_DOMAIN_SAVE_BYPASS_CACHE, then libvirt will
 * attempt to bypass the file system cache while creating the file, or
 * fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
17998 17999 18000 18001 18002 18003
 * Normally, the managed saved state will remember whether the domain
 * was running or paused, and start will resume to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override the default saved into the file.  These two
 * flags are mutually exclusive.
 *
18004 18005
 * Returns 0 in case of success or -1 in case of failure
 */
18006 18007
int
virDomainManagedSave(virDomainPtr dom, unsigned int flags)
18008 18009 18010
{
    virConnectPtr conn;

18011
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);
18012 18013 18014

    virResetLastError();

18015
    virCheckDomainReturn(dom, -1);
18016
    conn = dom->conn;
18017

18018
    virCheckReadOnlyGoto(conn->flags, error);
18019

18020
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
18021
        virReportInvalidArg(flags,
18022 18023
                            _("running and paused flags in %s are mutually "
                              "exclusive"),
18024
                            __FUNCTION__);
18025 18026 18027
        goto error;
    }

18028 18029 18030 18031 18032 18033 18034 18035 18036
    if (conn->driver->domainManagedSave) {
        int ret;

        ret = conn->driver->domainManagedSave(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18037
    virReportUnsupportedError();
18038

18039
 error:
18040 18041 18042 18043
    virDispatchError(conn);
    return -1;
}

18044

18045 18046 18047
/**
 * virDomainHasManagedSaveImage:
 * @dom: pointer to the domain
18048
 * @flags: extra flags; not used yet, so callers should always pass 0
18049 18050 18051 18052 18053 18054 18055 18056
 *
 * Check if a domain has a managed save image as created by
 * virDomainManagedSave(). Note that any running domain should not have
 * such an image, as it should have been removed on restart.
 *
 * Returns 0 if no image is present, 1 if an image is present, and
 *         -1 in case of error
 */
18057 18058
int
virDomainHasManagedSaveImage(virDomainPtr dom, unsigned int flags)
18059 18060 18061
{
    virConnectPtr conn;

18062
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);
18063 18064 18065

    virResetLastError();

18066
    virCheckDomainReturn(dom, -1);
18067 18068 18069 18070 18071 18072 18073 18074 18075 18076 18077
    conn = dom->conn;

    if (conn->driver->domainHasManagedSaveImage) {
        int ret;

        ret = conn->driver->domainHasManagedSaveImage(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18078
    virReportUnsupportedError();
18079

18080
 error:
18081 18082 18083 18084
    virDispatchError(conn);
    return -1;
}

18085

18086 18087 18088
/**
 * virDomainManagedSaveRemove:
 * @dom: pointer to the domain
18089
 * @flags: extra flags; not used yet, so callers should always pass 0
18090
 *
D
Daniel Veillard 已提交
18091
 * Remove any managed save image for this domain.
18092 18093 18094
 *
 * Returns 0 in case of success, and -1 in case of error
 */
18095 18096
int
virDomainManagedSaveRemove(virDomainPtr dom, unsigned int flags)
18097 18098 18099
{
    virConnectPtr conn;

18100
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);
18101 18102 18103

    virResetLastError();

18104
    virCheckDomainReturn(dom, -1);
18105
    conn = dom->conn;
18106

18107
    virCheckReadOnlyGoto(conn->flags, error);
18108 18109 18110 18111 18112 18113 18114 18115 18116 18117

    if (conn->driver->domainManagedSaveRemove) {
        int ret;

        ret = conn->driver->domainManagedSaveRemove(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18118
    virReportUnsupportedError();
18119

18120
 error:
18121 18122 18123
    virDispatchError(conn);
    return -1;
}
C
Chris Lalancette 已提交
18124

18125

18126 18127 18128 18129 18130 18131 18132 18133 18134 18135 18136 18137 18138 18139 18140 18141
/**
 * virDomainSnapshotGetName:
 * @snapshot: a snapshot object
 *
 * Get the public name for that snapshot
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * as its lifetime will be the same as the snapshot object.
 */
const char *
virDomainSnapshotGetName(virDomainSnapshotPtr snapshot)
{
    VIR_DEBUG("snapshot=%p", snapshot);

    virResetLastError();

18142 18143
    virCheckDomainSnapshotReturn(snapshot, NULL);

18144 18145 18146
    return snapshot->name;
}

18147

18148 18149 18150 18151
/**
 * virDomainSnapshotGetDomain:
 * @snapshot: a snapshot object
 *
18152 18153 18154 18155 18156 18157
 * Provides the domain pointer associated with a snapshot.  The
 * reference counter on the domain is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do not use this
 * function.  Instead, store the domain and the snapshot object together.
18158 18159 18160 18161 18162 18163 18164 18165 18166 18167
 *
 * Returns the domain or NULL.
 */
virDomainPtr
virDomainSnapshotGetDomain(virDomainSnapshotPtr snapshot)
{
    VIR_DEBUG("snapshot=%p", snapshot);

    virResetLastError();

18168 18169
    virCheckDomainSnapshotReturn(snapshot, NULL);

18170 18171 18172
    return snapshot->domain;
}

18173

18174 18175 18176 18177
/**
 * virDomainSnapshotGetConnect:
 * @snapshot: a snapshot object
 *
18178 18179 18180 18181 18182 18183
 * Provides the connection pointer associated with a snapshot.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do not use this
 * function.  Instead, store the connection and the snapshot object together.
18184 18185 18186 18187 18188 18189 18190 18191 18192 18193
 *
 * Returns the connection or NULL.
 */
virConnectPtr
virDomainSnapshotGetConnect(virDomainSnapshotPtr snapshot)
{
    VIR_DEBUG("snapshot=%p", snapshot);

    virResetLastError();

18194 18195
    virCheckDomainSnapshotReturn(snapshot, NULL);

18196 18197 18198
    return snapshot->domain->conn;
}

18199

C
Chris Lalancette 已提交
18200 18201 18202 18203
/**
 * virDomainSnapshotCreateXML:
 * @domain: a domain object
 * @xmlDesc: string containing an XML description of the domain
18204
 * @flags: bitwise-OR of virDomainSnapshotCreateFlags
C
Chris Lalancette 已提交
18205 18206 18207 18208
 *
 * Creates a new snapshot of a domain based on the snapshot xml
 * contained in xmlDesc.
 *
18209 18210 18211 18212 18213 18214 18215 18216 18217 18218 18219 18220 18221 18222 18223 18224 18225 18226 18227 18228 18229 18230 18231 18232 18233 18234 18235 18236 18237 18238 18239 18240 18241 18242 18243
 * If @flags is 0, the domain can be active, in which case the
 * snapshot will be a system checkpoint (both disk state and runtime
 * VM state such as RAM contents), where reverting to the snapshot is
 * the same as resuming from hibernation (TCP connections may have
 * timed out, but everything else picks up where it left off); or
 * the domain can be inactive, in which case the snapshot includes
 * just the disk state prior to booting.  The newly created snapshot
 * becomes current (see virDomainSnapshotCurrent()), and is a child
 * of any previous current snapshot.
 *
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE, then this
 * is a request to reinstate snapshot metadata that was previously
 * discarded, rather than creating a new snapshot.  This can be used
 * to recreate a snapshot hierarchy on a destination, then remove it
 * on the source, in order to allow migration (since migration
 * normally fails if snapshot metadata still remains on the source
 * machine).  When redefining snapshot metadata, the current snapshot
 * will not be altered unless the VIR_DOMAIN_SNAPSHOT_CREATE_CURRENT
 * flag is also present.  It is an error to request the
 * VIR_DOMAIN_SNAPSHOT_CREATE_CURRENT flag without
 * VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE.  On some hypervisors,
 * redefining an existing snapshot can be used to alter host-specific
 * portions of the domain XML to be used during revert (such as
 * backing filenames associated with disk devices), but must not alter
 * guest-visible layout.  When redefining a snapshot name that does
 * not exist, the hypervisor may validate that reverting to the
 * snapshot appears to be possible (for example, disk images have
 * snapshot contents by the requested name).  Not all hypervisors
 * support these flags.
 *
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_NO_METADATA, then the
 * domain's disk images are modified according to @xmlDesc, but then
 * the just-created snapshot has its metadata deleted.  This flag is
 * incompatible with VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE.
 *
18244 18245 18246 18247 18248 18249
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_HALT, then the domain
 * will be inactive after the snapshot completes, regardless of whether
 * it was active before; otherwise, a running domain will still be
 * running after the snapshot.  This flag is invalid on transient domains,
 * and is incompatible with VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE.
 *
18250 18251 18252 18253 18254 18255
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_LIVE, then the domain
 * is not paused while creating the snapshot. This increases the size
 * of the memory dump file, but reduces downtime of the guest while
 * taking the snapshot. Some hypervisors only support this flag during
 * external checkpoints.
 *
18256 18257 18258 18259 18260 18261
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_DISK_ONLY, then the
 * snapshot will be limited to the disks described in @xmlDesc, and no
 * VM state will be saved.  For an active guest, the disk image may be
 * inconsistent (as if power had been pulled), and specifying this
 * with the VIR_DOMAIN_SNAPSHOT_CREATE_HALT flag risks data loss.
 *
18262 18263 18264 18265 18266 18267
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_QUIESCE, then the
 * libvirt will attempt to use guest agent to freeze and thaw all
 * file systems in use within domain OS. However, if the guest agent
 * is not present, an error is thrown. Moreover, this flag requires
 * VIR_DOMAIN_SNAPSHOT_CREATE_DISK_ONLY to be passed as well.
 *
18268
 * By default, if the snapshot involves external files, and any of the
18269 18270 18271 18272 18273 18274 18275
 * destination files already exist as a non-empty regular file, the
 * snapshot is rejected to avoid losing contents of those files.
 * However, if @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_REUSE_EXT,
 * then the destination files must already exist and contain content
 * identical to the source files (this allows a management app to
 * pre-create files with relative backing file names, rather than the
 * default of creating with absolute backing file names).
18276 18277
 *
 * Be aware that although libvirt prefers to report errors up front with
E
Eric Blake 已提交
18278 18279 18280 18281 18282 18283 18284 18285 18286 18287 18288 18289 18290
 * no other effect, some hypervisors have certain types of failures where
 * the overall command can easily fail even though the guest configuration
 * was partially altered (for example, if a disk snapshot request for two
 * disks fails on the second disk, but the first disk alteration cannot be
 * rolled back).  If this API call fails, it is therefore normally
 * necessary to follow up with virDomainGetXMLDesc() and check each disk
 * to determine if any partial changes occurred.  However, if @flags
 * contains VIR_DOMAIN_SNAPSHOT_CREATE_ATOMIC, then libvirt guarantees
 * that this command will not alter any disks unless the entire set of
 * changes can be done atomically, making failure recovery simpler (note
 * that it is still possible to fail after disks have changed, but only
 * in the much rarer cases of running out of memory or disk space).
 *
E
Eric Blake 已提交
18291 18292 18293 18294
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation; in that case, use virDomainBlockJobAbort()
 * to stop the block copy first.
 *
E
Eric Blake 已提交
18295
 * Returns an (opaque) virDomainSnapshotPtr on success, NULL on failure.
C
Chris Lalancette 已提交
18296 18297 18298 18299 18300 18301 18302 18303
 */
virDomainSnapshotPtr
virDomainSnapshotCreateXML(virDomainPtr domain,
                           const char *xmlDesc,
                           unsigned int flags)
{
    virConnectPtr conn;

18304
    VIR_DOMAIN_DEBUG(domain, "xmlDesc=%s, flags=%x", xmlDesc, flags);
C
Chris Lalancette 已提交
18305 18306 18307

    virResetLastError();

18308
    virCheckDomainReturn(domain, NULL);
C
Chris Lalancette 已提交
18309
    conn = domain->conn;
18310

18311
    virCheckNonNullArgGoto(xmlDesc, error);
18312
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
18313

18314 18315
    if ((flags & VIR_DOMAIN_SNAPSHOT_CREATE_CURRENT) &&
        !(flags & VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE)) {
18316
        virReportInvalidArg(flags,
18317 18318
                            _("use of 'current' flag in %s requires "
                              "'redefine' flag"),
18319
                            __FUNCTION__);
18320 18321 18322 18323
        goto error;
    }
    if ((flags & VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE) &&
        (flags & VIR_DOMAIN_SNAPSHOT_CREATE_NO_METADATA)) {
18324
        virReportInvalidArg(flags,
18325 18326
                            _("'redefine' and 'no metadata' flags in %s are "
                              "mutually exclusive"),
18327
                            __FUNCTION__);
18328 18329
        goto error;
    }
18330 18331
    if ((flags & VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE) &&
        (flags & VIR_DOMAIN_SNAPSHOT_CREATE_HALT)) {
18332
        virReportInvalidArg(flags,
18333 18334
                            _("'redefine' and 'halt' flags in %s are mutually "
                              "exclusive"),
18335
                            __FUNCTION__);
18336 18337
        goto error;
    }
18338

C
Chris Lalancette 已提交
18339 18340 18341 18342 18343 18344 18345 18346
    if (conn->driver->domainSnapshotCreateXML) {
        virDomainSnapshotPtr ret;
        ret = conn->driver->domainSnapshotCreateXML(domain, xmlDesc, flags);
        if (!ret)
            goto error;
        return ret;
    }

18347
    virReportUnsupportedError();
18348
 error:
C
Chris Lalancette 已提交
18349 18350 18351 18352
    virDispatchError(conn);
    return NULL;
}

18353

C
Chris Lalancette 已提交
18354 18355 18356
/**
 * virDomainSnapshotGetXMLDesc:
 * @snapshot: a domain snapshot object
18357
 * @flags: bitwise-OR of subset of virDomainXMLFlags
C
Chris Lalancette 已提交
18358 18359 18360
 *
 * Provide an XML description of the domain snapshot.
 *
18361 18362 18363 18364 18365
 * No security-sensitive data will be included unless @flags contains
 * VIR_DOMAIN_XML_SECURE; this flag is rejected on read-only
 * connections.  For this API, @flags should not contain either
 * VIR_DOMAIN_XML_INACTIVE or VIR_DOMAIN_XML_UPDATE_CPU.
 *
C
Chris Lalancette 已提交
18366 18367 18368 18369 18370 18371 18372 18373
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
virDomainSnapshotGetXMLDesc(virDomainSnapshotPtr snapshot,
                            unsigned int flags)
{
    virConnectPtr conn;
18374
    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);
C
Chris Lalancette 已提交
18375 18376 18377

    virResetLastError();

18378
    virCheckDomainSnapshotReturn(snapshot, NULL);
C
Chris Lalancette 已提交
18379 18380 18381
    conn = snapshot->domain->conn;

    if ((conn->flags & VIR_CONNECT_RO) && (flags & VIR_DOMAIN_XML_SECURE)) {
18382 18383
        virReportError(VIR_ERR_OPERATION_DENIED, "%s",
                       _("virDomainSnapshotGetXMLDesc with secure flag"));
C
Chris Lalancette 已提交
18384 18385 18386
        goto error;
    }

18387
    if (conn->driver->domainSnapshotGetXMLDesc) {
C
Chris Lalancette 已提交
18388
        char *ret;
18389
        ret = conn->driver->domainSnapshotGetXMLDesc(snapshot, flags);
C
Chris Lalancette 已提交
18390 18391 18392 18393 18394
        if (!ret)
            goto error;
        return ret;
    }

18395
    virReportUnsupportedError();
18396
 error:
C
Chris Lalancette 已提交
18397 18398 18399 18400
    virDispatchError(conn);
    return NULL;
}

18401

C
Chris Lalancette 已提交
18402 18403 18404
/**
 * virDomainSnapshotNum:
 * @domain: a domain object
18405
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
18406 18407
 *
 * Provides the number of domain snapshots for this domain.
C
Chris Lalancette 已提交
18408
 *
18409 18410 18411 18412 18413 18414 18415 18416 18417 18418 18419 18420 18421 18422 18423 18424
 * By default, this command covers all snapshots; it is also possible to
 * limit things to just snapshots with no parents, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_ROOTS.  Additional filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
C
Chris Lalancette 已提交
18425
 *
18426 18427 18428 18429
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
18430
 *
18431 18432 18433 18434 18435 18436 18437 18438 18439 18440
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18441
 * Returns the number of domain snapshots found or -1 in case of error.
C
Chris Lalancette 已提交
18442 18443 18444 18445 18446
 */
int
virDomainSnapshotNum(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;
18447

E
Eric Blake 已提交
18448
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
C
Chris Lalancette 已提交
18449 18450 18451

    virResetLastError();

18452
    virCheckDomainReturn(domain, -1);
C
Chris Lalancette 已提交
18453 18454 18455 18456 18457 18458 18459 18460 18461

    conn = domain->conn;
    if (conn->driver->domainSnapshotNum) {
        int ret = conn->driver->domainSnapshotNum(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18462
    virReportUnsupportedError();
18463
 error:
C
Chris Lalancette 已提交
18464 18465 18466 18467
    virDispatchError(conn);
    return -1;
}

18468

C
Chris Lalancette 已提交
18469 18470 18471 18472 18473
/**
 * virDomainSnapshotListNames:
 * @domain: a domain object
 * @names: array to collect the list of names of snapshots
 * @nameslen: size of @names
18474
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
C
Chris Lalancette 已提交
18475 18476
 *
 * Collect the list of domain snapshots for the given domain, and store
18477 18478
 * their names in @names.  The value to use for @nameslen can be determined
 * by virDomainSnapshotNum() with the same @flags.
18479
 *
18480 18481 18482 18483 18484 18485 18486 18487 18488 18489 18490 18491 18492 18493 18494 18495
 * By default, this command covers all snapshots; it is also possible to
 * limit things to just snapshots with no parents, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_ROOTS.  Additional filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
18496
 *
18497 18498 18499 18500
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
C
Chris Lalancette 已提交
18501
 *
18502 18503 18504 18505 18506 18507 18508 18509 18510 18511
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18512 18513 18514 18515 18516 18517
 * Note that this command is inherently racy: another connection can
 * define a new snapshot between a call to virDomainSnapshotNum() and
 * this call.  You are only guaranteed that all currently defined
 * snapshots were listed if the return is less than @nameslen.  Likewise,
 * you should be prepared for virDomainSnapshotLookupByName() to fail when
 * converting a name from this call into a snapshot object, if another
18518 18519 18520 18521
 * connection deletes the snapshot in the meantime.  For more control over
 * the results, see virDomainListAllSnapshots().
 *
 * Returns the number of domain snapshots found or -1 in case of error.
J
John Ferlan 已提交
18522
 * The caller is responsible to call free() for each member of the array.
C
Chris Lalancette 已提交
18523 18524 18525 18526 18527 18528 18529
 */
int
virDomainSnapshotListNames(virDomainPtr domain, char **names, int nameslen,
                           unsigned int flags)
{
    virConnectPtr conn;

18530
    VIR_DOMAIN_DEBUG(domain, "names=%p, nameslen=%d, flags=%x",
18531
                     names, nameslen, flags);
C
Chris Lalancette 已提交
18532 18533 18534

    virResetLastError();

18535
    virCheckDomainReturn(domain, -1);
C
Chris Lalancette 已提交
18536 18537
    conn = domain->conn;

18538 18539
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(nameslen, error);
C
Chris Lalancette 已提交
18540 18541 18542 18543 18544 18545 18546 18547 18548

    if (conn->driver->domainSnapshotListNames) {
        int ret = conn->driver->domainSnapshotListNames(domain, names,
                                                        nameslen, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18549
    virReportUnsupportedError();
18550
 error:
C
Chris Lalancette 已提交
18551 18552 18553 18554
    virDispatchError(conn);
    return -1;
}

18555

18556 18557 18558 18559 18560 18561 18562 18563 18564 18565 18566 18567 18568 18569 18570 18571 18572 18573 18574 18575 18576 18577 18578 18579 18580 18581 18582 18583 18584 18585 18586 18587 18588 18589
/**
 * virDomainListAllSnapshots:
 * @domain: a domain object
 * @snaps: pointer to variable to store the array containing snapshot objects,
 *         or NULL if the list is not required (just returns number of
 *         snapshots)
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
 *
 * Collect the list of domain snapshots for the given domain, and allocate
 * an array to store those objects.  This API solves the race inherent in
 * virDomainSnapshotListNames().
 *
 * By default, this command covers all snapshots; it is also possible to
 * limit things to just snapshots with no parents, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_ROOTS.  Additional filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
 *
18590 18591 18592 18593 18594 18595 18596 18597 18598 18599
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18600 18601 18602 18603 18604 18605 18606 18607 18608 18609 18610 18611 18612 18613 18614 18615 18616 18617 18618 18619
 * Returns the number of domain snapshots found or -1 and sets @snaps to
 * NULL in case of error.  On success, the array stored into @snaps is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virDomainSnapshotFree() on each array element, then calling
 * free() on @snaps.
 */
int
virDomainListAllSnapshots(virDomainPtr domain, virDomainSnapshotPtr **snaps,
                          unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "snaps=%p, flags=%x", snaps, flags);

    virResetLastError();

    if (snaps)
        *snaps = NULL;

18620
    virCheckDomainReturn(domain, -1);
18621 18622 18623 18624 18625 18626 18627 18628 18629
    conn = domain->conn;

    if (conn->driver->domainListAllSnapshots) {
        int ret = conn->driver->domainListAllSnapshots(domain, snaps, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18630
    virReportUnsupportedError();
18631
 error:
18632 18633 18634 18635
    virDispatchError(conn);
    return -1;
}

18636

18637 18638 18639
/**
 * virDomainSnapshotNumChildren:
 * @snapshot: a domain snapshot object
18640
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
18641 18642 18643
 *
 * Provides the number of child snapshots for this domain snapshot.
 *
18644 18645 18646 18647 18648 18649 18650 18651 18652 18653 18654 18655
 * By default, this command covers only direct children; it is also possible
 * to expand things to cover all descendants, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_DESCENDANTS.  Also, some filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
18656
 *
18657 18658 18659
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
18660
 *
18661 18662 18663 18664
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
18665
 *
18666 18667 18668 18669 18670 18671 18672 18673 18674 18675
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18676 18677 18678 18679 18680 18681 18682 18683 18684 18685 18686
 * Returns the number of domain snapshots found or -1 in case of error.
 */
int
virDomainSnapshotNumChildren(virDomainSnapshotPtr snapshot, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

18687
    virCheckDomainSnapshotReturn(snapshot, -1);
18688
    conn = snapshot->domain->conn;
18689

18690 18691 18692 18693 18694 18695 18696
    if (conn->driver->domainSnapshotNumChildren) {
        int ret = conn->driver->domainSnapshotNumChildren(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18697
    virReportUnsupportedError();
18698
 error:
18699 18700 18701 18702
    virDispatchError(conn);
    return -1;
}

18703

18704 18705 18706 18707 18708
/**
 * virDomainSnapshotListChildrenNames:
 * @snapshot: a domain snapshot object
 * @names: array to collect the list of names of snapshots
 * @nameslen: size of @names
18709
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
18710 18711
 *
 * Collect the list of domain snapshots that are children of the given
18712 18713 18714
 * snapshot, and store their names in @names.  The value to use for
 * @nameslen can be determined by virDomainSnapshotNumChildren() with
 * the same @flags.
18715
 *
18716 18717 18718 18719 18720 18721 18722 18723 18724 18725 18726 18727
 * By default, this command covers only direct children; it is also possible
 * to expand things to cover all descendants, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_DESCENDANTS.  Also, some filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
18728
 *
18729 18730 18731
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
18732
 *
18733 18734 18735 18736
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
18737
 *
18738 18739 18740 18741 18742 18743 18744 18745 18746 18747
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18748
 * Returns the number of domain snapshots found or -1 in case of error.
18749 18750 18751 18752 18753 18754
 * Note that this command is inherently racy: another connection can
 * define a new snapshot between a call to virDomainSnapshotNumChildren()
 * and this call.  You are only guaranteed that all currently defined
 * snapshots were listed if the return is less than @nameslen.  Likewise,
 * you should be prepared for virDomainSnapshotLookupByName() to fail when
 * converting a name from this call into a snapshot object, if another
18755 18756 18757 18758
 * connection deletes the snapshot in the meantime.  For more control over
 * the results, see virDomainSnapshotListAllChildren().
 *
 * Returns the number of domain snapshots found or -1 in case of error.
J
John Ferlan 已提交
18759
 * The caller is responsible to call free() for each member of the array.
18760 18761 18762 18763 18764 18765 18766 18767 18768 18769 18770 18771 18772
 */
int
virDomainSnapshotListChildrenNames(virDomainSnapshotPtr snapshot,
                                   char **names, int nameslen,
                                   unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, names=%p, nameslen=%d, flags=%x",
              snapshot, names, nameslen, flags);

    virResetLastError();

18773
    virCheckDomainSnapshotReturn(snapshot, -1);
18774 18775
    conn = snapshot->domain->conn;

18776 18777
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(nameslen, error);
18778 18779 18780 18781 18782 18783

    if (conn->driver->domainSnapshotListChildrenNames) {
        int ret = conn->driver->domainSnapshotListChildrenNames(snapshot,
                                                                names,
                                                                nameslen,
                                                                flags);
18784 18785 18786 18787 18788
        if (ret < 0)
            goto error;
        return ret;
    }

18789
    virReportUnsupportedError();
18790
 error:
18791 18792 18793 18794
    virDispatchError(conn);
    return -1;
}

18795

18796 18797 18798 18799 18800 18801 18802 18803 18804 18805 18806 18807 18808 18809 18810 18811 18812 18813 18814 18815 18816 18817 18818 18819 18820 18821 18822 18823 18824 18825 18826 18827 18828 18829
/**
 * virDomainSnapshotListAllChildren:
 * @snapshot: a domain snapshot object
 * @snaps: pointer to variable to store the array containing snapshot objects,
 *         or NULL if the list is not required (just returns number of
 *         snapshots)
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
 *
 * Collect the list of domain snapshots that are children of the given
 * snapshot, and allocate an array to store those objects.  This API solves
 * the race inherent in virDomainSnapshotListChildrenNames().
 *
 * By default, this command covers only direct children; it is also possible
 * to expand things to cover all descendants, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_DESCENDANTS.  Also, some filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
 *
18830 18831 18832 18833 18834 18835 18836 18837 18838 18839
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18840 18841 18842 18843 18844 18845 18846 18847 18848 18849 18850 18851 18852 18853 18854 18855 18856 18857 18858 18859 18860
 * Returns the number of domain snapshots found or -1 and sets @snaps to
 * NULL in case of error.  On success, the array stored into @snaps is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virDomainSnapshotFree() on each array element, then calling
 * free() on @snaps.
 */
int
virDomainSnapshotListAllChildren(virDomainSnapshotPtr snapshot,
                                 virDomainSnapshotPtr **snaps,
                                 unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, snaps=%p, flags=%x", snapshot, snaps, flags);

    virResetLastError();

    if (snaps)
        *snaps = NULL;

18861
    virCheckDomainSnapshotReturn(snapshot, -1);
18862 18863 18864 18865 18866
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotListAllChildren) {
        int ret = conn->driver->domainSnapshotListAllChildren(snapshot, snaps,
                                                              flags);
18867 18868 18869 18870 18871
        if (ret < 0)
            goto error;
        return ret;
    }

18872
    virReportUnsupportedError();
18873
 error:
18874 18875 18876 18877
    virDispatchError(conn);
    return -1;
}

18878

C
Chris Lalancette 已提交
18879 18880 18881 18882
/**
 * virDomainSnapshotLookupByName:
 * @domain: a domain object
 * @name: name for the domain snapshot
18883
 * @flags: extra flags; not used yet, so callers should always pass 0
C
Chris Lalancette 已提交
18884 18885 18886 18887 18888 18889 18890 18891 18892 18893 18894 18895 18896
 *
 * Try to lookup a domain snapshot based on its name.
 *
 * Returns a domain snapshot object or NULL in case of failure.  If the
 * domain snapshot cannot be found, then the VIR_ERR_NO_DOMAIN_SNAPSHOT
 * error is raised.
 */
virDomainSnapshotPtr
virDomainSnapshotLookupByName(virDomainPtr domain,
                              const char *name,
                              unsigned int flags)
{
    virConnectPtr conn;
18897

18898
    VIR_DOMAIN_DEBUG(domain, "name=%s, flags=%x", name, flags);
C
Chris Lalancette 已提交
18899 18900 18901

    virResetLastError();

18902
    virCheckDomainReturn(domain, NULL);
C
Chris Lalancette 已提交
18903 18904
    conn = domain->conn;

18905
    virCheckNonNullArgGoto(name, error);
C
Chris Lalancette 已提交
18906 18907 18908 18909 18910 18911 18912 18913 18914

    if (conn->driver->domainSnapshotLookupByName) {
        virDomainSnapshotPtr dom;
        dom = conn->driver->domainSnapshotLookupByName(domain, name, flags);
        if (!dom)
            goto error;
        return dom;
    }

18915
    virReportUnsupportedError();
18916
 error:
C
Chris Lalancette 已提交
18917 18918 18919 18920
    virDispatchError(conn);
    return NULL;
}

18921

C
Chris Lalancette 已提交
18922 18923 18924
/**
 * virDomainHasCurrentSnapshot:
 * @domain: pointer to the domain object
18925
 * @flags: extra flags; not used yet, so callers should always pass 0
C
Chris Lalancette 已提交
18926 18927 18928 18929 18930 18931 18932 18933 18934
 *
 * Determine if the domain has a current snapshot.
 *
 * Returns 1 if such snapshot exists, 0 if it doesn't, -1 on error.
 */
int
virDomainHasCurrentSnapshot(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;
18935

18936
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
C
Chris Lalancette 已提交
18937 18938 18939

    virResetLastError();

18940
    virCheckDomainReturn(domain, -1);
C
Chris Lalancette 已提交
18941 18942 18943 18944 18945 18946 18947 18948 18949
    conn = domain->conn;

    if (conn->driver->domainHasCurrentSnapshot) {
        int ret = conn->driver->domainHasCurrentSnapshot(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18950
    virReportUnsupportedError();
18951
 error:
C
Chris Lalancette 已提交
18952 18953 18954 18955
    virDispatchError(conn);
    return -1;
}

18956

C
Chris Lalancette 已提交
18957 18958 18959
/**
 * virDomainSnapshotCurrent:
 * @domain: a domain object
18960
 * @flags: extra flags; not used yet, so callers should always pass 0
C
Chris Lalancette 已提交
18961 18962 18963 18964 18965 18966 18967 18968 18969 18970 18971 18972
 *
 * Get the current snapshot for a domain, if any.
 *
 * Returns a domain snapshot object or NULL in case of failure.  If the
 * current domain snapshot cannot be found, then the VIR_ERR_NO_DOMAIN_SNAPSHOT
 * error is raised.
 */
virDomainSnapshotPtr
virDomainSnapshotCurrent(virDomainPtr domain,
                         unsigned int flags)
{
    virConnectPtr conn;
18973

18974
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
C
Chris Lalancette 已提交
18975 18976 18977

    virResetLastError();

18978
    virCheckDomainReturn(domain, NULL);
C
Chris Lalancette 已提交
18979 18980 18981 18982 18983 18984 18985 18986 18987 18988
    conn = domain->conn;

    if (conn->driver->domainSnapshotCurrent) {
        virDomainSnapshotPtr snap;
        snap = conn->driver->domainSnapshotCurrent(domain, flags);
        if (!snap)
            goto error;
        return snap;
    }

18989
    virReportUnsupportedError();
18990
 error:
C
Chris Lalancette 已提交
18991 18992 18993 18994
    virDispatchError(conn);
    return NULL;
}

18995

18996 18997 18998
/**
 * virDomainSnapshotGetParent:
 * @snapshot: a snapshot object
18999
 * @flags: extra flags; not used yet, so callers should always pass 0
19000 19001 19002 19003 19004 19005 19006 19007 19008 19009 19010 19011 19012 19013 19014 19015 19016
 *
 * Get the parent snapshot for @snapshot, if any.
 *
 * Returns a domain snapshot object or NULL in case of failure.  If the
 * given snapshot is a root (no parent), then the VIR_ERR_NO_DOMAIN_SNAPSHOT
 * error is raised.
 */
virDomainSnapshotPtr
virDomainSnapshotGetParent(virDomainSnapshotPtr snapshot,
                           unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

19017
    virCheckDomainSnapshotReturn(snapshot, NULL);
19018 19019 19020 19021 19022 19023 19024 19025 19026 19027
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotGetParent) {
        virDomainSnapshotPtr snap;
        snap = conn->driver->domainSnapshotGetParent(snapshot, flags);
        if (!snap)
            goto error;
        return snap;
    }

19028
    virReportUnsupportedError();
19029
 error:
19030 19031 19032 19033
    virDispatchError(conn);
    return NULL;
}

19034

E
Eric Blake 已提交
19035 19036 19037 19038 19039 19040 19041 19042 19043 19044
/**
 * virDomainSnapshotIsCurrent:
 * @snapshot: a snapshot object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Determine if the given snapshot is the domain's current snapshot.  See
 * also virDomainHasCurrentSnapshot().
 *
 * Returns 1 if current, 0 if not current, or -1 on error.
 */
19045 19046 19047
int
virDomainSnapshotIsCurrent(virDomainSnapshotPtr snapshot,
                           unsigned int flags)
E
Eric Blake 已提交
19048 19049 19050 19051 19052 19053 19054
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

19055
    virCheckDomainSnapshotReturn(snapshot, -1);
E
Eric Blake 已提交
19056 19057 19058 19059 19060 19061 19062 19063 19064 19065
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotIsCurrent) {
        int ret;
        ret = conn->driver->domainSnapshotIsCurrent(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19066
    virReportUnsupportedError();
19067
 error:
E
Eric Blake 已提交
19068 19069 19070 19071
    virDispatchError(conn);
    return -1;
}

19072

E
Eric Blake 已提交
19073 19074 19075 19076 19077 19078 19079 19080 19081 19082 19083
/**
 * virDomainSnapshotHasMetadata:
 * @snapshot: a snapshot object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Determine if the given snapshot is associated with libvirt metadata
 * that would prevent the deletion of the domain.
 *
 * Returns 1 if the snapshot has metadata, 0 if the snapshot exists without
 * help from libvirt, or -1 on error.
 */
19084 19085 19086
int
virDomainSnapshotHasMetadata(virDomainSnapshotPtr snapshot,
                             unsigned int flags)
E
Eric Blake 已提交
19087 19088 19089 19090 19091 19092 19093
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

19094
    virCheckDomainSnapshotReturn(snapshot, -1);
E
Eric Blake 已提交
19095 19096 19097 19098 19099 19100 19101 19102 19103 19104
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotHasMetadata) {
        int ret;
        ret = conn->driver->domainSnapshotHasMetadata(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19105
    virReportUnsupportedError();
19106
 error:
E
Eric Blake 已提交
19107 19108 19109 19110
    virDispatchError(conn);
    return -1;
}

19111

C
Chris Lalancette 已提交
19112
/**
19113
 * virDomainRevertToSnapshot:
C
Chris Lalancette 已提交
19114
 * @snapshot: a domain snapshot object
19115
 * @flags: bitwise-OR of virDomainSnapshotRevertFlags
C
Chris Lalancette 已提交
19116 19117 19118
 *
 * Revert the domain to a given snapshot.
 *
19119 19120 19121 19122 19123 19124 19125 19126 19127 19128 19129 19130
 * Normally, the domain will revert to the same state the domain was
 * in while the snapshot was taken (whether inactive, running, or
 * paused), except that disk snapshots default to reverting to
 * inactive state.  Including VIR_DOMAIN_SNAPSHOT_REVERT_RUNNING in
 * @flags overrides the snapshot state to guarantee a running domain
 * after the revert; or including VIR_DOMAIN_SNAPSHOT_REVERT_PAUSED in
 * @flags guarantees a paused domain after the revert.  These two
 * flags are mutually exclusive.  While a persistent domain does not
 * need either flag, it is not possible to revert a transient domain
 * into an inactive state, so transient domains require the use of one
 * of these two flags.
 *
E
Eric Blake 已提交
19131 19132 19133 19134 19135 19136 19137 19138 19139 19140 19141 19142 19143 19144 19145 19146 19147 19148 19149 19150 19151 19152
 * Reverting to any snapshot discards all configuration changes made since
 * the last snapshot.  Additionally, reverting to a snapshot from a running
 * domain is a form of data loss, since it discards whatever is in the
 * guest's RAM at the time.  Since the very nature of keeping snapshots
 * implies the intent to roll back state, no additional confirmation is
 * normally required for these lossy effects.
 *
 * However, there are two particular situations where reverting will
 * be refused by default, and where @flags must include
 * VIR_DOMAIN_SNAPSHOT_REVERT_FORCE to acknowledge the risks.  1) Any
 * attempt to revert to a snapshot that lacks the metadata to perform
 * ABI compatibility checks (generally the case for snapshots that
 * lack a full <domain> when listed by virDomainSnapshotGetXMLDesc(),
 * such as those created prior to libvirt 0.9.5).  2) Any attempt to
 * revert a running domain to an active state that requires starting a
 * new hypervisor instance rather than reusing the existing hypervisor
 * (since this would terminate all connections to the domain, such as
 * such as VNC or Spice graphics) - this condition arises from active
 * snapshots that are provably ABI incomaptible, as well as from
 * inactive snapshots with a @flags request to start the domain after
 * the revert.
 *
C
Chris Lalancette 已提交
19153 19154 19155 19156 19157 19158 19159 19160
 * Returns 0 if the creation is successful, -1 on error.
 */
int
virDomainRevertToSnapshot(virDomainSnapshotPtr snapshot,
                          unsigned int flags)
{
    virConnectPtr conn;

19161
    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);
C
Chris Lalancette 已提交
19162 19163 19164

    virResetLastError();

19165
    virCheckDomainSnapshotReturn(snapshot, -1);
C
Chris Lalancette 已提交
19166
    conn = snapshot->domain->conn;
19167

19168
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
19169

19170 19171
    if ((flags & VIR_DOMAIN_SNAPSHOT_REVERT_RUNNING) &&
        (flags & VIR_DOMAIN_SNAPSHOT_REVERT_PAUSED)) {
19172
        virReportInvalidArg(flags,
19173 19174
                            _("running and paused flags in %s are mutually "
                              "exclusive"),
19175
                            __FUNCTION__);
19176 19177 19178
        goto error;
    }

C
Chris Lalancette 已提交
19179 19180 19181 19182 19183 19184 19185
    if (conn->driver->domainRevertToSnapshot) {
        int ret = conn->driver->domainRevertToSnapshot(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19186
    virReportUnsupportedError();
19187
 error:
C
Chris Lalancette 已提交
19188 19189 19190 19191
    virDispatchError(conn);
    return -1;
}

19192

C
Chris Lalancette 已提交
19193
/**
19194
 * virDomainSnapshotDelete:
C
Chris Lalancette 已提交
19195
 * @snapshot: a domain snapshot object
19196
 * @flags: bitwise-OR of supported virDomainSnapshotDeleteFlags
C
Chris Lalancette 已提交
19197 19198 19199
 *
 * Delete the snapshot.
 *
19200 19201 19202 19203 19204 19205 19206 19207 19208 19209 19210 19211 19212
 * If @flags is 0, then just this snapshot is deleted, and changes
 * from this snapshot are automatically merged into children
 * snapshots.  If @flags includes VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN,
 * then this snapshot and any descendant snapshots are deleted.  If
 * @flags includes VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN_ONLY, then any
 * descendant snapshots are deleted, but this snapshot remains.  These
 * two flags are mutually exclusive.
 *
 * If @flags includes VIR_DOMAIN_SNAPSHOT_DELETE_METADATA_ONLY, then
 * any snapshot metadata tracked by libvirt is removed while keeping
 * the snapshot contents intact; if a hypervisor does not require any
 * libvirt metadata to track snapshots, then this flag is silently
 * ignored.
C
Chris Lalancette 已提交
19213
 *
19214 19215
 * Returns 0 if the selected snapshot(s) were successfully deleted,
 * -1 on error.
C
Chris Lalancette 已提交
19216 19217 19218 19219 19220 19221 19222
 */
int
virDomainSnapshotDelete(virDomainSnapshotPtr snapshot,
                        unsigned int flags)
{
    virConnectPtr conn;

19223
    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);
C
Chris Lalancette 已提交
19224 19225 19226

    virResetLastError();

19227
    virCheckDomainSnapshotReturn(snapshot, -1);
C
Chris Lalancette 已提交
19228
    conn = snapshot->domain->conn;
19229

19230
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
19231

19232 19233
    if ((flags & VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN) &&
        (flags & VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN_ONLY)) {
19234 19235 19236 19237
        virReportInvalidArg(flags,
                            _("children and children_only flags in %s are "
                              "mutually exclusive"),
                            __FUNCTION__);
19238 19239 19240
        goto error;
    }

C
Chris Lalancette 已提交
19241 19242 19243 19244 19245 19246 19247
    if (conn->driver->domainSnapshotDelete) {
        int ret = conn->driver->domainSnapshotDelete(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19248
    virReportUnsupportedError();
19249
 error:
C
Chris Lalancette 已提交
19250 19251 19252 19253
    virDispatchError(conn);
    return -1;
}

19254

19255 19256 19257 19258 19259 19260 19261 19262 19263 19264 19265 19266 19267 19268 19269 19270 19271 19272 19273 19274
/**
 * virDomainSnapshotRef:
 * @snapshot: the snapshot to hold a reference on
 *
 * Increment the reference count on the snapshot. For each
 * additional call to this method, there shall be a corresponding
 * call to virDomainSnapshotFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection and domain remain open until all threads have finished
 * using the snapshot. ie, each new thread using a snapshot would
 * increment the reference count.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSnapshotRef(virDomainSnapshotPtr snapshot)
{
19275 19276 19277
    VIR_DEBUG("snapshot=%p, refs=%d", snapshot,
              snapshot ? snapshot->object.u.s.refs : 0);

19278 19279
    virResetLastError();

19280 19281
    virCheckDomainSnapshotReturn(snapshot, -1);

19282
    virObjectRef(snapshot);
19283 19284 19285
    return 0;
}

19286

C
Chris Lalancette 已提交
19287 19288 19289 19290 19291 19292 19293 19294 19295 19296 19297 19298
/**
 * virDomainSnapshotFree:
 * @snapshot: a domain snapshot object
 *
 * Free the domain snapshot object.  The snapshot itself is not modified.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSnapshotFree(virDomainSnapshotPtr snapshot)
{
19299
    VIR_DEBUG("snapshot=%p", snapshot);
C
Chris Lalancette 已提交
19300 19301 19302

    virResetLastError();

19303 19304
    virCheckDomainSnapshotReturn(snapshot, -1);

19305
    virObjectUnref(snapshot);
C
Chris Lalancette 已提交
19306 19307
    return 0;
}
19308

19309

19310 19311 19312
/**
 * virDomainOpenConsole:
 * @dom: a domain object
19313
 * @dev_name: the console, serial or parallel port device alias, or NULL
19314
 * @st: a stream to associate with the console
19315
 * @flags: bitwise-OR of virDomainConsoleFlags
19316 19317 19318
 *
 * This opens the backend associated with a console, serial or
 * parallel port device on a guest, if the backend is supported.
19319
 * If the @dev_name is omitted, then the first console or serial
19320 19321 19322 19323
 * device is opened. The console is associated with the passed
 * in @st stream, which should have been opened in non-blocking
 * mode for bi-directional I/O.
 *
19324 19325 19326 19327 19328 19329 19330 19331 19332 19333 19334 19335 19336 19337 19338
 * By default, when @flags is 0, the open will fail if libvirt
 * detects that the console is already in use by another client;
 * passing VIR_DOMAIN_CONSOLE_FORCE will cause libvirt to forcefully
 * remove the other client prior to opening this console.
 *
 * If flag VIR_DOMAIN_CONSOLE_SAFE the console is opened only in the
 * case where the hypervisor driver supports safe (mutually exclusive)
 * console handling.
 *
 * Older servers did not support either flag, and also did not forbid
 * simultaneous clients on a console, with potentially confusing results.
 * When passing @flags of 0 in order to support a wider range of server
 * versions, it is up to the client to ensure mutual exclusion.
 *
 * Returns 0 if the console was opened, -1 on error
19339
 */
19340 19341 19342 19343 19344
int
virDomainOpenConsole(virDomainPtr dom,
                     const char *dev_name,
                     virStreamPtr st,
                     unsigned int flags)
19345 19346
{
    virConnectPtr conn;
19347

19348 19349
    VIR_DOMAIN_DEBUG(dom, "dev_name=%s, st=%p, flags=%x",
                     NULLSTR(dev_name), st, flags);
19350 19351 19352

    virResetLastError();

19353
    virCheckDomainReturn(dom, -1);
19354
    conn = dom->conn;
19355

19356
    virCheckStreamGoto(st, error);
19357
    virCheckReadOnlyGoto(conn->flags, error);
19358

19359 19360 19361 19362 19363 19364 19365
    if (conn != st->conn) {
        virReportInvalidArg(st,
                            _("stream in %s must match connection of domain '%s'"),
                            __FUNCTION__, dom->name);
        goto error;
    }

19366 19367
    if (conn->driver->domainOpenConsole) {
        int ret;
19368
        ret = conn->driver->domainOpenConsole(dom, dev_name, st, flags);
19369 19370 19371 19372 19373
        if (ret < 0)
            goto error;
        return ret;
    }

19374
    virReportUnsupportedError();
19375

19376
 error:
19377 19378 19379
    virDispatchError(conn);
    return -1;
}
19380

19381

19382 19383 19384 19385 19386 19387 19388 19389 19390 19391 19392 19393 19394 19395 19396 19397 19398 19399 19400 19401 19402 19403
/**
 * virDomainOpenChannel:
 * @dom: a domain object
 * @name: the channel name, or NULL
 * @st: a stream to associate with the channel
 * @flags: bitwise-OR of virDomainChannelFlags
 *
 * This opens the host interface associated with a channel device on a
 * guest, if the host interface is supported.  If @name is given, it
 * can match either the device alias (e.g. "channel0"), or the virtio
 * target name (e.g. "org.qemu.guest_agent.0").  If @name is omitted,
 * then the first channel is opened. The channel is associated with
 * the passed in @st stream, which should have been opened in
 * non-blocking mode for bi-directional I/O.
 *
 * By default, when @flags is 0, the open will fail if libvirt detects
 * that the channel is already in use by another client; passing
 * VIR_DOMAIN_CHANNEL_FORCE will cause libvirt to forcefully remove the
 * other client prior to opening this channel.
 *
 * Returns 0 if the channel was opened, -1 on error
 */
19404 19405 19406 19407 19408
int
virDomainOpenChannel(virDomainPtr dom,
                     const char *name,
                     virStreamPtr st,
                     unsigned int flags)
19409 19410 19411 19412 19413 19414 19415 19416
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "name=%s, st=%p, flags=%x",
                     NULLSTR(name), st, flags);

    virResetLastError();

19417
    virCheckDomainReturn(dom, -1);
19418
    conn = dom->conn;
19419

19420
    virCheckStreamGoto(st, error);
19421
    virCheckReadOnlyGoto(conn->flags, error);
19422

19423 19424 19425 19426 19427 19428 19429
    if (conn != st->conn) {
        virReportInvalidArg(st,
                            _("stream in %s must match connection of domain '%s'"),
                            __FUNCTION__, dom->name);
        goto error;
    }

19430 19431 19432 19433 19434 19435 19436 19437
    if (conn->driver->domainOpenChannel) {
        int ret;
        ret = conn->driver->domainOpenChannel(dom, name, st, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19438
    virReportUnsupportedError();
19439

19440
 error:
19441 19442 19443 19444
    virDispatchError(conn);
    return -1;
}

19445

19446 19447 19448
/**
 * virDomainBlockJobAbort:
 * @dom: pointer to domain object
19449
 * @disk: path to the block device, or device shorthand
19450
 * @flags: bitwise-OR of virDomainBlockJobAbortFlags
19451 19452 19453
 *
 * Cancel the active block job on the given disk.
 *
19454
 * The @disk parameter is either an unambiguous source name of the
19455 19456
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
19457
 * (the <target dev='...'/> sub-element, such as "vda").  Valid names
19458 19459 19460
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
E
Eric Blake 已提交
19461 19462
 * If the current block job for @disk is VIR_DOMAIN_BLOCK_JOB_TYPE_PULL, then
 * by default, this function performs a synchronous operation and the caller
19463 19464 19465 19466 19467 19468 19469 19470
 * may assume that the operation has completed when 0 is returned.  However,
 * BlockJob operations may take a long time to cancel, and during this time
 * further domain interactions may be unresponsive.  To avoid this problem,
 * pass VIR_DOMAIN_BLOCK_JOB_ABORT_ASYNC in the @flags argument to enable
 * asynchronous behavior, returning as soon as possible.  When the job has
 * been canceled, a BlockJob event will be emitted, with status
 * VIR_DOMAIN_BLOCK_JOB_CANCELED (even if the ABORT_ASYNC flag was not
 * used); it is also possible to poll virDomainBlockJobInfo() to see if
E
Eric Blake 已提交
19471 19472 19473 19474 19475 19476 19477 19478 19479 19480 19481 19482
 * the job cancellation is still pending.  This type of job can be restarted
 * to pick up from where it left off.
 *
 * If the current block job for @disk is VIR_DOMAIN_BLOCK_JOB_TYPE_COPY, then
 * the default is to abort the mirroring and revert to the source disk;
 * adding @flags of VIR_DOMAIN_BLOCK_JOB_ABORT_PIVOT causes this call to
 * fail with VIR_ERR_BLOCK_COPY_ACTIVE if the copy is not fully populated,
 * otherwise it will swap the disk over to the copy to end the mirroring.  An
 * event will be issued when the job is ended, and it is possible to use
 * VIR_DOMAIN_BLOCK_JOB_ABORT_ASYNC to control whether this command waits
 * for the completion of the job.  Restarting this job requires starting
 * over from the beginning of the first phase.
19483
 *
19484 19485
 * Returns -1 in case of failure, 0 when successful.
 */
19486 19487 19488
int
virDomainBlockJobAbort(virDomainPtr dom, const char *disk,
                       unsigned int flags)
19489 19490 19491
{
    virConnectPtr conn;

19492
    VIR_DOMAIN_DEBUG(dom, "disk=%s, flags=%x", disk, flags);
19493 19494 19495

    virResetLastError();

19496
    virCheckDomainReturn(dom, -1);
19497 19498
    conn = dom->conn;

19499
    virCheckReadOnlyGoto(conn->flags, error);
19500
    virCheckNonNullArgGoto(disk, error);
19501 19502 19503

    if (conn->driver->domainBlockJobAbort) {
        int ret;
19504
        ret = conn->driver->domainBlockJobAbort(dom, disk, flags);
19505 19506 19507 19508 19509
        if (ret < 0)
            goto error;
        return ret;
    }

19510
    virReportUnsupportedError();
19511

19512
 error:
19513 19514 19515 19516
    virDispatchError(dom->conn);
    return -1;
}

19517

19518 19519 19520
/**
 * virDomainGetBlockJobInfo:
 * @dom: pointer to domain object
19521
 * @disk: path to the block device, or device shorthand
19522
 * @info: pointer to a virDomainBlockJobInfo structure
19523
 * @flags: extra flags; not used yet, so callers should always pass 0
19524 19525 19526 19527
 *
 * Request block job information for the given disk.  If an operation is active
 * @info will be updated with the current progress.
 *
19528
 * The @disk parameter is either an unambiguous source name of the
19529 19530
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
19531
 * (the <target dev='...'/> sub-element, such as "vda").  Valid names
19532 19533 19534
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19535 19536
 * Returns -1 in case of failure, 0 when nothing found, 1 when info was found.
 */
19537 19538 19539
int
virDomainGetBlockJobInfo(virDomainPtr dom, const char *disk,
                         virDomainBlockJobInfoPtr info, unsigned int flags)
19540 19541 19542
{
    virConnectPtr conn;

19543
    VIR_DOMAIN_DEBUG(dom, "disk=%s, info=%p, flags=%x", disk, info, flags);
19544 19545 19546

    virResetLastError();

19547 19548 19549
    if (info)
        memset(info, 0, sizeof(*info));

19550
    virCheckDomainReturn(dom, -1);
19551 19552
    conn = dom->conn;

19553 19554
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(info, error);
19555 19556 19557

    if (conn->driver->domainGetBlockJobInfo) {
        int ret;
19558
        ret = conn->driver->domainGetBlockJobInfo(dom, disk, info, flags);
19559 19560 19561 19562 19563
        if (ret < 0)
            goto error;
        return ret;
    }

19564
    virReportUnsupportedError();
19565

19566
 error:
19567 19568 19569 19570
    virDispatchError(dom->conn);
    return -1;
}

19571

19572 19573 19574
/**
 * virDomainBlockJobSetSpeed:
 * @dom: pointer to domain object
19575
 * @disk: path to the block device, or device shorthand
19576
 * @bandwidth: specify bandwidth limit in MiB/s
19577
 * @flags: extra flags; not used yet, so callers should always pass 0
19578 19579 19580 19581
 *
 * Set the maximimum allowable bandwidth that a block job may consume.  If
 * bandwidth is 0, the limit will revert to the hypervisor default.
 *
19582
 * The @disk parameter is either an unambiguous source name of the
19583 19584
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
19585
 * (the <target dev='...'/> sub-element, such as "vda").  Valid names
19586 19587 19588
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19589 19590
 * Returns -1 in case of failure, 0 when successful.
 */
19591 19592 19593
int
virDomainBlockJobSetSpeed(virDomainPtr dom, const char *disk,
                          unsigned long bandwidth, unsigned int flags)
19594 19595 19596
{
    virConnectPtr conn;

19597
    VIR_DOMAIN_DEBUG(dom, "disk=%s, bandwidth=%lu, flags=%x",
19598
                     disk, bandwidth, flags);
19599 19600 19601

    virResetLastError();

19602
    virCheckDomainReturn(dom, -1);
19603 19604
    conn = dom->conn;

19605
    virCheckReadOnlyGoto(conn->flags, error);
19606
    virCheckNonNullArgGoto(disk, error);
19607 19608 19609

    if (conn->driver->domainBlockJobSetSpeed) {
        int ret;
19610
        ret = conn->driver->domainBlockJobSetSpeed(dom, disk, bandwidth, flags);
19611 19612 19613 19614 19615
        if (ret < 0)
            goto error;
        return ret;
    }

19616
    virReportUnsupportedError();
19617

19618
 error:
19619 19620 19621 19622
    virDispatchError(dom->conn);
    return -1;
}

19623

19624 19625 19626
/**
 * virDomainBlockPull:
 * @dom: pointer to domain object
19627
 * @disk: path to the block device, or device shorthand
19628
 * @bandwidth: (optional) specify copy bandwidth limit in MiB/s
19629
 * @flags: extra flags; not used yet, so callers should always pass 0
19630 19631 19632 19633 19634 19635
 *
 * Populate a disk image with data from its backing image.  Once all data from
 * its backing image has been pulled, the disk no longer depends on a backing
 * image.  This function pulls data for the entire device in the background.
 * Progress of the operation can be checked with virDomainGetBlockJobInfo() and
 * the operation can be aborted with virDomainBlockJobAbort().  When finished,
E
Eric Blake 已提交
19636 19637
 * an asynchronous event is raised to indicate the final status.  To move
 * data in the opposite direction, see virDomainBlockCommit().
19638
 *
19639
 * The @disk parameter is either an unambiguous source name of the
19640 19641
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
19642
 * (the <target dev='...'/> sub-element, such as "vda").  Valid names
19643 19644 19645
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19646
 * The maximum bandwidth (in MiB/s) that will be used to do the copy can be
19647 19648
 * specified with the bandwidth parameter.  If set to 0, libvirt will choose a
 * suitable default.  Some hypervisors do not support this feature and will
19649 19650 19651
 * return an error if bandwidth is not 0; in this case, it might still be
 * possible for a later call to virDomainBlockJobSetSpeed() to succeed.
 * The actual speed can be determined with virDomainGetBlockJobInfo().
19652
 *
19653 19654
 * This is shorthand for virDomainBlockRebase() with a NULL base.
 *
19655 19656
 * Returns 0 if the operation has started, -1 on failure.
 */
19657 19658 19659
int
virDomainBlockPull(virDomainPtr dom, const char *disk,
                   unsigned long bandwidth, unsigned int flags)
19660 19661 19662
{
    virConnectPtr conn;

19663
    VIR_DOMAIN_DEBUG(dom, "disk=%s, bandwidth=%lu, flags=%x",
19664
                     disk, bandwidth, flags);
19665 19666 19667

    virResetLastError();

19668
    virCheckDomainReturn(dom, -1);
19669 19670
    conn = dom->conn;

19671
    virCheckReadOnlyGoto(conn->flags, error);
19672
    virCheckNonNullArgGoto(disk, error);
19673 19674 19675

    if (conn->driver->domainBlockPull) {
        int ret;
19676
        ret = conn->driver->domainBlockPull(dom, disk, bandwidth, flags);
19677 19678 19679 19680 19681
        if (ret < 0)
            goto error;
        return ret;
    }

19682
    virReportUnsupportedError();
19683

19684
 error:
19685 19686 19687
    virDispatchError(dom->conn);
    return -1;
}
19688 19689


19690 19691 19692 19693
/**
 * virDomainBlockRebase:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
19694 19695
 * @base: path to backing file to keep, or device shorthand,
 *        or NULL for no backing file
19696
 * @bandwidth: (optional) specify copy bandwidth limit in MiB/s
E
Eric Blake 已提交
19697
 * @flags: bitwise-OR of virDomainBlockRebaseFlags
19698 19699
 *
 * Populate a disk image with data from its backing image chain, and
E
Eric Blake 已提交
19700 19701 19702 19703
 * setting the backing image to @base, or alternatively copy an entire
 * backing chain to a new file @base.
 *
 * When @flags is 0, this starts a pull, where @base must be the absolute
19704 19705 19706 19707 19708
 * path of one of the backing images further up the chain, or NULL to
 * convert the disk image so that it has no backing image.  Once all
 * data from its backing image chain has been pulled, the disk no
 * longer depends on those intermediate backing images.  This function
 * pulls data for the entire device in the background.  Progress of
E
Eric Blake 已提交
19709 19710 19711 19712 19713 19714 19715 19716 19717 19718 19719 19720 19721 19722 19723 19724 19725 19726 19727 19728 19729 19730 19731 19732 19733 19734 19735 19736 19737 19738 19739 19740
 * the operation can be checked with virDomainGetBlockJobInfo() with a
 * job type of VIR_DOMAIN_BLOCK_JOB_TYPE_PULL, and the operation can be
 * aborted with virDomainBlockJobAbort().  When finished, an asynchronous
 * event is raised to indicate the final status, and the job no longer
 * exists.  If the job is aborted, a new one can be started later to
 * resume from the same point.
 *
 * When @flags includes VIR_DOMAIN_BLOCK_REBASE_COPY, this starts a copy,
 * where @base must be the name of a new file to copy the chain to.  By
 * default, the copy will pull the entire source chain into the destination
 * file, but if @flags also contains VIR_DOMAIN_BLOCK_REBASE_SHALLOW, then
 * only the top of the source chain will be copied (the source and
 * destination have a common backing file).  By default, @base will be
 * created with the same file format as the source, but this can be altered
 * by adding VIR_DOMAIN_BLOCK_REBASE_COPY_RAW to force the copy to be raw
 * (does not make sense with the shallow flag unless the source is also raw),
 * or by using VIR_DOMAIN_BLOCK_REBASE_REUSE_EXT to reuse an existing file
 * with initial contents identical to the backing file of the source (this
 * allows a management app to pre-create files with relative backing file
 * names, rather than the default of absolute backing file names; as a
 * security precaution, you should generally only use reuse_ext with the
 * shallow flag and a non-raw destination file).
 *
 * A copy job has two parts; in the first phase, the @bandwidth parameter
 * affects how fast the source is pulled into the destination, and the job
 * can only be canceled by reverting to the source file; progress in this
 * phase can be tracked via the virDomainBlockJobInfo() command, with a
 * job type of VIR_DOMAIN_BLOCK_JOB_TYPE_COPY.  The job transitions to the
 * second phase when the job info states cur == end, and remains alive to
 * mirror all further changes to both source and destination.  The user
 * must call virDomainBlockJobAbort() to end the mirroring while choosing
 * whether to revert to source or pivot to the destination.  An event is
19741 19742 19743 19744
 * issued when the job ends, and depending on the hypervisor, an event may
 * also be issued when the job transitions from pulling to mirroring.  If
 * the job is aborted, a new job will have to start over from the beginning
 * of the first phase.
E
Eric Blake 已提交
19745 19746 19747 19748
 *
 * Some hypervisors will restrict certain actions, such as virDomainSave()
 * or virDomainDetachDevice(), while a copy job is active; they may
 * also restrict a copy job to transient domains.
19749 19750 19751 19752
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the
19753
 * <target dev='...'/> sub-element, such as "vda").  Valid names
19754 19755 19756
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19757 19758 19759 19760 19761 19762 19763 19764
 * The @base parameter can be either a path to a file within the backing
 * chain, or the device target shorthand (the <target dev='...'/>
 * sub-element, such as "vda") followed by an index to the backing chain
 * enclosed in square brackets. Backing chain indexes can be found by
 * inspecting //disk//backingStore/@index in the domain XML. Thus, for
 * example, "vda[3]" refers to the backing store with index equal to "3"
 * in the chain of disk "vda".
 *
19765
 * The maximum bandwidth (in MiB/s) that will be used to do the copy can be
19766 19767
 * specified with the bandwidth parameter.  If set to 0, libvirt will choose a
 * suitable default.  Some hypervisors do not support this feature and will
19768 19769 19770
 * return an error if bandwidth is not 0; in this case, it might still be
 * possible for a later call to virDomainBlockJobSetSpeed() to succeed.
 * The actual speed can be determined with virDomainGetBlockJobInfo().
19771
 *
E
Eric Blake 已提交
19772 19773
 * When @base is NULL and @flags is 0, this is identical to
 * virDomainBlockPull().
19774 19775 19776
 *
 * Returns 0 if the operation has started, -1 on failure.
 */
19777 19778 19779 19780
int
virDomainBlockRebase(virDomainPtr dom, const char *disk,
                     const char *base, unsigned long bandwidth,
                     unsigned int flags)
19781 19782 19783
{
    virConnectPtr conn;

E
Eric Blake 已提交
19784
    VIR_DOMAIN_DEBUG(dom, "disk=%s, base=%s, bandwidth=%lu, flags=%x",
19785 19786 19787 19788
                     disk, NULLSTR(base), bandwidth, flags);

    virResetLastError();

19789
    virCheckDomainReturn(dom, -1);
19790 19791
    conn = dom->conn;

19792
    virCheckReadOnlyGoto(conn->flags, error);
19793
    virCheckNonNullArgGoto(disk, error);
19794

E
Eric Blake 已提交
19795
    if (flags & VIR_DOMAIN_BLOCK_REBASE_COPY) {
19796
        virCheckNonNullArgGoto(base, error);
E
Eric Blake 已提交
19797 19798 19799
    } else if (flags & (VIR_DOMAIN_BLOCK_REBASE_SHALLOW |
                        VIR_DOMAIN_BLOCK_REBASE_REUSE_EXT |
                        VIR_DOMAIN_BLOCK_REBASE_COPY_RAW)) {
19800 19801 19802
        virReportInvalidArg(flags,
                            _("use of flags in %s requires a copy job"),
                            __FUNCTION__);
E
Eric Blake 已提交
19803 19804 19805
        goto error;
    }

19806 19807 19808 19809 19810 19811 19812 19813 19814
    if (conn->driver->domainBlockRebase) {
        int ret;
        ret = conn->driver->domainBlockRebase(dom, disk, base, bandwidth,
                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19815
    virReportUnsupportedError();
19816

19817
 error:
19818 19819 19820 19821 19822
    virDispatchError(dom->conn);
    return -1;
}


E
Eric Blake 已提交
19823 19824 19825 19826
/**
 * virDomainBlockCommit:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
19827 19828
 * @base: path to backing file to merge into, or device shorthand,
 *        or NULL for default
E
Eric Blake 已提交
19829
 * @top: path to file within backing chain that contains data to be merged,
19830
 *       or device shorthand, or NULL to merge all possible data
E
Eric Blake 已提交
19831 19832 19833 19834 19835 19836 19837 19838 19839 19840 19841 19842 19843 19844 19845 19846 19847 19848 19849 19850 19851 19852 19853 19854 19855 19856 19857 19858 19859 19860 19861 19862 19863 19864 19865 19866 19867 19868 19869 19870 19871 19872 19873 19874 19875
 * @bandwidth: (optional) specify commit bandwidth limit in MiB/s
 * @flags: bitwise-OR of virDomainBlockCommitFlags
 *
 * Commit changes that were made to temporary top-level files within a disk
 * image backing file chain into a lower-level base file.  In other words,
 * take all the difference between @base and @top, and update @base to contain
 * that difference; after the commit, any portion of the chain that previously
 * depended on @top will now depend on @base, and all files after @base up
 * to and including @top will now be invalidated.  A typical use of this
 * command is to reduce the length of a backing file chain after taking an
 * external disk snapshot.  To move data in the opposite direction, see
 * virDomainBlockPull().
 *
 * This command starts a long-running commit block job, whose status may
 * be tracked by virDomainBlockJobInfo() with a job type of
 * VIR_DOMAIN_BLOCK_JOB_TYPE_COMMIT, and the operation can be aborted with
 * virDomainBlockJobAbort().  When finished, an asynchronous event is
 * raised to indicate the final status, and the job no longer exists.  If
 * the job is aborted, it is up to the hypervisor whether starting a new
 * job will resume from the same point, or start over.
 *
 * Be aware that this command may invalidate files even if it is aborted;
 * the user is cautioned against relying on the contents of invalidated
 * intermediate files such as @top without manually rebasing those files
 * to use a backing file of a read-only copy of @base prior to the point
 * where the commit operation was started (although such a rebase cannot
 * be safely done until the commit has successfully completed).  However,
 * the domain itself will not have any issues; the active layer remains
 * valid throughout the entire commit operation.  As a convenience,
 * if @flags contains VIR_DOMAIN_BLOCK_COMMIT_DELETE, this command will
 * unlink all files that were invalidated, after the commit successfully
 * completes.
 *
 * By default, if @base is NULL, the commit target will be the bottom of
 * the backing chain; if @flags contains VIR_DOMAIN_BLOCK_COMMIT_SHALLOW,
 * then the immediate backing file of @top will be used instead.  If @top
 * is NULL, the active image at the top of the chain will be used.  Some
 * hypervisors place restrictions on how much can be committed, and might
 * fail if @base is not the immediate backing file of @top, or if @top is
 * the active layer in use by a running domain, or if @top is not the
 * top-most file; restrictions may differ for online vs. offline domains.
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the
19876
 * <target dev='...'/> sub-element, such as "vda").  Valid names
E
Eric Blake 已提交
19877 19878 19879
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19880 19881 19882 19883 19884 19885 19886 19887
 * The @base and @top parameters can be either paths to files within the
 * backing chain, or the device target shorthand (the <target dev='...'/>
 * sub-element, such as "vda") followed by an index to the backing chain
 * enclosed in square brackets. Backing chain indexes can be found by
 * inspecting //disk//backingStore/@index in the domain XML. Thus, for
 * example, "vda[3]" refers to the backing store with index equal to "3"
 * in the chain of disk "vda".
 *
E
Eric Blake 已提交
19888 19889 19890 19891 19892 19893 19894 19895 19896
 * The maximum bandwidth (in MiB/s) that will be used to do the commit can be
 * specified with the bandwidth parameter.  If set to 0, libvirt will choose a
 * suitable default.  Some hypervisors do not support this feature and will
 * return an error if bandwidth is not 0; in this case, it might still be
 * possible for a later call to virDomainBlockJobSetSpeed() to succeed.
 * The actual speed can be determined with virDomainGetBlockJobInfo().
 *
 * Returns 0 if the operation has started, -1 on failure.
 */
19897 19898 19899 19900
int
virDomainBlockCommit(virDomainPtr dom, const char *disk,
                     const char *base, const char *top,
                     unsigned long bandwidth, unsigned int flags)
E
Eric Blake 已提交
19901 19902 19903 19904 19905 19906 19907 19908
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "disk=%s, base=%s, top=%s, bandwidth=%lu, flags=%x",
                     disk, NULLSTR(base), NULLSTR(top), bandwidth, flags);

    virResetLastError();

19909
    virCheckDomainReturn(dom, -1);
E
Eric Blake 已提交
19910 19911
    conn = dom->conn;

19912
    virCheckReadOnlyGoto(conn->flags, error);
E
Eric Blake 已提交
19913 19914 19915 19916 19917 19918 19919 19920 19921 19922 19923
    virCheckNonNullArgGoto(disk, error);

    if (conn->driver->domainBlockCommit) {
        int ret;
        ret = conn->driver->domainBlockCommit(dom, disk, base, top, bandwidth,
                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19924
    virReportUnsupportedError();
E
Eric Blake 已提交
19925

19926
 error:
E
Eric Blake 已提交
19927 19928 19929 19930 19931
    virDispatchError(dom->conn);
    return -1;
}


19932 19933 19934 19935 19936
/**
 * virDomainOpenGraphics:
 * @dom: pointer to domain object
 * @idx: index of graphics config to open
 * @fd: file descriptor to attach graphics to
19937
 * @flags: bitwise-OR of virDomainOpenGraphicsFlags
19938 19939 19940 19941 19942 19943 19944 19945 19946 19947 19948 19949 19950 19951 19952 19953 19954 19955
 *
 * This will attempt to connect the file descriptor @fd, to
 * the graphics backend of @dom. If @dom has multiple graphics
 * backends configured, then @idx will determine which one is
 * opened, starting from @idx 0.
 *
 * To disable any authentication, pass the VIR_DOMAIN_OPEN_GRAPHICS_SKIPAUTH
 * constant for @flags.
 *
 * The caller should use an anonymous socketpair to open
 * @fd before invocation.
 *
 * This method can only be used when connected to a local
 * libvirt hypervisor, over a UNIX domain socket. Attempts
 * to use this method over a TCP connection will always fail
 *
 * Returns 0 on success, -1 on failure
 */
19956 19957 19958 19959 19960
int
virDomainOpenGraphics(virDomainPtr dom,
                      unsigned int idx,
                      int fd,
                      unsigned int flags)
19961 19962 19963 19964 19965 19966 19967
{
    struct stat sb;
    VIR_DOMAIN_DEBUG(dom, "idx=%u, fd=%d, flags=%x",
                     idx, fd, flags);

    virResetLastError();

19968
    virCheckDomainReturn(dom, -1);
19969
    virCheckNonNegativeArgGoto(fd, error);
19970 19971 19972 19973 19974 19975 19976 19977

    if (fstat(fd, &sb) < 0) {
        virReportSystemError(errno,
                             _("Unable to access file descriptor %d"), fd);
        goto error;
    }

    if (!S_ISSOCK(sb.st_mode)) {
19978 19979 19980
        virReportInvalidArg(fd,
                          _("fd %d in %s must be a socket"),
                            fd, __FUNCTION__);
19981 19982 19983
        goto error;
    }

19984
    virCheckReadOnlyGoto(dom->conn->flags, error);
19985 19986 19987

    if (!VIR_DRV_SUPPORTS_FEATURE(dom->conn->driver, dom->conn,
                                  VIR_DRV_FEATURE_FD_PASSING)) {
19988 19989
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("fd passing is not supported by this connection"));
19990 19991 19992 19993 19994 19995 19996 19997 19998 19999 20000
        goto error;
    }

    if (dom->conn->driver->domainOpenGraphics) {
        int ret;
        ret = dom->conn->driver->domainOpenGraphics(dom, idx, fd, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20001
    virReportUnsupportedError();
20002

20003
 error:
20004 20005 20006
    virDispatchError(dom->conn);
    return -1;
}
J
Jiri Denemark 已提交
20007 20008 20009 20010 20011 20012 20013 20014


/**
 * virConnectSetKeepAlive:
 * @conn: pointer to a hypervisor connection
 * @interval: number of seconds of inactivity before a keepalive message is sent
 * @count: number of messages that can be sent in a row
 *
E
Eric Blake 已提交
20015
 * Start sending keepalive messages after @interval seconds of inactivity and
J
Jiri Denemark 已提交
20016
 * consider the connection to be broken when no response is received after
E
Eric Blake 已提交
20017 20018 20019 20020 20021 20022 20023 20024 20025 20026
 * @count keepalive messages sent in a row.  In other words, sending count + 1
 * keepalive message results in closing the connection.  When @interval is
 * <= 0, no keepalive messages will be sent.  When @count is 0, the connection
 * will be automatically closed after @interval seconds of inactivity without
 * sending any keepalive messages.
 *
 * Note: The client has to implement and run an event loop with
 * virEventRegisterImpl() or virEventRegisterDefaultImpl() to be able to
 * use keepalive messages.  Failure to do so may result in connections
 * being closed unexpectedly.
J
Jiri Denemark 已提交
20027
 *
20028 20029 20030 20031
 * Note: This API function controls only keepalive messages sent by the client.
 * If the server is configured to use keepalive you still need to run the event
 * loop to respond to them, even if you disable keepalives by this function.
 *
J
Jiri Denemark 已提交
20032 20033 20034
 * Returns -1 on error, 0 on success, 1 when remote party doesn't support
 * keepalive messages.
 */
20035 20036 20037 20038
int
virConnectSetKeepAlive(virConnectPtr conn,
                       int interval,
                       unsigned int count)
J
Jiri Denemark 已提交
20039 20040 20041 20042 20043 20044 20045
{
    int ret = -1;

    VIR_DEBUG("conn=%p, interval=%d, count=%u", conn, interval, count);

    virResetLastError();

20046
    virCheckConnectReturn(conn, -1);
J
Jiri Denemark 已提交
20047

20048 20049
    if (conn->driver->connectSetKeepAlive) {
        ret = conn->driver->connectSetKeepAlive(conn, interval, count);
J
Jiri Denemark 已提交
20050 20051 20052 20053 20054
        if (ret < 0)
            goto error;
        return ret;
    }

20055
    virReportUnsupportedError();
J
Jiri Denemark 已提交
20056

20057
 error:
J
Jiri Denemark 已提交
20058 20059 20060
    virDispatchError(conn);
    return -1;
}
J
Jiri Denemark 已提交
20061

20062

J
Jiri Denemark 已提交
20063 20064 20065 20066 20067 20068 20069 20070 20071 20072 20073
/**
 * virConnectIsAlive:
 * @conn: pointer to the connection object
 *
 * Determine if the connection to the hypervisor is still alive
 *
 * A connection will be classed as alive if it is either local, or running
 * over a channel (TCP or UNIX socket) which is not closed.
 *
 * Returns 1 if alive, 0 if dead, -1 on error
 */
20074 20075
int
virConnectIsAlive(virConnectPtr conn)
J
Jiri Denemark 已提交
20076 20077 20078 20079 20080
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

20081
    virCheckConnectReturn(conn, -1);
20082
    if (conn->driver->connectIsAlive) {
J
Jiri Denemark 已提交
20083
        int ret;
20084
        ret = conn->driver->connectIsAlive(conn);
J
Jiri Denemark 已提交
20085 20086 20087 20088 20089
        if (ret < 0)
            goto error;
        return ret;
    }

20090
    virReportUnsupportedError();
20091
 error:
J
Jiri Denemark 已提交
20092 20093 20094
    virDispatchError(conn);
    return -1;
}
20095 20096


20097 20098 20099 20100 20101 20102 20103 20104 20105 20106 20107 20108 20109 20110 20111 20112 20113 20114 20115 20116 20117 20118 20119
/**
 * virConnectRegisterCloseCallback:
 * @conn: pointer to connection object
 * @cb: callback to invoke upon close
 * @opaque: user data to pass to @cb
 * @freecb: callback to free @opaque
 *
 * Registers a callback to be invoked when the connection
 * is closed. This callback is invoked when there is any
 * condition that causes the socket connection to the
 * hypervisor to be closed.
 *
 * This function is only applicable to hypervisor drivers
 * which maintain a persistent open connection. Drivers
 * which open a new connection for every operation will
 * not invoke this.
 *
 * The @freecb must not invoke any other libvirt public
 * APIs, since it is not called from a re-entrant safe
 * context.
 *
 * Returns 0 on success, -1 on error
 */
20120 20121 20122 20123 20124
int
virConnectRegisterCloseCallback(virConnectPtr conn,
                                virConnectCloseFunc cb,
                                void *opaque,
                                virFreeCallback freecb)
20125 20126 20127 20128 20129
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

20130
    virCheckConnectReturn(conn, -1);
20131

20132 20133
    virObjectRef(conn);

20134
    virMutexLock(&conn->lock);
20135
    virObjectLock(conn->closeCallback);
20136 20137 20138

    virCheckNonNullArgGoto(cb, error);

20139
    if (conn->closeCallback->callback) {
20140 20141
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("A close callback is already registered"));
20142 20143 20144
        goto error;
    }

20145
    conn->closeCallback->conn = conn;
20146 20147 20148
    conn->closeCallback->callback = cb;
    conn->closeCallback->opaque = opaque;
    conn->closeCallback->freeCallback = freecb;
20149

20150
    virObjectUnlock(conn->closeCallback);
20151 20152 20153 20154
    virMutexUnlock(&conn->lock);

    return 0;

20155
 error:
20156
    virObjectUnlock(conn->closeCallback);
20157
    virMutexUnlock(&conn->lock);
20158
    virDispatchError(conn);
20159
    virObjectUnref(conn);
20160 20161 20162
    return -1;
}

20163

20164 20165 20166 20167 20168 20169 20170 20171 20172 20173 20174 20175 20176
/**
 * virConnectUnregisterCloseCallback:
 * @conn: pointer to connection object
 * @cb: pointer to the current registered callback
 *
 * Unregisters the callback previously set with the
 * virConnectRegisterCloseCallback method. The callback
 * will no longer receive notifications when the connection
 * closes. If a virFreeCallback was provided at time of
 * registration, it will be invoked
 *
 * Returns 0 on success, -1 on error
 */
20177 20178 20179
int
virConnectUnregisterCloseCallback(virConnectPtr conn,
                                  virConnectCloseFunc cb)
20180 20181 20182 20183 20184
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

20185
    virCheckConnectReturn(conn, -1);
20186 20187

    virMutexLock(&conn->lock);
20188
    virObjectLock(conn->closeCallback);
20189 20190 20191

    virCheckNonNullArgGoto(cb, error);

20192
    if (conn->closeCallback->callback != cb) {
20193 20194
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("A different callback was requested"));
20195 20196 20197
        goto error;
    }

20198 20199 20200 20201
    conn->closeCallback->callback = NULL;
    if (conn->closeCallback->freeCallback)
        conn->closeCallback->freeCallback(conn->closeCallback->opaque);
    conn->closeCallback->freeCallback = NULL;
20202

20203
    virObjectUnref(conn);
20204 20205
    virObjectUnlock(conn->closeCallback);
    virMutexUnlock(&conn->lock);
20206

20207 20208
    return 0;

20209
 error:
20210
    virObjectUnlock(conn->closeCallback);
20211
    virMutexUnlock(&conn->lock);
20212
    virDispatchError(conn);
20213 20214 20215
    return -1;
}

20216

20217 20218 20219 20220 20221 20222 20223
/**
 * virDomainSetBlockIoTune:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
 * @params: Pointer to blkio parameter objects
 * @nparams: Number of blkio parameters (this value can be the same or
 *           less than the number of parameters supported)
20224
 * @flags: bitwise-OR of virDomainModificationImpact
20225 20226 20227 20228 20229 20230 20231 20232 20233 20234 20235 20236
 *
 * Change all or a subset of the per-device block IO tunables.
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the <target
 * dev='...'/> sub-element, such as "xvda").  Valid names can be found
 * by calling virDomainGetXMLDesc() and inspecting elements
 * within //domain/devices/disk.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
20237 20238 20239 20240 20241 20242
int
virDomainSetBlockIoTune(virDomainPtr dom,
                        const char *disk,
                        virTypedParameterPtr params,
                        int nparams,
                        unsigned int flags)
20243 20244 20245
{
    virConnectPtr conn;

20246
    VIR_DOMAIN_DEBUG(dom, "disk=%s, params=%p, nparams=%d, flags=%x",
20247
                     disk, params, nparams, flags);
20248
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
20249 20250 20251

    virResetLastError();

20252 20253
    virCheckDomainReturn(dom, -1);
    conn = dom->conn;
20254

20255
    virCheckReadOnlyGoto(conn->flags, error);
20256 20257 20258
    virCheckNonNullArgGoto(disk, error);
    virCheckPositiveArgGoto(nparams, error);
    virCheckNonNullArgGoto(params, error);
20259

20260
    if (virTypedParameterValidateSet(dom->conn, params, nparams) < 0)
20261
        goto error;
20262 20263 20264 20265 20266 20267 20268 20269 20270

    if (conn->driver->domainSetBlockIoTune) {
        int ret;
        ret = conn->driver->domainSetBlockIoTune(dom, disk, params, nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20271
    virReportUnsupportedError();
20272

20273
 error:
20274 20275 20276 20277
    virDispatchError(dom->conn);
    return -1;
}

20278

20279 20280 20281 20282 20283 20284 20285
/**
 * virDomainGetBlockIoTune:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
 * @params: Pointer to blkio parameter object
 *          (return value, allocated by the caller)
 * @nparams: Pointer to number of blkio parameters
20286
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
20287 20288 20289 20290 20291 20292 20293 20294 20295 20296 20297 20298 20299 20300 20301 20302 20303 20304 20305 20306 20307 20308 20309 20310 20311
 *
 * Get all block IO tunable parameters for a given device.  On input,
 * @nparams gives the size of the @params array; on output, @nparams
 * gives how many slots were filled with parameter information, which
 * might be less but will not exceed the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0
 * on input will cause @nparams on output to contain the number of
 * parameters supported by the hypervisor, either for the given @disk
 * (note that block devices of different types might support different
 * parameters), or if @disk is NULL, for all possible disks. The
 * caller should then allocate @params array,
 * i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.  See virDomainGetMemoryParameters() for more details.
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the <target
 * dev='...'/> sub-element, such as "xvda").  Valid names can be found
 * by calling virDomainGetXMLDesc() and inspecting elements
 * within //domain/devices/disk.  This parameter cannot be NULL
 * unless @nparams is 0 on input.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
20312 20313 20314 20315 20316 20317
int
virDomainGetBlockIoTune(virDomainPtr dom,
                        const char *disk,
                        virTypedParameterPtr params,
                        int *nparams,
                        unsigned int flags)
20318 20319 20320
{
    virConnectPtr conn;

20321
    VIR_DOMAIN_DEBUG(dom, "disk=%s, params=%p, nparams=%d, flags=%x",
20322 20323 20324 20325
                     NULLSTR(disk), params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

20326
    virCheckDomainReturn(dom, -1);
20327

20328 20329 20330 20331 20332
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0) {
        virCheckNonNullArgGoto(params, error);
        virCheckNonNullArgGoto(disk, error);
20333 20334 20335 20336 20337 20338 20339 20340 20341
    }

    if (VIR_DRV_SUPPORTS_FEATURE(dom->conn->driver, dom->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
20342
        virReportInvalidArg(flags,
20343 20344
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
20345
                            __FUNCTION__);
20346 20347 20348 20349 20350 20351 20352 20353 20354 20355 20356 20357
        goto error;
    }
    conn = dom->conn;

    if (conn->driver->domainGetBlockIoTune) {
        int ret;
        ret = conn->driver->domainGetBlockIoTune(dom, disk, params, nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20358
    virReportUnsupportedError();
20359

20360
 error:
20361 20362 20363
    virDispatchError(dom->conn);
    return -1;
}
20364

20365

20366 20367 20368 20369 20370 20371 20372
/**
 * virDomainGetCPUStats:
 * @domain: domain to query
 * @params: array to populate on output
 * @nparams: number of parameters per cpu
 * @start_cpu: which cpu to start with, or -1 for summary
 * @ncpus: how many cpus to query
20373
 * @flags: bitwise-OR of virTypedParameterFlags
20374 20375 20376 20377 20378 20379 20380 20381 20382 20383 20384 20385 20386 20387
 *
 * Get statistics relating to CPU usage attributable to a single
 * domain (in contrast to the statistics returned by
 * virNodeGetCPUStats() for all processes on the host).  @dom
 * must be running (an inactive domain has no attributable cpu
 * usage).  On input, @params must contain at least @nparams * @ncpus
 * entries, allocated by the caller.
 *
 * If @start_cpu is -1, then @ncpus must be 1, and the returned
 * results reflect the statistics attributable to the entire
 * domain (such as user and system time for the process as a
 * whole).  Otherwise, @start_cpu represents which cpu to start
 * with, and @ncpus represents how many consecutive processors to
 * query, with statistics attributable per processor (such as
20388 20389 20390
 * per-cpu usage).  If @ncpus is larger than the number of cpus
 * available to query, then the trailing part of the array will
 * be unpopulated.
20391 20392 20393 20394 20395 20396 20397 20398 20399 20400 20401 20402 20403 20404 20405 20406 20407 20408 20409 20410 20411 20412 20413 20414 20415 20416 20417 20418 20419 20420
 *
 * The remote driver imposes a limit of 128 @ncpus and 16 @nparams;
 * the number of parameters per cpu should not exceed 16, but if you
 * have a host with more than 128 CPUs, your program should split
 * the request into multiple calls.
 *
 * As special cases, if @params is NULL and @nparams is 0 and
 * @ncpus is 1, and the return value will be how many
 * statistics are available for the given @start_cpu.  This number
 * may be different for @start_cpu of -1 than for any non-negative
 * value, but will be the same for all non-negative @start_cpu.
 * Likewise, if @params is NULL and @nparams is 0 and @ncpus is 0,
 * the number of cpus available to query is returned.  From the
 * host perspective, this would typically match the cpus member
 * of virNodeGetInfo(), but might be less due to host cpu hotplug.
 *
 * For now, @flags is unused, and the statistics all relate to the
 * usage from the host perspective.  It is possible that a future
 * version will support a flag that queries the cpu usage from the
 * guest's perspective, where the maximum cpu to query would be
 * related to virDomainGetVcpusFlags() rather than virNodeGetInfo().
 * An individual guest vcpu cannot be reliably mapped back to a
 * specific host cpu unless a single-processor vcpu pinning was used,
 * but when @start_cpu is -1, any difference in usage between a host
 * and guest perspective would serve as a measure of hypervisor overhead.
 *
 * Typical use sequence is below.
 *
 * getting total stats: set start_cpu as -1, ncpus 1
 * virDomainGetCPUStats(dom, NULL, 0, -1, 1, 0) => nparams
20421
 * params = calloc(nparams, sizeof(virTypedParameter))
20422 20423 20424 20425 20426
 * virDomainGetCPUStats(dom, params, nparams, -1, 1, 0) => total stats.
 *
 * getting per-cpu stats:
 * virDomainGetCPUStats(dom, NULL, 0, 0, 0, 0) => ncpus
 * virDomainGetCPUStats(dom, NULL, 0, 0, 1, 0) => nparams
20427
 * params = calloc(ncpus * nparams, sizeof(virTypedParameter))
20428 20429 20430 20431 20432 20433 20434
 * virDomainGetCPUStats(dom, params, nparams, 0, ncpus, 0) => per-cpu stats
 *
 * Returns -1 on failure, or the number of statistics that were
 * populated per cpu on success (this will be less than the total
 * number of populated @params, unless @ncpus was 1; and may be
 * less than @nparams).  The populated parameters start at each
 * stride of @nparams, which means the results may be discontiguous;
20435 20436 20437 20438
 * any unpopulated parameters will be zeroed on success (this includes
 * skipped elements if @nparams is too large, and tail elements if
 * @ncpus is too large).  The caller is responsible for freeing any
 * returned string parameters.
20439
 */
20440 20441 20442 20443 20444 20445 20446
int
virDomainGetCPUStats(virDomainPtr domain,
                     virTypedParameterPtr params,
                     unsigned int nparams,
                     int start_cpu,
                     unsigned int ncpus,
                     unsigned int flags)
20447 20448 20449 20450 20451 20452 20453 20454
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain,
                     "params=%p, nparams=%d, start_cpu=%d, ncpus=%u, flags=%x",
                     params, nparams, start_cpu, ncpus, flags);
    virResetLastError();

20455
    virCheckDomainReturn(domain, -1);
20456
    conn = domain->conn;
20457

20458 20459 20460 20461 20462
    /* Special cases:
     * start_cpu must be non-negative, or else -1
     * if start_cpu is -1, ncpus must be 1
     * params == NULL must match nparams == 0
     * ncpus must be non-zero unless params == NULL
20463
     * nparams * ncpus must not overflow (RPC may restrict it even more)
20464
     */
20465 20466 20467 20468 20469 20470 20471 20472 20473
    if (start_cpu == -1) {
        if (ncpus != 1) {
            virReportInvalidArg(start_cpu,
                                _("ncpus in %s must be 1 when start_cpu is -1"),
                                __FUNCTION__);
            goto error;
        }
    } else {
        virCheckNonNegativeArgGoto(start_cpu, error);
20474
    }
20475 20476 20477 20478 20479 20480 20481
    if (nparams)
        virCheckNonNullArgGoto(params, error);
    else
        virCheckNullArgGoto(params, error);
    if (ncpus == 0)
        virCheckNullArgGoto(params, error);

E
Eric Blake 已提交
20482
    if (nparams && ncpus > UINT_MAX / nparams) {
20483 20484
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u * %u"),
                       nparams, ncpus);
E
Eric Blake 已提交
20485 20486
        goto error;
    }
20487 20488 20489
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
20490 20491 20492 20493 20494 20495 20496 20497 20498 20499 20500

    if (conn->driver->domainGetCPUStats) {
        int ret;

        ret = conn->driver->domainGetCPUStats(domain, params, nparams,
                                              start_cpu, ncpus, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20501
    virReportUnsupportedError();
20502

20503
 error:
20504 20505 20506
    virDispatchError(domain->conn);
    return -1;
}
20507

20508

20509 20510 20511 20512 20513 20514 20515 20516 20517 20518 20519 20520 20521 20522 20523 20524 20525 20526 20527 20528 20529 20530 20531 20532 20533 20534 20535 20536 20537 20538 20539 20540 20541 20542 20543 20544 20545 20546 20547
/**
 * virDomainGetDiskErrors:
 * @dom: a domain object
 * @errors: array to populate on output
 * @maxerrors: size of @errors array
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * The function populates @errors array with all disks that encountered an
 * I/O error.  Disks with no error will not be returned in the @errors array.
 * Each disk is identified by its target (the dev attribute of target
 * subelement in domain XML), such as "vda", and accompanied with the error
 * that was seen on it.  The caller is also responsible for calling free()
 * on each disk name returned.
 *
 * In a special case when @errors is NULL and @maxerrors is 0, the function
 * returns preferred size of @errors that the caller should use to get all
 * disk errors.
 *
 * Since calling virDomainGetDiskErrors(dom, NULL, 0, 0) to get preferred size
 * of @errors array and getting the errors are two separate operations, new
 * disks may be hotplugged to the domain and new errors may be encountered
 * between the two calls.  Thus, this function may not return all disk errors
 * because the supplied array is not large enough.  Such errors may, however,
 * be detected by listening to domain events.
 *
 * Returns number of disks with errors filled in the @errors array or -1 on
 * error.
 */
int
virDomainGetDiskErrors(virDomainPtr dom,
                       virDomainDiskErrorPtr errors,
                       unsigned int maxerrors,
                       unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "errors=%p, maxerrors=%u, flags=%x",
                     errors, maxerrors, flags);

    virResetLastError();

20548
    virCheckDomainReturn(dom, -1);
20549

20550 20551 20552 20553
    if (maxerrors)
        virCheckNonNullArgGoto(errors, error);
    else
        virCheckNullArgGoto(errors, error);
20554 20555 20556 20557 20558 20559 20560 20561 20562

    if (dom->conn->driver->domainGetDiskErrors) {
        int ret = dom->conn->driver->domainGetDiskErrors(dom, errors,
                                                         maxerrors, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20563
    virReportUnsupportedError();
20564

20565
 error:
20566 20567 20568
    virDispatchError(dom->conn);
    return -1;
}
G
Guido Günther 已提交
20569

20570

G
Guido Günther 已提交
20571 20572 20573 20574 20575 20576 20577 20578 20579 20580 20581 20582 20583 20584 20585 20586 20587 20588
/**
 * virDomainGetHostname:
 * @domain: a domain object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Get the hostname for that domain.
 *
 * Dependent on hypervisor used, this may require a guest agent to be
 * available.
 *
 * Returns the hostname which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
virDomainGetHostname(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;

20589
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
G
Guido Günther 已提交
20590 20591 20592

    virResetLastError();

20593
    virCheckDomainReturn(domain, NULL);
G
Guido Günther 已提交
20594 20595 20596 20597
    conn = domain->conn;

    if (conn->driver->domainGetHostname) {
        char *ret;
20598
        ret = conn->driver->domainGetHostname(domain, flags);
G
Guido Günther 已提交
20599 20600 20601 20602 20603
        if (!ret)
            goto error;
        return ret;
    }

20604
    virReportUnsupportedError();
G
Guido Günther 已提交
20605

20606
 error:
G
Guido Günther 已提交
20607 20608 20609
    virDispatchError(domain->conn);
    return NULL;
}
20610

20611

20612 20613 20614 20615 20616 20617 20618 20619 20620 20621 20622 20623 20624 20625 20626 20627 20628 20629 20630 20631 20632 20633 20634 20635 20636 20637 20638 20639 20640 20641 20642
/**
 * virNodeGetCPUMap:
 * @conn: pointer to the hypervisor connection
 * @cpumap: optional pointer to a bit map of real CPUs on the host node
 *      (in 8-bit bytes) (OUT)
 *      In case of success each bit set to 1 means that corresponding
 *      CPU is online.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
 *      The bit map is allocated by virNodeGetCPUMap and needs
 *      to be released using free() by the caller.
 * @online: optional number of online CPUs in cpumap (OUT)
 *      Contains the number of online CPUs if the call was successful.
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Get CPU map of host node CPUs.
 *
 * Returns number of CPUs present on the host node,
 * or -1 if there was an error.
 */
int
virNodeGetCPUMap(virConnectPtr conn,
                 unsigned char **cpumap,
                 unsigned int *online,
                 unsigned int flags)
{
    VIR_DEBUG("conn=%p, cpumap=%p, online=%p, flags=%x",
              conn, cpumap, online, flags);

    virResetLastError();

20643
    virCheckConnectReturn(conn, -1);
20644 20645 20646 20647 20648 20649 20650 20651

    if (conn->driver->nodeGetCPUMap) {
        int ret = conn->driver->nodeGetCPUMap(conn, cpumap, online, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20652
    virReportUnsupportedError();
20653

20654
 error:
20655 20656 20657
    virDispatchError(conn);
    return -1;
}
20658

20659

20660 20661 20662
/**
 * virDomainFSTrim:
 * @dom: a domain object
20663
 * @mountPoint: which mount point to trim
20664 20665 20666 20667 20668 20669
 * @minimum: Minimum contiguous free range to discard in bytes
 * @flags: extra flags, not used yet, so callers should always pass 0
 *
 * Calls FITRIM within the guest (hence guest agent may be
 * required depending on hypervisor used). Either call it on each
 * mounted filesystem (@mountPoint is NULL) or just on specified
20670
 * @mountPoint. @minimum hints that free ranges smaller than this
20671 20672 20673 20674
 * may be ignored (this is a hint and the guest may not respect
 * it).  By increasing this value, the fstrim operation will
 * complete more quickly for filesystems with badly fragmented
 * free space, although not all blocks will be discarded.
20675
 * If @minimum is not zero, the command may fail.
20676 20677 20678 20679 20680 20681 20682 20683 20684 20685 20686 20687 20688 20689
 *
 * Returns 0 on success, -1 otherwise.
 */
int
virDomainFSTrim(virDomainPtr dom,
                const char *mountPoint,
                unsigned long long minimum,
                unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "mountPoint=%s, minimum=%llu, flags=%x",
                     mountPoint, minimum, flags);

    virResetLastError();

20690
    virCheckDomainReturn(dom, -1);
20691
    virCheckReadOnlyGoto(dom->conn->flags, error);
20692 20693 20694 20695 20696 20697 20698 20699 20700

    if (dom->conn->driver->domainFSTrim) {
        int ret = dom->conn->driver->domainFSTrim(dom, mountPoint,
                                                  minimum, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20701
    virReportUnsupportedError();
20702

20703
 error:
20704 20705 20706
    virDispatchError(dom->conn);
    return -1;
}
20707 20708 20709 20710 20711 20712 20713 20714 20715 20716 20717 20718 20719 20720 20721 20722 20723 20724 20725 20726 20727 20728 20729 20730 20731 20732 20733 20734 20735 20736 20737 20738 20739 20740 20741 20742 20743 20744 20745 20746 20747 20748 20749 20750 20751 20752 20753 20754 20755 20756 20757 20758 20759 20760 20761 20762 20763 20764 20765 20766 20767 20768 20769 20770 20771 20772 20773 20774 20775 20776 20777 20778 20779 20780 20781 20782 20783 20784 20785 20786 20787 20788 20789 20790 20791 20792 20793 20794 20795 20796 20797 20798 20799

/**
 * virDomainFSFreeze:
 * @dom: a domain object
 * @mountpoints: list of mount points to be frozen
 * @nmountpoints: the number of mount points specified in @mountpoints
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Freeze specified filesystems within the guest (hence guest agent
 * may be required depending on hypervisor used). If @mountpoints is NULL and
 * @nmountpoints is 0, every mounted filesystem on the guest is frozen.
 * In some environments (e.g. QEMU guest with guest agent which doesn't
 * support mountpoints argument), @mountpoints may need to be NULL.
 *
 * Returns the number of frozen filesystems on success, -1 otherwise.
 */
int
virDomainFSFreeze(virDomainPtr dom,
                  const char **mountpoints,
                  unsigned int nmountpoints,
                  unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "mountpoints=%p, nmountpoints=%d, flags=%x",
                     mountpoints, nmountpoints, flags);

    virResetLastError();

    virCheckDomainReturn(dom, -1);
    virCheckReadOnlyGoto(dom->conn->flags, error);
    if (nmountpoints)
        virCheckNonNullArgGoto(mountpoints, error);
    else
        virCheckNullArgGoto(mountpoints, error);

    if (dom->conn->driver->domainFSFreeze) {
        int ret = dom->conn->driver->domainFSFreeze(
            dom, mountpoints, nmountpoints, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

    virReportUnsupportedError();

 error:
    virDispatchError(dom->conn);
    return -1;
}

/**
 * virDomainFSThaw:
 * @dom: a domain object
 * @mountpoints: list of mount points to be thawed
 * @nmountpoints: the number of mount points specified in @mountpoints
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Thaw specified filesystems within the guest. If @mountpoints is NULL and
 * @nmountpoints is 0, every mounted filesystem on the guest is thawed.
 * In some drivers (e.g. QEMU driver), @mountpoints may need to be NULL.
 *
 * Returns the number of thawed filesystems on success, -1 otherwise.
 */
int
virDomainFSThaw(virDomainPtr dom,
                const char **mountpoints,
                unsigned int nmountpoints,
                unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);

    virResetLastError();

    virCheckDomainReturn(dom, -1);
    virCheckReadOnlyGoto(dom->conn->flags, error);
    if (nmountpoints)
        virCheckNonNullArgGoto(mountpoints, error);
    else
        virCheckNullArgGoto(mountpoints, error);

    if (dom->conn->driver->domainFSThaw) {
        int ret = dom->conn->driver->domainFSThaw(
            dom, mountpoints, nmountpoints, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

    virReportUnsupportedError();

 error:
    virDispatchError(dom->conn);
    return -1;
}
20800 20801 20802 20803 20804 20805 20806 20807 20808 20809 20810 20811 20812 20813 20814 20815 20816 20817 20818 20819 20820 20821 20822 20823 20824 20825 20826 20827 20828 20829 20830 20831 20832 20833 20834 20835 20836 20837 20838 20839 20840 20841 20842 20843 20844 20845 20846 20847 20848 20849 20850 20851 20852 20853 20854 20855 20856 20857 20858 20859 20860 20861 20862 20863 20864 20865 20866 20867 20868 20869 20870 20871 20872 20873 20874 20875 20876 20877 20878 20879 20880 20881 20882 20883 20884 20885 20886 20887 20888 20889 20890 20891 20892 20893

/**
 * virDomainGetTime:
 * @dom: a domain object
 * @seconds: domain's time in seconds
 * @nseconds: the nanoscond part of @seconds
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Extract information about guest time and store it into
 * @seconds and @nseconds. The @seconds represents the number of
 * seconds since the UNIX Epoch of 1970-01-01 00:00:00 in UTC.
 *
 * Please note that some hypervisors may require guest agent to
 * be configured and running in order to run this API.
 *
 * Returns 0 on success, -1 otherwise.
 */
int
virDomainGetTime(virDomainPtr dom,
                 long long *seconds,
                 unsigned int *nseconds,
                 unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "seconds=%p, nseconds=%p, flags=%x",
                     seconds, nseconds, flags);

    virResetLastError();

    virCheckDomainReturn(dom, -1);

    if (dom->conn->driver->domainGetTime) {
        int ret = dom->conn->driver->domainGetTime(dom, seconds,
                                                   nseconds, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

    virReportUnsupportedError();

 error:
    virDispatchError(dom->conn);
    return -1;
}

/**
 * virDomainSetTime:
 * @dom: a domain object
 * @seconds: time to set
 * @nseconds: the nanosecond part of @seconds
 * @flags: bitwise-OR of virDomainSetTimeFlags
 *
 * When a domain is suspended or restored from a file the
 * domain's OS has no idea that there was a big gap in the time.
 * Depending on how long the gap was, NTP might not be able to
 * resynchronize the guest.
 *
 * This API tries to set guest time to the given value. The time
 * to set (@seconds and @nseconds) should be in seconds relative
 * to the Epoch of 1970-01-01 00:00:00 in UTC.
 *
 * Please note that some hypervisors may require guest agent to
 * be configured and running in order to be able to run this API.
 *
 * Returns 0 on success, -1 otherwise.
 */
int
virDomainSetTime(virDomainPtr dom,
                 long long seconds,
                 unsigned int nseconds,
                 unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "seconds=%lld, nseconds=%u, flags=%x",
                     seconds, nseconds, flags);

    virResetLastError();

    virCheckDomainReturn(dom, -1);
    virCheckReadOnlyGoto(dom->conn->flags, error);

    if (dom->conn->driver->domainSetTime) {
        int ret = dom->conn->driver->domainSetTime(dom, seconds,
                                                   nseconds, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

    virReportUnsupportedError();

 error:
    virDispatchError(dom->conn);
    return -1;
}