qemu_command.c 360.7 KB
Newer Older
1 2 3
/*
 * qemu_command.c: QEMU command generation
 *
4
 * Copyright (C) 2006-2016 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
20 21 22 23 24
 */

#include <config.h>

#include "qemu_command.h"
25
#include "qemu_hostdev.h"
26
#include "qemu_capabilities.h"
27
#include "qemu_interface.h"
28
#include "qemu_alias.h"
29
#include "qemu_security.h"
M
Marc-André Lureau 已提交
30
#include "qemu_dbus.h"
31
#include "qemu_slirp.h"
32
#include "qemu_block.h"
33
#include "cpu/cpu.h"
34
#include "dirname.h"
35
#include "viralloc.h"
36
#include "virlog.h"
37
#include "virarch.h"
38
#include "virerror.h"
E
Eric Blake 已提交
39
#include "virfile.h"
40
#include "virnetdev.h"
41
#include "virnetdevbridge.h"
42
#include "virqemu.h"
43
#include "virstring.h"
44
#include "virtime.h"
45
#include "viruuid.h"
46
#include "domain_nwfilter.h"
47
#include "domain_addr.h"
48
#include "domain_audit.h"
M
Michal Novotny 已提交
49
#include "domain_conf.h"
50
#include "netdev_bandwidth_conf.h"
51
#include "snapshot_conf.h"
52
#include "storage_conf.h"
53
#include "secret_conf.h"
54
#include "virnetdevtap.h"
55
#include "virnetdevopenvswitch.h"
56
#include "device_conf.h"
57
#include "virstoragefile.h"
58
#include "virtpm.h"
59
#include "virscsi.h"
60
#include "virnuma.h"
61
#include "virgic.h"
62
#include "virmdev.h"
63
#include "virdomainsnapshotobjlist.h"
64 65 66
#if defined(__linux__)
# include <linux/capability.h>
#endif
67
#include "logging/log_manager.h"
68 69 70 71 72 73

#include <sys/stat.h>
#include <fcntl.h>

#define VIR_FROM_THIS VIR_FROM_QEMU

74 75
VIR_LOG_INIT("qemu.qemu_command");

76
VIR_ENUM_DECL(virDomainDiskQEMUBus);
77 78
VIR_ENUM_IMPL(virDomainDiskQEMUBus,
              VIR_DOMAIN_DISK_BUS_LAST,
79 80 81 82 83 84 85
              "ide",
              "floppy",
              "scsi",
              "virtio",
              "xen",
              "usb",
              "uml",
86
              "sata",
87 88
              "sd",
);
89 90


91
VIR_ENUM_DECL(qemuDiskCacheV2);
92

93 94
VIR_ENUM_IMPL(qemuDiskCacheV2,
              VIR_DOMAIN_DISK_CACHE_LAST,
95 96 97
              "default",
              "none",
              "writethrough",
98
              "writeback",
99
              "directsync",
100 101
              "unsafe",
);
102

103 104
VIR_ENUM_IMPL(qemuVideo,
              VIR_DOMAIN_VIDEO_TYPE_LAST,
105
              "", /* default value, we shouldn't see this */
106 107 108
              "std",
              "cirrus",
              "vmware",
109
              "", /* don't support xen */
110
              "", /* don't support vbox */
111
              "qxl",
M
Marc-André Lureau 已提交
112
              "", /* don't support parallels */
F
Fabian Freyer 已提交
113
              "", /* no need for virtio */
114
              "" /* don't support gop */,
115
              "" /* 'none' doesn't make sense here */,
116
              "bochs-display",
117
              "", /* ramfb can't be used with -vga */
118
);
119

120
VIR_ENUM_DECL(qemuDeviceVideo);
121

122 123
VIR_ENUM_IMPL(qemuDeviceVideo,
              VIR_DOMAIN_VIDEO_TYPE_LAST,
124
              "", /* default value, we shouldn't see this */
125 126 127
              "VGA",
              "cirrus-vga",
              "vmware-svga",
128
              "", /* don't support xen */
129
              "", /* don't support vbox */
130
              "qxl-vga",
M
Marc-André Lureau 已提交
131
              "", /* don't support parallels */
F
Fabian Freyer 已提交
132
              "virtio-vga",
133
              "" /* don't support gop */,
134
              "" /* 'none' doesn't make sense here */,
135
              "bochs-display",
136
              "ramfb",
137
);
138

139
VIR_ENUM_DECL(qemuDeviceVideoSecondary);
140

141 142
VIR_ENUM_IMPL(qemuDeviceVideoSecondary,
              VIR_DOMAIN_VIDEO_TYPE_LAST,
143
              "", /* default value, we shouldn't see this */
144 145 146 147 148 149 150
              "", /* no secondary device for VGA */
              "", /* no secondary device for cirrus-vga */
              "", /* no secondary device for vmware-svga */
              "", /* don't support xen */
              "", /* don't support vbox */
              "qxl",
              "", /* don't support parallels */
151
              "virtio-gpu",
152
              "" /* don't support gop */,
153
              "" /* 'none' doesn't make sense here */,
154
              "" /* no secondary device for bochs */,
155
              "" /* no secondary device for ramfb */,
156
);
157

158
VIR_ENUM_DECL(qemuSoundCodec);
159

160 161
VIR_ENUM_IMPL(qemuSoundCodec,
              VIR_DOMAIN_SOUND_CODEC_TYPE_LAST,
162
              "hda-duplex",
F
Filip Alac 已提交
163
              "hda-micro",
164 165
              "hda-output",
);
166

167
VIR_ENUM_DECL(qemuControllerModelUSB);
168

169 170
VIR_ENUM_IMPL(qemuControllerModelUSB,
              VIR_DOMAIN_CONTROLLER_MODEL_USB_LAST,
171 172 173 174 175 176 177 178
              "piix3-usb-uhci",
              "piix4-usb-uhci",
              "usb-ehci",
              "ich9-usb-ehci1",
              "ich9-usb-uhci1",
              "ich9-usb-uhci2",
              "ich9-usb-uhci3",
              "vt82c686b-usb-uhci",
G
Gerd Hoffmann 已提交
179
              "pci-ohci",
180
              "nec-usb-xhci",
181 182
              "qusb1",
              "qusb2",
183
              "qemu-xhci",
184 185
              "none",
);
186

187
VIR_ENUM_DECL(qemuNumaPolicy);
188 189
VIR_ENUM_IMPL(qemuNumaPolicy,
              VIR_DOMAIN_NUMATUNE_MEM_LAST,
190 191
              "bind",
              "preferred",
192 193
              "interleave",
);
194

195

196 197 198 199 200 201 202 203 204 205 206 207
/**
 * qemuBuildMasterKeyCommandLine:
 * @cmd: the command to modify
 * @qemuCaps qemu capabilities object
 * @domainLibDir: location to find the master key

 * Formats the command line for a master key if available
 *
 * Returns 0 on success, -1 w/ error message on failure
 */
static int
qemuBuildMasterKeyCommandLine(virCommandPtr cmd,
208
                              qemuDomainObjPrivatePtr priv)
209
{
210 211
    g_autofree char *alias = NULL;
    g_autofree char *path = NULL;
212
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
213 214 215 216 217

    /* If the -object secret does not exist, then just return. This just
     * means the domain won't be able to use a secret master key and is
     * not a failure.
     */
218
    if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_SECRET)) {
219 220 221 222 223 224 225 226 227 228 229 230
        VIR_INFO("secret object is not supported by this QEMU binary");
        return 0;
    }

    if (!(alias = qemuDomainGetMasterKeyAlias()))
        return -1;

    /* Get the path. NB, the mocked test will not have the created
     * file so we cannot check for existence, which is no different
     * than other command line options which do not check for the
     * existence of socket files before using.
     */
231
    if (!(path = qemuDomainGetMasterKeyFilePath(priv->libDir)))
232
        return -1;
233 234

    virCommandAddArg(cmd, "-object");
235
    virBufferAsprintf(&buf, "secret,id=%s,format=raw,file=", alias);
236
    virQEMUBuildBufferEscapeComma(&buf, path);
237
    virCommandAddArgBuffer(cmd, &buf);
238

239
    return 0;
240 241 242
}


243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258
/**
 * qemuVirCommandGetFDSet:
 * @cmd: the command to modify
 * @fd: fd to reassign to the child
 *
 * Get the parameters for the QEMU -add-fd command line option
 * for the given file descriptor. The file descriptor must previously
 * have been 'transferred' in a virCommandPassFD() call.
 * This function for example returns "set=10,fd=20".
 */
static char *
qemuVirCommandGetFDSet(virCommandPtr cmd, int fd)
{
    char *result = NULL;
    int idx = virCommandPassFDGetFDIndex(cmd, fd);

259
    if (idx < 0) {
260 261
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("file descriptor %d has not been transferred"), fd);
262
        return NULL;
263 264
    }

265
    result = g_strdup_printf("set=%d,fd=%d", idx, fd);
266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285
    return result;
}


/**
 * qemuVirCommandGetDevSet:
 * @cmd: the command to modify
 * @fd: fd to reassign to the child
 *
 * Get the parameters for the QEMU path= parameter where a file
 * descriptor is accessed via a file descriptor set, for example
 * /dev/fdset/10. The file descriptor must previously have been
 * 'transferred' in a virCommandPassFD() call.
 */
static char *
qemuVirCommandGetDevSet(virCommandPtr cmd, int fd)
{
    char *result = NULL;
    int idx = virCommandPassFDGetFDIndex(cmd, fd);

286
    if (idx < 0) {
287 288
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("file descriptor %d has not been transferred"), fd);
289
        return NULL;
290
    }
291

292
    result = g_strdup_printf("/dev/fdset/%d", idx);
293 294 295 296
    return result;
}


297 298
static int
qemuBuildDeviceAddressStr(virBufferPtr buf,
299
                          const virDomainDef *domainDef,
300
                          virDomainDeviceInfoPtr info,
301
                          virQEMUCapsPtr qemuCaps)
302
{
303
    g_autofree char *devStr = NULL;
304
    const char *contAlias = NULL;
305 306
    bool contIsPHB = false;
    int contTargetIndex = 0;
307

308
    if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
309 310
        size_t i;

311
        if (!(devStr = virPCIDeviceAddressAsString(&info->addr.pci)))
312
            return -1;
313 314 315 316 317
        for (i = 0; i < domainDef->ncontrollers; i++) {
            virDomainControllerDefPtr cont = domainDef->controllers[i];

            if (cont->type == VIR_DOMAIN_CONTROLLER_TYPE_PCI &&
                cont->idx == info->addr.pci.bus) {
318
                contAlias = cont->info.alias;
319
                contIsPHB = virDomainControllerIsPSeriesPHB(cont);
320
                contTargetIndex = cont->opts.pciopts.targetIndex;
321

322 323 324 325 326 327
                if (!contAlias) {
                    virReportError(VIR_ERR_INTERNAL_ERROR,
                                   _("Device alias was not set for PCI "
                                     "controller with index %u required "
                                     "for device at address %s"),
                                   info->addr.pci.bus, devStr);
328
                    return -1;
329 330 331 332 333 334 335 336 337 338 339 340 341 342
                }

                if (virDomainDeviceAliasIsUserAlias(contAlias)) {
                    /* When domain has builtin pci-root controller we don't put it
                     * onto cmd line. Therefore we can't set its alias. In that
                     * case, use the default one. */
                    if (!qemuDomainIsPSeries(domainDef) &&
                        cont->model == VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT) {
                        if (virQEMUCapsHasPCIMultiBus(qemuCaps, domainDef))
                            contAlias = "pci.0";
                        else
                            contAlias = "pci";
                    } else if (cont->model == VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT) {
                        contAlias = "pcie.0";
343
                    }
344 345 346 347 348 349 350 351 352 353
                }
                break;
            }
        }
        if (!contAlias) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Could not find PCI "
                             "controller with index %u required "
                             "for device at address %s"),
                           info->addr.pci.bus, devStr);
354
            return -1;
355 356
        }

357 358 359 360 361 362 363 364 365 366 367
        if (contIsPHB && contTargetIndex > 0) {
            /* The PCI bus created by a spapr-pci-host-bridge device with
             * alias 'x' will be called 'x.0' rather than 'x'; however,
             * this does not apply to the implicit PHB in a pSeries guest,
             * which always has the hardcoded name 'pci.0' */
            virBufferAsprintf(buf, ",bus=%s.0", contAlias);
        } else {
            /* For all other controllers, the bus name matches the alias
             * of the corresponding controller */
            virBufferAsprintf(buf, ",bus=%s", contAlias);
        }
368

J
Ján Tomko 已提交
369
        if (info->addr.pci.multi == VIR_TRISTATE_SWITCH_ON)
370
            virBufferAddLit(buf, ",multifunction=on");
J
Ján Tomko 已提交
371
        else if (info->addr.pci.multi == VIR_TRISTATE_SWITCH_OFF)
372 373 374 375
            virBufferAddLit(buf, ",multifunction=off");
        virBufferAsprintf(buf, ",addr=0x%x", info->addr.pci.slot);
        if (info->addr.pci.function != 0)
           virBufferAsprintf(buf, ".0x%x", info->addr.pci.function);
376
    } else if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_USB) {
377 378 379
        if (!(contAlias = virDomainControllerAliasFind(domainDef,
                                                       VIR_DOMAIN_CONTROLLER_TYPE_USB,
                                                       info->addr.usb.bus)))
380
            return -1;
J
Ján Tomko 已提交
381
        virBufferAsprintf(buf, ",bus=%s.0", contAlias);
382 383 384 385
        if (virDomainUSBAddressPortIsValid(info->addr.usb.port)) {
            virBufferAddLit(buf, ",port=");
            virDomainUSBAddressPortFormatBuf(buf, info->addr.usb.port);
        }
386 387
    } else if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_SPAPRVIO) {
        if (info->addr.spaprvio.has_reg)
388
            virBufferAsprintf(buf, ",reg=0x%08llx", info->addr.spaprvio.reg);
389 390 391 392 393 394
    } else if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW) {
        if (info->addr.ccw.assigned)
            virBufferAsprintf(buf, ",devno=%x.%x.%04x",
                              info->addr.ccw.cssid,
                              info->addr.ccw.ssid,
                              info->addr.ccw.devno);
395 396 397 398
    } else if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_ISA) {
        virBufferAsprintf(buf, ",iobase=0x%x,irq=0x%x",
                          info->addr.isa.iobase,
                          info->addr.isa.irq);
399
    }
400

401
    return 0;
402 403
}

404

405 406 407 408
/**
 * qemuBuildVirtioDevStr
 * @buf: virBufferPtr to append the built string
 * @baseName: qemu virtio device basename string. Ex: virtio-rng for <rng>
409
 * @qemuCaps: virQEMUCapPtr
410 411 412 413 414 415 416 417 418 419
 * @devtype: virDomainDeviceType of the device. Ex: VIR_DOMAIN_DEVICE_TYPE_RNG
 * @devdata: *DefPtr of the device definition
 *
 * Build the qemu virtio -device name from the passed parameters. Currently
 * this is mostly about attaching the correct string prefix to @baseName for
 * the passed @type. So for @baseName "virtio-rng" and devdata->info.type
 * VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI, generate "virtio-rng-pci"
 *
 * Returns: -1 on failure, 0 on success
 */
420 421 422
static int
qemuBuildVirtioDevStr(virBufferPtr buf,
                      const char *baseName,
423
                      virQEMUCapsPtr qemuCaps,
424 425
                      virDomainDeviceType devtype,
                      void *devdata)
426 427
{
    const char *implName = NULL;
428 429
    virDomainDeviceDef device = { .type = devtype };
    virDomainDeviceInfoPtr info;
430
    bool has_tmodel, has_ntmodel;
431

432 433 434 435
    virDomainDeviceSetData(&device, devdata);
    info = virDomainDeviceGetInfo(&device);

    switch ((virDomainDeviceAddressType) info->type) {
436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI:
        implName = "pci";
        break;

    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_MMIO:
        implName = "device";
        break;

    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW:
        implName = "ccw";
        break;

    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_S390:
        implName = "s390";
        break;

    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_SERIAL:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCID:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_USB:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_SPAPRVIO:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_ISA:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DIMM:
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Unexpected address type for '%s'"), baseName);
        return -1;

    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_LAST:
    default:
466
        virReportEnumRangeError(virDomainDeviceAddressType, info->type);
467 468 469 470 471
        return -1;
    }

    virBufferAsprintf(buf, "%s-%s", baseName, implName);

472 473 474 475 476 477 478
    switch (devtype) {
        case VIR_DOMAIN_DEVICE_DISK:
            has_tmodel = device.data.disk->model == VIR_DOMAIN_DISK_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.disk->model == VIR_DOMAIN_DISK_MODEL_VIRTIO_NON_TRANSITIONAL;
            break;

        case VIR_DOMAIN_DEVICE_NET:
479 480
            has_tmodel = device.data.net->model == VIR_DOMAIN_NET_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.net->model == VIR_DOMAIN_NET_MODEL_VIRTIO_NON_TRANSITIONAL;
481 482
            break;

483 484 485 486 487 488 489
        case VIR_DOMAIN_DEVICE_HOSTDEV:
            if (device.data.hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI_HOST)
                return 0;
            has_tmodel = device.data.hostdev->source.subsys.u.scsi_host.model == VIR_DOMAIN_HOSTDEV_SUBSYS_SCSI_VHOST_MODEL_TYPE_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.hostdev->source.subsys.u.scsi_host.model == VIR_DOMAIN_HOSTDEV_SUBSYS_SCSI_VHOST_MODEL_TYPE_VIRTIO_NON_TRANSITIONAL;
            break;

490 491 492 493 494
        case VIR_DOMAIN_DEVICE_RNG:
            has_tmodel = device.data.rng->model == VIR_DOMAIN_RNG_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.rng->model == VIR_DOMAIN_RNG_MODEL_VIRTIO_NON_TRANSITIONAL;
            break;

495
        case VIR_DOMAIN_DEVICE_FS:
496 497 498 499
            has_tmodel = device.data.fs->model == VIR_DOMAIN_FS_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.fs->model == VIR_DOMAIN_FS_MODEL_VIRTIO_NON_TRANSITIONAL;
            break;

500 501 502 503 504
        case VIR_DOMAIN_DEVICE_MEMBALLOON:
            has_tmodel = device.data.memballoon->model == VIR_DOMAIN_MEMBALLOON_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.memballoon->model == VIR_DOMAIN_MEMBALLOON_MODEL_VIRTIO_NON_TRANSITIONAL;
            break;

505 506 507 508 509
        case VIR_DOMAIN_DEVICE_VSOCK:
            has_tmodel = device.data.vsock->model == VIR_DOMAIN_VSOCK_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.vsock->model == VIR_DOMAIN_VSOCK_MODEL_VIRTIO_NON_TRANSITIONAL;
            break;

510
        case VIR_DOMAIN_DEVICE_INPUT:
511 512 513 514 515 516
            if (device.data.input->type != VIR_DOMAIN_INPUT_TYPE_PASSTHROUGH)
                return 0;
            has_tmodel = device.data.input->model == VIR_DOMAIN_INPUT_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.input->model == VIR_DOMAIN_INPUT_MODEL_VIRTIO_NON_TRANSITIONAL;
            break;

517 518 519 520
        case VIR_DOMAIN_DEVICE_CONTROLLER:
            if (device.data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_VIRTIO_SERIAL) {
                has_tmodel = device.data.controller->model == VIR_DOMAIN_CONTROLLER_MODEL_VIRTIO_SERIAL_VIRTIO_TRANSITIONAL;
                has_ntmodel = device.data.controller->model == VIR_DOMAIN_CONTROLLER_MODEL_VIRTIO_SERIAL_VIRTIO_NON_TRANSITIONAL;
521 522 523
            } else if (device.data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_SCSI) {
                has_tmodel = device.data.controller->model == VIR_DOMAIN_CONTROLLER_MODEL_SCSI_VIRTIO_TRANSITIONAL;
                has_ntmodel = device.data.controller->model == VIR_DOMAIN_CONTROLLER_MODEL_SCSI_VIRTIO_NON_TRANSITIONAL;
524 525 526 527 528
            } else {
                return 0;
            }
            break;

529
        case VIR_DOMAIN_DEVICE_LEASE:
530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586
        case VIR_DOMAIN_DEVICE_SOUND:
        case VIR_DOMAIN_DEVICE_VIDEO:
        case VIR_DOMAIN_DEVICE_WATCHDOG:
        case VIR_DOMAIN_DEVICE_GRAPHICS:
        case VIR_DOMAIN_DEVICE_HUB:
        case VIR_DOMAIN_DEVICE_REDIRDEV:
        case VIR_DOMAIN_DEVICE_NONE:
        case VIR_DOMAIN_DEVICE_SMARTCARD:
        case VIR_DOMAIN_DEVICE_CHR:
        case VIR_DOMAIN_DEVICE_NVRAM:
        case VIR_DOMAIN_DEVICE_SHMEM:
        case VIR_DOMAIN_DEVICE_TPM:
        case VIR_DOMAIN_DEVICE_PANIC:
        case VIR_DOMAIN_DEVICE_MEMORY:
        case VIR_DOMAIN_DEVICE_IOMMU:
        case VIR_DOMAIN_DEVICE_LAST:
        default:
            return 0;
    }

    if (info->type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI &&
        (has_tmodel || has_ntmodel)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("virtio (non-)transitional models are not "
                         "supported for address type=%s"),
                       virDomainDeviceAddressTypeToString(info->type));
        return -1;
    }

    if (has_tmodel) {
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_PCI_TRANSITIONAL)) {
            virBufferAddLit(buf, "-transitional");
        } else if (virQEMUCapsGet(qemuCaps,
                                  QEMU_CAPS_VIRTIO_PCI_DISABLE_LEGACY)) {
            virBufferAddLit(buf, ",disable-legacy=off,disable-modern=off");
        }
        /* No error if -transitional is not supported: our address
         * allocation will force the device into plain PCI bus, which
         * is functionally identical to standard 'virtio-XXX' behavior
         */
    } else if (has_ntmodel) {
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_PCI_TRANSITIONAL)) {
            virBufferAddLit(buf, "-non-transitional");
        } else if (virQEMUCapsGet(qemuCaps,
                                  QEMU_CAPS_VIRTIO_PCI_DISABLE_LEGACY)) {
            /* Even if the QEMU binary doesn't support the non-transitional
             * device, we can still make it work by manually disabling legacy
             * VirtIO and enabling modern VirtIO */
            virBufferAddLit(buf, ",disable-legacy=on,disable-modern=off");
        } else {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("virtio non-transitional model not supported "
                             "for this qemu"));
            return -1;
        }
    }

587 588 589
    return 0;
}

590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621
static int
qemuBuildVirtioOptionsStr(virBufferPtr buf,
                          virDomainVirtioOptionsPtr virtio,
                          virQEMUCapsPtr qemuCaps)
{
    if (!virtio)
        return 0;

    if (virtio->iommu != VIR_TRISTATE_SWITCH_ABSENT) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_PCI_IOMMU_PLATFORM)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("the iommu setting is not supported "
                             "with this QEMU binary"));
            return -1;
        }
        virBufferAsprintf(buf, ",iommu_platform=%s",
                          virTristateSwitchTypeToString(virtio->iommu));
    }
    if (virtio->ats != VIR_TRISTATE_SWITCH_ABSENT) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_PCI_ATS)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("the ats setting is not supported with this "
                             "QEMU binary"));
            return -1;
        }
        virBufferAsprintf(buf, ",ats=%s",
                          virTristateSwitchTypeToString(virtio->ats));
    }

    return 0;
}

622 623
static int
qemuBuildRomStr(virBufferPtr buf,
624
                virDomainDeviceInfoPtr info)
625
{
626
    if (info->romenabled || info->rombar || info->romfile) {
627
        if (info->type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
628
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
629
                           "%s", _("ROM tuning is only supported for PCI devices"));
630 631 632
            return -1;
        }

633 634 635 636 637 638 639
        /* Passing an empty romfile= tells QEMU to disable ROM entirely for
         * this device, and makes other settings irrelevant */
        if (info->romenabled == VIR_TRISTATE_BOOL_NO) {
            virBufferAddLit(buf, ",romfile=");
            return 0;
        }

640
        switch (info->rombar) {
J
Ján Tomko 已提交
641
        case VIR_TRISTATE_SWITCH_OFF:
642 643
            virBufferAddLit(buf, ",rombar=0");
            break;
J
Ján Tomko 已提交
644
        case VIR_TRISTATE_SWITCH_ON:
645 646 647 648 649
            virBufferAddLit(buf, ",rombar=1");
            break;
        default:
            break;
        }
650 651 652 653
        if (info->romfile) {
           virBufferAddLit(buf, ",romfile=");
           virQEMUBuildBufferEscapeComma(buf, info->romfile);
        }
654
    }
655

656 657 658
    return 0;
}

659 660
static int
qemuBuildIoEventFdStr(virBufferPtr buf,
J
Ján Tomko 已提交
661
                      virTristateSwitch use,
662
                      virQEMUCapsPtr qemuCaps)
663
{
664
    if (use && virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_IOEVENTFD))
665
        virBufferAsprintf(buf, ",ioeventfd=%s",
J
Ján Tomko 已提交
666
                          virTristateSwitchTypeToString(use));
667 668
    return 0;
}
669 670

#define QEMU_SERIAL_PARAM_ACCEPTED_CHARS \
671
  "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-_ .+"
672 673 674 675

static int
qemuSafeSerialParamValue(const char *value)
{
676
    if (strspn(value, QEMU_SERIAL_PARAM_ACCEPTED_CHARS) != strlen(value)) {
677 678 679
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("driver serial '%s' contains unsafe characters"),
                       value);
680 681 682 683 684 685
        return -1;
    }

    return 0;
}

686

687 688 689 690 691 692 693 694 695 696
/**
 * qemuBuildSecretInfoProps:
 * @secinfo: pointer to the secret info object
 * @props: json properties to return
 *
 * Build the JSON properties for the secret info type.
 *
 * Returns 0 on success with the filled in JSON property; otherwise,
 * returns -1 on failure error message set.
 */
697
int
698 699 700
qemuBuildSecretInfoProps(qemuDomainSecretInfoPtr secinfo,
                         virJSONValuePtr *propsret)
{
701
    g_autofree char *keyid = NULL;
702 703 704 705

    if (!(keyid = qemuDomainGetMasterKeyAlias()))
        return -1;

M
Michal Privoznik 已提交
706 707 708 709 710
    return qemuMonitorCreateObjectProps(propsret, "secret",
                                        secinfo->s.aes.alias, "s:data",
                                        secinfo->s.aes.ciphertext, "s:keyid",
                                        keyid, "s:iv", secinfo->s.aes.iv,
                                        "s:format", "base64", NULL);
711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729
}


/**
 * qemuBuildObjectSecretCommandLine:
 * @cmd: the command to modify
 * @secinfo: pointer to the secret info object
 *
 * If the secinfo is available and associated with an AES secret,
 * then format the command line for the secret object. This object
 * will be referenced by the device that needs/uses it, so it needs
 * to be in place first.
 *
 * Returns 0 on success, -1 w/ error message on failure
 */
static int
qemuBuildObjectSecretCommandLine(virCommandPtr cmd,
                                 qemuDomainSecretInfoPtr secinfo)
{
730
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
J
Ján Tomko 已提交
731
    g_autoptr(virJSONValue) props = NULL;
732

733
    if (qemuBuildSecretInfoProps(secinfo, &props) < 0)
734 735
        return -1;

736
    if (virQEMUBuildObjectCommandlineFromJSON(&buf, props) < 0)
737
        return -1;
738

739 740 741
    virCommandAddArg(cmd, "-object");
    virCommandAddArgBuffer(cmd, &buf);

742
    return 0;
743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766
}


/* qemuBuildDiskSecinfoCommandLine:
 * @cmd: Pointer to the command string
 * @secinfo: Pointer to a possible secinfo
 *
 * Add the secret object for the disks that will be using it to perform
 * their authentication.
 *
 * Returns 0 on success, -1 w/ error on some sort of failure.
 */
static int
qemuBuildDiskSecinfoCommandLine(virCommandPtr cmd,
                                qemuDomainSecretInfoPtr secinfo)
{
    /* Not necessary for non AES secrets */
    if (!secinfo || secinfo->type != VIR_DOMAIN_SECRET_INFO_TYPE_AES)
        return 0;

    return qemuBuildObjectSecretCommandLine(cmd, secinfo);
}


767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784
/* qemuBuildGeneralSecinfoURI:
 * @uri: Pointer to the URI structure to add to
 * @secinfo: Pointer to the secret info data (if present)
 *
 * If we have a secinfo, then build the command line options for
 * the secret info for the "general" case (somewhat a misnomer since
 * an iscsi disk is the only one with a secinfo).
 *
 * Returns 0 on success or if no secinfo,
 * -1 and error message if fail to add secret information
 */
static int
qemuBuildGeneralSecinfoURI(virURIPtr uri,
                           qemuDomainSecretInfoPtr secinfo)
{
    if (!secinfo)
        return 0;

J
John Ferlan 已提交
785 786 787
    switch ((qemuDomainSecretInfoType) secinfo->type) {
    case VIR_DOMAIN_SECRET_INFO_TYPE_PLAIN:
        if (secinfo->s.plain.secret) {
788 789 790 791 792 793
            if (!virStringBufferIsPrintable(secinfo->s.plain.secret,
                                            secinfo->s.plain.secretlen)) {
                virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                               _("found non printable characters in secret"));
                return -1;
            }
794 795
            uri->user = g_strdup_printf("%s:%s", secinfo->s.plain.username,
                                        secinfo->s.plain.secret);
J
John Ferlan 已提交
796
        } else {
797
            uri->user = g_strdup(secinfo->s.plain.username);
J
John Ferlan 已提交
798 799 800
        }
        break;

801
    case VIR_DOMAIN_SECRET_INFO_TYPE_AES:
J
John Ferlan 已提交
802 803
    case VIR_DOMAIN_SECRET_INFO_TYPE_LAST:
        return -1;
804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824
    }

    return 0;
}


/* qemuBuildRBDSecinfoURI:
 * @uri: Pointer to the URI structure to add to
 * @secinfo: Pointer to the secret info data (if present)
 *
 * If we have a secinfo, then build the command line options for
 * the secret info for the RBD network storage. Assumption for this
 * is both username and secret exist for plaintext
 *
 * Returns 0 on success or if no secinfo,
 * -1 and error message if fail to add secret information
 */
static int
qemuBuildRBDSecinfoURI(virBufferPtr buf,
                       qemuDomainSecretInfoPtr secinfo)
{
825
    VIR_AUTODISPOSE_STR base64secret = NULL;
826

827 828 829 830 831
    if (!secinfo) {
        virBufferAddLit(buf, ":auth_supported=none");
        return 0;
    }

J
John Ferlan 已提交
832 833
    switch ((qemuDomainSecretInfoType) secinfo->type) {
    case VIR_DOMAIN_SECRET_INFO_TYPE_PLAIN:
834 835
        base64secret = g_base64_encode(secinfo->s.plain.secret,
                                       secinfo->s.plain.secretlen);
836
        virBufferEscape(buf, '\\', ":", ":id=%s", secinfo->s.plain.username);
J
John Ferlan 已提交
837 838
        virBufferEscape(buf, '\\', ":",
                        ":key=%s:auth_supported=cephx\\;none",
839
                        base64secret);
J
John Ferlan 已提交
840 841
        break;

842
    case VIR_DOMAIN_SECRET_INFO_TYPE_AES:
843 844 845 846
        virBufferEscape(buf, '\\', ":", ":id=%s:auth_supported=cephx\\;none",
                        secinfo->s.aes.username);
        break;

J
John Ferlan 已提交
847 848 849
    case VIR_DOMAIN_SECRET_INFO_TYPE_LAST:
        return -1;
    }
850 851 852 853 854

    return 0;
}


855 856 857 858
/* qemuBuildTLSx509BackendProps:
 * @tlspath: path to the TLS credentials
 * @listen: boolen listen for client or server setting
 * @verifypeer: boolean to enable peer verification (form of authorization)
859
 * @alias: alias for the TLS credentials object
860
 * @secalias: if one exists, the alias of the security object for passwordid
861 862 863 864 865 866 867
 * @qemuCaps: capabilities
 * @propsret: json properties to return
 *
 * Create a backend string for the tls-creds-x509 object.
 *
 * Returns 0 on success, -1 on failure with error set.
 */
868
int
869
qemuBuildTLSx509BackendProps(const char *tlspath,
870
                             bool isListen,
871
                             bool verifypeer,
872
                             const char *alias,
873
                             const char *secalias,
874 875 876 877 878 879 880 881 882
                             virQEMUCapsPtr qemuCaps,
                             virJSONValuePtr *propsret)
{
    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_TLS_CREDS_X509)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("tls-creds-x509 not supported in this QEMU binary"));
        return -1;
    }

883 884 885 886 887 888
    if (qemuMonitorCreateObjectProps(propsret, "tls-creds-x509", alias,
                                     "s:dir", tlspath,
                                     "s:endpoint", (isListen ? "server": "client"),
                                     "b:verify-peer", (isListen ? verifypeer : true),
                                     "S:passwordid", secalias,
                                     NULL) < 0)
889
        return -1;
890

891
    return 0;
892 893 894 895 896 897 898 899
}


/* qemuBuildTLSx509CommandLine:
 * @cmd: Pointer to command
 * @tlspath: path to the TLS credentials
 * @listen: boolen listen for client or server setting
 * @verifypeer: boolean to enable peer verification (form of authorization)
900 901
 * @certEncSecretAlias: alias of a 'secret' object for decrypting TLS private key
 *                      (optional)
902
 * @alias: TLS object alias
903 904 905 906 907 908 909 910 911
 * @qemuCaps: capabilities
 *
 * Create the command line for a TLS object
 *
 * Returns 0 on success, -1 on failure with error set.
 */
static int
qemuBuildTLSx509CommandLine(virCommandPtr cmd,
                            const char *tlspath,
912
                            bool isListen,
913
                            bool verifypeer,
914
                            const char *certEncSecretAlias,
915
                            const char *alias,
916 917
                            virQEMUCapsPtr qemuCaps)
{
918
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
J
Ján Tomko 已提交
919
    g_autoptr(virJSONValue) props = NULL;
920

921 922
    if (qemuBuildTLSx509BackendProps(tlspath, isListen, verifypeer, alias,
                                     certEncSecretAlias, qemuCaps, &props) < 0)
923
        return -1;
924

925
    if (virQEMUBuildObjectCommandlineFromJSON(&buf, props) < 0)
926
        return -1;
927

928 929
    virCommandAddArg(cmd, "-object");
    virCommandAddArgBuffer(cmd, &buf);
930

931
    return 0;
932 933 934
}


935 936 937 938
static char *
qemuBuildNetworkDriveURI(virStorageSourcePtr src,
                         qemuDomainSecretInfoPtr secinfo)
{
J
Ján Tomko 已提交
939
    g_autoptr(virURI) uri = NULL;
940

941
    if (!(uri = qemuBlockStorageSourceGetURI(src)))
942
        return NULL;
943

944 945
    if (src->hosts->socket)
        uri->query = g_strdup_printf("socket=%s", src->hosts->socket);
946 947

    if (qemuBuildGeneralSecinfoURI(uri, secinfo) < 0)
948
        return NULL;
949

950
    return virURIFormat(uri);
951 952 953
}


954
static char *
955
qemuBuildNetworkDriveStr(virStorageSourcePtr src,
956
                         qemuDomainSecretInfoPtr secinfo)
957
{
958
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
959
    size_t i;
960
    char *ret = NULL;
961

962
    switch ((virStorageNetProtocol) src->protocol) {
963
        case VIR_STORAGE_NET_PROTOCOL_NBD:
964
            if (src->nhosts != 1) {
965 966
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("protocol '%s' accepts only one host"),
967
                               virStorageNetProtocolTypeToString(src->protocol));
968
                return NULL;
969 970
            }

971 972 973 974 975 976
            if (!((src->hosts->name && strchr(src->hosts->name, ':')) ||
                  (src->hosts->transport == VIR_STORAGE_NET_HOST_TRANS_TCP &&
                   !src->hosts->name) ||
                  (src->hosts->transport == VIR_STORAGE_NET_HOST_TRANS_UNIX &&
                   src->hosts->socket &&
                   src->hosts->socket[0] != '/'))) {
977 978 979

                virBufferAddLit(&buf, "nbd:");

980
                switch (src->hosts->transport) {
981
                case VIR_STORAGE_NET_HOST_TRANS_TCP:
982 983
                    virBufferAsprintf(&buf, "%s:%u",
                                      src->hosts->name, src->hosts->port);
984 985
                    break;

986
                case VIR_STORAGE_NET_HOST_TRANS_UNIX:
987
                    if (!src->hosts->socket) {
988 989 990
                        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                                       _("socket attribute required for "
                                         "unix transport"));
991
                        return NULL;
992 993
                    }

994
                    virBufferAsprintf(&buf, "unix:%s", src->hosts->socket);
995 996 997 998 999
                    break;

                default:
                    virReportError(VIR_ERR_INTERNAL_ERROR,
                                   _("nbd does not support transport '%s'"),
1000
                                   virStorageNetHostTransportTypeToString(src->hosts->transport));
1001
                    return NULL;
1002 1003
                }

1004 1005
                if (src->path)
                    virBufferAsprintf(&buf, ":exportname=%s", src->path);
1006

1007
                return virBufferContentAndReset(&buf);
1008
            }
1009 1010 1011
            /* NBD code uses URI formatting scheme as others in some cases */
            ret = qemuBuildNetworkDriveURI(src, secinfo);
            break;
1012

1013 1014 1015 1016 1017 1018 1019
        case VIR_STORAGE_NET_PROTOCOL_HTTP:
        case VIR_STORAGE_NET_PROTOCOL_HTTPS:
        case VIR_STORAGE_NET_PROTOCOL_FTP:
        case VIR_STORAGE_NET_PROTOCOL_FTPS:
        case VIR_STORAGE_NET_PROTOCOL_TFTP:
        case VIR_STORAGE_NET_PROTOCOL_ISCSI:
        case VIR_STORAGE_NET_PROTOCOL_GLUSTER:
1020
            ret = qemuBuildNetworkDriveURI(src, secinfo);
1021 1022
            break;

1023
        case VIR_STORAGE_NET_PROTOCOL_SHEEPDOG:
1024
            if (!src->path) {
1025 1026
                virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                               _("missing disk source for 'sheepdog' protocol"));
1027
                return NULL;
1028 1029
            }

1030
            if (src->nhosts == 0) {
1031
                ret = g_strdup_printf("sheepdog:%s", src->path);
1032
            } else if (src->nhosts == 1) {
1033 1034
                ret = g_strdup_printf("sheepdog:%s:%u:%s", src->hosts->name,
                                      src->hosts->port, src->path);
1035 1036 1037
            } else {
                virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                               _("protocol 'sheepdog' accepts up to one host"));
1038
                return NULL;
1039 1040 1041 1042
            }

            break;

1043
        case VIR_STORAGE_NET_PROTOCOL_RBD:
1044
            if (strchr(src->path, ':')) {
1045 1046
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("':' not allowed in RBD source volume name '%s'"),
1047
                               src->path);
1048
                return NULL;
1049 1050
            }

1051
            virBufferStrcat(&buf, "rbd:", src->volume, "/", src->path, NULL);
1052

1053 1054 1055
            if (src->snapshot)
                virBufferEscape(&buf, '\\', ":", "@%s", src->snapshot);

1056
            if (qemuBuildRBDSecinfoURI(&buf, secinfo) < 0)
1057
                return NULL;
1058

1059
            if (src->nhosts > 0) {
1060
                virBufferAddLit(&buf, ":mon_host=");
1061
                for (i = 0; i < src->nhosts; i++) {
1062 1063 1064 1065
                    if (i)
                        virBufferAddLit(&buf, "\\;");

                    /* assume host containing : is ipv6 */
1066 1067 1068
                    if (strchr(src->hosts[i].name, ':'))
                        virBufferEscape(&buf, '\\', ":", "[%s]",
                                        src->hosts[i].name);
1069
                    else
1070
                        virBufferAsprintf(&buf, "%s", src->hosts[i].name);
1071

1072
                    if (src->hosts[i].port)
1073
                        virBufferAsprintf(&buf, "\\:%u", src->hosts[i].port);
1074 1075 1076
                }
            }

1077 1078 1079
            if (src->configFile)
                virBufferEscape(&buf, '\\', ":", ":conf=%s", src->configFile);

1080 1081 1082
            ret = virBufferContentAndReset(&buf);
            break;

1083 1084 1085
        case VIR_STORAGE_NET_PROTOCOL_VXHS:
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("VxHS protocol does not support URI syntax"));
1086
            return NULL;
1087

1088 1089 1090
        case VIR_STORAGE_NET_PROTOCOL_SSH:
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("'ssh' protocol is not yet supported"));
1091
            return NULL;
1092

1093
        case VIR_STORAGE_NET_PROTOCOL_LAST:
1094
        case VIR_STORAGE_NET_PROTOCOL_NONE:
1095 1096 1097
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unexpected network protocol '%s'"),
                           virStorageNetProtocolTypeToString(src->protocol));
1098
            return NULL;
1099
    }
1100 1101 1102 1103 1104

    return ret;
}


1105
int
1106
qemuGetDriveSourceString(virStorageSourcePtr src,
1107
                         qemuDomainSecretInfoPtr secinfo,
1108
                         char **source)
1109
{
1110 1111 1112 1113
    int actualType = virStorageSourceGetActualType(src);

    *source = NULL;

1114 1115 1116 1117
    /* return 1 for empty sources */
    if (virStorageSourceIsEmpty(src))
        return 1;

1118
    switch ((virStorageType)actualType) {
E
Eric Blake 已提交
1119 1120 1121
    case VIR_STORAGE_TYPE_BLOCK:
    case VIR_STORAGE_TYPE_FILE:
    case VIR_STORAGE_TYPE_DIR:
1122
        *source = g_strdup(src->path);
1123 1124 1125

        break;

E
Eric Blake 已提交
1126
    case VIR_STORAGE_TYPE_NETWORK:
1127
        if (!(*source = qemuBuildNetworkDriveStr(src, secinfo)))
1128
            return -1;
1129 1130
        break;

E
Eric Blake 已提交
1131
    case VIR_STORAGE_TYPE_VOLUME:
1132
    case VIR_STORAGE_TYPE_NONE:
E
Eric Blake 已提交
1133
    case VIR_STORAGE_TYPE_LAST:
1134 1135 1136
        break;
    }

1137
    return 0;
1138 1139
}

P
Paolo Bonzini 已提交
1140

1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177
static bool
qemuDiskConfigBlkdeviotuneHasBasic(virDomainDiskDefPtr disk)
{
    return disk->blkdeviotune.total_bytes_sec ||
           disk->blkdeviotune.read_bytes_sec ||
           disk->blkdeviotune.write_bytes_sec ||
           disk->blkdeviotune.total_iops_sec ||
           disk->blkdeviotune.read_iops_sec ||
           disk->blkdeviotune.write_iops_sec;
}


static bool
qemuDiskConfigBlkdeviotuneHasMax(virDomainDiskDefPtr disk)
{
    return disk->blkdeviotune.total_bytes_sec_max ||
           disk->blkdeviotune.read_bytes_sec_max ||
           disk->blkdeviotune.write_bytes_sec_max ||
           disk->blkdeviotune.total_iops_sec_max ||
           disk->blkdeviotune.read_iops_sec_max ||
           disk->blkdeviotune.write_iops_sec_max ||
           disk->blkdeviotune.size_iops_sec;
}


static bool
qemuDiskConfigBlkdeviotuneHasMaxLength(virDomainDiskDefPtr disk)
{
    return disk->blkdeviotune.total_bytes_sec_max_length ||
           disk->blkdeviotune.read_bytes_sec_max_length ||
           disk->blkdeviotune.write_bytes_sec_max_length ||
           disk->blkdeviotune.total_iops_sec_max_length ||
           disk->blkdeviotune.read_iops_sec_max_length ||
           disk->blkdeviotune.write_iops_sec_max_length;
}


1178 1179 1180 1181 1182 1183 1184 1185 1186 1187
bool
qemuDiskConfigBlkdeviotuneEnabled(virDomainDiskDefPtr disk)
{
    return !!disk->blkdeviotune.group_name ||
           qemuDiskConfigBlkdeviotuneHasBasic(disk) ||
           qemuDiskConfigBlkdeviotuneHasMax(disk) ||
           qemuDiskConfigBlkdeviotuneHasMaxLength(disk);
}


1188 1189 1190 1191 1192 1193 1194 1195
/**
 * qemuCheckDiskConfigBlkdeviotune:
 * @disk: disk configuration
 * @qemuCaps: qemu capabilities, NULL if checking cold-configuration
 *
 * Checks whether block io tuning settings make sense. Returns -1 on error and
 * reports a proper libvirt error.
 */
1196 1197 1198 1199
static int
qemuCheckDiskConfigBlkdeviotune(virDomainDiskDefPtr disk,
                                virQEMUCapsPtr qemuCaps)
{
1200 1201 1202 1203 1204
    /* group_name by itself is ignored by qemu */
    if (disk->blkdeviotune.group_name &&
        !qemuDiskConfigBlkdeviotuneHasBasic(disk) &&
        !qemuDiskConfigBlkdeviotuneHasMax(disk) &&
        !qemuDiskConfigBlkdeviotuneHasMaxLength(disk)) {
1205
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
1206 1207
                       _("group_name can be configured only together with "
                         "settings"));
1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229
        return -1;
    }

    if (disk->blkdeviotune.total_bytes_sec > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.read_bytes_sec > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.write_bytes_sec > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.total_iops_sec > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.read_iops_sec > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.write_iops_sec > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.total_bytes_sec_max > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.read_bytes_sec_max > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.write_bytes_sec_max > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.total_iops_sec_max > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.read_iops_sec_max > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.write_iops_sec_max > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.size_iops_sec > QEMU_BLOCK_IOTUNE_MAX) {
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED,
                      _("block I/O throttle limit must "
                        "be no more than %llu using QEMU"), QEMU_BLOCK_IOTUNE_MAX);
        return -1;
    }

1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258
    if (qemuCaps) {
        /* block I/O throttling 1.7 */
        if (qemuDiskConfigBlkdeviotuneHasMax(disk) &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DRIVE_IOTUNE_MAX)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("there are some block I/O throttling parameters "
                             "that are not supported with this QEMU binary"));
            return -1;
        }

        /* block I/O group 2.4 */
        if (disk->blkdeviotune.group_name &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DRIVE_IOTUNE_GROUP)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("the block I/O throttling group parameter is "
                             "not supported with this QEMU binary"));
            return -1;
        }

        /* block I/O throttling length 2.6 */
        if (qemuDiskConfigBlkdeviotuneHasMaxLength(disk) &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DRIVE_IOTUNE_MAX_LENGTH)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("there are some block I/O throttling length parameters "
                             "that are not supported with this QEMU binary"));
            return -1;
        }
    }

1259 1260 1261 1262
    return 0;
}


1263 1264 1265 1266 1267 1268 1269 1270
/**
 * qemuCheckDiskConfig:
 * @disk: disk definition
 * @qemuCaps: qemu capabilities, may be NULL for cold-plug check
 *
 * Perform disk definition config validity checks. Returns -1 on error with
 * error reported.
 */
1271
int
1272 1273
qemuCheckDiskConfig(virDomainDiskDefPtr disk,
                    virQEMUCapsPtr qemuCaps)
1274
{
1275 1276 1277
    if (qemuCheckDiskConfigBlkdeviotune(disk, qemuCaps) < 0)
        return -1;

1278 1279 1280 1281 1282
    if (disk->wwn) {
        if ((disk->bus != VIR_DOMAIN_DISK_BUS_IDE) &&
            (disk->bus != VIR_DOMAIN_DISK_BUS_SCSI)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Only ide and scsi disk support wwn"));
1283
            return -1;
1284 1285 1286 1287 1288 1289 1290
        }
    }

    if ((disk->vendor || disk->product) &&
        disk->bus != VIR_DOMAIN_DISK_BUS_SCSI) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Only scsi disk supports vendor and product"));
1291
            return -1;
1292 1293 1294 1295 1296 1297 1298 1299
    }

    if (disk->device == VIR_DOMAIN_DISK_DEVICE_LUN) {
        /* make sure that both the bus supports type='lun' (SG_IO). */
        if (disk->bus != VIR_DOMAIN_DISK_BUS_VIRTIO &&
            disk->bus != VIR_DOMAIN_DISK_BUS_SCSI) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("disk device='lun' is not supported for bus='%s'"),
1300
                           virDomainDiskBusTypeToString(disk->bus));
1301
            return -1;
1302
        }
1303

1304 1305 1306 1307 1308 1309 1310 1311
        if (disk->bus == VIR_DOMAIN_DISK_BUS_SCSI &&
            disk->src->format != VIR_STORAGE_FILE_RAW) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("disk device 'lun' using target 'scsi' must use "
                             "'raw' format"));
            return -1;
        }

1312
        if (qemuDomainDefValidateDiskLunSource(disk->src) < 0)
1313
            return -1;
1314

1315 1316 1317
        if (disk->wwn) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Setting wwn is not supported for lun device"));
1318
            return -1;
1319 1320 1321 1322 1323
        }
        if (disk->vendor || disk->product) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Setting vendor or product is not supported "
                             "for lun device"));
1324
            return -1;
1325 1326
        }
    }
1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423

    switch (disk->bus) {
    case VIR_DOMAIN_DISK_BUS_SCSI:
        if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("unexpected address type for scsi disk"));
            return -1;
        }

        /* Setting bus= attr for SCSI drives, causes a controller
         * to be created. Yes this is slightly odd. It is not possible
         * to have > 1 bus on a SCSI controller (yet). */
        if (disk->info.addr.drive.bus != 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("SCSI controller only supports 1 bus"));
            return -1;
        }
        break;

    case VIR_DOMAIN_DISK_BUS_IDE:
        if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("unexpected address type for ide disk"));
            return -1;
        }
        /* We can only have 1 IDE controller (currently) */
        if (disk->info.addr.drive.controller != 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Only 1 IDE controller is supported"));
            return -1;
        }
        break;

    case VIR_DOMAIN_DISK_BUS_FDC:
        if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("unexpected address type for fdc disk"));
            return -1;
        }
        /* We can only have 1 FDC controller (currently) */
        if (disk->info.addr.drive.controller != 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Only 1 fdc controller is supported"));
            return -1;
        }
        /* We can only have 1 FDC bus (currently) */
        if (disk->info.addr.drive.bus != 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Only 1 fdc bus is supported"));
            return -1;
        }
        if (disk->info.addr.drive.target != 0) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("target must be 0 for controller fdc"));
            return -1;
        }
        break;

    case VIR_DOMAIN_DISK_BUS_VIRTIO:
    case VIR_DOMAIN_DISK_BUS_XEN:
    case VIR_DOMAIN_DISK_BUS_SD:
        break;
    }

    if (disk->src->readonly &&
        disk->device == VIR_DOMAIN_DISK_DEVICE_DISK) {
        if (disk->bus == VIR_DOMAIN_DISK_BUS_IDE) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("readonly ide disks are not supported"));
            return -1;
        }

        if (disk->bus == VIR_DOMAIN_DISK_BUS_SATA) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("readonly sata disks are not supported"));
            return -1;
        }
    }

    if (disk->transient) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("transient disks not supported yet"));
        return -1;
    }

    if (disk->iomode == VIR_DOMAIN_DISK_IO_NATIVE &&
        disk->cachemode != VIR_DOMAIN_DISK_CACHE_DIRECTSYNC &&
        disk->cachemode != VIR_DOMAIN_DISK_CACHE_DISABLE) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("native I/O needs either no disk cache "
                         "or directsync cache mode, QEMU will fallback "
                         "to aio=threads"));
        return -1;
    }

    if (qemuCaps) {
        if (disk->serial &&
1424 1425 1426 1427 1428 1429
            disk->bus == VIR_DOMAIN_DISK_BUS_SCSI &&
            disk->device == VIR_DOMAIN_DISK_DEVICE_LUN) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("scsi-block 'lun' devices do not support the "
                             "serial property"));
            return -1;
1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446
        }

        if (disk->discard &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DRIVE_DISCARD)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("discard is not supported by this QEMU binary"));
            return -1;
        }

        if (disk->detect_zeroes &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DRIVE_DETECT_ZEROES)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("detect_zeroes is not supported by this QEMU binary"));
            return -1;
        }
    }

1447 1448 1449 1450
    if (disk->serial &&
        qemuSafeSerialParamValue(disk->serial) < 0)
        return -1;

1451 1452 1453 1454
    return 0;
}


P
Philipp Hahn 已提交
1455
/* QEMU 1.2 and later have a binary flag -enable-fips that must be
1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468
 * used for VNC auth to obey FIPS settings; but the flag only
 * exists on Linux, and with no way to probe for it via QMP.  Our
 * solution: if FIPS mode is required, then unconditionally use
 * the flag, regardless of qemu version, for the following matrix:
 *
 *                          old QEMU            new QEMU
 * FIPS enabled             doesn't start       VNC auth disabled
 * FIPS disabled/missing    VNC auth enabled    VNC auth enabled
 */
bool
qemuCheckFips(void)
{
    if (virFileExists("/proc/sys/crypto/fips_enabled")) {
1469
        g_autofree char *buf = NULL;
1470 1471

        if (virFileReadAll("/proc/sys/crypto/fips_enabled", 10, &buf) < 0)
1472
            return false;
1473
        if (STREQ(buf, "1\n"))
1474
            return true;
1475 1476
    }

1477
    return false;
1478 1479 1480
}


1481 1482 1483 1484 1485 1486 1487 1488 1489 1490
/**
 * qemuDiskBusNeedsDriveArg:
 * @bus: disk bus
 *
 * Unfortunately it is not possible to use -device for SD devices.
 * Fortunately, those don't need static PCI addresses, so we can use -drive
 * without -device.
 */
bool
qemuDiskBusNeedsDriveArg(int bus)
J
Ján Tomko 已提交
1491
{
1492
    return bus == VIR_DOMAIN_DISK_BUS_SD;
J
Ján Tomko 已提交
1493 1494 1495
}


1496 1497 1498 1499 1500 1501 1502 1503 1504
/**
 * qemuDiskSourceNeedsProps:
 * @src: disk source
 *
 * Returns true, if the disk source needs to be generated from the JSON
 * representation. Otherwise, the disk source should be represented using
 * the legacy representation.
 */
static bool
1505 1506
qemuDiskSourceNeedsProps(virStorageSourcePtr src,
                         virQEMUCapsPtr qemuCaps)
1507 1508 1509 1510 1511 1512 1513 1514
{
    int actualType = virStorageSourceGetActualType(src);

    if (actualType == VIR_STORAGE_TYPE_NETWORK &&
        src->protocol == VIR_STORAGE_NET_PROTOCOL_GLUSTER &&
        src->nhosts > 1)
        return true;

1515 1516 1517 1518
    if (actualType == VIR_STORAGE_TYPE_NETWORK &&
        src->protocol == VIR_STORAGE_NET_PROTOCOL_VXHS)
        return true;

1519 1520 1521 1522 1523
    if (actualType == VIR_STORAGE_TYPE_NETWORK &&
        src->protocol == VIR_STORAGE_NET_PROTOCOL_ISCSI &&
        virQEMUCapsGet(qemuCaps, QEMU_CAPS_ISCSI_PASSWORD_SECRET))
        return true;

1524 1525 1526 1527 1528
    if (actualType == VIR_STORAGE_TYPE_NETWORK &&
        src->protocol == VIR_STORAGE_NET_PROTOCOL_NBD &&
        src->haveTLS == VIR_TRISTATE_BOOL_YES)
        return true;

1529 1530 1531 1532
    return false;
}


1533 1534 1535 1536 1537 1538 1539 1540 1541 1542
/**
 * qemuDiskSourceGetProps:
 * @src: disk source struct
 *
 * Returns the disk source struct wrapped so that it can be used as disk source
 * directly by converting it from json.
 */
static virJSONValuePtr
qemuDiskSourceGetProps(virStorageSourcePtr src)
{
J
Ján Tomko 已提交
1543
    g_autoptr(virJSONValue) props = NULL;
1544 1545
    virJSONValuePtr ret;

1546
    if (!(props = qemuBlockStorageSourceGetBackendProps(src, true, false, false)))
1547 1548
        return NULL;

1549
    if (virJSONValueObjectCreate(&ret, "a:file", &props, NULL) < 0)
1550 1551 1552 1553 1554 1555
        return NULL;

    return ret;
}


1556 1557 1558 1559
static int
qemuBuildDriveSourcePR(virBufferPtr buf,
                       virDomainDiskDefPtr disk)
{
1560
    g_autofree char *alias = NULL;
1561 1562
    const char *defaultAlias = NULL;

1563
    if (!disk->src->pr)
1564 1565 1566 1567
        return 0;

    if (virStoragePRDefIsManaged(disk->src->pr))
        defaultAlias = qemuDomainGetManagedPRAlias();
1568
    else if (!(alias = qemuDomainGetUnmanagedPRAlias(disk->info.alias)))
1569 1570 1571 1572 1573 1574 1575 1576
        return -1;


    virBufferAsprintf(buf, ",file.pr-manager=%s", alias ? alias : defaultAlias);
    return 0;
}


1577 1578
static int
qemuBuildDriveSourceStr(virDomainDiskDefPtr disk,
1579
                        virQEMUCapsPtr qemuCaps,
1580
                        virBufferPtr buf)
1581 1582
{
    int actualType = virStorageSourceGetActualType(disk->src);
1583
    qemuDomainStorageSourcePrivatePtr srcpriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(disk->src);
1584 1585
    qemuDomainSecretInfoPtr secinfo = NULL;
    qemuDomainSecretInfoPtr encinfo = NULL;
J
Ján Tomko 已提交
1586
    g_autoptr(virJSONValue) srcprops = NULL;
1587
    g_autofree char *source = NULL;
1588
    bool rawluks = false;
1589

1590 1591 1592 1593 1594
    if (srcpriv) {
        secinfo = srcpriv->secinfo;
        encinfo = srcpriv->encinfo;
    }

1595
    if (qemuDiskSourceNeedsProps(disk->src, qemuCaps) &&
1596
        !(srcprops = qemuDiskSourceGetProps(disk->src)))
1597
        return -1;
1598 1599 1600

    if (!srcprops &&
        qemuGetDriveSourceString(disk->src, secinfo, &source) < 0)
1601
        return -1;
1602

1603
    /* nothing to format if the drive is empty */
1604
    if (!(source || srcprops) ||
1605 1606 1607
        ((disk->device == VIR_DOMAIN_DISK_DEVICE_FLOPPY ||
          disk->device == VIR_DOMAIN_DISK_DEVICE_CDROM) &&
         disk->tray_status == VIR_DOMAIN_DISK_TRAY_OPEN)) {
1608
        return 0;
1609
    }
1610

1611 1612 1613 1614 1615 1616
    if (actualType == VIR_STORAGE_TYPE_BLOCK &&
        disk->tray_status == VIR_DOMAIN_DISK_TRAY_OPEN) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       disk->src->type == VIR_STORAGE_TYPE_VOLUME ?
                       _("tray status 'open' is invalid for block type volume") :
                       _("tray status 'open' is invalid for block type disk"));
1617
        return -1;
1618
    }
1619

1620 1621
    if (source) {
        virBufferAddLit(buf, "file=");
1622

1623 1624 1625 1626 1627 1628
        /* for now the DIR based storage is handled by the magic FAT format */
        if (actualType == VIR_STORAGE_TYPE_DIR) {
            virBufferAddLit(buf, "fat:");

            if (disk->device == VIR_DOMAIN_DISK_DEVICE_FLOPPY)
                virBufferAddLit(buf, "floppy:");
1629 1630
        }

1631
        virQEMUBuildBufferEscapeComma(buf, source);
1632 1633 1634

        if (secinfo && secinfo->type == VIR_DOMAIN_SECRET_INFO_TYPE_AES)
            virBufferAsprintf(buf, ",file.password-secret=%s", secinfo->s.aes.alias);
1635 1636 1637

        if (disk->src->debug)
            virBufferAsprintf(buf, ",file.debug=%d", disk->src->debugLevel);
1638 1639

        if (qemuBuildDriveSourcePR(buf, disk) < 0)
1640
            return -1;
1641 1642
    } else {
        if (!(source = virQEMUBuildDriveCommandlineFromJSON(srcprops)))
1643
            return -1;
1644

1645
        virBufferAdd(buf, source, -1);
1646 1647
    }
    virBufferAddLit(buf, ",");
1648

1649 1650 1651 1652 1653 1654 1655 1656 1657 1658
    if (encinfo) {
        if (disk->src->format == VIR_STORAGE_FILE_RAW) {
            virBufferAsprintf(buf, "key-secret=%s,", encinfo->s.aes.alias);
            rawluks = true;
        } else if (disk->src->format == VIR_STORAGE_FILE_QCOW2 &&
                   disk->src->encryption->format == VIR_STORAGE_ENCRYPTION_FORMAT_LUKS) {
            virBufferAddLit(buf, "encrypt.format=luks,");
            virBufferAsprintf(buf, "encrypt.key-secret=%s,", encinfo->s.aes.alias);
        }
    }
1659 1660

    if (disk->src->format > 0 &&
1661
        actualType != VIR_STORAGE_TYPE_DIR) {
1662
        const char *qemuformat = virStorageFileFormatTypeToString(disk->src->format);
1663
        if (rawluks)
1664 1665 1666
            qemuformat = "luks";
        virBufferAsprintf(buf, "format=%s,", qemuformat);
    }
1667

1668
    return 0;
1669 1670 1671
}


1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697
static void
qemuBuildDiskThrottling(virDomainDiskDefPtr disk,
                        virBufferPtr buf)
{
#define IOTUNE_ADD(_field, _label) \
    if (disk->blkdeviotune._field) { \
        virBufferAsprintf(buf, ",throttling." _label "=%llu", \
                          disk->blkdeviotune._field); \
    }

    IOTUNE_ADD(total_bytes_sec, "bps-total");
    IOTUNE_ADD(read_bytes_sec, "bps-read");
    IOTUNE_ADD(write_bytes_sec, "bps-write");
    IOTUNE_ADD(total_iops_sec, "iops-total");
    IOTUNE_ADD(read_iops_sec, "iops-read");
    IOTUNE_ADD(write_iops_sec, "iops-write");

    IOTUNE_ADD(total_bytes_sec_max, "bps-total-max");
    IOTUNE_ADD(read_bytes_sec_max, "bps-read-max");
    IOTUNE_ADD(write_bytes_sec_max, "bps-write-max");
    IOTUNE_ADD(total_iops_sec_max, "iops-total-max");
    IOTUNE_ADD(read_iops_sec_max, "iops-read-max");
    IOTUNE_ADD(write_iops_sec_max, "iops-write-max");

    IOTUNE_ADD(size_iops_sec, "iops-size");
    if (disk->blkdeviotune.group_name) {
1698 1699
        virBufferAddLit(buf, ",throttling.group=");
        virQEMUBuildBufferEscapeComma(buf, disk->blkdeviotune.group_name);
1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711
    }

    IOTUNE_ADD(total_bytes_sec_max_length, "bps-total-max-length");
    IOTUNE_ADD(read_bytes_sec_max_length, "bps-read-max-length");
    IOTUNE_ADD(write_bytes_sec_max_length, "bps-write-max-length");
    IOTUNE_ADD(total_iops_sec_max_length, "iops-total-max-length");
    IOTUNE_ADD(read_iops_sec_max_length, "iops-read-max-length");
    IOTUNE_ADD(write_iops_sec_max_length, "iops-write-max-length");
#undef IOTUNE_ADD
}


1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742
static void
qemuBuildDiskFrontendAttributeErrorPolicy(virDomainDiskDefPtr disk,
                                          virBufferPtr buf)
{
    const char *wpolicy = NULL;
    const char *rpolicy = NULL;

    if (disk->error_policy)
        wpolicy = virDomainDiskErrorPolicyTypeToString(disk->error_policy);

    if (disk->rerror_policy)
        rpolicy = virDomainDiskErrorPolicyTypeToString(disk->rerror_policy);

    if (disk->error_policy == VIR_DOMAIN_DISK_ERROR_POLICY_ENOSPACE) {
        /* in the case of enospace, the option is spelled
         * differently in qemu, and it's only valid for werror,
         * not for rerror, so leave rerror NULL.
         */
        wpolicy = "enospc";
    } else if (!rpolicy) {
        /* for other policies, rpolicy can match wpolicy */
        rpolicy = wpolicy;
    }

    if (wpolicy)
        virBufferAsprintf(buf, ",werror=%s", wpolicy);
    if (rpolicy)
        virBufferAsprintf(buf, ",rerror=%s", rpolicy);
}


1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756
static void
qemuBuildDiskFrontendAttributes(virDomainDiskDefPtr disk,
                                virBufferPtr buf)
{
    /* generate geometry command string */
    if (disk->geometry.cylinders > 0 &&
        disk->geometry.heads > 0 &&
        disk->geometry.sectors > 0) {
        virBufferAsprintf(buf, ",cyls=%u,heads=%u,secs=%u",
                          disk->geometry.cylinders,
                          disk->geometry.heads,
                          disk->geometry.sectors);

        if (disk->geometry.trans != VIR_DOMAIN_DISK_TRANS_DEFAULT)
1757
            virBufferAsprintf(buf, ",bios-chs-trans=%s",
1758 1759
                              virDomainDiskGeometryTransTypeToString(disk->geometry.trans));
    }
1760

1761
    if (disk->serial) {
1762 1763 1764
        virBufferAddLit(buf, ",serial=");
        virBufferEscape(buf, '\\', " ", "%s", disk->serial);
    }
1765 1766 1767
}


1768
static char *
1769 1770 1771
qemuBuildDriveStr(virDomainDiskDefPtr disk,
                  virQEMUCapsPtr qemuCaps)
{
1772
    g_auto(virBuffer) opt = VIR_BUFFER_INITIALIZER;
1773 1774
    int detect_zeroes = virDomainDiskGetDetectZeroesMode(disk->discard,
                                                         disk->detect_zeroes);
1775

1776
    if (qemuBuildDriveSourceStr(disk, qemuCaps, &opt) < 0)
1777 1778
        goto error;

1779
    if (!qemuDiskBusNeedsDriveArg(disk->bus)) {
1780
        g_autofree char *drivealias = qemuAliasDiskDriveFromDisk(disk);
1781 1782
        if (!drivealias)
            goto error;
1783 1784

        virBufferAddLit(&opt, "if=none");
1785
        virBufferAsprintf(&opt, ",id=%s", drivealias);
1786
    } else {
1787 1788 1789 1790 1791 1792 1793
        int idx = virDiskNameToIndex(disk->dst);

        if (idx < 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("unsupported disk type '%s'"), disk->dst);
            goto error;
        }
1794 1795 1796 1797 1798 1799 1800

        /* if we are using -device this will be checked elsewhere */
        if (qemuCheckDiskConfig(disk, qemuCaps) < 0)
            goto error;

        virBufferAsprintf(&opt, "if=%s",
                          virDomainDiskQEMUBusTypeToString(disk->bus));
1801
        virBufferAsprintf(&opt, ",index=%d", idx);
1802
    }
1803

1804 1805
    /* werror/rerror are really frontend attributes, but older
     * qemu requires them on -drive instead of -device */
1806 1807
    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_USB_STORAGE_WERROR))
        qemuBuildDiskFrontendAttributeErrorPolicy(disk, &opt);
1808

1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819
    if (disk->src->readonly)
        virBufferAddLit(&opt, ",readonly=on");

    /* qemu rejects some parameters for an empty -drive, so we need to skip
     * them in that case:
     * cache: modifies properties of the format driver which is not present
     * copy_on_read: really only works for floppies
     * discard: modifies properties of format driver
     * detect_zeroes: works but really depends on discard so it's useless
     * iomode: setting it to 'native' requires a specific cache mode
     */
1820 1821 1822 1823 1824
    if (!virStorageSourceIsEmpty(disk->src)) {
        if (disk->cachemode) {
            virBufferAsprintf(&opt, ",cache=%s",
                              qemuDiskCacheV2TypeToString(disk->cachemode));
        }
1825

1826 1827 1828 1829
        if (disk->copy_on_read) {
            virBufferAsprintf(&opt, ",copy-on-read=%s",
                              virTristateSwitchTypeToString(disk->copy_on_read));
        }
1830

1831 1832 1833 1834
        if (disk->discard) {
            virBufferAsprintf(&opt, ",discard=%s",
                              virDomainDiskDiscardTypeToString(disk->discard));
        }
O
Osier Yang 已提交
1835

1836 1837 1838 1839
        if (detect_zeroes) {
            virBufferAsprintf(&opt, ",detect-zeroes=%s",
                              virDomainDiskDetectZeroesTypeToString(detect_zeroes));
        }
O
Osier Yang 已提交
1840

1841 1842 1843 1844
        if (disk->iomode) {
            virBufferAsprintf(&opt, ",aio=%s",
                              virDomainDiskIoTypeToString(disk->iomode));
        }
E
Eric Blake 已提交
1845 1846
    }

1847 1848
    qemuBuildDiskThrottling(disk, &opt);

1849 1850
    return virBufferContentAndReset(&opt);

1851
 error:
1852 1853 1854
    return NULL;
}

1855

1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898
static bool
qemuCheckIOThreads(const virDomainDef *def,
                   virDomainDiskDefPtr disk)
{
    /* Right "type" of disk" */
    switch ((virDomainDiskBus)disk->bus) {
    case VIR_DOMAIN_DISK_BUS_VIRTIO:
        if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI &&
            disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                            _("IOThreads only available for virtio pci and "
                              "virtio ccw disk"));
            return false;
        }
        break;

    case VIR_DOMAIN_DISK_BUS_IDE:
    case VIR_DOMAIN_DISK_BUS_FDC:
    case VIR_DOMAIN_DISK_BUS_SCSI:
    case VIR_DOMAIN_DISK_BUS_XEN:
    case VIR_DOMAIN_DISK_BUS_USB:
    case VIR_DOMAIN_DISK_BUS_UML:
    case VIR_DOMAIN_DISK_BUS_SATA:
    case VIR_DOMAIN_DISK_BUS_SD:
    case VIR_DOMAIN_DISK_BUS_LAST:
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("IOThreads not available for bus %s target %s"),
                       virDomainDiskBusTypeToString(disk->bus), disk->dst);
        return false;
    }

    /* Can we find the disk iothread in the iothreadid list? */
    if (!virDomainIOThreadIDFind(def, disk->iothread)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Disk iothread '%u' not defined in iothreadid"),
                       disk->iothread);
        return false;
    }

    return true;
}


1899 1900 1901 1902 1903 1904 1905 1906 1907 1908
static int
qemuBuildDriveDevCacheStr(virDomainDiskDefPtr disk,
                          virBufferPtr buf,
                          virQEMUCapsPtr qemuCaps)
{
    bool wb;

    if (disk->cachemode == VIR_DOMAIN_DISK_CACHE_DEFAULT)
        return 0;

1909 1910 1911 1912 1913
    /* VIR_DOMAIN_DISK_DEVICE_LUN translates into 'scsi-block'
     * where any caching setting makes no sense. */
    if (disk->device == VIR_DOMAIN_DISK_DEVICE_LUN)
        return 0;

1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927
    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DISK_WRITE_CACHE))
        return 0;

    if (qemuDomainDiskCachemodeFlags(disk->cachemode, &wb, NULL, NULL) < 0)
        return -1;

    virBufferStrcat(buf, ",write-cache=",
                    virTristateSwitchTypeToString(virTristateSwitchFromBool(wb)),
                    NULL);

    return 0;
}


1928
char *
1929 1930 1931 1932
qemuBuildDiskDeviceStr(const virDomainDef *def,
                       virDomainDiskDefPtr disk,
                       unsigned int bootindex,
                       virQEMUCapsPtr qemuCaps)
1933
{
1934
    g_auto(virBuffer) opt = VIR_BUFFER_INITIALIZER;
1935
    const char *bus = virDomainDiskQEMUBusTypeToString(disk->bus);
1936
    const char *contAlias;
1937 1938
    g_autofree char *backendAlias = NULL;
    g_autofree char *scsiVPDDeviceId = NULL;
1939
    int controllerModel;
1940

1941
    if (qemuCheckDiskConfig(disk, qemuCaps) < 0)
1942
        goto error;
1943

1944
    if (!qemuDomainCheckCCWS390AddressSupport(def, &disk->info, qemuCaps, disk->dst))
1945 1946
        goto error;

1947 1948 1949
    if (disk->iothread && !qemuCheckIOThreads(def, disk))
        goto error;

1950
    switch ((virDomainDiskBus) disk->bus) {
1951
    case VIR_DOMAIN_DISK_BUS_IDE:
1952
        if (disk->info.addr.drive.target != 0) {
1953 1954
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("target must be 0 for ide controller"));
1955 1956
            goto error;
        }
1957

1958
        if (disk->wwn &&
1959
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_IDE_DRIVE_WWN)) {
1960 1961 1962 1963 1964 1965
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Setting wwn for ide disk is not supported "
                             "by this QEMU"));
            goto error;
        }

1966 1967 1968 1969
        if (disk->device == VIR_DOMAIN_DISK_DEVICE_CDROM)
            virBufferAddLit(&opt, "ide-cd");
        else
            virBufferAddLit(&opt, "ide-hd");
1970

1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981
        /* When domain has builtin IDE controller we don't put it onto cmd
         * line. Therefore we can't set its alias. In that case, use the
         * default one. */
        if (qemuDomainHasBuiltinIDE(def)) {
            contAlias = "ide";
        } else {
            if (!(contAlias = virDomainControllerAliasFind(def,
                                                           VIR_DOMAIN_CONTROLLER_TYPE_IDE,
                                                           disk->info.addr.drive.controller)))
                goto error;
        }
1982 1983
        virBufferAsprintf(&opt, ",bus=%s.%d,unit=%d",
                          contAlias,
1984 1985 1986
                          disk->info.addr.drive.bus,
                          disk->info.addr.drive.unit);
        break;
1987

1988
    case VIR_DOMAIN_DISK_BUS_SCSI:
1989
        if (disk->device == VIR_DOMAIN_DISK_DEVICE_LUN) {
1990
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SCSI_BLOCK)) {
1991 1992 1993
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("This QEMU doesn't support scsi-block for "
                                 "lun passthrough"));
1994 1995 1996 1997
                goto error;
            }
        }

1998
        if (disk->wwn &&
1999
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_SCSI_DISK_WWN)) {
2000 2001 2002 2003 2004 2005
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Setting wwn for scsi disk is not supported "
                             "by this QEMU"));
            goto error;
        }

2006 2007 2008 2009
        /* Properties wwn, vendor and product were introduced in the
         * same QEMU release (1.2.0).
         */
        if ((disk->vendor || disk->product) &&
2010
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_SCSI_DISK_WWN)) {
2011 2012 2013 2014 2015 2016
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Setting vendor or product for scsi disk is not "
                             "supported by this QEMU"));
            goto error;
        }

2017
        controllerModel = qemuDomainFindSCSIControllerModel(def, &disk->info);
2018
        if (controllerModel < 0)
2019
            goto error;
2020

2021 2022 2023
        if (disk->device == VIR_DOMAIN_DISK_DEVICE_LUN) {
            virBufferAddLit(&opt, "scsi-block");
        } else {
2024 2025 2026 2027
            if (disk->device == VIR_DOMAIN_DISK_DEVICE_CDROM)
                virBufferAddLit(&opt, "scsi-cd");
            else
                virBufferAddLit(&opt, "scsi-hd");
2028 2029 2030 2031 2032 2033 2034 2035

            /* qemu historically used the name of -drive as one of the device
             * ids in the Vital Product Data Device Identification page if
             * disk serial was not set and the disk serial otherwise.
             * To avoid a guest-visible regression we need to provide it
             * ourselves especially for cases when -blockdev will be used */
            if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_SCSI_DISK_DEVICE_ID)) {
                if (disk->serial) {
2036
                    scsiVPDDeviceId = g_strdup(disk->serial);
2037 2038 2039 2040 2041
                } else {
                    if (!(scsiVPDDeviceId = qemuAliasDiskDriveFromDisk(disk)))
                        goto error;
                }
            }
2042 2043
        }

2044 2045 2046 2047
        if (!(contAlias = virDomainControllerAliasFind(def, VIR_DOMAIN_CONTROLLER_TYPE_SCSI,
                                                       disk->info.addr.drive.controller)))
           goto error;

2048 2049
        if (controllerModel == VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LSILOGIC) {
            if (disk->info.addr.drive.target != 0) {
2050 2051 2052
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("target must be 0 for controller "
                                 "model 'lsilogic'"));
2053 2054 2055
                goto error;
            }

2056 2057
            virBufferAsprintf(&opt, ",bus=%s.%d,scsi-id=%d",
                              contAlias,
2058 2059 2060
                              disk->info.addr.drive.bus,
                              disk->info.addr.drive.unit);
        } else {
2061
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SCSI_DISK_CHANNEL)) {
2062
                if (disk->info.addr.drive.target > 7) {
2063 2064 2065
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("This QEMU doesn't support target "
                                     "greater than 7"));
2066 2067 2068
                    goto error;
                }

2069 2070
                if (disk->info.addr.drive.bus != 0 &&
                    disk->info.addr.drive.unit != 0) {
2071 2072 2073
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("This QEMU only supports both bus and "
                                     "unit equal to 0"));
2074 2075 2076 2077
                    goto error;
                }
            }

2078 2079
            virBufferAsprintf(&opt, ",bus=%s.0,channel=%d,scsi-id=%d,lun=%d",
                              contAlias,
2080 2081 2082 2083
                              disk->info.addr.drive.bus,
                              disk->info.addr.drive.target,
                              disk->info.addr.drive.unit);
        }
2084 2085 2086 2087

        if (scsiVPDDeviceId)
            virBufferStrcat(&opt, ",device_id=", scsiVPDDeviceId, NULL);

2088
        break;
2089

J
Jim Fehlig 已提交
2090
    case VIR_DOMAIN_DISK_BUS_SATA:
2091
        if (disk->info.addr.drive.bus != 0) {
2092 2093
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("bus must be 0 for ide controller"));
2094 2095 2096
            goto error;
        }
        if (disk->info.addr.drive.target != 0) {
2097 2098
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("target must be 0 for ide controller"));
2099 2100
            goto error;
        }
2101

2102 2103 2104 2105
        if (disk->device == VIR_DOMAIN_DISK_DEVICE_CDROM)
            virBufferAddLit(&opt, "ide-cd");
        else
            virBufferAddLit(&opt, "ide-hd");
2106

2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118
        /* When domain has builtin SATA controller we don't put it onto cmd
         * line. Therefore we can't set its alias. In that case, use the
         * default one. */
        if (qemuDomainIsQ35(def) &&
            disk->info.addr.drive.controller == 0) {
            contAlias = "ide";
        } else {
            if (!(contAlias = virDomainControllerAliasFind(def,
                                                           VIR_DOMAIN_CONTROLLER_TYPE_SATA,
                                                           disk->info.addr.drive.controller)))
                goto error;
        }
2119 2120 2121
        virBufferAsprintf(&opt, ",bus=%s.%d",
                          contAlias,
                          disk->info.addr.drive.unit);
J
Jim Fehlig 已提交
2122
        break;
2123

2124
    case VIR_DOMAIN_DISK_BUS_VIRTIO:
2125
        if (qemuBuildVirtioDevStr(&opt, "virtio-blk", qemuCaps,
2126
                                  VIR_DOMAIN_DEVICE_DISK, disk) < 0) {
2127
            goto error;
2128
        }
2129

2130
        if (disk->iothread)
2131 2132
            virBufferAsprintf(&opt, ",iothread=iothread%u", disk->iothread);

2133
        qemuBuildIoEventFdStr(&opt, disk->ioeventfd, qemuCaps);
2134
        if (disk->event_idx &&
2135
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_BLK_EVENT_IDX)) {
2136
            virBufferAsprintf(&opt, ",event_idx=%s",
J
Ján Tomko 已提交
2137
                              virTristateSwitchTypeToString(disk->event_idx));
2138
        }
2139
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_BLK_SCSI)) {
2140 2141 2142 2143 2144 2145 2146
            /* if sg_io is true but the scsi option isn't supported,
             * that means it's just always on in this version of qemu.
             */
            virBufferAsprintf(&opt, ",scsi=%s",
                              (disk->device == VIR_DOMAIN_DISK_DEVICE_LUN)
                              ? "on" : "off");
        }
2147

L
Lin Ma 已提交
2148 2149 2150 2151 2152 2153 2154 2155 2156 2157 2158
        if (disk->queues) {
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_BLK_NUM_QUEUES)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("num-queues property isn't supported by this "
                                 "QEMU binary"));
                goto error;
            }

            virBufferAsprintf(&opt, ",num-queues=%u", disk->queues);
        }

2159 2160 2161
        if (qemuBuildVirtioOptionsStr(&opt, disk->virtio, qemuCaps) < 0)
            goto error;

2162
        if (qemuBuildDeviceAddressStr(&opt, def, &disk->info, qemuCaps) < 0)
A
Alex Jia 已提交
2163
            goto error;
2164
        break;
2165

2166
    case VIR_DOMAIN_DISK_BUS_USB:
2167 2168 2169 2170 2171 2172
        if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE &&
            disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_USB) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("unexpected address type for usb disk"));
            goto error;
        }
2173 2174 2175 2176 2177 2178 2179
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_USB_STORAGE)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("This QEMU doesn't support '-device "
                             "usb-storage'"));
            goto error;

        }
2180
        virBufferAddLit(&opt, "usb-storage");
2181

2182
        if (qemuBuildDeviceAddressStr(&opt, def, &disk->info, qemuCaps) < 0)
2183
            goto error;
2184
        break;
2185

2186 2187 2188 2189
    case VIR_DOMAIN_DISK_BUS_FDC:
        virBufferAsprintf(&opt, "floppy,unit=%d", disk->info.addr.drive.unit);
        break;

2190 2191 2192 2193
    case VIR_DOMAIN_DISK_BUS_XEN:
    case VIR_DOMAIN_DISK_BUS_UML:
    case VIR_DOMAIN_DISK_BUS_SD:
    case VIR_DOMAIN_DISK_BUS_LAST:
2194
    default:
2195 2196
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("unsupported disk bus '%s' with device setup"), bus);
2197 2198
        goto error;
    }
2199

2200 2201 2202 2203
    if (disk->src->shared &&
        virQEMUCapsGet(qemuCaps, QEMU_CAPS_DISK_SHARE_RW))
        virBufferAddLit(&opt, ",share-rw=on");

2204
    if (qemuDomainDiskGetBackendAlias(disk, qemuCaps, &backendAlias) < 0)
2205
        goto error;
2206 2207 2208 2209 2210

    if (backendAlias)
        virBufferAsprintf(&opt, ",drive=%s", backendAlias);

    virBufferAsprintf(&opt, ",id=%s", disk->info.alias);
2211
    if (bootindex)
2212
        virBufferAsprintf(&opt, ",bootindex=%u", bootindex);
2213
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_BLOCKIO)) {
V
Viktor Mihajlovski 已提交
2214
        if (disk->blockio.logical_block_size > 0)
2215
            virBufferAsprintf(&opt, ",logical_block_size=%u",
V
Viktor Mihajlovski 已提交
2216 2217
                              disk->blockio.logical_block_size);
        if (disk->blockio.physical_block_size > 0)
2218
            virBufferAsprintf(&opt, ",physical_block_size=%u",
V
Viktor Mihajlovski 已提交
2219
                              disk->blockio.physical_block_size);
2220
    }
2221

2222 2223 2224 2225 2226 2227
    if (disk->wwn) {
        if (STRPREFIX(disk->wwn, "0x"))
            virBufferAsprintf(&opt, ",wwn=%s", disk->wwn);
        else
            virBufferAsprintf(&opt, ",wwn=0x%s", disk->wwn);
    }
2228

2229 2230 2231 2232
    if (disk->vendor) {
        virBufferAddLit(&opt, ",vendor=");
        virQEMUBuildBufferEscapeComma(&opt, disk->vendor);
    }
2233

2234 2235 2236 2237
    if (disk->product) {
        virBufferAddLit(&opt, ",product=");
        virQEMUBuildBufferEscapeComma(&opt, disk->product);
    }
2238

2239 2240
    if (disk->bus == VIR_DOMAIN_DISK_BUS_USB) {
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_USB_STORAGE_REMOVABLE)) {
J
Ján Tomko 已提交
2241
            if (disk->removable == VIR_TRISTATE_SWITCH_ON)
2242 2243 2244 2245
                virBufferAddLit(&opt, ",removable=on");
            else
                virBufferAddLit(&opt, ",removable=off");
        } else {
J
Ján Tomko 已提交
2246
            if (disk->removable != VIR_TRISTATE_SWITCH_ABSENT) {
2247 2248 2249 2250 2251 2252 2253 2254
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("This QEMU doesn't support setting the "
                                 "removable flag of USB storage devices"));
                goto error;
            }
        }
    }

2255 2256 2257
    if (qemuBuildDriveDevCacheStr(disk, &opt, qemuCaps) < 0)
        goto error;

2258 2259
    qemuBuildDiskFrontendAttributes(disk, &opt);

2260 2261 2262
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_USB_STORAGE_WERROR))
        qemuBuildDiskFrontendAttributeErrorPolicy(disk, &opt);

2263 2264
    return virBufferContentAndReset(&opt);

2265
 error:
2266 2267 2268
    return NULL;
}

2269 2270 2271
char *
qemuBuildZPCIDevStr(virDomainDeviceInfoPtr dev)
{
2272
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
2273 2274 2275 2276 2277 2278 2279 2280 2281 2282 2283 2284 2285 2286 2287

    virBufferAsprintf(&buf,
                      "zpci,uid=%u,fid=%u,target=%s,id=zpci%u",
                      dev->addr.pci.zpci.uid,
                      dev->addr.pci.zpci.fid,
                      dev->alias,
                      dev->addr.pci.zpci.uid);

    return virBufferContentAndReset(&buf);
}

static int
qemuCommandAddZPCIDevice(virCommandPtr cmd,
                         virDomainDeviceInfoPtr dev)
{
2288
    g_autofree char *devstr = NULL;
2289 2290 2291 2292 2293 2294 2295 2296 2297 2298 2299 2300 2301 2302 2303 2304 2305 2306 2307 2308 2309 2310 2311 2312 2313

    virCommandAddArg(cmd, "-device");

    if (!(devstr = qemuBuildZPCIDevStr(dev)))
        return -1;

    virCommandAddArg(cmd, devstr);

    return 0;
}

static int
qemuCommandAddExtDevice(virCommandPtr cmd,
                        virDomainDeviceInfoPtr dev)
{
    if (dev->type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI ||
        dev->addr.pci.extFlags == VIR_PCI_ADDRESS_EXTENSION_NONE) {
        return 0;
    }

    if (dev->addr.pci.extFlags & VIR_PCI_ADDRESS_EXTENSION_ZPCI)
        return qemuCommandAddZPCIDevice(cmd, dev);

    return 0;
}
2314

2315
static int
2316 2317 2318 2319
qemuBuildFloppyCommandLineControllerOptions(virCommandPtr cmd,
                                            const virDomainDef *def,
                                            virQEMUCapsPtr qemuCaps,
                                            unsigned int bootFloppy)
2320
{
2321
    g_auto(virBuffer) fdc_opts = VIR_BUFFER_INITIALIZER;
2322 2323 2324
    bool explicitfdc = qemuDomainNeedsFDC(def);
    bool hasfloppy = false;
    unsigned int bootindex;
2325
    char driveLetter;
2326
    size_t i;
2327

2328
    virBufferAddLit(&fdc_opts, "isa-fdc,");
2329

2330
    for (i = 0; i < def->ndisks; i++) {
2331 2332 2333
        g_autofree char *backendAlias = NULL;
        g_autofree char *backendStr = NULL;
        g_autofree char *bootindexStr = NULL;
2334
        virDomainDiskDefPtr disk = def->disks[i];
2335

2336 2337
        if (disk->bus != VIR_DOMAIN_DISK_BUS_FDC)
            continue;
2338

2339
        hasfloppy = true;
2340

2341 2342 2343 2344 2345
        if (disk->info.bootIndex) {
            bootindex = disk->info.bootIndex;
        } else {
            bootindex = bootFloppy;
            bootFloppy = 0;
2346 2347
        }

2348 2349 2350 2351 2352
        if (disk->info.addr.drive.unit)
            driveLetter = 'B';
        else
            driveLetter = 'A';

2353 2354
        if (bootindex)
            bootindexStr = g_strdup_printf("bootindex%c=%u", driveLetter, bootindex);
2355

2356 2357 2358
        /* with -blockdev we setup the floppy device and it's backend with -device */
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_BLOCKDEV)) {
            if (qemuDomainDiskGetBackendAlias(disk, qemuCaps, &backendAlias) < 0)
2359
                return -1;
2360

2361 2362
            if (backendAlias)
                backendStr = g_strdup_printf("drive%c=%s", driveLetter, backendAlias);
2363 2364
        }

2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376 2377
        if (!explicitfdc) {
            if (backendStr) {
                virCommandAddArg(cmd, "-global");
                virCommandAddArgFormat(cmd, "isa-fdc.%s", backendStr);
            }

            if (bootindexStr) {
                virCommandAddArg(cmd, "-global");
                virCommandAddArgFormat(cmd, "isa-fdc.%s", bootindexStr);
            }
        } else {
            virBufferStrcat(&fdc_opts, backendStr, ",", NULL);
            virBufferStrcat(&fdc_opts, bootindexStr, ",", NULL);
2378
        }
2379 2380 2381
    }

    if (explicitfdc && hasfloppy) {
2382 2383
        /* Newer Q35 machine types require an explicit FDC controller */
        virBufferTrim(&fdc_opts, ",", -1);
2384
        virCommandAddArg(cmd, "-device");
2385
        virCommandAddArgBuffer(cmd, &fdc_opts);
2386 2387
    }

2388
    return 0;
2389 2390 2391
}


2392
static int
2393 2394
qemuBuildObjectCommandline(virCommandPtr cmd,
                           virJSONValuePtr objProps)
2395
{
2396
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
2397

2398
    if (!objProps)
2399 2400
        return 0;

2401
    if (virQEMUBuildObjectCommandlineFromJSON(&buf, objProps) < 0)
2402 2403 2404 2405 2406
        return -1;

    virCommandAddArg(cmd, "-object");
    virCommandAddArgBuffer(cmd, &buf);

2407 2408 2409 2410 2411 2412 2413 2414
    return 0;
}


static int
qemuBuildBlockStorageSourceAttachDataCommandline(virCommandPtr cmd,
                                                 qemuBlockStorageSourceAttachDataPtr data)
{
2415 2416
    char *tmp;

2417 2418 2419 2420 2421 2422 2423 2424 2425
    if (qemuBuildObjectCommandline(cmd, data->prmgrProps) < 0 ||
        qemuBuildObjectCommandline(cmd, data->authsecretProps) < 0 ||
        qemuBuildObjectCommandline(cmd, data->encryptsecretProps) < 0 ||
        qemuBuildObjectCommandline(cmd, data->tlsProps) < 0)
        return -1;

    if (data->driveCmd)
        virCommandAddArgList(cmd, "-drive", data->driveCmd, NULL);

2426 2427 2428 2429 2430 2431 2432 2433 2434 2435 2436 2437 2438 2439 2440 2441
    if (data->storageProps) {
        if (!(tmp = virJSONValueToString(data->storageProps, false)))
            return -1;

        virCommandAddArgList(cmd, "-blockdev", tmp, NULL);
        VIR_FREE(tmp);
    }

    if (data->formatProps) {
        if (!(tmp = virJSONValueToString(data->formatProps, false)))
            return -1;

        virCommandAddArgList(cmd, "-blockdev", tmp, NULL);
        VIR_FREE(tmp);
    }

2442
    return 0;
2443 2444 2445
}


2446
static int
2447 2448
qemuBuildDiskSourceCommandLine(virCommandPtr cmd,
                               virDomainDiskDefPtr disk,
2449
                               virQEMUCapsPtr qemuCaps)
2450
{
J
Ján Tomko 已提交
2451 2452
    g_autoptr(qemuBlockStorageSourceChainData) data = NULL;
    g_autoptr(virJSONValue) copyOnReadProps = NULL;
2453
    g_autofree char *copyOnReadPropsStr = NULL;
2454
    size_t i;
2455

2456
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_BLOCKDEV)) {
2457 2458
        if (virStorageSourceIsEmpty(disk->src))
            return 0;
2459

2460 2461
        if (!(data = qemuBuildStorageSourceChainAttachPrepareBlockdev(disk->src,
                                                                      qemuCaps)))
2462
            return -1;
2463 2464 2465

        if (disk->copy_on_read == VIR_TRISTATE_SWITCH_ON &&
            !(copyOnReadProps = qemuBlockStorageGetCopyOnReadProps(disk)))
2466
            return -1;
2467
    } else {
2468
        if (!(data = qemuBuildStorageSourceChainAttachPrepareDrive(disk, qemuCaps)))
2469
            return -1;
2470 2471
    }

2472
    for (i = data->nsrcdata; i > 0; i--) {
2473
        if (qemuBuildBlockStorageSourceAttachDataCommandline(cmd,
2474
                                                             data->srcdata[i - 1]) < 0)
2475
            return -1;
2476 2477 2478
    }

    if (copyOnReadProps) {
2479
        if (!(copyOnReadPropsStr = virJSONValueToString(copyOnReadProps, false)))
2480
            return -1;
2481

2482
        virCommandAddArgList(cmd, "-blockdev", copyOnReadPropsStr, NULL);
2483
    }
2484

2485
    return 0;
2486 2487 2488 2489 2490 2491 2492 2493
}


static int
qemuBuildDiskCommandLine(virCommandPtr cmd,
                         const virDomainDef *def,
                         virDomainDiskDefPtr disk,
                         virQEMUCapsPtr qemuCaps,
2494
                         unsigned int bootindex)
2495
{
2496
    g_autofree char *optstr = NULL;
2497

2498
    if (qemuBuildDiskSourceCommandLine(cmd, disk, qemuCaps) < 0)
2499
        return -1;
2500

2501
    if (!qemuDiskBusNeedsDriveArg(disk->bus)) {
2502 2503
        if (disk->bus != VIR_DOMAIN_DISK_BUS_FDC ||
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_BLOCKDEV)) {
2504 2505 2506
            if (qemuCommandAddExtDevice(cmd, &disk->info) < 0)
                return -1;

2507 2508
            virCommandAddArg(cmd, "-device");

2509 2510
            if (!(optstr = qemuBuildDiskDeviceStr(def, disk, bootindex,
                                                  qemuCaps)))
2511 2512 2513 2514 2515 2516 2517 2518 2519
                return -1;
            virCommandAddArg(cmd, optstr);
        }
    }

    return 0;
}


2520
static int
2521 2522 2523
qemuBuildDisksCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
2524 2525
{
    size_t i;
2526 2527 2528
    unsigned int bootCD = 0;
    unsigned int bootFloppy = 0;
    unsigned int bootDisk = 0;
2529
    bool blockdev = virQEMUCapsGet(qemuCaps, QEMU_CAPS_BLOCKDEV);
2530

2531 2532 2533 2534 2535 2536 2537 2538 2539 2540 2541
    for (i = 0; i < def->os.nBootDevs; i++) {
        switch (def->os.bootDevs[i]) {
        case VIR_DOMAIN_BOOT_CDROM:
            bootCD = i + 1;
            break;
        case VIR_DOMAIN_BOOT_FLOPPY:
            bootFloppy = i + 1;
            break;
        case VIR_DOMAIN_BOOT_DISK:
            bootDisk = i + 1;
            break;
2542 2543 2544
        }
    }

2545 2546 2547 2548 2549 2550
    /* If we want to express the floppy drives via -device, the controller needs
     * to be instantiated prior to that */
    if (blockdev &&
        qemuBuildFloppyCommandLineControllerOptions(cmd, def, qemuCaps, bootFloppy) < 0)
        return -1;

2551
    for (i = 0; i < def->ndisks; i++) {
2552
        virDomainDiskDefPtr disk = def->disks[i];
2553
        unsigned int bootindex = 0;
2554

2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568
        if (disk->info.bootIndex) {
            bootindex = disk->info.bootIndex;
        } else {
            switch (disk->device) {
            case VIR_DOMAIN_DISK_DEVICE_CDROM:
                bootindex = bootCD;
                bootCD = 0;
                break;
            case VIR_DOMAIN_DISK_DEVICE_DISK:
            case VIR_DOMAIN_DISK_DEVICE_LUN:
                bootindex = bootDisk;
                bootDisk = 0;
                break;
            }
2569 2570
        }

2571 2572 2573 2574 2575 2576
        /* The floppy device itself does not support the bootindex property
         * so we need to set it up for the controller */
        if (disk->device == VIR_DOMAIN_DISK_DEVICE_FLOPPY)
            bootindex = 0;

        if (qemuBuildDiskCommandLine(cmd, def, disk, qemuCaps, bootindex) < 0)
2577
            return -1;
2578
    }
2579

2580 2581
    if (!blockdev &&
        qemuBuildFloppyCommandLineControllerOptions(cmd, def, qemuCaps, bootFloppy) < 0)
2582 2583
        return -1;

2584 2585 2586 2587
    return 0;
}


2588
static char *
2589
qemuBuildFSStr(virDomainFSDefPtr fs)
2590
{
2591
    g_auto(virBuffer) opt = VIR_BUFFER_INITIALIZER;
2592
    const char *wrpolicy = virDomainFSWrpolicyTypeToString(fs->wrpolicy);
2593

2594 2595
    if (fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_PATH ||
        fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_DEFAULT) {
2596
        virBufferAddLit(&opt, "local");
2597 2598
        if (fs->accessmode == VIR_DOMAIN_FS_ACCESSMODE_MAPPED) {
            virBufferAddLit(&opt, ",security_model=mapped");
2599
        } else if (fs->accessmode == VIR_DOMAIN_FS_ACCESSMODE_PASSTHROUGH) {
2600
            virBufferAddLit(&opt, ",security_model=passthrough");
2601
        } else if (fs->accessmode == VIR_DOMAIN_FS_ACCESSMODE_SQUASH) {
2602 2603
            virBufferAddLit(&opt, ",security_model=none");
        }
2604 2605 2606
    } else if (fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_HANDLE) {
        /* removed since qemu 4.0.0 see v3.1.0-29-g93aee84f57 */
        virBufferAddLit(&opt, "handle");
2607
    }
2608

2609 2610
    if (fs->wrpolicy)
        virBufferAsprintf(&opt, ",writeout=%s", wrpolicy);
2611

2612
    virBufferAsprintf(&opt, ",id=%s%s", QEMU_FSDEV_HOST_PREFIX, fs->info.alias);
2613 2614
    virBufferAddLit(&opt, ",path=");
    virQEMUBuildBufferEscapeComma(&opt, fs->src->path);
2615

2616 2617
    if (fs->readonly)
        virBufferAddLit(&opt, ",readonly");
2618

2619 2620 2621 2622
    return virBufferContentAndReset(&opt);
}


2623 2624
static char *
qemuBuildFSDevStr(const virDomainDef *def,
2625
                  virDomainFSDefPtr fs,
2626
                  virQEMUCapsPtr qemuCaps)
2627
{
2628
    g_auto(virBuffer) opt = VIR_BUFFER_INITIALIZER;
2629

2630
    if (qemuBuildVirtioDevStr(&opt, "virtio-9p", qemuCaps,
2631 2632
                              VIR_DOMAIN_DEVICE_FS, fs) < 0)
        return NULL;
2633

2634
    virBufferAsprintf(&opt, ",id=%s", fs->info.alias);
2635 2636
    virBufferAsprintf(&opt, ",fsdev=%s%s",
                      QEMU_FSDEV_HOST_PREFIX, fs->info.alias);
2637 2638
    virBufferAddLit(&opt, ",mount_tag=");
    virQEMUBuildBufferEscapeComma(&opt, fs->dst);
A
Alex Jia 已提交
2639

2640
    if (qemuBuildVirtioOptionsStr(&opt, fs->virtio, qemuCaps) < 0)
2641
        return NULL;
2642

2643
    if (qemuBuildDeviceAddressStr(&opt, def, &fs->info, qemuCaps) < 0)
2644
        return NULL;
2645 2646 2647 2648 2649

    return virBufferContentAndReset(&opt);
}


2650 2651 2652 2653 2654 2655
static int
qemuBuildFSDevCommandLine(virCommandPtr cmd,
                          virDomainFSDefPtr fs,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
2656 2657
    g_autofree char *fsdevstr = NULL;
    g_autofree char *devicestr = NULL;
2658 2659

    virCommandAddArg(cmd, "-fsdev");
2660
    if (!(fsdevstr = qemuBuildFSStr(fs)))
2661
        return -1;
2662
    virCommandAddArg(cmd, fsdevstr);
2663 2664 2665 2666 2667

    if (qemuCommandAddExtDevice(cmd, &fs->info) < 0)
        return -1;

    virCommandAddArg(cmd, "-device");
2668
    if (!(devicestr = qemuBuildFSDevStr(def, fs, qemuCaps)))
2669
        return -1;
2670
    virCommandAddArg(cmd, devicestr);
2671 2672 2673 2674 2675

    return 0;
}


2676
static int
2677 2678 2679
qemuBuildFilesystemCommandLine(virCommandPtr cmd,
                               const virDomainDef *def,
                               virQEMUCapsPtr qemuCaps)
2680 2681 2682 2683
{
    size_t i;

    for (i = 0; i < def->nfss; i++) {
2684
        if (qemuBuildFSDevCommandLine(cmd, def->fss[i], def, qemuCaps) < 0)
2685 2686 2687 2688 2689 2690 2691
            return -1;
    }

    return 0;
}


2692 2693 2694 2695 2696 2697 2698 2699 2700 2701 2702 2703 2704 2705 2706 2707 2708 2709 2710
static int
qemuControllerModelUSBToCaps(int model)
{
    switch (model) {
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_PIIX3_UHCI:
        return QEMU_CAPS_PIIX3_USB_UHCI;
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_PIIX4_UHCI:
        return QEMU_CAPS_PIIX4_USB_UHCI;
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_EHCI:
        return QEMU_CAPS_USB_EHCI;
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_ICH9_EHCI1:
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_ICH9_UHCI1:
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_ICH9_UHCI2:
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_ICH9_UHCI3:
        return QEMU_CAPS_ICH9_USB_EHCI1;
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_VT82C686B_UHCI:
        return QEMU_CAPS_VT82C686B_USB_UHCI;
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_PCI_OHCI:
        return QEMU_CAPS_PCI_OHCI;
G
Gerd Hoffmann 已提交
2711 2712
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_NEC_XHCI:
        return QEMU_CAPS_NEC_USB_XHCI;
2713 2714
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_QEMU_XHCI:
        return QEMU_CAPS_DEVICE_QEMU_XHCI;
2715 2716 2717 2718 2719 2720
    default:
        return -1;
    }
}


2721 2722 2723 2724 2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741 2742 2743 2744 2745
static const char *
qemuBuildUSBControllerFindMasterAlias(const virDomainDef *domainDef,
                                      const virDomainControllerDef *def)
{
    size_t i;

    for (i = 0; i < domainDef->ncontrollers; i++) {
        const virDomainControllerDef *tmp = domainDef->controllers[i];

        if (tmp->type != VIR_DOMAIN_CONTROLLER_TYPE_USB)
            continue;

        if (tmp->idx != def->idx)
            continue;

        if (tmp->info.mastertype == VIR_DOMAIN_CONTROLLER_MASTER_USB)
            continue;

        return tmp->info.alias;
    }

    return NULL;
}


2746
static int
2747 2748
qemuBuildUSBControllerDevStr(const virDomainDef *domainDef,
                             virDomainControllerDefPtr def,
2749
                             virQEMUCapsPtr qemuCaps,
2750 2751 2752
                             virBuffer *buf)
{
    const char *smodel;
2753
    int model, flags;
2754 2755

    model = def->model;
2756

2757
    if (model == VIR_DOMAIN_CONTROLLER_MODEL_USB_DEFAULT) {
2758 2759 2760
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       "%s", _("no model provided for USB controller"));
        return -1;
2761
    }
2762 2763

    smodel = qemuControllerModelUSBTypeToString(model);
2764
    flags = qemuControllerModelUSBToCaps(model);
2765

2766
    if (flags == -1 || !virQEMUCapsGet(qemuCaps, flags)) {
2767 2768
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("%s not supported in this QEMU binary"), smodel);
2769 2770 2771
        return -1;
    }

2772 2773
    virBufferAsprintf(buf, "%s", smodel);

2774
    if (def->opts.usbopts.ports != -1) {
2775 2776 2777
        if ((model != VIR_DOMAIN_CONTROLLER_MODEL_USB_NEC_XHCI ||
             !virQEMUCapsGet(qemuCaps, QEMU_CAPS_NEC_USB_XHCI_PORTS)) &&
            model != VIR_DOMAIN_CONTROLLER_MODEL_USB_QEMU_XHCI) {
2778 2779 2780 2781 2782 2783 2784 2785 2786 2787
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("usb controller type %s doesn't support 'ports' "
                             "with this QEMU binary"), smodel);
            return -1;
        }

        virBufferAsprintf(buf, ",p2=%d,p3=%d",
                          def->opts.usbopts.ports, def->opts.usbopts.ports);
    }

2788 2789 2790 2791 2792 2793 2794 2795
    if (def->info.mastertype == VIR_DOMAIN_CONTROLLER_MASTER_USB) {
        const char *masterbus;

        if (!(masterbus = qemuBuildUSBControllerFindMasterAlias(domainDef, def))) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("masterbus not found"));
            return -1;
        }
2796
        virBufferAsprintf(buf, ",masterbus=%s.0,firstport=%d",
2797 2798
                          masterbus, def->info.master.usb.startport);
    } else {
2799
        virBufferAsprintf(buf, ",id=%s", def->info.alias);
2800
    }
2801

2802 2803 2804
    return 0;
}

2805

2806 2807 2808 2809 2810 2811 2812 2813 2814 2815 2816 2817 2818 2819 2820 2821 2822 2823 2824 2825 2826
/**
 * qemuBuildControllerDevStr:
 * @domainDef: domain definition
 * @def: controller definition
 * @qemuCaps: QEMU binary capabilities
 * @devstr: device string
 * @nusbcontroller: number of USB controllers
 *
 * Turn @def into a description of the controller that QEMU will understand,
 * to be used either on the command line or through the monitor.
 *
 * The description will be returned in @devstr and can be NULL, eg. when
 * passing in one of the built-in controllers. The returned string must be
 * freed by the caller.
 *
 * The number pointed to by @nusbcontroller will be increased by one every
 * time the description for a USB controller has been generated successfully.
 *
 * Returns: 0 on success, <0 on failure
 */
int
2827
qemuBuildControllerDevStr(const virDomainDef *domainDef,
2828
                          virDomainControllerDefPtr def,
2829
                          virQEMUCapsPtr qemuCaps,
2830
                          char **devstr)
2831
{
2832
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
2833

2834 2835
    *devstr = NULL;

2836
    switch ((virDomainControllerType)def->type) {
2837
    case VIR_DOMAIN_CONTROLLER_TYPE_SCSI:
2838
        switch ((virDomainControllerModelSCSI) def->model) {
2839
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_VIRTIO_SCSI:
2840 2841
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_VIRTIO_TRANSITIONAL:
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_VIRTIO_NON_TRANSITIONAL:
2842
            if (qemuBuildVirtioDevStr(&buf, "virtio-scsi", qemuCaps,
2843
                                      VIR_DOMAIN_DEVICE_CONTROLLER, def) < 0) {
2844
                return -1;
2845
            }
2846 2847 2848 2849 2850 2851

            if (def->iothread) {
                virBufferAsprintf(&buf, ",iothread=iothread%u",
                                  def->iothread);
            }

2852
            if (qemuBuildVirtioOptionsStr(&buf, def->virtio, qemuCaps) < 0)
2853
                return -1;
2854
            break;
2855
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LSILOGIC:
2856
            virBufferAddLit(&buf, "lsi");
2857 2858 2859 2860
            break;
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_IBMVSCSI:
            virBufferAddLit(&buf, "spapr-vscsi");
            break;
2861 2862 2863
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LSISAS1068:
            virBufferAddLit(&buf, "mptsas1068");
            break;
2864 2865 2866
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LSISAS1078:
            virBufferAddLit(&buf, "megasas");
            break;
2867 2868 2869
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_AUTO:
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_BUSLOGIC:
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_VMPVSCSI:
2870 2871 2872
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unsupported controller model: %s"),
                           virDomainControllerModelSCSITypeToString(def->model));
2873
            return -1;
2874 2875 2876 2877 2878
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_DEFAULT:
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LAST:
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unexpected SCSI controller model %d"),
                           def->model);
2879
            return -1;
2880
        }
2881
        virBufferAsprintf(&buf, ",id=%s", def->info.alias);
2882 2883 2884
        break;

    case VIR_DOMAIN_CONTROLLER_TYPE_VIRTIO_SERIAL:
2885
        if (qemuBuildVirtioDevStr(&buf, "virtio-serial", qemuCaps,
2886
                                  VIR_DOMAIN_DEVICE_CONTROLLER, def) < 0) {
2887
            return -1;
2888
        }
2889

2890
        virBufferAsprintf(&buf, ",id=%s", def->info.alias);
2891
        if (def->opts.vioserial.ports != -1) {
2892
            virBufferAsprintf(&buf, ",max_ports=%d",
2893 2894 2895
                              def->opts.vioserial.ports);
        }
        if (def->opts.vioserial.vectors != -1) {
2896
            virBufferAsprintf(&buf, ",vectors=%d",
2897 2898
                              def->opts.vioserial.vectors);
        }
2899
        if (qemuBuildVirtioOptionsStr(&buf, def->virtio, qemuCaps) < 0)
2900
            return -1;
2901 2902
        break;

E
Eric Blake 已提交
2903
    case VIR_DOMAIN_CONTROLLER_TYPE_CCID:
2904
        virBufferAsprintf(&buf, "usb-ccid,id=%s", def->info.alias);
E
Eric Blake 已提交
2905 2906
        break;

J
Jim Fehlig 已提交
2907
    case VIR_DOMAIN_CONTROLLER_TYPE_SATA:
2908
        virBufferAsprintf(&buf, "ahci,id=%s", def->info.alias);
J
Jim Fehlig 已提交
2909 2910
        break;

2911
    case VIR_DOMAIN_CONTROLLER_TYPE_USB:
2912
        if (qemuBuildUSBControllerDevStr(domainDef, def, qemuCaps, &buf) == -1)
2913
            return -1;
2914 2915 2916

        break;

2917 2918 2919
    case VIR_DOMAIN_CONTROLLER_TYPE_PCI: {
        const virDomainPCIControllerOpts *pciopts = &def->opts.pciopts;
        const char *modelName = virDomainControllerPCIModelNameTypeToString(pciopts->modelName);
2920

2921 2922 2923 2924
        /* Skip the implicit PHB for pSeries guests */
        if (def->model == VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT &&
            pciopts->modelName == VIR_DOMAIN_CONTROLLER_PCI_MODEL_NAME_SPAPR_PCI_HOST_BRIDGE &&
            pciopts->targetIndex == 0) {
2925
            return 0;
2926 2927
        }

2928 2929 2930 2931 2932 2933 2934
        if (!modelName) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unknown virDomainControllerPCIModelName value: %d"),
                           pciopts->modelName);
            return -1;
        }

2935
        switch ((virDomainControllerModelPCI) def->model) {
2936
        case VIR_DOMAIN_CONTROLLER_MODEL_PCI_BRIDGE:
2937
            virBufferAsprintf(&buf, "%s,chassis_nr=%d,id=%s",
2938
                              modelName, pciopts->chassisNr,
2939
                              def->info.alias);
2940
            break;
2941
        case VIR_DOMAIN_CONTROLLER_MODEL_PCI_EXPANDER_BUS:
2942
        case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_EXPANDER_BUS:
2943
            virBufferAsprintf(&buf, "%s,bus_nr=%d,id=%s",
2944
                              modelName, pciopts->busNr,
2945
                              def->info.alias);
2946 2947 2948 2949
            if (pciopts->numaNode != -1) {
                virBufferAsprintf(&buf, ",numa_node=%d",
                                  pciopts->numaNode);
            }
2950
            break;
2951
        case VIR_DOMAIN_CONTROLLER_MODEL_DMI_TO_PCI_BRIDGE:
2952
        case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_SWITCH_UPSTREAM_PORT:
2953
        case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_TO_PCI_BRIDGE:
2954 2955
            virBufferAsprintf(&buf, "%s,id=%s", modelName, def->info.alias);
            break;
2956
        case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT_PORT:
2957 2958
        case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_SWITCH_DOWNSTREAM_PORT:
            virBufferAsprintf(&buf, "%s,port=0x%x,chassis=%d,id=%s",
2959 2960
                              modelName, pciopts->port,
                              pciopts->chassis, def->info.alias);
2961
            break;
2962
        case VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT:
2963
            virBufferAsprintf(&buf, "%s,index=%d,id=%s",
2964
                              modelName, pciopts->targetIndex,
2965
                              def->info.alias);
2966

2967
            if (pciopts->numaNode != -1)
2968
                virBufferAsprintf(&buf, ",numa_node=%d", pciopts->numaNode);
2969
            break;
2970
        case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT:
2971 2972
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Unsupported PCI Express root controller"));
2973
            return -1;
2974
        case VIR_DOMAIN_CONTROLLER_MODEL_PCI_DEFAULT:
2975
        case VIR_DOMAIN_CONTROLLER_MODEL_PCI_LAST:
2976 2977 2978
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unexpected PCI controller model %d"),
                           def->model);
2979
            return -1;
2980
        }
2981
        break;
2982
    }
2983

2984
    case VIR_DOMAIN_CONTROLLER_TYPE_IDE:
2985
    case VIR_DOMAIN_CONTROLLER_TYPE_FDC:
2986
    case VIR_DOMAIN_CONTROLLER_TYPE_XENBUS:
2987
    case VIR_DOMAIN_CONTROLLER_TYPE_LAST:
2988
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
2989
                       _("Unsupported controller type: %s"),
2990
                       virDomainControllerTypeToString(def->type));
2991
        return -1;
2992 2993
    }

2994 2995
    if (def->queues)
        virBufferAsprintf(&buf, ",num_queues=%u", def->queues);
2996

2997 2998 2999 3000 3001 3002
    if (def->cmd_per_lun)
        virBufferAsprintf(&buf, ",cmd_per_lun=%u", def->cmd_per_lun);

    if (def->max_sectors)
        virBufferAsprintf(&buf, ",max_sectors=%u", def->max_sectors);

3003 3004
    qemuBuildIoEventFdStr(&buf, def->ioeventfd, qemuCaps);

3005
    if (qemuBuildDeviceAddressStr(&buf, domainDef, &def->info, qemuCaps) < 0)
3006
        return -1;
3007

3008 3009
    *devstr = virBufferContentAndReset(&buf);
    return 0;
3010 3011 3012
}


3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024
static bool
qemuBuildDomainForbidLegacyUSBController(const virDomainDef *def)
{
    if (qemuDomainIsQ35(def) ||
        qemuDomainIsARMVirt(def) ||
        qemuDomainIsRISCVVirt(def))
        return true;

    return false;
}


3025 3026
static int
qemuBuildLegacyUSBControllerCommandLine(virCommandPtr cmd,
3027
                                        const virDomainDef *def)
3028
{
3029
    size_t i;
3030
    size_t nlegacy = 0;
3031
    size_t nusb = 0;
3032 3033 3034 3035 3036 3037 3038 3039 3040 3041

    for (i = 0; i < def->ncontrollers; i++) {
        virDomainControllerDefPtr cont = def->controllers[i];

        if (cont->type != VIR_DOMAIN_CONTROLLER_TYPE_USB)
            continue;

        /* If we have mode='none', there are no other USB controllers */
        if (cont->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_NONE)
            return 0;
3042 3043 3044

        if (cont->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_DEFAULT)
            nlegacy++;
3045 3046
        else
            nusb++;
3047 3048 3049 3050 3051 3052 3053
    }

    if (nlegacy > 1) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Multiple legacy USB controllers are "
                         "not supported"));
        return -1;
3054 3055
    }

3056
    if (nusb == 0 &&
3057
        !qemuBuildDomainForbidLegacyUSBController(def) &&
3058 3059 3060 3061 3062 3063 3064 3065 3066 3067 3068
        !ARCH_IS_S390(def->os.arch)) {
        /* We haven't added any USB controller yet, but we haven't been asked
         * not to add one either. Add a legacy USB controller, unless we're
         * creating a kind of guest we want to keep legacy-free */
        virCommandAddArg(cmd, "-usb");
    }

    return 0;
}


3069 3070 3071 3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106
/**
 * qemuBuildSkipController:
 * @controller: Controller to check
 * @def: Domain definition
 *
 * Returns true if this controller can be skipped for command line
 * generation or device validation.
 */
static bool
qemuBuildSkipController(const virDomainControllerDef *controller,
                        const virDomainDef *def)
{
    /* skip pcie-root */
    if (controller->type == VIR_DOMAIN_CONTROLLER_TYPE_PCI &&
        controller->model == VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT)
        return true;

    /* Skip pci-root, except for pSeries guests (which actually
     * support more than one PCI Host Bridge per guest) */
    if (!qemuDomainIsPSeries(def) &&
        controller->type == VIR_DOMAIN_CONTROLLER_TYPE_PCI &&
        controller->model == VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT)
        return true;

    /* first SATA controller on Q35 machines is implicit */
    if (controller->type == VIR_DOMAIN_CONTROLLER_TYPE_SATA &&
        controller->idx == 0 && qemuDomainIsQ35(def))
        return true;

    /* first IDE controller is implicit on various machines */
    if (controller->type == VIR_DOMAIN_CONTROLLER_TYPE_IDE &&
        controller->idx == 0 && qemuDomainHasBuiltinIDE(def))
        return true;

    return false;
}


3107 3108 3109 3110 3111 3112 3113 3114 3115 3116
static int
qemuBuildControllersByTypeCommandLine(virCommandPtr cmd,
                                      const virDomainDef *def,
                                      virQEMUCapsPtr qemuCaps,
                                      virDomainControllerType type)
{
    size_t i;

    for (i = 0; i < def->ncontrollers; i++) {
        virDomainControllerDefPtr cont = def->controllers[i];
3117
        g_autofree char *devstr = NULL;
3118 3119 3120 3121 3122 3123 3124 3125 3126 3127 3128 3129 3130 3131 3132 3133 3134 3135 3136 3137 3138 3139 3140 3141 3142 3143 3144 3145 3146 3147 3148 3149 3150

        if (cont->type != type)
            continue;

        if (qemuBuildSkipController(cont, def))
            continue;

        /* skip USB controllers with type none.*/
        if (cont->type == VIR_DOMAIN_CONTROLLER_TYPE_USB &&
            cont->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_NONE) {
            continue;
        }

        if (cont->type == VIR_DOMAIN_CONTROLLER_TYPE_USB &&
            cont->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_DEFAULT &&
            !qemuBuildDomainForbidLegacyUSBController(def)) {

            /* An appropriate default USB controller model should already
             * have been selected in qemuDomainDeviceDefPostParse(); if
             * we still have no model by now, we have to fall back to the
             * legacy USB controller.
             *
             * Note that we *don't* want to end up with the legacy USB
             * controller for q35 and virt machines, so we go ahead and
             * fail in qemuBuildControllerDevStr(); on the other hand,
             * for s390 machines we want to ignore any USB controller
             * (see 548ba43028 for the full story), so we skip
             * qemuBuildControllerDevStr() but we don't ultimately end
             * up adding the legacy USB controller */
            continue;
        }

        if (qemuBuildControllerDevStr(def, cont, qemuCaps, &devstr) < 0)
3151
            return -1;
3152 3153

        if (devstr) {
3154
            if (qemuCommandAddExtDevice(cmd, &cont->info) < 0)
3155
                return -1;
3156 3157 3158 3159 3160 3161

            virCommandAddArg(cmd, "-device");
            virCommandAddArg(cmd, devstr);
        }
    }

3162
    return 0;
3163 3164 3165
}


3166
static int
3167 3168 3169
qemuBuildControllersCommandLine(virCommandPtr cmd,
                                const virDomainDef *def,
                                virQEMUCapsPtr qemuCaps)
3170
{
3171
    size_t i;
3172 3173 3174 3175 3176 3177 3178 3179 3180 3181 3182 3183 3184 3185 3186
    int contOrder[] = {
        /*
         * List of controller types that we add commandline args for,
         * *in the order we want to add them*.
         *
         * The floppy controller is implicit on PIIX4 and older Q35
         * machines. For newer Q35 machines it is added out of the
         * controllers loop, after the floppy drives.
         *
         * We don't add PCI/PCIe root controller either, because it's
         * implicit, but we do add PCI bridges and other PCI
         * controllers, so we leave that in to check each
         * one. Likewise, we don't do anything for the primary IDE
         * controller on an i440fx machine or primary SATA on q35, but
         * we do add those beyond these two exceptions.
3187 3188 3189
         *
         * CCID controllers are formatted separately after USB hubs,
         * because they go on the USB bus.
3190 3191 3192 3193 3194 3195 3196 3197 3198
         */
        VIR_DOMAIN_CONTROLLER_TYPE_PCI,
        VIR_DOMAIN_CONTROLLER_TYPE_USB,
        VIR_DOMAIN_CONTROLLER_TYPE_SCSI,
        VIR_DOMAIN_CONTROLLER_TYPE_IDE,
        VIR_DOMAIN_CONTROLLER_TYPE_SATA,
        VIR_DOMAIN_CONTROLLER_TYPE_VIRTIO_SERIAL,
    };

3199
    for (i = 0; i < G_N_ELEMENTS(contOrder); i++) {
3200
        if (qemuBuildControllersByTypeCommandLine(cmd, def, qemuCaps, contOrder[i]) < 0)
3201
            return -1;
3202 3203
    }

3204
    if (qemuBuildLegacyUSBControllerCommandLine(cmd, def) < 0)
3205
        return -1;
3206

3207
    return 0;
3208 3209 3210
}


M
Marc-André Lureau 已提交
3211 3212 3213 3214 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230
static int
qemuBuildMemoryBackendPropsShare(virJSONValuePtr props,
                                 virDomainMemoryAccess memAccess)
{
    switch (memAccess) {
    case VIR_DOMAIN_MEMORY_ACCESS_SHARED:
        return virJSONValueObjectAdd(props, "b:share", true, NULL);

    case VIR_DOMAIN_MEMORY_ACCESS_PRIVATE:
        return virJSONValueObjectAdd(props, "b:share", false, NULL);

    case VIR_DOMAIN_MEMORY_ACCESS_DEFAULT:
    case VIR_DOMAIN_MEMORY_ACCESS_LAST:
        break;
    }

    return 0;
}


3231
static int
3232 3233
qemuBuildMemoryGetDefaultPagesize(virQEMUDriverConfigPtr cfg,
                                  unsigned long long *pagesize)
3234 3235 3236 3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251
{
    virHugeTLBFSPtr p;

    if (!cfg->nhugetlbfs) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("hugetlbfs filesystem is not mounted "
                               "or disabled by administrator config"));
        return -1;
    }

    if (!(p = virFileGetDefaultHugepage(cfg->hugetlbfs, cfg->nhugetlbfs)))
        p = &cfg->hugetlbfs[0];

    *pagesize = p->size;
    return 0;
}


3252
/**
3253
 * qemuBuildMemoryBackendProps:
3254
 * @backendProps: [out] constructed object
3255
 * @alias: alias of the device
3256
 * @cfg: qemu driver config object
3257
 * @priv: pointer to domain private object
3258 3259 3260 3261 3262
 * @def: domain definition object
 * @mem: memory definition object
 * @force: forcibly use one of the backends
 *
 * Creates a configuration object that represents memory backend of given guest
3263
 * NUMA node (domain @def and @mem). Use @priv->autoNodeset to fine tune the
3264 3265 3266 3267 3268
 * placement of the memory on the host NUMA nodes.
 *
 * By default, if no memory-backend-* object is necessary to fulfil the guest
 * configuration value of 1 is returned. This behaviour can be suppressed by
 * setting @force to true in which case 0 would be returned.
3269
 *
3270 3271
 * Then, if one of the three memory-backend-* should be used, the @priv->qemuCaps
 * is consulted to check if qemu does support it.
3272
 *
3273 3274 3275
 * Returns: 0 on success,
 *          1 on success and if there's no need to use memory-backend-*
 *         -1 on error.
3276
 */
3277
int
3278
qemuBuildMemoryBackendProps(virJSONValuePtr *backendProps,
3279
                            const char *alias,
3280
                            virQEMUDriverConfigPtr cfg,
3281
                            qemuDomainObjPrivatePtr priv,
3282 3283 3284
                            virDomainDefPtr def,
                            virDomainMemoryDefPtr mem,
                            bool force)
3285
{
3286
    const char *backendType = "memory-backend-file";
3287
    virDomainNumatuneMemMode mode;
3288
    const long system_page_size = virGetSystemPageSizeKB();
3289
    virDomainMemoryAccess memAccess = mem->access;
3290
    size_t i;
3291
    g_autofree char *memPath = NULL;
M
Michal Privoznik 已提交
3292
    bool prealloc = false;
3293
    virBitmapPtr nodemask = NULL;
3294
    int rc;
J
Ján Tomko 已提交
3295
    g_autoptr(virJSONValue) props = NULL;
3296 3297
    bool nodeSpecified = virDomainNumatuneNodeSpecified(def->numa, mem->targetNode);
    unsigned long long pagesize = mem->pagesize;
3298
    bool needHugepage = !!pagesize;
3299
    bool useHugepage = !!pagesize;
3300
    int discard = mem->discard;
3301 3302 3303 3304 3305 3306

    /* The difference between @needHugepage and @useHugepage is that the latter
     * is true whenever huge page is defined for the current memory cell.
     * Either directly, or transitively via global domain huge pages. The
     * former is true whenever "memory-backend-file" must be used to satisfy
     * @useHugepage. */
3307

3308 3309
    *backendProps = NULL;

3310
    if (mem->targetNode >= 0) {
3311
        /* memory devices could provide a invalid guest node */
3312
        if (mem->targetNode >= virDomainNumaGetNodeCount(def->numa)) {
3313 3314 3315
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("can't add memory backend for guest node '%d' as "
                             "the guest has only '%zu' NUMA nodes configured"),
3316
                           mem->targetNode, virDomainNumaGetNodeCount(def->numa));
3317 3318
            return -1;
        }
3319

3320 3321 3322 3323 3324
        if (memAccess == VIR_DOMAIN_MEMORY_ACCESS_DEFAULT)
            memAccess = virDomainNumaGetNodeMemoryAccessMode(def->numa, mem->targetNode);

        if (discard == VIR_TRISTATE_BOOL_ABSENT)
            discard = virDomainNumaGetNodeDiscard(def->numa, mem->targetNode);
3325
    }
3326

3327 3328 3329
    if (memAccess == VIR_DOMAIN_MEMORY_ACCESS_DEFAULT)
        memAccess = def->mem.access;

3330 3331 3332
    if (discard == VIR_TRISTATE_BOOL_ABSENT)
        discard = def->mem.discard;

3333
    if (virDomainNumatuneGetMode(def->numa, mem->targetNode, &mode) < 0 &&
3334 3335
        virDomainNumatuneGetMode(def->numa, -1, &mode) < 0)
        mode = VIR_DOMAIN_NUMATUNE_MEM_STRICT;
3336

3337
    if (pagesize == 0) {
3338 3339
        virDomainHugePagePtr master_hugepage = NULL;
        virDomainHugePagePtr hugepage = NULL;
3340 3341
        bool thisHugepage = false;

3342 3343 3344 3345 3346 3347 3348 3349 3350
        /* Find the huge page size we want to use */
        for (i = 0; i < def->mem.nhugepages; i++) {
            hugepage = &def->mem.hugepages[i];

            if (!hugepage->nodemask) {
                master_hugepage = hugepage;
                continue;
            }

3351
            /* just find the master hugepage in case we don't use NUMA */
3352
            if (mem->targetNode < 0)
3353 3354
                continue;

3355
            if (virBitmapGetBit(hugepage->nodemask, mem->targetNode,
3356 3357 3358 3359 3360 3361 3362 3363 3364
                                &thisHugepage) < 0) {
                /* Ignore this error. It's not an error after all. Well,
                 * the nodemask for this <page/> can contain lower NUMA
                 * nodes than we are querying in here. */
                continue;
            }

            if (thisHugepage) {
                /* Hooray, we've found the page size */
3365
                needHugepage = true;
3366 3367 3368 3369 3370 3371 3372 3373 3374 3375 3376
                break;
            }
        }

        if (i == def->mem.nhugepages) {
            /* We have not found specific huge page to be used with this
             * NUMA node. Use the generic setting then (<page/> without any
             * @nodemask) if possible. */
            hugepage = master_hugepage;
        }

3377
        if (hugepage) {
3378
            pagesize = hugepage->size;
3379 3380
            useHugepage = true;
        }
3381
    }
3382

3383 3384 3385 3386 3387
    if (pagesize == system_page_size) {
        /* However, if user specified to use "huge" page
         * of regular system page size, it's as if they
         * hasn't specified any huge pages at all. */
        pagesize = 0;
3388 3389
        needHugepage = false;
        useHugepage = false;
3390
    } else if (useHugepage && pagesize == 0) {
3391
        if (qemuBuildMemoryGetDefaultPagesize(cfg, &pagesize) < 0)
3392
            return -1;
3393 3394
    }

3395 3396 3397
    if (!(props = virJSONValueNewObject()))
        return -1;

M
Marc-André Lureau 已提交
3398 3399 3400 3401 3402 3403
    if (def->mem.source == VIR_DOMAIN_MEMORY_SOURCE_MEMFD) {
        backendType = "memory-backend-memfd";

        if (useHugepage &&
            (virJSONValueObjectAdd(props, "b:hugetlb", useHugepage, NULL) < 0 ||
             virJSONValueObjectAdd(props, "U:hugetlbsize", pagesize << 10, NULL) < 0)) {
3404
            return -1;
M
Marc-André Lureau 已提交
3405 3406 3407
        }

        if (qemuBuildMemoryBackendPropsShare(props, memAccess) < 0)
3408
            return -1;
M
Marc-André Lureau 已提交
3409 3410

    } else if (useHugepage || mem->nvdimmPath || memAccess ||
M
Michal Privoznik 已提交
3411
        def->mem.source == VIR_DOMAIN_MEMORY_SOURCE_FILE) {
3412

3413
        if (mem->nvdimmPath) {
3414
            memPath = g_strdup(mem->nvdimmPath);
3415 3416
            if (!priv->memPrealloc)
                prealloc = true;
3417 3418
        } else if (useHugepage) {
            if (qemuGetDomainHupageMemPath(def, cfg, pagesize, &memPath) < 0)
3419
                return -1;
3420 3421
            if (!priv->memPrealloc)
                prealloc = true;
3422
        } else {
3423 3424
            /* We can have both pagesize and mem source. If that's the case,
             * prefer hugepages as those are more specific. */
3425
            if (qemuGetMemoryBackingPath(def, cfg, mem->info.alias, &memPath) < 0)
3426
                return -1;
3427
        }
3428

M
Michal Privoznik 已提交
3429 3430 3431 3432
        if (virJSONValueObjectAdd(props,
                                  "B:prealloc", prealloc,
                                  "s:mem-path", memPath,
                                  NULL) < 0)
3433
            return -1;
M
Michal Privoznik 已提交
3434

3435 3436
        if (!mem->nvdimmPath &&
            discard == VIR_TRISTATE_BOOL_YES) {
3437
            if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE_DISCARD)) {
3438 3439
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("this QEMU doesn't support memory discard"));
3440
                return -1;
3441 3442 3443 3444 3445
            }

            if (virJSONValueObjectAdd(props,
                                      "B:discard-data", true,
                                      NULL) < 0)
3446
                return -1;
3447 3448
        }

M
Marc-André Lureau 已提交
3449
        if (qemuBuildMemoryBackendPropsShare(props, memAccess) < 0)
3450
            return -1;
3451
    } else {
3452
        backendType = "memory-backend-ram";
3453 3454
    }

3455
    if (virJSONValueObjectAdd(props, "U:size", mem->size * 1024, NULL) < 0)
3456
        return -1;
3457

3458 3459 3460 3461 3462
    if (mem->alignsize) {
        if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE_ALIGN)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("nvdimm align property is not available "
                             "with this QEMU binary"));
3463
            return -1;
3464 3465
        }
        if (virJSONValueObjectAdd(props, "U:align", mem->alignsize * 1024, NULL) < 0)
3466
            return -1;
3467 3468
    }

3469 3470 3471 3472 3473
    if (mem->nvdimmPmem) {
        if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE_PMEM)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("nvdimm pmem property is not available "
                             "with this QEMU binary"));
3474
            return -1;
3475 3476
        }
        if (virJSONValueObjectAdd(props, "s:pmem", "on", NULL) < 0)
3477
            return -1;
3478 3479
    }

3480 3481
    if (mem->sourceNodes) {
        nodemask = mem->sourceNodes;
3482
    } else {
3483
        if (virDomainNumatuneMaybeGetNodeset(def->numa, priv->autoNodeset,
3484
                                             &nodemask, mem->targetNode) < 0)
3485
            return -1;
3486 3487 3488
    }

    if (nodemask) {
3489
        if (!virNumaNodesetIsAvailable(nodemask))
3490
            return -1;
3491 3492 3493 3494
        if (virJSONValueObjectAdd(props,
                                  "m:host-nodes", nodemask,
                                  "S:policy", qemuNumaPolicyTypeToString(mode),
                                  NULL) < 0)
3495
            return -1;
3496 3497
    }

3498
    /* If none of the following is requested... */
3499
    if (!needHugepage && !mem->sourceNodes && !nodeSpecified &&
M
Michal Privoznik 已提交
3500
        !mem->nvdimmPath &&
3501
        memAccess == VIR_DOMAIN_MEMORY_ACCESS_DEFAULT &&
M
Marc-André Lureau 已提交
3502 3503 3504
        def->mem.source != VIR_DOMAIN_MEMORY_SOURCE_FILE &&
        def->mem.source != VIR_DOMAIN_MEMORY_SOURCE_MEMFD &&
        !force) {
3505 3506
        /* report back that using the new backend is not necessary
         * to achieve the desired configuration */
3507
        rc = 1;
3508 3509
    } else {
        /* otherwise check the required capability */
3510
        if (STREQ(backendType, "memory-backend-file") &&
3511
            !virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE)) {
3512 3513 3514
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this qemu doesn't support the "
                             "memory-backend-file object"));
3515
            return -1;
3516
        } else if (STREQ(backendType, "memory-backend-ram") &&
3517
                   !virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_MEMORY_RAM)) {
3518 3519 3520
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this qemu doesn't support the "
                             "memory-backend-ram object"));
3521
            return -1;
M
Marc-André Lureau 已提交
3522
        } else if (STREQ(backendType, "memory-backend-memory") &&
3523
                   !virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_MEMORY_MEMFD)) {
M
Marc-André Lureau 已提交
3524 3525 3526
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this qemu doesn't support the "
                             "memory-backend-memfd object"));
3527
            return -1;
3528 3529
        }

3530
        rc = 0;
3531 3532
    }

3533 3534
    if (!(*backendProps = qemuMonitorCreateObjectPropsWrap(backendType, alias,
                                                           &props)))
3535
        return -1;
3536

3537
    return rc;
3538 3539 3540 3541 3542 3543 3544
}


static int
qemuBuildMemoryCellBackendStr(virDomainDefPtr def,
                              virQEMUDriverConfigPtr cfg,
                              size_t cell,
3545
                              qemuDomainObjPrivatePtr priv,
3546
                              virBufferPtr buf)
3547
{
J
Ján Tomko 已提交
3548
    g_autoptr(virJSONValue) props = NULL;
3549
    g_autofree char *alias = NULL;
3550
    int rc;
3551
    virDomainMemoryDef mem = { 0 };
3552 3553
    unsigned long long memsize = virDomainNumaGetNodeMemorySize(def->numa,
                                                                cell);
3554

3555
    alias = g_strdup_printf("ram-node%zu", cell);
3556

3557 3558
    mem.size = memsize;
    mem.targetNode = cell;
3559
    mem.info.alias = alias;
3560

3561 3562
    if ((rc = qemuBuildMemoryBackendProps(&props, alias, cfg,
                                          priv, def, &mem, false)) < 0)
3563
        return -1;
3564

3565
    if (virQEMUBuildObjectCommandlineFromJSON(buf, props) < 0)
3566
        return -1;
3567

3568
    return rc;
3569 3570 3571
}


3572 3573 3574
static int
qemuBuildMemoryDimmBackendStr(virBufferPtr buf,
                              virDomainMemoryDefPtr mem,
3575
                              virDomainDefPtr def,
3576
                              virQEMUDriverConfigPtr cfg,
3577
                              qemuDomainObjPrivatePtr priv)
3578
{
J
Ján Tomko 已提交
3579
    g_autoptr(virJSONValue) props = NULL;
3580
    g_autofree char *alias = NULL;
3581 3582 3583 3584

    if (!mem->info.alias) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("memory device alias is not assigned"));
3585
        return -1;
3586 3587
    }

3588
    alias = g_strdup_printf("mem%s", mem->info.alias);
3589

3590 3591
    if (qemuBuildMemoryBackendProps(&props, alias, cfg,
                                    priv, def, mem, true) < 0)
3592
        return -1;
3593

3594
    if (virQEMUBuildObjectCommandlineFromJSON(buf, props) < 0)
3595
        return -1;
3596

3597
    return 0;
3598 3599 3600
}


3601
char *
3602 3603
qemuBuildMemoryDeviceStr(virDomainMemoryDefPtr mem,
                         qemuDomainObjPrivatePtr priv)
3604
{
3605
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
M
Michal Privoznik 已提交
3606
    const char *device;
3607 3608 3609 3610 3611 3612 3613 3614

    if (!mem->info.alias) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("missing alias for memory device"));
        return NULL;
    }

    switch ((virDomainMemoryModel) mem->model) {
M
Michal Privoznik 已提交
3615
    case VIR_DOMAIN_MEMORY_MODEL_NVDIMM:
3616
    case VIR_DOMAIN_MEMORY_MODEL_DIMM:
M
Michal Privoznik 已提交
3617 3618 3619 3620 3621 3622 3623

        if (mem->model == VIR_DOMAIN_MEMORY_MODEL_DIMM)
            device = "pc-dimm";
        else
            device = "nvdimm";

        virBufferAsprintf(&buf, "%s,", device);
3624 3625 3626 3627

        if (mem->targetNode >= 0)
            virBufferAsprintf(&buf, "node=%d,", mem->targetNode);

3628 3629 3630
        if (mem->labelsize)
            virBufferAsprintf(&buf, "label-size=%llu,", mem->labelsize * 1024);

3631 3632 3633 3634 3635 3636 3637 3638 3639 3640
        if (mem->readonly) {
            if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_DEVICE_NVDIMM_UNARMED)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("nvdimm readonly property is not available "
                                 "with this QEMU binary"));
                return NULL;
            }
            virBufferAddLit(&buf, "unarmed=on,");
        }

3641 3642
        virBufferAsprintf(&buf, "memdev=mem%s,id=%s",
                          mem->info.alias, mem->info.alias);
3643 3644 3645

        if (mem->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DIMM) {
            virBufferAsprintf(&buf, ",slot=%d", mem->info.addr.dimm.slot);
3646 3647
            if (mem->info.addr.dimm.base)
                virBufferAsprintf(&buf, ",addr=%llu", mem->info.addr.dimm.base);
3648 3649 3650 3651 3652 3653 3654 3655 3656 3657 3658 3659 3660 3661
        }

        break;

    case VIR_DOMAIN_MEMORY_MODEL_NONE:
    case VIR_DOMAIN_MEMORY_MODEL_LAST:
        break;

    }

    return virBufferContentAndReset(&buf);
}


3662
static char *
3663
qemuBuildLegacyNicStr(virDomainNetDefPtr net)
3664 3665
{
    char *str;
3666
    char macaddr[VIR_MAC_STRING_BUFLEN];
3667
    const char *netmodel = virDomainNetGetModelString(net);
3668

3669 3670 3671 3672 3673 3674 3675
    str = g_strdup_printf("nic,macaddr=%s,netdev=host%s%s%s%s%s",
                          virMacAddrFormat(&net->mac, macaddr),
                          net->info.alias,
                          netmodel ? ",model=" : "",
                          NULLSTR_EMPTY(netmodel),
                          (net->info.alias ? ",id=" : ""),
                          NULLSTR_EMPTY(net->info.alias));
3676 3677 3678 3679 3680
    return str;
}


char *
3681
qemuBuildNicDevStr(virDomainDefPtr def,
3682
                   virDomainNetDefPtr net,
3683
                   unsigned int bootindex,
3684
                   size_t vhostfdSize,
3685
                   virQEMUCapsPtr qemuCaps)
3686
{
3687
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
3688
    bool usingVirtio = false;
3689
    char macaddr[VIR_MAC_STRING_BUFLEN];
3690

3691
    if (virDomainNetIsVirtioModel(net)) {
3692
        if (qemuBuildVirtioDevStr(&buf, "virtio-net", qemuCaps,
3693
                                  VIR_DOMAIN_DEVICE_NET, net) < 0) {
3694
            goto error;
3695
        }
3696

3697
        usingVirtio = true;
3698
    } else {
3699
        virBufferAddStr(&buf, virDomainNetGetModelString(net));
3700 3701
    }

3702
    if (usingVirtio && net->driver.virtio.txmode) {
3703
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_TX_ALG)) {
3704 3705 3706 3707 3708 3709 3710 3711 3712
            virBufferAddLit(&buf, ",tx=");
            switch (net->driver.virtio.txmode) {
                case VIR_DOMAIN_NET_VIRTIO_TX_MODE_IOTHREAD:
                    virBufferAddLit(&buf, "bh");
                    break;

                case VIR_DOMAIN_NET_VIRTIO_TX_MODE_TIMER:
                    virBufferAddLit(&buf, "timer");
                    break;
3713 3714 3715 3716 3717

                case VIR_DOMAIN_NET_VIRTIO_TX_MODE_DEFAULT:
                    break;

                case VIR_DOMAIN_NET_VIRTIO_TX_MODE_LAST:
3718 3719 3720 3721
                default:
                    /* this should never happen, if it does, we need
                     * to add another case to this switch.
                     */
3722 3723
                    virReportEnumRangeError(virDomainNetVirtioTxModeType,
                                            net->driver.virtio.txmode);
3724 3725 3726
                    goto error;
            }
        } else {
3727 3728
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("virtio-net-pci 'tx' option not supported in this QEMU binary"));
3729 3730 3731
            goto error;
        }
    }
3732
    if (usingVirtio) {
3733
        qemuBuildIoEventFdStr(&buf, net->driver.virtio.ioeventfd, qemuCaps);
3734
        if (net->driver.virtio.event_idx &&
3735
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_NET_EVENT_IDX)) {
3736
            virBufferAsprintf(&buf, ",event_idx=%s",
J
Ján Tomko 已提交
3737
                              virTristateSwitchTypeToString(net->driver.virtio.event_idx));
3738
        }
3739 3740 3741 3742 3743 3744 3745 3746 3747 3748 3749 3750 3751 3752 3753 3754 3755 3756 3757 3758 3759 3760 3761 3762
        if (net->driver.virtio.host.csum) {
            virBufferAsprintf(&buf, ",csum=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.csum));
        }
        if (net->driver.virtio.host.gso) {
            virBufferAsprintf(&buf, ",gso=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.gso));
        }
        if (net->driver.virtio.host.tso4) {
            virBufferAsprintf(&buf, ",host_tso4=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.tso4));
        }
        if (net->driver.virtio.host.tso6) {
            virBufferAsprintf(&buf, ",host_tso6=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.tso6));
        }
        if (net->driver.virtio.host.ecn) {
            virBufferAsprintf(&buf, ",host_ecn=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.ecn));
        }
        if (net->driver.virtio.host.ufo) {
            virBufferAsprintf(&buf, ",host_ufo=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.ufo));
        }
J
Ján Tomko 已提交
3763 3764 3765 3766
        if (net->driver.virtio.host.mrg_rxbuf) {
            virBufferAsprintf(&buf, ",mrg_rxbuf=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.mrg_rxbuf));
        }
3767 3768 3769 3770 3771 3772 3773 3774 3775 3776 3777 3778 3779 3780 3781 3782 3783 3784 3785 3786
        if (net->driver.virtio.guest.csum) {
            virBufferAsprintf(&buf, ",guest_csum=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.guest.csum));
        }
        if (net->driver.virtio.guest.tso4) {
            virBufferAsprintf(&buf, ",guest_tso4=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.guest.tso4));
        }
        if (net->driver.virtio.guest.tso6) {
            virBufferAsprintf(&buf, ",guest_tso6=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.guest.tso6));
        }
        if (net->driver.virtio.guest.ecn) {
            virBufferAsprintf(&buf, ",guest_ecn=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.guest.ecn));
        }
        if (net->driver.virtio.guest.ufo) {
            virBufferAsprintf(&buf, ",guest_ufo=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.guest.ufo));
        }
3787
    }
3788
    if (usingVirtio && vhostfdSize > 1) {
3789 3790 3791 3792 3793 3794
        if (net->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW) {
            /* ccw provides a one to one relation of fds to queues and
             * does not support the vectors option
             */
            virBufferAddLit(&buf, ",mq=on");
        } else {
3795
            /* As advised at https://www.linux-kvm.org/page/Multiqueue
3796 3797 3798 3799
             * we should add vectors=2*N+2 where N is the vhostfdSize
             */
            virBufferAsprintf(&buf, ",mq=on,vectors=%zu", 2 * vhostfdSize + 2);
        }
3800
    }
3801 3802 3803 3804 3805
    if (usingVirtio && net->driver.virtio.rx_queue_size) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_NET_RX_QUEUE_SIZE)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("virtio rx_queue_size option is not supported with this QEMU binary"));
            goto error;
3806
        }
3807
        virBufferAsprintf(&buf, ",rx_queue_size=%u", net->driver.virtio.rx_queue_size);
3808
    }
3809 3810 3811 3812 3813
    if (usingVirtio && net->driver.virtio.tx_queue_size) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_NET_TX_QUEUE_SIZE)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("virtio tx_queue_size option is not supported with this QEMU binary"));
            goto error;
3814
        }
3815
        virBufferAsprintf(&buf, ",tx_queue_size=%u", net->driver.virtio.tx_queue_size);
3816
    }
3817

3818 3819 3820 3821 3822
    if (usingVirtio && net->mtu) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_NET_HOST_MTU)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("setting MTU is not supported with this QEMU binary"));
            goto error;
3823
        }
3824
        virBufferAsprintf(&buf, ",host_mtu=%u", net->mtu);
3825 3826
    }

3827
    virBufferAsprintf(&buf, ",netdev=host%s", net->info.alias);
3828
    virBufferAsprintf(&buf, ",id=%s", net->info.alias);
3829 3830
    virBufferAsprintf(&buf, ",mac=%s",
                      virMacAddrFormat(&net->mac, macaddr));
3831

3832
    if (qemuBuildDeviceAddressStr(&buf, def, &net->info, qemuCaps) < 0)
3833
        goto error;
3834
    if (qemuBuildRomStr(&buf, &net->info) < 0)
3835
        goto error;
3836
    if (bootindex)
3837
        virBufferAsprintf(&buf, ",bootindex=%u", bootindex);
3838 3839 3840
    if (usingVirtio &&
        qemuBuildVirtioOptionsStr(&buf, net->virtio, qemuCaps) < 0)
        goto error;
3841 3842 3843

    return virBufferContentAndReset(&buf);

3844
 error:
3845 3846 3847 3848 3849 3850
    return NULL;
}


char *
qemuBuildHostNetStr(virDomainNetDefPtr net,
3851
                    char **tapfd,
3852
                    size_t tapfdSize,
3853
                    char **vhostfd,
3854 3855
                    size_t vhostfdSize,
                    const char *slirpfd)
3856
{
3857
    bool is_tap = false;
3858
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
3859
    virDomainNetType netType = virDomainNetGetActualType(net);
3860
    size_t i;
3861

3862
    if (net->script && netType != VIR_DOMAIN_NET_TYPE_ETHERNET) {
3863 3864 3865
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("scripts are not supported on interfaces of type %s"),
                       virDomainNetTypeToString(netType));
3866
        return NULL;
3867 3868 3869
    }

    switch (netType) {
M
Michal Privoznik 已提交
3870 3871 3872 3873 3874
        /*
         * If type='bridge', and we're running as privileged user
         * or -netdev bridge is not supported then it will fall
         * through, -net tap,fd
         */
3875
    case VIR_DOMAIN_NET_TYPE_BRIDGE:
R
Richa Marwaha 已提交
3876
    case VIR_DOMAIN_NET_TYPE_NETWORK:
3877
    case VIR_DOMAIN_NET_TYPE_DIRECT:
3878
    case VIR_DOMAIN_NET_TYPE_ETHERNET:
3879
        virBufferAddLit(&buf, "tap,");
3880 3881 3882
        /* for one tapfd 'fd=' shall be used,
         * for more than one 'fds=' is the right choice */
        if (tapfdSize == 1) {
3883
            virBufferAsprintf(&buf, "fd=%s,", tapfd[0]);
3884 3885 3886 3887 3888 3889 3890
        } else {
            virBufferAddLit(&buf, "fds=");
            for (i = 0; i < tapfdSize; i++) {
                if (i)
                    virBufferAddChar(&buf, ':');
                virBufferAdd(&buf, tapfd[i], -1);
            }
3891
            virBufferAddChar(&buf, ',');
3892
        }
3893
        is_tap = true;
3894 3895 3896
        break;

    case VIR_DOMAIN_NET_TYPE_CLIENT:
3897
        virBufferAsprintf(&buf, "socket,connect=%s:%d,",
M
Michal Privoznik 已提交
3898 3899 3900
                          net->data.socket.address,
                          net->data.socket.port);
        break;
3901

3902
    case VIR_DOMAIN_NET_TYPE_SERVER:
3903
        virBufferAsprintf(&buf, "socket,listen=%s:%d,",
J
Ján Tomko 已提交
3904
                          NULLSTR_EMPTY(net->data.socket.address),
M
Michal Privoznik 已提交
3905 3906
                          net->data.socket.port);
        break;
3907

3908
    case VIR_DOMAIN_NET_TYPE_MCAST:
3909
        virBufferAsprintf(&buf, "socket,mcast=%s:%d,",
M
Michal Privoznik 已提交
3910 3911 3912
                          net->data.socket.address,
                          net->data.socket.port);
        break;
3913

3914
    case VIR_DOMAIN_NET_TYPE_UDP:
3915
        virBufferAsprintf(&buf, "socket,udp=%s:%d,localaddr=%s:%d,",
M
Michal Privoznik 已提交
3916 3917 3918 3919 3920
                          net->data.socket.address,
                          net->data.socket.port,
                          net->data.socket.localaddr,
                          net->data.socket.localport);
        break;
3921

3922
    case VIR_DOMAIN_NET_TYPE_USER:
3923 3924 3925 3926 3927 3928
        if (slirpfd) {
            virBufferAsprintf(&buf, "socket,fd=%s,", slirpfd);
        } else {
            virBufferAddLit(&buf, "user,");
            for (i = 0; i < net->guestIP.nips; i++) {
                const virNetDevIPAddr *ip = net->guestIP.ips[i];
3929
                g_autofree char *addr = NULL;
3930 3931 3932
                const char *prefix = "";

                if (!(addr = virSocketAddrFormat(&ip->address)))
3933
                    return NULL;
3934 3935 3936 3937 3938 3939 3940 3941 3942 3943 3944

                if (VIR_SOCKET_ADDR_IS_FAMILY(&ip->address, AF_INET))
                    prefix = "net=";
                if (VIR_SOCKET_ADDR_IS_FAMILY(&ip->address, AF_INET6))
                    prefix = "ipv6-net=";

                virBufferAsprintf(&buf, "%s%s", prefix, addr);
                if (ip->prefix)
                    virBufferAsprintf(&buf, "/%u", ip->prefix);
                virBufferAddChar(&buf, ',');
            }
3945 3946 3947
        }
        break;

3948
    case VIR_DOMAIN_NET_TYPE_INTERNAL:
3949
        virBufferAddLit(&buf, "user,");
3950
        break;
3951 3952

    case VIR_DOMAIN_NET_TYPE_VHOSTUSER:
3953
        virBufferAsprintf(&buf, "vhost-user,chardev=char%s,",
3954 3955
                          net->info.alias);
        if (net->driver.virtio.queues > 1)
3956
            virBufferAsprintf(&buf, "queues=%u,",
3957
                              net->driver.virtio.queues);
3958 3959
        break;

J
Ján Tomko 已提交
3960 3961
    case VIR_DOMAIN_NET_TYPE_HOSTDEV:
        /* Should have been handled earlier via PCI/USB hotplug code. */
3962 3963
    case VIR_DOMAIN_NET_TYPE_LAST:
        break;
3964 3965
    }

3966
    virBufferAsprintf(&buf, "id=host%s,", net->info.alias);
3967

3968
    if (is_tap) {
3969
        if (vhostfdSize) {
3970
            virBufferAddLit(&buf, "vhost=on,");
3971
            if (vhostfdSize == 1) {
3972
                virBufferAsprintf(&buf, "vhostfd=%s,", vhostfd[0]);
3973 3974 3975 3976 3977 3978 3979
            } else {
                virBufferAddLit(&buf, "vhostfds=");
                for (i = 0; i < vhostfdSize; i++) {
                    if (i)
                        virBufferAddChar(&buf, ':');
                    virBufferAdd(&buf, vhostfd[i], -1);
                }
3980
                virBufferAddChar(&buf, ',');
3981 3982
            }
        }
3983
        if (net->tune.sndbuf_specified)
3984
            virBufferAsprintf(&buf, "sndbuf=%lu,", net->tune.sndbuf);
3985 3986
    }

3987

3988
    virBufferTrim(&buf, ",", -1);
3989

3990
    return virBufferContentAndReset(&buf);
3991 3992 3993
}


M
Michal Privoznik 已提交
3994
char *
3995
qemuBuildWatchdogDevStr(const virDomainDef *def,
3996
                        virDomainWatchdogDefPtr dev,
3997
                        virQEMUCapsPtr qemuCaps)
3998
{
3999
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4000 4001 4002

    const char *model = virDomainWatchdogModelTypeToString(dev->model);
    if (!model) {
4003 4004
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("missing watchdog model"));
4005
        return NULL;
4006 4007
    }

4008
    virBufferAsprintf(&buf, "%s,id=%s", model, dev->info.alias);
4009
    if (qemuBuildDeviceAddressStr(&buf, def, &dev->info, qemuCaps) < 0)
4010
        return NULL;
4011 4012 4013 4014 4015

    return virBufferContentAndReset(&buf);
}


4016 4017 4018 4019 4020 4021
static int
qemuBuildWatchdogCommandLine(virCommandPtr cmd,
                             const virDomainDef *def,
                             virQEMUCapsPtr qemuCaps)
{
    virDomainWatchdogDefPtr watchdog = def->watchdog;
4022
    g_autofree char *optstr = NULL;
4023
    const char *action;
4024
    int actualAction;
4025 4026 4027 4028

    if (!def->watchdog)
        return 0;

4029 4030 4031
    if (qemuCommandAddExtDevice(cmd, &def->watchdog->info) < 0)
        return -1;

4032
    virCommandAddArg(cmd, "-device");
4033

4034 4035 4036
    optstr = qemuBuildWatchdogDevStr(def, watchdog, qemuCaps);
    if (!optstr)
        return -1;
4037 4038 4039

    virCommandAddArg(cmd, optstr);

4040 4041 4042 4043
    /* qemu doesn't have a 'dump' action; we tell qemu to 'pause', then
       libvirt listens for the watchdog event, and we perform the dump
       ourselves. so convert 'dump' to 'pause' for the qemu cli */
    actualAction = watchdog->action;
4044
    if (watchdog->action == VIR_DOMAIN_WATCHDOG_ACTION_DUMP)
4045
        actualAction = VIR_DOMAIN_WATCHDOG_ACTION_PAUSE;
4046

4047
    action = virDomainWatchdogActionTypeToString(actualAction);
4048 4049 4050 4051 4052 4053 4054 4055 4056 4057 4058
    if (!action) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("invalid watchdog action"));
        return -1;
    }
    virCommandAddArgList(cmd, "-watchdog-action", action, NULL);

    return 0;
}


4059 4060 4061 4062
static int
qemuBuildMemballoonCommandLine(virCommandPtr cmd,
                               const virDomainDef *def,
                               virQEMUCapsPtr qemuCaps)
4063
{
4064
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4065

4066
    if (!virDomainDefHasMemballoon(def))
4067 4068
        return 0;

4069
    if (qemuBuildVirtioDevStr(&buf, "virtio-balloon", qemuCaps,
4070 4071
                              VIR_DOMAIN_DEVICE_MEMBALLOON,
                              def->memballoon) < 0) {
4072
        return -1;
4073 4074
    }

4075 4076
    virBufferAsprintf(&buf, ",id=%s", def->memballoon->info.alias);
    if (qemuBuildDeviceAddressStr(&buf, def, &def->memballoon->info, qemuCaps) < 0)
4077
        return -1;
4078

4079
    if (def->memballoon->autodeflate != VIR_TRISTATE_SWITCH_ABSENT) {
4080
        virBufferAsprintf(&buf, ",deflate-on-oom=%s",
4081
                          virTristateSwitchTypeToString(def->memballoon->autodeflate));
4082 4083
    }

4084
    if (qemuBuildVirtioOptionsStr(&buf, def->memballoon->virtio, qemuCaps) < 0)
4085
        return -1;
4086

4087
    if (qemuCommandAddExtDevice(cmd, &def->memballoon->info) < 0)
4088
        return -1;
4089

4090 4091 4092
    virCommandAddArg(cmd, "-device");
    virCommandAddArgBuffer(cmd, &buf);
    return 0;
4093 4094 4095
}


4096 4097 4098
static char *
qemuBuildNVRAMDevStr(virDomainNVRAMDefPtr dev)
{
4099
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4100 4101 4102 4103 4104 4105 4106 4107

    if (dev->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_SPAPRVIO &&
        dev->info.addr.spaprvio.has_reg) {
        virBufferAsprintf(&buf, "spapr-nvram.reg=0x%llx",
                          dev->info.addr.spaprvio.reg);
    } else {
        virReportError(VIR_ERR_XML_ERROR, "%s",
                       _("nvram address type must be spaprvio"));
4108
        return NULL;
4109 4110 4111 4112
    }

    return virBufferContentAndReset(&buf);
}
4113

4114 4115 4116 4117 4118 4119 4120 4121 4122

static int
qemuBuildNVRAMCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
    if (!def->nvram)
        return 0;

4123
    if (qemuDomainIsPSeries(def)) {
4124 4125 4126 4127 4128 4129 4130
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_NVRAM)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("nvram device is not supported by "
                             "this QEMU binary"));
            return -1;
        }

4131
        g_autofree char *optstr = NULL;
4132 4133 4134 4135
        virCommandAddArg(cmd, "-global");
        optstr = qemuBuildNVRAMDevStr(def->nvram);
        if (!optstr)
            return -1;
4136
        virCommandAddArg(cmd, optstr);
4137 4138 4139 4140 4141 4142 4143 4144 4145 4146
    } else {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                      _("nvram device is only supported for PPC64"));
        return -1;
    }

    return 0;
}


4147
static char *
4148
qemuBuildVirtioInputDevStr(const virDomainDef *def,
4149 4150 4151
                           virDomainInputDefPtr dev,
                           virQEMUCapsPtr qemuCaps)
{
4152
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4153

4154
    switch ((virDomainInputType)dev->type) {
4155
    case VIR_DOMAIN_INPUT_TYPE_MOUSE:
4156
        if (qemuBuildVirtioDevStr(&buf, "virtio-mouse", qemuCaps,
4157
                                  VIR_DOMAIN_DEVICE_INPUT, dev) < 0) {
4158
            return NULL;
4159
        }
4160 4161
        break;
    case VIR_DOMAIN_INPUT_TYPE_TABLET:
4162
        if (qemuBuildVirtioDevStr(&buf, "virtio-tablet", qemuCaps,
4163
                                  VIR_DOMAIN_DEVICE_INPUT, dev) < 0) {
4164
            return NULL;
4165
        }
4166 4167
        break;
    case VIR_DOMAIN_INPUT_TYPE_KBD:
4168
        if (qemuBuildVirtioDevStr(&buf, "virtio-keyboard", qemuCaps,
4169
                                  VIR_DOMAIN_DEVICE_INPUT, dev) < 0) {
4170
            return NULL;
4171
        }
4172
        break;
4173
    case VIR_DOMAIN_INPUT_TYPE_PASSTHROUGH:
4174
        if (qemuBuildVirtioDevStr(&buf, "virtio-input-host", qemuCaps,
4175
                                  VIR_DOMAIN_DEVICE_INPUT, dev) < 0) {
4176
            return NULL;
4177
        }
4178
        break;
4179
    case VIR_DOMAIN_INPUT_TYPE_LAST:
4180 4181
    default:
        virReportEnumRangeError(virDomainInputType, dev->type);
4182
        return NULL;
4183 4184
    }

4185 4186 4187 4188 4189 4190 4191
    virBufferAsprintf(&buf, ",id=%s", dev->info.alias);

    if (dev->type == VIR_DOMAIN_INPUT_TYPE_PASSTHROUGH) {
        virBufferAddLit(&buf, ",evdev=");
        virQEMUBuildBufferEscapeComma(&buf, dev->source.evdev);
    }

4192
    if (qemuBuildDeviceAddressStr(&buf, def, &dev->info, qemuCaps) < 0)
4193
        return NULL;
4194

4195
    if (qemuBuildVirtioOptionsStr(&buf, dev->virtio, qemuCaps) < 0)
4196
        return NULL;
4197

4198 4199 4200
    return virBufferContentAndReset(&buf);
}

4201 4202
static char *
qemuBuildUSBInputDevStr(const virDomainDef *def,
4203
                        virDomainInputDefPtr dev,
4204
                        virQEMUCapsPtr qemuCaps)
4205
{
4206
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4207

4208 4209 4210 4211 4212 4213 4214 4215
    switch (dev->type) {
    case VIR_DOMAIN_INPUT_TYPE_MOUSE:
        virBufferAsprintf(&buf, "usb-mouse,id=%s", dev->info.alias);
        break;
    case VIR_DOMAIN_INPUT_TYPE_TABLET:
        virBufferAsprintf(&buf, "usb-tablet,id=%s", dev->info.alias);
        break;
    case VIR_DOMAIN_INPUT_TYPE_KBD:
4216 4217 4218 4219
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_USB_KBD)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("usb keyboard is not supported by this "
                             "QEMU binary"));
4220
            return NULL;
4221
        }
4222 4223 4224
        virBufferAsprintf(&buf, "usb-kbd,id=%s", dev->info.alias);
        break;
    }
4225

4226
    if (qemuBuildDeviceAddressStr(&buf, def, &dev->info, qemuCaps) < 0)
4227
        return NULL;
4228

4229 4230 4231 4232
    return virBufferContentAndReset(&buf);
}


J
Ján Tomko 已提交
4233 4234 4235 4236 4237 4238 4239 4240 4241 4242 4243 4244 4245 4246 4247 4248 4249 4250 4251 4252 4253
int
qemuBuildInputDevStr(char **devstr,
                     const virDomainDef *def,
                     virDomainInputDefPtr input,
                     virQEMUCapsPtr qemuCaps)
{
    switch (input->bus) {
    case VIR_DOMAIN_INPUT_BUS_USB:
        if (!(*devstr = qemuBuildUSBInputDevStr(def, input, qemuCaps)))
            return -1;
        break;

    case VIR_DOMAIN_INPUT_BUS_VIRTIO:
        if (!(*devstr = qemuBuildVirtioInputDevStr(def, input, qemuCaps)))
            return -1;
        break;
    }
    return 0;
}


4254 4255 4256 4257 4258 4259 4260 4261 4262
static int
qemuBuildInputCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
    size_t i;

    for (i = 0; i < def->ninputs; i++) {
        virDomainInputDefPtr input = def->inputs[i];
4263
        g_autofree char *devstr = NULL;
4264

4265 4266 4267
        if (qemuCommandAddExtDevice(cmd, &input->info) < 0)
            return -1;

J
Ján Tomko 已提交
4268 4269 4270 4271
        if (qemuBuildInputDevStr(&devstr, def, input, qemuCaps) < 0)
            return -1;

        if (devstr) {
4272
            virCommandAddArg(cmd, "-device");
J
Ján Tomko 已提交
4273
            virCommandAddArg(cmd, devstr);
4274 4275 4276 4277 4278 4279 4280
        }
    }

    return 0;
}


4281 4282
static char *
qemuBuildSoundDevStr(const virDomainDef *def,
4283
                     virDomainSoundDefPtr sound,
4284
                     virQEMUCapsPtr qemuCaps)
4285
{
4286
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4287
    const char *model = NULL;
4288

4289
    /* Hack for devices with different names in QEMU and libvirt */
4290
    switch ((virDomainSoundModel) sound->model) {
4291
    case VIR_DOMAIN_SOUND_MODEL_ES1370:
4292
        model = "ES1370";
4293 4294
        break;
    case VIR_DOMAIN_SOUND_MODEL_AC97:
4295
        model = "AC97";
4296 4297
        break;
    case VIR_DOMAIN_SOUND_MODEL_ICH6:
4298
        model = "intel-hda";
4299
        break;
4300 4301 4302 4303 4304 4305
    case VIR_DOMAIN_SOUND_MODEL_USB:
        model = "usb-audio";
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_USB_AUDIO)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("usb-audio controller is not supported "
                             "by this QEMU binary"));
4306
            return NULL;
4307 4308
        }
        break;
4309 4310 4311 4312 4313 4314
    case VIR_DOMAIN_SOUND_MODEL_ICH9:
        model = "ich9-intel-hda";
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_ICH9_INTEL_HDA)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("The ich9-intel-hda audio controller "
                             "is not supported in this QEMU binary"));
4315
            return NULL;
4316 4317
        }
        break;
4318 4319 4320 4321 4322 4323 4324 4325
    case VIR_DOMAIN_SOUND_MODEL_SB16:
        model = "sb16";
        break;
    case VIR_DOMAIN_SOUND_MODEL_PCSPK: /* pc-speaker is handled separately */
    case VIR_DOMAIN_SOUND_MODEL_LAST:
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("sound card model '%s' is not supported by qemu"),
                       virDomainSoundModelTypeToString(sound->model));
4326
        return NULL;
4327
    }
4328

4329
    virBufferAsprintf(&buf, "%s,id=%s", model, sound->info.alias);
4330
    if (qemuBuildDeviceAddressStr(&buf, def, &sound->info, qemuCaps) < 0)
4331
        return NULL;
4332 4333 4334 4335

    return virBufferContentAndReset(&buf);
}

4336 4337 4338 4339 4340 4341 4342 4343 4344

static int
qemuSoundCodecTypeToCaps(int type)
{
    switch (type) {
    case VIR_DOMAIN_SOUND_CODEC_TYPE_DUPLEX:
        return QEMU_CAPS_HDA_DUPLEX;
    case VIR_DOMAIN_SOUND_CODEC_TYPE_MICRO:
        return QEMU_CAPS_HDA_MICRO;
4345 4346
    case VIR_DOMAIN_SOUND_CODEC_TYPE_OUTPUT:
        return QEMU_CAPS_HDA_OUTPUT;
4347 4348 4349 4350 4351 4352
    default:
        return -1;
    }
}


4353 4354
static char *
qemuBuildSoundCodecStr(virDomainSoundDefPtr sound,
4355
                       virDomainSoundCodecDefPtr codec,
4356
                       virQEMUCapsPtr qemuCaps)
4357
{
4358
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4359
    const char *stype;
4360
    int type, flags;
4361

4362 4363
    type = codec->type;
    stype = qemuSoundCodecTypeToString(type);
4364
    flags = qemuSoundCodecTypeToCaps(type);
4365

4366
    if (flags == -1 || !virQEMUCapsGet(qemuCaps, flags)) {
4367 4368
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("%s not supported in this QEMU binary"), stype);
4369
        return NULL;
4370 4371
    }

4372 4373 4374
    virBufferAsprintf(&buf, "%s,id=%s-codec%d,bus=%s.0,cad=%d",
                      stype, sound->info.alias, codec->cad, sound->info.alias, codec->cad);

4375 4376
    return virBufferContentAndReset(&buf);
}
4377

4378 4379 4380 4381 4382 4383 4384 4385

static int
qemuBuildSoundCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
    size_t i, j;

4386 4387
    for (i = 0; i < def->nsounds; i++) {
        virDomainSoundDefPtr sound = def->sounds[i];
4388
        g_autofree char *str = NULL;
4389

4390 4391 4392 4393 4394 4395
        /* Sadly pcspk device doesn't use -device syntax. Fortunately
         * we don't need to set any PCI address on it, so we don't
         * mind too much */
        if (sound->model == VIR_DOMAIN_SOUND_MODEL_PCSPK) {
            virCommandAddArgList(cmd, "-soundhw", "pcspk", NULL);
        } else {
4396 4397 4398
            if (qemuCommandAddExtDevice(cmd, &sound->info) < 0)
                return -1;

4399 4400 4401
            virCommandAddArg(cmd, "-device");
            if (!(str = qemuBuildSoundDevStr(def, sound, qemuCaps)))
                return -1;
4402

4403 4404 4405
            virCommandAddArg(cmd, str);
            if (sound->model == VIR_DOMAIN_SOUND_MODEL_ICH6 ||
                sound->model == VIR_DOMAIN_SOUND_MODEL_ICH9) {
4406

4407
                for (j = 0; j < sound->ncodecs; j++) {
4408
                    g_autofree char *codecstr = NULL;
4409 4410 4411 4412 4413
                    virCommandAddArg(cmd, "-device");
                    if (!(codecstr =
                          qemuBuildSoundCodecStr(sound, sound->codecs[j],
                                                 qemuCaps))) {
                        return -1;
4414 4415

                    }
4416 4417 4418
                    virCommandAddArg(cmd, codecstr);
                }
                if (j == 0) {
4419
                    g_autofree char *codecstr = NULL;
4420 4421 4422 4423 4424 4425 4426 4427 4428
                    virDomainSoundCodecDef codec = {
                        VIR_DOMAIN_SOUND_CODEC_TYPE_DUPLEX,
                        0
                    };
                    virCommandAddArg(cmd, "-device");
                    if (!(codecstr =
                          qemuBuildSoundCodecStr(sound, &codec,
                                                 qemuCaps))) {
                        return -1;
4429 4430

                    }
4431
                    virCommandAddArg(cmd, codecstr);
4432 4433 4434 4435 4436 4437 4438 4439 4440
                }
            }
        }
    }
    return 0;
}



4441
static char *
4442
qemuBuildDeviceVideoStr(const virDomainDef *def,
4443
                        virDomainVideoDefPtr video,
4444
                        virQEMUCapsPtr qemuCaps)
4445
{
4446
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4447
    const char *model = NULL;
4448

4449 4450 4451 4452
    /* We try to chose the best model for primary video device by preferring
     * model with VGA compatibility mode.  For some video devices on some
     * architectures there might not be such model so fallback to one
     * without VGA compatibility mode. */
4453 4454 4455 4456 4457 4458 4459 4460 4461 4462 4463
    if (video->backend == VIR_DOMAIN_VIDEO_BACKEND_TYPE_VHOSTUSER) {
        if (video->primary && qemuDomainSupportsVideoVga(video, qemuCaps))
            model = "vhost-user-vga";
        else
            model = "vhost-user-gpu";
    } else {
        if (video->primary && qemuDomainSupportsVideoVga(video, qemuCaps))
            model = qemuDeviceVideoTypeToString(video->type);
        else
            model = qemuDeviceVideoSecondaryTypeToString(video->type);
    }
4464 4465 4466 4467 4468

    if (!model || STREQ(model, "")) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("invalid model for video type '%s'"),
                       virDomainVideoTypeToString(video->type));
4469
        return NULL;
4470 4471
    }

4472 4473
    if (STREQ(model, "virtio-gpu") || STREQ(model, "vhost-user-gpu")) {
        if (qemuBuildVirtioDevStr(&buf, model, qemuCaps,
4474
                                  VIR_DOMAIN_DEVICE_VIDEO, video) < 0) {
4475
            return NULL;
4476
        }
4477 4478 4479 4480 4481
    } else {
        virBufferAsprintf(&buf, "%s", model);
    }

    virBufferAsprintf(&buf, ",id=%s", video->info.alias);
4482

4483 4484 4485 4486 4487 4488
    if (video->backend != VIR_DOMAIN_VIDEO_BACKEND_TYPE_VHOSTUSER &&
        video->type == VIR_DOMAIN_VIDEO_TYPE_VIRTIO) {
        if (video->accel && video->accel->accel3d == VIR_TRISTATE_SWITCH_ON) {
            virBufferAsprintf(&buf, ",virgl=%s",
                              virTristateSwitchTypeToString(video->accel->accel3d));
        }
4489 4490 4491
    }

    if (video->type == VIR_DOMAIN_VIDEO_TYPE_QXL) {
4492 4493 4494 4495
        if (video->ram) {
            /* QEMU accepts bytes for ram_size. */
            virBufferAsprintf(&buf, ",ram_size=%u", video->ram * 1024);
        }
4496

4497 4498 4499 4500
        if (video->vram) {
            /* QEMU accepts bytes for vram_size. */
            virBufferAsprintf(&buf, ",vram_size=%u", video->vram * 1024);
        }
4501

4502
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_QXL_VRAM64)) {
4503 4504 4505 4506
            /* QEMU accepts mebibytes for vram64_size_mb. */
            virBufferAsprintf(&buf, ",vram64_size_mb=%u", video->vram64 / 1024);
        }

4507
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_QXL_VGAMEM)) {
4508 4509 4510
            /* QEMU accepts mebibytes for vgamem_mb. */
            virBufferAsprintf(&buf, ",vgamem_mb=%u", video->vgamem / 1024);
        }
4511

4512
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_QXL_MAX_OUTPUTS)) {
4513 4514 4515
            if (video->heads)
                virBufferAsprintf(&buf, ",max_outputs=%u", video->heads);
        }
4516 4517 4518 4519
    } else if (video->backend == VIR_DOMAIN_VIDEO_BACKEND_TYPE_VHOSTUSER) {
        if (video->heads)
            virBufferAsprintf(&buf, ",max_outputs=%u", video->heads);
        virBufferAsprintf(&buf, ",chardev=chr-vu-%s", video->info.alias);
4520 4521 4522 4523 4524
    } else if (video->type == VIR_DOMAIN_VIDEO_TYPE_VIRTIO) {
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_GPU_MAX_OUTPUTS)) {
            if (video->heads)
                virBufferAsprintf(&buf, ",max_outputs=%u", video->heads);
        }
4525 4526 4527 4528 4529 4530
    } else if ((video->type == VIR_DOMAIN_VIDEO_TYPE_VGA &&
                virQEMUCapsGet(qemuCaps, QEMU_CAPS_VGA_VGAMEM)) ||
               (video->type == VIR_DOMAIN_VIDEO_TYPE_VMVGA &&
                virQEMUCapsGet(qemuCaps, QEMU_CAPS_VMWARE_SVGA_VGAMEM))) {
        if (video->vram)
            virBufferAsprintf(&buf, ",vgamem_mb=%u", video->vram / 1024);
4531 4532 4533
    } else if (video->type == VIR_DOMAIN_VIDEO_TYPE_BOCHS) {
        if (video->vram)
            virBufferAsprintf(&buf, ",vgamem=%uk", video->vram);
4534 4535
    }

4536 4537 4538 4539 4540
    if (video->res && video->res->x && video->res->y) {
        /* QEMU accepts resolution xres and yres. */
        virBufferAsprintf(&buf, ",xres=%u,yres=%u", video->res->x, video->res->y);
    }

4541
    if (qemuBuildDeviceAddressStr(&buf, def, &video->info, qemuCaps) < 0)
4542
        return NULL;
4543

4544
    if (qemuBuildVirtioOptionsStr(&buf, video->virtio, qemuCaps) < 0)
4545
        return NULL;
4546

4547 4548 4549 4550
    return virBufferContentAndReset(&buf);
}


4551 4552
static int
qemuBuildVgaVideoCommand(virCommandPtr cmd,
4553
                         virDomainVideoDefPtr video,
4554 4555
                         virQEMUCapsPtr qemuCaps)
{
4556
    const char *vgastr = qemuVideoTypeToString(video->type);
4557 4558 4559
    if (!vgastr || STREQ(vgastr, "")) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("invalid model for video type '%s'"),
4560
                       virDomainVideoTypeToString(video->type));
4561 4562 4563 4564 4565 4566 4567 4568 4569 4570 4571 4572 4573 4574 4575 4576
        return -1;
    }

    virCommandAddArgList(cmd, "-vga", vgastr, NULL);

    /* If we cannot use --device option to specify the video device
     * in QEMU we will fallback to the old --vga option. To get the
     * correct device name for the --vga option the 'qemuVideo' is
     * used, but to set some device attributes we need to use the
     * --global option and for that we need to specify the device
     * name the same as for --device option and for that we need to
     * use 'qemuDeviceVideo'.
     *
     * See 'Graphics Devices' section in docs/qdev-device-use.txt in
     * QEMU repository.
     */
4577
    const char *dev = qemuDeviceVideoTypeToString(video->type);
4578

4579 4580 4581 4582 4583 4584
    if (video->type == VIR_DOMAIN_VIDEO_TYPE_QXL &&
        (video->vram || video->ram)) {
        unsigned int ram = video->ram;
        unsigned int vram = video->vram;
        unsigned int vram64 = video->vram64;
        unsigned int vgamem = video->vgamem;
4585
        unsigned int heads = video->heads;
4586 4587 4588 4589 4590 4591 4592 4593 4594 4595 4596 4597 4598 4599 4600 4601 4602 4603 4604 4605 4606 4607 4608

        if (ram) {
            virCommandAddArg(cmd, "-global");
            virCommandAddArgFormat(cmd, "%s.ram_size=%u",
                                   dev, ram * 1024);
        }
        if (vram) {
            virCommandAddArg(cmd, "-global");
            virCommandAddArgFormat(cmd, "%s.vram_size=%u",
                                   dev, vram * 1024);
        }
        if (vram64 &&
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_QXL_VRAM64)) {
            virCommandAddArg(cmd, "-global");
            virCommandAddArgFormat(cmd, "%s.vram64_size_mb=%u",
                                   dev, vram64 / 1024);
        }
        if (vgamem &&
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_QXL_VGAMEM)) {
            virCommandAddArg(cmd, "-global");
            virCommandAddArgFormat(cmd, "%s.vgamem_mb=%u",
                                   dev, vgamem / 1024);
        }
4609 4610 4611 4612 4613 4614
        if (heads &&
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_QXL_MAX_OUTPUTS)) {
            virCommandAddArg(cmd, "-global");
            virCommandAddArgFormat(cmd, "%s.max_outputs=%u",
                                   dev, heads);
        }
4615 4616
    }

4617 4618
    if (video->vram &&
        ((video->type == VIR_DOMAIN_VIDEO_TYPE_VGA &&
4619
          virQEMUCapsGet(qemuCaps, QEMU_CAPS_VGA_VGAMEM)) ||
4620
         (video->type == VIR_DOMAIN_VIDEO_TYPE_VMVGA &&
4621
          virQEMUCapsGet(qemuCaps, QEMU_CAPS_VMWARE_SVGA_VGAMEM)))) {
4622
        unsigned int vram = video->vram;
4623 4624 4625 4626 4627 4628 4629 4630 4631 4632

        virCommandAddArg(cmd, "-global");
        virCommandAddArgFormat(cmd, "%s.vgamem_mb=%u",
                               dev, vram / 1024);
    }

    return 0;
}


4633 4634 4635 4636 4637 4638 4639
static char *
qemuBuildVhostUserChardevStr(const char *alias,
                             int *fd,
                             virCommandPtr cmd)
{
    char *chardev = NULL;

4640 4641 4642 4643 4644 4645
    if (*fd == -1) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Attempt to pass closed vhostuser FD"));
        return NULL;
    }

4646
    chardev = g_strdup_printf("socket,id=chr-vu-%s,fd=%d", alias, *fd);
4647 4648 4649 4650 4651 4652 4653 4654

    virCommandPassFD(cmd, *fd, VIR_COMMAND_PASS_FD_CLOSE_PARENT);
    *fd = -1;

    return chardev;
}


4655 4656 4657 4658 4659 4660 4661
static int
qemuBuildVideoCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
    size_t i;

4662
    for (i = 0; i < def->nvideos; i++) {
4663
        g_autofree char *chardev = NULL;
4664 4665 4666 4667 4668 4669 4670 4671 4672 4673 4674 4675
        virDomainVideoDefPtr video = def->videos[i];

        if (video->backend == VIR_DOMAIN_VIDEO_BACKEND_TYPE_VHOSTUSER) {
            if (!(chardev = qemuBuildVhostUserChardevStr(video->info.alias,
                                &QEMU_DOMAIN_VIDEO_PRIVATE(video)->vhost_user_fd,
                                cmd)))
                return -1;

            virCommandAddArgList(cmd, "-chardev", chardev, NULL);
        }
    }

4676
    for (i = 0; i < def->nvideos; i++) {
4677
        g_autofree char *str = NULL;
4678
        virDomainVideoDefPtr video = def->videos[i];
4679

4680 4681 4682
        if (video->type == VIR_DOMAIN_VIDEO_TYPE_NONE)
            continue;

4683 4684
        if (video->primary) {
            if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VIDEO_PRIMARY)) {
4685

4686 4687 4688 4689
                if (qemuCommandAddExtDevice(cmd,
                                            &def->videos[i]->info) < 0)
                    return -1;

4690
                virCommandAddArg(cmd, "-device");
4691

4692 4693
                if (!(str = qemuBuildDeviceVideoStr(def, video, qemuCaps)))
                    return -1;
4694

4695 4696 4697 4698 4699 4700
                virCommandAddArg(cmd, str);
            } else {
                if (qemuBuildVgaVideoCommand(cmd, video, qemuCaps) < 0)
                    return -1;
            }
        } else {
4701 4702 4703
            if (qemuCommandAddExtDevice(cmd, &def->videos[i]->info) < 0)
                return -1;

4704
            virCommandAddArg(cmd, "-device");
4705

4706
            if (!(str = qemuBuildDeviceVideoStr(def, video, qemuCaps)))
4707
                return -1;
4708 4709

            virCommandAddArg(cmd, str);
4710 4711 4712 4713 4714 4715 4716
        }
    }

    return 0;
}


4717
char *
4718
qemuBuildPCIHostdevDevStr(const virDomainDef *def,
4719
                          virDomainHostdevDefPtr dev,
4720
                          unsigned int bootIndex, /* used iff dev->info->bootIndex == 0 */
4721
                          virQEMUCapsPtr qemuCaps)
4722
{
4723
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4724 4725
    virDomainHostdevSubsysPCIPtr pcisrc = &dev->source.subsys.u.pci;
    int backend = pcisrc->backend;
4726

4727
    /* caller has to assign proper passthrough backend type */
4728
    switch ((virDomainHostdevSubsysPCIBackendType)backend) {
4729 4730 4731 4732
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO:
        virBufferAddLit(&buf, "vfio-pci");
        break;

M
Michal Privoznik 已提交
4733
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_KVM:
4734 4735 4736
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_DEFAULT:
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_XEN:
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_TYPE_LAST:
4737 4738
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("invalid PCI passthrough type '%s'"),
4739
                       virDomainHostdevSubsysPCIBackendTypeToString(backend));
4740
        return NULL;
4741
    }
4742

4743
    virBufferAddLit(&buf, ",host=");
4744 4745
    virBufferAsprintf(&buf,
                      VIR_PCI_DEVICE_ADDRESS_FMT,
4746 4747 4748
                      pcisrc->addr.domain,
                      pcisrc->addr.bus,
                      pcisrc->addr.slot,
4749
                      pcisrc->addr.function);
4750 4751
    virBufferAsprintf(&buf, ",id=%s", dev->info->alias);
    if (dev->info->bootIndex)
4752 4753
        bootIndex = dev->info->bootIndex;
    if (bootIndex)
4754
        virBufferAsprintf(&buf, ",bootindex=%u", bootIndex);
4755
    if (qemuBuildDeviceAddressStr(&buf, def, dev->info, qemuCaps) < 0)
4756
        return NULL;
4757
    if (qemuBuildRomStr(&buf, dev->info) < 0)
4758
        return NULL;
4759

4760 4761 4762 4763 4764
    return virBufferContentAndReset(&buf);
}


char *
4765
qemuBuildUSBHostdevDevStr(const virDomainDef *def,
4766
                          virDomainHostdevDefPtr dev,
4767
                          virQEMUCapsPtr qemuCaps)
4768
{
4769
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4770
    virDomainHostdevSubsysUSBPtr usbsrc = &dev->source.subsys.u.usb;
4771

4772
    if (!dev->missing && !usbsrc->bus && !usbsrc->device) {
4773 4774
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("USB host device is missing bus/device information"));
4775 4776 4777
        return NULL;
    }

4778 4779 4780
    virBufferAddLit(&buf, "usb-host");
    if (!dev->missing) {
        virBufferAsprintf(&buf, ",hostbus=%d,hostaddr=%d",
4781
                          usbsrc->bus, usbsrc->device);
4782 4783
    }
    virBufferAsprintf(&buf, ",id=%s", dev->info->alias);
4784
    if (dev->info->bootIndex)
4785
        virBufferAsprintf(&buf, ",bootindex=%u", dev->info->bootIndex);
4786

4787
    if (qemuBuildDeviceAddressStr(&buf, def, dev->info, qemuCaps) < 0)
4788
        return NULL;
4789 4790

    return virBufferContentAndReset(&buf);
4791 4792 4793
}


4794 4795
static char *
qemuBuildHubDevStr(const virDomainDef *def,
4796
                   virDomainHubDefPtr dev,
4797
                   virQEMUCapsPtr qemuCaps)
M
Marc-André Lureau 已提交
4798
{
4799
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
M
Marc-André Lureau 已提交
4800 4801

    if (dev->type != VIR_DOMAIN_HUB_TYPE_USB) {
4802 4803 4804
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("hub type %s not supported"),
                       virDomainHubTypeToString(dev->type));
4805
        return NULL;
M
Marc-André Lureau 已提交
4806 4807
    }

4808
    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_USB_HUB)) {
4809
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
4810
                       _("usb-hub not supported by QEMU binary"));
4811
        return NULL;
M
Marc-André Lureau 已提交
4812 4813 4814 4815
    }

    virBufferAddLit(&buf, "usb-hub");
    virBufferAsprintf(&buf, ",id=%s", dev->info.alias);
4816
    if (qemuBuildDeviceAddressStr(&buf, def, &dev->info, qemuCaps) < 0)
4817
        return NULL;
M
Marc-André Lureau 已提交
4818 4819 4820 4821 4822

    return virBufferContentAndReset(&buf);
}


4823 4824 4825 4826 4827 4828 4829 4830 4831
static int
qemuBuildHubCommandLine(virCommandPtr cmd,
                        const virDomainDef *def,
                        virQEMUCapsPtr qemuCaps)
{
    size_t i;

    for (i = 0; i < def->nhubs; i++) {
        virDomainHubDefPtr hub = def->hubs[i];
4832
        g_autofree char *optstr = NULL;
4833 4834 4835 4836 4837 4838 4839 4840 4841 4842 4843

        virCommandAddArg(cmd, "-device");
        if (!(optstr = qemuBuildHubDevStr(def, hub, qemuCaps)))
            return -1;
        virCommandAddArg(cmd, optstr);
    }

    return 0;
}


4844
static char *
J
Ján Tomko 已提交
4845
qemuBuildSCSIHostHostdevDrvStr(virDomainHostdevDefPtr dev)
4846
{
4847
    virDomainHostdevSubsysSCSIPtr scsisrc = &dev->source.subsys.u.scsi;
4848
    virDomainHostdevSubsysSCSIHostPtr scsihostsrc = &scsisrc->u.host;
J
Ján Tomko 已提交
4849 4850 4851 4852 4853 4854

    return virSCSIDeviceGetSgName(NULL,
                                  scsihostsrc->adapter,
                                  scsihostsrc->bus,
                                  scsihostsrc->target,
                                  scsihostsrc->unit);
4855 4856 4857
}

static char *
4858 4859
qemuBuildSCSIiSCSIHostdevDrvStr(virDomainHostdevDefPtr dev,
                                virQEMUCapsPtr qemuCaps)
4860
{
4861
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4862
    g_autofree char *netsource = NULL;
J
Ján Tomko 已提交
4863
    g_autoptr(virJSONValue) srcprops = NULL;
4864 4865
    virDomainHostdevSubsysSCSIPtr scsisrc = &dev->source.subsys.u.scsi;
    virDomainHostdevSubsysSCSIiSCSIPtr iscsisrc = &scsisrc->u.iscsi;
4866 4867
    qemuDomainStorageSourcePrivatePtr srcPriv =
        QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(iscsisrc->src);
4868

4869 4870
    if (qemuDiskSourceNeedsProps(iscsisrc->src, qemuCaps)) {
        if (!(srcprops = qemuDiskSourceGetProps(iscsisrc->src)))
4871
            return NULL;
4872
        if (!(netsource = virQEMUBuildDriveCommandlineFromJSON(srcprops)))
4873
            return NULL;
4874
        virBufferAsprintf(&buf, "%s,if=none,format=raw", netsource);
4875 4876 4877 4878
    } else {
        /* Rather than pull what we think we want - use the network disk code */
        if (!(netsource = qemuBuildNetworkDriveStr(iscsisrc->src, srcPriv ?
                                                   srcPriv->secinfo : NULL)))
4879
            return NULL;
4880 4881 4882
        virBufferAddLit(&buf, "file=");
        virQEMUBuildBufferEscapeComma(&buf, netsource);
        virBufferAddLit(&buf, ",if=none,format=raw");
4883
    }
4884

4885
    return virBufferContentAndReset(&buf);
4886 4887
}

4888 4889 4890 4891 4892 4893
char *
qemuBuildSCSIVHostHostdevDevStr(const virDomainDef *def,
                           virDomainHostdevDefPtr dev,
                           virQEMUCapsPtr qemuCaps,
                           char *vhostfdName)
{
4894
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4895 4896 4897 4898 4899
    virDomainHostdevSubsysSCSIVHostPtr hostsrc = &dev->source.subsys.u.scsi_host;

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VHOST_SCSI)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("This QEMU doesn't support vhost-scsi devices"));
4900
        return NULL;
4901 4902
    }

4903
    if (qemuBuildVirtioDevStr(&buf, "vhost-scsi", qemuCaps,
4904
                              VIR_DOMAIN_DEVICE_HOSTDEV, dev) < 0) {
4905
        return NULL;
4906
    }
4907 4908 4909 4910 4911 4912 4913

    virBufferAsprintf(&buf, ",wwpn=%s,vhostfd=%s,id=%s",
                      hostsrc->wwpn,
                      vhostfdName,
                      dev->info->alias);

    if (qemuBuildDeviceAddressStr(&buf, def, dev->info, qemuCaps) < 0)
4914
        return NULL;
4915 4916 4917 4918

    return virBufferContentAndReset(&buf);
}

4919
char *
4920 4921
qemuBuildSCSIHostdevDrvStr(virDomainHostdevDefPtr dev,
                           virQEMUCapsPtr qemuCaps)
4922
{
4923
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4924 4925
    g_autofree char *source = NULL;
    g_autofree char *drivealias = NULL;
4926 4927 4928
    virDomainHostdevSubsysSCSIPtr scsisrc = &dev->source.subsys.u.scsi;

    if (scsisrc->protocol == VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI) {
4929
        if (!(source = qemuBuildSCSIiSCSIHostdevDrvStr(dev, qemuCaps)))
4930
            return NULL;
4931
        virBufferAdd(&buf, source, -1);
4932
    } else {
J
Ján Tomko 已提交
4933
        if (!(source = qemuBuildSCSIHostHostdevDrvStr(dev)))
4934
            return NULL;
4935
        virBufferAsprintf(&buf, "file=/dev/%s,if=none,format=raw", source);
4936
    }
J
John Ferlan 已提交
4937 4938

    if (!(drivealias = qemuAliasFromHostdev(dev)))
4939
        return NULL;
J
John Ferlan 已提交
4940
    virBufferAsprintf(&buf, ",id=%s", drivealias);
4941

4942 4943
    if (dev->readonly)
        virBufferAddLit(&buf, ",readonly=on");
O
Osier Yang 已提交
4944

4945 4946 4947 4948
    return virBufferContentAndReset(&buf);
}

char *
4949
qemuBuildSCSIHostdevDevStr(const virDomainDef *def,
4950
                           virDomainHostdevDefPtr dev)
4951
{
4952
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4953
    int model = -1;
4954
    g_autofree char *driveAlias = NULL;
4955
    const char *contAlias;
4956

4957
    model = qemuDomainFindSCSIControllerModel(def, dev->info);
4958
    if (model < 0)
4959
        return NULL;
4960 4961 4962 4963 4964 4965

    if (model == VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LSILOGIC) {
        if (dev->info->addr.drive.target != 0) {
           virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("target must be 0 for scsi host device "
                             "if its controller model is 'lsilogic'"));
4966
            return NULL;
4967 4968 4969 4970 4971 4972
        }

        if (dev->info->addr.drive.unit > 7) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("unit must be not more than 7 for scsi host "
                             "device if its controller model is 'lsilogic'"));
4973
            return NULL;
4974 4975 4976 4977 4978
        }
    }

    virBufferAddLit(&buf, "scsi-generic");

4979 4980
    if (!(contAlias = virDomainControllerAliasFind(def, VIR_DOMAIN_CONTROLLER_TYPE_SCSI,
                                                   dev->info->addr.drive.controller)))
4981
        return NULL;
4982

4983
    if (model == VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LSILOGIC) {
4984 4985
        virBufferAsprintf(&buf, ",bus=%s.%d,scsi-id=%d",
                          contAlias,
4986 4987 4988
                          dev->info->addr.drive.bus,
                          dev->info->addr.drive.unit);
    } else {
4989 4990
        virBufferAsprintf(&buf, ",bus=%s.0,channel=%d,scsi-id=%d,lun=%d",
                          contAlias,
4991 4992 4993 4994
                          dev->info->addr.drive.bus,
                          dev->info->addr.drive.target,
                          dev->info->addr.drive.unit);
    }
4995

J
John Ferlan 已提交
4996
    if (!(driveAlias = qemuAliasFromHostdev(dev)))
4997
        return NULL;
J
John Ferlan 已提交
4998
    virBufferAsprintf(&buf, ",drive=%s,id=%s", driveAlias, dev->info->alias);
4999

5000
    if (dev->info->bootIndex)
5001
        virBufferAsprintf(&buf, ",bootindex=%u", dev->info->bootIndex);
5002

5003 5004
    return virBufferContentAndReset(&buf);
}
5005

5006 5007 5008
static int
qemuBuildChrChardevFileStr(virLogManagerPtr logManager,
                           virCommandPtr cmd,
5009
                           const virDomainDef *def,
5010 5011 5012 5013 5014
                           virBufferPtr buf,
                           const char *filearg, const char *fileval,
                           const char *appendarg, int appendval)
{
    if (logManager) {
5015 5016
        g_autofree char *fdset = NULL;
        g_autofree char *fdpath = NULL;
5017 5018 5019
        int flags = 0;
        int logfd;

5020 5021
        if (appendval == VIR_TRISTATE_SWITCH_ABSENT ||
            appendval == VIR_TRISTATE_SWITCH_OFF)
5022 5023 5024 5025 5026 5027 5028 5029 5030 5031 5032 5033 5034 5035 5036 5037 5038 5039 5040 5041 5042 5043 5044
            flags |= VIR_LOG_MANAGER_PROTOCOL_DOMAIN_OPEN_LOG_FILE_TRUNCATE;

        if ((logfd = virLogManagerDomainOpenLogFile(logManager,
                                                    "qemu",
                                                    def->uuid,
                                                    def->name,
                                                    fileval,
                                                    flags,
                                                    NULL, NULL)) < 0)
            return -1;

        virCommandPassFD(cmd, logfd, VIR_COMMAND_PASS_FD_CLOSE_PARENT);
        if (!(fdset = qemuVirCommandGetFDSet(cmd, logfd)))
            return -1;

        virCommandAddArg(cmd, "-add-fd");
        virCommandAddArg(cmd, fdset);

        if (!(fdpath = qemuVirCommandGetDevSet(cmd, logfd)))
            return -1;

        virBufferAsprintf(buf, ",%s=%s,%s=on", filearg, fdpath, appendarg);
    } else {
5045 5046
        virBufferAsprintf(buf, ",%s=", filearg);
        virQEMUBuildBufferEscapeComma(buf, fileval);
5047 5048 5049 5050 5051 5052 5053 5054 5055
        if (appendval != VIR_TRISTATE_SWITCH_ABSENT) {
            virBufferAsprintf(buf, ",%s=%s", appendarg,
                              virTristateSwitchTypeToString(appendval));
        }
    }

    return 0;
}

5056 5057 5058 5059 5060 5061 5062 5063 5064 5065 5066 5067 5068

static void
qemuBuildChrChardevReconnectStr(virBufferPtr buf,
                                const virDomainChrSourceReconnectDef *def)
{
    if (def->enabled == VIR_TRISTATE_BOOL_YES) {
        virBufferAsprintf(buf, ",reconnect=%u", def->timeout);
    } else if (def->enabled == VIR_TRISTATE_BOOL_NO) {
        virBufferAddLit(buf, ",reconnect=0");
    }
}


5069 5070 5071 5072 5073 5074 5075 5076 5077 5078 5079 5080 5081 5082 5083
int
qemuOpenChrChardevUNIXSocket(const virDomainChrSourceDef *dev)
{
    struct sockaddr_un addr;
    socklen_t addrlen = sizeof(addr);
    int fd;

    if ((fd = socket(AF_UNIX, SOCK_STREAM, 0)) < 0) {
        virReportSystemError(errno, "%s",
                             _("Unable to create UNIX socket"));
        goto error;
    }

    memset(&addr, 0, sizeof(addr));
    addr.sun_family = AF_UNIX;
5084
    if (virStrcpyStatic(addr.sun_path, dev->data.nix.path) < 0) {
5085 5086 5087 5088 5089 5090 5091 5092 5093 5094 5095 5096 5097 5098 5099 5100 5101 5102 5103 5104 5105 5106 5107 5108 5109 5110 5111
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("UNIX socket path '%s' too long"),
                       dev->data.nix.path);
        goto error;
    }

    if (unlink(dev->data.nix.path) < 0 && errno != ENOENT) {
        virReportSystemError(errno,
                             _("Unable to unlink %s"),
                             dev->data.nix.path);
        goto error;
    }

    if (bind(fd, (struct sockaddr *)&addr, addrlen) < 0) {
        virReportSystemError(errno,
                             _("Unable to bind to UNIX socket path '%s'"),
                             dev->data.nix.path);
        goto error;
    }

    if (listen(fd, 1) < 0) {
        virReportSystemError(errno,
                             _("Unable to listen to UNIX socket path '%s'"),
                             dev->data.nix.path);
        goto error;
    }

5112 5113 5114 5115 5116 5117
    /* We run QEMU with umask 0002. Compensate for the umask
     * libvirtd might be running under to get the same permission
     * QEMU would have. */
    if (virFileUpdatePerm(dev->data.nix.path, 0002, 0664) < 0)
        goto error;

5118 5119 5120 5121 5122 5123 5124
    return fd;

 error:
    VIR_FORCE_CLOSE(fd);
    return -1;
}

5125 5126 5127 5128

enum {
    QEMU_BUILD_CHARDEV_TCP_NOWAIT = (1 << 0),
    QEMU_BUILD_CHARDEV_FILE_LOGD  = (1 << 1),
5129
    QEMU_BUILD_CHARDEV_UNIX_FD_PASS = (1 << 2),
5130 5131
};

5132 5133
/* This function outputs a -chardev command line option which describes only the
 * host side of the character device */
5134
static char *
5135
qemuBuildChrChardevStr(virLogManagerPtr logManager,
5136
                       virSecurityManagerPtr secManager,
5137
                       virCommandPtr cmd,
5138
                       virQEMUDriverConfigPtr cfg,
5139
                       const virDomainDef *def,
5140
                       const virDomainChrSourceDef *dev,
5141
                       const char *alias,
5142
                       virQEMUCapsPtr qemuCaps,
5143
                       unsigned int flags)
5144
{
5145
    qemuDomainChrSourcePrivatePtr chrSourcePriv = QEMU_DOMAIN_CHR_SOURCE_PRIVATE(dev);
5146
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5147
    bool telnet;
5148
    g_autofree char *charAlias = NULL;
5149 5150

    if (!(charAlias = qemuAliasChardevFromDevAlias(alias)))
5151
        return NULL;
5152

5153
    switch (dev->type) {
5154
    case VIR_DOMAIN_CHR_TYPE_NULL:
5155
        virBufferAsprintf(&buf, "null,id=%s", charAlias);
5156 5157 5158
        break;

    case VIR_DOMAIN_CHR_TYPE_VC:
5159
        virBufferAsprintf(&buf, "vc,id=%s", charAlias);
5160 5161 5162
        break;

    case VIR_DOMAIN_CHR_TYPE_PTY:
5163
        virBufferAsprintf(&buf, "pty,id=%s", charAlias);
5164 5165 5166
        break;

    case VIR_DOMAIN_CHR_TYPE_DEV:
5167
        virBufferAsprintf(&buf, "%s,id=%s,path=",
5168
                          STRPREFIX(alias, "parallel") ? "parport" : "tty",
5169 5170
                          charAlias);
        virQEMUBuildBufferEscapeComma(&buf, dev->data.file.path);
5171 5172 5173
        break;

    case VIR_DOMAIN_CHR_TYPE_FILE:
5174
        virBufferAsprintf(&buf, "file,id=%s", charAlias);
5175

5176 5177 5178 5179
        if (dev->data.file.append != VIR_TRISTATE_SWITCH_ABSENT &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_CHARDEV_FILE_APPEND)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("append not supported in this QEMU binary"));
5180
            return NULL;
5181
        }
5182 5183
        if (qemuBuildChrChardevFileStr(flags & QEMU_BUILD_CHARDEV_FILE_LOGD ?
                                       logManager : NULL,
5184
                                       cmd, def, &buf,
5185 5186
                                       "path", dev->data.file.path,
                                       "append", dev->data.file.append) < 0)
5187
            return NULL;
5188 5189 5190
        break;

    case VIR_DOMAIN_CHR_TYPE_PIPE:
5191 5192
        virBufferAsprintf(&buf, "pipe,id=%s,path=", charAlias);
        virQEMUBuildBufferEscapeComma(&buf, dev->data.file.path);
5193 5194 5195
        break;

    case VIR_DOMAIN_CHR_TYPE_STDIO:
5196
        virBufferAsprintf(&buf, "stdio,id=%s", charAlias);
5197 5198
        break;

5199 5200 5201 5202 5203 5204 5205 5206 5207 5208 5209 5210
    case VIR_DOMAIN_CHR_TYPE_UDP: {
        const char *connectHost = dev->data.udp.connectHost;
        const char *bindHost = dev->data.udp.bindHost;
        const char *bindService = dev->data.udp.bindService;

        if (connectHost == NULL)
            connectHost = "";
        if (bindHost == NULL)
            bindHost = "";
        if (bindService == NULL)
            bindService = "0";

5211
        virBufferAsprintf(&buf,
5212
                          "udp,id=%s,host=%s,port=%s,localaddr=%s,"
5213
                          "localport=%s",
5214
                          charAlias,
5215
                          connectHost,
5216
                          dev->data.udp.connectService,
5217
                          bindHost, bindService);
5218
        break;
5219
    }
5220 5221
    case VIR_DOMAIN_CHR_TYPE_TCP:
        telnet = dev->data.tcp.protocol == VIR_DOMAIN_CHR_TCP_PROTOCOL_TELNET;
5222
        virBufferAsprintf(&buf,
5223 5224
                          "socket,id=%s,host=%s,port=%s%s",
                          charAlias,
5225 5226
                          dev->data.tcp.host,
                          dev->data.tcp.service,
5227 5228
                          telnet ? ",telnet" : "");

5229 5230 5231 5232 5233
        if (dev->data.tcp.listen) {
            virBufferAddLit(&buf, ",server");
            if (flags & QEMU_BUILD_CHARDEV_TCP_NOWAIT)
                virBufferAddLit(&buf, ",nowait");
        }
5234

5235 5236
        qemuBuildChrChardevReconnectStr(&buf, &dev->data.tcp.reconnect);

5237
        if (dev->data.tcp.haveTLS == VIR_TRISTATE_BOOL_YES) {
5238
            g_autofree char *objalias = NULL;
5239
            const char *tlsCertEncSecAlias = NULL;
5240

5241 5242 5243 5244
            /* Add the secret object first if necessary. The
             * secinfo is added only to a TCP serial device during
             * qemuDomainSecretChardevPrepare. Subsequently called
             * functions can just check the config fields */
5245 5246 5247
            if (chrSourcePriv && chrSourcePriv->secinfo) {
                if (qemuBuildObjectSecretCommandLine(cmd,
                                                     chrSourcePriv->secinfo) < 0)
5248
                    return NULL;
5249 5250 5251

                tlsCertEncSecAlias = chrSourcePriv->secinfo->s.aes.alias;
            }
5252

5253
            if (!(objalias = qemuAliasTLSObjFromSrcAlias(charAlias)))
5254
                return NULL;
5255

J
John Ferlan 已提交
5256 5257 5258
            if (qemuBuildTLSx509CommandLine(cmd, cfg->chardevTLSx509certdir,
                                            dev->data.tcp.listen,
                                            cfg->chardevTLSx509verify,
5259
                                            tlsCertEncSecAlias,
5260
                                            objalias, qemuCaps) < 0) {
5261
                return NULL;
5262
            }
5263

J
John Ferlan 已提交
5264 5265
            virBufferAsprintf(&buf, ",tls-creds=%s", objalias);
        }
5266 5267 5268
        break;

    case VIR_DOMAIN_CHR_TYPE_UNIX:
5269
        virBufferAsprintf(&buf, "socket,id=%s", charAlias);
5270 5271
        if (dev->data.nix.listen &&
            (flags & QEMU_BUILD_CHARDEV_UNIX_FD_PASS) &&
5272
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_CHARDEV_FD_PASS)) {
5273
            if (qemuSecuritySetSocketLabel(secManager, (virDomainDefPtr)def) < 0)
5274
                return NULL;
5275
            int fd = qemuOpenChrChardevUNIXSocket(dev);
5276 5277
            if (qemuSecurityClearSocketLabel(secManager, (virDomainDefPtr)def) < 0) {
                VIR_FORCE_CLOSE(fd);
5278
                return NULL;
5279
            }
5280
            if (fd < 0)
5281
                return NULL;
5282

5283
            virBufferAsprintf(&buf, ",fd=%d", fd);
5284 5285 5286

            virCommandPassFD(cmd, fd, VIR_COMMAND_PASS_FD_CLOSE_PARENT);
        } else {
5287
            virBufferAddLit(&buf, ",path=");
5288 5289
            virQEMUBuildBufferEscapeComma(&buf, dev->data.nix.path);
        }
5290 5291 5292 5293 5294
        if (dev->data.nix.listen) {
            virBufferAddLit(&buf, ",server");
            if (flags & QEMU_BUILD_CHARDEV_TCP_NOWAIT)
                virBufferAddLit(&buf, ",nowait");
        }
5295 5296

        qemuBuildChrChardevReconnectStr(&buf, &dev->data.nix.reconnect);
5297
        break;
5298 5299

    case VIR_DOMAIN_CHR_TYPE_SPICEVMC:
5300
        virBufferAsprintf(&buf, "spicevmc,id=%s,name=%s", charAlias,
E
Eric Blake 已提交
5301
                          virDomainChrSpicevmcTypeToString(dev->data.spicevmc));
5302 5303
        break;

5304
    case VIR_DOMAIN_CHR_TYPE_SPICEPORT:
5305
        virBufferAsprintf(&buf, "spiceport,id=%s,name=%s", charAlias,
5306 5307 5308
                          dev->data.spiceport.channel);
        break;

5309
    default:
5310 5311 5312
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("unsupported chardev '%s'"),
                       virDomainChrTypeToString(dev->type));
5313
        return NULL;
5314 5315
    }

5316 5317 5318 5319
    if (dev->logfile) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CHARDEV_LOGFILE)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("logfile not supported in this QEMU binary"));
5320
            return NULL;
5321
        }
5322 5323 5324
        if (qemuBuildChrChardevFileStr(logManager, cmd, def, &buf,
                                       "logfile", dev->logfile,
                                       "logappend", dev->logappend) < 0)
5325
            return NULL;
5326 5327
    }

5328
    return virBufferContentAndReset(&buf);
5329 5330
}

5331

5332 5333 5334 5335 5336 5337 5338 5339 5340 5341 5342 5343 5344
static const char *
qemuBuildHostdevMdevModelTypeString(virDomainHostdevSubsysMediatedDevPtr mdev)
{
    /* when the 'ramfb' attribute is set, we must use the nohotplug variant
     * rather than 'vfio-pci' */
    if (mdev->model == VIR_MDEV_MODEL_TYPE_VFIO_PCI &&
        mdev->ramfb == VIR_TRISTATE_SWITCH_ON)
        return "vfio-pci-nohotplug";

    return virMediatedDeviceModelTypeToString(mdev->model);
}


5345 5346 5347 5348 5349
char *
qemuBuildHostdevMediatedDevStr(const virDomainDef *def,
                               virDomainHostdevDefPtr dev,
                               virQEMUCapsPtr qemuCaps)
{
5350
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5351
    virDomainHostdevSubsysMediatedDevPtr mdevsrc = &dev->source.subsys.u.mdev;
5352
    g_autofree char *mdevPath = NULL;
5353
    const char *dev_str = NULL;
5354 5355

    if (!(mdevPath = virMediatedDeviceGetSysfsPath(mdevsrc->uuidstr)))
5356
        return NULL;
5357

5358
    dev_str = qemuBuildHostdevMdevModelTypeString(mdevsrc);
5359 5360

    if (!dev_str)
5361
        return NULL;
5362 5363

    virBufferAdd(&buf, dev_str, -1);
5364
    virBufferAsprintf(&buf, ",id=%s,sysfsdev=%s", dev->info->alias, mdevPath);
5365

5366 5367 5368 5369
    if (mdevsrc->display != VIR_TRISTATE_SWITCH_ABSENT)
        virBufferAsprintf(&buf, ",display=%s",
                          virTristateSwitchTypeToString(mdevsrc->display));

5370
    if (qemuBuildDeviceAddressStr(&buf, def, dev->info, qemuCaps) < 0)
5371
        return NULL;
5372

5373 5374 5375
    if (dev->info->bootIndex)
        virBufferAsprintf(&buf, ",bootindex=%u", dev->info->bootIndex);

5376 5377 5378 5379
    if (mdevsrc->ramfb == VIR_TRISTATE_SWITCH_ON)
        virBufferAsprintf(&buf, ",ramfb=%s",
                          virTristateSwitchTypeToString(mdevsrc->ramfb));

5380
    return virBufferContentAndReset(&buf);
5381
}
5382

5383 5384 5385 5386
static int
qemuBuildHostdevCommandLine(virCommandPtr cmd,
                            const virDomainDef *def,
                            virQEMUCapsPtr qemuCaps,
5387
                            unsigned int *bootHostdevNet)
5388 5389 5390 5391 5392 5393
{
    size_t i;

    for (i = 0; i < def->nhostdevs; i++) {
        virDomainHostdevDefPtr hostdev = def->hostdevs[i];
        virDomainHostdevSubsysPtr subsys = &hostdev->source.subsys;
5394
        g_autofree char *devstr = NULL;
5395 5396 5397 5398 5399

        /* USB */
        if (hostdev->mode == VIR_DOMAIN_HOSTDEV_MODE_SUBSYS &&
            subsys->type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB) {

5400 5401 5402 5403 5404
            virCommandAddArg(cmd, "-device");
            if (!(devstr =
                  qemuBuildUSBHostdevDevStr(def, hostdev, qemuCaps)))
                return -1;
            virCommandAddArg(cmd, devstr);
5405 5406 5407 5408 5409 5410 5411 5412 5413 5414 5415 5416 5417 5418 5419 5420
        }

        /* PCI */
        if (hostdev->mode == VIR_DOMAIN_HOSTDEV_MODE_SUBSYS &&
            subsys->type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI) {
            int backend = subsys->u.pci.backend;

            if (backend == VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO) {
                if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VFIO_PCI)) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("VFIO PCI device assignment is not "
                                     "supported by this version of qemu"));
                    return -1;
                }
            }

5421
            unsigned int bootIndex = hostdev->info->bootIndex;
5422

5423 5424 5425
            /* bootNet will be non-0 if boot order was set and no other
             * net devices were encountered
             */
5426
            if (hostdev->parentnet && bootIndex == 0) {
5427 5428 5429
                bootIndex = *bootHostdevNet;
                *bootHostdevNet = 0;
            }
5430 5431 5432 5433

            if (qemuCommandAddExtDevice(cmd, hostdev->info) < 0)
                return -1;

5434
            virCommandAddArg(cmd, "-device");
M
Michal Privoznik 已提交
5435
            devstr = qemuBuildPCIHostdevDevStr(def, hostdev, bootIndex, qemuCaps);
5436 5437 5438
            if (!devstr)
                return -1;
            virCommandAddArg(cmd, devstr);
5439 5440 5441
        }

        /* SCSI */
5442
        if (virHostdevIsSCSIDevice(hostdev)) {
5443 5444
            virDomainHostdevSubsysSCSIPtr scsisrc =
                &hostdev->source.subsys.u.scsi;
5445
            g_autofree char *drvstr = NULL;
5446 5447 5448 5449 5450 5451 5452 5453 5454 5455

            if (scsisrc->protocol == VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI) {
                virDomainHostdevSubsysSCSIiSCSIPtr iscsisrc =
                    &scsisrc->u.iscsi;
                qemuDomainStorageSourcePrivatePtr srcPriv =
                    QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(iscsisrc->src);

                if (qemuBuildDiskSecinfoCommandLine(cmd, srcPriv ?
                                                    srcPriv->secinfo :
                                                    NULL) < 0)
5456
                    return -1;
5457
            }
5458

5459 5460
            virCommandAddArg(cmd, "-drive");
            if (!(drvstr = qemuBuildSCSIHostdevDrvStr(hostdev, qemuCaps)))
5461
                return -1;
5462 5463 5464 5465 5466 5467
            virCommandAddArg(cmd, drvstr);

            virCommandAddArg(cmd, "-device");
            if (!(devstr = qemuBuildSCSIHostdevDevStr(def, hostdev)))
                return -1;
            virCommandAddArg(cmd, devstr);
5468
        }
5469 5470 5471 5472 5473 5474

        /* SCSI_host */
        if (hostdev->mode == VIR_DOMAIN_HOSTDEV_MODE_SUBSYS &&
            subsys->type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI_HOST) {
            if (hostdev->source.subsys.u.scsi_host.protocol ==
                VIR_DOMAIN_HOSTDEV_SUBSYS_SCSI_HOST_PROTOCOL_TYPE_VHOST) {
5475
                g_autofree char *vhostfdName = NULL;
5476 5477 5478 5479 5480
                int vhostfd = -1;

                if (virSCSIVHostOpenVhostSCSI(&vhostfd) < 0)
                    return -1;

5481
                vhostfdName = g_strdup_printf("%d", vhostfd);
5482 5483 5484 5485 5486 5487 5488 5489

                virCommandPassFD(cmd, vhostfd,
                                 VIR_COMMAND_PASS_FD_CLOSE_PARENT);

                virCommandAddArg(cmd, "-device");
                if (!(devstr = qemuBuildSCSIVHostHostdevDevStr(def,
                                                               hostdev,
                                                               qemuCaps,
5490
                                                               vhostfdName)))
5491 5492
                    return -1;

5493
                virCommandAddArg(cmd, devstr);
5494 5495
            }
        }
5496 5497

        /* MDEV */
5498
        if (virHostdevIsMdevDevice(hostdev)) {
5499 5500 5501
            virDomainHostdevSubsysMediatedDevPtr mdevsrc = &subsys->u.mdev;

            switch ((virMediatedDeviceModelType) mdevsrc->model) {
5502 5503 5504 5505 5506 5507 5508
            case VIR_MDEV_MODEL_TYPE_VFIO_PCI:
                if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VFIO_PCI)) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("VFIO PCI device assignment is not "
                                     "supported by this version of QEMU"));
                    return -1;
                }
5509

5510 5511 5512 5513 5514 5515 5516 5517 5518
                break;
            case VIR_MDEV_MODEL_TYPE_VFIO_CCW:
                if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VFIO_CCW)) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("VFIO CCW device assignment is not "
                                     "supported by this version of QEMU"));
                    return -1;
                }
                break;
B
Boris Fiuczynski 已提交
5519 5520 5521 5522 5523 5524 5525 5526
            case VIR_MDEV_MODEL_TYPE_VFIO_AP:
                if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VFIO_AP)) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("VFIO AP device assignment is not "
                                     "supported by this version of QEMU"));
                    return -1;
                }
                break;
5527
            case VIR_MDEV_MODEL_TYPE_LAST:
5528 5529 5530
            default:
                virReportEnumRangeError(virMediatedDeviceModelType,
                                        subsys->u.mdev.model);
5531 5532 5533 5534 5535 5536 5537 5538 5539
                return -1;
            }

            virCommandAddArg(cmd, "-device");
            if (!(devstr =
                  qemuBuildHostdevMediatedDevStr(def, hostdev, qemuCaps)))
                return -1;
            virCommandAddArg(cmd, devstr);
        }
5540 5541 5542 5543 5544
    }

    return 0;
}

5545

5546
static int
5547
qemuBuildMonitorCommandLine(virLogManagerPtr logManager,
5548
                            virSecurityManagerPtr secManager,
5549
                            virCommandPtr cmd,
5550
                            virQEMUDriverConfigPtr cfg,
5551
                            virDomainDefPtr def,
5552
                            qemuDomainObjPrivatePtr priv)
5553
{
5554
    g_autofree char *chrdev = NULL;
5555 5556
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
5557 5558
    if (priv->chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
5559

5560
    if (!priv->monConfig)
5561 5562
        return 0;

5563 5564
    if (!(chrdev = qemuBuildChrChardevStr(logManager, secManager,
                                          cmd, cfg, def,
5565
                                          priv->monConfig, "monitor",
5566
                                          priv->qemuCaps, cdevflags)))
5567 5568 5569 5570 5571
        return -1;
    virCommandAddArg(cmd, "-chardev");
    virCommandAddArg(cmd, chrdev);

    virCommandAddArg(cmd, "-mon");
J
Ján Tomko 已提交
5572
    virCommandAddArg(cmd, "chardev=charmonitor,id=monitor,mode=control");
5573 5574 5575 5576 5577

    return 0;
}


5578
static char *
5579
qemuBuildVirtioSerialPortDevStr(const virDomainDef *def,
5580
                                virDomainChrDefPtr dev)
5581
{
5582
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5583 5584
    const char *contAlias;

5585 5586
    switch (dev->deviceType) {
    case VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE:
5587
        virBufferAddLit(&buf, "virtconsole");
5588 5589
        break;
    case VIR_DOMAIN_CHR_DEVICE_TYPE_CHANNEL:
5590
        virBufferAddLit(&buf, "virtserialport");
5591 5592
        break;
    default:
5593 5594
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Cannot use virtio serial for parallel/serial devices"));
5595 5596
        return NULL;
    }
5597

5598
    if (dev->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE &&
5599
        dev->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW &&
5600
        dev->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_S390) {
5601
        /* Check it's a virtio-serial address */
5602
        if (dev->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_SERIAL) {
5603 5604
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("virtio serial device has invalid address type"));
5605
            return NULL;
5606 5607
        }

5608 5609 5610
        contAlias = virDomainControllerAliasFind(def, VIR_DOMAIN_CONTROLLER_TYPE_VIRTIO_SERIAL,
                                                 dev->info.addr.vioserial.controller);
        if (!contAlias)
5611
            return NULL;
5612 5613 5614

        virBufferAsprintf(&buf, ",bus=%s.%d,nr=%d", contAlias,
                          dev->info.addr.vioserial.bus,
5615 5616 5617
                          dev->info.addr.vioserial.port);
    }

5618
    if (dev->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CHANNEL &&
5619
        dev->source->type == VIR_DOMAIN_CHR_TYPE_SPICEVMC &&
5620 5621
        dev->target.name &&
        STRNEQ(dev->target.name, "com.redhat.spice.0")) {
5622 5623 5624
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Unsupported spicevmc target name '%s'"),
                       dev->target.name);
5625
        return NULL;
5626
    }
5627

5628 5629 5630 5631 5632 5633 5634
    virBufferAsprintf(&buf, ",chardev=char%s,id=%s",
                      dev->info.alias, dev->info.alias);
    if (dev->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CHANNEL &&
        (dev->source->type == VIR_DOMAIN_CHR_TYPE_SPICEVMC ||
         dev->target.name)) {
        virBufferAsprintf(&buf, ",name=%s", dev->target.name
                          ? dev->target.name : "com.redhat.spice.0");
5635 5636 5637 5638 5639
    }

    return virBufferContentAndReset(&buf);
}

5640 5641 5642
static char *
qemuBuildSclpDevStr(virDomainChrDefPtr dev)
{
5643
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5644 5645 5646 5647 5648 5649 5650 5651 5652 5653 5654 5655
    if (dev->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE) {
        switch (dev->targetType) {
        case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SCLP:
            virBufferAddLit(&buf, "sclpconsole");
            break;
        case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SCLPLM:
            virBufferAddLit(&buf, "sclplmconsole");
            break;
        }
    } else {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Cannot use slcp with devices other than console"));
5656
        return NULL;
5657 5658 5659 5660 5661 5662 5663
    }
    virBufferAsprintf(&buf, ",chardev=char%s,id=%s",
                      dev->info.alias, dev->info.alias);

    return virBufferContentAndReset(&buf);
}

5664 5665

static int
5666
qemuBuildRNGBackendChrdevStr(virLogManagerPtr logManager,
5667
                             virSecurityManagerPtr secManager,
5668
                             virCommandPtr cmd,
5669
                             virQEMUDriverConfigPtr cfg,
5670
                             const virDomainDef *def,
5671
                             virDomainRNGDefPtr rng,
5672
                             virQEMUCapsPtr qemuCaps,
5673 5674
                             char **chr,
                             bool chardevStdioLogd)
5675
{
5676 5677
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
5678 5679 5680

    *chr = NULL;

5681 5682
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
5683 5684 5685 5686 5687 5688 5689 5690

    switch ((virDomainRNGBackend) rng->backend) {
    case VIR_DOMAIN_RNG_BACKEND_RANDOM:
    case VIR_DOMAIN_RNG_BACKEND_LAST:
        /* no chardev backend is needed */
        return 0;

    case VIR_DOMAIN_RNG_BACKEND_EGD:
5691 5692
        if (!(*chr = qemuBuildChrChardevStr(logManager, secManager,
                                            cmd, cfg, def,
5693
                                            rng->source.chardev,
5694 5695
                                            rng->info.alias, qemuCaps,
                                            cdevflags)))
5696 5697 5698 5699 5700 5701 5702
            return -1;
    }

    return 0;
}


5703
int
5704 5705 5706 5707
qemuBuildRNGBackendProps(virDomainRNGDefPtr rng,
                         virQEMUCapsPtr qemuCaps,
                         virJSONValuePtr *props)
{
5708 5709
    g_autofree char *objAlias = NULL;
    g_autofree char *charBackendAlias = NULL;
5710

5711
    objAlias = g_strdup_printf("obj%s", rng->info.alias);
5712

5713
    switch ((virDomainRNGBackend) rng->backend) {
5714 5715 5716 5717
    case VIR_DOMAIN_RNG_BACKEND_RANDOM:
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_RNG_RANDOM)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this qemu doesn't support the rng-random "
5718
                             "backend"));
5719
            return -1;
5720 5721
        }

5722 5723 5724
        if (qemuMonitorCreateObjectProps(props, "rng-random", objAlias,
                                         "s:filename", rng->source.file,
                                         NULL) < 0)
5725
            return -1;
5726

5727 5728 5729
        break;

    case VIR_DOMAIN_RNG_BACKEND_EGD:
5730 5731 5732 5733
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_RNG_EGD)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this qemu doesn't support the rng-egd "
                             "backend"));
5734
            return -1;
5735 5736
        }

5737
        if (!(charBackendAlias = qemuAliasChardevFromDevAlias(rng->info.alias)))
5738
            return -1;
5739

5740 5741 5742
        if (qemuMonitorCreateObjectProps(props, "rng-egd", objAlias,
                                         "s:chardev", charBackendAlias,
                                         NULL) < 0)
5743
            return -1;
5744

5745 5746 5747
        break;

    case VIR_DOMAIN_RNG_BACKEND_LAST:
5748 5749
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("unknown rng-random backend"));
5750
        return -1;
5751 5752
    }

5753
    return 0;
5754 5755 5756
}


5757
char *
5758
qemuBuildRNGDevStr(const virDomainDef *def,
5759 5760
                   virDomainRNGDefPtr dev,
                   virQEMUCapsPtr qemuCaps)
5761
{
5762
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5763

5764
    if (!qemuDomainCheckCCWS390AddressSupport(def, &dev->info, qemuCaps,
5765
                                              dev->source.file))
5766
        return NULL;
5767

5768
    if (qemuBuildVirtioDevStr(&buf, "virtio-rng", qemuCaps,
5769
                              VIR_DOMAIN_DEVICE_RNG, dev) < 0) {
5770
        return NULL;
5771
    }
5772 5773 5774

    virBufferAsprintf(&buf, ",rng=obj%s,id=%s",
                      dev->info.alias, dev->info.alias);
5775

5776 5777 5778 5779 5780 5781 5782 5783
    if (dev->rate > 0) {
        virBufferAsprintf(&buf, ",max-bytes=%u", dev->rate);
        if (dev->period)
            virBufferAsprintf(&buf, ",period=%u", dev->period);
        else
            virBufferAddLit(&buf, ",period=1000");
    }

5784
    if (qemuBuildVirtioOptionsStr(&buf, dev->virtio, qemuCaps) < 0)
5785
        return NULL;
5786

5787
    if (qemuBuildDeviceAddressStr(&buf, def, &dev->info, qemuCaps) < 0)
5788
        return NULL;
5789

5790
    return virBufferContentAndReset(&buf);
5791 5792 5793
}


5794 5795
static int
qemuBuildRNGCommandLine(virLogManagerPtr logManager,
5796
                        virSecurityManagerPtr secManager,
5797
                        virCommandPtr cmd,
5798
                        virQEMUDriverConfigPtr cfg,
5799
                        const virDomainDef *def,
5800 5801
                        virQEMUCapsPtr qemuCaps,
                        bool chardevStdioLogd)
5802 5803 5804 5805
{
    size_t i;

    for (i = 0; i < def->nrngs; i++) {
J
Ján Tomko 已提交
5806
        g_autoptr(virJSONValue) props = NULL;
5807
        virBuffer buf = VIR_BUFFER_INITIALIZER;
5808
        virDomainRNGDefPtr rng = def->rngs[i];
5809 5810
        g_autofree char *chardev = NULL;
        g_autofree char *devstr = NULL;
5811
        int rc;
5812 5813 5814 5815 5816 5817 5818 5819

        if (!rng->info.alias) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("RNG device is missing alias"));
            return -1;
        }

        /* possibly add character device for backend */
5820
        if (qemuBuildRNGBackendChrdevStr(logManager, secManager, cmd, cfg, def,
5821
                                         rng, qemuCaps, &chardev,
5822
                                         chardevStdioLogd) < 0)
5823 5824
            return -1;

5825 5826
        if (chardev)
            virCommandAddArgList(cmd, "-chardev", chardev, NULL);
5827

5828
        if (qemuBuildRNGBackendProps(rng, qemuCaps, &props) < 0)
5829 5830
            return -1;

5831 5832 5833 5834 5835 5836 5837
        rc = virQEMUBuildObjectCommandlineFromJSON(&buf, props);

        if (rc < 0)
            return -1;

        virCommandAddArg(cmd, "-object");
        virCommandAddArgBuffer(cmd, &buf);
5838 5839

        /* add the device */
5840 5841 5842
        if (qemuCommandAddExtDevice(cmd, &rng->info) < 0)
            return -1;

5843
        if (!(devstr = qemuBuildRNGDevStr(def, rng, qemuCaps)))
5844
            return -1;
5845
        virCommandAddArgList(cmd, "-device", devstr, NULL);
5846 5847 5848 5849 5850 5851
    }

    return 0;
}


5852 5853
static char *
qemuBuildSmbiosBiosStr(virSysinfoBIOSDefPtr def)
5854
{
5855
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5856

5857
    if (!def)
5858
        return NULL;
5859 5860 5861 5862

    virBufferAddLit(&buf, "type=0");

    /* 0:Vendor */
5863 5864 5865 5866
    if (def->vendor) {
        virBufferAddLit(&buf, ",vendor=");
        virQEMUBuildBufferEscapeComma(&buf, def->vendor);
    }
5867
    /* 0:BIOS Version */
5868 5869 5870 5871
    if (def->version) {
        virBufferAddLit(&buf, ",version=");
        virQEMUBuildBufferEscapeComma(&buf, def->version);
    }
5872
    /* 0:BIOS Release Date */
5873 5874 5875 5876
    if (def->date) {
        virBufferAddLit(&buf, ",date=");
        virQEMUBuildBufferEscapeComma(&buf, def->date);
    }
5877
    /* 0:System BIOS Major Release and 0:System BIOS Minor Release */
5878 5879 5880 5881
    if (def->release) {
        virBufferAddLit(&buf, ",release=");
        virQEMUBuildBufferEscapeComma(&buf, def->release);
    }
5882 5883 5884 5885

    return virBufferContentAndReset(&buf);
}

5886 5887 5888 5889

static char *
qemuBuildSmbiosSystemStr(virSysinfoSystemDefPtr def,
                         bool skip_uuid)
5890
{
5891
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5892

5893 5894 5895 5896
    if (!def ||
        (!def->manufacturer && !def->product && !def->version &&
         !def->serial && (!def->uuid || skip_uuid) &&
         def->sku && !def->family))
5897 5898 5899 5900 5901
        return NULL;

    virBufferAddLit(&buf, "type=1");

    /* 1:Manufacturer */
5902 5903 5904 5905
    if (def->manufacturer) {
        virBufferAddLit(&buf, ",manufacturer=");
        virQEMUBuildBufferEscapeComma(&buf, def->manufacturer);
    }
5906
     /* 1:Product Name */
5907 5908 5909 5910
    if (def->product) {
        virBufferAddLit(&buf, ",product=");
        virQEMUBuildBufferEscapeComma(&buf, def->product);
    }
5911
    /* 1:Version */
5912 5913 5914 5915
    if (def->version) {
        virBufferAddLit(&buf, ",version=");
        virQEMUBuildBufferEscapeComma(&buf, def->version);
    }
5916
    /* 1:Serial Number */
5917 5918 5919 5920
    if (def->serial) {
        virBufferAddLit(&buf, ",serial=");
        virQEMUBuildBufferEscapeComma(&buf, def->serial);
    }
5921
    /* 1:UUID */
5922 5923 5924 5925
    if (def->uuid && !skip_uuid) {
        virBufferAddLit(&buf, ",uuid=");
        virQEMUBuildBufferEscapeComma(&buf, def->uuid);
    }
5926
    /* 1:SKU Number */
5927 5928 5929 5930
    if (def->sku) {
        virBufferAddLit(&buf, ",sku=");
        virQEMUBuildBufferEscapeComma(&buf, def->sku);
    }
5931
    /* 1:Family */
5932 5933 5934 5935
    if (def->family) {
        virBufferAddLit(&buf, ",family=");
        virQEMUBuildBufferEscapeComma(&buf, def->family);
    }
5936 5937 5938 5939

    return virBufferContentAndReset(&buf);
}

5940 5941 5942

static char *
qemuBuildSmbiosBaseBoardStr(virSysinfoBaseBoardDefPtr def)
5943
{
5944
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5945 5946 5947 5948 5949 5950 5951

    if (!def)
        return NULL;

    virBufferAddLit(&buf, "type=2");

    /* 2:Manufacturer */
5952 5953
    virBufferAddLit(&buf, ",manufacturer=");
    virQEMUBuildBufferEscapeComma(&buf, def->manufacturer);
5954
    /* 2:Product Name */
5955 5956 5957 5958
    if (def->product) {
        virBufferAddLit(&buf, ",product=");
        virQEMUBuildBufferEscapeComma(&buf, def->product);
    }
5959
    /* 2:Version */
5960 5961 5962 5963
    if (def->version) {
        virBufferAddLit(&buf, ",version=");
        virQEMUBuildBufferEscapeComma(&buf, def->version);
    }
5964
    /* 2:Serial Number */
5965 5966 5967 5968
    if (def->serial) {
        virBufferAddLit(&buf, ",serial=");
        virQEMUBuildBufferEscapeComma(&buf, def->serial);
    }
5969
    /* 2:Asset Tag */
5970 5971 5972 5973
    if (def->asset) {
        virBufferAddLit(&buf, ",asset=");
        virQEMUBuildBufferEscapeComma(&buf, def->asset);
    }
5974
    /* 2:Location */
5975 5976 5977 5978
    if (def->location) {
        virBufferAddLit(&buf, ",location=");
        virQEMUBuildBufferEscapeComma(&buf, def->location);
    }
5979 5980 5981 5982

    return virBufferContentAndReset(&buf);
}

5983

5984 5985 5986
static char *
qemuBuildSmbiosOEMStringsStr(virSysinfoOEMStringsDefPtr def)
{
5987
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5988 5989 5990 5991 5992 5993 5994 5995 5996 5997 5998 5999 6000 6001 6002 6003
    size_t i;

    if (!def)
        return NULL;

    virBufferAddLit(&buf, "type=11");

    for (i = 0; i < def->nvalues; i++) {
        virBufferAddLit(&buf, ",value=");
        virQEMUBuildBufferEscapeComma(&buf, def->values[i]);
    }

    return virBufferContentAndReset(&buf);
}


6004 6005 6006
static char *
qemuBuildSmbiosChassisStr(virSysinfoChassisDefPtr def)
{
6007
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
6008 6009 6010 6011 6012 6013 6014 6015 6016 6017 6018 6019 6020 6021 6022 6023 6024 6025 6026 6027 6028 6029 6030 6031 6032 6033 6034 6035 6036 6037 6038 6039 6040 6041

    if (!def)
        return NULL;

    virBufferAddLit(&buf, "type=3");

    /* 3:Manufacturer */
    virBufferAddLit(&buf, ",manufacturer=");
    virQEMUBuildBufferEscapeComma(&buf, def->manufacturer);
    /* 3:Version */
    if (def->version) {
        virBufferAddLit(&buf, ",version=");
        virQEMUBuildBufferEscapeComma(&buf, def->version);
    }
    /* 3:Serial Number */
    if (def->serial) {
        virBufferAddLit(&buf, ",serial=");
        virQEMUBuildBufferEscapeComma(&buf, def->serial);
    }
    /* 3:Asset Tag */
    if (def->asset) {
        virBufferAddLit(&buf, ",asset=");
        virQEMUBuildBufferEscapeComma(&buf, def->asset);
    }
    /* 3:Sku */
    if (def->sku) {
        virBufferAddLit(&buf, ",sku=");
        virQEMUBuildBufferEscapeComma(&buf, def->sku);
    }

    return virBufferContentAndReset(&buf);
}


6042 6043 6044
static int
qemuBuildSmbiosCommandLine(virCommandPtr cmd,
                           virQEMUDriverPtr driver,
6045
                           const virDomainDef *def)
6046 6047 6048 6049 6050 6051 6052 6053 6054 6055 6056 6057 6058 6059 6060 6061 6062 6063 6064 6065 6066 6067 6068 6069 6070 6071 6072 6073 6074 6075 6076 6077 6078 6079 6080 6081 6082 6083 6084 6085 6086 6087 6088 6089 6090 6091 6092 6093 6094 6095 6096 6097 6098 6099 6100 6101 6102 6103
{
    size_t i;
    virSysinfoDefPtr source = NULL;
    bool skip_uuid = false;

    if (def->os.smbios_mode == VIR_DOMAIN_SMBIOS_NONE ||
        def->os.smbios_mode == VIR_DOMAIN_SMBIOS_EMULATE)
        return 0;

    /* should we really error out or just warn in those cases ? */
    if (def->os.smbios_mode == VIR_DOMAIN_SMBIOS_HOST) {
        if (driver->hostsysinfo == NULL) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Host SMBIOS information is not available"));
            return -1;
        }
        source = driver->hostsysinfo;
        /* Host and guest uuid must differ, by definition of UUID. */
        skip_uuid = true;
    } else if (def->os.smbios_mode == VIR_DOMAIN_SMBIOS_SYSINFO) {
        if (def->sysinfo == NULL) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Domain '%s' sysinfo are not available"),
                           def->name);
            return -1;
        }
        source = def->sysinfo;
        /* domain_conf guaranteed that system_uuid matches guest uuid. */
    }
    if (source != NULL) {
        char *smbioscmd;

        smbioscmd = qemuBuildSmbiosBiosStr(source->bios);
        if (smbioscmd != NULL) {
            virCommandAddArgList(cmd, "-smbios", smbioscmd, NULL);
            VIR_FREE(smbioscmd);
        }
        smbioscmd = qemuBuildSmbiosSystemStr(source->system, skip_uuid);
        if (smbioscmd != NULL) {
            virCommandAddArgList(cmd, "-smbios", smbioscmd, NULL);
            VIR_FREE(smbioscmd);
        }

        if (source->nbaseBoard > 1) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("qemu does not support more than "
                             "one entry to Type 2 in SMBIOS table"));
            return -1;
        }

        for (i = 0; i < source->nbaseBoard; i++) {
            if (!(smbioscmd =
                  qemuBuildSmbiosBaseBoardStr(source->baseBoard + i)))
                return -1;

            virCommandAddArgList(cmd, "-smbios", smbioscmd, NULL);
            VIR_FREE(smbioscmd);
        }
6104

6105 6106 6107 6108 6109 6110
        smbioscmd = qemuBuildSmbiosChassisStr(source->chassis);
        if (smbioscmd != NULL) {
            virCommandAddArgList(cmd, "-smbios", smbioscmd, NULL);
            VIR_FREE(smbioscmd);
        }

6111 6112 6113 6114 6115 6116 6117
        if (source->oemStrings) {
            if (!(smbioscmd = qemuBuildSmbiosOEMStringsStr(source->oemStrings)))
                return -1;

            virCommandAddArgList(cmd, "-smbios", smbioscmd, NULL);
            VIR_FREE(smbioscmd);
        }
6118 6119 6120 6121 6122 6123
    }

    return 0;
}


6124 6125 6126 6127 6128
static int
qemuBuildVMGenIDCommandLine(virCommandPtr cmd,
                            const virDomainDef *def,
                            virQEMUCapsPtr qemuCaps)
{
6129
    g_auto(virBuffer) opts = VIR_BUFFER_INITIALIZER;
6130 6131 6132 6133 6134 6135 6136 6137 6138 6139 6140 6141 6142 6143 6144 6145 6146 6147 6148 6149 6150
    char guid[VIR_UUID_STRING_BUFLEN];

    if (!def->genidRequested)
        return 0;

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VMGENID)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                      _("this QEMU does not support the 'genid' capability"));
        return -1;
    }

    virUUIDFormat(def->genid, guid);
    virBufferAsprintf(&opts, "vmgenid,guid=%s,id=vmgenid0", guid);

    virCommandAddArg(cmd, "-device");
    virCommandAddArgBuffer(cmd, &opts);

    return 0;
}


6151 6152 6153 6154 6155 6156 6157 6158 6159 6160 6161 6162 6163 6164 6165 6166 6167 6168 6169 6170 6171 6172 6173 6174
static int
qemuBuildSgaCommandLine(virCommandPtr cmd,
                        const virDomainDef *def,
                        virQEMUCapsPtr qemuCaps)
{
    /* Serial graphics adapter */
    if (def->os.bios.useserial == VIR_TRISTATE_BOOL_YES) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SGA)) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("qemu does not support SGA"));
            return -1;
        }
        if (!def->nserials) {
            virReportError(VIR_ERR_XML_ERROR, "%s",
                           _("need at least one serial port to use SGA"));
            return -1;
        }
        virCommandAddArgList(cmd, "-device", "sga", NULL);
    }

    return 0;
}


6175 6176 6177
static char *
qemuBuildClockArgStr(virDomainClockDefPtr def)
{
6178
    size_t i;
6179
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
6180 6181 6182 6183 6184 6185 6186 6187 6188 6189 6190 6191 6192 6193 6194

    switch (def->offset) {
    case VIR_DOMAIN_CLOCK_OFFSET_UTC:
        virBufferAddLit(&buf, "base=utc");
        break;

    case VIR_DOMAIN_CLOCK_OFFSET_LOCALTIME:
    case VIR_DOMAIN_CLOCK_OFFSET_TIMEZONE:
        virBufferAddLit(&buf, "base=localtime");
        break;

    case VIR_DOMAIN_CLOCK_OFFSET_VARIABLE: {
        time_t now = time(NULL);
        struct tm nowbits;

6195 6196 6197 6198 6199 6200 6201 6202 6203 6204 6205 6206 6207 6208 6209 6210
        if (def->data.variable.basis == VIR_DOMAIN_CLOCK_BASIS_LOCALTIME) {
            long localOffset;

            /* in the case of basis='localtime', rather than trying to
             * keep that basis (and associated offset from UTC) in the
             * status and deal with adding in the difference each time
             * there is an RTC_CHANGE event, it is simpler and less
             * error prone to just convert the adjustment an offset
             * from UTC right now (and change the status to
             * "basis='utc' to reflect this). This eliminates
             * potential errors in both RTC_CHANGE events and in
             * migration (in the case that the status of DST, or the
             * timezone of the destination host, changed relative to
             * startup).
             */
            if (virTimeLocalOffsetFromUTC(&localOffset) < 0)
6211
               return NULL;
6212 6213
            def->data.variable.adjustment += localOffset;
            def->data.variable.basis = VIR_DOMAIN_CLOCK_BASIS_UTC;
6214
        }
6215

6216 6217 6218
        now += def->data.variable.adjustment;
        gmtime_r(&now, &nowbits);

6219 6220 6221 6222 6223 6224 6225 6226
        /* when an RTC_CHANGE event is received from qemu, we need to
         * have the adjustment used at domain start time available to
         * compute the new offset from UTC. As this new value is
         * itself stored in def->data.variable.adjustment, we need to
         * save a copy of it now.
        */
        def->data.variable.adjustment0 = def->data.variable.adjustment;

6227
        virBufferAsprintf(&buf, "base=%d-%02d-%02dT%02d:%02d:%02d",
6228 6229 6230 6231 6232 6233 6234 6235 6236
                          nowbits.tm_year + 1900,
                          nowbits.tm_mon + 1,
                          nowbits.tm_mday,
                          nowbits.tm_hour,
                          nowbits.tm_min,
                          nowbits.tm_sec);
    }   break;

    default:
6237 6238 6239
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("unsupported clock offset '%s'"),
                       virDomainClockOffsetTypeToString(def->offset));
6240
        return NULL;
6241 6242
    }

6243 6244
    /* Look for an 'rtc' timer element, and add in appropriate
     * clock= and driftfix= */
6245 6246 6247 6248 6249 6250
    for (i = 0; i < def->ntimers; i++) {
        if (def->timers[i]->name == VIR_DOMAIN_TIMER_NAME_RTC) {
            switch (def->timers[i]->track) {
            case -1: /* unspecified - use hypervisor default */
                break;
            case VIR_DOMAIN_TIMER_TRACK_BOOT:
6251 6252 6253
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("unsupported rtc timer track '%s'"),
                               virDomainTimerTrackTypeToString(def->timers[i]->track));
6254
                return NULL;
6255 6256 6257 6258 6259 6260 6261 6262 6263 6264 6265 6266 6267 6268 6269 6270 6271 6272 6273 6274
            case VIR_DOMAIN_TIMER_TRACK_GUEST:
                virBufferAddLit(&buf, ",clock=vm");
                break;
            case VIR_DOMAIN_TIMER_TRACK_WALL:
                virBufferAddLit(&buf, ",clock=host");
                break;
            }

            switch (def->timers[i]->tickpolicy) {
            case -1:
            case VIR_DOMAIN_TIMER_TICKPOLICY_DELAY:
                /* This is the default - missed ticks delivered when
                   next scheduled, at normal rate */
                break;
            case VIR_DOMAIN_TIMER_TICKPOLICY_CATCHUP:
                /* deliver ticks at a faster rate until caught up */
                virBufferAddLit(&buf, ",driftfix=slew");
                break;
            case VIR_DOMAIN_TIMER_TICKPOLICY_MERGE:
            case VIR_DOMAIN_TIMER_TICKPOLICY_DISCARD:
6275 6276 6277
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("unsupported rtc timer tickpolicy '%s'"),
                               virDomainTimerTickpolicyTypeToString(def->timers[i]->tickpolicy));
6278
                return NULL;
6279 6280 6281 6282 6283 6284 6285 6286
            }
            break; /* no need to check other timers - there is only one rtc */
        }
    }

    return virBufferContentAndReset(&buf);
}

6287 6288 6289 6290 6291 6292 6293 6294 6295 6296

/* NOTE: Building of commands can change def->clock->data.* values, so
 *       virDomainDef is not const here.
 */
static int
qemuBuildClockCommandLine(virCommandPtr cmd,
                          virDomainDefPtr def,
                          virQEMUCapsPtr qemuCaps)
{
    size_t i;
6297
    g_autofree char *rtcopt = NULL;
6298

J
Ján Tomko 已提交
6299 6300 6301 6302
    virCommandAddArg(cmd, "-rtc");
    if (!(rtcopt = qemuBuildClockArgStr(&def->clock)))
        return -1;
    virCommandAddArg(cmd, rtcopt);
6303 6304 6305 6306 6307 6308 6309

    if (def->clock.offset == VIR_DOMAIN_CLOCK_OFFSET_TIMEZONE &&
        def->clock.data.timezone) {
        virCommandAddEnvPair(cmd, "TZ", def->clock.data.timezone);
    }

    for (i = 0; i < def->clock.ntimers; i++) {
6310
        switch ((virDomainTimerNameType)def->clock.timers[i]->name) {
6311 6312 6313 6314 6315 6316
        case VIR_DOMAIN_TIMER_NAME_PLATFORM:
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("unsupported timer type (name) '%s'"),
                           virDomainTimerNameTypeToString(def->clock.timers[i]->name));
            return -1;

6317
        case VIR_DOMAIN_TIMER_NAME_TSC:
6318 6319 6320 6321 6322 6323 6324
        case VIR_DOMAIN_TIMER_NAME_KVMCLOCK:
        case VIR_DOMAIN_TIMER_NAME_HYPERVCLOCK:
            /* Timers above are handled when building -cpu.  */
        case VIR_DOMAIN_TIMER_NAME_LAST:
            break;

        case VIR_DOMAIN_TIMER_NAME_RTC:
6325
            /* Already handled in qemuBuildClockArgStr */
6326 6327 6328 6329 6330 6331 6332
            break;

        case VIR_DOMAIN_TIMER_NAME_PIT:
            switch (def->clock.timers[i]->tickpolicy) {
            case -1:
            case VIR_DOMAIN_TIMER_TICKPOLICY_DELAY:
                /* delay is the default if we don't have kernel
J
Ján Tomko 已提交
6333
                   (kvm-pit), otherwise, the default is catchup. */
6334 6335
                if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_KVM_PIT_TICK_POLICY))
                    virCommandAddArgList(cmd, "-global",
6336
                                         "kvm-pit.lost_tick_policy=delay", NULL);
6337 6338
                break;
            case VIR_DOMAIN_TIMER_TICKPOLICY_CATCHUP:
J
Ján Tomko 已提交
6339
                if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_KVM_PIT_TICK_POLICY)) {
6340 6341
                    /* do nothing - this is default for kvm-pit */
                } else {
J
Ján Tomko 已提交
6342
                    /* can't catchup if we don't have kvm-pit */
6343 6344 6345 6346 6347 6348 6349
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                                   _("unsupported pit tickpolicy '%s'"),
                                   virDomainTimerTickpolicyTypeToString(def->clock.timers[i]->tickpolicy));
                    return -1;
                }
                break;
            case VIR_DOMAIN_TIMER_TICKPOLICY_DISCARD:
6350 6351 6352 6353 6354 6355
                if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_KVM_PIT_TICK_POLICY))
                    virCommandAddArgList(cmd, "-global",
                                         "kvm-pit.lost_tick_policy=discard", NULL);
                break;
            case VIR_DOMAIN_TIMER_TICKPOLICY_MERGE:
                /* no way to support this mode for pit in qemu */
6356 6357 6358 6359 6360 6361 6362 6363 6364 6365 6366 6367 6368 6369 6370 6371 6372 6373 6374 6375 6376 6377 6378 6379 6380 6381 6382 6383 6384 6385 6386 6387 6388 6389 6390
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("unsupported pit tickpolicy '%s'"),
                               virDomainTimerTickpolicyTypeToString(def->clock.timers[i]->tickpolicy));
                return -1;
            }
            break;

        case VIR_DOMAIN_TIMER_NAME_HPET:
            /* the only meaningful attribute for hpet is "present". If
             * present is -1, that means it wasn't specified, and
             * should be left at the default for the
             * hypervisor. "default" when -no-hpet exists is "yes",
             * and when -no-hpet doesn't exist is "no". "confusing"?
             * "yes"! */

            if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_NO_HPET)) {
                if (def->clock.timers[i]->present == 0)
                    virCommandAddArg(cmd, "-no-hpet");
            } else {
                /* no hpet timer available. The only possible action
                   is to raise an error if present="yes" */
                if (def->clock.timers[i]->present == 1) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                                   "%s", _("hpet timer is not supported"));
                    return -1;
                }
            }
            break;
        }
    }

    return 0;
}


6391 6392 6393
static int
qemuBuildPMCommandLine(virCommandPtr cmd,
                       const virDomainDef *def,
6394
                       qemuDomainObjPrivatePtr priv)
6395
{
6396
    virQEMUCapsPtr qemuCaps = priv->qemuCaps;
6397 6398

    /* Only add -no-reboot option if each event destroys domain */
6399
    if (priv->allowReboot == VIR_TRISTATE_BOOL_NO)
6400 6401
        virCommandAddArg(cmd, "-no-reboot");

J
John Ferlan 已提交
6402
    if (qemuDomainIsUsingNoShutdown(priv))
6403 6404 6405 6406 6407 6408 6409 6410 6411 6412 6413 6414 6415 6416
        virCommandAddArg(cmd, "-no-shutdown");

    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_NO_ACPI)) {
        if (def->features[VIR_DOMAIN_FEATURE_ACPI] != VIR_TRISTATE_SWITCH_ON)
            virCommandAddArg(cmd, "-no-acpi");
    }

    /* We fall back to PIIX4_PM even for q35, since it's what we did
       pre-q35-pm support. QEMU starts up fine (with a warning) if
       mixing PIIX PM and -M q35. Starting to reject things here
       could mean we refuse to start existing configs in the wild.*/
    if (def->pm.s3) {
        const char *pm_object = "PIIX4_PM";

6417
        if (qemuDomainIsQ35(def) &&
6418 6419 6420 6421 6422 6423 6424 6425 6426 6427 6428 6429 6430 6431 6432 6433
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_ICH9_DISABLE_S3)) {
            pm_object = "ICH9-LPC";
        } else if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_PIIX_DISABLE_S3)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           "%s", _("setting ACPI S3 not supported"));
            return -1;
        }

        virCommandAddArg(cmd, "-global");
        virCommandAddArgFormat(cmd, "%s.disable_s3=%d",
                               pm_object, def->pm.s3 == VIR_TRISTATE_BOOL_NO);
    }

    if (def->pm.s4) {
        const char *pm_object = "PIIX4_PM";

6434
        if (qemuDomainIsQ35(def) &&
6435 6436 6437 6438 6439 6440 6441 6442 6443 6444 6445 6446 6447 6448 6449 6450 6451
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_ICH9_DISABLE_S4)) {
            pm_object = "ICH9-LPC";
        } else if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_PIIX_DISABLE_S4)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           "%s", _("setting ACPI S4 not supported"));
            return -1;
        }

        virCommandAddArg(cmd, "-global");
        virCommandAddArgFormat(cmd, "%s.disable_s4=%d",
                               pm_object, def->pm.s4 == VIR_TRISTATE_BOOL_NO);
    }

    return 0;
}


6452 6453 6454
static int
qemuBuildBootCommandLine(virCommandPtr cmd,
                         const virDomainDef *def,
6455
                         virQEMUCapsPtr qemuCaps)
6456
{
6457
    g_auto(virBuffer) boot_buf = VIR_BUFFER_INITIALIZER;
6458
    g_autofree char *boot_opts_str = NULL;
6459 6460

    if (def->os.bootmenu) {
J
Ján Tomko 已提交
6461 6462 6463 6464
        if (def->os.bootmenu == VIR_TRISTATE_BOOL_YES)
            virBufferAddLit(&boot_buf, "menu=on,");
        else
            virBufferAddLit(&boot_buf, "menu=off,");
6465 6466 6467 6468 6469 6470 6471
    }

    if (def->os.bios.rt_set) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_REBOOT_TIMEOUT)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("reboot timeout is not supported "
                             "by this QEMU binary"));
6472
            return -1;
6473 6474 6475 6476 6477 6478 6479 6480 6481 6482 6483 6484
        }

        virBufferAsprintf(&boot_buf,
                          "reboot-timeout=%d,",
                          def->os.bios.rt_delay);
    }

    if (def->os.bm_timeout_set) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SPLASH_TIMEOUT)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("splash timeout is not supported "
                             "by this QEMU binary"));
6485
            return -1;
6486 6487 6488 6489 6490 6491 6492 6493 6494 6495 6496
        }

        virBufferAsprintf(&boot_buf, "splash-time=%u,", def->os.bm_timeout);
    }

    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_BOOT_STRICT))
        virBufferAddLit(&boot_buf, "strict=on,");

    virBufferTrim(&boot_buf, ",", -1);

    boot_opts_str = virBufferContentAndReset(&boot_buf);
6497
    if (boot_opts_str) {
6498
        virCommandAddArg(cmd, "-boot");
6499
        virCommandAddArg(cmd, boot_opts_str);
6500 6501 6502 6503 6504 6505 6506 6507
    }

    if (def->os.kernel)
        virCommandAddArgList(cmd, "-kernel", def->os.kernel, NULL);
    if (def->os.initrd)
        virCommandAddArgList(cmd, "-initrd", def->os.initrd, NULL);
    if (def->os.cmdline)
        virCommandAddArgList(cmd, "-append", def->os.cmdline, NULL);
J
Ján Tomko 已提交
6508 6509
    if (def->os.dtb)
        virCommandAddArgList(cmd, "-dtb", def->os.dtb, NULL);
6510 6511 6512 6513
    if (def->os.slic_table) {
        virBuffer buf = VIR_BUFFER_INITIALIZER;
        virCommandAddArg(cmd, "-acpitable");
        virBufferAddLit(&buf, "sig=SLIC,file=");
6514
        virQEMUBuildBufferEscapeComma(&buf, def->os.slic_table);
6515 6516
        virCommandAddArgBuffer(cmd, &buf);
    }
6517 6518 6519 6520 6521

    return 0;
}


6522 6523 6524 6525 6526
static int
qemuBuildIOMMUCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
6527 6528 6529
    const virDomainIOMMUDef *iommu = def->iommu;

    if (!iommu)
6530 6531
        return 0;

6532
    switch (iommu->model) {
6533
    case VIR_DOMAIN_IOMMU_MODEL_INTEL: {
6534
        g_auto(virBuffer) opts = VIR_BUFFER_INITIALIZER;
6535

6536 6537 6538 6539 6540 6541 6542
        /* qemuDomainDeviceDefValidateIOMMU() already made sure we have
         * one of QEMU_CAPS_DEVICE_INTEL_IOMMU or QEMU_CAPS_MACHINE_IOMMU:
         * here we handle the former case, while the latter is taken care
         * of in qemuBuildMachineCommandLine() */
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_INTEL_IOMMU))
            return 0;

6543
        virBufferAddLit(&opts, "intel-iommu");
6544 6545 6546 6547
        if (iommu->intremap != VIR_TRISTATE_SWITCH_ABSENT) {
            virBufferAsprintf(&opts, ",intremap=%s",
                              virTristateSwitchTypeToString(iommu->intremap));
        }
6548 6549 6550 6551
        if (iommu->caching_mode != VIR_TRISTATE_SWITCH_ABSENT) {
            virBufferAsprintf(&opts, ",caching-mode=%s",
                              virTristateSwitchTypeToString(iommu->caching_mode));
        }
6552 6553 6554 6555
        if (iommu->eim != VIR_TRISTATE_SWITCH_ABSENT) {
            virBufferAsprintf(&opts, ",eim=%s",
                              virTristateSwitchTypeToString(iommu->eim));
        }
6556 6557 6558 6559
        if (iommu->iotlb != VIR_TRISTATE_SWITCH_ABSENT) {
            virBufferAsprintf(&opts, ",device-iotlb=%s",
                              virTristateSwitchTypeToString(iommu->iotlb));
        }
6560 6561 6562

        virCommandAddArg(cmd, "-device");
        virCommandAddArgBuffer(cmd, &opts);
6563
        break;
6564
    }
6565

6566
    case VIR_DOMAIN_IOMMU_MODEL_SMMUV3:
A
Andrea Bolognani 已提交
6567 6568
        /* There is no -device for SMMUv3, so nothing to be done here */
        return 0;
6569

6570 6571 6572 6573
    case VIR_DOMAIN_IOMMU_MODEL_LAST:
    default:
        virReportEnumRangeError(virDomainIOMMUModel, iommu->model);
        return -1;
6574
    }
6575

6576
    return 0;
6577 6578 6579
}


6580 6581 6582 6583 6584 6585 6586 6587 6588 6589 6590 6591 6592 6593 6594
static int
qemuBuildGlobalControllerCommandLine(virCommandPtr cmd,
                                     const virDomainDef *def,
                                     virQEMUCapsPtr qemuCaps)
{
    size_t i;

    for (i = 0; i < def->ncontrollers; i++) {
        virDomainControllerDefPtr cont = def->controllers[i];
        if (cont->type == VIR_DOMAIN_CONTROLLER_TYPE_PCI &&
            cont->opts.pciopts.pcihole64) {
            const char *hoststr = NULL;
            bool cap = false;
            bool machine = false;

6595
            switch (cont->model) {
6596 6597 6598
            case VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT:
                hoststr = "i440FX-pcihost";
                cap = virQEMUCapsGet(qemuCaps, QEMU_CAPS_I440FX_PCI_HOLE64_SIZE);
6599
                machine = qemuDomainIsI440FX(def);
6600 6601 6602 6603 6604
                break;

            case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT:
                hoststr = "q35-pcihost";
                cap = virQEMUCapsGet(qemuCaps, QEMU_CAPS_Q35_PCI_HOLE64_SIZE);
6605
                machine = qemuDomainIsQ35(def);
6606 6607 6608 6609 6610 6611 6612 6613 6614 6615 6616 6617 6618 6619 6620 6621 6622 6623 6624 6625 6626 6627 6628 6629 6630 6631 6632 6633 6634 6635 6636 6637
                break;

            default:
                virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                               _("64-bit PCI hole setting is only for root"
                                 " PCI controllers"));
                return -1;
            }

            if (!machine) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                             _("Setting the 64-bit PCI hole size is not "
                             "supported for machine '%s'"), def->os.machine);
                return -1;
            }
            if (!cap) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("64-bit PCI hole size setting is not supported "
                                 "with this QEMU binary"));
                return -1;
            }

            virCommandAddArg(cmd, "-global");
            virCommandAddArgFormat(cmd, "%s.pci-hole64-size=%luK", hoststr,
                                   cont->opts.pciopts.pcihole64size);
        }
    }

    return 0;
}


6638 6639 6640 6641 6642 6643
static void
qemuBuildCpuFeature(virQEMUCapsPtr qemuCaps,
                    virBufferPtr buf,
                    const char *name,
                    bool state)
{
6644 6645
    name = virQEMUCapsCPUFeatureToQEMU(qemuCaps, name);

6646 6647 6648 6649 6650 6651 6652
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_QUERY_CPU_MODEL_EXPANSION))
        virBufferAsprintf(buf, ",%s=%s", name, state ? "on" : "off");
    else
        virBufferAsprintf(buf, ",%c%s", state ? '+' : '-', name);
}


6653
static int
6654 6655 6656
qemuBuildCpuModelArgStr(virQEMUDriverPtr driver,
                        const virDomainDef *def,
                        virBufferPtr buf,
6657
                        virQEMUCapsPtr qemuCaps)
6658
{
6659
    size_t i;
6660
    g_autoptr(virCaps) caps = NULL;
6661
    virCPUDefPtr cpu = def->cpu;
6662

6663
    if (!(caps = virQEMUDriverGetCapabilities(driver, false)))
6664
        return -1;
6665

6666 6667
    switch ((virCPUMode) cpu->mode) {
    case VIR_CPU_MODE_HOST_PASSTHROUGH:
6668
        virBufferAddLit(buf, "host");
6669

6670
        if (def->os.arch == VIR_ARCH_ARMV7L &&
6671
            caps->host.arch == VIR_ARCH_AARCH64) {
6672 6673 6674 6675 6676
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CPU_AARCH64_OFF)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("QEMU binary does not support CPU "
                                 "host-passthrough for armv7l on "
                                 "aarch64 host"));
6677
                return -1;
6678 6679 6680
            }
            virBufferAddLit(buf, ",aarch64=off");
        }
6681
        break;
6682

6683 6684 6685
    case VIR_CPU_MODE_HOST_MODEL:
        if (ARCH_IS_PPC64(def->os.arch)) {
            virBufferAddLit(buf, "host");
6686 6687 6688
            if (cpu->model &&
                !(qemuDomainIsPSeries(def) &&
                  virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_PSERIES_MAX_CPU_COMPAT))) {
6689
                virBufferAsprintf(buf, ",compat=%s", cpu->model);
6690
            }
6691
        } else {
6692 6693 6694
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("unexpected host-model CPU for %s architecture"),
                           virArchToString(def->os.arch));
6695
            return -1;
6696 6697
        }
        break;
6698

6699 6700 6701
    case VIR_CPU_MODE_CUSTOM:
        virBufferAdd(buf, cpu->model, -1);
        break;
6702

6703 6704 6705
    case VIR_CPU_MODE_LAST:
        break;
    }
6706

6707 6708
    if ((ARCH_IS_S390(def->os.arch) || ARCH_IS_ARM(def->os.arch)) &&
        cpu->features &&
6709 6710 6711 6712
        !virQEMUCapsGet(qemuCaps, QEMU_CAPS_QUERY_CPU_MODEL_EXPANSION)) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("CPU features not supported by hypervisor for %s "
                         "architecture"), virArchToString(def->os.arch));
6713
        return -1;
6714 6715
    }

6716 6717
    if (cpu->vendor_id)
        virBufferAsprintf(buf, ",vendor=%s", cpu->vendor_id);
6718

6719 6720 6721 6722
    for (i = 0; i < cpu->nfeatures; i++) {
        switch ((virCPUFeaturePolicy) cpu->features[i].policy) {
        case VIR_CPU_FEATURE_FORCE:
        case VIR_CPU_FEATURE_REQUIRE:
6723
            qemuBuildCpuFeature(qemuCaps, buf, cpu->features[i].name, true);
6724
            break;
6725

6726 6727
        case VIR_CPU_FEATURE_DISABLE:
        case VIR_CPU_FEATURE_FORBID:
6728
            qemuBuildCpuFeature(qemuCaps, buf, cpu->features[i].name, false);
6729
            break;
6730

6731 6732 6733
        case VIR_CPU_FEATURE_OPTIONAL:
        case VIR_CPU_FEATURE_LAST:
            break;
6734
        }
6735
    }
6736

6737
    return 0;
6738
}
6739

6740
static int
6741 6742 6743
qemuBuildCpuCommandLine(virCommandPtr cmd,
                        virQEMUDriverPtr driver,
                        const virDomainDef *def,
6744
                        virQEMUCapsPtr qemuCaps)
6745
{
6746
    virArch hostarch = virArchFromHost();
6747 6748
    g_autofree char *cpu = NULL;
    g_autofree char *cpu_flags = NULL;
6749 6750
    g_auto(virBuffer) cpu_buf = VIR_BUFFER_INITIALIZER;
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
6751
    size_t i;
6752

6753 6754
    if (def->cpu &&
        (def->cpu->mode != VIR_CPU_MODE_CUSTOM || def->cpu->model)) {
6755
        if (qemuBuildCpuModelArgStr(driver, def, &cpu_buf, qemuCaps) < 0)
6756
            return -1;
6757
    } else {
6758 6759 6760 6761 6762 6763 6764 6765 6766 6767 6768 6769
        /*
         * Need to force a 32-bit guest CPU type if
         *
         *  1. guest OS is i686
         *  2. host OS is x86_64
         *  3. emulator is qemu-kvm or kvm
         *
         * Or
         *
         *  1. guest OS is i686
         *  2. emulator is qemu-system-x86_64
         */
6770
        if (def->os.arch == VIR_ARCH_I686 &&
6771
            ((hostarch == VIR_ARCH_X86_64 &&
J
John Ferlan 已提交
6772 6773
              strstr(def->emulator, "kvm")) ||
             strstr(def->emulator, "x86_64"))) {
6774
            virBufferAddLit(&cpu_buf, "qemu32");
6775 6776 6777
        }
    }

6778
    /* Handle paravirtual timers  */
6779
    for (i = 0; i < def->clock.ntimers; i++) {
6780 6781
        virDomainTimerDefPtr timer = def->clock.timers[i];

6782 6783
        if (timer->name == VIR_DOMAIN_TIMER_NAME_KVMCLOCK &&
            timer->present != -1) {
6784 6785
            qemuBuildCpuFeature(qemuCaps, &buf, "kvmclock",
                                !!timer->present);
6786
        } else if (timer->name == VIR_DOMAIN_TIMER_NAME_HYPERVCLOCK &&
6787
                   timer->present == 1) {
6788
            virBufferAddLit(&buf, ",hv-time");
6789 6790
        } else if (timer->name == VIR_DOMAIN_TIMER_NAME_TSC &&
                   timer->frequency > 0) {
6791
            virBufferAsprintf(&buf, ",tsc-frequency=%lu", timer->frequency);
6792
        }
6793 6794
    }

6795
    if (def->apic_eoi) {
6796 6797
        qemuBuildCpuFeature(qemuCaps, &buf, "kvm_pv_eoi",
                            def->apic_eoi == VIR_TRISTATE_SWITCH_ON);
6798 6799
    }

6800
    if (def->features[VIR_DOMAIN_FEATURE_PVSPINLOCK]) {
6801
        qemuBuildCpuFeature(qemuCaps, &buf, VIR_CPU_x86_KVM_PV_UNHALT,
6802
                            def->features[VIR_DOMAIN_FEATURE_PVSPINLOCK] == VIR_TRISTATE_SWITCH_ON);
6803 6804
    }

J
Ján Tomko 已提交
6805
    if (def->features[VIR_DOMAIN_FEATURE_HYPERV] == VIR_TRISTATE_SWITCH_ON) {
6806 6807 6808 6809 6810
        const char *hvPrefix = "hv-";

        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CANONICAL_CPU_FEATURES))
            hvPrefix = "hv_";

6811
        for (i = 0; i < VIR_DOMAIN_HYPERV_LAST; i++) {
6812
            switch ((virDomainHyperv) i) {
6813
            case VIR_DOMAIN_HYPERV_RELAXED:
6814
            case VIR_DOMAIN_HYPERV_VAPIC:
6815 6816 6817 6818 6819
            case VIR_DOMAIN_HYPERV_VPINDEX:
            case VIR_DOMAIN_HYPERV_RUNTIME:
            case VIR_DOMAIN_HYPERV_SYNIC:
            case VIR_DOMAIN_HYPERV_STIMER:
            case VIR_DOMAIN_HYPERV_RESET:
6820
            case VIR_DOMAIN_HYPERV_FREQUENCIES:
6821
            case VIR_DOMAIN_HYPERV_REENLIGHTENMENT:
6822
            case VIR_DOMAIN_HYPERV_TLBFLUSH:
6823
            case VIR_DOMAIN_HYPERV_IPI:
6824
            case VIR_DOMAIN_HYPERV_EVMCS:
J
Ján Tomko 已提交
6825
                if (def->hyperv_features[i] == VIR_TRISTATE_SWITCH_ON)
6826 6827
                    virBufferAsprintf(&buf, ",%s%s",
                                      hvPrefix,
6828
                                      virDomainHypervTypeToString(i));
6829 6830 6831
                if ((i == VIR_DOMAIN_HYPERV_STIMER) &&
                    (def->hyperv_stimer_direct == VIR_TRISTATE_SWITCH_ON))
                    virBufferAsprintf(&buf, ",%s", VIR_CPU_x86_HV_STIMER_DIRECT);
6832 6833
                break;

6834
            case VIR_DOMAIN_HYPERV_SPINLOCKS:
J
Ján Tomko 已提交
6835
                if (def->hyperv_features[i] == VIR_TRISTATE_SWITCH_ON)
6836
                    virBufferAsprintf(&buf, ",%s=0x%x",
6837
                                      VIR_CPU_x86_HV_SPINLOCKS,
6838
                                      def->hyperv_spinlocks);
6839 6840
                break;

6841 6842
            case VIR_DOMAIN_HYPERV_VENDOR_ID:
                if (def->hyperv_features[i] == VIR_TRISTATE_SWITCH_ON)
6843
                    virBufferAsprintf(&buf, ",hv-vendor-id=%s",
6844 6845 6846
                                      def->hyperv_vendor_id);
                break;

6847
            /* coverity[dead_error_begin] */
6848 6849 6850 6851 6852 6853
            case VIR_DOMAIN_HYPERV_LAST:
                break;
            }
        }
    }

D
Dmitry Andreev 已提交
6854 6855
    for (i = 0; i < def->npanics; i++) {
        if (def->panics[i]->model == VIR_DOMAIN_PANIC_MODEL_HYPERV) {
6856
            virBufferAddLit(&buf, ",hv-crash");
D
Dmitry Andreev 已提交
6857 6858
            break;
        }
6859 6860
    }

6861 6862 6863 6864 6865 6866 6867 6868
    if (def->features[VIR_DOMAIN_FEATURE_KVM] == VIR_TRISTATE_SWITCH_ON) {
        for (i = 0; i < VIR_DOMAIN_KVM_LAST; i++) {
            switch ((virDomainKVM) i) {
            case VIR_DOMAIN_KVM_HIDDEN:
                if (def->kvm_features[i] == VIR_TRISTATE_SWITCH_ON)
                    virBufferAddLit(&buf, ",kvm=off");
                break;

6869 6870 6871 6872 6873
            case VIR_DOMAIN_KVM_DEDICATED:
                if (def->kvm_features[i] == VIR_TRISTATE_SWITCH_ON)
                    virBufferAddLit(&buf, ",kvm-hint-dedicated=on");
                break;

J
John Ferlan 已提交
6874
            /* coverity[dead_error_begin] */
6875 6876 6877 6878 6879 6880
            case VIR_DOMAIN_KVM_LAST:
                break;
            }
        }
    }

6881 6882 6883 6884 6885 6886
    if (def->features[VIR_DOMAIN_FEATURE_PMU]) {
        virTristateSwitch pmu = def->features[VIR_DOMAIN_FEATURE_PMU];
        virBufferAsprintf(&buf, ",pmu=%s",
                          virTristateSwitchTypeToString(pmu));
    }

6887 6888 6889 6890 6891 6892 6893 6894 6895 6896 6897 6898 6899 6900 6901 6902 6903 6904 6905 6906 6907 6908 6909 6910 6911 6912 6913 6914 6915 6916 6917 6918 6919 6920
    if (def->cpu && def->cpu->cache) {
        virCPUCacheDefPtr cache = def->cpu->cache;
        bool hostOff = false;
        bool l3Off = false;

        switch (cache->mode) {
        case VIR_CPU_CACHE_MODE_EMULATE:
            virBufferAddLit(&buf, ",l3-cache=on");
            hostOff = true;
            break;

        case VIR_CPU_CACHE_MODE_PASSTHROUGH:
            virBufferAddLit(&buf, ",host-cache-info=on");
            l3Off = true;
            break;

        case VIR_CPU_CACHE_MODE_DISABLE:
            hostOff = l3Off = true;
            break;

        case VIR_CPU_CACHE_MODE_LAST:
            break;
        }

        if (hostOff &&
            def->cpu->mode == VIR_CPU_MODE_HOST_PASSTHROUGH &&
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_CPU_CACHE))
            virBufferAddLit(&buf, ",host-cache-info=off");

        if (l3Off &&
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_CPU_CACHE))
            virBufferAddLit(&buf, ",l3-cache=off");
    }

6921 6922 6923 6924
    cpu = virBufferContentAndReset(&cpu_buf);
    cpu_flags = virBufferContentAndReset(&buf);

    if (cpu_flags && !cpu) {
6925 6926
        const char *default_model;

6927
        switch ((int)def->os.arch) {
6928 6929 6930 6931 6932 6933 6934 6935 6936 6937 6938
        case VIR_ARCH_I686:
            default_model = "qemu32";
            break;
        case VIR_ARCH_X86_64:
            default_model = "qemu64";
            break;
        default:
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("CPU flags requested but can't determine "
                             "default CPU for arch %s"),
                           virArchToString(def->os.arch));
6939
            return -1;
6940 6941
        }

6942
        cpu = g_strdup(default_model);
6943
    }
6944 6945

    if (cpu) {
6946
        virCommandAddArg(cmd, "-cpu");
J
Ján Tomko 已提交
6947
        virCommandAddArgFormat(cmd, "%s%s", cpu, NULLSTR_EMPTY(cpu_flags));
6948
    }
6949

6950
    return 0;
6951 6952
}

6953

6954 6955 6956 6957 6958 6959 6960 6961 6962 6963 6964 6965 6966 6967 6968 6969 6970 6971 6972 6973 6974 6975 6976 6977 6978 6979 6980 6981 6982 6983 6984 6985 6986
static bool
qemuAppendKeyWrapMachineParm(virBuffer *buf, virQEMUCapsPtr qemuCaps,
                             int flag, const char *pname, int pstate)
{
    if (pstate != VIR_TRISTATE_SWITCH_ABSENT) {
        if (!virQEMUCapsGet(qemuCaps, flag)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("%s is not available with this QEMU binary"), pname);
            return false;
        }

        virBufferAsprintf(buf, ",%s=%s", pname,
                          virTristateSwitchTypeToString(pstate));
    }

    return true;
}

static bool
qemuAppendKeyWrapMachineParms(virBuffer *buf, virQEMUCapsPtr qemuCaps,
                              const virDomainKeyWrapDef *keywrap)
{
    if (!qemuAppendKeyWrapMachineParm(buf, qemuCaps, QEMU_CAPS_AES_KEY_WRAP,
                                      "aes-key-wrap", keywrap->aes))
        return false;

    if (!qemuAppendKeyWrapMachineParm(buf, qemuCaps, QEMU_CAPS_DEA_KEY_WRAP,
                                      "dea-key-wrap", keywrap->dea))
        return false;

    return true;
}

6987 6988 6989 6990 6991 6992 6993 6994 6995 6996 6997 6998 6999 7000 7001 7002 7003 7004 7005 7006 7007 7008 7009 7010 7011 7012 7013 7014

static void
qemuAppendLoadparmMachineParm(virBuffer *buf,
                              const virDomainDef *def)
{
    size_t i = 0;

    for (i = 0; i < def->ndisks; i++) {
        virDomainDiskDefPtr disk = def->disks[i];

        if (disk->info.bootIndex == 1 && disk->info.loadparm) {
            virBufferAsprintf(buf, ",loadparm=%s", disk->info.loadparm);
            return;
        }
    }

    /* Network boot device */
    for (i = 0; i < def->nnets; i++) {
        virDomainNetDefPtr net = def->nets[i];

        if (net->info.bootIndex == 1 && net->info.loadparm) {
            virBufferAsprintf(buf, ",loadparm=%s", net->info.loadparm);
            return;
        }
    }
}


M
Marc-André Lureau 已提交
7015 7016 7017 7018 7019 7020
static int
qemuBuildNameCommandLine(virCommandPtr cmd,
                         virQEMUDriverConfigPtr cfg,
                         const virDomainDef *def,
                         virQEMUCapsPtr qemuCaps)
{
7021
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
M
Marc-André Lureau 已提交
7022 7023 7024

    virCommandAddArg(cmd, "-name");

7025 7026 7027 7028
    /* The 'guest' option let's us handle a name with '=' embedded in it */
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_NAME_GUEST))
        virBufferAddLit(&buf, "guest=");

7029
    virQEMUBuildBufferEscapeComma(&buf, def->name);
M
Marc-André Lureau 已提交
7030

7031
    if (cfg->setProcessName)
M
Marc-André Lureau 已提交
7032 7033 7034 7035 7036 7037 7038 7039 7040 7041
        virBufferAsprintf(&buf, ",process=qemu:%s", def->name);

    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_NAME_DEBUG_THREADS))
        virBufferAddLit(&buf, ",debug-threads=on");

    virCommandAddArgBuffer(cmd, &buf);

    return 0;
}

7042
static int
7043
qemuBuildMachineCommandLine(virCommandPtr cmd,
7044
                            virQEMUDriverConfigPtr cfg,
7045 7046
                            const virDomainDef *def,
                            virQEMUCapsPtr qemuCaps)
7047
{
7048 7049 7050
    virTristateSwitch vmport = def->features[VIR_DOMAIN_FEATURE_VMPORT];
    virTristateSwitch smm = def->features[VIR_DOMAIN_FEATURE_SMM];
    virCPUDefPtr cpu = def->cpu;
7051
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
M
Michal Privoznik 已提交
7052
    size_t i;
7053

7054 7055 7056 7057 7058 7059 7060
    /* This should *never* be NULL, since we always provide
     * a machine in the capabilities data for QEMU. So this
     * check is just here as a safety in case the unexpected
     * happens */
    if (!def->os.machine)
        return 0;

7061 7062 7063
    virCommandAddArg(cmd, "-machine");
    virBufferAdd(&buf, def->os.machine, -1);

7064
    switch ((virDomainVirtType)def->virtType) {
7065
    case VIR_DOMAIN_VIRT_QEMU:
7066
        virBufferAddLit(&buf, ",accel=tcg");
7067 7068 7069
        break;

    case VIR_DOMAIN_VIRT_KVM:
7070
        virBufferAddLit(&buf, ",accel=kvm");
7071 7072 7073 7074 7075 7076 7077 7078 7079 7080 7081 7082 7083 7084 7085 7086
        break;

    case VIR_DOMAIN_VIRT_KQEMU:
    case VIR_DOMAIN_VIRT_XEN:
    case VIR_DOMAIN_VIRT_LXC:
    case VIR_DOMAIN_VIRT_UML:
    case VIR_DOMAIN_VIRT_OPENVZ:
    case VIR_DOMAIN_VIRT_TEST:
    case VIR_DOMAIN_VIRT_VMWARE:
    case VIR_DOMAIN_VIRT_HYPERV:
    case VIR_DOMAIN_VIRT_VBOX:
    case VIR_DOMAIN_VIRT_PHYP:
    case VIR_DOMAIN_VIRT_PARALLELS:
    case VIR_DOMAIN_VIRT_BHYVE:
    case VIR_DOMAIN_VIRT_VZ:
    case VIR_DOMAIN_VIRT_NONE:
7087 7088 7089 7090
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("the QEMU binary does not support %s"),
                       virDomainVirtTypeToString(def->virtType));
        return -1;
7091 7092 7093 7094 7095

    case VIR_DOMAIN_VIRT_LAST:
    default:
        virReportEnumRangeError(virDomainVirtType, def->virtType);
        return -1;
7096
    }
7097 7098 7099 7100

    /* To avoid the collision of creating USB controllers when calling
     * machine->init in QEMU, it needs to set usb=off
     */
7101
    virBufferAddLit(&buf, ",usb=off");
7102 7103 7104

    if (vmport) {
        if (!virQEMUCapsSupportsVmport(qemuCaps, def)) {
7105
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
7106
                           _("vmport is not available "
7107
                             "with this QEMU binary"));
7108
            return -1;
7109
        }
7110

7111 7112 7113 7114
        virBufferAsprintf(&buf, ",vmport=%s",
                          virTristateSwitchTypeToString(vmport));
    }

7115 7116
    if (smm)
        virBufferAsprintf(&buf, ",smm=%s", virTristateSwitchTypeToString(smm));
7117

7118 7119 7120
    if (def->mem.dump_core) {
        virBufferAsprintf(&buf, ",dump-guest-core=%s",
                          virTristateSwitchTypeToString(def->mem.dump_core));
7121
    } else {
7122 7123
        virBufferAsprintf(&buf, ",dump-guest-core=%s",
                          cfg->dumpGuestCore ? "on" : "off");
7124
    }
M
Michal Privoznik 已提交
7125

7126 7127 7128 7129 7130
    if (def->mem.nosharepages) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MEM_MERGE)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("disable shared memory is not available "
                             "with this QEMU binary"));
7131
            return -1;
M
Michal Privoznik 已提交
7132
        }
7133

7134 7135
        virBufferAddLit(&buf, ",mem-merge=off");
    }
7136

7137 7138
    if (def->keywrap &&
        !qemuAppendKeyWrapMachineParms(&buf, qemuCaps, def->keywrap))
7139
        return -1;
7140

7141 7142 7143 7144 7145 7146 7147 7148 7149 7150 7151 7152 7153 7154 7155
    if (def->features[VIR_DOMAIN_FEATURE_GIC] == VIR_TRISTATE_SWITCH_ON) {
        bool hasGICVersionOption = virQEMUCapsGet(qemuCaps,
                                                  QEMU_CAPS_MACH_VIRT_GIC_VERSION);

        switch ((virGICVersion) def->gic_version) {
        case VIR_GIC_VERSION_2:
            if (!hasGICVersionOption) {
                /* If the gic-version option is not available, we can't
                 * configure the GIC; however, we know that before the
                 * option was introduced the guests would always get a
                 * GICv2, so in order to maintain compatibility with
                 * those old QEMU versions all we need to do is stop
                 * early instead of erroring out */
                break;
            }
7156
            G_GNUC_FALLTHROUGH;
L
Li Zhang 已提交
7157

7158 7159 7160
        case VIR_GIC_VERSION_3:
        case VIR_GIC_VERSION_HOST:
            if (!hasGICVersionOption) {
7161
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
7162
                               _("gic-version option is not available "
7163
                                 "with this QEMU binary"));
7164
                return -1;
7165 7166
            }

7167 7168 7169
            virBufferAsprintf(&buf, ",gic-version=%s",
                              virGICVersionTypeToString(def->gic_version));
            break;
M
Michal Privoznik 已提交
7170

7171 7172 7173 7174
        case VIR_GIC_VERSION_NONE:
        case VIR_GIC_VERSION_LAST:
        default:
            break;
M
Michal Privoznik 已提交
7175
        }
7176
    }
M
Michal Privoznik 已提交
7177

7178
    if (def->iommu) {
7179 7180
        switch (def->iommu->model) {
        case VIR_DOMAIN_IOMMU_MODEL_INTEL:
7181 7182 7183 7184 7185 7186
            /* qemuDomainDeviceDefValidateIOMMU() already made sure we have
             * one of QEMU_CAPS_DEVICE_INTEL_IOMMU or QEMU_CAPS_MACHINE_IOMMU:
             * here we handle the latter case, while the former is taken care
             * of in qemuBuildIOMMUCommandLine() */
            if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_IOMMU))
                virBufferAddLit(&buf, ",iommu=on");
7187
            break;
7188 7189

        case VIR_DOMAIN_IOMMU_MODEL_SMMUV3:
A
Andrea Bolognani 已提交
7190
            virBufferAddLit(&buf, ",iommu=smmuv3");
7191 7192
            break;

7193
        case VIR_DOMAIN_IOMMU_MODEL_LAST:
7194 7195 7196
        default:
            virReportEnumRangeError(virDomainIOMMUModel, def->iommu->model);
            return -1;
7197
        }
7198
    }
7199

7200 7201 7202
    for (i = 0; i < def->nmems; i++) {
        if (def->mems[i]->model == VIR_DOMAIN_MEMORY_MODEL_NVDIMM) {
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_NVDIMM)) {
7203
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
7204
                               _("nvdimm isn't supported by this QEMU binary"));
7205
                return -1;
7206
            }
7207 7208
            virBufferAddLit(&buf, ",nvdimm=on");
            break;
7209
        }
7210
    }
7211

7212 7213 7214 7215 7216
    if (def->features[VIR_DOMAIN_FEATURE_IOAPIC] != VIR_DOMAIN_IOAPIC_NONE) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_KERNEL_IRQCHIP)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("I/O APIC tuning is not supported by this "
                             "QEMU binary"));
7217
            return -1;
M
Michal Privoznik 已提交
7218
        }
7219 7220 7221
        switch ((virDomainIOAPIC) def->features[VIR_DOMAIN_FEATURE_IOAPIC]) {
        case VIR_DOMAIN_IOAPIC_QEMU:
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_KERNEL_IRQCHIP_SPLIT)) {
7222
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
7223
                               _("split I/O APIC is not supported by this "
7224
                                 "QEMU binary"));
7225
                return -1;
7226
            }
7227 7228 7229 7230 7231 7232 7233 7234
            virBufferAddLit(&buf, ",kernel_irqchip=split");
            break;
        case VIR_DOMAIN_IOAPIC_KVM:
            virBufferAddLit(&buf, ",kernel_irqchip=on");
            break;
        case VIR_DOMAIN_IOAPIC_NONE:
        case VIR_DOMAIN_IOAPIC_LAST:
            break;
7235
        }
7236
    }
7237

7238
    if (def->features[VIR_DOMAIN_FEATURE_HPT] == VIR_TRISTATE_SWITCH_ON) {
7239

7240 7241
        if (def->hpt_resizing != VIR_DOMAIN_HPT_RESIZING_NONE) {
            const char *str;
7242

7243 7244 7245 7246
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_PSERIES_RESIZE_HPT)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("HTP resizing is not supported by this "
                                 "QEMU binary"));
7247
                return -1;
7248 7249 7250 7251 7252 7253
            }

            str = virDomainHPTResizingTypeToString(def->hpt_resizing);
            if (!str) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("Invalid setting for HPT resizing"));
7254
                return -1;
7255
            }
7256

7257 7258
            virBufferAsprintf(&buf, ",resize-hpt=%s", str);
        }
7259 7260 7261 7262 7263 7264

        if (def->hpt_maxpagesize > 0) {
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_PSERIES_CAP_HPT_MAX_PAGE_SIZE)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("Configuring the page size for HPT guests "
                                 "is not supported by this QEMU binary"));
7265
                return -1;
7266 7267 7268 7269 7270
            }

            virBufferAsprintf(&buf, ",cap-hpt-max-page-size=%lluk",
                              def->hpt_maxpagesize);
        }
7271
    }
7272

7273 7274 7275 7276 7277 7278 7279
    if (def->features[VIR_DOMAIN_FEATURE_HTM] != VIR_TRISTATE_SWITCH_ABSENT) {
        const char *str;

        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_PSERIES_CAP_HTM)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("HTM configuration is not supported by this "
                             "QEMU binary"));
7280
            return -1;
7281 7282 7283 7284 7285 7286
        }

        str = virTristateSwitchTypeToString(def->features[VIR_DOMAIN_FEATURE_HTM]);
        if (!str) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Invalid setting for HTM state"));
7287
            return -1;
7288 7289 7290 7291 7292
        }

        virBufferAsprintf(&buf, ",cap-htm=%s", str);
    }

7293 7294 7295 7296 7297 7298 7299
    if (def->features[VIR_DOMAIN_FEATURE_NESTED_HV] != VIR_TRISTATE_SWITCH_ABSENT) {
        const char *str;

        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_PSERIES_CAP_NESTED_HV)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Nested HV configuration is not supported by "
                             "this QEMU binary"));
7300
            return -1;
7301 7302 7303 7304 7305 7306
        }

        str = virTristateSwitchTypeToString(def->features[VIR_DOMAIN_FEATURE_NESTED_HV]);
        if (!str) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Invalid setting for nested HV state"));
7307
            return -1;
7308 7309 7310 7311 7312
        }

        virBufferAsprintf(&buf, ",cap-nested-hv=%s", str);
    }

7313 7314 7315 7316 7317 7318 7319 7320 7321 7322 7323 7324 7325 7326 7327 7328 7329 7330 7331 7332
    if (def->features[VIR_DOMAIN_FEATURE_CCF_ASSIST] != VIR_TRISTATE_SWITCH_ABSENT) {
        const char *str;

        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_PSERIES_CAP_CCF_ASSIST)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("ccf-assist configuration is not supported by this "
                             "QEMU binary"));
            return -1;
        }

        str = virTristateSwitchTypeToString(def->features[VIR_DOMAIN_FEATURE_CCF_ASSIST]);
        if (!str) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Invalid setting for ccf-assist state"));
            return -1;
        }

        virBufferAsprintf(&buf, ",cap-ccf-assist=%s", str);
    }

7333 7334 7335 7336 7337
    if (cpu && cpu->model &&
        cpu->mode == VIR_CPU_MODE_HOST_MODEL &&
        qemuDomainIsPSeries(def) &&
        virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_PSERIES_MAX_CPU_COMPAT)) {
        virBufferAsprintf(&buf, ",max-cpu-compat=%s", cpu->model);
7338 7339
    }

7340
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_LOADPARM))
7341 7342
        qemuAppendLoadparmMachineParm(&buf, def);

7343 7344 7345
    if (def->sev)
        virBufferAddLit(&buf, ",memory-encryption=sev0");

7346 7347
    virCommandAddArgBuffer(cmd, &buf);

7348
    return 0;
7349 7350
}

7351 7352 7353 7354 7355 7356 7357 7358 7359 7360 7361 7362 7363 7364 7365 7366

static void
qemuBuildTSEGCommandLine(virCommandPtr cmd,
                         const virDomainDef *def)
{
    if (!def->tseg_specified)
        return;

    virCommandAddArg(cmd, "-global");

    /* PostParse callback guarantees that the size is divisible by 1 MiB */
    virCommandAddArgFormat(cmd, "mch.extended-tseg-mbytes=%llu",
                           def->tseg_size >> 20);
}


7367 7368
static int
qemuBuildSmpCommandLine(virCommandPtr cmd,
7369
                        virDomainDefPtr def)
7370
{
7371
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
7372 7373 7374 7375 7376 7377 7378 7379 7380 7381 7382 7383
    unsigned int maxvcpus = virDomainDefGetVcpusMax(def);
    unsigned int nvcpus = 0;
    virDomainVcpuDefPtr vcpu;
    size_t i;

    /* count non-hotpluggable enabled vcpus. Hotpluggable ones will be added
     * in a different way */
    for (i = 0; i < maxvcpus; i++) {
        vcpu = virDomainDefGetVcpu(def, i);
        if (vcpu->online && vcpu->hotpluggable == VIR_TRISTATE_BOOL_NO)
            nvcpus++;
    }
7384

7385 7386
    virCommandAddArg(cmd, "-smp");

7387
    virBufferAsprintf(&buf, "%u", nvcpus);
7388

7389 7390
    if (nvcpus != maxvcpus)
        virBufferAsprintf(&buf, ",maxcpus=%u", maxvcpus);
7391 7392 7393 7394 7395 7396 7397 7398 7399 7400
    /* sockets, cores, and threads are either all zero
     * or all non-zero, thus checking one of them is enough */
    if (def->cpu && def->cpu->sockets) {
        virBufferAsprintf(&buf, ",sockets=%u", def->cpu->sockets);
        virBufferAsprintf(&buf, ",cores=%u", def->cpu->cores);
        virBufferAsprintf(&buf, ",threads=%u", def->cpu->threads);
    } else {
        virBufferAsprintf(&buf, ",sockets=%u", virDomainDefGetVcpusMax(def));
        virBufferAsprintf(&buf, ",cores=%u", 1);
        virBufferAsprintf(&buf, ",threads=%u", 1);
7401 7402
    }

7403
    virCommandAddArgBuffer(cmd, &buf);
7404
    return 0;
7405 7406
}

7407

7408 7409
static int
qemuBuildMemPathStr(virQEMUDriverConfigPtr cfg,
7410
                    const virDomainDef *def,
7411 7412
                    virCommandPtr cmd,
                    qemuDomainObjPrivatePtr priv)
7413 7414
{
    const long system_page_size = virGetSystemPageSizeKB();
7415
    g_autofree char *mem_path = NULL;
7416

7417 7418 7419 7420 7421 7422
    /* There are two cases where we want to put -mem-path onto
     * the command line: First one is when there are no guest
     * NUMA nodes and hugepages are configured. The second one is
     * if user requested file allocation. */
    if (def->mem.nhugepages &&
        def->mem.hugepages[0].size != system_page_size) {
7423 7424 7425 7426 7427
        unsigned long long pagesize = def->mem.hugepages[0].size;
        if (!pagesize &&
            qemuBuildMemoryGetDefaultPagesize(cfg, &pagesize) < 0)
            return -1;
        if (qemuGetDomainHupageMemPath(def, cfg, pagesize, &mem_path) < 0)
7428 7429 7430 7431 7432
            return -1;
    } else if (def->mem.source == VIR_DOMAIN_MEMORY_SOURCE_FILE) {
        if (qemuGetMemoryBackingPath(def, cfg, "ram", &mem_path) < 0)
            return -1;
    } else {
7433
        return 0;
7434
    }
7435

7436
    if (def->mem.allocation != VIR_DOMAIN_MEMORY_ALLOCATION_IMMEDIATE) {
7437
        virCommandAddArgList(cmd, "-mem-prealloc", NULL);
7438 7439
        priv->memPrealloc = true;
    }
7440 7441

    virCommandAddArgList(cmd, "-mem-path", mem_path, NULL);
7442 7443 7444 7445

    return 0;
}

7446 7447 7448 7449 7450

static int
qemuBuildMemCommandLine(virCommandPtr cmd,
                        virQEMUDriverConfigPtr cfg,
                        const virDomainDef *def,
7451 7452
                        virQEMUCapsPtr qemuCaps,
                        qemuDomainObjPrivatePtr priv)
7453 7454 7455 7456 7457 7458 7459 7460 7461 7462 7463 7464 7465 7466 7467 7468 7469 7470
{
    if (qemuDomainDefValidateMemoryHotplug(def, qemuCaps, NULL) < 0)
        return -1;

    virCommandAddArg(cmd, "-m");

    if (virDomainDefHasMemoryHotplug(def)) {
        /* Use the 'k' suffix to let qemu handle the units */
        virCommandAddArgFormat(cmd, "size=%lluk,slots=%u,maxmem=%lluk",
                               virDomainDefGetMemoryInitial(def),
                               def->mem.memory_slots,
                               def->mem.max_memory);

    } else {
       virCommandAddArgFormat(cmd, "%llu",
                              virDomainDefGetMemoryInitial(def) / 1024);
    }

7471
    if (def->mem.allocation == VIR_DOMAIN_MEMORY_ALLOCATION_IMMEDIATE) {
7472
        virCommandAddArgList(cmd, "-mem-prealloc", NULL);
7473 7474
        priv->memPrealloc = true;
    }
7475

7476
    /*
7477 7478
     * Add '-mem-path' (and '-mem-prealloc') parameter here if
     * the hugepages and no numa node is specified.
7479 7480
     */
    if (!virDomainNumaGetNodeCount(def->numa) &&
7481
        qemuBuildMemPathStr(cfg, def, cmd, priv) < 0)
7482 7483
        return -1;

7484 7485 7486 7487 7488 7489 7490 7491
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_OVERCOMMIT)) {
        virCommandAddArg(cmd, "-overcommit");
        virCommandAddArgFormat(cmd, "mem-lock=%s", def->mem.locked ? "on" : "off");
    } else {
        virCommandAddArg(cmd, "-realtime");
        virCommandAddArgFormat(cmd, "mlock=%s",
                               def->mem.locked ? "on" : "off");
    }
7492 7493 7494 7495 7496

    return 0;
}


7497 7498
static int
qemuBuildIOThreadCommandLine(virCommandPtr cmd,
7499
                             const virDomainDef *def)
7500 7501 7502 7503 7504 7505 7506 7507 7508 7509 7510 7511 7512 7513 7514 7515 7516 7517 7518 7519 7520
{
    size_t i;

    if (def->niothreadids == 0)
        return 0;

    /* Create iothread objects using the defined iothreadids list
     * and the defined id and name from the list. These may be used
     * by a disk definition which will associate to an iothread by
     * supplying a value of an id from the list
     */
    for (i = 0; i < def->niothreadids; i++) {
        virCommandAddArg(cmd, "-object");
        virCommandAddArgFormat(cmd, "iothread,id=iothread%u",
                               def->iothreadids[i]->iothread_id);
    }

    return 0;
}


B
Bharata B Rao 已提交
7521
static int
7522
qemuBuildNumaArgStr(virQEMUDriverConfigPtr cfg,
7523
                    virDomainDefPtr def,
7524
                    virCommandPtr cmd,
7525
                    qemuDomainObjPrivatePtr priv)
B
Bharata B Rao 已提交
7526
{
7527
    size_t i, j;
7528
    virQEMUCapsPtr qemuCaps = priv->qemuCaps;
7529
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
7530 7531 7532
    char *cpumask = NULL;
    char *tmpmask = NULL;
    char *next = NULL;
7533
    virBufferPtr nodeBackends = NULL;
7534 7535
    bool needBackend = false;
    int rc;
7536
    int ret = -1;
7537
    size_t ncells = virDomainNumaGetNodeCount(def->numa);
7538
    const long system_page_size = virGetSystemPageSizeKB();
7539
    bool numa_distances = false;
B
Bharata B Rao 已提交
7540

7541
    if (virDomainNumatuneHasPerNodeBinding(def->numa) &&
7542
        !(virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_RAM) ||
M
Marc-André Lureau 已提交
7543 7544
          virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE) ||
          virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_MEMFD))) {
7545 7546 7547 7548 7549 7550
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Per-node memory binding is not supported "
                         "with this QEMU"));
        goto cleanup;
    }

7551 7552
    if (def->mem.nhugepages &&
        def->mem.hugepages[0].size != system_page_size &&
7553 7554 7555 7556 7557 7558 7559
        !virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("huge pages per NUMA node are not "
                         "supported with this QEMU"));
        goto cleanup;
    }

7560
    if (!virDomainNumatuneNodesetIsAvailable(def->numa, priv->autoNodeset))
7561 7562
        goto cleanup;

7563
    if (VIR_ALLOC_N(nodeBackends, ncells) < 0)
7564 7565 7566 7567
        goto cleanup;

    /* using of -numa memdev= cannot be combined with -numa mem=, thus we
     * need to check which approach to use */
7568
    for (i = 0; i < ncells; i++) {
7569
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_RAM) ||
M
Marc-André Lureau 已提交
7570 7571
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE) ||
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_MEMFD)) {
7572

7573
            if ((rc = qemuBuildMemoryCellBackendStr(def, cfg, i, priv,
7574
                                                    &nodeBackends[i])) < 0)
7575 7576
                goto cleanup;

7577 7578
            if (rc == 0)
                needBackend = true;
7579
        } else {
7580
            if (virDomainNumaGetNodeMemoryAccessMode(def->numa, i)) {
7581 7582 7583 7584 7585
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("Shared memory mapping is not supported "
                                 "with this QEMU"));
                goto cleanup;
            }
7586
        }
7587 7588
    }

7589
    if (!needBackend &&
7590
        qemuBuildMemPathStr(cfg, def, cmd, priv) < 0)
7591 7592
        goto cleanup;

7593
    for (i = 0; i < ncells; i++) {
7594
        VIR_FREE(cpumask);
7595
        if (!(cpumask = virBitmapFormat(virDomainNumaGetNodeCpumask(def->numa, i))))
7596 7597 7598 7599 7600 7601 7602 7603 7604 7605
            goto cleanup;

        if (strchr(cpumask, ',') &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_NUMA)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("disjoint NUMA cpu ranges are not supported "
                             "with this QEMU"));
            goto cleanup;
        }

7606 7607
        if (needBackend) {
            virCommandAddArg(cmd, "-object");
7608
            virCommandAddArgBuffer(cmd, &nodeBackends[i]);
7609
        }
7610

B
Bharata B Rao 已提交
7611
        virCommandAddArg(cmd, "-numa");
7612
        virBufferAsprintf(&buf, "node,nodeid=%zu", i);
7613

7614 7615 7616 7617 7618 7619 7620
        for (tmpmask = cpumask; tmpmask; tmpmask = next) {
            if ((next = strchr(tmpmask, ',')))
                *(next++) = '\0';
            virBufferAddLit(&buf, ",cpus=");
            virBufferAdd(&buf, tmpmask, -1);
        }

7621
        if (needBackend)
7622
            virBufferAsprintf(&buf, ",memdev=ram-node%zu", i);
7623
        else
7624
            virBufferAsprintf(&buf, ",mem=%llu",
7625
                              virDomainNumaGetNodeMemorySize(def->numa, i) / 1024);
B
Bharata B Rao 已提交
7626 7627 7628

        virCommandAddArgBuffer(cmd, &buf);
    }
7629 7630 7631 7632 7633 7634 7635 7636 7637 7638 7639 7640 7641 7642 7643 7644 7645 7646 7647 7648 7649 7650 7651 7652 7653 7654 7655 7656 7657 7658 7659 7660 7661 7662 7663 7664

    /* If NUMA node distance is specified for at least one pair
     * of nodes, we have to specify all the distances. Even
     * though they might be the default ones. */
    for (i = 0; i < ncells; i++) {
        for (j = 0; j < ncells; j++) {
            if (virDomainNumaNodeDistanceIsUsingDefaults(def->numa, i, j))
                continue;

            numa_distances = true;
            break;
        }
        if (numa_distances)
            break;
    }

    if (numa_distances) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_NUMA_DIST)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("setting NUMA distances is not "
                             "supported with this qemu"));
            goto cleanup;
        }

        for (i = 0; i < ncells; i++) {
            for (j = 0; j < ncells; j++) {
                size_t distance = virDomainNumaGetNodeDistance(def->numa, i, j);

                virCommandAddArg(cmd, "-numa");
                virBufferAsprintf(&buf, "dist,src=%zu,dst=%zu,val=%zu", i, j, distance);

                virCommandAddArgBuffer(cmd, &buf);
            }
        }
    }

7665
    ret = 0;
B
Bharata B Rao 已提交
7666

7667
 cleanup:
7668
    VIR_FREE(cpumask);
7669 7670

    if (nodeBackends) {
7671
        for (i = 0; i < ncells; i++)
7672
            virBufferFreeAndReset(&nodeBackends[i]);
7673 7674 7675 7676

        VIR_FREE(nodeBackends);
    }

7677
    return ret;
B
Bharata B Rao 已提交
7678
}
7679

7680

7681
static int
7682 7683 7684
qemuBuildMemoryDeviceCommandLine(virCommandPtr cmd,
                                 virQEMUDriverConfigPtr cfg,
                                 virDomainDefPtr def,
7685
                                 qemuDomainObjPrivatePtr priv)
7686 7687 7688 7689 7690 7691
{
    size_t i;

    /* memory hotplug requires NUMA to be enabled - we already checked
     * that memory devices are present only when NUMA is */
    for (i = 0; i < def->nmems; i++) {
7692
        g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
7693 7694
        char *dimmStr;

7695
        if (qemuBuildMemoryDimmBackendStr(&buf, def->mems[i], def, cfg, priv) < 0)
7696 7697
            return -1;

7698 7699 7700
        virCommandAddArg(cmd, "-object");
        virCommandAddArgBuffer(cmd, &buf);

7701
        if (!(dimmStr = qemuBuildMemoryDeviceStr(def->mems[i], priv)))
7702 7703
            return -1;

7704
        virCommandAddArgList(cmd, "-device", dimmStr, NULL);
7705 7706 7707 7708 7709 7710 7711 7712

        VIR_FREE(dimmStr);
    }

    return 0;
}


7713
static int
J
Ján Tomko 已提交
7714
qemuBuildGraphicsSDLCommandLine(virQEMUDriverConfigPtr cfg G_GNUC_UNUSED,
7715
                                virCommandPtr cmd,
J
Ján Tomko 已提交
7716
                                virQEMUCapsPtr qemuCaps G_GNUC_UNUSED,
7717 7718
                                virDomainGraphicsDefPtr graphics)
{
7719
    g_auto(virBuffer) opt = VIR_BUFFER_INITIALIZER;
7720

7721 7722 7723 7724 7725 7726 7727 7728 7729 7730 7731
    if (graphics->data.sdl.xauth)
        virCommandAddEnvPair(cmd, "XAUTHORITY", graphics->data.sdl.xauth);
    if (graphics->data.sdl.display)
        virCommandAddEnvPair(cmd, "DISPLAY", graphics->data.sdl.display);
    if (graphics->data.sdl.fullscreen)
        virCommandAddArg(cmd, "-full-screen");

    /* If using SDL for video, then we should just let it
     * use QEMU's host audio drivers, possibly SDL too
     * User can set these two before starting libvirtd
     */
7732 7733
    virCommandAddEnvPass(cmd, "QEMU_AUDIO_DRV");
    virCommandAddEnvPass(cmd, "SDL_AUDIODRIVER");
7734

7735 7736
    virCommandAddArg(cmd, "-display");
    virBufferAddLit(&opt, "sdl");
7737

7738
    if (graphics->data.sdl.gl != VIR_TRISTATE_BOOL_ABSENT) {
7739 7740
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SDL_GL)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
7741 7742
                           _("OpenGL for SDL is not supported with this QEMU "
                             "binary"));
7743
            return -1;
7744 7745
        }

7746
        virBufferAsprintf(&opt, ",gl=%s",
7747
                          virTristateSwitchTypeToString(graphics->data.sdl.gl));
7748

7749 7750
    }

7751
    virCommandAddArgBuffer(cmd, &opt);
7752

7753
    return 0;
7754 7755 7756
}


7757 7758 7759 7760
static int
qemuBuildGraphicsVNCCommandLine(virQEMUDriverConfigPtr cfg,
                                virCommandPtr cmd,
                                virQEMUCapsPtr qemuCaps,
7761
                                virDomainGraphicsDefPtr graphics)
7762
{
7763
    g_auto(virBuffer) opt = VIR_BUFFER_INITIALIZER;
7764
    virDomainGraphicsListenDefPtr glisten = NULL;
7765 7766 7767 7768 7769
    bool escapeAddr;

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VNC)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("vnc graphics are not supported with this QEMU"));
7770
        return -1;
7771 7772
    }

7773 7774 7775
    if (!(glisten = virDomainGraphicsGetListen(graphics, 0))) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("missing listen element"));
7776
        return -1;
7777
    }
7778

7779 7780
    switch (glisten->type) {
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_SOCKET:
7781 7782 7783 7784
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_VNC_MULTI_SERVERS))
            virBufferAddLit(&opt, "vnc=unix:");
        else
            virBufferAddLit(&opt, "unix:");
7785
        virQEMUBuildBufferEscapeComma(&opt, glisten->socket);
7786
        break;
7787

7788 7789
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_ADDRESS:
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_NETWORK:
7790 7791 7792 7793 7794
        if (!graphics->data.vnc.autoport &&
            (graphics->data.vnc.port < 5900 ||
             graphics->data.vnc.port > 65535)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("vnc port must be in range [5900,65535]"));
7795
            return -1;
7796
        }
7797

7798
        if (glisten->address) {
7799 7800 7801 7802 7803
            escapeAddr = strchr(glisten->address, ':') != NULL;
            if (escapeAddr)
                virBufferAsprintf(&opt, "[%s]", glisten->address);
            else
                virBufferAdd(&opt, glisten->address, -1);
7804 7805 7806
        }
        virBufferAsprintf(&opt, ":%d",
                          graphics->data.vnc.port - 5900);
7807

7808
        if (graphics->data.vnc.websocket)
7809
            virBufferAsprintf(&opt, ",websocket=%d", graphics->data.vnc.websocket);
7810 7811 7812
        break;

    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_NONE:
7813 7814 7815
        virBufferAddLit(&opt, "none");
        break;

7816 7817
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_LAST:
        break;
7818
    }
7819

7820 7821 7822
    if (graphics->data.vnc.sharePolicy) {
        virBufferAsprintf(&opt, ",share=%s",
                          virDomainGraphicsVNCSharePolicyTypeToString(
7823
                              graphics->data.vnc.sharePolicy));
7824
    }
7825

7826 7827
    if (graphics->data.vnc.auth.passwd || cfg->vncPassword)
        virBufferAddLit(&opt, ",password");
7828

7829
    if (cfg->vncTLS) {
7830 7831
        qemuDomainGraphicsPrivatePtr gfxPriv = QEMU_DOMAIN_GRAPHICS_PRIVATE(graphics);
        if (gfxPriv->tlsAlias) {
7832 7833 7834 7835 7836
            const char *secretAlias = NULL;

            if (gfxPriv->secinfo) {
                if (qemuBuildObjectSecretCommandLine(cmd,
                                                     gfxPriv->secinfo) < 0)
7837
                    return -1;
7838 7839 7840
                secretAlias = gfxPriv->secinfo->s.aes.alias;
            }

J
Ján Tomko 已提交
7841 7842 7843 7844
            if (qemuBuildTLSx509CommandLine(cmd,
                                            cfg->vncTLSx509certdir,
                                            true,
                                            cfg->vncTLSx509verify,
7845
                                            secretAlias,
7846
                                            gfxPriv->tlsAlias,
J
Ján Tomko 已提交
7847
                                            qemuCaps) < 0)
7848
                return -1;
J
Ján Tomko 已提交
7849

7850
            virBufferAsprintf(&opt, ",tls-creds=%s", gfxPriv->tlsAlias);
7851
        } else {
J
Ján Tomko 已提交
7852 7853 7854 7855 7856 7857 7858 7859
            virBufferAddLit(&opt, ",tls");
            if (cfg->vncTLSx509verify) {
                virBufferAddLit(&opt, ",x509verify=");
                virQEMUBuildBufferEscapeComma(&opt, cfg->vncTLSx509certdir);
            } else {
                virBufferAddLit(&opt, ",x509=");
                virQEMUBuildBufferEscapeComma(&opt, cfg->vncTLSx509certdir);
            }
7860
        }
7861
    }
7862

7863 7864
    if (cfg->vncSASL) {
        virBufferAddLit(&opt, ",sasl");
7865

7866 7867
        if (cfg->vncSASLdir)
            virCommandAddEnvPair(cmd, "SASL_CONF_PATH", cfg->vncSASLdir);
7868

7869
        /* TODO: Support ACLs later */
7870 7871 7872 7873 7874 7875 7876 7877 7878 7879 7880 7881
    }

    virCommandAddArg(cmd, "-vnc");
    virCommandAddArgBuffer(cmd, &opt);
    if (graphics->data.vnc.keymap)
        virCommandAddArgList(cmd, "-k", graphics->data.vnc.keymap, NULL);

    /* Unless user requested it, set the audio backend to none, to
     * prevent it opening the host OS audio devices, since that causes
     * security issues and might not work when using VNC.
     */
    if (cfg->vncAllowHostAudio)
7882
        virCommandAddEnvPass(cmd, "QEMU_AUDIO_DRV");
7883 7884 7885 7886 7887 7888 7889
    else
        virCommandAddEnvString(cmd, "QEMU_AUDIO_DRV=none");

    return 0;
}


7890 7891 7892 7893 7894 7895
static int
qemuBuildGraphicsSPICECommandLine(virQEMUDriverConfigPtr cfg,
                                  virCommandPtr cmd,
                                  virQEMUCapsPtr qemuCaps,
                                  virDomainGraphicsDefPtr graphics)
{
7896
    g_auto(virBuffer) opt = VIR_BUFFER_INITIALIZER;
7897
    virDomainGraphicsListenDefPtr glisten = NULL;
7898 7899
    int port = graphics->data.spice.port;
    int tlsPort = graphics->data.spice.tlsPort;
7900
    size_t i;
7901 7902
    bool hasSecure = false;
    bool hasInsecure = false;
7903 7904 7905 7906

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SPICE)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("spice graphics are not supported with this QEMU"));
7907
        return -1;
7908 7909
    }

7910 7911 7912
    if (!(glisten = virDomainGraphicsGetListen(graphics, 0))) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("missing listen element"));
7913
        return -1;
7914
    }
7915

7916 7917 7918
    switch (glisten->type) {
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_SOCKET:
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SPICE_UNIX)) {
7919
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
7920 7921
                           _("unix socket for spice graphics are not supported "
                             "with this QEMU"));
7922
            return -1;
7923 7924
        }

7925
        virBufferAddLit(&opt, "unix,addr=");
7926
        virQEMUBuildBufferEscapeComma(&opt, glisten->socket);
7927
        virBufferAddLit(&opt, ",");
7928 7929 7930 7931 7932 7933 7934 7935 7936 7937 7938 7939 7940 7941 7942
        hasInsecure = true;
        break;

    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_ADDRESS:
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_NETWORK:
        if (port > 0) {
            virBufferAsprintf(&opt, "port=%u,", port);
            hasInsecure = true;
        }

        if (tlsPort > 0) {
            if (!cfg->spiceTLS) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("spice TLS port set in XML configuration, "
                                 "but TLS is disabled in qemu.conf"));
7943
                return -1;
7944 7945 7946 7947 7948 7949 7950 7951 7952 7953 7954 7955 7956
            }
            virBufferAsprintf(&opt, "tls-port=%u,", tlsPort);
            hasSecure = true;
        }

        if (port > 0 || tlsPort > 0) {
            if (glisten->address)
                virBufferAsprintf(&opt, "addr=%s,", glisten->address);
        }

        break;

    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_NONE:
P
Pavel Hrdina 已提交
7957 7958 7959 7960 7961
        /* QEMU requires either port or tls-port to be specified if there is no
         * other argument. Use a dummy port=0. */
        virBufferAddLit(&opt, "port=0,");
        hasInsecure = true;
        break;
7962 7963
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_LAST:
        break;
7964
    }
7965

7966 7967 7968 7969 7970 7971 7972 7973 7974 7975
    if (cfg->spiceSASL) {
        virBufferAddLit(&opt, "sasl,");

        if (cfg->spiceSASLdir)
            virCommandAddEnvPair(cmd, "SASL_CONF_PATH",
                                 cfg->spiceSASLdir);

        /* TODO: Support ACLs later */
    }

7976 7977 7978
    if (graphics->data.spice.mousemode) {
        switch (graphics->data.spice.mousemode) {
        case VIR_DOMAIN_GRAPHICS_SPICE_MOUSE_MODE_SERVER:
7979
            virBufferAddLit(&opt, "agent-mouse=off,");
7980 7981
            break;
        case VIR_DOMAIN_GRAPHICS_SPICE_MOUSE_MODE_CLIENT:
7982
            virBufferAddLit(&opt, "agent-mouse=on,");
7983
            break;
7984
        case VIR_DOMAIN_GRAPHICS_SPICE_MOUSE_MODE_DEFAULT:
7985
            break;
7986 7987 7988 7989
        case VIR_DOMAIN_GRAPHICS_SPICE_MOUSE_MODE_LAST:
        default:
            virReportEnumRangeError(virDomainGraphicsSpiceMouseMode,
                                    graphics->data.spice.mousemode);
7990
            return -1;
7991 7992 7993 7994 7995 7996 7997 7998
        }
    }

    /* In the password case we set it via monitor command, to avoid
     * making it visible on CLI, so there's no use of password=XXX
     * in this bit of the code */
    if (!graphics->data.spice.auth.passwd &&
        !cfg->spicePassword)
7999
        virBufferAddLit(&opt, "disable-ticketing,");
8000

8001 8002 8003 8004 8005
    if (hasSecure) {
        virBufferAddLit(&opt, "x509-dir=");
        virQEMUBuildBufferEscapeComma(&opt, cfg->spiceTLSx509certdir);
        virBufferAddLit(&opt, ",");
    }
8006

8007
    switch (graphics->data.spice.defaultMode) {
8008
    case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_SECURE:
8009 8010 8011 8012 8013
        if (!hasSecure) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("spice defaultMode secure requested in XML "
                             "configuration, but TLS connection is not "
                             "available"));
8014
            return -1;
8015
        }
8016
        virBufferAddLit(&opt, "tls-channel=default,");
8017 8018
        break;
    case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_INSECURE:
8019 8020 8021 8022 8023
        if (!hasInsecure) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("spice defaultMode insecure requested in XML "
                             "configuration, but plaintext connection is not "
                             "available"));
8024
            return -1;
8025
        }
8026
        virBufferAddLit(&opt, "plaintext-channel=default,");
8027 8028
        break;
    case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_ANY:
8029
    case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_LAST:
8030 8031 8032 8033
        /* nothing */
        break;
    }

8034
    for (i = 0; i < VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_LAST; i++) {
8035
        switch (graphics->data.spice.channels[i]) {
8036
        case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_SECURE:
8037
            if (!hasSecure) {
8038
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
8039 8040 8041
                               _("spice secure channels set in XML "
                                 "configuration, but TLS connection is not "
                                 "available"));
8042
                return -1;
8043
            }
8044
            virBufferAsprintf(&opt, "tls-channel=%s,",
8045 8046
                              virDomainGraphicsSpiceChannelNameTypeToString(i));
            break;
8047

8048
        case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_INSECURE:
8049
            if (!hasInsecure) {
8050 8051
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("spice insecure channels set in XML "
8052 8053
                                 "configuration, but plaintext connection "
                                 "is not available"));
8054
                return -1;
8055
            }
8056
            virBufferAsprintf(&opt, "plaintext-channel=%s,",
8057 8058
                              virDomainGraphicsSpiceChannelNameTypeToString(i));
            break;
8059 8060 8061

        case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_ANY:
            break;
8062 8063
        }
    }
8064

8065
    if (graphics->data.spice.image)
8066
        virBufferAsprintf(&opt, "image-compression=%s,",
8067 8068
                          virDomainGraphicsSpiceImageCompressionTypeToString(graphics->data.spice.image));
    if (graphics->data.spice.jpeg)
8069
        virBufferAsprintf(&opt, "jpeg-wan-compression=%s,",
8070 8071
                          virDomainGraphicsSpiceJpegCompressionTypeToString(graphics->data.spice.jpeg));
    if (graphics->data.spice.zlib)
8072
        virBufferAsprintf(&opt, "zlib-glz-wan-compression=%s,",
8073 8074
                          virDomainGraphicsSpiceZlibCompressionTypeToString(graphics->data.spice.zlib));
    if (graphics->data.spice.playback)
8075
        virBufferAsprintf(&opt, "playback-compression=%s,",
J
Ján Tomko 已提交
8076
                          virTristateSwitchTypeToString(graphics->data.spice.playback));
8077
    if (graphics->data.spice.streaming)
8078
        virBufferAsprintf(&opt, "streaming-video=%s,",
8079
                          virDomainGraphicsSpiceStreamingModeTypeToString(graphics->data.spice.streaming));
J
Ján Tomko 已提交
8080
    if (graphics->data.spice.copypaste == VIR_TRISTATE_BOOL_NO)
8081 8082
        virBufferAddLit(&opt, "disable-copy-paste,");

J
Ján Tomko 已提交
8083
    if (graphics->data.spice.filetransfer == VIR_TRISTATE_BOOL_NO) {
8084 8085 8086
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SPICE_FILE_XFER_DISABLE)) {
           virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                          _("This QEMU can't disable file transfers through spice"));
8087
            return -1;
8088
        } else {
8089
            virBufferAddLit(&opt, "disable-agent-file-xfer,");
8090 8091
        }
    }
8092

8093
    if (graphics->data.spice.gl == VIR_TRISTATE_BOOL_YES) {
8094 8095 8096
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SPICE_GL)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("This QEMU doesn't support spice OpenGL"));
8097
            return -1;
8098 8099 8100 8101
        }

        /* spice.gl is a TristateBool, but qemu expects on/off: use
         * TristateSwitch helper */
8102
        virBufferAsprintf(&opt, "gl=%s,",
8103
                          virTristateSwitchTypeToString(graphics->data.spice.gl));
8104 8105 8106 8107 8108

        if (graphics->data.spice.rendernode) {
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SPICE_RENDERNODE)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("This QEMU doesn't support spice OpenGL rendernode"));
8109
                return -1;
8110 8111
            }

8112 8113 8114
            virBufferAddLit(&opt, "rendernode=");
            virQEMUBuildBufferEscapeComma(&opt, graphics->data.spice.rendernode);
            virBufferAddLit(&opt, ",");
8115
        }
8116 8117
    }

8118 8119 8120
    /* Turn on seamless migration unconditionally. If migration destination
     * doesn't support it, it fallbacks to previous migration algorithm silently. */
    virBufferAddLit(&opt, "seamless-migration=on,");
8121

8122 8123
    virBufferTrim(&opt, ",", -1);

8124
    virCommandAddArg(cmd, "-spice");
P
Pavel Hrdina 已提交
8125
    virCommandAddArgBuffer(cmd, &opt);
8126 8127 8128 8129 8130 8131 8132 8133 8134 8135 8136
    if (graphics->data.spice.keymap)
        virCommandAddArgList(cmd, "-k",
                             graphics->data.spice.keymap, NULL);
    /* SPICE includes native support for tunnelling audio, so we
     * set the audio backend to point at SPICE's own driver
     */
    virCommandAddEnvString(cmd, "QEMU_AUDIO_DRV=spice");

    return 0;
}

8137

8138
static int
J
Ján Tomko 已提交
8139
qemuBuildGraphicsEGLHeadlessCommandLine(virQEMUDriverConfigPtr cfg G_GNUC_UNUSED,
8140
                                        virCommandPtr cmd,
8141 8142
                                        virQEMUCapsPtr qemuCaps,
                                        virDomainGraphicsDefPtr graphics)
8143
{
8144
    g_auto(virBuffer) opt = VIR_BUFFER_INITIALIZER;
8145 8146 8147 8148 8149 8150 8151 8152

    virBufferAddLit(&opt, "egl-headless");

    if (graphics->data.egl_headless.rendernode) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_EGL_HEADLESS_RENDERNODE)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("This QEMU doesn't support OpenGL rendernode "
                             "with egl-headless graphics type"));
8153
            return -1;
8154 8155 8156 8157 8158 8159 8160
        }

        virBufferAddLit(&opt, ",rendernode=");
        virQEMUBuildBufferEscapeComma(&opt,
                                      graphics->data.egl_headless.rendernode);
    }

8161
    virCommandAddArg(cmd, "-display");
8162
    virCommandAddArgBuffer(cmd, &opt);
8163

8164
    return 0;
8165 8166 8167
}


8168
static int
8169
qemuBuildGraphicsCommandLine(virQEMUDriverConfigPtr cfg,
8170
                             virCommandPtr cmd,
8171 8172
                             virDomainDefPtr def,
                             virQEMUCapsPtr qemuCaps)
8173
{
8174
    size_t i;
8175

8176 8177
    for (i = 0; i < def->ngraphics; i++) {
        virDomainGraphicsDefPtr graphics = def->graphics[i];
8178

8179 8180 8181 8182 8183
        switch (graphics->type) {
        case VIR_DOMAIN_GRAPHICS_TYPE_SDL:
            if (qemuBuildGraphicsSDLCommandLine(cfg, cmd,
                                                qemuCaps, graphics) < 0)
                return -1;
8184

8185 8186 8187 8188 8189 8190 8191 8192 8193 8194 8195 8196
            break;
        case VIR_DOMAIN_GRAPHICS_TYPE_VNC:
            if (qemuBuildGraphicsVNCCommandLine(cfg, cmd,
                                                qemuCaps, graphics) < 0)
                return -1;

            break;
        case VIR_DOMAIN_GRAPHICS_TYPE_SPICE:
            if (qemuBuildGraphicsSPICECommandLine(cfg, cmd,
                                                  qemuCaps, graphics) < 0)
                return -1;

8197 8198
            break;
        case VIR_DOMAIN_GRAPHICS_TYPE_EGL_HEADLESS:
8199 8200 8201
            if (qemuBuildGraphicsEGLHeadlessCommandLine(cfg, cmd,
                                                        qemuCaps, graphics) < 0)
                return -1;
8202

8203 8204 8205 8206 8207 8208 8209 8210 8211 8212 8213 8214
            break;
        case VIR_DOMAIN_GRAPHICS_TYPE_RDP:
        case VIR_DOMAIN_GRAPHICS_TYPE_DESKTOP:
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("unsupported graphics type '%s'"),
                           virDomainGraphicsTypeToString(graphics->type));
            return -1;
        case VIR_DOMAIN_GRAPHICS_TYPE_LAST:
        default:
            virReportEnumRangeError(virDomainGraphicsType, graphics->type);
            return -1;
        }
8215
    }
8216

8217 8218
    return 0;
}
8219

M
Michele Paolino 已提交
8220
static int
8221
qemuInterfaceVhostuserConnect(virQEMUDriverPtr driver,
8222
                              virLogManagerPtr logManager,
8223
                              virSecurityManagerPtr secManager,
8224
                              virCommandPtr cmd,
M
Michele Paolino 已提交
8225 8226
                              virDomainDefPtr def,
                              virDomainNetDefPtr net,
8227
                              virQEMUCapsPtr qemuCaps,
8228
                              char **chardev)
M
Michele Paolino 已提交
8229
{
8230
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
M
Michele Paolino 已提交
8231

8232
    switch ((virDomainChrType)net->data.vhostuser->type) {
M
Michele Paolino 已提交
8233
    case VIR_DOMAIN_CHR_TYPE_UNIX:
8234 8235 8236 8237
        if (!(*chardev = qemuBuildChrChardevStr(logManager, secManager,
                                                cmd, cfg, def,
                                                net->data.vhostuser,
                                                net->info.alias, qemuCaps, 0)))
8238
            return -1;
M
Michele Paolino 已提交
8239 8240 8241 8242 8243 8244 8245 8246 8247 8248 8249 8250 8251 8252 8253 8254 8255
        break;

    case VIR_DOMAIN_CHR_TYPE_NULL:
    case VIR_DOMAIN_CHR_TYPE_VC:
    case VIR_DOMAIN_CHR_TYPE_PTY:
    case VIR_DOMAIN_CHR_TYPE_DEV:
    case VIR_DOMAIN_CHR_TYPE_FILE:
    case VIR_DOMAIN_CHR_TYPE_PIPE:
    case VIR_DOMAIN_CHR_TYPE_STDIO:
    case VIR_DOMAIN_CHR_TYPE_UDP:
    case VIR_DOMAIN_CHR_TYPE_TCP:
    case VIR_DOMAIN_CHR_TYPE_SPICEVMC:
    case VIR_DOMAIN_CHR_TYPE_SPICEPORT:
    case VIR_DOMAIN_CHR_TYPE_NMDM:
    case VIR_DOMAIN_CHR_TYPE_LAST:
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("vhost-user type '%s' not supported"),
8256
                       virDomainChrTypeToString(net->data.vhostuser->type));
8257
        return -1;
M
Michele Paolino 已提交
8258 8259
    }

8260
    return 0;
M
Michele Paolino 已提交
8261 8262
}

8263
static int
8264
qemuBuildInterfaceCommandLine(virQEMUDriverPtr driver,
8265
                              virDomainObjPtr vm,
8266
                              virLogManagerPtr logManager,
8267
                              virSecurityManagerPtr secManager,
8268
                              virCommandPtr cmd,
8269 8270
                              virDomainNetDefPtr net,
                              virQEMUCapsPtr qemuCaps,
8271
                              unsigned int bootindex,
8272
                              virNetDevVPortProfileOp vmop,
8273
                              bool standalone,
8274
                              size_t *nnicindexes,
8275
                              int **nicindexes)
8276
{
8277
    virDomainDefPtr def = vm->def;
8278
    int ret = -1;
8279 8280 8281
    g_autofree char *nic = NULL;
    g_autofree char *host = NULL;
    g_autofree char *chardev = NULL;
8282
    int *tapfd = NULL;
8283
    size_t tapfdSize = 0;
8284
    int *vhostfd = NULL;
8285
    size_t vhostfdSize = 0;
8286 8287
    char **tapfdName = NULL;
    char **vhostfdName = NULL;
8288
    g_autofree char *slirpfdName = NULL;
8289
    virDomainNetType actualType = virDomainNetGetActualType(net);
8290
    virNetDevBandwidthPtr actualBandwidth;
8291
    bool requireNicdev = false;
8292
    qemuSlirpPtr slirp;
8293
    size_t i;
8294

8295 8296 8297 8298

    if (!bootindex)
        bootindex = net->info.bootIndex;

8299
    if (qemuDomainValidateActualNetDef(net, qemuCaps) < 0)
8300
        return -1;
8301

8302
    switch (actualType) {
8303
    case VIR_DOMAIN_NET_TYPE_NETWORK:
8304
    case VIR_DOMAIN_NET_TYPE_BRIDGE:
8305 8306 8307 8308 8309
        tapfdSize = net->driver.virtio.queues;
        if (!tapfdSize)
            tapfdSize = 1;

        if (VIR_ALLOC_N(tapfd, tapfdSize) < 0 ||
8310
            VIR_ALLOC_N(tapfdName, tapfdSize) < 0)
8311 8312
            goto cleanup;

8313 8314
        memset(tapfd, -1, tapfdSize * sizeof(tapfd[0]));

8315
        if (qemuInterfaceBridgeConnect(def, driver, net,
8316
                                       tapfd, &tapfdSize) < 0)
8317
            goto cleanup;
8318 8319 8320
        break;

    case VIR_DOMAIN_NET_TYPE_DIRECT:
8321 8322 8323 8324 8325 8326
        tapfdSize = net->driver.virtio.queues;
        if (!tapfdSize)
            tapfdSize = 1;

        if (VIR_ALLOC_N(tapfd, tapfdSize) < 0 ||
            VIR_ALLOC_N(tapfdName, tapfdSize) < 0)
8327
            goto cleanup;
8328 8329 8330

        memset(tapfd, -1, tapfdSize * sizeof(tapfd[0]));

8331 8332
        if (qemuInterfaceDirectConnect(def, driver, net,
                                       tapfd, tapfdSize, vmop) < 0)
8333
            goto cleanup;
8334 8335 8336
        break;

    case VIR_DOMAIN_NET_TYPE_ETHERNET:
8337 8338 8339 8340 8341 8342 8343 8344 8345 8346 8347
        tapfdSize = net->driver.virtio.queues;
        if (!tapfdSize)
            tapfdSize = 1;

        if (VIR_ALLOC_N(tapfd, tapfdSize) < 0 ||
            VIR_ALLOC_N(tapfdName, tapfdSize) < 0)
            goto cleanup;

        memset(tapfd, -1, tapfdSize * sizeof(tapfd[0]));

        if (qemuInterfaceEthernetConnect(def, driver, net,
8348
                                         tapfd, tapfdSize) < 0)
8349
            goto cleanup;
8350 8351 8352
        break;

    case VIR_DOMAIN_NET_TYPE_HOSTDEV:
8353 8354 8355 8356 8357
        /* NET_TYPE_HOSTDEV devices are really hostdev devices, so
         * their commandlines are constructed with other hostdevs.
         */
        ret = 0;
        goto cleanup;
8358 8359 8360
        break;

    case VIR_DOMAIN_NET_TYPE_VHOSTUSER:
8361 8362 8363 8364 8365 8366 8367 8368 8369 8370
        requireNicdev = true;

        if (qemuInterfaceVhostuserConnect(driver, logManager, secManager,
                                          cmd, def, net, qemuCaps, &chardev) < 0)
            goto cleanup;

        if (virNetDevOpenvswitchGetVhostuserIfname(net->data.vhostuser->data.nix.path,
                                                   &net->ifname) < 0)
            goto cleanup;

8371 8372 8373 8374 8375 8376 8377 8378 8379 8380 8381
        break;

    case VIR_DOMAIN_NET_TYPE_USER:
    case VIR_DOMAIN_NET_TYPE_SERVER:
    case VIR_DOMAIN_NET_TYPE_CLIENT:
    case VIR_DOMAIN_NET_TYPE_MCAST:
    case VIR_DOMAIN_NET_TYPE_INTERNAL:
    case VIR_DOMAIN_NET_TYPE_UDP:
    case VIR_DOMAIN_NET_TYPE_LAST:
        /* nada */
        break;
8382 8383
    }

8384 8385 8386 8387 8388
    /* For types whose implementations use a netdev on the host, add
     * an entry to nicindexes for passing on to systemd.
    */
    switch ((virDomainNetType)actualType) {
    case VIR_DOMAIN_NET_TYPE_ETHERNET:
8389
    case VIR_DOMAIN_NET_TYPE_NETWORK:
8390 8391 8392 8393 8394 8395 8396 8397
    case VIR_DOMAIN_NET_TYPE_BRIDGE:
    case VIR_DOMAIN_NET_TYPE_DIRECT:
    {
        int nicindex;

        /* network and bridge use a tap device, and direct uses a
         * macvtap device
         */
8398 8399
        if (virQEMUDriverIsPrivileged(driver) && nicindexes && nnicindexes &&
            net->ifname) {
8400 8401 8402 8403 8404 8405 8406 8407 8408 8409 8410 8411
            if (virNetDevGetIndex(net->ifname, &nicindex) < 0 ||
                VIR_APPEND_ELEMENT(*nicindexes, *nnicindexes, nicindex) < 0)
                goto cleanup;
        }
        break;
    }

    case VIR_DOMAIN_NET_TYPE_USER:
    case VIR_DOMAIN_NET_TYPE_VHOSTUSER:
    case VIR_DOMAIN_NET_TYPE_SERVER:
    case VIR_DOMAIN_NET_TYPE_CLIENT:
    case VIR_DOMAIN_NET_TYPE_MCAST:
8412
    case VIR_DOMAIN_NET_TYPE_UDP:
8413 8414 8415 8416 8417 8418 8419 8420 8421 8422 8423 8424 8425 8426 8427 8428
    case VIR_DOMAIN_NET_TYPE_INTERNAL:
    case VIR_DOMAIN_NET_TYPE_HOSTDEV:
    case VIR_DOMAIN_NET_TYPE_LAST:
       /* These types don't use a network device on the host, but
        * instead use some other type of connection to the emulated
        * device in the qemu process.
        *
        * (Note that hostdev can't be considered as "using a network
        * device", because by the time it is being used, it has been
        * detached from the hostside network driver so it doesn't show
        * up in the list of interfaces on the host - it's just some
        * PCI device.)
        */
       break;
    }

8429 8430 8431 8432
    /* Set bandwidth or warn if requested and not supported. */
    actualBandwidth = virDomainNetGetActualBandwidth(net);
    if (actualBandwidth) {
        if (virNetDevSupportBandwidth(actualType)) {
8433 8434
            if (virNetDevBandwidthSet(net->ifname, actualBandwidth, false,
                                      !virDomainNetTypeSharesHostView(net)) < 0)
8435 8436 8437 8438 8439 8440 8441
                goto cleanup;
        } else {
            VIR_WARN("setting bandwidth on interfaces of "
                     "type '%s' is not implemented yet",
                     virDomainNetTypeToString(actualType));
        }
    }
8442

8443 8444 8445 8446
    if (net->mtu &&
        virNetDevSetMTU(net->ifname, net->mtu) < 0)
        goto cleanup;

8447 8448 8449 8450 8451
    if ((actualType == VIR_DOMAIN_NET_TYPE_NETWORK ||
         actualType == VIR_DOMAIN_NET_TYPE_BRIDGE ||
         actualType == VIR_DOMAIN_NET_TYPE_ETHERNET ||
         actualType == VIR_DOMAIN_NET_TYPE_DIRECT) &&
        !standalone) {
8452 8453
        /* Attempt to use vhost-net mode for these types of
           network device */
8454 8455 8456 8457 8458
        vhostfdSize = net->driver.virtio.queues;
        if (!vhostfdSize)
            vhostfdSize = 1;

        if (VIR_ALLOC_N(vhostfd, vhostfdSize) < 0 ||
8459
            VIR_ALLOC_N(vhostfdName, vhostfdSize))
8460 8461
            goto cleanup;

8462 8463
        memset(vhostfd, -1, vhostfdSize * sizeof(vhostfd[0]));

J
Ján Tomko 已提交
8464
        if (qemuInterfaceOpenVhostNet(def, net, vhostfd, &vhostfdSize) < 0)
8465 8466 8467
            goto cleanup;
    }

8468 8469 8470 8471 8472
    slirp = QEMU_DOMAIN_NETWORK_PRIVATE(net)->slirp;
    if (slirp && !standalone) {
        int slirpfd = qemuSlirpGetFD(slirp);
        virCommandPassFD(cmd, slirpfd,
                         VIR_COMMAND_PASS_FD_CLOSE_PARENT);
8473
        slirpfdName = g_strdup_printf("%d", slirpfd);
8474 8475 8476
    }


8477
    for (i = 0; i < tapfdSize; i++) {
8478 8479
        if (qemuSecuritySetTapFDLabel(driver->securityManager,
                                      def, tapfd[i]) < 0)
M
Michal Privoznik 已提交
8480
            goto cleanup;
8481
        tapfdName[i] = g_strdup_printf("%d", tapfd[i]);
8482 8483 8484
        virCommandPassFD(cmd, tapfd[i],
                         VIR_COMMAND_PASS_FD_CLOSE_PARENT);
        tapfd[i] = -1;
8485 8486
    }

8487
    for (i = 0; i < vhostfdSize; i++) {
8488
        vhostfdName[i] = g_strdup_printf("%d", vhostfd[i]);
8489 8490 8491
        virCommandPassFD(cmd, vhostfd[i],
                         VIR_COMMAND_PASS_FD_CLOSE_PARENT);
        vhostfd[i] = -1;
8492 8493
    }

8494 8495 8496
    if (chardev)
        virCommandAddArgList(cmd, "-chardev", chardev, NULL);

8497
    if (!(host = qemuBuildHostNetStr(net,
8498
                                     tapfdName, tapfdSize,
8499 8500
                                     vhostfdName, vhostfdSize,
                                     slirpfdName)))
8501 8502 8503
        goto cleanup;
    virCommandAddArgList(cmd, "-netdev", host, NULL);

8504 8505
    /* Possible combinations:
     *
8506 8507 8508
     *   Old way: -netdev type=tap,id=netdev1 \
     *              -net nic,model=e1000,netdev=netdev1
     *   New way: -netdev type=tap,id=netdev1 -device e1000,id=netdev1
8509
     */
8510
    if (qemuDomainSupportsNicdev(def, net)) {
8511 8512 8513
        if (qemuCommandAddExtDevice(cmd, &net->info) < 0)
            goto cleanup;

8514
        if (!(nic = qemuBuildNicDevStr(def, net, bootindex,
8515
                                       net->driver.virtio.queues, qemuCaps)))
8516 8517
            goto cleanup;
        virCommandAddArgList(cmd, "-device", nic, NULL);
8518
    } else if (!requireNicdev) {
8519 8520 8521
        if (qemuCommandAddExtDevice(cmd, &net->info) < 0)
            goto cleanup;

8522
        if (!(nic = qemuBuildLegacyNicStr(net)))
8523 8524
            goto cleanup;
        virCommandAddArgList(cmd, "-net", nic, NULL);
8525 8526 8527 8528
    } else {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("Nicdev support unavailable"));
        goto cleanup;
8529 8530 8531
    }

    ret = 0;
8532
 cleanup:
8533
    if (ret < 0) {
8534 8535 8536
        virErrorPtr saved_err;

        virErrorPreserveLast(&saved_err);
8537
        virDomainConfNWFilterTeardown(net);
8538
        virErrorRestore(&saved_err);
8539
    }
8540
    for (i = 0; vhostfd && i < vhostfdSize; i++) {
8541 8542
        if (ret < 0)
            VIR_FORCE_CLOSE(vhostfd[i]);
8543 8544
        if (vhostfdName)
            VIR_FREE(vhostfdName[i]);
8545
    }
8546
    VIR_FREE(vhostfdName);
8547
    for (i = 0; tapfd && i < tapfdSize; i++) {
8548 8549 8550 8551 8552 8553
        if (ret < 0)
            VIR_FORCE_CLOSE(tapfd[i]);
        if (tapfdName)
            VIR_FREE(tapfdName[i]);
    }
    VIR_FREE(tapfdName);
8554
    VIR_FREE(vhostfd);
8555
    VIR_FREE(tapfd);
8556 8557 8558
    return ret;
}

8559 8560

/* NOTE: Not using const virDomainDef here since eventually a call is made
8561
 *       into qemuSecuritySetTapFDLabel which calls it's driver
8562 8563 8564
 *       API domainSetSecurityTapFDLabel that doesn't use the const format.
 */
static int
8565
qemuBuildNetCommandLine(virQEMUDriverPtr driver,
8566
                        virDomainObjPtr vm,
8567
                        virLogManagerPtr logManager,
8568
                        virSecurityManagerPtr secManager,
8569
                        virCommandPtr cmd,
8570 8571 8572 8573 8574
                        virQEMUCapsPtr qemuCaps,
                        virNetDevVPortProfileOp vmop,
                        bool standalone,
                        size_t *nnicindexes,
                        int **nicindexes,
8575
                        unsigned int *bootHostdevNet)
8576 8577 8578
{
    size_t i;
    int last_good_net = -1;
8579
    virErrorPtr originalError = NULL;
8580
    virDomainDefPtr def = vm->def;
8581

J
Ján Tomko 已提交
8582
    if (def->nnets) {
8583
        unsigned int bootNet = 0;
8584

8585 8586 8587 8588 8589
        /* convert <boot dev='network'/> to bootindex since we didn't emit -boot n */
        for (i = 0; i < def->os.nBootDevs; i++) {
            if (def->os.bootDevs[i] == VIR_DOMAIN_BOOT_NET) {
                bootNet = i + 1;
                break;
8590 8591 8592 8593 8594 8595
            }
        }

        for (i = 0; i < def->nnets; i++) {
            virDomainNetDefPtr net = def->nets[i];

8596
            if (qemuBuildInterfaceCommandLine(driver, vm, logManager, secManager, cmd, net,
8597
                                              qemuCaps, bootNet, vmop,
8598
                                              standalone, nnicindexes,
8599
                                              nicindexes) < 0)
8600 8601 8602 8603 8604 8605 8606 8607 8608 8609 8610 8611 8612 8613 8614 8615 8616 8617 8618
                goto error;

            last_good_net = i;
            /* if this interface is a type='hostdev' interface and we
             * haven't yet added a "bootindex" parameter to an
             * emulated network device, save the bootindex - hostdev
             * interface commandlines will be built later on when we
             * cycle through all the hostdevs, and we'll use it then.
             */
            if (virDomainNetGetActualType(net) == VIR_DOMAIN_NET_TYPE_HOSTDEV &&
                *bootHostdevNet == 0) {
                *bootHostdevNet = bootNet;
            }
            bootNet = 0;
        }
    }
    return 0;

 error:
8619 8620
    /* free up any resources in the network driver
     * but don't overwrite the original error */
8621
    virErrorPreserveLast(&originalError);
8622 8623
    for (i = 0; last_good_net != -1 && i <= last_good_net; i++)
        virDomainConfNWFilterTeardown(def->nets[i]);
8624
    virErrorRestore(&originalError);
8625 8626 8627 8628
    return -1;
}


8629 8630 8631 8632 8633 8634 8635 8636 8637 8638 8639 8640 8641 8642 8643 8644 8645 8646 8647 8648 8649 8650 8651 8652 8653 8654
static const char *
qemuBuildSmartcardFindCCIDController(const virDomainDef *def,
                                     const virDomainSmartcardDef *smartcard)
{
    size_t i;

    /* Should never happen. But doesn't hurt to check. */
    if (smartcard->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCID)
        return NULL;

    for (i = 0; i < def->ncontrollers; i++) {
        const virDomainControllerDef *tmp = def->controllers[i];

        if (tmp->type != VIR_DOMAIN_CONTROLLER_TYPE_CCID)
            continue;

        if (tmp->idx != smartcard->info.addr.ccid.controller)
            continue;

        return tmp->info.alias;
    }

    return NULL;
}


8655 8656
static int
qemuBuildSmartcardCommandLine(virLogManagerPtr logManager,
8657
                              virSecurityManagerPtr secManager,
8658
                              virCommandPtr cmd,
8659
                              virQEMUDriverConfigPtr cfg,
8660
                              const virDomainDef *def,
8661 8662
                              virQEMUCapsPtr qemuCaps,
                              bool chardevStdioLogd)
8663 8664 8665
{
    size_t i;
    virDomainSmartcardDefPtr smartcard;
8666
    g_autofree char *devstr = NULL;
8667
    g_auto(virBuffer) opt = VIR_BUFFER_INITIALIZER;
8668
    const char *database;
8669
    const char *contAlias = NULL;
8670 8671
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
8672 8673
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
8674 8675 8676 8677 8678 8679 8680 8681 8682 8683 8684 8685 8686 8687 8688 8689 8690 8691 8692 8693

    if (!def->nsmartcards)
        return 0;

    smartcard = def->smartcards[0];

    /* -device usb-ccid was already emitted along with other
     * controllers.  For now, qemu handles only one smartcard.  */
    if (def->nsmartcards > 1 ||
        smartcard->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCID ||
        smartcard->info.addr.ccid.controller != 0 ||
        smartcard->info.addr.ccid.slot != 0) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("this QEMU binary lacks multiple smartcard "
                         "support"));
        return -1;
    }

    switch (smartcard->type) {
    case VIR_DOMAIN_SMARTCARD_TYPE_HOST:
8694
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CCID_EMULATED)) {
8695 8696 8697 8698 8699 8700 8701 8702 8703 8704
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this QEMU binary lacks smartcard host "
                             "mode support"));
            return -1;
        }

        virBufferAddLit(&opt, "ccid-card-emulated,backend=nss-emulated");
        break;

    case VIR_DOMAIN_SMARTCARD_TYPE_HOST_CERTIFICATES:
8705
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CCID_EMULATED)) {
8706 8707 8708 8709 8710 8711 8712 8713
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this QEMU binary lacks smartcard host "
                             "mode support"));
            return -1;
        }

        virBufferAddLit(&opt, "ccid-card-emulated,backend=certificates");
        for (i = 0; i < VIR_DOMAIN_SMARTCARD_NUM_CERTIFICATES; i++) {
8714 8715
            virBufferAsprintf(&opt, ",cert%zu=", i + 1);
            virQEMUBuildBufferEscapeComma(&opt, smartcard->data.cert.file[i]);
8716 8717 8718 8719 8720 8721
        }
        if (smartcard->data.cert.database) {
            database = smartcard->data.cert.database;
        } else {
            database = VIR_DOMAIN_SMARTCARD_DEFAULT_DATABASE;
        }
8722 8723
        virBufferAddLit(&opt, ",db=");
        virQEMUBuildBufferEscapeComma(&opt, database);
8724 8725 8726
        break;

    case VIR_DOMAIN_SMARTCARD_TYPE_PASSTHROUGH:
8727
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CCID_PASSTHRU)) {
8728 8729 8730 8731 8732 8733
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this QEMU binary lacks smartcard "
                             "passthrough mode support"));
            return -1;
        }

8734 8735
        if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                              cmd, cfg, def,
8736
                                              smartcard->data.passthru,
8737
                                              smartcard->info.alias,
8738
                                              qemuCaps, cdevflags))) {
8739 8740
            return -1;
        }
8741
        virCommandAddArg(cmd, "-chardev");
8742 8743 8744 8745 8746 8747 8748 8749 8750 8751 8752 8753
        virCommandAddArg(cmd, devstr);

        virBufferAsprintf(&opt, "ccid-card-passthru,chardev=char%s",
                          smartcard->info.alias);
        break;

    default:
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("unexpected smartcard type %d"),
                       smartcard->type);
        return -1;
    }
8754 8755 8756 8757 8758 8759 8760 8761 8762

    if (!(contAlias = qemuBuildSmartcardFindCCIDController(def,
                                                           smartcard))) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Unable to find controller for %s"),
                       smartcard->info.alias);
        return -1;
    }

8763
    virCommandAddArg(cmd, "-device");
8764
    virBufferAsprintf(&opt, ",id=%s,bus=%s.0", smartcard->info.alias, contAlias);
8765 8766 8767 8768 8769 8770
    virCommandAddArgBuffer(cmd, &opt);

    return 0;
}


8771
static char *
8772 8773 8774
qemuBuildShmemDevLegacyStr(virDomainDefPtr def,
                           virDomainShmemDefPtr shmem,
                           virQEMUCapsPtr qemuCaps)
8775
{
8776
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
8777 8778 8779 8780 8781

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_IVSHMEM)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("ivshmem device is not supported "
                         "with this QEMU binary"));
8782
        return NULL;
8783 8784 8785
    }

    virBufferAddLit(&buf, "ivshmem");
8786 8787
    virBufferAsprintf(&buf, ",id=%s", shmem->info.alias);

8788
    if (shmem->size)
M
Martin Kletzander 已提交
8789
        virBufferAsprintf(&buf, ",size=%llum", shmem->size >> 20);
8790 8791

    if (!shmem->server.enabled) {
8792
        virBufferAsprintf(&buf, ",shm=%s", shmem->name);
8793
    } else {
8794
        virBufferAsprintf(&buf, ",chardev=char%s", shmem->info.alias);
8795 8796 8797 8798 8799 8800 8801 8802 8803 8804 8805
        if (shmem->msi.enabled) {
            virBufferAddLit(&buf, ",msi=on");
            if (shmem->msi.vectors)
                virBufferAsprintf(&buf, ",vectors=%u", shmem->msi.vectors);
            if (shmem->msi.ioeventfd)
                virBufferAsprintf(&buf, ",ioeventfd=%s",
                                  virTristateSwitchTypeToString(shmem->msi.ioeventfd));
        }
    }

    if (qemuBuildDeviceAddressStr(&buf, def, &shmem->info, qemuCaps) < 0)
8806
        return NULL;
8807

8808 8809 8810
    return virBufferContentAndReset(&buf);
}

8811 8812 8813 8814 8815
char *
qemuBuildShmemDevStr(virDomainDefPtr def,
                     virDomainShmemDefPtr shmem,
                     virQEMUCapsPtr qemuCaps)
{
8816
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
8817 8818 8819 8820 8821 8822 8823 8824 8825 8826 8827 8828 8829 8830 8831 8832 8833 8834 8835 8836 8837 8838 8839 8840 8841 8842 8843

    if ((shmem->model == VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_PLAIN &&
         !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_IVSHMEM_PLAIN)) ||
        (shmem->model == VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_DOORBELL &&
         !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_IVSHMEM_DOORBELL))) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("shmem model '%s' is not supported "
                             "by this QEMU binary"),
                           virDomainShmemModelTypeToString(shmem->model));
        return NULL;
    }

    virBufferAdd(&buf, virDomainShmemModelTypeToString(shmem->model), -1);
    virBufferAsprintf(&buf, ",id=%s", shmem->info.alias);

    if (shmem->server.enabled)
        virBufferAsprintf(&buf, ",chardev=char%s", shmem->info.alias);
    else
        virBufferAsprintf(&buf, ",memdev=shmmem-%s", shmem->info.alias);

    if (shmem->msi.vectors)
        virBufferAsprintf(&buf, ",vectors=%u", shmem->msi.vectors);
    if (shmem->msi.ioeventfd) {
        virBufferAsprintf(&buf, ",ioeventfd=%s",
                          virTristateSwitchTypeToString(shmem->msi.ioeventfd));
    }

8844
    if (qemuBuildDeviceAddressStr(&buf, def, &shmem->info, qemuCaps) < 0)
8845 8846 8847 8848 8849 8850 8851 8852 8853
        return NULL;

    return virBufferContentAndReset(&buf);
}


virJSONValuePtr
qemuBuildShmemBackendMemProps(virDomainShmemDefPtr shmem)
{
8854 8855
    g_autofree char *mem_alias = NULL;
    g_autofree char *mem_path = NULL;
8856 8857
    virJSONValuePtr ret = NULL;

8858
    mem_path = g_strdup_printf("/dev/shm/%s", shmem->name);
8859

8860
    mem_alias = g_strdup_printf("shmmem-%s", shmem->info.alias);
8861

8862 8863 8864 8865 8866
    qemuMonitorCreateObjectProps(&ret, "memory-backend-file", mem_alias,
                                 "s:mem-path", mem_path,
                                 "U:size", shmem->size,
                                 "b:share", true,
                                 NULL);
8867 8868 8869 8870 8871

    return ret;
}


8872
static int
8873
qemuBuildShmemCommandLine(virLogManagerPtr logManager,
8874
                          virSecurityManagerPtr secManager,
8875
                          virCommandPtr cmd,
8876
                          virQEMUDriverConfigPtr cfg,
8877 8878
                          virDomainDefPtr def,
                          virDomainShmemDefPtr shmem,
8879 8880
                          virQEMUCapsPtr qemuCaps,
                          bool chardevStdioLogd)
8881
{
J
Ján Tomko 已提交
8882
    g_autoptr(virJSONValue) memProps = NULL;
8883
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
8884 8885
    g_autofree char *devstr = NULL;
    g_autofree char *chardev = NULL;
8886
    int rc;
8887 8888
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
8889 8890
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
8891

8892 8893 8894 8895 8896 8897 8898 8899 8900 8901 8902 8903 8904 8905 8906 8907 8908 8909 8910 8911 8912 8913 8914 8915 8916 8917
    if (shmem->size) {
        /*
         * Thanks to our parsing code, we have a guarantee that the
         * size is power of two and is at least a mebibyte in size.
         * But because it may change in the future, the checks are
         * doubled in here.
         */
        if (shmem->size & (shmem->size - 1)) {
            virReportError(VIR_ERR_XML_ERROR, "%s",
                           _("shmem size must be a power of two"));
            return -1;
        }
        if (shmem->size < 1024 * 1024) {
            virReportError(VIR_ERR_XML_ERROR, "%s",
                           _("shmem size must be at least 1 MiB (1024 KiB)"));
            return -1;
        }
    }

    if (shmem->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("only 'pci' addresses are supported for the "
                         "shared memory device"));
        return -1;
    }

8918 8919 8920 8921 8922
    switch ((virDomainShmemModel)shmem->model) {
    case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM:
        devstr = qemuBuildShmemDevLegacyStr(def, shmem, qemuCaps);
        break;

8923
    case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_PLAIN:
8924
        if (!(memProps = qemuBuildShmemBackendMemProps(shmem)))
8925 8926
            return -1;

8927 8928 8929 8930 8931 8932 8933
        rc = virQEMUBuildObjectCommandlineFromJSON(&buf, memProps);

        if (rc < 0)
            return -1;

        virCommandAddArg(cmd, "-object");
        virCommandAddArgBuffer(cmd, &buf);
8934

8935
        G_GNUC_FALLTHROUGH;
8936
    case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_DOORBELL:
8937
        devstr = qemuBuildShmemDevStr(def, shmem, qemuCaps);
8938 8939
        break;

8940 8941 8942 8943 8944
    case VIR_DOMAIN_SHMEM_MODEL_LAST:
        break;
    }

    if (!devstr)
8945
        return -1;
8946

8947
    if (qemuCommandAddExtDevice(cmd, &shmem->info) < 0)
8948 8949
        return -1;

8950
    virCommandAddArgList(cmd, "-device", devstr, NULL);
8951 8952

    if (shmem->server.enabled) {
8953
        chardev = qemuBuildChrChardevStr(logManager, secManager,
8954
                                        cmd, cfg, def,
8955
                                        &shmem->server.chr,
8956 8957
                                        shmem->info.alias, qemuCaps,
                                        cdevflags);
8958
        if (!chardev)
8959 8960
            return -1;

8961
        virCommandAddArgList(cmd, "-chardev", chardev, NULL);
8962 8963 8964 8965 8966
    }

    return 0;
}

8967 8968 8969 8970 8971

static virQEMUCapsFlags
qemuChrSerialTargetModelToCaps(virDomainChrSerialTargetModel targetModel)
{
    switch (targetModel) {
8972 8973
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_ISA_SERIAL:
        return QEMU_CAPS_DEVICE_ISA_SERIAL;
8974 8975 8976 8977
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_USB_SERIAL:
        return QEMU_CAPS_DEVICE_USB_SERIAL;
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_PCI_SERIAL:
        return QEMU_CAPS_DEVICE_PCI_SERIAL;
8978 8979
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_SPAPR_VTY:
        return QEMU_CAPS_DEVICE_SPAPR_VTY;
8980 8981 8982 8983
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_SCLPCONSOLE:
        return QEMU_CAPS_DEVICE_SCLPCONSOLE;
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_SCLPLMCONSOLE:
        return QEMU_CAPS_DEVICE_SCLPLMCONSOLE;
8984
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_PL011:
8985
        return QEMU_CAPS_DEVICE_PL011;
8986
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_16550A:
8987 8988 8989 8990 8991 8992 8993 8994 8995
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_NONE:
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_LAST:
        break;
    }

    return 0;
}


8996 8997
static int
qemuBuildChrDeviceCommandLine(virCommandPtr cmd,
8998
                              const virDomainDef *def,
8999 9000 9001
                              virDomainChrDefPtr chr,
                              virQEMUCapsPtr qemuCaps)
{
9002
    g_autofree char *devstr = NULL;
9003 9004 9005 9006 9007 9008 9009 9010

    if (qemuBuildChrDeviceStr(&devstr, def, chr, qemuCaps) < 0)
        return -1;

    virCommandAddArgList(cmd, "-device", devstr, NULL);
    return 0;
}

9011

9012 9013 9014 9015
static bool
qemuChrIsPlatformDevice(const virDomainDef *def,
                        virDomainChrDefPtr chr)
{
S
Stefan Schallenberg 已提交
9016 9017 9018
    if (def->os.arch == VIR_ARCH_ARMV6L ||
        def->os.arch == VIR_ARCH_ARMV7L ||
        def->os.arch == VIR_ARCH_AARCH64) {
9019 9020

        /* pl011 (used on mach-virt) is a platform device */
9021
        if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL &&
9022 9023
            chr->targetType == VIR_DOMAIN_CHR_SERIAL_TARGET_TYPE_SYSTEM &&
            chr->targetModel == VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_PL011) {
9024
            return true;
9025
        }
9026 9027
    }

9028 9029 9030 9031 9032 9033 9034 9035 9036 9037
    if (ARCH_IS_RISCV(def->os.arch)) {

        /* 16550a (used by riscv/virt guests) is a platform device */
        if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL &&
            chr->targetType == VIR_DOMAIN_CHR_SERIAL_TARGET_TYPE_SYSTEM &&
            chr->targetModel == VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_16550A) {
            return true;
        }
    }

9038 9039 9040 9041 9042 9043 9044 9045
    /* If we got all the way here and we're still stuck with the default
     * target type for a serial device, it means we have no clue what kind of
     * device we're talking about and we must treat it as a platform device. */
    if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL &&
        chr->targetType == VIR_DOMAIN_CHR_SERIAL_TARGET_TYPE_NONE) {
        return true;
    }

9046 9047 9048 9049
    return false;
}


9050 9051
static int
qemuBuildSerialCommandLine(virLogManagerPtr logManager,
9052
                           virSecurityManagerPtr secManager,
9053
                           virCommandPtr cmd,
9054
                           virQEMUDriverConfigPtr cfg,
9055
                           const virDomainDef *def,
9056 9057
                           virQEMUCapsPtr qemuCaps,
                           bool chardevStdioLogd)
9058 9059 9060
{
    size_t i;
    bool havespice = false;
9061 9062
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
9063 9064
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
9065 9066 9067 9068 9069 9070 9071 9072 9073 9074

    if (def->nserials) {
        for (i = 0; i < def->ngraphics && !havespice; i++) {
            if (def->graphics[i]->type == VIR_DOMAIN_GRAPHICS_TYPE_SPICE)
                havespice = true;
        }
    }

    for (i = 0; i < def->nserials; i++) {
        virDomainChrDefPtr serial = def->serials[i];
9075
        g_autofree char *devstr = NULL;
9076

9077
        if (serial->source->type == VIR_DOMAIN_CHR_TYPE_SPICEPORT && !havespice)
9078 9079
            continue;

9080 9081
        if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                              cmd, cfg, def,
9082 9083
                                              serial->source,
                                              serial->info.alias,
9084
                                              qemuCaps, cdevflags)))
9085 9086 9087 9088
            return -1;
        virCommandAddArg(cmd, "-chardev");
        virCommandAddArg(cmd, devstr);

9089 9090
        /* If the device is not a platform device, build the devstr */
        if (!qemuChrIsPlatformDevice(def, serial)) {
9091 9092 9093
            if (qemuBuildChrDeviceCommandLine(cmd, def, serial, qemuCaps) < 0)
                return -1;
        } else {
9094 9095 9096 9097 9098 9099 9100 9101 9102 9103 9104
            virQEMUCapsFlags caps;

            caps = qemuChrSerialTargetModelToCaps(serial->targetModel);

            if (caps && !virQEMUCapsGet(qemuCaps, caps)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("'%s' is not supported in this QEMU binary"),
                               virDomainChrSerialTargetModelTypeToString(serial->targetModel));
                return -1;
            }

9105
            virCommandAddArg(cmd, "-serial");
9106
            virCommandAddArgFormat(cmd, "chardev:char%s", serial->info.alias);
9107 9108 9109 9110 9111 9112 9113
        }
    }

    return 0;
}


9114 9115
static int
qemuBuildParallelsCommandLine(virLogManagerPtr logManager,
9116
                              virSecurityManagerPtr secManager,
9117
                              virCommandPtr cmd,
9118
                              virQEMUDriverConfigPtr cfg,
9119
                              const virDomainDef *def,
9120 9121
                              virQEMUCapsPtr qemuCaps,
                              bool chardevStdioLogd)
9122 9123
{
    size_t i;
9124 9125
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
9126 9127
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
9128 9129 9130

    for (i = 0; i < def->nparallels; i++) {
        virDomainChrDefPtr parallel = def->parallels[i];
9131
        g_autofree char *devstr = NULL;
9132

9133 9134
        if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                              cmd, cfg, def,
9135 9136
                                              parallel->source,
                                              parallel->info.alias,
9137
                                              qemuCaps, cdevflags)))
9138 9139 9140
            return -1;
        virCommandAddArg(cmd, "-chardev");
        virCommandAddArg(cmd, devstr);
9141

9142 9143 9144
        if (qemuBuildChrDeviceCommandLine(cmd, def, parallel,
                                          qemuCaps) < 0)
            return -1;
9145 9146 9147 9148 9149 9150
    }

    return 0;
}


9151 9152
static int
qemuBuildChannelsCommandLine(virLogManagerPtr logManager,
9153
                             virSecurityManagerPtr secManager,
9154
                             virCommandPtr cmd,
9155
                             virQEMUDriverConfigPtr cfg,
9156
                             const virDomainDef *def,
9157 9158
                             virQEMUCapsPtr qemuCaps,
                             bool chardevStdioLogd)
9159 9160
{
    size_t i;
9161 9162
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
9163 9164
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
9165 9166 9167 9168 9169 9170 9171

    for (i = 0; i < def->nchannels; i++) {
        virDomainChrDefPtr channel = def->channels[i];
        char *devstr;

        switch (channel->targetType) {
        case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_GUESTFWD:
9172 9173
            if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                                  cmd, cfg, def,
9174
                                                  channel->source,
9175
                                                  channel->info.alias,
9176
                                                  qemuCaps, cdevflags)))
9177
                return -1;
9178
            virCommandAddArg(cmd, "-chardev");
9179 9180 9181 9182 9183 9184 9185 9186 9187 9188
            virCommandAddArg(cmd, devstr);
            VIR_FREE(devstr);

            if (qemuBuildChrDeviceStr(&devstr, def, channel, qemuCaps) < 0)
                return -1;
            virCommandAddArgList(cmd, "-netdev", devstr, NULL);
            VIR_FREE(devstr);
            break;

        case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_VIRTIO:
9189 9190
            if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                                  cmd, cfg, def,
9191 9192
                                                  channel->source,
                                                  channel->info.alias,
9193
                                                  qemuCaps, cdevflags)))
9194 9195 9196 9197
                return -1;
            virCommandAddArg(cmd, "-chardev");
            virCommandAddArg(cmd, devstr);
            VIR_FREE(devstr);
9198 9199 9200 9201 9202 9203 9204 9205 9206 9207 9208

            if (qemuBuildChrDeviceCommandLine(cmd, def, channel, qemuCaps) < 0)
                return -1;
            break;
        }
    }

    return 0;
}


9209 9210
static int
qemuBuildConsoleCommandLine(virLogManagerPtr logManager,
9211
                            virSecurityManagerPtr secManager,
9212
                            virCommandPtr cmd,
9213
                            virQEMUDriverConfigPtr cfg,
9214
                            const virDomainDef *def,
9215 9216
                            virQEMUCapsPtr qemuCaps,
                            bool chardevStdioLogd)
9217 9218
{
    size_t i;
9219 9220
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
9221 9222
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
9223 9224 9225 9226 9227 9228 9229 9230

    /* Explicit console devices */
    for (i = 0; i < def->nconsoles; i++) {
        virDomainChrDefPtr console = def->consoles[i];
        char *devstr;

        switch (console->targetType) {
        case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SCLP:
9231
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_SCLPCONSOLE)) {
9232
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
9233
                               _("sclpconsole is not supported in this QEMU binary"));
9234 9235 9236
                return -1;
            }

9237 9238
            if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                                  cmd, cfg, def,
9239 9240
                                                  console->source,
                                                  console->info.alias,
9241
                                                  qemuCaps, cdevflags)))
9242 9243 9244 9245 9246 9247 9248 9249 9250 9251 9252 9253 9254 9255 9256 9257
                return -1;
            virCommandAddArg(cmd, "-chardev");
            virCommandAddArg(cmd, devstr);
            VIR_FREE(devstr);

            if (qemuBuildChrDeviceCommandLine(cmd, def, console, qemuCaps) < 0)
                return -1;
            break;

        case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SCLPLM:
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_SCLPLMCONSOLE)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("sclplmconsole is not supported in this QEMU binary"));
                return -1;
            }

9258 9259
            if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                                  cmd, cfg, def,
9260
                                                  console->source,
9261
                                                  console->info.alias,
9262
                                                  qemuCaps, cdevflags)))
9263
                return -1;
9264
            virCommandAddArg(cmd, "-chardev");
9265 9266 9267 9268 9269 9270 9271 9272
            virCommandAddArg(cmd, devstr);
            VIR_FREE(devstr);

            if (qemuBuildChrDeviceCommandLine(cmd, def, console, qemuCaps) < 0)
                return -1;
            break;

        case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_VIRTIO:
9273 9274
            if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                                  cmd, cfg, def,
9275
                                                  console->source,
9276
                                                  console->info.alias,
9277
                                                  qemuCaps, cdevflags)))
9278
                return -1;
9279
            virCommandAddArg(cmd, "-chardev");
9280 9281 9282 9283 9284 9285 9286 9287 9288 9289 9290 9291 9292 9293 9294 9295 9296 9297 9298 9299 9300 9301
            virCommandAddArg(cmd, devstr);
            VIR_FREE(devstr);

            if (qemuBuildChrDeviceCommandLine(cmd, def, console, qemuCaps) < 0)
                return -1;
            break;

        case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL:
            break;

        default:
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("unsupported console target type %s"),
                           NULLSTR(virDomainChrConsoleTargetTypeToString(console->targetType)));
            return -1;
        }
    }

    return 0;
}


9302 9303 9304 9305 9306 9307
char *
qemuBuildRedirdevDevStr(const virDomainDef *def,
                        virDomainRedirdevDefPtr dev,
                        virQEMUCapsPtr qemuCaps)
{
    size_t i;
9308
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
9309 9310 9311 9312 9313 9314
    virDomainRedirFilterDefPtr redirfilter = def->redirfilter;

    if (dev->bus != VIR_DOMAIN_REDIRDEV_BUS_USB) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Redirection bus %s is not supported by QEMU"),
                       virDomainRedirdevBusTypeToString(dev->bus));
9315
        return NULL;
9316 9317 9318 9319 9320 9321
    }

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_USB_REDIR)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("USB redirection is not supported "
                         "by this version of QEMU"));
9322
        return NULL;
9323 9324 9325 9326 9327 9328 9329 9330 9331 9332
    }

    virBufferAsprintf(&buf, "usb-redir,chardev=char%s,id=%s",
                      dev->info.alias, dev->info.alias);

    if (redirfilter && redirfilter->nusbdevs) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_USB_REDIR_FILTER)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("USB redirection filter is not "
                             "supported by this version of QEMU"));
9333
            return NULL;
9334 9335 9336 9337 9338 9339 9340 9341 9342 9343 9344 9345 9346 9347 9348 9349 9350 9351 9352 9353 9354 9355 9356 9357 9358 9359 9360 9361 9362 9363 9364 9365
        }

        virBufferAddLit(&buf, ",filter=");

        for (i = 0; i < redirfilter->nusbdevs; i++) {
            virDomainRedirFilterUSBDevDefPtr usbdev = redirfilter->usbdevs[i];
            if (usbdev->usbClass >= 0)
                virBufferAsprintf(&buf, "0x%02X:", usbdev->usbClass);
            else
                virBufferAddLit(&buf, "-1:");

            if (usbdev->vendor >= 0)
                virBufferAsprintf(&buf, "0x%04X:", usbdev->vendor);
            else
                virBufferAddLit(&buf, "-1:");

            if (usbdev->product >= 0)
                virBufferAsprintf(&buf, "0x%04X:", usbdev->product);
            else
                virBufferAddLit(&buf, "-1:");

            if (usbdev->version >= 0)
                virBufferAsprintf(&buf, "0x%04X:", usbdev->version);
            else
                virBufferAddLit(&buf, "-1:");

            virBufferAsprintf(&buf, "%u", usbdev->allow);
            if (i < redirfilter->nusbdevs -1)
                virBufferAddLit(&buf, "|");
        }
    }

9366
    if (dev->info.bootIndex)
9367
        virBufferAsprintf(&buf, ",bootindex=%u", dev->info.bootIndex);
9368 9369

    if (qemuBuildDeviceAddressStr(&buf, def, &dev->info, qemuCaps) < 0)
9370
        return NULL;
9371 9372 9373 9374 9375 9376 9377

    return virBufferContentAndReset(&buf);
}


static int
qemuBuildRedirdevCommandLine(virLogManagerPtr logManager,
9378
                             virSecurityManagerPtr secManager,
9379
                             virCommandPtr cmd,
9380
                             virQEMUDriverConfigPtr cfg,
9381
                             const virDomainDef *def,
9382 9383
                             virQEMUCapsPtr qemuCaps,
                             bool chardevStdioLogd)
9384 9385
{
    size_t i;
9386 9387
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
9388 9389
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
9390 9391 9392 9393 9394

    for (i = 0; i < def->nredirdevs; i++) {
        virDomainRedirdevDefPtr redirdev = def->redirdevs[i];
        char *devstr;

9395 9396
        if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                              cmd, cfg, def,
9397
                                              redirdev->source,
9398
                                              redirdev->info.alias,
9399
                                              qemuCaps, cdevflags))) {
9400 9401 9402
            return -1;
        }

9403
        virCommandAddArg(cmd, "-chardev");
9404 9405 9406 9407 9408 9409 9410 9411 9412 9413 9414 9415 9416 9417
        virCommandAddArg(cmd, devstr);
        VIR_FREE(devstr);

        virCommandAddArg(cmd, "-device");
        if (!(devstr = qemuBuildRedirdevDevStr(def, redirdev, qemuCaps)))
            return -1;
        virCommandAddArg(cmd, devstr);
        VIR_FREE(devstr);
    }

    return 0;
}


9418
static void
9419 9420
qemuBuldDomainLoaderPflashCommandLine(virCommandPtr cmd,
                                      virDomainLoaderDefPtr loader)
9421
{
9422
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
9423 9424
    int unit = 0;

9425 9426 9427 9428 9429 9430
    if (loader->secure == VIR_TRISTATE_BOOL_YES) {
        virCommandAddArgList(cmd,
                             "-global",
                             "driver=cfi.pflash01,property=secure,value=on",
                             NULL);
    }
9431

9432 9433 9434 9435
    virBufferAddLit(&buf, "file=");
    virQEMUBuildBufferEscapeComma(&buf, loader->path);
    virBufferAsprintf(&buf, ",if=pflash,format=raw,unit=%d", unit);
    unit++;
9436

9437 9438 9439 9440
    if (loader->readonly) {
        virBufferAsprintf(&buf, ",readonly=%s",
                          virTristateSwitchTypeToString(loader->readonly));
    }
9441

9442 9443
    virCommandAddArg(cmd, "-drive");
    virCommandAddArgBuffer(cmd, &buf);
M
Michal Privoznik 已提交
9444

9445 9446
    if (loader->nvram) {
        virBufferFreeAndReset(&buf);
9447
        virBufferAddLit(&buf, "file=");
9448
        virQEMUBuildBufferEscapeComma(&buf, loader->nvram);
9449
        virBufferAsprintf(&buf, ",if=pflash,format=raw,unit=%d", unit);
9450 9451 9452

        virCommandAddArg(cmd, "-drive");
        virCommandAddArgBuffer(cmd, &buf);
9453 9454
    }
}
9455 9456


9457 9458 9459 9460 9461 9462 9463 9464 9465 9466 9467 9468 9469 9470 9471 9472 9473
static void
qemuBuildDomainLoaderCommandLine(virCommandPtr cmd,
                                 virDomainDefPtr def)
{
    virDomainLoaderDefPtr loader = def->os.loader;

    if (!loader)
        return;

    switch ((virDomainLoader) loader->type) {
    case VIR_DOMAIN_LOADER_TYPE_ROM:
        virCommandAddArg(cmd, "-bios");
        virCommandAddArg(cmd, loader->path);
        break;

    case VIR_DOMAIN_LOADER_TYPE_PFLASH:
        qemuBuldDomainLoaderPflashCommandLine(cmd, loader);
9474 9475
        break;

9476
    case VIR_DOMAIN_LOADER_TYPE_NONE:
9477 9478 9479 9480 9481 9482
    case VIR_DOMAIN_LOADER_TYPE_LAST:
        /* nada */
        break;
    }
}

J
John Ferlan 已提交
9483

J
John Ferlan 已提交
9484 9485
static char *
qemuBuildTPMDevStr(const virDomainDef *def,
9486
                   virQEMUCapsPtr qemuCaps)
J
John Ferlan 已提交
9487
{
9488
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
J
John Ferlan 已提交
9489 9490
    const virDomainTPMDef *tpm = def->tpm;
    const char *model = virDomainTPMModelTypeToString(tpm->model);
9491
    virQEMUCapsFlags flag;
J
John Ferlan 已提交
9492

9493 9494 9495 9496 9497 9498 9499 9500 9501 9502
    switch (tpm->model) {
    case VIR_DOMAIN_TPM_MODEL_TIS:
        flag = QEMU_CAPS_DEVICE_TPM_TIS;
        break;
    case VIR_DOMAIN_TPM_MODEL_CRB:
        flag = QEMU_CAPS_DEVICE_TPM_CRB;
        break;
    case VIR_DOMAIN_TPM_MODEL_LAST:
    default:
        virReportEnumRangeError(virDomainTPMModel, tpm->model);
9503
        return NULL;
9504 9505 9506
    }

    if (!virQEMUCapsGet(qemuCaps, flag)) {
J
John Ferlan 已提交
9507 9508 9509
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("The QEMU executable %s does not support TPM "
                       "model %s"),
9510
                       def->emulator, model);
9511
        return NULL;
J
John Ferlan 已提交
9512 9513 9514 9515 9516 9517 9518 9519 9520
    }

    virBufferAsprintf(&buf, "%s,tpmdev=tpm-%s,id=%s",
                      model, tpm->info.alias, tpm->info.alias);

    return virBufferContentAndReset(&buf);
}


9521 9522 9523 9524 9525 9526 9527 9528 9529 9530 9531 9532 9533 9534 9535 9536 9537 9538 9539 9540 9541 9542 9543 9544 9545
/* this function is exported so that tests can mock the FDs */
int
qemuBuildTPMOpenBackendFDs(const char *tpmdev,
                           const char *cancel_path,
                           int *tpmfd,
                           int *cancelfd)
{
    if ((*tpmfd = open(tpmdev, O_RDWR)) < 0) {
        virReportSystemError(errno, _("Could not open TPM device %s"),
                             tpmdev);
        return -1;
    }

    if ((*cancelfd = open(cancel_path, O_WRONLY)) < 0) {
        virReportSystemError(errno,
                             _("Could not open TPM device's cancel "
                               "path %s"), cancel_path);
        VIR_FORCE_CLOSE(*tpmfd);
        return -1;
    }

    return 0;
}


J
John Ferlan 已提交
9546 9547 9548 9549
static char *
qemuBuildTPMBackendStr(const virDomainDef *def,
                       virCommandPtr cmd,
                       int *tpmfd,
9550 9551
                       int *cancelfd,
                       char **chardev)
J
John Ferlan 已提交
9552 9553
{
    const virDomainTPMDef *tpm = def->tpm;
9554
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
9555 9556 9557
    g_autofree char *cancel_path = NULL;
    g_autofree char *devset = NULL;
    g_autofree char *cancelset = NULL;
J
John Ferlan 已提交
9558 9559 9560 9561 9562
    const char *tpmdev;

    *tpmfd = -1;
    *cancelfd = -1;

9563 9564
    virBufferAsprintf(&buf, "%s", virDomainTPMBackendTypeToString(tpm->type));
    virBufferAsprintf(&buf, ",id=tpm-%s", tpm->info.alias);
J
John Ferlan 已提交
9565 9566 9567 9568 9569

    switch (tpm->type) {
    case VIR_DOMAIN_TPM_TYPE_PASSTHROUGH:
        tpmdev = tpm->data.passthrough.source.data.file.path;
        if (!(cancel_path = virTPMCreateCancelPath(tpmdev)))
9570
            return NULL;
J
John Ferlan 已提交
9571

9572
        if (qemuBuildTPMOpenBackendFDs(tpmdev, cancel_path, tpmfd, cancelfd) < 0)
9573
            return NULL;
J
John Ferlan 已提交
9574

9575 9576 9577 9578 9579
        virCommandPassFD(cmd, *tpmfd, VIR_COMMAND_PASS_FD_CLOSE_PARENT);
        virCommandPassFD(cmd, *cancelfd, VIR_COMMAND_PASS_FD_CLOSE_PARENT);

        if (!(devset = qemuVirCommandGetDevSet(cmd, *tpmfd)) ||
            !(cancelset = qemuVirCommandGetDevSet(cmd, *cancelfd)))
9580
            return NULL;
J
John Ferlan 已提交
9581 9582

        virBufferAddLit(&buf, ",path=");
9583
        virQEMUBuildBufferEscapeComma(&buf, devset);
J
John Ferlan 已提交
9584 9585

        virBufferAddLit(&buf, ",cancel-path=");
9586
        virQEMUBuildBufferEscapeComma(&buf, cancelset);
J
John Ferlan 已提交
9587 9588

        break;
9589
    case VIR_DOMAIN_TPM_TYPE_EMULATOR:
9590 9591
        virBufferAddLit(&buf, ",chardev=chrtpm");

9592 9593
        *chardev = g_strdup_printf("socket,id=chrtpm,path=%s",
                                   tpm->data.emulator.source.data.nix.path);
9594 9595

        break;
J
John Ferlan 已提交
9596
    case VIR_DOMAIN_TPM_TYPE_LAST:
9597
        return NULL;
J
John Ferlan 已提交
9598 9599 9600 9601 9602 9603
    }

    return virBufferContentAndReset(&buf);
}


9604
static int
9605 9606 9607
qemuBuildTPMCommandLine(virCommandPtr cmd,
                        const virDomainDef *def,
                        virQEMUCapsPtr qemuCaps)
9608 9609
{
    char *optstr;
9610
    g_autofree char *chardev = NULL;
9611 9612 9613
    int tpmfd = -1;
    int cancelfd = -1;
    char *fdset;
9614

9615 9616 9617
    if (!def->tpm)
        return 0;

9618
    if (!(optstr = qemuBuildTPMBackendStr(def, cmd,
9619 9620
                                          &tpmfd, &cancelfd,
                                          &chardev)))
9621 9622 9623 9624 9625
        return -1;

    virCommandAddArgList(cmd, "-tpmdev", optstr, NULL);
    VIR_FREE(optstr);

9626
    if (chardev)
9627 9628
        virCommandAddArgList(cmd, "-chardev", chardev, NULL);

9629 9630 9631 9632 9633 9634 9635 9636 9637 9638 9639 9640 9641 9642 9643 9644 9645 9646
    if (tpmfd >= 0) {
        fdset = qemuVirCommandGetFDSet(cmd, tpmfd);
        if (!fdset)
            return -1;

        virCommandAddArgList(cmd, "-add-fd", fdset, NULL);
        VIR_FREE(fdset);
    }

    if (cancelfd >= 0) {
        fdset = qemuVirCommandGetFDSet(cmd, cancelfd);
        if (!fdset)
            return -1;

        virCommandAddArgList(cmd, "-add-fd", fdset, NULL);
        VIR_FREE(fdset);
    }

9647
    if (!(optstr = qemuBuildTPMDevStr(def, qemuCaps)))
9648 9649 9650 9651 9652 9653 9654 9655
        return -1;

    virCommandAddArgList(cmd, "-device", optstr, NULL);
    VIR_FREE(optstr);

    return 0;
}

9656
static int
J
Ján Tomko 已提交
9657
qemuBuildSEVCommandLine(virDomainObjPtr vm, virCommandPtr cmd,
9658
                        virDomainSEVDefPtr sev)
9659
{
9660
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
9661 9662 9663 9664 9665 9666 9667 9668 9669
    qemuDomainObjPrivatePtr priv = vm->privateData;
    char *path = NULL;

    if (!sev)
        return 0;

    VIR_DEBUG("policy=0x%x cbitpos=%d reduced_phys_bits=%d",
              sev->policy, sev->cbitpos, sev->reduced_phys_bits);

9670 9671 9672
    virBufferAsprintf(&buf, "sev-guest,id=sev0,cbitpos=%d", sev->cbitpos);
    virBufferAsprintf(&buf, ",reduced-phys-bits=%d", sev->reduced_phys_bits);
    virBufferAsprintf(&buf, ",policy=0x%x", sev->policy);
9673 9674

    if (sev->dh_cert) {
9675
        path = g_strdup_printf("%s/dh_cert.base64", priv->libDir);
9676
        virBufferAsprintf(&buf, ",dh-cert-file=%s", path);
9677 9678 9679 9680
        VIR_FREE(path);
    }

    if (sev->session) {
9681
        path = g_strdup_printf("%s/session.base64", priv->libDir);
9682
        virBufferAsprintf(&buf, ",session-file=%s", path);
9683 9684 9685
        VIR_FREE(path);
    }

9686 9687
    virCommandAddArg(cmd, "-object");
    virCommandAddArgBuffer(cmd, &buf);
9688
    return 0;
9689
}
9690

M
Marc-André Lureau 已提交
9691 9692 9693 9694 9695 9696 9697 9698 9699 9700 9701 9702 9703 9704 9705 9706 9707 9708 9709 9710 9711 9712
static int
qemuBuildVMCoreInfoCommandLine(virCommandPtr cmd,
                               const virDomainDef *def,
                               virQEMUCapsPtr qemuCaps)
{
    virTristateSwitch vmci = def->features[VIR_DOMAIN_FEATURE_VMCOREINFO];

    if (vmci != VIR_TRISTATE_SWITCH_ON)
        return 0;

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VMCOREINFO)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("vmcoreinfo is not available "
                         "with this QEMU binary"));
        return -1;
    }

    virCommandAddArgList(cmd, "-device", "vmcoreinfo", NULL);
    return 0;
}


9713 9714 9715 9716 9717 9718 9719 9720 9721
static int
qemuBuildPanicCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
    size_t i;

    for (i = 0; i < def->npanics; i++) {
        switch ((virDomainPanicModel) def->panics[i]->model) {
9722 9723 9724 9725 9726 9727 9728 9729 9730 9731 9732 9733 9734 9735 9736 9737 9738 9739 9740
        case VIR_DOMAIN_PANIC_MODEL_S390:
            /* For s390 guests, the hardware provides the same
             * functionality as the pvpanic device. The address
             * cannot be configured by the user */
            if (!ARCH_IS_S390(def->os.arch)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("only S390 guests support "
                                 "panic device of model 's390'"));
                return -1;
            }
            if (def->panics[i]->info.type !=
                VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("setting the panic device address is not "
                                 "supported for model 's390'"));
                return -1;
            }
            break;

9741 9742 9743 9744 9745 9746 9747 9748 9749 9750 9751 9752 9753 9754 9755 9756 9757 9758 9759 9760 9761 9762 9763
        case VIR_DOMAIN_PANIC_MODEL_HYPERV:
            /* Panic with model 'hyperv' is not a device, it should
             * be configured in cpu commandline. The address
             * cannot be configured by the user */
            if (!ARCH_IS_X86(def->os.arch)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("only i686 and x86_64 guests support "
                                 "panic device of model 'hyperv'"));
                return -1;
            }
            if (def->panics[i]->info.type !=
                VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("setting the panic device address is not "
                                 "supported for model 'hyperv'"));
                return -1;
            }
            break;

        case VIR_DOMAIN_PANIC_MODEL_PSERIES:
            /* For pSeries guests, the firmware provides the same
             * functionality as the pvpanic device. The address
             * cannot be configured by the user */
9764
            if (!qemuDomainIsPSeries(def)) {
9765 9766 9767 9768 9769 9770 9771 9772 9773 9774 9775 9776 9777 9778 9779 9780 9781 9782
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("only pSeries guests support panic device "
                                 "of model 'pseries'"));
                return -1;
            }
            if (def->panics[i]->info.type !=
                VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("setting the panic device address is not "
                                 "supported for model 'pseries'"));
                return -1;
            }
            break;

        case VIR_DOMAIN_PANIC_MODEL_ISA:
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_PANIC)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("the QEMU binary does not support the "
9783
                                 "ISA panic device"));
9784 9785 9786 9787 9788 9789 9790 9791 9792 9793 9794 9795 9796 9797 9798 9799 9800 9801 9802 9803 9804 9805 9806 9807 9808 9809 9810 9811 9812 9813 9814 9815
                return -1;
            }

            switch (def->panics[i]->info.type) {
            case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_ISA:
                virCommandAddArg(cmd, "-device");
                virCommandAddArgFormat(cmd, "pvpanic,ioport=%d",
                                       def->panics[i]->info.addr.isa.iobase);
                break;

            case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE:
                virCommandAddArgList(cmd, "-device", "pvpanic", NULL);
                break;

            default:
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("panic is supported only "
                                 "with ISA address type"));
                return -1;
            }

        /* default model value was changed before in post parse */
        case VIR_DOMAIN_PANIC_MODEL_DEFAULT:
        case VIR_DOMAIN_PANIC_MODEL_LAST:
            break;
        }
    }

    return 0;
}


9816 9817 9818 9819 9820 9821 9822 9823 9824 9825 9826 9827 9828 9829 9830
static virJSONValuePtr
qemuBuildPRManagerInfoPropsInternal(const char *alias,
                                    const char *path)
{
    virJSONValuePtr ret = NULL;

    if (qemuMonitorCreateObjectProps(&ret,
                                     "pr-manager-helper", alias,
                                     "s:path", path, NULL) < 0)
        return NULL;

    return ret;
}


9831
/**
9832
 * qemuBuildPRManagedManagerInfoProps:
9833
 *
9834 9835
 * Build the JSON properties for the pr-manager object corresponding to the PR
 * daemon managed by libvirt.
9836
 */
9837
virJSONValuePtr
9838
qemuBuildPRManagedManagerInfoProps(qemuDomainObjPrivatePtr priv)
9839
{
9840
    g_autofree char *path = NULL;
9841

9842
    if (!(path = qemuDomainGetManagedPRSocketPath(priv)))
9843 9844
        return NULL;

9845 9846
    return qemuBuildPRManagerInfoPropsInternal(qemuDomainGetManagedPRAlias(),
                                               path);
9847 9848 9849
}


9850 9851 9852 9853 9854 9855 9856 9857 9858 9859 9860 9861 9862
/**
 * qemuBuildPRManagerInfoProps:
 * @src: storage source
 *
 * Build the JSON properties for the pr-manager object.
 */
virJSONValuePtr
qemuBuildPRManagerInfoProps(virStorageSourcePtr src)
{
    return qemuBuildPRManagerInfoPropsInternal(src->pr->mgralias, src->pr->path);
}


9863
static int
9864 9865 9866
qemuBuildManagedPRCommandLine(virCommandPtr cmd,
                              const virDomainDef *def,
                              qemuDomainObjPrivatePtr priv)
9867
{
9868
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
J
Ján Tomko 已提交
9869
    g_autoptr(virJSONValue) props = NULL;
9870

9871 9872
    if (!virDomainDefHasManagedPR(def))
        return 0;
9873

9874 9875
    if (!(props = qemuBuildPRManagedManagerInfoProps(priv)))
        return -1;
9876

9877
    if (virQEMUBuildObjectCommandlineFromJSON(&buf, props) < 0)
9878
        return -1;
9879

9880 9881
    virCommandAddArg(cmd, "-object");
    virCommandAddArgBuffer(cmd, &buf);
9882

9883
    return 0;
9884 9885 9886
}


9887 9888 9889 9890 9891 9892 9893 9894 9895 9896 9897 9898 9899 9900 9901 9902 9903 9904 9905 9906 9907 9908 9909 9910 9911 9912 9913 9914 9915 9916 9917 9918 9919 9920 9921 9922 9923 9924 9925 9926 9927
static int
qemuBuildPflashBlockdevOne(virCommandPtr cmd,
                           virStorageSourcePtr src,
                           virQEMUCapsPtr qemuCaps)
{
    g_autoptr(qemuBlockStorageSourceChainData) data = NULL;
    size_t i;

    if (!(data = qemuBuildStorageSourceChainAttachPrepareBlockdev(src,
                                                                  qemuCaps)))
        return -1;

    for (i = data->nsrcdata; i > 0; i--) {
        if (qemuBuildBlockStorageSourceAttachDataCommandline(cmd,
                                                             data->srcdata[i - 1]) < 0)
            return -1;
    }

    return 0;
}


static int
qemuBuildPflashBlockdevCommandLine(virCommandPtr cmd,
                                   qemuDomainObjPrivatePtr priv)
{
    if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_BLOCKDEV))
        return 0;

    if (priv->pflash0 &&
        qemuBuildPflashBlockdevOne(cmd, priv->pflash0, priv->qemuCaps) < 0)
        return -1;

    if (priv->pflash1 &&
        qemuBuildPflashBlockdevOne(cmd, priv->pflash1, priv->qemuCaps) < 0)
        return -1;

    return 0;
}


M
Marc-André Lureau 已提交
9928 9929 9930 9931 9932 9933 9934 9935 9936 9937 9938 9939 9940 9941 9942 9943 9944 9945 9946
static virJSONValuePtr
qemuBuildDBusVMStateInfoPropsInternal(const char *alias,
                                      const char *addr)
{
    virJSONValuePtr ret = NULL;

    if (qemuMonitorCreateObjectProps(&ret,
                                     "dbus-vmstate", alias,
                                     "s:addr", addr, NULL) < 0)
        return NULL;

    return ret;
}


virJSONValuePtr
qemuBuildDBusVMStateInfoProps(const char *id,
                              const char *addr)
{
9947
    g_autofree char *alias = qemuAliasDBusVMStateFromId(id);
M
Marc-André Lureau 已提交
9948 9949 9950 9951 9952 9953 9954 9955 9956 9957 9958 9959 9960 9961 9962 9963 9964 9965 9966 9967

    if (!alias)
        return NULL;

    return qemuBuildDBusVMStateInfoPropsInternal(alias, addr);
}


typedef struct qemuBuildDBusVMStateCommandLineData {
    virCommandPtr cmd;
} qemuBuildDBusVMStateCommandLineData;


static int
qemuBuildDBusVMStateCommandLineEach(void *payload,
                                    const void *id,
                                    void *user_data)
{
    qemuBuildDBusVMStateCommandLineData *data = user_data;
    qemuDBusVMStatePtr vms = payload;
9968
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
J
Ján Tomko 已提交
9969
    g_autoptr(virJSONValue) props = NULL;
M
Marc-André Lureau 已提交
9970 9971 9972 9973 9974 9975 9976 9977 9978 9979 9980 9981 9982 9983 9984 9985 9986 9987 9988 9989 9990 9991 9992 9993 9994 9995 9996 9997 9998 9999 10000 10001 10002 10003 10004 10005 10006

    if (!(props = qemuBuildDBusVMStateInfoProps(id, vms->addr)))
        return -1;

    if (virQEMUBuildObjectCommandlineFromJSON(&buf, props) < 0)
        return -1;

    virCommandAddArg(data->cmd, "-object");
    virCommandAddArgBuffer(data->cmd, &buf);

    return 0;
}

static int
qemuBuildDBusVMStateCommandLine(virCommandPtr cmd,
                                qemuDomainObjPrivatePtr priv)
{
    qemuBuildDBusVMStateCommandLineData data = {
        .cmd = cmd,
    };

    if (virHashSize(priv->dbusVMStates) == 0)
        return 0;

    if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_DBUS_VMSTATE)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("dbus-vmstate object is not supported by this QEMU binary"));
        return 0;
    }

    if (virHashForEach(priv->dbusVMStates, qemuBuildDBusVMStateCommandLineEach, &data) < 0)
        return -1;

    return 0;
}


10007 10008 10009 10010 10011 10012 10013 10014 10015 10016 10017 10018 10019 10020 10021 10022 10023
/**
 * qemuBuildCommandLineValidate:
 *
 * Prior to taking the plunge and building a long command line only
 * to find some configuration option isn't valid, let's do a couple
 * of checks and fail early.
 *
 * Returns 0 on success, returns -1 and messages what the issue is.
 */
static int
qemuBuildCommandLineValidate(virQEMUDriverPtr driver,
                             const virDomainDef *def)
{
    size_t i;
    int sdl = 0;
    int vnc = 0;
    int spice = 0;
10024
    int egl_headless = 0;
10025 10026 10027 10028 10029 10030 10031 10032 10033 10034 10035 10036 10037 10038 10039 10040 10041 10042 10043 10044

    if (!virQEMUDriverIsPrivileged(driver)) {
        /* If we have no cgroups then we can have no tunings that
         * require them */

        if (virMemoryLimitIsSet(def->mem.hard_limit) ||
            virMemoryLimitIsSet(def->mem.soft_limit) ||
            virMemoryLimitIsSet(def->mem.swap_hard_limit)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Memory tuning is not available in session mode"));
            return -1;
        }

        if (def->blkio.weight) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Block I/O tuning is not available in session mode"));
            return -1;
        }

        if (def->cputune.sharesSpecified || def->cputune.period ||
10045 10046
            def->cputune.quota || def->cputune.global_period ||
            def->cputune.global_quota || def->cputune.emulator_period ||
10047 10048
            def->cputune.emulator_quota || def->cputune.iothread_period ||
            def->cputune.iothread_quota) {
10049 10050 10051 10052 10053 10054 10055 10056 10057 10058 10059 10060 10061 10062 10063 10064 10065
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("CPU tuning is not available in session mode"));
            return -1;
        }
    }

    for (i = 0; i < def->ngraphics; ++i) {
        switch (def->graphics[i]->type) {
        case VIR_DOMAIN_GRAPHICS_TYPE_SDL:
            ++sdl;
            break;
        case VIR_DOMAIN_GRAPHICS_TYPE_VNC:
            ++vnc;
            break;
        case VIR_DOMAIN_GRAPHICS_TYPE_SPICE:
            ++spice;
            break;
10066 10067 10068
        case VIR_DOMAIN_GRAPHICS_TYPE_EGL_HEADLESS:
            ++egl_headless;
            break;
10069 10070 10071 10072
        case VIR_DOMAIN_GRAPHICS_TYPE_RDP:
        case VIR_DOMAIN_GRAPHICS_TYPE_DESKTOP:
        case VIR_DOMAIN_GRAPHICS_TYPE_LAST:
            break;
10073 10074 10075
        }
    }

10076
    if (sdl > 1 || vnc > 1 || spice > 1 || egl_headless > 1) {
10077 10078
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("only 1 graphics device of each type "
10079
                         "(sdl, vnc, spice, headless) is supported"));
10080 10081 10082 10083 10084 10085 10086 10087 10088 10089 10090 10091 10092 10093 10094 10095
        return -1;
    }

    if (def->virtType == VIR_DOMAIN_VIRT_XEN ||
        def->os.type == VIR_DOMAIN_OSTYPE_XEN ||
        def->os.type == VIR_DOMAIN_OSTYPE_LINUX) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("qemu emulator '%s' does not support xen"),
                       def->emulator);
        return -1;
    }

    return 0;
}


10096 10097 10098
static int
qemuBuildSeccompSandboxCommandLine(virCommandPtr cmd,
                                   virQEMUDriverConfigPtr cfg,
J
Ján Tomko 已提交
10099
                                   virQEMUCapsPtr qemuCaps G_GNUC_UNUSED)
10100
{
10101
    if (cfg->seccompSandbox == 0) {
10102 10103
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_SECCOMP_SANDBOX))
            virCommandAddArgList(cmd, "-sandbox", "off", NULL);
10104 10105 10106
        return 0;
    }

10107 10108 10109 10110 10111 10112 10113 10114 10115 10116
    /* Use blacklist by default if supported */
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_SECCOMP_BLACKLIST)) {
        virCommandAddArgList(cmd, "-sandbox",
                             "on,obsolete=deny,elevateprivileges=deny,"
                             "spawn=deny,resourcecontrol=deny",
                             NULL);
        return 0;
    }

    /* Seccomp whitelist is opt-in */
10117
    if (cfg->seccompSandbox > 0)
10118 10119 10120 10121 10122 10123 10124
        virCommandAddArgList(cmd, "-sandbox", "on", NULL);

    return 0;

}


J
Ján Tomko 已提交
10125
char *
10126 10127
qemuBuildVsockDevStr(virDomainDefPtr def,
                     virDomainVsockDefPtr vsock,
J
Ján Tomko 已提交
10128 10129
                     virQEMUCapsPtr qemuCaps,
                     const char *fdprefix)
10130 10131
{
    qemuDomainVsockPrivatePtr priv = (qemuDomainVsockPrivatePtr)vsock->privateData;
10132
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
10133

10134
    if (qemuBuildVirtioDevStr(&buf, "vhost-vsock", qemuCaps,
10135
                              VIR_DOMAIN_DEVICE_VSOCK, vsock) < 0) {
10136
        return NULL;
10137
    }
10138

10139 10140
    virBufferAsprintf(&buf, ",id=%s", vsock->info.alias);
    virBufferAsprintf(&buf, ",guest-cid=%u", vsock->guest_cid);
J
Ján Tomko 已提交
10141
    virBufferAsprintf(&buf, ",vhostfd=%s%u", fdprefix, priv->vhostfd);
10142
    if (qemuBuildDeviceAddressStr(&buf, def, &vsock->info, qemuCaps) < 0)
10143
        return NULL;
10144

10145
    return virBufferContentAndReset(&buf);
10146 10147 10148 10149 10150 10151 10152 10153 10154 10155
}


static int
qemuBuildVsockCommandLine(virCommandPtr cmd,
                          virDomainDefPtr def,
                          virDomainVsockDefPtr vsock,
                          virQEMUCapsPtr qemuCaps)
{
    qemuDomainVsockPrivatePtr priv = (qemuDomainVsockPrivatePtr)vsock->privateData;
10156
    g_autofree char *devstr = NULL;
10157

J
Ján Tomko 已提交
10158
    if (!(devstr = qemuBuildVsockDevStr(def, vsock, qemuCaps, "")))
10159
        return -1;
10160 10161 10162

    virCommandPassFD(cmd, priv->vhostfd, VIR_COMMAND_PASS_FD_CLOSE_PARENT);
    priv->vhostfd = -1;
10163 10164

    if (qemuCommandAddExtDevice(cmd, &vsock->info) < 0)
10165
        return -1;
10166

10167 10168
    virCommandAddArgList(cmd, "-device", devstr, NULL);

10169
    return 0;
10170 10171 10172
}


10173 10174 10175 10176 10177
/*
 * Constructs a argv suitable for launching qemu with config defined
 * for a given virtual machine.
 */
virCommandPtr
10178
qemuBuildCommandLine(virQEMUDriverPtr driver,
10179
                     virLogManagerPtr logManager,
10180
                     virSecurityManagerPtr secManager,
10181
                     virDomainObjPtr vm,
10182
                     const char *migrateURI,
10183
                     virDomainMomentObjPtr snapshot,
10184
                     virNetDevVPortProfileOp vmop,
10185
                     bool standalone,
10186
                     bool enableFips,
10187
                     size_t *nnicindexes,
10188
                     int **nicindexes)
10189
{
10190
    size_t i;
10191
    char uuid[VIR_UUID_STRING_BUFLEN];
J
Ján Tomko 已提交
10192
    g_autoptr(virCommand) cmd = NULL;
10193
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
10194
    unsigned int bootHostdevNet = 0;
10195 10196 10197 10198
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainDefPtr def = vm->def;
    virQEMUCapsPtr qemuCaps = priv->qemuCaps;
    bool chardevStdioLogd = priv->chardevStdioLogd;
10199

J
Ján Tomko 已提交
10200
    VIR_DEBUG("driver=%p def=%p mon=%p "
10201
              "qemuCaps=%p migrateURI=%s snapshot=%p vmop=%d",
J
Ján Tomko 已提交
10202
              driver, def, priv->monConfig,
10203
              qemuCaps, migrateURI, snapshot, vmop);
10204

10205
    if (qemuBuildCommandLineValidate(driver, def) < 0)
10206
        return NULL;
10207

J
John Ferlan 已提交
10208
    cmd = virCommandNew(def->emulator);
10209

10210
    virCommandAddEnvPassCommon(cmd);
10211

10212 10213 10214 10215 10216 10217 10218 10219 10220 10221 10222 10223 10224
    /* For system QEMU we want to set both HOME and all the XDG variables to
     * libDir/qemu otherwise apps QEMU links to might try to access the default
     * home dir '/' which would always result in a permission issue.
     *
     * For session QEMU, we only want to set XDG_CACHE_HOME as cache data
     * may be purged at any time and that should not affect any app. We
     * do want VMs to integrate with services in user's session so we're
     * not re-setting any other env variables
     */
    if (!driver->privileged) {
        virCommandAddEnvFormat(cmd, "XDG_CACHE_HOME=%s/%s",
                               priv->libDir, ".cache");
    } else {
10225
        virCommandAddEnvPair(cmd, "HOME", priv->libDir);
10226 10227 10228
        virCommandAddEnvXDG(cmd, priv->libDir);
    }

M
Marc-André Lureau 已提交
10229
    if (qemuBuildNameCommandLine(cmd, cfg, def, qemuCaps) < 0)
10230
        return NULL;
C
Cole Robinson 已提交
10231 10232 10233 10234

    if (!standalone)
        virCommandAddArg(cmd, "-S"); /* freeze CPU */

10235
    if (qemuBuildMasterKeyCommandLine(cmd, priv) < 0)
10236
        return NULL;
10237

M
Marc-André Lureau 已提交
10238 10239 10240
    if (qemuBuildDBusVMStateCommandLine(cmd, priv) < 0)
        return NULL;

10241
    if (qemuBuildManagedPRCommandLine(cmd, def, priv) < 0)
10242
        return NULL;
10243

10244 10245 10246
    if (qemuBuildPflashBlockdevCommandLine(cmd, priv) < 0)
        return NULL;

10247
    if (enableFips)
10248
        virCommandAddArg(cmd, "-enable-fips");
10249

10250
    if (qemuBuildMachineCommandLine(cmd, cfg, def, qemuCaps) < 0)
10251
        return NULL;
10252

10253 10254
    qemuBuildTSEGCommandLine(cmd, def);

10255
    if (qemuBuildCpuCommandLine(cmd, driver, def, qemuCaps) < 0)
10256
        return NULL;
10257

10258
    qemuBuildDomainLoaderCommandLine(cmd, def);
10259

10260
    if (!migrateURI && !snapshot && qemuDomainAlignMemorySizes(def) < 0)
10261
        return NULL;
10262

10263
    if (qemuBuildMemCommandLine(cmd, cfg, def, qemuCaps, priv) < 0)
10264
        return NULL;
10265

10266
    if (qemuBuildSmpCommandLine(cmd, def) < 0)
10267
        return NULL;
10268

10269
    if (qemuBuildIOThreadCommandLine(cmd, def) < 0)
10270
        return NULL;
J
John Ferlan 已提交
10271

10272
    if (virDomainNumaGetNodeCount(def->numa) &&
10273
        qemuBuildNumaArgStr(cfg, def, cmd, priv) < 0)
10274
        return NULL;
10275

10276
    if (qemuBuildMemoryDeviceCommandLine(cmd, cfg, def, priv) < 0)
10277
        return NULL;
10278

10279
    virUUIDFormat(def->uuid, uuid);
10280
    virCommandAddArgList(cmd, "-uuid", uuid, NULL);
10281

10282
    if (qemuBuildSmbiosCommandLine(cmd, driver, def) < 0)
10283
        return NULL;
10284 10285

    if (qemuBuildVMGenIDCommandLine(cmd, def, qemuCaps) < 0)
10286
        return NULL;
10287

10288 10289 10290 10291 10292 10293 10294
    /*
     * NB, -nographic *MUST* come before any serial, or monitor
     * or parallel port flags due to QEMU craziness, where it
     * decides to change the serial port & monitor to be on stdout
     * if you ask for nographic. So we have to make sure we override
     * these defaults ourselves...
     */
10295
    if (!def->ngraphics) {
J
Ján Tomko 已提交
10296 10297
        virCommandAddArg(cmd, "-display");
        virCommandAddArg(cmd, "none");
10298

10299
        if (cfg->nogfxAllowHostAudio)
10300
            virCommandAddEnvPass(cmd, "QEMU_AUDIO_DRV");
10301 10302 10303 10304
        else
            virCommandAddEnvString(cmd, "QEMU_AUDIO_DRV=none");
    }

J
Ján Tomko 已提交
10305
    /* Disable global config files and default devices */
10306
    virCommandAddArg(cmd, "-no-user-config");
J
Ján Tomko 已提交
10307
    virCommandAddArg(cmd, "-nodefaults");
10308

10309
    if (qemuBuildSgaCommandLine(cmd, def, qemuCaps) < 0)
10310
        return NULL;
10311

10312
    if (qemuBuildMonitorCommandLine(logManager, secManager, cmd, cfg, def, priv) < 0)
10313
        return NULL;
10314

10315
    if (qemuBuildClockCommandLine(cmd, def, qemuCaps) < 0)
10316
        return NULL;
10317

10318
    if (qemuBuildPMCommandLine(cmd, def, priv) < 0)
10319
        return NULL;
10320

10321
    if (qemuBuildBootCommandLine(cmd, def, qemuCaps) < 0)
10322
        return NULL;
J
Ján Tomko 已提交
10323

10324
    if (qemuBuildIOMMUCommandLine(cmd, def, qemuCaps) < 0)
10325
        return NULL;
10326

10327
    if (qemuBuildGlobalControllerCommandLine(cmd, def, qemuCaps) < 0)
10328
        return NULL;
10329

10330
    if (qemuBuildControllersCommandLine(cmd, def, qemuCaps) < 0)
10331
        return NULL;
10332

10333
    if (qemuBuildHubCommandLine(cmd, def, qemuCaps) < 0)
10334
        return NULL;
10335

10336 10337
    if (qemuBuildControllersByTypeCommandLine(cmd, def, qemuCaps,
                                              VIR_DOMAIN_CONTROLLER_TYPE_CCID) < 0)
10338
        return NULL;
10339

10340
    if (qemuBuildDisksCommandLine(cmd, def, qemuCaps) < 0)
10341
        return NULL;
E
Eric Blake 已提交
10342

10343
    if (qemuBuildFilesystemCommandLine(cmd, def, qemuCaps) < 0)
10344
        return NULL;
10345

10346
    if (qemuBuildNetCommandLine(driver, vm, logManager, secManager, cmd,
10347
                                qemuCaps, vmop, standalone,
10348
                                nnicindexes, nicindexes, &bootHostdevNet) < 0)
10349
        return NULL;
10350

10351
    if (qemuBuildSmartcardCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10352
                                      chardevStdioLogd) < 0)
10353
        return NULL;
10354

10355
    if (qemuBuildSerialCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10356
                                   chardevStdioLogd) < 0)
10357
        return NULL;
M
Martin Kletzander 已提交
10358

10359
    if (qemuBuildParallelsCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10360
                                      chardevStdioLogd) < 0)
10361
        return NULL;
10362

10363
    if (qemuBuildChannelsCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10364
                                     chardevStdioLogd) < 0)
10365
        return NULL;
10366

10367
    if (qemuBuildConsoleCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10368
                                    chardevStdioLogd) < 0)
10369
        return NULL;
10370

10371
    if (qemuBuildTPMCommandLine(cmd, def, qemuCaps) < 0)
10372
        return NULL;
10373

10374
    if (qemuBuildInputCommandLine(cmd, def, qemuCaps) < 0)
10375
        return NULL;
10376

10377
    if (qemuBuildGraphicsCommandLine(cfg, cmd, def, qemuCaps) < 0)
10378
        return NULL;
10379

10380
    if (qemuBuildVideoCommandLine(cmd, def, qemuCaps) < 0)
10381
        return NULL;
10382

10383
    if (qemuBuildSoundCommandLine(cmd, def, qemuCaps) < 0)
10384
        return NULL;
10385

10386
    if (qemuBuildWatchdogCommandLine(cmd, def, qemuCaps) < 0)
10387
        return NULL;
10388

10389
    if (qemuBuildRedirdevCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10390
                                     chardevStdioLogd) < 0)
10391
        return NULL;
10392

10393
    if (qemuBuildHostdevCommandLine(cmd, def, qemuCaps, &bootHostdevNet) < 0)
10394
        return NULL;
10395

10396
    if (migrateURI)
10397
        virCommandAddArgList(cmd, "-incoming", migrateURI, NULL);
10398

10399
    if (qemuBuildMemballoonCommandLine(cmd, def, qemuCaps) < 0)
10400
        return NULL;
10401

10402
    if (qemuBuildRNGCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10403
                                chardevStdioLogd) < 0)
10404
        return NULL;
10405

10406
    if (qemuBuildNVRAMCommandLine(cmd, def, qemuCaps) < 0)
10407
        return NULL;
10408

M
Marc-André Lureau 已提交
10409
    if (qemuBuildVMCoreInfoCommandLine(cmd, def, qemuCaps) < 0)
10410
        return NULL;
M
Marc-André Lureau 已提交
10411

J
Ján Tomko 已提交
10412
    if (qemuBuildSEVCommandLine(vm, cmd, def->sev) < 0)
10413
        return NULL;
10414

10415
    if (snapshot)
10416
        virCommandAddArgList(cmd, "-loadvm", snapshot->def->name, NULL);
10417 10418

    if (def->namespaceData) {
10419 10420 10421 10422 10423 10424 10425 10426
        qemuDomainXmlNsDefPtr qemuxmlns;

        qemuxmlns = def->namespaceData;
        for (i = 0; i < qemuxmlns->num_args; i++)
            virCommandAddArg(cmd, qemuxmlns->args[i]);
        for (i = 0; i < qemuxmlns->num_env; i++)
            virCommandAddEnvPair(cmd, qemuxmlns->env_name[i],
                                 NULLSTR_EMPTY(qemuxmlns->env_value[i]));
10427 10428
    }

10429
    if (qemuBuildSeccompSandboxCommandLine(cmd, cfg, qemuCaps) < 0)
10430
        return NULL;
10431

10432
    if (qemuBuildPanicCommandLine(cmd, def, qemuCaps) < 0)
10433
        return NULL;
H
Hu Tao 已提交
10434

10435
    for (i = 0; i < def->nshmems; i++) {
10436
        if (qemuBuildShmemCommandLine(logManager, secManager, cmd, cfg,
10437 10438
                                      def, def->shmems[i], qemuCaps,
                                      chardevStdioLogd))
10439
            return NULL;
10440 10441
    }

10442 10443
    if (def->vsock &&
        qemuBuildVsockCommandLine(cmd, def, def->vsock, qemuCaps) < 0)
10444
        return NULL;
10445

10446 10447
    /* In some situations, eg. VFIO passthrough, QEMU might need to lock a
     * significant amount of memory, so we need to set the limit accordingly */
10448
    virCommandSetMaxMemLock(cmd, qemuDomainGetMemLockLimitBytes(def));
10449

10450 10451 10452 10453
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_MSG_TIMESTAMP) &&
        cfg->logTimestamp)
        virCommandAddArgList(cmd, "-msg", "timestamp=on", NULL);

J
Ján Tomko 已提交
10454
    return g_steal_pointer(&cmd);
10455 10456
}

10457

10458 10459 10460
/* This function generates the correct '-device' string for character
 * devices of each architecture.
 */
10461 10462
static int
qemuBuildSerialChrDeviceStr(char **deviceStr,
10463
                            const virDomainDef *def,
10464
                            virDomainChrDefPtr serial,
10465
                            virQEMUCapsPtr qemuCaps)
10466
{
10467
    g_auto(virBuffer) buf = VIR_BUFFER_INITIALIZER;
10468
    virQEMUCapsFlags caps;
10469

10470
    switch ((virDomainChrSerialTargetModel) serial->targetModel) {
10471
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_ISA_SERIAL:
10472 10473 10474
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_USB_SERIAL:
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_PCI_SERIAL:
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_SPAPR_VTY:
10475 10476
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_SCLPCONSOLE:
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_SCLPLMCONSOLE:
10477

10478
        caps = qemuChrSerialTargetModelToCaps(serial->targetModel);
M
Michal Privoznik 已提交
10479

10480 10481 10482 10483
        if (caps && !virQEMUCapsGet(qemuCaps, caps)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("'%s' is not supported in this QEMU binary"),
                           virDomainChrSerialTargetModelTypeToString(serial->targetModel));
10484
            return -1;
G
Guannan Ren 已提交
10485
        }
10486
        break;
10487

10488
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_PL011:
10489
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_16550A:
10490 10491 10492 10493 10494 10495 10496 10497
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_NONE:
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_LAST:
        /* Except from _LAST, which is just a guard value and will never
         * be used, all of the above are platform devices, which means
         * qemuBuildSerialCommandLine() will have taken the appropriate
         * branch and we will not have ended up here. */
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Invalid target model for serial device"));
10498
        return -1;
G
Guannan Ren 已提交
10499 10500
    }

10501
    virBufferAsprintf(&buf, "%s,chardev=char%s,id=%s",
10502 10503 10504
                      virDomainChrSerialTargetModelTypeToString(serial->targetModel),
                      serial->info.alias, serial->info.alias);

10505
    if (qemuBuildDeviceAddressStr(&buf, def, &serial->info, qemuCaps) < 0)
10506
        return -1;
10507

10508
    *deviceStr = virBufferContentAndReset(&buf);
10509 10510 10511 10512 10513 10514 10515
    return 0;
}

static int
qemuBuildParallelChrDeviceStr(char **deviceStr,
                              virDomainChrDefPtr chr)
{
10516 10517
    *deviceStr = g_strdup_printf("isa-parallel,chardev=char%s,id=%s",
                                 chr->info.alias, chr->info.alias);
10518
    return 0;
10519
}
10520

10521 10522
static int
qemuBuildChannelChrDeviceStr(char **deviceStr,
10523
                             const virDomainDef *def,
10524
                             virDomainChrDefPtr chr)
10525 10526
{
    int ret = -1;
10527
    g_autofree char *addr = NULL;
10528 10529
    int port;

10530
    switch ((virDomainChrChannelTargetType)chr->targetType) {
10531 10532 10533 10534 10535 10536 10537
    case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_GUESTFWD:

        addr = virSocketAddrFormat(chr->target.addr);
        if (!addr)
            return ret;
        port = virSocketAddrGetPort(chr->target.addr);

10538 10539
        *deviceStr = g_strdup_printf("user,guestfwd=tcp:%s:%i-chardev:char%s,id=%s",
                                     addr, port, chr->info.alias, chr->info.alias);
10540 10541 10542
        break;

    case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_VIRTIO:
10543
        if (!(*deviceStr = qemuBuildVirtioSerialPortDevStr(def, chr)))
10544
            return -1;
10545 10546
        break;

J
Joao Martins 已提交
10547
    case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_XEN:
10548 10549 10550 10551 10552
    case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_NONE:
    case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_LAST:
        return ret;
    }

10553
    return 0;
10554 10555 10556 10557
}

static int
qemuBuildConsoleChrDeviceStr(char **deviceStr,
10558
                             const virDomainDef *def,
10559
                             virDomainChrDefPtr chr)
10560
{
10561
    switch ((virDomainChrConsoleTargetType)chr->targetType) {
10562 10563 10564
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SCLP:
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SCLPLM:
        if (!(*deviceStr = qemuBuildSclpDevStr(chr)))
10565
            return -1;
10566 10567 10568
        break;

    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_VIRTIO:
10569
        if (!(*deviceStr = qemuBuildVirtioSerialPortDevStr(def, chr)))
10570
            return -1;
10571 10572 10573
        break;

    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL:
10574 10575
        break;

10576 10577 10578 10579 10580 10581
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_NONE:
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_XEN:
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_UML:
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_LXC:
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_OPENVZ:
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_LAST:
10582 10583 10584
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("unsupported console target type %s"),
                       NULLSTR(virDomainChrConsoleTargetTypeToString(chr->targetType)));
10585
        return -1;
10586 10587
    }

10588
    return 0;
10589 10590 10591 10592
}

int
qemuBuildChrDeviceStr(char **deviceStr,
10593
                      const virDomainDef *vmdef,
10594 10595 10596 10597 10598
                      virDomainChrDefPtr chr,
                      virQEMUCapsPtr qemuCaps)
{
    int ret = -1;

10599
    switch ((virDomainChrDeviceType)chr->deviceType) {
10600
    case VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL:
10601
        ret = qemuBuildSerialChrDeviceStr(deviceStr, vmdef, chr, qemuCaps);
10602 10603 10604 10605 10606 10607 10608
        break;

    case VIR_DOMAIN_CHR_DEVICE_TYPE_PARALLEL:
        ret = qemuBuildParallelChrDeviceStr(deviceStr, chr);
        break;

    case VIR_DOMAIN_CHR_DEVICE_TYPE_CHANNEL:
10609
        ret = qemuBuildChannelChrDeviceStr(deviceStr, vmdef, chr);
10610 10611 10612
        break;

    case VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE:
10613
        ret = qemuBuildConsoleChrDeviceStr(deviceStr, vmdef, chr);
10614 10615 10616 10617 10618 10619 10620 10621
        break;

    case VIR_DOMAIN_CHR_DEVICE_TYPE_LAST:
        return ret;
    }

    return ret;
}
10622 10623 10624 10625 10626 10627


virJSONValuePtr
qemuBuildHotpluggableCPUProps(const virDomainVcpuDef *vcpu)
{
    qemuDomainVcpuPrivatePtr vcpupriv = QEMU_DOMAIN_VCPU_PRIVATE(vcpu);
J
Ján Tomko 已提交
10628
    g_autoptr(virJSONValue) ret = NULL;
10629

10630
    if (!(ret = virJSONValueCopy(vcpupriv->props)))
10631
        return NULL;
10632

10633 10634
    if (virJSONValueObjectPrependString(ret, "id", vcpupriv->alias) < 0 ||
        virJSONValueObjectPrependString(ret, "driver", vcpupriv->type) < 0)
10635
        return NULL;
10636

J
Ján Tomko 已提交
10637
    return g_steal_pointer(&ret);
10638
}
10639 10640 10641 10642 10643 10644


/**
 * qemuBuildStorageSourceAttachPrepareDrive:
 * @disk: disk object to prepare
 * @qemuCaps: qemu capabilities object
10645
 * @driveBoot: bootable flag for disks which don't have -device part
10646 10647 10648 10649 10650 10651
 *
 * Prepare qemuBlockStorageSourceAttachDataPtr for use with the old approach
 * using -drive/drive_add. See qemuBlockStorageSourceAttachPrepareBlockdev.
 */
qemuBlockStorageSourceAttachDataPtr
qemuBuildStorageSourceAttachPrepareDrive(virDomainDiskDefPtr disk,
10652
                                         virQEMUCapsPtr qemuCaps)
10653
{
J
Ján Tomko 已提交
10654
    g_autoptr(qemuBlockStorageSourceAttachData) data = NULL;
10655 10656 10657 10658

    if (VIR_ALLOC(data) < 0)
        return NULL;

10659
    if (!(data->driveCmd = qemuBuildDriveStr(disk, qemuCaps)) ||
10660
        !(data->driveAlias = qemuAliasDiskDriveFromDisk(disk)))
10661 10662
        return NULL;

M
Michal Privoznik 已提交
10663
    return g_steal_pointer(&data);
10664
}
10665 10666 10667 10668 10669 10670


/**
 * qemuBuildStorageSourceAttachPrepareCommon:
 * @src: storage source
 * @data: already initialized data for disk source addition
10671
 * @qemuCaps: qemu capabilities object
10672 10673 10674 10675 10676 10677
 *
 * Prepare data for configuration associated with the disk source such as
 * secrets/TLS/pr objects etc ...
 */
int
qemuBuildStorageSourceAttachPrepareCommon(virStorageSourcePtr src,
10678 10679
                                          qemuBlockStorageSourceAttachDataPtr data,
                                          virQEMUCapsPtr qemuCaps)
10680
{
10681 10682
    qemuDomainStorageSourcePrivatePtr srcpriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(src);

10683 10684 10685 10686 10687
    if (src->pr &&
        !virStoragePRDefIsManaged(src->pr) &&
        !(data->prmgrProps = qemuBuildPRManagerInfoProps(src)))
        return -1;

10688 10689 10690 10691 10692 10693 10694 10695 10696 10697 10698
    if (srcpriv) {
        if (srcpriv->secinfo &&
            srcpriv->secinfo->type == VIR_DOMAIN_SECRET_INFO_TYPE_AES &&
            qemuBuildSecretInfoProps(srcpriv->secinfo, &data->authsecretProps) < 0)
            return -1;

        if (srcpriv->encinfo &&
            qemuBuildSecretInfoProps(srcpriv->encinfo, &data->encryptsecretProps) < 0)
            return -1;
    }

10699 10700 10701 10702 10703
    if (src->haveTLS == VIR_TRISTATE_BOOL_YES &&
        qemuBuildTLSx509BackendProps(src->tlsCertdir, false, true, src->tlsAlias,
                                     NULL, qemuCaps, &data->tlsProps) < 0)
        return -1;

10704 10705
    return 0;
}
10706 10707 10708 10709 10710 10711 10712 10713 10714 10715 10716 10717 10718


/**
 * qemuBuildStorageSourceChainAttachPrepareDrive:
 * @disk: disk definition
 * @qemuCaps: qemu capabilities object
 *
 * Prepares qemuBlockStorageSourceChainDataPtr for attaching @disk via -drive.
 */
qemuBlockStorageSourceChainDataPtr
qemuBuildStorageSourceChainAttachPrepareDrive(virDomainDiskDefPtr disk,
                                              virQEMUCapsPtr qemuCaps)
{
J
Ján Tomko 已提交
10719 10720
    g_autoptr(qemuBlockStorageSourceAttachData) elem = NULL;
    g_autoptr(qemuBlockStorageSourceChainData) data = NULL;
10721 10722 10723 10724 10725 10726 10727 10728 10729 10730 10731 10732 10733

    if (VIR_ALLOC(data) < 0)
        return NULL;

    if (!(elem = qemuBuildStorageSourceAttachPrepareDrive(disk, qemuCaps)))
        return NULL;

    if (qemuBuildStorageSourceAttachPrepareCommon(disk->src, elem, qemuCaps) < 0)
        return NULL;

    if (VIR_APPEND_ELEMENT(data->srcdata, data->nsrcdata, elem) < 0)
        return NULL;

J
Ján Tomko 已提交
10734
    return g_steal_pointer(&data);
10735 10736 10737
}


10738 10739 10740
static int
qemuBuildStorageSourceChainAttachPrepareBlockdevOne(qemuBlockStorageSourceChainData *data,
                                                    virStorageSourcePtr src,
10741
                                                    virStorageSourcePtr backingStore,
10742
                                                    virQEMUCapsPtr qemuCaps)
10743
{
J
Ján Tomko 已提交
10744
    g_autoptr(qemuBlockStorageSourceAttachData) elem = NULL;
10745

10746
    if (!(elem = qemuBlockStorageSourceAttachPrepareBlockdev(src, backingStore, true)))
10747
        return -1;
10748

10749 10750
    if (qemuBuildStorageSourceAttachPrepareCommon(src, elem, qemuCaps) < 0)
        return -1;
10751

10752 10753
    if (VIR_APPEND_ELEMENT(data->srcdata, data->nsrcdata, elem) < 0)
        return -1;
10754

10755
    return 0;
10756
}
10757 10758 10759 10760 10761 10762 10763 10764 10765 10766 10767 10768 10769 10770


/**
 * qemuBuildStorageSourceChainAttachPrepareBlockdev:
 * @top: storage source chain
 * @qemuCaps: qemu capabilities object
 *
 * Prepares qemuBlockStorageSourceChainDataPtr for attaching the chain of images
 * starting at @top via -blockdev.
 */
qemuBlockStorageSourceChainDataPtr
qemuBuildStorageSourceChainAttachPrepareBlockdev(virStorageSourcePtr top,
                                                 virQEMUCapsPtr qemuCaps)
{
J
Ján Tomko 已提交
10771
    g_autoptr(qemuBlockStorageSourceChainData) data = NULL;
10772 10773 10774 10775 10776 10777
    virStorageSourcePtr n;

    if (VIR_ALLOC(data) < 0)
        return NULL;

    for (n = top; virStorageSourceIsBacking(n); n = n->backingStore) {
10778 10779 10780
        if (qemuBuildStorageSourceChainAttachPrepareBlockdevOne(data, n,
                                                                n->backingStore,
                                                                qemuCaps) < 0)
10781 10782 10783
            return NULL;
    }

J
Ján Tomko 已提交
10784
    return g_steal_pointer(&data);
10785 10786 10787 10788 10789 10790
}


/**
 * qemuBuildStorageSourceChainAttachPrepareBlockdevTop:
 * @top: storage source chain
10791
 * @backingStore: a storage source to use as backing of @top
10792 10793 10794 10795 10796 10797 10798
 * @qemuCaps: qemu capabilities object
 *
 * Prepares qemuBlockStorageSourceChainDataPtr for attaching of @top image only
 * via -blockdev.
 */
qemuBlockStorageSourceChainDataPtr
qemuBuildStorageSourceChainAttachPrepareBlockdevTop(virStorageSourcePtr top,
10799
                                                    virStorageSourcePtr backingStore,
10800 10801
                                                    virQEMUCapsPtr qemuCaps)
{
J
Ján Tomko 已提交
10802
    g_autoptr(qemuBlockStorageSourceChainData) data = NULL;
10803 10804 10805 10806

    if (VIR_ALLOC(data) < 0)
        return NULL;

10807 10808
    if (qemuBuildStorageSourceChainAttachPrepareBlockdevOne(data, top, backingStore,
                                                            qemuCaps) < 0)
10809 10810
        return NULL;

J
Ján Tomko 已提交
10811
    return g_steal_pointer(&data);
10812
}