qemu_driver.c 294.2 KB
Newer Older
D
Daniel P. Berrange 已提交
1 2 3
/*
 * driver.c: core driver methods for managing qemu guests
 *
4
 * Copyright (C) 2006, 2007, 2008, 2009, 2010 Red Hat, Inc.
D
Daniel P. Berrange 已提交
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307  USA
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

24
#include <config.h>
25

D
Daniel P. Berrange 已提交
26 27
#include <sys/types.h>
#include <sys/poll.h>
28
#include <sys/time.h>
D
Daniel P. Berrange 已提交
29 30 31
#include <dirent.h>
#include <limits.h>
#include <string.h>
32
#include <stdbool.h>
D
Daniel P. Berrange 已提交
33 34 35 36 37 38
#include <stdio.h>
#include <strings.h>
#include <stdarg.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
39
#include <sys/utsname.h>
40 41 42 43
#include <sys/stat.h>
#include <fcntl.h>
#include <signal.h>
#include <paths.h>
44 45
#include <pwd.h>
#include <stdio.h>
46
#include <sys/wait.h>
47
#include <sys/ioctl.h>
48
#include <sys/un.h>
D
Daniel P. Berrange 已提交
49

50
#ifdef __linux__
51 52 53 54
# include <sys/vfs.h>
# ifndef NFS_SUPER_MAGIC
#  define NFS_SUPER_MAGIC 0x6969
# endif /* NFS_SUPER_MAGIC */
55
#endif /* __linux__ */
56

57
#include "virterror_internal.h"
58
#include "logging.h"
59
#include "datatypes.h"
60 61
#include "qemu_driver.h"
#include "qemu_conf.h"
62
#include "qemu_monitor.h"
63
#include "qemu_monitor_text.h"
64
#include "qemu_bridge_filter.h"
J
Jim Meyering 已提交
65
#include "c-ctype.h"
66
#include "event.h"
67
#include "buf.h"
68
#include "util.h"
69
#include "nodeinfo.h"
70
#include "stats_linux.h"
71
#include "capabilities.h"
72
#include "memory.h"
73
#include "uuid.h"
74
#include "domain_conf.h"
75 76
#include "node_device_conf.h"
#include "pci.h"
77
#include "hostusb.h"
78
#include "processinfo.h"
79 80
#include "qemu_security_stacked.h"
#include "qemu_security_dac.h"
81
#include "cgroup.h"
C
Chris Lalancette 已提交
82
#include "libvirt_internal.h"
83
#include "xml.h"
84
#include "cpu/cpu.h"
85
#include "macvtap.h"
86

87

88 89
#define VIR_FROM_THIS VIR_FROM_QEMU

90 91 92 93 94 95 96 97 98 99 100 101
/* Only 1 job is allowed at any time
 * A job includes *all* monitor commands, even those just querying
 * information, not merely actions */
enum qemuDomainJob {
    QEMU_JOB_NONE = 0,  /* Always set to 0 for easy if (jobActive) conditions */
    QEMU_JOB_UNSPECIFIED,
    QEMU_JOB_MIGRATION,
};

enum qemuDomainJobSignals {
    QEMU_JOB_SIGNAL_CANCEL  = 1 << 0, /* Request job cancellation */
    QEMU_JOB_SIGNAL_SUSPEND = 1 << 1, /* Request VM suspend to finish live migration offline */
102 103 104 105 106
    QEMU_JOB_SIGNAL_MIGRATE_DOWNTIME = 1 << 2, /* Request migration downtime change */
};

struct qemuDomainJobSignalsData {
    unsigned long long migrateDowntime; /* Data for QEMU_JOB_SIGNAL_MIGRATE_DOWNTIME */
107 108
};

109 110 111
typedef struct _qemuDomainObjPrivate qemuDomainObjPrivate;
typedef qemuDomainObjPrivate *qemuDomainObjPrivatePtr;
struct _qemuDomainObjPrivate {
112
    virCond jobCond; /* Use in conjunction with main virDomainObjPtr lock */
113 114
    enum qemuDomainJob jobActive;   /* Currently running job */
    unsigned int jobSignals;        /* Signals for running job */
115
    struct qemuDomainJobSignalsData jobSignalsData; /* Signal specific data */
116 117
    virDomainJobInfo jobInfo;
    unsigned long long jobStart;
118

119
    qemuMonitorPtr mon;
120
    virDomainChrDefPtr monConfig;
D
Daniel P. Berrange 已提交
121
    int monJSON;
122 123 124

    int nvcpupids;
    int *vcpupids;
125 126

    qemuDomainPCIAddressSetPtr pciaddrs;
127
    int persistentAddrs;
128 129
};

130 131
static int qemudShutdown(void);

132 133
static void qemuDriverLock(struct qemud_driver *driver)
{
134
    virMutexLock(&driver->lock);
135 136 137
}
static void qemuDriverUnlock(struct qemud_driver *driver)
{
138
    virMutexUnlock(&driver->lock);
139 140
}

141 142 143
static void qemuDomainEventFlush(int timer, void *opaque);
static void qemuDomainEventQueue(struct qemud_driver *driver,
                                 virDomainEventPtr event);
144

145 146
static int qemudStartVMDaemon(virConnectPtr conn,
                              struct qemud_driver *driver,
147
                              virDomainObjPtr vm,
148 149
                              const char *migrateFrom,
                              int stdin_fd);
150

151
static void qemudShutdownVMDaemon(struct qemud_driver *driver,
152
                                  virDomainObjPtr vm);
153

154
static int qemudDomainGetMaxVcpus(virDomainPtr dom);
155

156
static int qemuDetectVcpuPIDs(struct qemud_driver *driver,
157
                              virDomainObjPtr vm);
158

159 160 161
static int qemuUpdateActivePciHostdevs(struct qemud_driver *driver,
                                       virDomainDefPtr def);

J
Jim Meyering 已提交
162
static struct qemud_driver *qemu_driver = NULL;
163

164 165 166 167 168 169 170 171 172 173 174 175 176 177 178

static void *qemuDomainObjPrivateAlloc(void)
{
    qemuDomainObjPrivatePtr priv;

    if (VIR_ALLOC(priv) < 0)
        return NULL;

    return priv;
}

static void qemuDomainObjPrivateFree(void *data)
{
    qemuDomainObjPrivatePtr priv = data;

179
    qemuDomainPCIAddressSetFree(priv->pciaddrs);
180 181 182
    virDomainChrDefFree(priv->monConfig);
    VIR_FREE(priv->vcpupids);

183 184 185 186 187 188 189 190 191
    /* This should never be non-NULL if we get here, but just in case... */
    if (priv->mon) {
        VIR_ERROR0("Unexpected QEMU monitor still active during domain deletion");
        qemuMonitorClose(priv->mon);
    }
    VIR_FREE(priv);
}


192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209
static int qemuDomainObjPrivateXMLFormat(virBufferPtr buf, void *data)
{
    qemuDomainObjPrivatePtr priv = data;
    const char *monitorpath;

    /* priv->monitor_chr is set only for qemu */
    if (priv->monConfig) {
        switch (priv->monConfig->type) {
        case VIR_DOMAIN_CHR_TYPE_UNIX:
            monitorpath = priv->monConfig->data.nix.path;
            break;
        default:
        case VIR_DOMAIN_CHR_TYPE_PTY:
            monitorpath = priv->monConfig->data.file.path;
            break;
        }

        virBufferEscapeString(buf, "  <monitor path='%s'", monitorpath);
D
Daniel P. Berrange 已提交
210 211
        if (priv->monJSON)
            virBufferAddLit(buf, " json='1'");
212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237
        virBufferVSprintf(buf, " type='%s'/>\n",
                          virDomainChrTypeToString(priv->monConfig->type));
    }


    if (priv->nvcpupids) {
        int i;
        virBufferAddLit(buf, "  <vcpus>\n");
        for (i = 0 ; i < priv->nvcpupids ; i++) {
            virBufferVSprintf(buf, "    <vcpu pid='%d'/>\n", priv->vcpupids[i]);
        }
        virBufferAddLit(buf, "  </vcpus>\n");
    }

    return 0;
}

static int qemuDomainObjPrivateXMLParse(xmlXPathContextPtr ctxt, void *data)
{
    qemuDomainObjPrivatePtr priv = data;
    char *monitorpath;
    char *tmp;
    int n, i;
    xmlNodePtr *nodes = NULL;

    if (VIR_ALLOC(priv->monConfig) < 0) {
238
        virReportOOMError();
239 240 241
        goto error;
    }

242
    if (!(priv->monConfig->info.alias = strdup("monitor"))) {
243
        virReportOOMError();
244 245 246
        goto error;
    }

247
    if (!(monitorpath =
248
          virXPathString("string(./monitor[1]/@path)", ctxt))) {
249 250
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("no monitor path"));
251 252 253
        goto error;
    }

254
    tmp = virXPathString("string(./monitor[1]/@type)", ctxt);
255 256 257 258 259 260
    if (tmp)
        priv->monConfig->type = virDomainChrTypeFromString(tmp);
    else
        priv->monConfig->type = VIR_DOMAIN_CHR_TYPE_PTY;
    VIR_FREE(tmp);

261
    if (virXPathBoolean("count(./monitor[@json = '1']) > 0", ctxt)) {
D
Daniel P. Berrange 已提交
262
        priv->monJSON = 1;
263 264 265
    } else {
        priv->monJSON = 0;
    }
D
Daniel P. Berrange 已提交
266

267 268 269 270 271 272 273 274 275
    switch (priv->monConfig->type) {
    case VIR_DOMAIN_CHR_TYPE_PTY:
        priv->monConfig->data.file.path = monitorpath;
        break;
    case VIR_DOMAIN_CHR_TYPE_UNIX:
        priv->monConfig->data.nix.path = monitorpath;
        break;
    default:
        VIR_FREE(monitorpath);
276 277 278
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("unsupported monitor type '%s'"),
                        virDomainChrTypeToString(priv->monConfig->type));
279 280 281
        goto error;
    }

282
    n = virXPathNodeSet("./vcpus/vcpu", ctxt, &nodes);
283 284 285 286 287
    if (n < 0)
        goto error;
    if (n) {
        priv->nvcpupids = n;
        if (VIR_REALLOC_N(priv->vcpupids, priv->nvcpupids) < 0) {
288
            virReportOOMError();
289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308
            goto error;
        }

        for (i = 0 ; i < n ; i++) {
            char *pidstr = virXMLPropString(nodes[i], "pid");
            if (!pidstr)
                goto error;

            if (virStrToLong_i(pidstr, NULL, 10, &(priv->vcpupids[i])) < 0) {
                VIR_FREE(pidstr);
                goto error;
            }
            VIR_FREE(pidstr);
        }
        VIR_FREE(nodes);
    }

    return 0;

error:
309 310
    virDomainChrDefFree(priv->monConfig);
    priv->monConfig = NULL;
311 312 313 314 315 316
    VIR_FREE(nodes);
    return -1;
}



317 318 319 320 321 322 323 324 325
/*
 * obj must be locked before calling, qemud_driver must NOT be locked
 *
 * This must be called by anything that will change the VM state
 * in any way, or anything that will use the QEMU monitor.
 *
 * Upon successful return, the object will have its ref count increased,
 * successful calls must be followed by EndJob eventually
 */
326 327 328 329

/* Give up waiting for mutex after 30 seconds */
#define QEMU_JOB_WAIT_TIME (1000ull * 30)

330 331 332 333
static int qemuDomainObjBeginJob(virDomainObjPtr obj) ATTRIBUTE_RETURN_CHECK;
static int qemuDomainObjBeginJob(virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
334 335 336 337
    struct timeval now;
    unsigned long long then;

    if (gettimeofday(&now, NULL) < 0) {
338
        virReportSystemError(errno, "%s",
339 340 341 342 343
                             _("cannot get time of day"));
        return -1;
    }
    then = (now.tv_sec * 1000ull) + (now.tv_usec / 1000);
    then += QEMU_JOB_WAIT_TIME;
344 345 346 347

    virDomainObjRef(obj);

    while (priv->jobActive) {
348
        if (virCondWaitUntil(&priv->jobCond, &obj->lock, then) < 0) {
349
            virDomainObjUnref(obj);
350
            if (errno == ETIMEDOUT)
351 352
                qemuReportError(VIR_ERR_OPERATION_TIMEOUT,
                                "%s", _("cannot acquire state change lock"));
353
            else
354
                virReportSystemError(errno,
355
                                     "%s", _("cannot acquire job mutex"));
356 357 358
            return -1;
        }
    }
359 360
    priv->jobActive = QEMU_JOB_UNSPECIFIED;
    priv->jobSignals = 0;
361
    memset(&priv->jobSignalsData, 0, sizeof(priv->jobSignalsData));
362 363
    priv->jobStart = (now.tv_sec * 1000ull) + (now.tv_usec / 1000);
    memset(&priv->jobInfo, 0, sizeof(priv->jobInfo));
364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379

    return 0;
}

/*
 * obj must be locked before calling, qemud_driver must be locked
 *
 * This must be called by anything that will change the VM state
 * in any way, or anything that will use the QEMU monitor.
 */
static int qemuDomainObjBeginJobWithDriver(struct qemud_driver *driver,
                                           virDomainObjPtr obj) ATTRIBUTE_RETURN_CHECK;
static int qemuDomainObjBeginJobWithDriver(struct qemud_driver *driver,
                                           virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
380 381 382 383
    struct timeval now;
    unsigned long long then;

    if (gettimeofday(&now, NULL) < 0) {
384
        virReportSystemError(errno, "%s",
385 386 387 388 389
                             _("cannot get time of day"));
        return -1;
    }
    then = (now.tv_sec * 1000ull) + (now.tv_usec / 1000);
    then += QEMU_JOB_WAIT_TIME;
390 391 392 393 394

    virDomainObjRef(obj);
    qemuDriverUnlock(driver);

    while (priv->jobActive) {
395
        if (virCondWaitUntil(&priv->jobCond, &obj->lock, then) < 0) {
396
            virDomainObjUnref(obj);
397
            if (errno == ETIMEDOUT)
398 399
                qemuReportError(VIR_ERR_OPERATION_TIMEOUT,
                                "%s", _("cannot acquire state change lock"));
400
            else
401
                virReportSystemError(errno,
402
                                     "%s", _("cannot acquire job mutex"));
M
Matthias Bolte 已提交
403
            qemuDriverLock(driver);
404 405 406
            return -1;
        }
    }
407 408
    priv->jobActive = QEMU_JOB_UNSPECIFIED;
    priv->jobSignals = 0;
409
    memset(&priv->jobSignalsData, 0, sizeof(priv->jobSignalsData));
410 411
    priv->jobStart = (now.tv_sec * 1000ull) + (now.tv_usec / 1000);
    memset(&priv->jobInfo, 0, sizeof(priv->jobInfo));
412 413 414 415 416 417 418 419 420 421 422 423 424

    virDomainObjUnlock(obj);
    qemuDriverLock(driver);
    virDomainObjLock(obj);

    return 0;
}

/*
 * obj must be locked before calling, qemud_driver does not matter
 *
 * To be called after completing the work associated with the
 * earlier  qemuDomainBeginJob() call
425 426 427
 *
 * Returns remaining refcount on 'obj', maybe 0 to indicated it
 * was deleted
428
 */
429
static int ATTRIBUTE_RETURN_CHECK qemuDomainObjEndJob(virDomainObjPtr obj)
430 431 432
{
    qemuDomainObjPrivatePtr priv = obj->privateData;

433 434
    priv->jobActive = QEMU_JOB_NONE;
    priv->jobSignals = 0;
435
    memset(&priv->jobSignalsData, 0, sizeof(priv->jobSignalsData));
436 437
    priv->jobStart = 0;
    memset(&priv->jobInfo, 0, sizeof(priv->jobInfo));
438 439
    virCondSignal(&priv->jobCond);

440
    return virDomainObjUnref(obj);
441 442 443 444 445 446 447 448 449 450 451
}


/*
 * obj must be locked before calling, qemud_driver must be unlocked
 *
 * To be called immediately before any QEMU monitor API call
 * Must have alrady called qemuDomainObjBeginJob().
 *
 * To be followed with qemuDomainObjExitMonitor() once complete
 */
452 453 454 455 456
static void qemuDomainObjEnterMonitor(virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;

    qemuMonitorLock(priv->mon);
457
    qemuMonitorRef(priv->mon);
458
    virDomainObjUnlock(obj);
459 460 461
}


462 463 464 465
/* obj must NOT be locked before calling, qemud_driver must be unlocked
 *
 * Should be paired with an earlier  qemuDomainObjEnterMonitor() call
 */
466 467 468
static void qemuDomainObjExitMonitor(virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
469 470 471 472 473 474
    int refs;

    refs = qemuMonitorUnref(priv->mon);

    if (refs > 0)
        qemuMonitorUnlock(priv->mon);
475

476
    virDomainObjLock(obj);
477 478 479 480 481

    if (refs == 0) {
        virDomainObjUnref(obj);
        priv->mon = NULL;
    }
482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497
}


/*
 * obj must be locked before calling, qemud_driver must be locked
 *
 * To be called immediately before any QEMU monitor API call
 * Must have alrady called qemuDomainObjBeginJob().
 *
 * To be followed with qemuDomainObjExitMonitorWithDriver() once complete
 */
static void qemuDomainObjEnterMonitorWithDriver(struct qemud_driver *driver, virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;

    qemuMonitorLock(priv->mon);
498
    qemuMonitorRef(priv->mon);
499 500 501 502 503 504 505 506 507 508 509 510 511
    virDomainObjUnlock(obj);
    qemuDriverUnlock(driver);
}


/* obj must NOT be locked before calling, qemud_driver must be unlocked,
 * and will be locked after returning
 *
 * Should be paired with an earlier  qemuDomainObjEnterMonitor() call
 */
static void qemuDomainObjExitMonitorWithDriver(struct qemud_driver *driver, virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
512 513 514 515 516 517
    int refs;

    refs = qemuMonitorUnref(priv->mon);

    if (refs > 0)
        qemuMonitorUnlock(priv->mon);
518 519 520

    qemuDriverLock(driver);
    virDomainObjLock(obj);
521 522 523 524 525

    if (refs == 0) {
        virDomainObjUnref(obj);
        priv->mon = NULL;
    }
526 527 528
}


529 530 531 532 533 534 535 536 537
static int qemuCgroupControllerActive(struct qemud_driver *driver,
                                      int controller)
{
    if (driver->cgroup == NULL)
        return 0;
    if (driver->cgroupControllers & (1 << controller))
        return 1;
    return 0;
}
538

539
static int
540
qemudLogFD(struct qemud_driver *driver, const char* name)
541 542 543
{
    char logfile[PATH_MAX];
    mode_t logmode;
G
Guido Günther 已提交
544
    int ret, fd = -1;
545

546 547
    if ((ret = snprintf(logfile, sizeof(logfile), "%s/%s.log",
                        driver->logDir, name))
G
Guido Günther 已提交
548
        < 0 || ret >= sizeof(logfile)) {
549
        virReportOOMError();
550 551 552 553
        return -1;
    }

    logmode = O_CREAT | O_WRONLY;
554 555
    /* Only logrotate files in /var/log, so only append if running privileged */
    if (driver->privileged)
556
        logmode |= O_APPEND;
557 558 559
    else
        logmode |= O_TRUNC;

560
    if ((fd = open(logfile, logmode, S_IRUSR | S_IWUSR)) < 0) {
561
        virReportSystemError(errno,
562 563
                             _("failed to create logfile %s"),
                             logfile);
564 565
        return -1;
    }
566
    if (virSetCloseExec(fd) < 0) {
567
        virReportSystemError(errno, "%s",
568
                             _("Unable to set VM logfile close-on-exec flag"));
569 570 571 572 573 574 575
        close(fd);
        return -1;
    }
    return fd;
}


576
static int
577
qemudLogReadFD(const char* logDir, const char* name, off_t pos)
578 579 580 581 582 583 584
{
    char logfile[PATH_MAX];
    mode_t logmode = O_RDONLY;
    int ret, fd = -1;

    if ((ret = snprintf(logfile, sizeof(logfile), "%s/%s.log", logDir, name))
        < 0 || ret >= sizeof(logfile)) {
585 586 587
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("failed to build logfile name %s/%s.log"),
                        logDir, name);
588 589 590 591 592
        return -1;
    }


    if ((fd = open(logfile, logmode)) < 0) {
593
        virReportSystemError(errno,
594 595
                             _("failed to create logfile %s"),
                             logfile);
596 597
        return -1;
    }
598
    if (virSetCloseExec(fd) < 0) {
599
        virReportSystemError(errno, "%s",
600
                             _("Unable to set VM logfile close-on-exec flag"));
601 602 603
        close(fd);
        return -1;
    }
604
    if (pos < 0 || lseek(fd, pos, SEEK_SET) < 0) {
605
      virReportSystemError(pos < 0 ? 0 : errno,
606 607
                             _("Unable to seek to %lld in %s"),
                             (long long) pos, logfile);
608 609 610 611 612 613
        close(fd);
    }
    return fd;
}


614 615 616 617 618 619 620 621 622 623 624 625
struct qemuAutostartData {
    struct qemud_driver *driver;
    virConnectPtr conn;
};
static void
qemuAutostartDomain(void *payload, const char *name ATTRIBUTE_UNUSED, void *opaque)
{
    virDomainObjPtr vm = payload;
    struct qemuAutostartData *data = opaque;

    virDomainObjLock(vm);
    if (vm->autostart &&
D
Daniel P. Berrange 已提交
626
        !virDomainObjIsActive(vm)) {
627 628 629 630 631 632
        int ret;

        virResetLastError();
        ret = qemudStartVMDaemon(data->conn, data->driver, vm, NULL, -1);
        if (ret < 0) {
            virErrorPtr err = virGetLastError();
633
            VIR_ERROR(_("Failed to autostart VM '%s': %s"),
634 635 636 637 638 639 640 641 642 643 644 645 646 647
                      vm->def->name,
                      err ? err->message : "");
        } else {
            virDomainEventPtr event =
                virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STARTED,
                                         VIR_DOMAIN_EVENT_STARTED_BOOTED);
            if (event)
                qemuDomainEventQueue(data->driver, event);
        }
    }
    virDomainObjUnlock(vm);
}

648 649
static void
qemudAutostartConfigs(struct qemud_driver *driver) {
650 651 652 653 654
    /* XXX: Figure out a better way todo this. The domain
     * startup code needs a connection handle in order
     * to lookup the bridge associated with a virtual
     * network
     */
655 656 657
    virConnectPtr conn = virConnectOpen(driver->privileged ?
                                        "qemu:///system" :
                                        "qemu:///session");
658
    /* Ignoring NULL conn which is mostly harmless here */
659
    struct qemuAutostartData data = { driver, conn };
660

661
    qemuDriverLock(driver);
662
    virHashForEach(driver->domains.objs, qemuAutostartDomain, &data);
663
    qemuDriverUnlock(driver);
664

665 666
    if (conn)
        virConnectClose(conn);
667 668
}

669 670 671 672 673 674 675 676 677

/**
 * qemudRemoveDomainStatus
 *
 * remove all state files of a domain from statedir
 *
 * Returns 0 on success
 */
static int
678
qemudRemoveDomainStatus(struct qemud_driver *driver,
679 680
                        virDomainObjPtr vm)
{
681
    char ebuf[1024];
682 683 684
    char *file = NULL;

    if (virAsprintf(&file, "%s/%s.xml", driver->stateDir, vm->def->name) < 0) {
685
        virReportOOMError();
D
Daniel Veillard 已提交
686
        return(-1);
687 688
    }

689 690
    if (unlink(file) < 0 && errno != ENOENT && errno != ENOTDIR)
        VIR_WARN(_("Failed to remove domain XML for %s: %s"),
D
Daniel Veillard 已提交
691 692 693
                 vm->def->name, virStrerror(errno, ebuf, sizeof(ebuf)));
    VIR_FREE(file);

694 695 696
    if (virFileDeletePid(driver->stateDir, vm->def->name) != 0)
        VIR_WARN(_("Failed to remove PID file for %s: %s"),
                 vm->def->name, virStrerror(errno, ebuf, sizeof(ebuf)));
697

D
Daniel Veillard 已提交
698

699
    return 0;
700 701
}

702 703 704 705 706 707 708 709 710 711 712 713 714 715

/*
 * This is a callback registered with a qemuMonitorPtr  instance,
 * and to be invoked when the monitor console hits an end of file
 * condition, or error, thus indicating VM shutdown should be
 * performed
 */
static void
qemuHandleMonitorEOF(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                     virDomainObjPtr vm,
                     int hasError) {
    struct qemud_driver *driver = qemu_driver;
    virDomainEventPtr event = NULL;

716
    VIR_DEBUG("Received EOF on %p '%s'", vm, vm->def->name);
717 718 719 720 721 722 723 724
    virDomainObjLock(vm);

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     hasError ?
                                     VIR_DOMAIN_EVENT_STOPPED_FAILED :
                                     VIR_DOMAIN_EVENT_STOPPED_SHUTDOWN);

725
    qemudShutdownVMDaemon(driver, vm);
726 727 728 729 730 731 732 733 734 735 736 737 738
    if (!vm->persistent)
        virDomainRemoveInactive(&driver->domains, vm);
    else
        virDomainObjUnlock(vm);

    if (event) {
        qemuDriverLock(driver);
        qemuDomainEventQueue(driver, event);
        qemuDriverUnlock(driver);
    }
}


739 740 741
static virDomainDiskDefPtr
findDomainDiskByPath(virDomainObjPtr vm,
                     const char *path)
742 743 744 745 746 747 748
{
    int i;

    for (i = 0; i < vm->def->ndisks; i++) {
        virDomainDiskDefPtr disk;

        disk = vm->def->disks[i];
749 750
        if (disk->src != NULL && STREQ(disk->src, path))
            return disk;
751
    }
752 753 754 755

    qemuReportError(VIR_ERR_INTERNAL_ERROR,
                    _("no disk found with path %s"),
                    path);
756 757 758 759
    return NULL;
}

static int
760 761 762 763
getVolumeQcowPassphrase(virConnectPtr conn,
                        virDomainDiskDefPtr disk,
                        char **secretRet,
                        size_t *secretLen)
764 765 766 767 768
{
    virSecretPtr secret;
    char *passphrase;
    unsigned char *data;
    size_t size;
769
    int ret = -1;
770
    virStorageEncryptionPtr enc;
771

772 773 774 775 776 777 778
    if (!disk->encryption) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("disk %s does not have any encryption information"),
                        disk->src);
        return -1;
    }
    enc = disk->encryption;
779 780

    if (!conn) {
781 782
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        "%s", _("cannot find secrets without a connection"));
783
        goto cleanup;
784 785 786 787 788
    }

    if (conn->secretDriver == NULL ||
        conn->secretDriver->lookupByUUID == NULL ||
        conn->secretDriver->getValue == NULL) {
789 790
        qemuReportError(VIR_ERR_NO_SUPPORT, "%s",
                        _("secret storage not supported"));
791
        goto cleanup;
792 793 794 795 796 797
    }

    if (enc->format != VIR_STORAGE_ENCRYPTION_FORMAT_QCOW ||
        enc->nsecrets != 1 ||
        enc->secrets[0]->type !=
        VIR_STORAGE_ENCRYPTION_SECRET_TYPE_PASSPHRASE) {
798
        qemuReportError(VIR_ERR_INVALID_DOMAIN,
799
                        _("invalid <encryption> for volume %s"), disk->src);
800
        goto cleanup;
801 802 803 804 805
    }

    secret = conn->secretDriver->lookupByUUID(conn,
                                              enc->secrets[0]->uuid);
    if (secret == NULL)
806
        goto cleanup;
807 808 809 810
    data = conn->secretDriver->getValue(secret, &size,
                                        VIR_SECRET_GET_VALUE_INTERNAL_CALL);
    virUnrefSecret(secret);
    if (data == NULL)
811
        goto cleanup;
812 813 814 815

    if (memchr(data, '\0', size) != NULL) {
        memset(data, 0, size);
        VIR_FREE(data);
816 817
        qemuReportError(VIR_ERR_INVALID_SECRET,
                        _("format='qcow' passphrase for %s must not contain a "
818
                          "'\\0'"), disk->src);
819
        goto cleanup;
820 821 822 823 824
    }

    if (VIR_ALLOC_N(passphrase, size + 1) < 0) {
        memset(data, 0, size);
        VIR_FREE(data);
825
        virReportOOMError();
826
        goto cleanup;
827 828 829 830 831 832 833 834 835 836
    }
    memcpy(passphrase, data, size);
    passphrase[size] = '\0';

    memset(data, 0, size);
    VIR_FREE(data);

    *secretRet = passphrase;
    *secretLen = size;

837 838 839
    ret = 0;

cleanup:
840 841
    return ret;
}
842

843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863
static int
findVolumeQcowPassphrase(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                         virConnectPtr conn,
                         virDomainObjPtr vm,
                         const char *path,
                         char **secretRet,
                         size_t *secretLen)
{
    virDomainDiskDefPtr disk;
    int ret = -1;

    virDomainObjLock(vm);
    disk = findDomainDiskByPath(vm, path);

    if (!disk)
        goto cleanup;

    ret = getVolumeQcowPassphrase(conn, disk, secretRet, secretLen);

cleanup:
    virDomainObjUnlock(vm);
864
    return ret;
865 866
}

867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888

static int
qemuHandleDomainReset(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                      virDomainObjPtr vm)
{
    struct qemud_driver *driver = qemu_driver;
    virDomainEventPtr event;

    virDomainObjLock(vm);
    event = virDomainEventRebootNewFromObj(vm);
    virDomainObjUnlock(vm);

    if (event) {
        qemuDriverLock(driver);
        qemuDomainEventQueue(driver, event);
        qemuDriverUnlock(driver);
    }

    return 0;
}


889 890 891
static qemuMonitorCallbacks monitorCallbacks = {
    .eofNotify = qemuHandleMonitorEOF,
    .diskSecretLookup = findVolumeQcowPassphrase,
892
    .domainReset = qemuHandleDomainReset,
893 894
};

895
static int
896
qemuConnectMonitor(struct qemud_driver *driver, virDomainObjPtr vm)
897
{
898
    qemuDomainObjPrivatePtr priv = vm->privateData;
899
    int ret;
900

901 902 903 904
    /* Hold an extra reference because we can't allow 'vm' to be
     * deleted while the monitor is active */
    virDomainObjRef(vm);

905 906
    if ((priv->mon = qemuMonitorOpen(vm,
                                     priv->monConfig,
D
Daniel P. Berrange 已提交
907
                                     priv->monJSON,
908
                                     &monitorCallbacks)) == NULL) {
909
        VIR_ERROR(_("Failed to connect monitor for %s"), vm->def->name);
910
        return -1;
911
    }
912

913 914 915 916 917 918 919 920 921 922
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    ret = qemuMonitorSetCapabilities(priv->mon);
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    if (ret < 0) {
        qemuMonitorClose(priv->mon);
        priv->mon = NULL;
    }

    return ret;
923
}
924 925 926 927

/*
 * Open an existing VM's monitor, re-detect VCPU threads
 * and re-reserve the security labels in use
928
 */
929 930
static void
qemuReconnectDomain(void *payload, const char *name ATTRIBUTE_UNUSED, void *opaque)
931
{
932 933
    virDomainObjPtr obj = payload;
    struct qemud_driver *driver = opaque;
934
    qemuDomainObjPrivatePtr priv;
935
    unsigned long long qemuCmdFlags;
936 937

    virDomainObjLock(obj);
938

939 940
    VIR_DEBUG("Reconnect monitor to %p '%s'", obj, obj->def->name);

941 942
    priv = obj->privateData;

943
    /* XXX check PID liveliness & EXE path */
944
    if (qemuConnectMonitor(driver, obj) < 0)
945
        goto error;
946

947 948 949 950
    if (qemuUpdateActivePciHostdevs(driver, obj->def) < 0) {
        goto error;
    }

951 952 953 954 955 956 957 958 959
    /* XXX we should be persisting the original flags in the XML
     * not re-detecting them, since the binary may have changed
     * since launch time */
    if (qemudExtractVersionInfo(obj->def->emulator,
                                NULL,
                                &qemuCmdFlags) >= 0 &&
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE))
        priv->persistentAddrs = 1;

960 961 962
    if (!(priv->pciaddrs = qemuDomainPCIAddressSetCreate(obj->def)))
        goto error;

963
    if (driver->securityDriver &&
964
        driver->securityDriver->domainReserveSecurityLabel &&
965
        driver->securityDriver->domainReserveSecurityLabel(obj) < 0)
966
        goto error;
967

968 969
    if (obj->def->id >= driver->nextvmid)
        driver->nextvmid = obj->def->id + 1;
970

971 972
    virDomainObjUnlock(obj);
    return;
973

974
error:
975 976 977
    /* We can't get the monitor back, so must kill the VM
     * to remove danger of it ending up running twice if
     * user tries to start it again later */
978
    qemudShutdownVMDaemon(driver, obj);
979 980 981 982
    if (!obj->persistent)
        virDomainRemoveInactive(&driver->domains, obj);
    else
        virDomainObjUnlock(obj);
983
}
984

985
/**
986
 * qemudReconnectDomains
987 988 989 990 991 992 993
 *
 * Try to re-open the resources for live VMs that we care
 * about.
 */
static void
qemuReconnectDomains(struct qemud_driver *driver)
{
994
    virHashForEach(driver->domains.objs, qemuReconnectDomain, driver);
995 996
}

997

998 999 1000 1001 1002 1003
static int
qemudSecurityInit(struct qemud_driver *qemud_drv)
{
    int ret;
    virSecurityDriverPtr security_drv;

1004 1005 1006
    qemuSecurityStackedSetDriver(qemud_drv);
    qemuSecurityDACSetDriver(qemud_drv);

1007 1008 1009 1010 1011 1012
    ret = virSecurityDriverStartup(&security_drv,
                                   qemud_drv->securityDriverName);
    if (ret == -1) {
        VIR_ERROR0(_("Failed to start security driver"));
        return -1;
    }
1013 1014 1015

    /* No primary security driver wanted to be enabled: just setup
     * the DAC driver on its own */
1016
    if (ret == -2) {
1017
        qemud_drv->securityDriver = &qemuDACSecurityDriver;
1018
        VIR_INFO0(_("No security driver available"));
1019 1020 1021 1022 1023
    } else {
        qemud_drv->securityPrimaryDriver = security_drv;
        qemud_drv->securitySecondaryDriver = &qemuDACSecurityDriver;
        qemud_drv->securityDriver = &qemuStackedSecurityDriver;
        VIR_INFO("Initialized security driver %s", security_drv->name);
1024 1025
    }

1026
    return 0;
1027
}
1028 1029


1030 1031
static virCapsPtr
qemuCreateCapabilities(virCapsPtr oldcaps,
1032
                       struct qemud_driver *driver)
1033 1034 1035 1036 1037
{
    virCapsPtr caps;

    /* Basic host arch / guest machine capabilities */
    if (!(caps = qemudCapsInit(oldcaps))) {
1038
        virReportOOMError();
1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049
        return NULL;
    }

    /* Domain XML parser hooks */
    caps->privateDataAllocFunc = qemuDomainObjPrivateAlloc;
    caps->privateDataFreeFunc = qemuDomainObjPrivateFree;
    caps->privateDataXMLFormat = qemuDomainObjPrivateXMLFormat;
    caps->privateDataXMLParse = qemuDomainObjPrivateXMLParse;


    /* Security driver data */
1050
    if (driver->securityPrimaryDriver) {
1051 1052
        const char *doi, *model;

1053 1054
        doi = virSecurityDriverGetDOI(driver->securityPrimaryDriver);
        model = virSecurityDriverGetModel(driver->securityPrimaryDriver);
1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067

        if (!(caps->host.secModel.model = strdup(model)))
            goto no_memory;
        if (!(caps->host.secModel.doi = strdup(doi)))
            goto no_memory;

        VIR_DEBUG("Initialized caps for security driver \"%s\" with "
                  "DOI \"%s\"", model, doi);
    }

    return caps;

no_memory:
1068
    virReportOOMError();
1069 1070 1071
    virCapabilitiesFree(caps);
    return NULL;
}
1072

1073 1074 1075 1076 1077 1078
/**
 * qemudStartup:
 *
 * Initialization function for the QEmu daemon
 */
static int
1079
qemudStartup(int privileged) {
1080
    char *base = NULL;
D
Daniel P. Berrange 已提交
1081
    char driverConf[PATH_MAX];
1082
    int rc;
1083

1084
    if (VIR_ALLOC(qemu_driver) < 0)
1085 1086
        return -1;

1087
    if (virMutexInit(&qemu_driver->lock) < 0) {
1088
        VIR_ERROR("%s", _("cannot initialize mutex"));
1089 1090 1091
        VIR_FREE(qemu_driver);
        return -1;
    }
1092
    qemuDriverLock(qemu_driver);
1093
    qemu_driver->privileged = privileged;
1094

1095 1096 1097
    /* Don't have a dom0 so start from 1 */
    qemu_driver->nextvmid = 1;

1098 1099 1100
    if (virDomainObjListInit(&qemu_driver->domains) < 0)
        goto out_of_memory;

1101
    /* Init callback list */
1102
    if (VIR_ALLOC(qemu_driver->domainEventCallbacks) < 0)
1103
        goto out_of_memory;
1104 1105 1106 1107 1108 1109
    if (!(qemu_driver->domainEventQueue = virDomainEventQueueNew()))
        goto out_of_memory;

    if ((qemu_driver->domainEventTimer =
         virEventAddTimeout(-1, qemuDomainEventFlush, qemu_driver, NULL)) < 0)
        goto error;
1110

1111
    if (privileged) {
1112 1113
        if (virAsprintf(&qemu_driver->logDir,
                        "%s/log/libvirt/qemu", LOCAL_STATE_DIR) == -1)
1114
            goto out_of_memory;
1115

D
Daniel P. Berrange 已提交
1116
        if ((base = strdup (SYSCONF_DIR "/libvirt")) == NULL)
1117
            goto out_of_memory;
1118 1119

        if (virAsprintf(&qemu_driver->stateDir,
1120
                      "%s/run/libvirt/qemu", LOCAL_STATE_DIR) == -1)
1121
            goto out_of_memory;
1122 1123 1124 1125 1126 1127 1128 1129

        if (virAsprintf(&qemu_driver->libDir,
                      "%s/lib/libvirt/qemu", LOCAL_STATE_DIR) == -1)
            goto out_of_memory;

        if (virAsprintf(&qemu_driver->cacheDir,
                      "%s/cache/libvirt/qemu", LOCAL_STATE_DIR) == -1)
            goto out_of_memory;
1130
    } else {
1131
        uid_t uid = geteuid();
1132
        char *userdir = virGetUserDirectory(uid);
1133
        if (!userdir)
1134
            goto error;
1135

1136
        if (virAsprintf(&qemu_driver->logDir,
1137 1138
                        "%s/.libvirt/qemu/log", userdir) == -1) {
            VIR_FREE(userdir);
1139
            goto out_of_memory;
1140
        }
1141

1142 1143
        if (virAsprintf(&base, "%s/.libvirt", userdir) == -1) {
            VIR_FREE(userdir);
1144
            goto out_of_memory;
1145 1146
        }
        VIR_FREE(userdir);
1147 1148 1149

        if (virAsprintf(&qemu_driver->stateDir, "%s/qemu/run", base) == -1)
            goto out_of_memory;
1150 1151 1152 1153
        if (virAsprintf(&qemu_driver->libDir, "%s/qemu/lib", base) == -1)
            goto out_of_memory;
        if (virAsprintf(&qemu_driver->cacheDir, "%s/qemu/cache", base) == -1)
            goto out_of_memory;
1154 1155
    }

L
Laine Stump 已提交
1156
    if (virFileMakePath(qemu_driver->stateDir) != 0) {
1157
        char ebuf[1024];
1158
        VIR_ERROR(_("Failed to create state dir '%s': %s"),
1159
                  qemu_driver->stateDir, virStrerror(errno, ebuf, sizeof ebuf));
1160
        goto error;
1161
    }
L
Laine Stump 已提交
1162
    if (virFileMakePath(qemu_driver->libDir) != 0) {
1163
        char ebuf[1024];
1164
        VIR_ERROR(_("Failed to create lib dir '%s': %s"),
1165 1166 1167
                  qemu_driver->libDir, virStrerror(errno, ebuf, sizeof ebuf));
        goto error;
    }
L
Laine Stump 已提交
1168
    if (virFileMakePath(qemu_driver->cacheDir) != 0) {
1169
        char ebuf[1024];
1170
        VIR_ERROR(_("Failed to create cache dir '%s': %s"),
1171 1172 1173
                  qemu_driver->cacheDir, virStrerror(errno, ebuf, sizeof ebuf));
        goto error;
    }
1174 1175 1176 1177

    /* Configuration paths are either ~/.libvirt/qemu/... (session) or
     * /etc/libvirt/qemu/... (system).
     */
D
Daniel P. Berrange 已提交
1178
    if (snprintf (driverConf, sizeof(driverConf), "%s/qemu.conf", base) == -1)
1179
        goto out_of_memory;
D
Daniel P. Berrange 已提交
1180
    driverConf[sizeof(driverConf)-1] = '\0';
1181

1182
    if (virAsprintf(&qemu_driver->configDir, "%s/qemu", base) == -1)
1183 1184
        goto out_of_memory;

1185
    if (virAsprintf(&qemu_driver->autostartDir, "%s/qemu/autostart", base) == -1)
1186 1187
        goto out_of_memory;

1188
    VIR_FREE(base);
1189

1190 1191 1192 1193 1194 1195 1196
    rc = virCgroupForDriver("qemu", &qemu_driver->cgroup, privileged, 1);
    if (rc < 0) {
        char buf[1024];
        VIR_WARN("Unable to create cgroup for driver: %s",
                 virStrerror(-rc, buf, sizeof(buf)));
    }

1197 1198 1199 1200
    if (qemudLoadDriverConfig(qemu_driver, driverConf) < 0) {
        goto error;
    }

1201 1202
    if (qemudSecurityInit(qemu_driver) < 0)
        goto error;
D
Daniel P. Berrange 已提交
1203

1204
    if ((qemu_driver->caps = qemuCreateCapabilities(NULL,
1205
                                                    qemu_driver)) == NULL)
1206
        goto error;
1207

1208
    if ((qemu_driver->activePciHostdevs = pciDeviceListNew()) == NULL)
1209 1210
        goto error;

1211 1212
    if (privileged) {
        if (chown(qemu_driver->libDir, qemu_driver->user, qemu_driver->group) < 0) {
1213
            virReportSystemError(errno,
1214 1215 1216 1217 1218
                                 _("unable to set ownership of '%s' to user %d:%d"),
                                 qemu_driver->libDir, qemu_driver->user, qemu_driver->group);
            goto error;
        }
        if (chown(qemu_driver->cacheDir, qemu_driver->user, qemu_driver->group) < 0) {
1219
            virReportSystemError(errno,
1220 1221 1222 1223 1224 1225
                                 _("unable to set ownership of '%s' to %d:%d"),
                                 qemu_driver->cacheDir, qemu_driver->user, qemu_driver->group);
            goto error;
        }
    }

1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239
    /* If hugetlbfs is present, then we need to create a sub-directory within
     * it, since we can't assume the root mount point has permissions that
     * will let our spawned QEMU instances use it.
     *
     * NB the check for '/', since user may config "" to disable hugepages
     * even when mounted
     */
    if (qemu_driver->hugetlbfs_mount &&
        qemu_driver->hugetlbfs_mount[0] == '/') {
        char *mempath = NULL;
        if (virAsprintf(&mempath, "%s/libvirt/qemu", qemu_driver->hugetlbfs_mount) < 0)
            goto out_of_memory;

        if ((rc = virFileMakePath(mempath)) != 0) {
1240
            virReportSystemError(rc,
1241 1242 1243 1244 1245 1246
                                 _("unable to create hugepage path %s"), mempath);
            VIR_FREE(mempath);
            goto error;
        }
        if (qemu_driver->privileged &&
            chown(mempath, qemu_driver->user, qemu_driver->group) < 0) {
1247
            virReportSystemError(errno,
1248 1249 1250 1251 1252 1253 1254 1255 1256
                                 _("unable to set ownership on %s to %d:%d"),
                                 mempath, qemu_driver->user, qemu_driver->group);
            VIR_FREE(mempath);
            goto error;
        }

        qemu_driver->hugepage_path = mempath;
    }

1257
    /* Get all the running persistent or transient configs first */
1258
    if (virDomainLoadAllConfigs(qemu_driver->caps,
1259 1260 1261 1262 1263 1264 1265 1266 1267
                                &qemu_driver->domains,
                                qemu_driver->stateDir,
                                NULL,
                                1, NULL, NULL) < 0)
        goto error;

    qemuReconnectDomains(qemu_driver);

    /* Then inactive persistent configs */
1268
    if (virDomainLoadAllConfigs(qemu_driver->caps,
1269 1270
                                &qemu_driver->domains,
                                qemu_driver->configDir,
1271
                                qemu_driver->autostartDir,
1272
                                0, NULL, NULL) < 0)
1273
        goto error;
1274 1275
    qemuDriverUnlock(qemu_driver);

1276 1277
    qemudAutostartConfigs(qemu_driver);

1278

1279 1280
    return 0;

1281
out_of_memory:
1282
    virReportOOMError();
1283 1284 1285
error:
    if (qemu_driver)
        qemuDriverUnlock(qemu_driver);
1286
    VIR_FREE(base);
1287
    qemudShutdown();
1288 1289 1290
    return -1;
}

1291 1292 1293 1294
static void qemudNotifyLoadDomain(virDomainObjPtr vm, int newVM, void *opaque)
{
    struct qemud_driver *driver = opaque;

1295 1296 1297 1298 1299 1300 1301 1302
    if (newVM) {
        virDomainEventPtr event =
            virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_DEFINED,
                                     VIR_DOMAIN_EVENT_DEFINED_ADDED);
        if (event)
            qemuDomainEventQueue(driver, event);
    }
1303 1304
}

1305 1306 1307 1308 1309 1310 1311 1312
/**
 * qemudReload:
 *
 * Function to restart the QEmu daemon, it will recheck the configuration
 * files and update its state and the networking
 */
static int
qemudReload(void) {
1313 1314 1315
    if (!qemu_driver)
        return 0;

1316
    qemuDriverLock(qemu_driver);
1317
    virDomainLoadAllConfigs(qemu_driver->caps,
1318 1319
                            &qemu_driver->domains,
                            qemu_driver->configDir,
1320
                            qemu_driver->autostartDir,
1321
                            0, qemudNotifyLoadDomain, qemu_driver);
1322
    qemuDriverUnlock(qemu_driver);
1323

1324
    qemudAutostartConfigs(qemu_driver);
1325 1326

    return 0;
1327 1328
}

1329 1330 1331 1332 1333 1334 1335 1336 1337 1338
/**
 * qemudActive:
 *
 * Checks if the QEmu daemon is active, i.e. has an active domain or
 * an active network
 *
 * Returns 1 if active, 0 otherwise
 */
static int
qemudActive(void) {
1339
    int active = 0;
1340

1341 1342 1343
    if (!qemu_driver)
        return 0;

1344
    /* XXX having to iterate here is not great because it requires many locks */
1345
    qemuDriverLock(qemu_driver);
1346
    active = virDomainObjListNumOfDomains(&qemu_driver->domains, 1);
1347 1348
    qemuDriverUnlock(qemu_driver);
    return active;
1349 1350
}

1351 1352 1353 1354 1355 1356 1357
/**
 * qemudShutdown:
 *
 * Shutdown the QEmu daemon, it will stop all active domains and networks
 */
static int
qemudShutdown(void) {
1358
    int i;
1359

1360
    if (!qemu_driver)
1361
        return -1;
1362

1363
    qemuDriverLock(qemu_driver);
1364
    pciDeviceListFree(qemu_driver->activePciHostdevs);
1365 1366
    virCapabilitiesFree(qemu_driver->caps);

1367
    virDomainObjListDeinit(&qemu_driver->domains);
1368

1369
    VIR_FREE(qemu_driver->securityDriverName);
1370
    VIR_FREE(qemu_driver->logDir);
1371 1372
    VIR_FREE(qemu_driver->configDir);
    VIR_FREE(qemu_driver->autostartDir);
1373
    VIR_FREE(qemu_driver->stateDir);
1374 1375
    VIR_FREE(qemu_driver->libDir);
    VIR_FREE(qemu_driver->cacheDir);
1376
    VIR_FREE(qemu_driver->vncTLSx509certdir);
J
Jim Meyering 已提交
1377
    VIR_FREE(qemu_driver->vncListen);
1378
    VIR_FREE(qemu_driver->vncPassword);
1379
    VIR_FREE(qemu_driver->vncSASLdir);
1380
    VIR_FREE(qemu_driver->saveImageFormat);
1381 1382
    VIR_FREE(qemu_driver->hugetlbfs_mount);
    VIR_FREE(qemu_driver->hugepage_path);
D
Daniel P. Berrange 已提交
1383

1384 1385 1386 1387 1388 1389
    if (qemu_driver->cgroupDeviceACL) {
        for (i = 0 ; qemu_driver->cgroupDeviceACL[i] != NULL ; i++)
            VIR_FREE(qemu_driver->cgroupDeviceACL[i]);
        VIR_FREE(qemu_driver->cgroupDeviceACL);
    }

1390 1391
    /* Free domain callback list */
    virDomainEventCallbackListFree(qemu_driver->domainEventCallbacks);
1392 1393 1394 1395
    virDomainEventQueueFree(qemu_driver->domainEventQueue);

    if (qemu_driver->domainEventTimer != -1)
        virEventRemoveTimeout(qemu_driver->domainEventTimer);
1396

1397 1398 1399
    if (qemu_driver->brctl)
        brShutdown(qemu_driver->brctl);

1400 1401
    virCgroupFree(&qemu_driver->cgroup);

1402
    qemuDriverUnlock(qemu_driver);
1403
    virMutexDestroy(&qemu_driver->lock);
1404
    VIR_FREE(qemu_driver);
1405 1406

    return 0;
1407 1408
}

1409
typedef int qemuLogHandleOutput(virDomainObjPtr vm,
1410 1411
                                const char *output,
                                int fd);
1412 1413 1414 1415 1416

/*
 * Returns -1 for error, 0 on success
 */
static int
1417
qemudReadLogOutput(virDomainObjPtr vm,
1418 1419
                   int fd,
                   char *buf,
G
Guido Günther 已提交
1420
                   size_t buflen,
1421
                   qemuLogHandleOutput func,
1422 1423 1424
                   const char *what,
                   int timeout)
{
1425
    int retries = (timeout*10);
1426
    int got = 0;
1427 1428 1429
    buf[0] = '\0';

    while (retries) {
1430
        ssize_t func_ret, ret;
1431
        int isdead = 0;
G
Guido Günther 已提交
1432

1433
        func_ret = func(vm, buf, fd);
1434

1435 1436
        if (kill(vm->pid, 0) == -1 && errno == ESRCH)
            isdead = 1;
1437

1438 1439
        /* Any failures should be detected before we read the log, so we
         * always have something useful to report on failure. */
1440 1441
        ret = saferead(fd, buf+got, buflen-got-1);
        if (ret < 0) {
1442
            virReportSystemError(errno,
1443 1444 1445 1446 1447
                                 _("Failure while reading %s log output"),
                                 what);
            return -1;
        }

1448 1449 1450
        got += ret;
        buf[got] = '\0';
        if (got == buflen-1) {
1451
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
1452 1453
                            _("Out of space while reading %s log output: %s"),
                            what, buf);
1454 1455 1456 1457
            return -1;
        }

        if (isdead) {
1458
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
1459 1460
                            _("Process exited while reading %s log output: %s"),
                            what, buf);
1461 1462 1463
            return -1;
        }

1464 1465
        if (func_ret <= 0)
            return func_ret;
1466 1467 1468 1469

        usleep(100*1000);
        retries--;
    }
1470

1471
    qemuReportError(VIR_ERR_INTERNAL_ERROR,
1472 1473
                    _("Timed out while reading %s log output: %s"),
                    what, buf);
1474 1475 1476
    return -1;
}

1477

1478 1479 1480 1481 1482 1483 1484 1485
/*
 * Look at a chunk of data from the QEMU stdout logs and try to
 * find a TTY device, as indicated by a line like
 *
 * char device redirected to /dev/pts/3
 *
 * Returns -1 for error, 0 success, 1 continue reading
 */
1486
static int
1487
qemudExtractTTYPath(const char *haystack,
1488 1489
                    size_t *offset,
                    char **path)
1490
{
1491
    static const char needle[] = "char device redirected to";
1492
    char *tmp, *dev;
1493

1494
    VIR_FREE(*path);
1495
    /* First look for our magic string */
1496 1497 1498 1499 1500
    if (!(tmp = strstr(haystack + *offset, needle))) {
        return 1;
    }
    tmp += sizeof(needle);
    dev = tmp;
1501

1502 1503 1504 1505 1506
    /*
     * And look for first whitespace character and nul terminate
     * to mark end of the pty path
     */
    while (*tmp) {
1507
        if (c_isspace(*tmp)) {
1508 1509
            *path = strndup(dev, tmp-dev);
            if (*path == NULL) {
1510
                virReportOOMError();
1511 1512
                return -1;
            }
1513

1514
            /* ... now further update offset till we get EOL */
1515
            *offset = tmp - haystack;
1516 1517
            return 0;
        }
1518
        tmp++;
1519 1520 1521 1522 1523
    }

    /*
     * We found a path, but didn't find any whitespace,
     * so it must be still incomplete - we should at
1524 1525
     * least see a \n - indicate that we want to carry
     * on trying again
1526
     */
1527
    return 1;
1528 1529
}

1530
static int
1531
qemudFindCharDevicePTYsMonitor(virDomainObjPtr vm,
1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546
                               virHashTablePtr paths)
{
    int i;

#define LOOKUP_PTYS(array, arraylen, idprefix)                            \
    for (i = 0 ; i < (arraylen) ; i++) {                                  \
        virDomainChrDefPtr chr = (array)[i];                              \
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {                       \
            char id[16];                                                  \
                                                                          \
            if (snprintf(id, sizeof(id), idprefix "%i", i) >= sizeof(id)) \
                return -1;                                                \
                                                                          \
            const char *path = (const char *) virHashLookup(paths, id);   \
            if (path == NULL) {                                           \
1547 1548 1549
                if (chr->data.file.path == NULL) {                        \
                    /* neither the log output nor 'info chardev' had a */ \
                    /* pty path for this chardev, report an error */      \
1550 1551 1552
                    qemuReportError(VIR_ERR_INTERNAL_ERROR,               \
                                    _("no assigned pty for device %s"), id); \
                    return -1;                                            \
1553 1554 1555 1556 1557
                } else {                                                  \
                    /* 'info chardev' had no pty path for this chardev, */\
                    /* but the log output had, so we're fine */           \
                    continue;                                             \
                }                                                         \
1558 1559
            }                                                             \
                                                                          \
1560
            VIR_FREE(chr->data.file.path);                                \
1561
            chr->data.file.path = strdup(path);                           \
1562 1563
                                                                          \
            if (chr->data.file.path == NULL) {                            \
1564
                virReportOOMError();                                      \
1565 1566
                return -1;                                                \
            }                                                             \
1567 1568 1569 1570 1571 1572
        }                                                                 \
    }

    LOOKUP_PTYS(vm->def->serials,   vm->def->nserials,   "serial");
    LOOKUP_PTYS(vm->def->parallels, vm->def->nparallels, "parallel");
    LOOKUP_PTYS(vm->def->channels,  vm->def->nchannels,  "channel");
1573
#undef LOOKUP_PTYS
1574 1575 1576 1577

    return 0;
}

1578
static int
1579
qemudFindCharDevicePTYs(virDomainObjPtr vm,
1580 1581
                        const char *output,
                        int fd ATTRIBUTE_UNUSED)
1582
{
1583
    size_t offset = 0;
1584
    int ret, i;
1585 1586

    /* The order in which QEMU prints out the PTY paths is
1587 1588
       the order in which it procsses its serial and parallel
       device args. This code must match that ordering.... */
1589

1590
    /* first comes the serial devices */
1591 1592
    for (i = 0 ; i < vm->def->nserials ; i++) {
        virDomainChrDefPtr chr = vm->def->serials[i];
1593
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {
1594
            if ((ret = qemudExtractTTYPath(output, &offset,
1595
                                           &chr->data.file.path)) != 0)
1596
                return ret;
1597 1598 1599
        }
    }

1600
    /* then the parallel devices */
1601 1602
    for (i = 0 ; i < vm->def->nparallels ; i++) {
        virDomainChrDefPtr chr = vm->def->parallels[i];
1603
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {
1604
            if ((ret = qemudExtractTTYPath(output, &offset,
1605
                                           &chr->data.file.path)) != 0)
1606
                return ret;
1607 1608 1609
        }
    }

1610 1611 1612 1613
    /* then the channel devices */
    for (i = 0 ; i < vm->def->nchannels ; i++) {
        virDomainChrDefPtr chr = vm->def->channels[i];
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {
1614
            if ((ret = qemudExtractTTYPath(output, &offset,
1615 1616 1617 1618 1619
                                           &chr->data.file.path)) != 0)
                return ret;
        }
    }

1620
    return 0;
1621 1622
}

1623 1624 1625 1626 1627
static void qemudFreePtyPath(void *payload, const char *name ATTRIBUTE_UNUSED)
{
    VIR_FREE(payload);
}

1628
static int
1629
qemudWaitForMonitor(struct qemud_driver* driver,
1630
                    virDomainObjPtr vm, off_t pos)
1631
{
1632
    char buf[4096]; /* Plenty of space to get startup greeting */
1633
    int logfd;
1634
    int ret = -1;
1635

1636
    if ((logfd = qemudLogReadFD(driver->logDir, vm->def->name, pos))
1637
        < 0)
1638
        return -1;
1639

1640
    ret = qemudReadLogOutput(vm, logfd, buf, sizeof(buf),
1641
                             qemudFindCharDevicePTYs,
1642
                             "console", 30);
1643
    if (close(logfd) < 0) {
1644
        char ebuf[4096];
1645
        VIR_WARN(_("Unable to close logfile: %s"),
1646 1647
                 virStrerror(errno, ebuf, sizeof ebuf));
    }
1648

1649
    if (ret < 0)
1650
        return -1;
1651

1652
    VIR_DEBUG("Connect monitor to %p '%s'", vm, vm->def->name);
1653
    if (qemuConnectMonitor(driver, vm) < 0)
1654 1655
        return -1;

1656 1657 1658 1659 1660 1661
    /* Try to get the pty path mappings again via the monitor. This is much more
     * reliable if it's available.
     * Note that the monitor itself can be on a pty, so we still need to try the
     * log output method. */
    virHashTablePtr paths = virHashCreate(0);
    if (paths == NULL) {
1662
        virReportOOMError();
1663 1664 1665
        goto cleanup;
    }

1666
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
1667 1668
    qemuDomainObjPrivatePtr priv = vm->privateData;
    ret = qemuMonitorGetPtyPaths(priv->mon, paths);
1669
    qemuDomainObjExitMonitorWithDriver(driver, vm);
1670 1671 1672

    VIR_DEBUG("qemuMonitorGetPtyPaths returned %i", ret);
    if (ret == 0) {
1673
        ret = qemudFindCharDevicePTYsMonitor(vm, paths);
1674 1675 1676 1677 1678 1679 1680 1681
    }

cleanup:
    if (paths) {
        virHashFree(paths, qemudFreePtyPath);
    }

    return ret;
1682 1683
}

1684
static int
1685
qemuDetectVcpuPIDs(struct qemud_driver *driver,
1686 1687 1688
                   virDomainObjPtr vm) {
    pid_t *cpupids = NULL;
    int ncpupids;
1689
    qemuDomainObjPrivatePtr priv = vm->privateData;
1690

1691
    if (vm->def->virtType != VIR_DOMAIN_VIRT_KVM) {
1692 1693
        priv->nvcpupids = 1;
        if (VIR_ALLOC_N(priv->vcpupids, priv->nvcpupids) < 0) {
1694
            virReportOOMError();
1695 1696
            return -1;
        }
1697
        priv->vcpupids[0] = vm->pid;
1698 1699 1700
        return 0;
    }

1701
    /* What follows is now all KVM specific */
1702

1703
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
1704
    if ((ncpupids = qemuMonitorGetCPUInfo(priv->mon, &cpupids)) < 0) {
1705
        qemuDomainObjExitMonitorWithDriver(driver, vm);
1706
        return -1;
1707
    }
1708
    qemuDomainObjExitMonitorWithDriver(driver, vm);
1709

1710 1711 1712
    /* Treat failure to get VCPU<->PID mapping as non-fatal */
    if (ncpupids == 0)
        return 0;
1713

1714
    if (ncpupids != vm->def->vcpus) {
1715 1716 1717
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("got wrong number of vCPU pids from QEMU monitor. got %d, wanted %d"),
                        ncpupids, (int)vm->def->vcpus);
1718 1719 1720
        VIR_FREE(cpupids);
        return -1;
    }
1721

1722 1723
    priv->nvcpupids = ncpupids;
    priv->vcpupids = cpupids;
1724 1725 1726
    return 0;
}

1727
static int
1728 1729
qemudInitCpuAffinity(virDomainObjPtr vm)
{
1730
    int i, hostcpus, maxcpu = QEMUD_CPUMASK_LEN;
1731
    virNodeInfo nodeinfo;
1732 1733
    unsigned char *cpumap;
    int cpumaplen;
1734
    qemuDomainObjPrivatePtr priv = vm->privateData;
1735

1736
    if (nodeGetInfo(NULL, &nodeinfo) < 0)
1737 1738 1739 1740
        return -1;

    /* setaffinity fails if you set bits for CPUs which
     * aren't present, so we have to limit ourselves */
1741 1742 1743
    hostcpus = VIR_NODEINFO_MAXCPUS(nodeinfo);
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;
1744

1745 1746
    cpumaplen = VIR_CPU_MAPLEN(maxcpu);
    if (VIR_ALLOC_N(cpumap, cpumaplen) < 0) {
1747
        virReportOOMError();
1748 1749 1750
        return -1;
    }

D
Daniel P. Berrange 已提交
1751
    if (vm->def->cpumask) {
1752 1753 1754
        /* XXX why don't we keep 'cpumask' in the libvirt cpumap
         * format to start with ?!?! */
        for (i = 0 ; i < maxcpu && i < vm->def->cpumasklen ; i++)
D
Daniel P. Berrange 已提交
1755
            if (vm->def->cpumask[i])
1756
                VIR_USE_CPU(cpumap, i);
D
Daniel P. Berrange 已提交
1757
    } else {
1758 1759 1760 1761
        /* You may think this is redundant, but we can't assume libvirtd
         * itself is running on all pCPUs, so we need to explicitly set
         * the spawned QEMU instance to all pCPUs if no map is given in
         * its config file */
D
Daniel P. Berrange 已提交
1762
        for (i = 0 ; i < maxcpu ; i++)
1763
            VIR_USE_CPU(cpumap, i);
D
Daniel P. Berrange 已提交
1764
    }
1765

1766 1767
    /* The XML config only gives a per-VM affinity, so we apply
     * the same mapping to all vCPUs */
1768 1769
    for (i = 0 ; i < priv->nvcpupids ; i++) {
        if (virProcessInfoSetAffinity(priv->vcpupids[i],
1770 1771
                                      cpumap, cpumaplen, maxcpu) < 0) {
            VIR_FREE(cpumap);
1772 1773 1774
            return -1;
        }
    }
1775
    VIR_FREE(cpumap);
1776 1777 1778 1779 1780

    return 0;
}


1781
static int
1782 1783 1784 1785
qemuInitPasswords(virConnectPtr conn,
                  struct qemud_driver *driver,
                  virDomainObjPtr vm,
                  unsigned long long qemuCmdFlags) {
1786
    int ret = 0;
1787
    qemuDomainObjPrivatePtr priv = vm->privateData;
1788

1789 1790 1791
    if ((vm->def->ngraphics == 1) &&
        vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
        (vm->def->graphics[0]->data.vnc.passwd || driver->vncPassword)) {
1792

1793
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
1794
        ret = qemuMonitorSetVNCPassword(priv->mon,
1795 1796 1797
                                        vm->def->graphics[0]->data.vnc.passwd ?
                                        vm->def->graphics[0]->data.vnc.passwd :
                                        driver->vncPassword);
1798
        qemuDomainObjExitMonitorWithDriver(driver, vm);
1799 1800
    }

1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823
    if (ret < 0)
        goto cleanup;

    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        int i;

        for (i = 0 ; i < vm->def->ndisks ; i++) {
            char *secret;
            size_t secretLen;

            if (!vm->def->disks[i]->encryption ||
                !vm->def->disks[i]->src)
                continue;

            if (getVolumeQcowPassphrase(conn,
                                        vm->def->disks[i],
                                        &secret, &secretLen) < 0)
                goto cleanup;

            qemuDomainObjEnterMonitorWithDriver(driver, vm);
            ret = qemuMonitorSetDrivePassphrase(priv->mon,
                                                vm->def->disks[i]->info.alias,
                                                secret);
1824
            VIR_FREE(secret);
1825 1826 1827 1828 1829 1830 1831
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            if (ret < 0)
                goto cleanup;
        }
    }

cleanup:
1832
    return ret;
1833 1834 1835
}


1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064
#define QEMU_PCI_VENDOR_INTEL     0x8086
#define QEMU_PCI_VENDOR_LSI_LOGIC 0x1000
#define QEMU_PCI_VENDOR_REDHAT    0x1af4
#define QEMU_PCI_VENDOR_CIRRUS    0x1013
#define QEMU_PCI_VENDOR_REALTEK   0x10ec
#define QEMU_PCI_VENDOR_AMD       0x1022
#define QEMU_PCI_VENDOR_ENSONIQ   0x1274
#define QEMU_PCI_VENDOR_VMWARE    0x15ad
#define QEMU_PCI_VENDOR_QEMU      0x1234

#define QEMU_PCI_PRODUCT_DISK_VIRTIO 0x1001

#define QEMU_PCI_PRODUCT_NIC_NE2K     0x8029
#define QEMU_PCI_PRODUCT_NIC_PCNET    0x2000
#define QEMU_PCI_PRODUCT_NIC_RTL8139  0x8139
#define QEMU_PCI_PRODUCT_NIC_E1000    0x100E
#define QEMU_PCI_PRODUCT_NIC_VIRTIO   0x1000

#define QEMU_PCI_PRODUCT_VGA_CIRRUS 0x00b8
#define QEMU_PCI_PRODUCT_VGA_VMWARE 0x0405
#define QEMU_PCI_PRODUCT_VGA_STDVGA 0x1111

#define QEMU_PCI_PRODUCT_AUDIO_AC97    0x2415
#define QEMU_PCI_PRODUCT_AUDIO_ES1370  0x5000

#define QEMU_PCI_PRODUCT_CONTROLLER_PIIX 0x7010
#define QEMU_PCI_PRODUCT_CONTROLLER_LSI  0x0012

#define QEMU_PCI_PRODUCT_WATCHDOG_I63000ESB 0x25ab

static int
qemuAssignNextPCIAddress(virDomainDeviceInfo *info,
                         int vendor,
                         int product,
                         qemuMonitorPCIAddress *addrs,
                         int naddrs)
{
    int found = 0;
    int i;

    VIR_DEBUG("Look for %x:%x out of %d", vendor, product, naddrs);

    for (i = 0 ; (i < naddrs) && !found; i++) {
        VIR_DEBUG("Maybe %x:%x", addrs[i].vendor, addrs[i].product);
        if (addrs[i].vendor == vendor &&
            addrs[i].product == product) {
            VIR_DEBUG("Match %d", i);
            found = 1;
            break;
        }
    }
    if (!found) {
        return -1;
    }

    /* Blank it out so this device isn't matched again */
    addrs[i].vendor = 0;
    addrs[i].product = 0;

    if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE)
        info->type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;

    if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
        info->addr.pci.domain = addrs[i].addr.domain;
        info->addr.pci.bus = addrs[i].addr.bus;
        info->addr.pci.slot = addrs[i].addr.slot;
        info->addr.pci.function = addrs[i].addr.function;
    }

    return 0;
}

static int
qemuGetPCIDiskVendorProduct(virDomainDiskDefPtr def,
                            unsigned *vendor,
                            unsigned *product)
{
    switch (def->bus) {
    case VIR_DOMAIN_DISK_BUS_VIRTIO:
        *vendor = QEMU_PCI_VENDOR_REDHAT;
        *product = QEMU_PCI_PRODUCT_DISK_VIRTIO;
        break;

    default:
        return -1;
    }

    return 0;
}

static int
qemuGetPCINetVendorProduct(virDomainNetDefPtr def,
                            unsigned *vendor,
                            unsigned *product)
{
    if (!def->model)
        return -1;

    if (STREQ(def->model, "ne2k_pci")) {
        *vendor = QEMU_PCI_VENDOR_REALTEK;
        *product = QEMU_PCI_PRODUCT_NIC_NE2K;
    } else if (STREQ(def->model, "pcnet")) {
        *vendor = QEMU_PCI_VENDOR_AMD;
        *product = QEMU_PCI_PRODUCT_NIC_PCNET;
    } else if (STREQ(def->model, "rtl8139")) {
        *vendor = QEMU_PCI_VENDOR_REALTEK;
        *product = QEMU_PCI_PRODUCT_NIC_RTL8139;
    } else if (STREQ(def->model, "e1000")) {
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_NIC_E1000;
    } else if (STREQ(def->model, "virtio")) {
        *vendor = QEMU_PCI_VENDOR_REDHAT;
        *product = QEMU_PCI_PRODUCT_NIC_VIRTIO;
    } else {
        VIR_INFO("Unexpected NIC model %s, cannot get PCI address",
                 def->model);
        return -1;
    }
    return 0;
}

static int
qemuGetPCIControllerVendorProduct(virDomainControllerDefPtr def,
                                  unsigned *vendor,
                                  unsigned *product)
{
    switch (def->type) {
    case VIR_DOMAIN_CONTROLLER_TYPE_SCSI:
        *vendor = QEMU_PCI_VENDOR_LSI_LOGIC;
        *product = QEMU_PCI_PRODUCT_CONTROLLER_LSI;
        break;

    case VIR_DOMAIN_CONTROLLER_TYPE_FDC:
        /* XXX we could put in the ISA bridge address, but
           that's not technically the FDC's address */
        return -1;

    case VIR_DOMAIN_CONTROLLER_TYPE_IDE:
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_CONTROLLER_PIIX;
        break;

    default:
        VIR_INFO("Unexpected controller type %s, cannot get PCI address",
                 virDomainControllerTypeToString(def->type));
        return -1;
    }

    return 0;
}

static int
qemuGetPCIVideoVendorProduct(virDomainVideoDefPtr def,
                             unsigned *vendor,
                             unsigned *product)
{
    switch (def->type) {
    case VIR_DOMAIN_VIDEO_TYPE_CIRRUS:
        *vendor = QEMU_PCI_VENDOR_CIRRUS;
        *product = QEMU_PCI_PRODUCT_VGA_CIRRUS;
        break;

    case VIR_DOMAIN_VIDEO_TYPE_VGA:
        *vendor = QEMU_PCI_VENDOR_QEMU;
        *product = QEMU_PCI_PRODUCT_VGA_STDVGA;
        break;

    case VIR_DOMAIN_VIDEO_TYPE_VMVGA:
        *vendor = QEMU_PCI_VENDOR_VMWARE;
        *product = QEMU_PCI_PRODUCT_VGA_VMWARE;
        break;

    default:
        return -1;
    }
    return 0;
}

static int
qemuGetPCISoundVendorProduct(virDomainSoundDefPtr def,
                             unsigned *vendor,
                             unsigned *product)
{
    switch (def->model) {
    case VIR_DOMAIN_SOUND_MODEL_ES1370:
        *vendor = QEMU_PCI_VENDOR_ENSONIQ;
        *product = QEMU_PCI_PRODUCT_AUDIO_ES1370;
        break;

    case VIR_DOMAIN_SOUND_MODEL_AC97:
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_AUDIO_AC97;
        break;

    default:
        return -1;
    }

    return 0;
}

static int
qemuGetPCIWatchdogVendorProduct(virDomainWatchdogDefPtr def,
                                unsigned *vendor,
                                unsigned *product)
{
    switch (def->model) {
    case VIR_DOMAIN_WATCHDOG_MODEL_I6300ESB:
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_WATCHDOG_I63000ESB;
        break;

    default:
        return -1;
    }

    return 0;
}


/*
 * This entire method assumes that PCI devices in 'info pci'
 * match ordering of devices specified on the command line
 * wrt to devices of matching vendor+product
 *
 * XXXX this might not be a valid assumption if we assign
 * some static addrs on CLI. Have to check that...
 */
static int
2065
qemuDetectPCIAddresses(virDomainObjPtr vm,
2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076 2077 2078 2079 2080 2081 2082
                       qemuMonitorPCIAddress *addrs,
                       int naddrs)
{
    unsigned int vendor = 0, product = 0;
    int i;

    /* XXX should all these vendor/product IDs be kept in the
     * actual device data structure instead ?
     */

    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (qemuGetPCIDiskVendorProduct(vm->def->disks[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->disks[i]->info),
                                     vendor, product,
                                     addrs, naddrs) < 0) {
2083 2084 2085
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("cannot find PCI address for VirtIO disk %s"),
                            vm->def->disks[i]->dst);
2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->nnets ; i++) {
        if (qemuGetPCINetVendorProduct(vm->def->nets[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->nets[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
2097 2098 2099
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("cannot find PCI address for %s NIC"),
                            vm->def->nets[i]->model);
2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
        if (qemuGetPCIControllerVendorProduct(vm->def->controllers[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->controllers[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
2111 2112 2113
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("cannot find PCI address for controller %s"),
                            virDomainControllerTypeToString(vm->def->controllers[i]->type));
2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->nvideos ; i++) {
        if (qemuGetPCIVideoVendorProduct(vm->def->videos[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->videos[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
2125 2126 2127
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("cannot find PCI address for video adapter %s"),
                            virDomainVideoTypeToString(vm->def->videos[i]->type));
2128 2129 2130 2131 2132 2133 2134 2135 2136 2137 2138
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->nsounds ; i++) {
        if (qemuGetPCISoundVendorProduct(vm->def->sounds[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->sounds[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
2139 2140 2141
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("cannot find PCI address for sound adapter %s"),
                            virDomainSoundModelTypeToString(vm->def->sounds[i]->model));
2142 2143 2144 2145 2146 2147 2148 2149 2150 2151
            return -1;
        }
    }


    if (vm->def->watchdog &&
        qemuGetPCIWatchdogVendorProduct(vm->def->watchdog, &vendor, &product) == 0) {
        if (qemuAssignNextPCIAddress(&(vm->def->watchdog->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
2152 2153 2154
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("cannot find PCI address for watchdog %s"),
                            virDomainWatchdogModelTypeToString(vm->def->watchdog->model));
2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186
            return -1;
        }
    }

    /* XXX console (virtio) */


    /* ... and now things we don't have in our xml */

    /* XXX USB controller ? */

    /* XXXX virtio balloon ? */

    /* XXX what about other PCI devices (ie bridges) */

    return 0;
}

static int
qemuInitPCIAddresses(struct qemud_driver *driver,
                     virDomainObjPtr vm)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    int naddrs;
    int ret;
    qemuMonitorPCIAddress *addrs = NULL;

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    naddrs = qemuMonitorGetAllPCIAddresses(priv->mon,
                                           &addrs);
    qemuDomainObjExitMonitorWithDriver(driver, vm);

2187
    ret = qemuDetectPCIAddresses(vm, addrs, naddrs);
2188 2189 2190 2191 2192 2193

    VIR_FREE(addrs);

    return ret;
}

2194
static int qemudNextFreeVNCPort(struct qemud_driver *driver ATTRIBUTE_UNUSED) {
2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229
    int i;

    for (i = 5900 ; i < 6000 ; i++) {
        int fd;
        int reuse = 1;
        struct sockaddr_in addr;
        addr.sin_family = AF_INET;
        addr.sin_port = htons(i);
        addr.sin_addr.s_addr = htonl(INADDR_ANY);
        fd = socket(PF_INET, SOCK_STREAM, 0);
        if (fd < 0)
            return -1;

        if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (void*)&reuse, sizeof(reuse)) < 0) {
            close(fd);
            break;
        }

        if (bind(fd, (struct sockaddr*)&addr, sizeof(addr)) == 0) {
            /* Not in use, lets grab it */
            close(fd);
            return i;
        }
        close(fd);

        if (errno == EADDRINUSE) {
            /* In use, try next */
            continue;
        }
        /* Some other bad failure, get out.. */
        break;
    }
    return -1;
}

2230 2231 2232 2233 2234 2235 2236 2237 2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267

static int
qemuAssignPCIAddresses(virDomainDefPtr def)
{
    int ret = -1;
    unsigned long long qemuCmdFlags = 0;
    qemuDomainPCIAddressSetPtr addrs = NULL;
    struct stat sb;

    if (stat(def->emulator, &sb) < 0) {
        virReportSystemError(errno,
                             _("Cannot find QEMU binary %s"),
                             def->emulator);
        goto cleanup;
    }

    if (qemudExtractVersionInfo(def->emulator,
                                NULL,
                                &qemuCmdFlags) < 0)
        goto cleanup;

    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (!(addrs = qemuDomainPCIAddressSetCreate(def)))
            goto cleanup;

        if (qemuAssignDevicePCISlots(def, addrs) < 0)
            goto cleanup;
    }

    ret = 0;

cleanup:
    qemuDomainPCIAddressSetFree(addrs);

    return ret;
}


2268
static pciDeviceList *
2269
qemuGetPciHostDeviceList(virDomainDefPtr def)
2270 2271
{
    pciDeviceList *list;
2272 2273
    int i;

2274
    if (!(list = pciDeviceListNew()))
2275
        return NULL;
2276 2277 2278 2279 2280 2281 2282 2283 2284 2285

    for (i = 0 ; i < def->nhostdevs ; i++) {
        virDomainHostdevDefPtr hostdev = def->hostdevs[i];
        pciDevice *dev;

        if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
            continue;
        if (hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI)
            continue;

2286
        dev = pciGetDevice(hostdev->source.subsys.u.pci.domain,
2287 2288 2289
                           hostdev->source.subsys.u.pci.bus,
                           hostdev->source.subsys.u.pci.slot,
                           hostdev->source.subsys.u.pci.function);
2290
        if (!dev) {
2291
            pciDeviceListFree(list);
2292 2293
            return NULL;
        }
2294

2295 2296 2297
        if (pciDeviceListAdd(list, dev) < 0) {
            pciFreeDevice(dev);
            pciDeviceListFree(list);
2298
            return NULL;
2299 2300
        }

2301
        pciDeviceSetManaged(dev, hostdev->managed);
2302 2303
    }

2304 2305 2306 2307
    return list;
}

static int
2308 2309 2310 2311
qemuUpdateActivePciHostdevs(struct qemud_driver *driver,
                            virDomainDefPtr def)
{
    pciDeviceList *pcidevs;
2312
    int i;
2313
    int ret = -1;
2314 2315 2316 2317

    if (!def->nhostdevs)
        return 0;

2318
    if (!(pcidevs = qemuGetPciHostDeviceList(def)))
2319 2320
        return -1;

2321 2322
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2323 2324 2325
        pciDeviceListSteal(pcidevs, dev);
        if (pciDeviceListAdd(driver->activePciHostdevs, dev) < 0) {
            pciFreeDevice(dev);
2326
            goto cleanup;
2327 2328 2329
        }
    }

2330 2331 2332
    ret = 0;

cleanup:
2333
    pciDeviceListFree(pcidevs);
2334 2335 2336
    return ret;
}

2337

2338
static int
2339 2340
qemuPrepareHostPCIDevices(struct qemud_driver *driver,
                          virDomainDefPtr def)
2341 2342 2343
{
    pciDeviceList *pcidevs;
    int i;
2344
    int ret = -1;
2345

2346
    if (!(pcidevs = qemuGetPciHostDeviceList(def)))
2347 2348
        return -1;

2349
    /* We have to use 3 loops here. *All* devices must
2350 2351
     * be detached before we reset any of them, because
     * in some cases you have to reset the whole PCI,
2352 2353
     * which impacts all devices on it. Also, all devices
     * must be reset before being marked as active.
2354 2355 2356 2357 2358 2359 2360
     */

    /* XXX validate that non-managed device isn't in use, eg
     * by checking that device is either un-bound, or bound
     * to pci-stub.ko
     */

2361 2362
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2363
        if (!pciDeviceIsAssignable(dev, !driver->relaxedACS))
2364 2365
            goto cleanup;

2366
        if (pciDeviceGetManaged(dev) &&
2367
            pciDettachDevice(dev) < 0)
2368 2369
            goto cleanup;
    }
2370 2371 2372

    /* Now that all the PCI hostdevs have be dettached, we can safely
     * reset them */
2373 2374
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2375
        if (pciResetDevice(dev, driver->activePciHostdevs) < 0)
2376 2377
            goto cleanup;
    }
2378

2379
    /* Now mark all the devices as active */
2380 2381
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2382 2383 2384
        pciDeviceListSteal(pcidevs, dev);
        if (pciDeviceListAdd(driver->activePciHostdevs, dev) < 0) {
            pciFreeDevice(dev);
2385 2386
            goto cleanup;
        }
2387 2388
    }

2389
    ret = 0;
2390

2391
cleanup:
2392
    pciDeviceListFree(pcidevs);
2393
    return ret;
2394 2395
}

2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406

static int
qemuPrepareHostUSBDevices(struct qemud_driver *driver ATTRIBUTE_UNUSED,
                          virDomainDefPtr def)
{
    int i;
    for (i = 0 ; i < def->nhostdevs ; i++) {
        virDomainHostdevDefPtr hostdev = def->hostdevs[i];

        if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
            continue;
2407
        if (hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB)
2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433 2434 2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445
            continue;

        /* Resolve a vendor/product to bus/device */
        if (hostdev->source.subsys.u.usb.vendor) {
            usbDevice *usb
                = usbFindDevice(hostdev->source.subsys.u.usb.vendor,
                                hostdev->source.subsys.u.usb.product);

            if (!usb)
                return -1;

            hostdev->source.subsys.u.usb.bus = usbDeviceGetBus(usb);
            hostdev->source.subsys.u.usb.device = usbDeviceGetDevno(usb);

            usbFreeDevice(usb);
        }
    }

    return 0;
}

static int
qemuPrepareHostDevices(struct qemud_driver *driver,
                       virDomainDefPtr def)
{
    if (!def->nhostdevs)
        return 0;

    if (qemuPrepareHostPCIDevices(driver, def) < 0)
        return -1;

    if (qemuPrepareHostUSBDevices(driver, def) < 0)
        return -1;

    return 0;
}


2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456
static void
qemudReattachManagedDevice(pciDevice *dev)
{
    int retries = 100;

    if (pciDeviceGetManaged(dev)) {
        while (pciWaitForDeviceCleanup(dev, "kvm_assigned_device")
               && retries) {
            usleep(100*1000);
            retries--;
        }
2457
        if (pciReAttachDevice(dev) < 0) {
2458 2459 2460 2461 2462 2463 2464 2465
            virErrorPtr err = virGetLastError();
            VIR_ERROR(_("Failed to re-attach PCI device: %s"),
                      err ? err->message : "");
            virResetError(err);
        }
    }
}

2466
static void
2467
qemuDomainReAttachHostDevices(struct qemud_driver *driver,
2468
                              virDomainDefPtr def)
2469
{
2470
    pciDeviceList *pcidevs;
2471 2472
    int i;

2473 2474
    if (!def->nhostdevs)
        return;
2475

2476
    if (!(pcidevs = qemuGetPciHostDeviceList(def))) {
2477
        virErrorPtr err = virGetLastError();
2478
        VIR_ERROR(_("Failed to allocate pciDeviceList: %s"),
2479 2480 2481
                  err ? err->message : "");
        virResetError(err);
        return;
2482 2483
    }

2484 2485
    /* Again 3 loops; mark all devices as inactive before reset
     * them and reset all the devices before re-attach */
2486

2487 2488
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2489
        pciDeviceListDel(driver->activePciHostdevs, dev);
2490
    }
2491

2492 2493
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2494
        if (pciResetDevice(dev, driver->activePciHostdevs) < 0) {
2495
            virErrorPtr err = virGetLastError();
2496
            VIR_ERROR(_("Failed to reset PCI device: %s"),
2497 2498 2499
                      err ? err->message : "");
            virResetError(err);
        }
2500
    }
2501

2502 2503
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2504
        qemudReattachManagedDevice(dev);
2505
    }
2506

2507
    pciDeviceListFree(pcidevs);
2508 2509
}

2510 2511 2512 2513 2514 2515 2516 2517 2518 2519
static const char *const defaultDeviceACL[] = {
    "/dev/null", "/dev/full", "/dev/zero",
    "/dev/random", "/dev/urandom",
    "/dev/ptmx", "/dev/kvm", "/dev/kqemu",
    "/dev/rtc", "/dev/hpet", "/dev/net/tun",
    NULL,
};
#define DEVICE_PTY_MAJOR 136
#define DEVICE_SND_MAJOR 116

2520
static int qemuSetupCgroup(struct qemud_driver *driver,
2521 2522 2523 2524
                           virDomainObjPtr vm)
{
    virCgroupPtr cgroup = NULL;
    int rc;
2525
    unsigned int i;
2526 2527 2528 2529
    const char *const *deviceACL =
        driver->cgroupDeviceACL ?
        (const char *const *)driver->cgroupDeviceACL :
        defaultDeviceACL;
2530 2531 2532 2533 2534 2535

    if (driver->cgroup == NULL)
        return 0; /* Not supported, so claim success */

    rc = virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 1);
    if (rc != 0) {
2536
        virReportSystemError(-rc,
2537 2538 2539 2540 2541
                             _("Unable to create cgroup for %s"),
                             vm->def->name);
        goto cleanup;
    }

2542 2543
    if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
        rc = virCgroupDenyAllDevices(cgroup);
2544
        if (rc != 0) {
2545 2546 2547 2548 2549
            if (rc == -EPERM) {
                VIR_WARN0("Group devices ACL is not accessible, disabling whitelisting");
                goto done;
            }

2550
            virReportSystemError(-rc,
2551
                                 _("Unable to deny all devices for %s"), vm->def->name);
2552 2553 2554
            goto cleanup;
        }

2555 2556 2557 2558 2559 2560 2561 2562
        for (i = 0; i < vm->def->ndisks ; i++) {
            if (vm->def->disks[i]->type != VIR_DOMAIN_DISK_TYPE_BLOCK ||
                vm->def->disks[i]->src == NULL)
                continue;

            rc = virCgroupAllowDevicePath(cgroup,
                                          vm->def->disks[i]->src);
            if (rc != 0) {
2563
                virReportSystemError(-rc,
2564 2565 2566 2567 2568
                                     _("Unable to allow device %s for %s"),
                                     vm->def->disks[i]->src, vm->def->name);
                goto cleanup;
            }
        }
2569

2570
        rc = virCgroupAllowDeviceMajor(cgroup, 'c', DEVICE_PTY_MAJOR);
2571
        if (rc != 0) {
2572
            virReportSystemError(-rc, "%s",
2573
                                 _("unable to allow /dev/pts/ devices"));
2574 2575 2576
            goto cleanup;
        }

2577 2578 2579
        if (vm->def->nsounds) {
            rc = virCgroupAllowDeviceMajor(cgroup, 'c', DEVICE_SND_MAJOR);
            if (rc != 0) {
2580
                virReportSystemError(-rc, "%s",
2581 2582 2583 2584 2585 2586 2587 2588 2589 2590
                                     _("unable to allow /dev/snd/ devices"));
                goto cleanup;
            }
        }

        for (i = 0; deviceACL[i] != NULL ; i++) {
            rc = virCgroupAllowDevicePath(cgroup,
                                          deviceACL[i]);
            if (rc < 0 &&
                rc != -ENOENT) {
2591
                virReportSystemError(-rc,
2592 2593 2594 2595
                                     _("unable to allow device %s"),
                                     deviceACL[i]);
                goto cleanup;
            }
2596 2597 2598 2599
        }
    }

done:
2600 2601 2602 2603 2604 2605 2606 2607 2608 2609 2610 2611
    virCgroupFree(&cgroup);
    return 0;

cleanup:
    if (cgroup) {
        virCgroupRemove(cgroup);
        virCgroupFree(&cgroup);
    }
    return -1;
}


2612
static int qemuRemoveCgroup(struct qemud_driver *driver,
2613 2614
                            virDomainObjPtr vm,
                            int quiet)
2615 2616 2617 2618 2619 2620 2621 2622 2623
{
    virCgroupPtr cgroup;
    int rc;

    if (driver->cgroup == NULL)
        return 0; /* Not supported, so claim success */

    rc = virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0);
    if (rc != 0) {
2624
        if (!quiet)
2625 2626 2627
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("Unable to find cgroup for %s\n"),
                            vm->def->name);
2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639 2640 2641 2642 2643 2644 2645 2646 2647
        return rc;
    }

    rc = virCgroupRemove(cgroup);
    virCgroupFree(&cgroup);
    return rc;
}

static int qemuAddToCgroup(struct qemud_driver *driver,
                           virDomainDefPtr def)
{
    virCgroupPtr cgroup = NULL;
    int ret = -1;
    int rc;

    if (driver->cgroup == NULL)
        return 0; /* Not supported, so claim success */

    rc = virCgroupForDomain(driver->cgroup, def->name, &cgroup, 0);
    if (rc != 0) {
2648
        virReportSystemError(-rc,
2649 2650 2651 2652 2653 2654 2655
                             _("unable to find cgroup for domain %s"),
                             def->name);
        goto cleanup;
    }

    rc = virCgroupAddTask(cgroup, getpid());
    if (rc != 0) {
2656
        virReportSystemError(-rc,
2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2671 2672 2673
                             _("unable to add domain %s task %d to cgroup"),
                             def->name, getpid());
        goto cleanup;
    }

    ret = 0;

cleanup:
    virCgroupFree(&cgroup);
    return ret;
}


struct qemudHookData {
    virConnectPtr conn;
    virDomainObjPtr vm;
    struct qemud_driver *driver;
2674 2675 2676
};

static int qemudSecurityHook(void *data) {
2677 2678 2679 2680
    struct qemudHookData *h = data;

    if (qemuAddToCgroup(h->driver, h->vm->def) < 0)
        return -1;
2681

2682 2683
    if (h->driver->securityDriver &&
        h->driver->securityDriver->domainSetSecurityProcessLabel &&
2684
        h->driver->securityDriver->domainSetSecurityProcessLabel(h->driver->securityDriver, h->vm) < 0)
2685 2686 2687
        return -1;

    return 0;
2688 2689
}

2690
static int
2691
qemuPrepareMonitorChr(struct qemud_driver *driver,
2692
                      virDomainChrDefPtr monConfig,
2693 2694
                      const char *vm)
{
2695
    monConfig->targetType = VIR_DOMAIN_CHR_TARGET_TYPE_MONITOR;
2696

2697 2698
    monConfig->type = VIR_DOMAIN_CHR_TYPE_UNIX;
    monConfig->data.nix.listen = 1;
2699

D
Daniel P. Berrange 已提交
2700
    if (!(monConfig->info.alias = strdup("monitor"))) {
2701
        virReportOOMError();
D
Daniel P. Berrange 已提交
2702 2703 2704
        return -1;
    }

2705
    if (virAsprintf(&monConfig->data.nix.path, "%s/%s.monitor",
2706
                    driver->libDir, vm) < 0) {
2707
        virReportOOMError();
2708 2709 2710 2711 2712 2713
        return -1;
    }

    return 0;
}

2714 2715
static int qemudStartVMDaemon(virConnectPtr conn,
                              struct qemud_driver *driver,
2716
                              virDomainObjPtr vm,
2717 2718
                              const char *migrateFrom,
                              int stdin_fd) {
2719
    const char **argv = NULL, **tmp;
2720
    const char **progenv = NULL;
2721
    int i, ret;
2722
    struct stat sb;
2723 2724
    int *tapfds = NULL;
    int ntapfds = 0;
2725
    unsigned long long qemuCmdFlags;
2726
    fd_set keepfd;
2727
    const char *emulator;
G
Guido Günther 已提交
2728
    pid_t child;
2729
    int pos = -1;
2730
    char ebuf[1024];
2731
    char *pidfile = NULL;
2732
    int logfile;
2733
    qemuDomainObjPrivatePtr priv = vm->privateData;
2734

2735
    struct qemudHookData hookData;
2736 2737 2738 2739
    hookData.conn = conn;
    hookData.vm = vm;
    hookData.driver = driver;

2740
    FD_ZERO(&keepfd);
2741

2742 2743
    DEBUG0("Beginning VM startup process");

D
Daniel P. Berrange 已提交
2744
    if (virDomainObjIsActive(vm)) {
2745 2746
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("VM is already active"));
2747 2748 2749
        return -1;
    }

2750 2751 2752 2753 2754
    /* Must be run before security labelling */
    DEBUG0("Preparing host devices");
    if (qemuPrepareHostDevices(driver, vm->def) < 0)
        goto cleanup;

2755 2756
    /* If you are using a SecurityDriver with dynamic labelling,
       then generate a security label for isolation */
2757
    DEBUG0("Generating domain security label (if required)");
2758
    if (driver->securityDriver &&
2759
        driver->securityDriver->domainGenSecurityLabel &&
2760
        driver->securityDriver->domainGenSecurityLabel(vm) < 0)
2761 2762
        return -1;

2763
    DEBUG0("Generating setting domain security labels (if required)");
2764 2765
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityAllLabel &&
2766
        driver->securityDriver->domainSetSecurityAllLabel(vm) < 0)
2767 2768
        goto cleanup;

2769 2770 2771
    /* Ensure no historical cgroup for this VM is lying around bogus
     * settings */
    DEBUG0("Ensuring no historical cgroup is lying around");
2772
    qemuRemoveCgroup(driver, vm, 1);
2773

2774 2775 2776
    if ((vm->def->ngraphics == 1) &&
        vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
        vm->def->graphics[0]->data.vnc.autoport) {
2777
        DEBUG0("Determining VNC port");
2778
        int port = qemudNextFreeVNCPort(driver);
2779
        if (port < 0) {
2780 2781
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            "%s", _("Unable to find an unused VNC port"));
2782
            goto cleanup;
2783
        }
2784
        vm->def->graphics[0]->data.vnc.port = port;
2785
    }
2786

L
Laine Stump 已提交
2787
    if (virFileMakePath(driver->logDir) != 0) {
2788
        virReportSystemError(errno,
2789 2790
                             _("cannot create log directory %s"),
                             driver->logDir);
2791
        goto cleanup;
2792 2793
    }

2794
    DEBUG0("Creating domain log file");
2795
    if ((logfile = qemudLogFD(driver, vm->def->name)) < 0)
2796
        goto cleanup;
2797

2798 2799
    emulator = vm->def->emulator;

2800 2801 2802 2803
    /* Make sure the binary we are about to try exec'ing exists.
     * Technically we could catch the exec() failure, but that's
     * in a sub-process so its hard to feed back a useful error
     */
2804
    if (stat(emulator, &sb) < 0) {
2805
        virReportSystemError(errno,
2806 2807
                             _("Cannot find QEMU binary %s"),
                             emulator);
2808
        goto cleanup;
2809 2810
    }

2811
    DEBUG0("Determing emulator version");
2812
    if (qemudExtractVersionInfo(emulator,
2813
                                NULL,
2814
                                &qemuCmdFlags) < 0)
2815
        goto cleanup;
2816

2817
    DEBUG0("Setting up domain cgroup (if required)");
2818
    if (qemuSetupCgroup(driver, vm) < 0)
2819 2820
        goto cleanup;

2821
    if (VIR_ALLOC(priv->monConfig) < 0) {
2822
        virReportOOMError();
2823 2824 2825
        goto cleanup;
    }

2826
    DEBUG0("Preparing monitor state");
2827
    if (qemuPrepareMonitorChr(driver, priv->monConfig, vm->def->name) < 0)
2828
        goto cleanup;
2829

D
Daniel P. Berrange 已提交
2830 2831 2832
#if HAVE_YAJL
    if (qemuCmdFlags & QEMUD_CMD_FLAG_MONITOR_JSON)
        priv->monJSON = 1;
2833
    else
D
Daniel P. Berrange 已提交
2834
#endif
2835
        priv->monJSON = 0;
D
Daniel P. Berrange 已提交
2836

D
Daniel P. Berrange 已提交
2837
    if ((ret = virFileDeletePid(driver->stateDir, vm->def->name)) != 0) {
2838
        virReportSystemError(ret,
D
Daniel P. Berrange 已提交
2839 2840 2841 2842 2843
                             _("Cannot remove stale PID file for %s"),
                             vm->def->name);
        goto cleanup;
    }

2844
    if (!(pidfile = virFilePid(driver->stateDir, vm->def->name))) {
2845
        virReportSystemError(errno,
2846 2847 2848
                             "%s", _("Failed to build pidfile path."));
        goto cleanup;
    }
D
Daniel P. Berrange 已提交
2849

2850
    /*
M
Matthew Booth 已提交
2851
     * Normally PCI addresses are assigned in the virDomainCreate
2852 2853 2854 2855 2856
     * or virDomainDefine methods. We might still need to assign
     * some here to cope with the question of upgrades. Regardless
     * we also need to populate the PCi address set cache for later
     * use in hotplug
     */
2857
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
2858
        DEBUG0("Assigning domain PCI addresses");
2859
        /* Populate cache with current addresses */
2860 2861 2862 2863 2864 2865 2866
        if (priv->pciaddrs) {
            qemuDomainPCIAddressSetFree(priv->pciaddrs);
            priv->pciaddrs = NULL;
        }
        if (!(priv->pciaddrs = qemuDomainPCIAddressSetCreate(vm->def)))
            goto cleanup;

2867 2868

        /* Assign any remaining addresses */
2869 2870
        if (qemuAssignDevicePCISlots(vm->def, priv->pciaddrs) < 0)
            goto cleanup;
2871 2872 2873 2874

        priv->persistentAddrs = 1;
    } else {
        priv->persistentAddrs = 0;
2875 2876
    }

2877
    DEBUG0("Building emulator command line");
2878
    vm->def->id = driver->nextvmid++;
2879
    if (qemudBuildCommandLine(conn, driver, vm->def, priv->monConfig,
D
Daniel P. Berrange 已提交
2880
                              priv->monJSON, qemuCmdFlags, &argv, &progenv,
2881 2882
                              &tapfds, &ntapfds, migrateFrom) < 0)
        goto cleanup;
2883

2884 2885
    tmp = progenv;
    while (*tmp) {
2886
        if (safewrite(logfile, *tmp, strlen(*tmp)) < 0)
2887
            VIR_WARN(_("Unable to write envv to logfile: %s"),
2888
                     virStrerror(errno, ebuf, sizeof ebuf));
2889
        if (safewrite(logfile, " ", 1) < 0)
2890
            VIR_WARN(_("Unable to write envv to logfile: %s"),
2891
                     virStrerror(errno, ebuf, sizeof ebuf));
2892 2893
        tmp++;
    }
2894 2895
    tmp = argv;
    while (*tmp) {
2896
        if (safewrite(logfile, *tmp, strlen(*tmp)) < 0)
2897
            VIR_WARN(_("Unable to write argv to logfile: %s"),
2898
                     virStrerror(errno, ebuf, sizeof ebuf));
2899
        if (safewrite(logfile, " ", 1) < 0)
2900
            VIR_WARN(_("Unable to write argv to logfile: %s"),
2901
                     virStrerror(errno, ebuf, sizeof ebuf));
2902 2903
        tmp++;
    }
2904
    if (safewrite(logfile, "\n", 1) < 0)
2905
        VIR_WARN(_("Unable to write argv to logfile: %s"),
2906
                 virStrerror(errno, ebuf, sizeof ebuf));
2907

2908
    if ((pos = lseek(logfile, 0, SEEK_END)) < 0)
2909
        VIR_WARN(_("Unable to seek to end of logfile: %s"),
2910
                 virStrerror(errno, ebuf, sizeof ebuf));
2911

2912 2913 2914
    for (i = 0 ; i < ntapfds ; i++)
        FD_SET(tapfds[i], &keepfd);

2915
    ret = virExecDaemonize(argv, progenv, &keepfd, &child,
2916
                           stdin_fd, &logfile, &logfile,
2917
                           VIR_EXEC_NONBLOCK | VIR_EXEC_CLEAR_CAPS,
2918 2919 2920
                           qemudSecurityHook, &hookData,
                           pidfile);
    VIR_FREE(pidfile);
G
Guido Günther 已提交
2921 2922 2923

    /* wait for qemu process to to show up */
    if (ret == 0) {
2924
        if (virFileReadPid(driver->stateDir, vm->def->name, &vm->pid)) {
2925 2926
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("Domain %s didn't show up\n"), vm->def->name);
2927
            ret = -1;
G
Guido Günther 已提交
2928
        }
2929 2930 2931 2932 2933 2934 2935 2936 2937 2938 2939
    } else if (ret == -2) {
        /* The virExec process that launches the daemon failed. Pending on
         * when it failed (we can't determine for sure), there may be
         * extra info in the domain log (if the hook failed for example).
         *
         * Pretend like things succeeded, and let 'WaitForMonitor' report
         * the log contents for us.
         */
        vm->pid = child;
        ret = 0;
    }
2940 2941

    vm->state = migrateFrom ? VIR_DOMAIN_PAUSED : VIR_DOMAIN_RUNNING;
2942

2943
    for (i = 0 ; argv[i] ; i++)
2944 2945
        VIR_FREE(argv[i]);
    VIR_FREE(argv);
2946

2947 2948 2949 2950
    for (i = 0 ; progenv[i] ; i++)
        VIR_FREE(progenv[i]);
    VIR_FREE(progenv);

2951 2952 2953
    if (tapfds) {
        for (i = 0 ; i < ntapfds ; i++) {
            close(tapfds[i]);
2954
        }
2955
        VIR_FREE(tapfds);
2956 2957
    }

2958
    if (ret == -1) /* The VM failed to start */
2959 2960
        goto cleanup;

2961
    DEBUG0("Waiting for monitor to show up");
2962
    if (qemudWaitForMonitor(driver, vm, pos) < 0)
2963 2964
        goto abort;

2965
    DEBUG0("Detecting VCPU PIDs");
2966
    if (qemuDetectVcpuPIDs(driver, vm) < 0)
2967 2968
        goto abort;

2969
    DEBUG0("Setting CPU affinity");
2970
    if (qemudInitCpuAffinity(vm) < 0)
2971 2972
        goto abort;

2973
    DEBUG0("Setting any required VM passwords");
2974
    if (qemuInitPasswords(conn, driver, vm, qemuCmdFlags) < 0)
2975 2976
        goto abort;

D
Daniel P. Berrange 已提交
2977 2978 2979
    /* If we have -device, then addresses are assigned explicitly.
     * If not, then we have to detect dynamic ones here */
    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
2980
        DEBUG0("Determining domain device PCI addresses");
D
Daniel P. Berrange 已提交
2981 2982 2983
        if (qemuInitPCIAddresses(driver, vm) < 0)
            goto abort;
    }
2984

2985
    DEBUG0("Setting initial memory amount");
2986
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
2987
    if (qemuMonitorSetBalloon(priv->mon, vm->def->memory) < 0) {
2988
        qemuDomainObjExitMonitorWithDriver(driver, vm);
2989
        goto abort;
2990
    }
2991 2992

    if (migrateFrom == NULL) {
2993
        DEBUG0("Starting domain CPUs");
2994 2995 2996
        /* Allow the CPUS to start executing */
        if (qemuMonitorStartCPUs(priv->mon, conn) < 0) {
            if (virGetLastError() == NULL)
2997 2998
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                "%s", _("resume operation failed"));
2999 3000 3001 3002
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            goto abort;
        }
    }
3003
    qemuDomainObjExitMonitorWithDriver(driver, vm);
3004

3005

3006
    DEBUG0("Writing domain status to disk");
3007
    if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
3008
        goto abort;
3009

3010 3011 3012
    if (logfile != -1)
        close(logfile);

3013
    return 0;
3014 3015

cleanup:
3016 3017 3018
    /* We jump here if we failed to start the VM for any reason
     * XXX investigate if we can kill this block and safely call
     * qemudShutdownVMDaemon even though no PID is running */
3019
    qemuDomainReAttachHostDevices(driver, vm->def);
3020

3021 3022
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityAllLabel)
3023
        driver->securityDriver->domainRestoreSecurityAllLabel(vm);
3024 3025
    if (driver->securityDriver &&
        driver->securityDriver->domainReleaseSecurityLabel)
3026
        driver->securityDriver->domainReleaseSecurityLabel(vm);
3027
    qemuRemoveCgroup(driver, vm, 1);
3028 3029 3030 3031
    if ((vm->def->ngraphics == 1) &&
        vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
        vm->def->graphics[0]->data.vnc.autoport)
        vm->def->graphics[0]->data.vnc.port = -1;
3032 3033
    if (logfile != -1)
        close(logfile);
3034 3035
    vm->def->id = -1;
    return -1;
3036 3037 3038 3039

abort:
    /* We jump here if we failed to initialize the now running VM
     * killing it off and pretend we never started it */
3040
    qemudShutdownVMDaemon(driver, vm);
3041 3042 3043 3044 3045

    if (logfile != -1)
        close(logfile);

    return -1;
3046 3047 3048
}


3049
static void qemudShutdownVMDaemon(struct qemud_driver *driver,
3050
                                  virDomainObjPtr vm) {
D
Daniel P. Berrange 已提交
3051
    int ret;
3052
    int retries = 0;
3053
    qemuDomainObjPrivatePtr priv = vm->privateData;
3054
    virErrorPtr orig_err;
3055 3056
    virDomainDefPtr def;
    int i;
D
Daniel P. Berrange 已提交
3057

D
Daniel P. Berrange 已提交
3058
    if (!virDomainObjIsActive(vm))
3059
        return;
3060

3061
    VIR_DEBUG("Shutting down VM '%s'", vm->def->name);
3062

3063 3064 3065 3066
    /* This method is routinely used in clean up paths. Disable error
     * reporting so we don't squash a legit error. */
    orig_err = virSaveLastError();

3067
    if (driver->macFilter) {
3068
        def = vm->def;
3069 3070 3071 3072
        for (i = 0 ; i < def->nnets ; i++) {
            virDomainNetDefPtr net = def->nets[i];
            if (net->ifname == NULL)
                continue;
3073
            if ((errno = networkDisallowMacOnPort(driver, net->ifname,
3074
                                                  net->mac))) {
3075
                virReportSystemError(errno,
3076 3077 3078 3079 3080 3081
             _("failed to remove ebtables rule to allow MAC address on  '%s'"),
                                     net->ifname);
            }
        }
    }

G
Guido Günther 已提交
3082 3083
    if (virKillProcess(vm->pid, 0) == 0 &&
        virKillProcess(vm->pid, SIGTERM) < 0)
3084
        virReportSystemError(errno,
3085 3086
                             _("Failed to send SIGTERM to %s (%d)"),
                             vm->def->name, vm->pid);
3087

3088 3089 3090
    if (priv->mon &&
        qemuMonitorClose(priv->mon) == 0) {
        virDomainObjUnref(vm);
3091
        priv->mon = NULL;
3092
    }
3093

3094 3095 3096 3097 3098
    if (priv->monConfig) {
        if (priv->monConfig->type == VIR_DOMAIN_CHR_TYPE_UNIX)
            unlink(priv->monConfig->data.nix.path);
        virDomainChrDefFree(priv->monConfig);
        priv->monConfig = NULL;
3099 3100
    }

G
Guido Günther 已提交
3101 3102
    /* shut it off for sure */
    virKillProcess(vm->pid, SIGKILL);
3103

3104
    /* Reset Security Labels */
3105
    if (driver->securityDriver &&
3106
        driver->securityDriver->domainRestoreSecurityAllLabel)
3107
        driver->securityDriver->domainRestoreSecurityAllLabel(vm);
3108 3109
    if (driver->securityDriver &&
        driver->securityDriver->domainReleaseSecurityLabel)
3110
        driver->securityDriver->domainReleaseSecurityLabel(vm);
3111

3112 3113 3114 3115 3116 3117 3118
    /* Clear out dynamically assigned labels */
    if (vm->def->seclabel.type == VIR_DOMAIN_SECLABEL_DYNAMIC) {
        VIR_FREE(vm->def->seclabel.model);
        VIR_FREE(vm->def->seclabel.label);
        VIR_FREE(vm->def->seclabel.imagelabel);
    }

D
Daniel P. Berrange 已提交
3119
    virDomainDefClearDeviceAliases(vm->def);
3120 3121 3122 3123 3124
    if (!priv->persistentAddrs) {
        virDomainDefClearPCIAddresses(vm->def);
        qemuDomainPCIAddressSetFree(priv->pciaddrs);
        priv->pciaddrs = NULL;
    }
3125

3126
    qemuDomainReAttachHostDevices(driver, vm->def);
3127

S
Stefan Berger 已提交
3128 3129 3130 3131 3132 3133 3134 3135 3136 3137 3138
#if WITH_MACVTAP
    def = vm->def;
    for (i = 0; i < def->nnets; i++) {
        virDomainNetDefPtr net = def->nets[i];
        if (net->type == VIR_DOMAIN_NET_TYPE_DIRECT) {
            if (net->ifname)
                delMacvtap(net->ifname);
        }
    }
#endif

3139
retry:
3140
    if ((ret = qemuRemoveCgroup(driver, vm, 0)) < 0) {
3141 3142 3143 3144 3145 3146 3147 3148
        if (ret == -EBUSY && (retries++ < 5)) {
            usleep(200*1000);
            goto retry;
        }
        VIR_WARN("Failed to remove cgroup for %s",
                 vm->def->name);
    }

3149
    qemudRemoveDomainStatus(driver, vm);
D
Daniel P. Berrange 已提交
3150

3151
    vm->pid = -1;
3152
    vm->def->id = -1;
3153
    vm->state = VIR_DOMAIN_SHUTOFF;
3154 3155
    VIR_FREE(priv->vcpupids);
    priv->nvcpupids = 0;
3156 3157

    if (vm->newDef) {
3158
        virDomainDefFree(vm->def);
3159
        vm->def = vm->newDef;
3160
        vm->def->id = -1;
3161 3162
        vm->newDef = NULL;
    }
3163 3164 3165 3166 3167

    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
3168 3169 3170
}


3171
static virDrvOpenStatus qemudOpen(virConnectPtr conn,
3172
                                  virConnectAuthPtr auth ATTRIBUTE_UNUSED,
3173
                                  int flags ATTRIBUTE_UNUSED) {
3174
    if (conn->uri == NULL) {
3175 3176 3177
        if (qemu_driver == NULL)
            return VIR_DRV_OPEN_DECLINED;

3178
        conn->uri = xmlParseURI(qemu_driver->privileged ?
3179 3180
                                "qemu:///system" :
                                "qemu:///session");
3181
        if (!conn->uri) {
3182
            virReportOOMError();
3183 3184
            return VIR_DRV_OPEN_ERROR;
        }
3185 3186 3187 3188 3189 3190 3191 3192 3193 3194
    } else {
        /* If URI isn't 'qemu' its definitely not for us */
        if (conn->uri->scheme == NULL ||
            STRNEQ(conn->uri->scheme, "qemu"))
            return VIR_DRV_OPEN_DECLINED;

        /* Allow remote driver to deal with URIs with hostname server */
        if (conn->uri->server != NULL)
            return VIR_DRV_OPEN_DECLINED;

3195
        if (qemu_driver == NULL) {
3196 3197
            qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                            _("qemu state driver is not active"));
3198 3199 3200
            return VIR_DRV_OPEN_ERROR;
        }

3201
        if (conn->uri->path == NULL) {
3202 3203 3204 3205 3206
            qemuReportError(VIR_ERR_INTERNAL_ERROR,
                            _("no QEMU URI path given, try %s"),
                            qemu_driver->privileged
                            ? "qemu:///system"
                            : "qemu:///session");
3207 3208 3209
                return VIR_DRV_OPEN_ERROR;
        }

3210
        if (qemu_driver->privileged) {
3211 3212
            if (STRNEQ (conn->uri->path, "/system") &&
                STRNEQ (conn->uri->path, "/session")) {
3213 3214 3215
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                _("unexpected QEMU URI path '%s', try qemu:///system"),
                                conn->uri->path);
3216 3217 3218 3219
                return VIR_DRV_OPEN_ERROR;
            }
        } else {
            if (STRNEQ (conn->uri->path, "/session")) {
3220 3221 3222
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                _("unexpected QEMU URI path '%s', try qemu:///session"),
                                conn->uri->path);
3223 3224 3225
                return VIR_DRV_OPEN_ERROR;
            }
        }
3226 3227 3228 3229 3230 3231 3232
    }
    conn->privateData = qemu_driver;

    return VIR_DRV_OPEN_SUCCESS;
}

static int qemudClose(virConnectPtr conn) {
3233
    struct qemud_driver *driver = conn->privateData;
3234 3235

    /* Get rid of callbacks registered for this conn */
3236
    qemuDriverLock(driver);
3237
    virDomainEventCallbackListRemoveConn(conn, driver->domainEventCallbacks);
3238
    qemuDriverUnlock(driver);
3239 3240 3241 3242 3243 3244

    conn->privateData = NULL;

    return 0;
}

D
Daniel Veillard 已提交
3245 3246 3247 3248 3249
/* Which features are supported by this driver? */
static int
qemudSupportsFeature (virConnectPtr conn ATTRIBUTE_UNUSED, int feature)
{
    switch (feature) {
3250 3251 3252 3253 3254
    case VIR_DRV_FEATURE_MIGRATION_V2:
    case VIR_DRV_FEATURE_MIGRATION_P2P:
        return 1;
    default:
        return 0;
D
Daniel Veillard 已提交
3255 3256 3257
    }
}

3258
static const char *qemudGetType(virConnectPtr conn ATTRIBUTE_UNUSED) {
3259
    return "QEMU";
3260 3261
}

3262

3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275
static int qemuIsSecure(virConnectPtr conn ATTRIBUTE_UNUSED)
{
    /* Trivially secure, since always inside the daemon */
    return 1;
}

static int qemuIsEncrypted(virConnectPtr conn ATTRIBUTE_UNUSED)
{
    /* Not encrypted, but remote driver takes care of that */
    return 0;
}


3276 3277 3278 3279
static int kvmGetMaxVCPUs(void) {
    int maxvcpus = 1;

    int r, fd;
3280

3281 3282
    fd = open(KVM_DEVICE, O_RDONLY);
    if (fd < 0) {
3283
        virReportSystemError(errno, _("Unable to open %s"), KVM_DEVICE);
3284
        return -1;
3285 3286 3287 3288 3289 3290 3291 3292 3293 3294 3295
    }

    r = ioctl(fd, KVM_CHECK_EXTENSION, KVM_CAP_NR_VCPUS);
    if (r > 0)
        maxvcpus = r;

    close(fd);
    return maxvcpus;
}


3296
static int qemudGetMaxVCPUs(virConnectPtr conn ATTRIBUTE_UNUSED, const char *type) {
3297 3298 3299
    if (!type)
        return 16;

3300
    if (STRCASEEQ(type, "qemu"))
3301 3302
        return 16;

3303
    if (STRCASEEQ(type, "kvm"))
3304
        return kvmGetMaxVCPUs();
3305

3306
    if (STRCASEEQ(type, "kqemu"))
3307
        return 1;
3308

3309 3310
    qemuReportError(VIR_ERR_INVALID_ARG,
                    _("unknown type '%s'"), type);
3311 3312 3313
    return -1;
}

3314

3315
static char *qemudGetCapabilities(virConnectPtr conn) {
3316
    struct qemud_driver *driver = conn->privateData;
3317
    virCapsPtr caps = NULL;
3318
    char *xml = NULL;
3319

3320
    qemuDriverLock(driver);
3321

3322
    if ((caps = qemuCreateCapabilities(qemu_driver->caps,
3323
                                       qemu_driver)) == NULL) {
3324 3325 3326
        virCapabilitiesFree(caps);
        goto cleanup;
    }
3327

3328
    virCapabilitiesFree(qemu_driver->caps);
3329 3330 3331
    qemu_driver->caps = caps;

    if ((xml = virCapabilitiesFormatXML(driver->caps)) == NULL)
3332
        virReportOOMError();
3333 3334

cleanup:
3335
    qemuDriverUnlock(driver);
3336

3337
    return xml;
3338 3339 3340
}


3341
static int qemudGetProcessInfo(unsigned long long *cpuTime, int *lastCpu, int pid, int tid) {
D
Daniel P. Berrange 已提交
3342 3343
    char proc[PATH_MAX];
    FILE *pidinfo;
3344
    unsigned long long usertime, systime;
3345 3346
    int cpu;
    int ret;
D
Daniel P. Berrange 已提交
3347

3348 3349 3350 3351 3352 3353
    if (tid)
        ret = snprintf(proc, sizeof(proc), "/proc/%d/task/%d/stat", pid, tid);
    else
        ret = snprintf(proc, sizeof(proc), "/proc/%d/stat", pid);
    if (ret >= (int)sizeof(proc)) {
        errno = E2BIG;
D
Daniel P. Berrange 已提交
3354 3355 3356 3357
        return -1;
    }

    if (!(pidinfo = fopen(proc, "r"))) {
3358
        /*printf("cannot read pid info");*/
D
Daniel P. Berrange 已提交
3359
        /* VM probably shut down, so fake 0 */
3360 3361 3362 3363
        if (cpuTime)
            *cpuTime = 0;
        if (lastCpu)
            *lastCpu = 0;
D
Daniel P. Berrange 已提交
3364 3365 3366
        return 0;
    }

3367 3368 3369 3370 3371 3372 3373 3374 3375 3376
    /* See 'man proc' for information about what all these fields are. We're
     * only interested in a very few of them */
    if (fscanf(pidinfo,
               /* pid -> stime */
               "%*d %*s %*c %*d %*d %*d %*d %*d %*u %*u %*u %*u %*u %llu %llu"
               /* cutime -> endcode */
               "%*d %*d %*d %*d %*d %*u %*u %*d %*u %*u %*u %*u"
               /* startstack -> processor */
               "%*u %*u %*u %*u %*u %*u %*u %*u %*u %*u %*d %d",
               &usertime, &systime, &cpu) != 3) {
3377
        fclose(pidinfo);
3378 3379
        VIR_WARN0("cannot parse process status data");
        errno = -EINVAL;
D
Daniel P. Berrange 已提交
3380 3381 3382 3383 3384 3385 3386 3387
        return -1;
    }

    /* We got jiffies
     * We want nanoseconds
     * _SC_CLK_TCK is jiffies per second
     * So calulate thus....
     */
3388 3389 3390 3391 3392
    if (cpuTime)
        *cpuTime = 1000ull * 1000ull * 1000ull * (usertime + systime) / (unsigned long long)sysconf(_SC_CLK_TCK);
    if (lastCpu)
        *lastCpu = cpu;

D
Daniel P. Berrange 已提交
3393

3394 3395
    VIR_DEBUG("Got status for %d/%d user=%llu sys=%llu cpu=%d",
              pid, tid, usertime, systime, cpu);
D
Daniel P. Berrange 已提交
3396 3397 3398 3399 3400 3401 3402

    fclose(pidinfo);

    return 0;
}


3403
static virDomainPtr qemudDomainLookupByID(virConnectPtr conn,
3404
                                          int id) {
3405 3406 3407 3408
    struct qemud_driver *driver = conn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;

3409
    qemuDriverLock(driver);
3410
    vm  = virDomainFindByID(&driver->domains, id);
3411
    qemuDriverUnlock(driver);
3412 3413

    if (!vm) {
3414 3415
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching id %d"), id);
3416
        goto cleanup;
3417 3418
    }

3419
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
3420
    if (dom) dom->id = vm->def->id;
3421 3422

cleanup:
3423 3424
    if (vm)
        virDomainObjUnlock(vm);
3425 3426
    return dom;
}
3427

3428
static virDomainPtr qemudDomainLookupByUUID(virConnectPtr conn,
3429
                                            const unsigned char *uuid) {
3430 3431 3432
    struct qemud_driver *driver = conn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;
3433

3434
    qemuDriverLock(driver);
3435
    vm = virDomainFindByUUID(&driver->domains, uuid);
3436 3437
    qemuDriverUnlock(driver);

3438
    if (!vm) {
3439 3440
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(uuid, uuidstr);
3441 3442
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
3443
        goto cleanup;
3444 3445
    }

3446
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
3447
    if (dom) dom->id = vm->def->id;
3448 3449

cleanup:
3450 3451
    if (vm)
        virDomainObjUnlock(vm);
3452 3453
    return dom;
}
3454

3455
static virDomainPtr qemudDomainLookupByName(virConnectPtr conn,
3456
                                            const char *name) {
3457 3458 3459
    struct qemud_driver *driver = conn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;
3460

3461
    qemuDriverLock(driver);
3462
    vm = virDomainFindByName(&driver->domains, name);
3463 3464
    qemuDriverUnlock(driver);

3465
    if (!vm) {
3466 3467
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching name '%s'"), name);
3468
        goto cleanup;
3469 3470
    }

3471
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
3472
    if (dom) dom->id = vm->def->id;
3473 3474

cleanup:
3475 3476
    if (vm)
        virDomainObjUnlock(vm);
3477 3478 3479
    return dom;
}

3480 3481 3482 3483 3484 3485 3486 3487 3488 3489 3490

static int qemuDomainIsActive(virDomainPtr dom)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr obj;
    int ret = -1;

    qemuDriverLock(driver);
    obj = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!obj) {
3491
        qemuReportError(VIR_ERR_NO_DOMAIN, NULL);
3492 3493 3494 3495 3496 3497 3498 3499 3500 3501 3502 3503 3504 3505 3506 3507 3508 3509 3510 3511
        goto cleanup;
    }
    ret = virDomainObjIsActive(obj);

cleanup:
    if (obj)
        virDomainObjUnlock(obj);
    return ret;
}

static int qemuDomainIsPersistent(virDomainPtr dom)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr obj;
    int ret = -1;

    qemuDriverLock(driver);
    obj = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!obj) {
3512
        qemuReportError(VIR_ERR_NO_DOMAIN, NULL);
3513 3514 3515 3516 3517 3518 3519 3520 3521 3522 3523
        goto cleanup;
    }
    ret = obj->persistent;

cleanup:
    if (obj)
        virDomainObjUnlock(obj);
    return ret;
}


3524
static int qemudGetVersion(virConnectPtr conn, unsigned long *version) {
3525 3526 3527
    struct qemud_driver *driver = conn->privateData;
    int ret = -1;

3528
    qemuDriverLock(driver);
3529
    if (qemudExtractVersion(driver) < 0)
3530
        goto cleanup;
3531

3532
    *version = qemu_driver->qemuVersion;
3533 3534 3535
    ret = 0;

cleanup:
3536
    qemuDriverUnlock(driver);
3537
    return ret;
D
Daniel P. Berrange 已提交
3538 3539
}

3540
static int qemudListDomains(virConnectPtr conn, int *ids, int nids) {
3541
    struct qemud_driver *driver = conn->privateData;
3542
    int n;
3543

3544
    qemuDriverLock(driver);
3545
    n = virDomainObjListGetActiveIDs(&driver->domains, ids, nids);
3546
    qemuDriverUnlock(driver);
3547

3548
    return n;
D
Daniel P. Berrange 已提交
3549
}
3550

3551
static int qemudNumDomains(virConnectPtr conn) {
3552
    struct qemud_driver *driver = conn->privateData;
3553
    int n;
3554

3555
    qemuDriverLock(driver);
3556
    n = virDomainObjListNumOfDomains(&driver->domains, 1);
3557
    qemuDriverUnlock(driver);
3558

3559
    return n;
D
Daniel P. Berrange 已提交
3560
}
3561

3562
static virDomainPtr qemudDomainCreate(virConnectPtr conn, const char *xml,
3563
                                      unsigned int flags ATTRIBUTE_UNUSED) {
3564
    struct qemud_driver *driver = conn->privateData;
3565
    virDomainDefPtr def;
3566
    virDomainObjPtr vm = NULL;
3567
    virDomainPtr dom = NULL;
3568
    virDomainEventPtr event = NULL;
D
Daniel P. Berrange 已提交
3569

3570
    qemuDriverLock(driver);
3571
    if (!(def = virDomainDefParseString(driver->caps, xml,
3572
                                        VIR_DOMAIN_XML_INACTIVE)))
3573
        goto cleanup;
3574

3575
    if (virSecurityDriverVerify(def) < 0)
3576 3577
        goto cleanup;

3578 3579
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
3580

3581 3582 3583 3584 3585 3586
    if (qemudCanonicalizeMachine(driver, def) < 0)
        goto cleanup;

    if (qemuAssignPCIAddresses(def) < 0)
        goto cleanup;

3587
    if (!(vm = virDomainAssignDef(driver->caps,
3588
                                  &driver->domains,
3589 3590 3591 3592
                                  def)))
        goto cleanup;

    def = NULL;
D
Daniel P. Berrange 已提交
3593

3594 3595 3596
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup; /* XXXX free the 'vm' we created ? */

3597
    if (qemudStartVMDaemon(conn, driver, vm, NULL, -1) < 0) {
3598 3599 3600
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains,
                                    vm);
3601
        vm = NULL;
3602
        goto endjob;
D
Daniel P. Berrange 已提交
3603
    }
3604 3605 3606 3607

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_BOOTED);
D
Daniel P. Berrange 已提交
3608

3609
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
3610
    if (dom) dom->id = vm->def->id;
3611

3612
endjob:
3613 3614 3615
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3616

3617 3618
cleanup:
    virDomainDefFree(def);
3619 3620
    if (vm)
        virDomainObjUnlock(vm);
3621 3622
    if (event)
        qemuDomainEventQueue(driver, event);
3623
    qemuDriverUnlock(driver);
3624
    return dom;
D
Daniel P. Berrange 已提交
3625 3626 3627
}


3628
static int qemudDomainSuspend(virDomainPtr dom) {
3629 3630 3631
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3632
    virDomainEventPtr event = NULL;
3633
    qemuDomainObjPrivatePtr priv;
3634

3635
    qemuDriverLock(driver);
3636
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3637

D
Daniel P. Berrange 已提交
3638
    if (!vm) {
3639 3640
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3641 3642
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
3643
        goto cleanup;
D
Daniel P. Berrange 已提交
3644
    }
D
Daniel P. Berrange 已提交
3645
    if (!virDomainObjIsActive(vm)) {
3646 3647
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
3648
        goto cleanup;
D
Daniel P. Berrange 已提交
3649
    }
3650 3651 3652 3653 3654 3655 3656 3657 3658 3659 3660 3661 3662 3663 3664 3665 3666 3667

    priv = vm->privateData;

    if (priv->jobActive == QEMU_JOB_MIGRATION) {
        if (vm->state != VIR_DOMAIN_PAUSED) {
            VIR_DEBUG("Requesting domain pause on %s",
                      vm->def->name);
            priv->jobSignals |= QEMU_JOB_SIGNAL_SUSPEND;
        }
        ret = 0;
        goto cleanup;
    } else {
        if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
            goto cleanup;

        if (!virDomainObjIsActive(vm)) {
            qemuReportError(VIR_ERR_OPERATION_INVALID,
                            "%s", _("domain is not running"));
3668
            goto endjob;
3669
        }
3670 3671 3672 3673 3674 3675 3676 3677 3678 3679 3680 3681 3682 3683 3684 3685
        if (vm->state != VIR_DOMAIN_PAUSED) {
            int rc;

            qemuDomainObjEnterMonitorWithDriver(driver, vm);
            rc = qemuMonitorStopCPUs(priv->mon);
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            if (rc < 0)
                goto endjob;
            vm->state = VIR_DOMAIN_PAUSED;
            event = virDomainEventNewFromObj(vm,
                                             VIR_DOMAIN_EVENT_SUSPENDED,
                                             VIR_DOMAIN_EVENT_SUSPENDED_PAUSED);
        }
        if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
            goto endjob;
        ret = 0;
D
Daniel P. Berrange 已提交
3686
    }
3687

3688
endjob:
3689 3690
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3691

3692
cleanup:
3693 3694
    if (vm)
        virDomainObjUnlock(vm);
3695

3696
    if (event)
3697
        qemuDomainEventQueue(driver, event);
3698
    qemuDriverUnlock(driver);
3699
    return ret;
D
Daniel P. Berrange 已提交
3700 3701 3702
}


3703
static int qemudDomainResume(virDomainPtr dom) {
3704 3705 3706
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3707
    virDomainEventPtr event = NULL;
3708

3709
    qemuDriverLock(driver);
3710
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3711

D
Daniel P. Berrange 已提交
3712
    if (!vm) {
3713 3714
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3715 3716
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
3717
        goto cleanup;
D
Daniel P. Berrange 已提交
3718
    }
3719 3720 3721 3722

    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3723
    if (!virDomainObjIsActive(vm)) {
3724 3725
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
3726
        goto endjob;
D
Daniel P. Berrange 已提交
3727
    }
3728
    if (vm->state == VIR_DOMAIN_PAUSED) {
3729
        qemuDomainObjPrivatePtr priv = vm->privateData;
3730
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
3731
        if (qemuMonitorStartCPUs(priv->mon, dom->conn) < 0) {
3732
            qemuDomainObjExitMonitorWithDriver(driver, vm);
3733
            if (virGetLastError() == NULL)
3734 3735
                qemuReportError(VIR_ERR_OPERATION_FAILED,
                                "%s", _("resume operation failed"));
3736
            goto endjob;
3737
        }
3738
        qemuDomainObjExitMonitorWithDriver(driver, vm);
3739
        vm->state = VIR_DOMAIN_RUNNING;
3740 3741 3742
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_RESUMED,
                                         VIR_DOMAIN_EVENT_RESUMED_UNPAUSED);
D
Daniel P. Berrange 已提交
3743
    }
3744
    if (virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
3745
        goto endjob;
3746 3747
    ret = 0;

3748
endjob:
3749 3750
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3751

3752
cleanup:
3753 3754
    if (vm)
        virDomainObjUnlock(vm);
3755
    if (event)
3756
        qemuDomainEventQueue(driver, event);
3757
    qemuDriverUnlock(driver);
3758
    return ret;
D
Daniel P. Berrange 已提交
3759 3760 3761
}


3762
static int qemudDomainShutdown(virDomainPtr dom) {
3763 3764 3765
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3766

3767
    qemuDriverLock(driver);
3768
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3769 3770
    qemuDriverUnlock(driver);

3771
    if (!vm) {
3772 3773
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3774 3775
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
3776
        goto cleanup;
3777 3778
    }

3779 3780 3781
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3782
    if (!virDomainObjIsActive(vm)) {
3783 3784
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
3785
        goto endjob;
3786 3787
    }

3788
    qemuDomainObjPrivatePtr priv = vm->privateData;
3789 3790 3791
    qemuDomainObjEnterMonitor(vm);
    ret = qemuMonitorSystemPowerdown(priv->mon);
    qemuDomainObjExitMonitor(vm);
3792

3793
endjob:
3794 3795
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3796

3797
cleanup:
3798 3799
    if (vm)
        virDomainObjUnlock(vm);
3800
    return ret;
3801 3802 3803
}


3804
static int qemudDomainDestroy(virDomainPtr dom) {
3805 3806 3807
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3808
    virDomainEventPtr event = NULL;
3809

3810
    qemuDriverLock(driver);
3811
    vm  = virDomainFindByUUID(&driver->domains, dom->uuid);
D
Daniel P. Berrange 已提交
3812
    if (!vm) {
3813 3814
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3815 3816
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
3817
        goto cleanup;
D
Daniel P. Berrange 已提交
3818
    }
3819 3820 3821 3822

    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3823
    if (!virDomainObjIsActive(vm)) {
3824 3825
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
3826
        goto endjob;
3827
    }
3828

3829
    qemudShutdownVMDaemon(driver, vm);
3830 3831 3832
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     VIR_DOMAIN_EVENT_STOPPED_DESTROYED);
3833
    if (!vm->persistent) {
3834 3835 3836
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains,
                                    vm);
3837 3838
        vm = NULL;
    }
3839 3840
    ret = 0;

3841
endjob:
3842 3843 3844
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3845

3846
cleanup:
3847 3848
    if (vm)
        virDomainObjUnlock(vm);
3849 3850
    if (event)
        qemuDomainEventQueue(driver, event);
3851
    qemuDriverUnlock(driver);
3852
    return ret;
D
Daniel P. Berrange 已提交
3853 3854 3855
}


3856
static char *qemudDomainGetOSType(virDomainPtr dom) {
3857 3858 3859
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    char *type = NULL;
3860

3861
    qemuDriverLock(driver);
3862
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3863
    qemuDriverUnlock(driver);
3864
    if (!vm) {
3865 3866
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3867 3868
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
3869
        goto cleanup;
3870 3871
    }

3872
    if (!(type = strdup(vm->def->os.type)))
3873
        virReportOOMError();
3874 3875

cleanup:
3876 3877
    if (vm)
        virDomainObjUnlock(vm);
3878 3879 3880
    return type;
}

3881 3882
/* Returns max memory in kb, 0 if error */
static unsigned long qemudDomainGetMaxMemory(virDomainPtr dom) {
3883 3884 3885
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    unsigned long ret = 0;
3886

3887
    qemuDriverLock(driver);
3888
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3889 3890
    qemuDriverUnlock(driver);

3891
    if (!vm) {
3892 3893
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3894 3895
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
3896
        goto cleanup;
3897 3898
    }

3899 3900 3901
    ret = vm->def->maxmem;

cleanup:
3902 3903
    if (vm)
        virDomainObjUnlock(vm);
3904
    return ret;
3905 3906 3907
}

static int qemudDomainSetMemory(virDomainPtr dom, unsigned long newmem) {
3908
    struct qemud_driver *driver = dom->conn->privateData;
3909
    qemuDomainObjPrivatePtr priv;
3910
    virDomainObjPtr vm;
3911
    int ret = -1, r;
3912

3913
    qemuDriverLock(driver);
3914
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3915
    qemuDriverUnlock(driver);
3916
    if (!vm) {
3917 3918
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3919 3920
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
3921
        goto cleanup;
3922 3923
    }

3924 3925 3926 3927 3928 3929
    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
        goto cleanup;
    }

3930
    if (newmem > vm->def->maxmem) {
3931 3932
        qemuReportError(VIR_ERR_INVALID_ARG,
                        "%s", _("cannot set memory higher than max memory"));
3933
        goto cleanup;
3934 3935
    }

3936 3937 3938
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

3939 3940 3941 3942 3943 3944
    priv = vm->privateData;
    qemuDomainObjEnterMonitor(vm);
    r = qemuMonitorSetBalloon(priv->mon, newmem);
    qemuDomainObjExitMonitor(vm);
    if (r < 0)
        goto endjob;
3945

3946 3947 3948 3949 3950
    /* Lack of balloon support is a fatal error */
    if (r == 0) {
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        "%s", _("cannot set memory of an active domain"));
        goto endjob;
3951
    }
3952

3953
    ret = 0;
3954
endjob:
3955 3956
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3957

3958
cleanup:
3959 3960
    if (vm)
        virDomainObjUnlock(vm);
3961
    return ret;
3962 3963
}

3964
static int qemudDomainGetInfo(virDomainPtr dom,
3965
                              virDomainInfoPtr info) {
3966 3967 3968
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3969 3970
    int err;
    unsigned long balloon;
3971

3972
    qemuDriverLock(driver);
3973
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3974
    qemuDriverUnlock(driver);
D
Daniel P. Berrange 已提交
3975
    if (!vm) {
3976 3977
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3978 3979
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
3980
        goto cleanup;
D
Daniel P. Berrange 已提交
3981 3982
    }

3983
    info->state = vm->state;
D
Daniel P. Berrange 已提交
3984

D
Daniel P. Berrange 已提交
3985
    if (!virDomainObjIsActive(vm)) {
3986
        info->cpuTime = 0;
D
Daniel P. Berrange 已提交
3987
    } else {
3988
        if (qemudGetProcessInfo(&(info->cpuTime), NULL, vm->pid, 0) < 0) {
3989
            qemuReportError(VIR_ERR_OPERATION_FAILED, ("cannot read cputime for domain"));
3990
            goto cleanup;
D
Daniel P. Berrange 已提交
3991 3992 3993
        }
    }

3994
    info->maxMem = vm->def->maxmem;
3995

D
Daniel P. Berrange 已提交
3996
    if (virDomainObjIsActive(vm)) {
3997
        qemuDomainObjPrivatePtr priv = vm->privateData;
3998 3999 4000
        if (!priv->jobActive) {
            if (qemuDomainObjBeginJob(vm) < 0)
                goto cleanup;
4001

4002 4003 4004 4005
            qemuDomainObjEnterMonitor(vm);
            err = qemuMonitorGetBalloonInfo(priv->mon, &balloon);
            qemuDomainObjExitMonitor(vm);
            if (err < 0) {
4006 4007
                if (qemuDomainObjEndJob(vm) == 0)
                    vm = NULL;
4008 4009 4010 4011 4012 4013 4014 4015 4016
                goto cleanup;
            }

            if (err == 0)
                /* Balloon not supported, so maxmem is always the allocation */
                info->memory = vm->def->maxmem;
            else
                info->memory = balloon;

4017 4018 4019 4020
            if (qemuDomainObjEndJob(vm) == 0) {
                vm = NULL;
                goto cleanup;
            }
4021 4022 4023
        } else {
            info->memory = vm->def->memory;
        }
4024 4025 4026 4027
    } else {
        info->memory = vm->def->memory;
    }

4028
    info->nrVirtCpu = vm->def->vcpus;
4029 4030 4031
    ret = 0;

cleanup:
4032 4033
    if (vm)
        virDomainObjUnlock(vm);
4034
    return ret;
D
Daniel P. Berrange 已提交
4035 4036 4037
}


4038 4039 4040 4041 4042 4043 4044 4045 4046 4047 4048 4049 4050 4051 4052 4053 4054 4055 4056 4057 4058 4059 4060 4061 4062 4063 4064 4065 4066
/** qemuDomainMigrateOffline:
 * Pause domain for non-live migration.
 */
static int
qemuDomainMigrateOffline(struct qemud_driver *driver,
                         virDomainObjPtr vm)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    int ret;

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    ret = qemuMonitorStopCPUs(priv->mon);
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    if (ret == 0) {
        virDomainEventPtr event;

        vm->state = VIR_DOMAIN_PAUSED;
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_SUSPENDED,
                                         VIR_DOMAIN_EVENT_SUSPENDED_MIGRATED);
        if (event)
            qemuDomainEventQueue(driver, event);
    }

    return ret;
}


4067 4068 4069 4070 4071 4072 4073 4074 4075 4076 4077 4078 4079 4080 4081 4082 4083 4084
static int
qemuDomainWaitForMigrationComplete(struct qemud_driver *driver, virDomainObjPtr vm)
{
    int ret = -1;
    int status;
    unsigned long long memProcessed;
    unsigned long long memRemaining;
    unsigned long long memTotal;
    qemuDomainObjPrivatePtr priv = vm->privateData;

    priv->jobInfo.type = VIR_DOMAIN_JOB_UNBOUNDED;

    while (priv->jobInfo.type == VIR_DOMAIN_JOB_UNBOUNDED) {
        /* Poll every 50ms for progress & to allow cancellation */
        struct timespec ts = { .tv_sec = 0, .tv_nsec = 50 * 1000ull };
        struct timeval now;
        int rc;

4085 4086
        if (priv->jobSignals & QEMU_JOB_SIGNAL_CANCEL) {
            priv->jobSignals ^= QEMU_JOB_SIGNAL_CANCEL;
4087 4088 4089 4090 4091 4092 4093
            VIR_DEBUG0("Cancelling migration at client request");
            qemuDomainObjEnterMonitorWithDriver(driver, vm);
            rc = qemuMonitorMigrateCancel(priv->mon);
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            if (rc < 0) {
                VIR_WARN0("Unable to cancel migration");
            }
4094 4095 4096 4097 4098
        } else if (priv->jobSignals & QEMU_JOB_SIGNAL_SUSPEND) {
            priv->jobSignals ^= QEMU_JOB_SIGNAL_SUSPEND;
            VIR_DEBUG0("Pausing domain for non-live migration");
            if (qemuDomainMigrateOffline(driver, vm) < 0)
                VIR_WARN0("Unable to pause domain");
4099 4100 4101 4102 4103 4104 4105 4106 4107 4108 4109
        } else if (priv->jobSignals & QEMU_JOB_SIGNAL_MIGRATE_DOWNTIME) {
            unsigned long long ms = priv->jobSignalsData.migrateDowntime;

            priv->jobSignals ^= QEMU_JOB_SIGNAL_MIGRATE_DOWNTIME;
            priv->jobSignalsData.migrateDowntime = 0;
            VIR_DEBUG("Setting migration downtime to %llums", ms);
            qemuDomainObjEnterMonitorWithDriver(driver, vm);
            rc = qemuMonitorSetMigrationDowntime(priv->mon, ms);
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            if (rc < 0)
                VIR_WARN0("Unable to set migration downtime");
4110 4111
        }

4112 4113 4114 4115 4116 4117 4118 4119 4120 4121 4122 4123 4124 4125 4126 4127 4128 4129 4130 4131 4132 4133 4134 4135 4136 4137 4138 4139 4140 4141 4142 4143 4144 4145 4146 4147 4148 4149 4150 4151 4152 4153 4154 4155 4156 4157 4158 4159 4160 4161 4162 4163 4164 4165 4166 4167 4168 4169 4170 4171 4172 4173 4174 4175 4176 4177 4178 4179 4180 4181 4182 4183
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
        rc = qemuMonitorGetMigrationStatus(priv->mon,
                                           &status,
                                           &memProcessed,
                                           &memRemaining,
                                           &memTotal);
        qemuDomainObjExitMonitorWithDriver(driver, vm);

        if (rc < 0) {
            priv->jobInfo.type = VIR_DOMAIN_JOB_FAILED;
            goto cleanup;
        }

        if (gettimeofday(&now, NULL) < 0) {
            priv->jobInfo.type = VIR_DOMAIN_JOB_FAILED;
            virReportSystemError(errno, "%s",
                                 _("cannot get time of day"));
            goto cleanup;
        }
        priv->jobInfo.timeElapsed =
            ((now.tv_sec * 1000ull) + (now.tv_usec / 1000)) -
            priv->jobStart;

        switch (status) {
        case QEMU_MONITOR_MIGRATION_STATUS_INACTIVE:
            priv->jobInfo.type = VIR_DOMAIN_JOB_NONE;
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            "%s", _("Migration is not active"));
            break;

        case QEMU_MONITOR_MIGRATION_STATUS_ACTIVE:
            priv->jobInfo.dataTotal = memTotal;
            priv->jobInfo.dataRemaining = memRemaining;
            priv->jobInfo.dataProcessed = memProcessed;

            priv->jobInfo.memTotal = memTotal;
            priv->jobInfo.memRemaining = memRemaining;
            priv->jobInfo.memProcessed = memProcessed;
            break;

        case QEMU_MONITOR_MIGRATION_STATUS_COMPLETED:
            priv->jobInfo.type = VIR_DOMAIN_JOB_COMPLETED;
            ret = 0;
            break;

        case QEMU_MONITOR_MIGRATION_STATUS_ERROR:
            priv->jobInfo.type = VIR_DOMAIN_JOB_FAILED;
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            "%s", _("Migration unexpectedly failed"));
            break;

        case QEMU_MONITOR_MIGRATION_STATUS_CANCELLED:
            priv->jobInfo.type = VIR_DOMAIN_JOB_CANCELLED;
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            "%s", _("Migration was cancelled by client"));
            break;
        }

        virDomainObjUnlock(vm);
        qemuDriverUnlock(driver);

        nanosleep(&ts, NULL);

        qemuDriverLock(driver);
        virDomainObjLock(vm);
    }

cleanup:
    return ret;
}


4184
#define QEMUD_SAVE_MAGIC "LibvirtQemudSave"
4185 4186 4187
#define QEMUD_SAVE_VERSION 2

enum qemud_save_formats {
4188 4189 4190
    QEMUD_SAVE_FORMAT_RAW = 0,
    QEMUD_SAVE_FORMAT_GZIP = 1,
    QEMUD_SAVE_FORMAT_BZIP2 = 2,
4191 4192
    /*
     * Deprecated by xz and never used as part of a release
4193
     * QEMUD_SAVE_FORMAT_LZMA
4194 4195
     */
    QEMUD_SAVE_FORMAT_XZ = 3,
4196
    QEMUD_SAVE_FORMAT_LZOP = 4,
4197 4198 4199
    /* Note: add new members only at the end.
       These values are used in the on-disk format.
       Do not change or re-use numbers. */
4200 4201

    QEMUD_SAVE_FORMAT_LAST
4202
};
4203

4204 4205 4206 4207 4208
VIR_ENUM_DECL(qemudSaveCompression)
VIR_ENUM_IMPL(qemudSaveCompression, QEMUD_SAVE_FORMAT_LAST,
              "raw",
              "gzip",
              "bzip2",
4209 4210
              "xz",
              "lzop")
4211

4212 4213 4214 4215 4216
struct qemud_save_header {
    char magic[sizeof(QEMUD_SAVE_MAGIC)-1];
    int version;
    int xml_len;
    int was_running;
4217 4218
    int compressed;
    int unused[15];
4219 4220
};

4221 4222 4223 4224 4225 4226 4227 4228 4229 4230 4231 4232 4233 4234 4235 4236 4237 4238 4239 4240 4241 4242 4243 4244 4245 4246 4247 4248 4249
struct fileOpHookData {
    virDomainPtr dom;
    const char *path;
    char *xml;
    struct qemud_save_header *header;
};

static int qemudDomainSaveFileOpHook(int fd, void *data) {
    struct fileOpHookData *hdata = data;
    int ret = 0;

    if (safewrite(fd, hdata->header, sizeof(*hdata->header)) != sizeof(*hdata->header)) {
        ret = errno;
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                         _("failed to write save header to '%s'"), hdata->path);
        goto endjob;
    }

    if (safewrite(fd, hdata->xml, hdata->header->xml_len) != hdata->header->xml_len) {
        ret = errno;
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                         _("failed to write xml to '%s'"), hdata->path);
        goto endjob;
    }
endjob:
    return ret;
}


4250
static int qemudDomainSave(virDomainPtr dom,
4251 4252
                           const char *path)
{
4253
    struct qemud_driver *driver = dom->conn->privateData;
4254
    virDomainObjPtr vm = NULL;
4255
    char *xml = NULL;
4256
    struct qemud_save_header header;
4257 4258
    struct fileOpHookData hdata;
    int bypassSecurityDriver = 0;
4259
    int ret = -1;
4260
    int rc;
4261
    virDomainEventPtr event = NULL;
4262
    qemuDomainObjPrivatePtr priv;
4263 4264 4265 4266 4267

    memset(&header, 0, sizeof(header));
    memcpy(header.magic, QEMUD_SAVE_MAGIC, sizeof(header.magic));
    header.version = QEMUD_SAVE_VERSION;

4268
    qemuDriverLock(driver);
4269 4270 4271
    if (driver->saveImageFormat == NULL)
        header.compressed = QEMUD_SAVE_FORMAT_RAW;
    else {
4272 4273 4274
        header.compressed =
            qemudSaveCompressionTypeFromString(driver->saveImageFormat);
        if (header.compressed < 0) {
4275 4276 4277
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            "%s", _("Invalid save image format specified "
                                    "in configuration file"));
4278
            goto cleanup;
4279
        }
4280 4281
    }

4282
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4283

D
Daniel P. Berrange 已提交
4284
    if (!vm) {
4285 4286
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4287 4288
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4289
        goto cleanup;
D
Daniel P. Berrange 已提交
4290
    }
4291
    priv = vm->privateData;
4292

4293 4294 4295
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
4296
    if (!virDomainObjIsActive(vm)) {
4297 4298
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
4299
        goto endjob;
D
Daniel P. Berrange 已提交
4300
    }
4301

4302 4303 4304
    memset(&priv->jobInfo, 0, sizeof(priv->jobInfo));
    priv->jobInfo.type = VIR_DOMAIN_JOB_UNBOUNDED;

4305 4306 4307
    /* Pause */
    if (vm->state == VIR_DOMAIN_RUNNING) {
        header.was_running = 1;
4308
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
4309
        if (qemuMonitorStopCPUs(priv->mon) < 0) {
4310 4311
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            goto endjob;
4312
        }
4313
        qemuDomainObjExitMonitorWithDriver(driver, vm);
4314
        vm->state = VIR_DOMAIN_PAUSED;
4315 4316 4317
    }

    /* Get XML for the domain */
4318
    xml = virDomainDefFormat(vm->def, VIR_DOMAIN_XML_SECURE);
4319
    if (!xml) {
4320 4321
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to get domain xml"));
4322
        goto endjob;
4323 4324 4325
    }
    header.xml_len = strlen(xml) + 1;

4326 4327 4328 4329 4330 4331
    /* Setup hook data needed by virFileOperation hook function */
    hdata.dom = dom;
    hdata.path = path;
    hdata.xml = xml;
    hdata.header = &header;

4332 4333
    /* Write header to file, followed by XML */

4334 4335 4336 4337 4338 4339 4340 4341 4342 4343 4344 4345 4346 4347 4348 4349 4350 4351 4352 4353
    /* First try creating the file as root */
    if ((rc = virFileOperation(path, O_CREAT|O_TRUNC|O_WRONLY,
                               S_IRUSR|S_IWUSR,
                               getuid(), getgid(),
                               qemudDomainSaveFileOpHook, &hdata,
                               0)) != 0) {

        /* If we failed as root, and the error was permission-denied
           (EACCES), assume it's on a network-connected share where
           root access is restricted (eg, root-squashed NFS). If the
           qemu user (driver->user) is non-root, just set a flag to
           bypass security driver shenanigans, and retry the operation
           after doing setuid to qemu user */

        if ((rc != EACCES) ||
            driver->user == getuid()) {
            virReportSystemError(rc, _("Failed to create domain save file '%s'"),
                                 path);
            goto endjob;
        }
4354

4355 4356 4357 4358 4359
#ifdef __linux__
        /* On Linux we can also verify the FS-type of the directory. */
        char *dirpath, *p;
        struct statfs st;
        int statfs_ret;
4360

4361 4362 4363 4364 4365 4366 4367 4368 4369 4370 4371 4372 4373 4374 4375 4376 4377 4378 4379 4380 4381 4382 4383 4384 4385 4386 4387 4388 4389 4390 4391 4392 4393 4394 4395 4396 4397 4398 4399 4400 4401 4402 4403 4404 4405 4406 4407 4408 4409 4410 4411 4412 4413 4414 4415 4416 4417 4418 4419 4420 4421 4422 4423 4424 4425 4426 4427
        if ((dirpath = strdup(path)) == NULL) {
            virReportOOMError();
            goto endjob;
        }

        do {
            // Try less and less of the path until we get to a
            // directory we can stat. Even if we don't have 'x'
            // permission on any directory in the path on the NFS
            // server (assuming it's NFS), we will be able to stat the
            // mount point, and that will properly tell us if the
            // fstype is NFS.

            if ((p = strrchr(dirpath, '/')) == NULL) {
                qemuReportError(VIR_ERR_INVALID_ARG,
                                _("Invalid relative path '%s' for domain save file"),
                                path);
                VIR_FREE(dirpath);
                goto endjob;
            }

            if (p == dirpath)
                *(p+1) = '\0';
            else
                *p = '\0';

            statfs_ret = statfs(dirpath, &st);

        } while ((statfs_ret == -1) && (p != dirpath));

        if (statfs_ret == -1) {
            virReportSystemError(errno,
                                 _("Failed to create domain save file '%s'"
                                   " statfs of all elements of path failed."),
                                 path);
            VIR_FREE(dirpath);
            goto endjob;
        }

        if (st.f_type != NFS_SUPER_MAGIC) {
            virReportSystemError(rc,
                                 _("Failed to create domain save file '%s'"
                                   " (fstype of '%s' is 0x%X"),
                                 path, dirpath, (unsigned int) st.f_type);
            VIR_FREE(dirpath);
            goto endjob;
        }
        VIR_FREE(dirpath);
#endif

        /* Retry creating the file as driver->user */

        if ((rc = virFileOperation(path, O_CREAT|O_TRUNC|O_WRONLY,
                                   S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP,
                                   driver->user, driver->group,
                                   qemudDomainSaveFileOpHook, &hdata,
                                   VIR_FILE_OP_AS_UID)) != 0) {
            virReportSystemError(rc, _("Error from child process creating '%s'"),
                                 path);
            goto endjob;
        }

        /* Since we had to setuid to create the file, and the fstype
           is NFS, we assume it's a root-squashing NFS share, and that
           the security driver stuff would have failed anyway */

        bypassSecurityDriver = 1;
4428
    }
4429

4430 4431 4432

    if ((!bypassSecurityDriver) &&
        driver->securityDriver &&
4433
        driver->securityDriver->domainSetSavedStateLabel &&
4434
        driver->securityDriver->domainSetSavedStateLabel(vm, path) == -1)
4435 4436
        goto endjob;

4437 4438
    if (header.compressed == QEMUD_SAVE_FORMAT_RAW) {
        const char *args[] = { "cat", NULL };
M
Matthias Bolte 已提交
4439
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
4440
        rc = qemuMonitorMigrateToCommand(priv->mon, 1, args, path);
M
Matthias Bolte 已提交
4441
        qemuDomainObjExitMonitorWithDriver(driver, vm);
4442
    } else {
4443
        const char *prog = qemudSaveCompressionTypeToString(header.compressed);
4444 4445 4446 4447 4448
        const char *args[] = {
            prog,
            "-c",
            NULL
        };
M
Matthias Bolte 已提交
4449
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
4450
        rc = qemuMonitorMigrateToCommand(priv->mon, 1, args, path);
M
Matthias Bolte 已提交
4451
        qemuDomainObjExitMonitorWithDriver(driver, vm);
4452 4453
    }

4454 4455 4456 4457 4458
    if (rc < 0)
        goto endjob;

    rc = qemuDomainWaitForMigrationComplete(driver, vm);

4459
    if (rc < 0)
4460
        goto endjob;
4461

4462 4463
    if ((!bypassSecurityDriver) &&
        driver->securityDriver &&
4464
        driver->securityDriver->domainRestoreSavedStateLabel &&
4465
        driver->securityDriver->domainRestoreSavedStateLabel(vm, path) == -1)
4466 4467 4468 4469
        goto endjob;

    ret = 0;

4470
    /* Shut it down */
4471
    qemudShutdownVMDaemon(driver, vm);
4472 4473 4474
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     VIR_DOMAIN_EVENT_STOPPED_SAVED);
4475
    if (!vm->persistent) {
4476 4477 4478
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains,
                                    vm);
4479 4480
        vm = NULL;
    }
4481

4482
endjob:
4483 4484 4485 4486 4487 4488 4489 4490 4491 4492
    if (ret != 0 && header.was_running) {
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
        rc = qemuMonitorStartCPUs(priv->mon, dom->conn);
        qemuDomainObjExitMonitorWithDriver(driver, vm);
        if (rc < 0)
            VIR_WARN0("Unable to resume guest CPUs after save failure");
        else
            vm->state = VIR_DOMAIN_RUNNING;
    }

4493 4494
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
4495
            vm = NULL;
4496

4497 4498 4499 4500
cleanup:
    VIR_FREE(xml);
    if (ret != 0)
        unlink(path);
4501 4502
    if (vm)
        virDomainObjUnlock(vm);
4503 4504
    if (event)
        qemuDomainEventQueue(driver, event);
4505
    qemuDriverUnlock(driver);
4506
    return ret;
D
Daniel P. Berrange 已提交
4507 4508 4509
}


P
Paolo Bonzini 已提交
4510 4511 4512 4513 4514 4515
static int qemudDomainCoreDump(virDomainPtr dom,
                               const char *path,
                               int flags ATTRIBUTE_UNUSED) {
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int resume = 0, paused = 0;
4516
    int ret = -1, fd = -1;
4517
    virDomainEventPtr event = NULL;
4518 4519 4520 4521
    const char *args[] = {
        "cat",
        NULL,
    };
4522
    qemuDomainObjPrivatePtr priv;
P
Paolo Bonzini 已提交
4523 4524 4525 4526 4527 4528 4529

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4530 4531
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
P
Paolo Bonzini 已提交
4532 4533
        goto cleanup;
    }
4534
    priv = vm->privateData;
P
Paolo Bonzini 已提交
4535

4536
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
4537 4538
        goto cleanup;

D
Daniel P. Berrange 已提交
4539
    if (!virDomainObjIsActive(vm)) {
4540 4541
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
4542
        goto endjob;
P
Paolo Bonzini 已提交
4543 4544
    }

4545 4546
    /* Create an empty file with appropriate ownership.  */
    if ((fd = open(path, O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR)) < 0) {
4547 4548
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("failed to create '%s'"), path);
4549 4550 4551 4552
        goto endjob;
    }

    if (close(fd) < 0) {
4553
        virReportSystemError(errno,
4554 4555 4556 4557 4558 4559 4560
                             _("unable to save file %s"),
                             path);
        goto endjob;
    }

    if (driver->securityDriver &&
        driver->securityDriver->domainSetSavedStateLabel &&
4561
        driver->securityDriver->domainSetSavedStateLabel(vm, path) == -1)
4562 4563
        goto endjob;

P
Paolo Bonzini 已提交
4564 4565
    /* Migrate will always stop the VM, so the resume condition is
       independent of whether the stop command is issued.  */
P
Paolo Bonzini 已提交
4566 4567 4568
    resume = (vm->state == VIR_DOMAIN_RUNNING);

    /* Pause domain for non-live dump */
P
Paolo Bonzini 已提交
4569
    if (!(flags & VIR_DUMP_LIVE) && vm->state == VIR_DOMAIN_RUNNING) {
4570 4571 4572
        qemuDomainObjEnterMonitor(vm);
        if (qemuMonitorStopCPUs(priv->mon) < 0) {
            qemuDomainObjExitMonitor(vm);
4573
            goto endjob;
4574 4575
        }
        qemuDomainObjExitMonitor(vm);
P
Paolo Bonzini 已提交
4576 4577 4578
        paused = 1;
    }

4579
    qemuDomainObjEnterMonitor(vm);
4580
    ret = qemuMonitorMigrateToCommand(priv->mon, 1, args, path);
4581
    qemuDomainObjExitMonitor(vm);
4582 4583 4584 4585 4586 4587 4588 4589 4590 4591

    if (ret < 0)
        goto endjob;

    ret = qemuDomainWaitForMigrationComplete(driver, vm);

    if (ret < 0)
        goto endjob;

    paused = 1;
4592 4593 4594

    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSavedStateLabel &&
4595
        driver->securityDriver->domainRestoreSavedStateLabel(vm, path) == -1)
4596 4597 4598
        goto endjob;

endjob:
4599
    if ((ret == 0) && (flags & VIR_DUMP_CRASH)) {
4600
        qemudShutdownVMDaemon(driver, vm);
4601 4602 4603 4604 4605
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STOPPED,
                                         VIR_DOMAIN_EVENT_STOPPED_CRASHED);
    }

P
Paolo Bonzini 已提交
4606 4607 4608
    /* Since the monitor is always attached to a pty for libvirt, it
       will support synchronous operations so we always get here after
       the migration is complete.  */
4609
    else if (resume && paused) {
4610
        qemuDomainObjEnterMonitor(vm);
4611
        if (qemuMonitorStartCPUs(priv->mon, dom->conn) < 0) {
4612
            if (virGetLastError() == NULL)
4613 4614
                qemuReportError(VIR_ERR_OPERATION_FAILED,
                                "%s", _("resuming after dump failed"));
P
Paolo Bonzini 已提交
4615
        }
4616
        qemuDomainObjExitMonitor(vm);
P
Paolo Bonzini 已提交
4617
    }
4618

4619 4620
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4621
    else if ((ret == 0) && (flags & VIR_DUMP_CRASH) && !vm->persistent) {
4622 4623 4624 4625
        virDomainRemoveInactive(&driver->domains,
                                vm);
        vm = NULL;
    }
4626 4627

cleanup:
4628 4629
    if (ret != 0)
        unlink(path);
P
Paolo Bonzini 已提交
4630 4631
    if (vm)
        virDomainObjUnlock(vm);
4632 4633
    if (event)
        qemuDomainEventQueue(driver, event);
4634
    qemuDriverUnlock(driver);
P
Paolo Bonzini 已提交
4635 4636 4637 4638
    return ret;
}


4639 4640 4641 4642 4643 4644 4645 4646 4647 4648 4649 4650
static int qemudDomainHotplugVcpus(virDomainObjPtr vm, unsigned int nvcpus)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    int i, rc;
    int ret = -1;

    /* We need different branches here, because we want to offline
     * in reverse order to onlining, so any partial fail leaves us in a
     * reasonably sensible state */
    if (nvcpus > vm->def->vcpus) {
        for (i = vm->def->vcpus ; i < nvcpus ; i++) {
            /* Online new CPU */
4651
            qemuDomainObjEnterMonitor(vm);
4652
            rc = qemuMonitorSetCPU(priv->mon, i, 1);
4653
            qemuDomainObjExitMonitor(vm);
4654 4655 4656 4657 4658 4659 4660 4661 4662 4663
            if (rc == 0)
                goto unsupported;
            if (rc < 0)
                goto cleanup;

            vm->def->vcpus++;
        }
    } else {
        for (i = vm->def->vcpus - 1 ; i >= nvcpus ; i--) {
            /* Offline old CPU */
4664
            qemuDomainObjEnterMonitor(vm);
4665
            rc = qemuMonitorSetCPU(priv->mon, i, 0);
4666
            qemuDomainObjExitMonitor(vm);
4667 4668 4669 4670 4671 4672 4673 4674 4675 4676 4677 4678 4679 4680 4681 4682 4683 4684 4685 4686 4687 4688
            if (rc == 0)
                goto unsupported;
            if (rc < 0)
                goto cleanup;

            vm->def->vcpus--;
        }
    }

    ret = 0;

cleanup:
    return ret;

unsupported:
    qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                    _("cannot change vcpu count of this domain"));
    goto cleanup;
}


static int qemudDomainSetVcpus(virDomainPtr dom, unsigned int nvcpus) {
4689 4690
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
4691 4692
    const char * type;
    int max;
4693
    int ret = -1;
4694

4695
    qemuDriverLock(driver);
4696
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4697 4698
    qemuDriverUnlock(driver);

4699 4700 4701
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

4702
    if (!vm) {
4703 4704
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4705 4706
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4707
        goto endjob;
4708 4709
    }

4710 4711 4712
    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                         "%s", _("domain is not running"));
4713
        goto endjob;
4714 4715
    }

4716 4717 4718 4719 4720 4721 4722 4723 4724 4725 4726 4727 4728 4729 4730 4731 4732 4733 4734 4735 4736 4737 4738 4739 4740
    if (!(type = virDomainVirtTypeToString(vm->def->virtType))) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("unknown virt type in domain definition '%d'"),
                        vm->def->virtType);
        goto endjob;
    }

    if ((max = qemudGetMaxVCPUs(NULL, type)) < 0) {
        qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                        _("could not determine max vcpus for the domain"));
        goto endjob;
    }

    if (nvcpus > max) {
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("requested vcpus is greater than max allowable"
                          " vcpus for the domain: %d > %d"), nvcpus, max);
        goto endjob;
    }

    ret = qemudDomainHotplugVcpus(vm, nvcpus);

endjob:
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4741

4742
cleanup:
4743 4744
    if (vm)
        virDomainObjUnlock(vm);
4745
    return ret;
4746 4747
}

4748 4749 4750 4751 4752 4753

static int
qemudDomainPinVcpu(virDomainPtr dom,
                   unsigned int vcpu,
                   unsigned char *cpumap,
                   int maplen) {
4754 4755
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
4756
    int maxcpu, hostcpus;
4757
    virNodeInfo nodeinfo;
4758
    int ret = -1;
4759
    qemuDomainObjPrivatePtr priv;
4760

4761
    qemuDriverLock(driver);
4762
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4763 4764
    qemuDriverUnlock(driver);

4765 4766 4767
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4768 4769
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4770 4771 4772
        goto cleanup;
    }

D
Daniel P. Berrange 已提交
4773
    if (!virDomainObjIsActive(vm)) {
4774 4775
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s",_("cannot pin vcpus on an inactive domain"));
4776
        goto cleanup;
4777 4778
    }

4779 4780 4781
    priv = vm->privateData;

    if (vcpu > (priv->nvcpupids-1)) {
4782 4783 4784
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("vcpu number out of range %d > %d"),
                        vcpu, priv->nvcpupids);
4785
        goto cleanup;
4786 4787
    }

4788
    if (nodeGetInfo(dom->conn, &nodeinfo) < 0)
4789
        goto cleanup;
4790

4791
    hostcpus = VIR_NODEINFO_MAXCPUS(nodeinfo);
4792
    maxcpu = maplen * 8;
4793 4794
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;
4795

4796 4797
    if (priv->vcpupids != NULL) {
        if (virProcessInfoSetAffinity(priv->vcpupids[vcpu],
4798
                                      cpumap, maplen, maxcpu) < 0)
4799
            goto cleanup;
4800
    } else {
4801 4802
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        "%s", _("cpu affinity is not supported"));
4803
        goto cleanup;
4804
    }
4805
    ret = 0;
4806

4807
cleanup:
4808 4809
    if (vm)
        virDomainObjUnlock(vm);
4810
    return ret;
4811 4812 4813 4814 4815 4816 4817 4818
}

static int
qemudDomainGetVcpus(virDomainPtr dom,
                    virVcpuInfoPtr info,
                    int maxinfo,
                    unsigned char *cpumaps,
                    int maplen) {
4819 4820
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
4821
    virNodeInfo nodeinfo;
4822
    int i, v, maxcpu, hostcpus;
4823
    int ret = -1;
4824
    qemuDomainObjPrivatePtr priv;
4825

4826
    qemuDriverLock(driver);
4827
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4828 4829
    qemuDriverUnlock(driver);

4830 4831 4832
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4833 4834
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4835 4836 4837
        goto cleanup;
    }

D
Daniel P. Berrange 已提交
4838
    if (!virDomainObjIsActive(vm)) {
4839 4840 4841
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s",
                        _("cannot list vcpu pinning for an inactive domain"));
4842
        goto cleanup;
4843 4844
    }

4845 4846
    priv = vm->privateData;

4847
    if (nodeGetInfo(dom->conn, &nodeinfo) < 0)
4848
        goto cleanup;
4849

4850
    hostcpus = VIR_NODEINFO_MAXCPUS(nodeinfo);
4851
    maxcpu = maplen * 8;
4852 4853
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;
4854 4855

    /* Clamp to actual number of vcpus */
4856 4857
    if (maxinfo > priv->nvcpupids)
        maxinfo = priv->nvcpupids;
4858

4859 4860 4861 4862 4863 4864
    if (maxinfo >= 1) {
        if (info != NULL) {
            memset(info, 0, sizeof(*info) * maxinfo);
            for (i = 0 ; i < maxinfo ; i++) {
                info[i].number = i;
                info[i].state = VIR_VCPU_RUNNING;
4865

4866
                if (priv->vcpupids != NULL &&
4867 4868 4869
                    qemudGetProcessInfo(&(info[i].cpuTime),
                                        &(info[i].cpu),
                                        vm->pid,
4870
                                        priv->vcpupids[i]) < 0) {
4871
                    virReportSystemError(errno, "%s",
4872 4873 4874
                                         _("cannot get vCPU placement & pCPU time"));
                    goto cleanup;
                }
4875
            }
4876 4877
        }

4878 4879
        if (cpumaps != NULL) {
            memset(cpumaps, 0, maplen * maxinfo);
4880
            if (priv->vcpupids != NULL) {
4881 4882 4883
                for (v = 0 ; v < maxinfo ; v++) {
                    unsigned char *cpumap = VIR_GET_CPUMAP(cpumaps, maplen, v);

4884
                    if (virProcessInfoGetAffinity(priv->vcpupids[v],
4885
                                                  cpumap, maplen, maxcpu) < 0)
4886
                        goto cleanup;
4887
                }
4888
            } else {
4889 4890
                qemuReportError(VIR_ERR_NO_SUPPORT,
                                "%s", _("cpu affinity is not available"));
4891
                goto cleanup;
4892 4893 4894
            }
        }
    }
4895
    ret = maxinfo;
4896

4897
cleanup:
4898 4899
    if (vm)
        virDomainObjUnlock(vm);
4900
    return ret;
4901 4902 4903
}


4904
static int qemudDomainGetMaxVcpus(virDomainPtr dom) {
4905 4906
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
4907
    const char *type;
4908
    int ret = -1;
4909

4910
    qemuDriverLock(driver);
4911
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4912 4913
    qemuDriverUnlock(driver);

4914
    if (!vm) {
4915 4916
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4917 4918
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4919
        goto cleanup;
4920 4921
    }

4922
    if (!(type = virDomainVirtTypeToString(vm->def->virtType))) {
4923 4924 4925
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("unknown virt type in domain definition '%d'"),
                        vm->def->virtType);
4926
        goto cleanup;
4927 4928
    }

4929
    ret = qemudGetMaxVCPUs(NULL, type);
4930

4931
cleanup:
4932 4933
    if (vm)
        virDomainObjUnlock(vm);
4934 4935 4936
    return ret;
}

4937 4938 4939 4940 4941 4942 4943 4944 4945 4946
static int qemudDomainGetSecurityLabel(virDomainPtr dom, virSecurityLabelPtr seclabel)
{
    struct qemud_driver *driver = (struct qemud_driver *)dom->conn->privateData;
    virDomainObjPtr vm;
    const char *type;
    int ret = -1;

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

4947 4948
    memset(seclabel, 0, sizeof(*seclabel));

4949 4950 4951
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4952 4953
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
4954 4955 4956 4957
        goto cleanup;
    }

    if (!(type = virDomainVirtTypeToString(vm->def->virtType))) {
4958 4959 4960
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("unknown virt type in domain definition '%d'"),
                        vm->def->virtType);
4961 4962 4963 4964 4965 4966 4967 4968 4969 4970 4971 4972 4973 4974 4975 4976 4977
        goto cleanup;
    }

    /*
     * Theoretically, the pid can be replaced during this operation and
     * return the label of a different process.  If atomicity is needed,
     * further validation will be required.
     *
     * Comment from Dan Berrange:
     *
     *   Well the PID as stored in the virDomainObjPtr can't be changed
     *   because you've got a locked object.  The OS level PID could have
     *   exited, though and in extreme circumstances have cycled through all
     *   PIDs back to ours. We could sanity check that our PID still exists
     *   after reading the label, by checking that our FD connecting to the
     *   QEMU monitor hasn't seen SIGHUP/ERR on poll().
     */
D
Daniel P. Berrange 已提交
4978
    if (virDomainObjIsActive(vm)) {
4979
        if (driver->securityDriver && driver->securityDriver->domainGetSecurityProcessLabel) {
4980
            if (driver->securityDriver->domainGetSecurityProcessLabel(vm, seclabel) == -1) {
4981 4982
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                "%s", _("Failed to get security label"));
4983 4984 4985 4986 4987 4988 4989 4990 4991 4992
                goto cleanup;
            }
        }
    }

    ret = 0;

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
4993
    qemuDriverUnlock(driver);
4994 4995 4996
    return ret;
}

4997 4998
static int qemudNodeGetSecurityModel(virConnectPtr conn,
                                     virSecurityModelPtr secmodel)
4999 5000 5001
{
    struct qemud_driver *driver = (struct qemud_driver *)conn->privateData;
    char *p;
5002
    int ret = 0;
5003

5004
    qemuDriverLock(driver);
5005
    if (!driver->securityPrimaryDriver) {
5006
        memset(secmodel, 0, sizeof (*secmodel));
5007 5008
        goto cleanup;
    }
5009

5010 5011
    p = driver->caps->host.secModel.model;
    if (strlen(p) >= VIR_SECURITY_MODEL_BUFLEN-1) {
5012 5013 5014
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("security model string exceeds max %d bytes"),
                        VIR_SECURITY_MODEL_BUFLEN-1);
5015 5016
        ret = -1;
        goto cleanup;
5017 5018 5019 5020 5021
    }
    strcpy(secmodel->model, p);

    p = driver->caps->host.secModel.doi;
    if (strlen(p) >= VIR_SECURITY_DOI_BUFLEN-1) {
5022 5023 5024
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("security DOI string exceeds max %d bytes"),
                        VIR_SECURITY_DOI_BUFLEN-1);
5025 5026
        ret = -1;
        goto cleanup;
5027 5028
    }
    strcpy(secmodel->doi, p);
5029 5030 5031 5032

cleanup:
    qemuDriverUnlock(driver);
    return ret;
5033 5034
}

5035 5036 5037 5038 5039 5040 5041 5042 5043 5044 5045 5046 5047 5048 5049 5050 5051 5052 5053 5054 5055 5056 5057 5058 5059 5060 5061 5062 5063 5064 5065 5066 5067 5068 5069 5070 5071 5072 5073 5074 5075 5076 5077 5078 5079 5080 5081 5082 5083 5084 5085 5086 5087 5088 5089 5090 5091 5092 5093 5094 5095 5096 5097 5098 5099 5100 5101 5102 5103 5104 5105 5106 5107 5108 5109 5110 5111 5112 5113 5114 5115 5116 5117 5118 5119 5120 5121 5122 5123 5124 5125 5126 5127 5128 5129 5130 5131 5132 5133 5134 5135 5136 5137 5138 5139 5140 5141 5142 5143 5144 5145 5146 5147 5148 5149 5150 5151 5152 5153 5154 5155 5156 5157 5158 5159 5160 5161 5162 5163 5164 5165 5166
/* qemudOpenAsUID() - pipe/fork/setuid/open a file, and return the
   pipe fd to caller, so that it can read from the file. Also return
   the pid of the child process, so the caller can wait for it to exit
   after it's finished reading (to avoid a zombie, if nothing
   else). */

static int qemudOpenAsUID(const char *path, uid_t uid, pid_t *child_pid) {
    int pipefd[2];
    int fd = -1;

    *child_pid = -1;

    if (pipe(pipefd) < 0) {
        virReportSystemError(errno,
                             _("failed to create pipe to read '%s'"),
                             path);
        pipefd[0] = pipefd[1] = -1;
        goto parent_cleanup;
    }

    int forkRet = virFork(child_pid);

    if (*child_pid < 0) {
        virReportSystemError(errno,
                             _("failed to fork child to read '%s'"),
                             path);
        goto parent_cleanup;
    }

    if (*child_pid > 0) {

        /* parent */

        /* parent doesn't need the write side of the pipe */
        close(pipefd[1]);
        pipefd[1] = -1;

        if (forkRet < 0) {
            virReportSystemError(errno,
                                 _("failed in parent after forking child to read '%s'"),
                                 path);
            goto parent_cleanup;
        }
        /* caller gets the read side of the pipe */
        fd = pipefd[0];
        pipefd[0] = -1;
parent_cleanup:
        if (pipefd[0] != -1)
            close(pipefd[0]);
        if (pipefd[1] != -1)
            close(pipefd[1]);
        if ((fd < 0) && (*child_pid > 0)) {
            /* a child process was started and subsequently an error
               occurred in the parent, so we need to wait for it to
               exit, but its status is inconsequential. */
            while ((waitpid(*child_pid, NULL, 0) == -1)
                   && (errno == EINTR)) {
                /* empty */
            }
            *child_pid = -1;
        }
        return fd;
    }

    /* child */

    /* setuid to the qemu user, then open the file, read it,
       and stuff it into the pipe for the parent process to
       read */
    int exit_code;
    char *buf = NULL;
    size_t bufsize = 1024 * 1024;
    int bytesread;

    /* child doesn't need the read side of the pipe */
    close(pipefd[0]);

    if (forkRet < 0) {
        exit_code = errno;
        virReportSystemError(errno,
                             _("failed in child after forking to read '%s'"),
                             path);
        goto child_cleanup;
    }

    if (setuid(uid) != 0) {
        exit_code = errno;
        virReportSystemError(errno,
                             _("cannot setuid(%d) to read '%s'"),
                             uid, path);
        goto child_cleanup;
    }
    if ((fd = open(path, O_RDONLY)) < 0) {
        exit_code = errno;
        virReportSystemError(errno,
                             _("cannot open '%s' as uid %d"),
                             path, uid);
        goto child_cleanup;
    }
    if (VIR_ALLOC_N(buf, bufsize) < 0) {
        exit_code = ENOMEM;
        virReportOOMError();
        goto child_cleanup;
    }

    /* read from fd and write to pipefd[1] until EOF */
    do {
        if ((bytesread = saferead(fd, buf, bufsize)) < 0) {
            exit_code = errno;
            virReportSystemError(errno,
                                 _("child failed reading from '%s'"),
                                 path);
            goto child_cleanup;
        }
        if (safewrite(pipefd[1], buf, bytesread) != bytesread) {
            exit_code = errno;
            virReportSystemError(errno, "%s",
                                 _("child failed writing to pipe"));
            goto child_cleanup;
        }
    } while (bytesread > 0);
    exit_code = 0;

child_cleanup:
    VIR_FREE(buf);
    if (fd != -1)
        close(fd);
    if (pipefd[1] != -1)
        close(pipefd[1]);
    _exit(exit_code);
}

5167
/* TODO: check seclabel restore */
5168
static int qemudDomainRestore(virConnectPtr conn,
5169 5170 5171
                              const char *path) {
    struct qemud_driver *driver = conn->privateData;
    virDomainDefPtr def = NULL;
5172
    virDomainObjPtr vm = NULL;
5173
    int fd = -1;
5174
    pid_t read_pid = -1;
5175 5176
    int ret = -1;
    char *xml = NULL;
5177
    struct qemud_save_header header;
5178
    virDomainEventPtr event = NULL;
5179 5180 5181
    int intermediatefd = -1;
    pid_t intermediate_pid = -1;
    int childstat;
5182

5183
    qemuDriverLock(driver);
5184 5185
    /* Verify the header and read the XML */
    if ((fd = open(path, O_RDONLY)) < 0) {
5186 5187 5188 5189 5190 5191 5192 5193 5194 5195 5196 5197 5198 5199
        if ((driver->user == 0) || (getuid() != 0)) {
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            "%s", _("cannot read domain image"));
            goto cleanup;
        }

        /* Opening as root failed, but qemu runs as a different user
           that might have better luck. Create a pipe, then fork a
           child process to run as the qemu user, which will hopefully
           have the necessary authority to read the file. */
        if ((fd = qemudOpenAsUID(path, driver->user, &read_pid)) < 0) {
            /* error already reported */
            goto cleanup;
        }
5200 5201 5202
    }

    if (saferead(fd, &header, sizeof(header)) != sizeof(header)) {
5203 5204
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to read qemu header"));
5205
        goto cleanup;
5206 5207 5208
    }

    if (memcmp(header.magic, QEMUD_SAVE_MAGIC, sizeof(header.magic)) != 0) {
5209 5210
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("image magic is incorrect"));
5211
        goto cleanup;
5212 5213 5214
    }

    if (header.version > QEMUD_SAVE_VERSION) {
5215 5216 5217
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("image version is not supported (%d > %d)"),
                        header.version, QEMUD_SAVE_VERSION);
5218
        goto cleanup;
5219 5220
    }

5221 5222 5223
    if (header.xml_len <= 0) {
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("invalid XML length: %d"), header.xml_len);
5224
        goto cleanup;
5225 5226
    }

5227
    if (virFileReadLimFD(fd, header.xml_len, &xml) != header.xml_len) {
5228 5229
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to read XML"));
5230
        goto cleanup;
5231 5232 5233
    }

    /* Create a domain from this XML */
5234
    if (!(def = virDomainDefParseString(driver->caps, xml,
5235
                                        VIR_DOMAIN_XML_INACTIVE))) {
5236 5237
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to parse XML"));
5238
        goto cleanup;
5239 5240
    }

5241 5242
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
5243

5244
    if (!(vm = virDomainAssignDef(driver->caps,
5245 5246
                                  &driver->domains,
                                  def))) {
5247 5248
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to assign new VM"));
5249
        goto cleanup;
5250
    }
5251
    def = NULL;
5252

5253 5254 5255
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

5256 5257
    if (header.version == 2) {
        const char *intermediate_argv[3] = { NULL, "-dc", NULL };
5258 5259
        const char *prog = qemudSaveCompressionTypeToString(header.compressed);
        if (prog == NULL) {
5260 5261 5262
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            _("Invalid compressed save format %d"),
                            header.compressed);
5263
            goto endjob;
5264
        }
5265

5266
        if (header.compressed != QEMUD_SAVE_FORMAT_RAW) {
5267
            intermediate_argv[0] = prog;
5268 5269
            intermediatefd = fd;
            fd = -1;
5270
            if (virExec(intermediate_argv, NULL, NULL,
5271
                        &intermediate_pid, intermediatefd, &fd, NULL, 0) < 0) {
5272 5273 5274
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                _("Failed to start decompression binary %s"),
                                intermediate_argv[0]);
5275
                goto endjob;
5276 5277 5278
            }
        }
    }
5279
    /* Set the migration source and start it up. */
5280
    ret = qemudStartVMDaemon(conn, driver, vm, "stdio", fd);
5281 5282 5283 5284 5285 5286 5287
    if (intermediate_pid != -1) {
        /* Wait for intermediate process to exit */
        while (waitpid(intermediate_pid, &childstat, 0) == -1 &&
               errno == EINTR);
    }
    if (intermediatefd != -1)
        close(intermediatefd);
5288
    close(fd);
5289
    fd = -1;
5290 5291 5292 5293 5294 5295 5296 5297 5298 5299 5300 5301 5302 5303 5304 5305 5306 5307 5308 5309 5310 5311 5312 5313 5314 5315 5316 5317 5318
    if (read_pid != -1) {
        int wait_ret;
        int status;
        /* reap the process that read the file */
        while (((wait_ret = waitpid(read_pid, &status, 0)) == -1)
               && (errno == EINTR)) {
            /* empty */
        }
        read_pid = -1;
        if (wait_ret == -1) {
            virReportSystemError(errno,
                                 _("failed to wait for process reading '%s'"),
                                 path);
            ret = -1;
        } else if (!WIFEXITED(status)) {
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            _("child process exited abnormally reading '%s'"),
                            path);
            ret = -1;
        } else {
            int exit_status = WEXITSTATUS(status);
            if (exit_status != 0) {
                virReportSystemError(exit_status,
                                     _("child process returned error reading '%s'"),
                                     path);
                ret = -1;
            }
        }
    }
5319
    if (ret < 0) {
5320
        if (!vm->persistent) {
5321 5322 5323
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains,
                                        vm);
5324 5325
            vm = NULL;
        }
5326
        goto endjob;
5327 5328
    }

5329 5330 5331
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_RESTORED);
5332

5333 5334
    /* If it was running before, resume it now. */
    if (header.was_running) {
5335
        qemuDomainObjPrivatePtr priv = vm->privateData;
5336
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
5337
        if (qemuMonitorStartCPUs(priv->mon, conn) < 0) {
5338
            if (virGetLastError() == NULL)
5339 5340
                qemuReportError(VIR_ERR_OPERATION_FAILED,
                                "%s", _("failed to resume domain"));
5341 5342
            qemuDomainObjExitMonitorWithDriver(driver,vm);
            goto endjob;
5343
        }
5344
        qemuDomainObjExitMonitorWithDriver(driver, vm);
5345
        vm->state = VIR_DOMAIN_RUNNING;
5346
        virDomainSaveStatus(driver->caps, driver->stateDir, vm);
5347
    }
5348
    ret = 0;
5349

5350
endjob:
5351 5352 5353
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
5354

5355 5356 5357 5358 5359
cleanup:
    virDomainDefFree(def);
    VIR_FREE(xml);
    if (fd != -1)
        close(fd);
5360 5361 5362 5363 5364 5365 5366
    if (read_pid != 0) {
        /* reap the process that read the file */
        while ((waitpid(read_pid, NULL, 0) == -1)
               && (errno == EINTR)) {
            /* empty */
        }
    }
5367 5368
    if (vm)
        virDomainObjUnlock(vm);
5369 5370
    if (event)
        qemuDomainEventQueue(driver, event);
5371
    qemuDriverUnlock(driver);
5372
    return ret;
D
Daniel P. Berrange 已提交
5373 5374 5375
}


5376
static char *qemudDomainDumpXML(virDomainPtr dom,
5377
                                int flags) {
5378 5379 5380
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    char *ret = NULL;
5381 5382
    unsigned long balloon;
    int err;
5383

5384
    qemuDriverLock(driver);
5385
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
5386 5387
    qemuDriverUnlock(driver);

D
Daniel P. Berrange 已提交
5388
    if (!vm) {
5389 5390
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
5391 5392
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
5393
        goto cleanup;
D
Daniel P. Berrange 已提交
5394 5395
    }

5396
    /* Refresh current memory based on balloon info */
D
Daniel P. Berrange 已提交
5397
    if (virDomainObjIsActive(vm)) {
5398
        qemuDomainObjPrivatePtr priv = vm->privateData;
5399 5400 5401 5402 5403 5404 5405 5406 5407
        /* Don't delay if someone's using the monitor, just use
         * existing most recent data instead */
        if (!priv->jobActive) {
            if (qemuDomainObjBeginJob(vm) < 0)
                goto cleanup;

            qemuDomainObjEnterMonitor(vm);
            err = qemuMonitorGetBalloonInfo(priv->mon, &balloon);
            qemuDomainObjExitMonitor(vm);
5408 5409 5410 5411
            if (qemuDomainObjEndJob(vm) == 0) {
                vm = NULL;
                goto cleanup;
            }
5412 5413 5414 5415 5416 5417
            if (err < 0)
                goto cleanup;
            if (err > 0)
                vm->def->memory = balloon;
            /* err == 0 indicates no balloon support, so ignore it */
        }
5418
    }
5419

5420
    ret = virDomainDefFormat((flags & VIR_DOMAIN_XML_INACTIVE) && vm->newDef ?
5421 5422 5423 5424
                             vm->newDef : vm->def,
                             flags);

cleanup:
5425 5426
    if (vm)
        virDomainObjUnlock(vm);
5427
    return ret;
D
Daniel P. Berrange 已提交
5428 5429 5430
}


5431 5432 5433 5434
static char *qemuDomainXMLFromNative(virConnectPtr conn,
                                     const char *format,
                                     const char *config,
                                     unsigned int flags ATTRIBUTE_UNUSED) {
5435
    struct qemud_driver *driver = conn->privateData;
5436 5437 5438 5439
    virDomainDefPtr def = NULL;
    char *xml = NULL;

    if (STRNEQ(format, QEMU_CONFIG_FORMAT_ARGV)) {
5440 5441
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("unsupported config type %s"), format);
5442 5443 5444
        goto cleanup;
    }

5445
    qemuDriverLock(driver);
5446
    def = qemuParseCommandLineString(driver->caps, config);
5447
    qemuDriverUnlock(driver);
5448 5449 5450
    if (!def)
        goto cleanup;

5451
    xml = virDomainDefFormat(def, VIR_DOMAIN_XML_INACTIVE);
5452 5453 5454 5455 5456 5457

cleanup:
    virDomainDefFree(def);
    return xml;
}

5458 5459 5460 5461 5462 5463
static char *qemuDomainXMLToNative(virConnectPtr conn,
                                   const char *format,
                                   const char *xmlData,
                                   unsigned int flags ATTRIBUTE_UNUSED) {
    struct qemud_driver *driver = conn->privateData;
    virDomainDefPtr def = NULL;
5464
    virDomainChrDef monConfig;
5465
    const char *emulator;
5466
    unsigned long long qemuCmdFlags;
5467 5468 5469 5470 5471 5472 5473 5474
    struct stat sb;
    const char **retargv = NULL;
    const char **retenv = NULL;
    const char **tmp;
    virBuffer buf = VIR_BUFFER_INITIALIZER;
    char *ret = NULL;
    int i;

5475 5476
    qemuDriverLock(driver);

5477
    if (STRNEQ(format, QEMU_CONFIG_FORMAT_ARGV)) {
5478 5479
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("unsupported config type %s"), format);
5480 5481 5482
        goto cleanup;
    }

5483
    def = virDomainDefParseString(driver->caps, xmlData, 0);
5484 5485 5486 5487 5488 5489 5490 5491 5492 5493 5494 5495 5496 5497 5498 5499 5500 5501 5502 5503 5504 5505 5506 5507 5508 5509 5510 5511 5512 5513 5514 5515 5516 5517 5518 5519 5520 5521 5522 5523 5524 5525 5526 5527
    if (!def)
        goto cleanup;

    /* Since we're just exporting args, we can't do bridge/network
     * setups, since libvirt will normally create TAP devices
     * directly. We convert those configs into generic 'ethernet'
     * config and assume the user has suitable 'ifup-qemu' scripts
     */
    for (i = 0 ; i < def->nnets ; i++) {
        virDomainNetDefPtr net = def->nets[i];
        if (net->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
            VIR_FREE(net->data.network.name);

            memset(net, 0, sizeof *net);

            net->type = VIR_DOMAIN_NET_TYPE_ETHERNET;
            net->data.ethernet.dev = NULL;
            net->data.ethernet.script = NULL;
            net->data.ethernet.ipaddr = NULL;
        } else if (net->type == VIR_DOMAIN_NET_TYPE_BRIDGE) {
            char *brname = net->data.bridge.brname;
            char *script = net->data.bridge.script;
            char *ipaddr = net->data.bridge.ipaddr;

            memset(net, 0, sizeof *net);

            net->type = VIR_DOMAIN_NET_TYPE_ETHERNET;
            net->data.ethernet.dev = brname;
            net->data.ethernet.script = script;
            net->data.ethernet.ipaddr = ipaddr;
        }
    }
    for (i = 0 ; i < def->ngraphics ; i++) {
        if (def->graphics[i]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
            def->graphics[i]->data.vnc.autoport)
            def->graphics[i]->data.vnc.port = 5900;
    }
    emulator = def->emulator;

    /* Make sure the binary we are about to try exec'ing exists.
     * Technically we could catch the exec() failure, but that's
     * in a sub-process so its hard to feed back a useful error
     */
    if (stat(emulator, &sb) < 0) {
5528
        virReportSystemError(errno,
5529 5530 5531 5532 5533 5534 5535 5536
                             _("Cannot find QEMU binary %s"),
                             emulator);
        goto cleanup;
    }

    if (qemudExtractVersionInfo(emulator,
                                NULL,
                                &qemuCmdFlags) < 0) {
5537 5538 5539
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("Cannot determine QEMU argv syntax %s"),
                        emulator);
5540 5541 5542
        goto cleanup;
    }

5543
    if (qemuPrepareMonitorChr(driver, &monConfig, def->name) < 0)
5544
        goto cleanup;
5545 5546

    if (qemudBuildCommandLine(conn, driver, def,
D
Daniel P. Berrange 已提交
5547
                              &monConfig, 0, qemuCmdFlags,
5548 5549 5550 5551 5552 5553 5554 5555 5556 5557 5558 5559 5560 5561 5562 5563 5564 5565 5566
                              &retargv, &retenv,
                              NULL, NULL, /* Don't want it to create TAP devices */
                              NULL) < 0) {
        goto cleanup;
    }

    tmp = retenv;
    while (*tmp) {
        virBufferAdd(&buf, *tmp, strlen(*tmp));
        virBufferAddLit(&buf, " ");
        tmp++;
    }
    tmp = retargv;
    while (*tmp) {
        virBufferAdd(&buf, *tmp, strlen(*tmp));
        virBufferAddLit(&buf, " ");
        tmp++;
    }

5567 5568
    if (virBufferError(&buf)) {
        virBufferFreeAndReset(&buf);
5569
        virReportOOMError();
5570
        goto cleanup;
5571
    }
5572 5573 5574 5575

    ret = virBufferContentAndReset(&buf);

cleanup:
5576
    qemuDriverUnlock(driver);
5577 5578 5579 5580 5581 5582 5583 5584 5585 5586 5587 5588 5589
    for (tmp = retargv ; tmp && *tmp ; tmp++)
        VIR_FREE(*tmp);
    VIR_FREE(retargv);

    for (tmp = retenv ; tmp && *tmp ; tmp++)
        VIR_FREE(*tmp);
    VIR_FREE(retenv);

    virDomainDefFree(def);
    return ret;
}


5590
static int qemudListDefinedDomains(virConnectPtr conn,
5591
                            char **const names, int nnames) {
5592
    struct qemud_driver *driver = conn->privateData;
5593
    int n;
5594

5595
    qemuDriverLock(driver);
5596
    n = virDomainObjListGetInactiveNames(&driver->domains, names, nnames);
5597
    qemuDriverUnlock(driver);
5598
    return n;
D
Daniel P. Berrange 已提交
5599 5600
}

5601
static int qemudNumDefinedDomains(virConnectPtr conn) {
5602
    struct qemud_driver *driver = conn->privateData;
5603
    int n;
5604

5605
    qemuDriverLock(driver);
5606
    n = virDomainObjListNumOfDomains(&driver->domains, 0);
5607
    qemuDriverUnlock(driver);
5608

5609
    return n;
D
Daniel P. Berrange 已提交
5610 5611 5612
}


5613
static int qemudDomainStart(virDomainPtr dom) {
5614 5615 5616
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
5617
    virDomainEventPtr event = NULL;
5618

5619
    qemuDriverLock(driver);
5620
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
5621

5622
    if (!vm) {
5623 5624
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
5625 5626
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
5627
        goto cleanup;
5628 5629
    }

5630 5631 5632 5633
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

    if (virDomainObjIsActive(vm)) {
5634 5635
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is already running"));
5636 5637 5638
        goto endjob;
    }

5639
    ret = qemudStartVMDaemon(dom->conn, driver, vm, NULL, -1);
5640
    if (ret != -1)
5641 5642 5643
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STARTED,
                                         VIR_DOMAIN_EVENT_STARTED_BOOTED);
5644

5645
endjob:
5646 5647
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
5648

5649
cleanup:
5650 5651
    if (vm)
        virDomainObjUnlock(vm);
5652
    if (event)
5653
        qemuDomainEventQueue(driver, event);
5654
    qemuDriverUnlock(driver);
5655
    return ret;
D
Daniel P. Berrange 已提交
5656 5657
}

5658 5659 5660 5661 5662 5663 5664 5665 5666 5667 5668 5669 5670 5671 5672
static int
qemudCanonicalizeMachineFromInfo(virDomainDefPtr def,
                                 virCapsGuestDomainInfoPtr info,
                                 char **canonical)
{
    int i;

    *canonical = NULL;

    for (i = 0; i < info->nmachines; i++) {
        virCapsGuestMachinePtr machine = info->machines[i];

        if (!machine->canonical)
            continue;

5673
        if (STRNEQ(def->os.machine, machine->name))
5674 5675 5676
            continue;

        if (!(*canonical = strdup(machine->canonical))) {
5677
            virReportOOMError();
5678 5679 5680 5681 5682 5683 5684 5685 5686
            return -1;
        }

        break;
    }

    return 0;
}

5687 5688 5689 5690 5691 5692 5693
static int
qemudCanonicalizeMachineDirect(virDomainDefPtr def, char **canonical)
{
    virCapsGuestMachinePtr *machines = NULL;
    int i, nmachines = 0;

    if (qemudProbeMachineTypes(def->emulator, &machines, &nmachines) < 0) {
5694
        virReportOOMError();
5695 5696 5697 5698 5699 5700 5701
        return -1;
    }

    for (i = 0; i < nmachines; i++) {
        if (!machines[i]->canonical)
            continue;

5702
        if (STRNEQ(def->os.machine, machines[i]->name))
5703 5704 5705 5706 5707 5708 5709 5710 5711 5712 5713 5714
            continue;

        *canonical = machines[i]->canonical;
        machines[i]->canonical = NULL;
        break;
    }

    virCapabilitiesFreeMachines(machines, nmachines);

    return 0;
}

5715 5716
int
qemudCanonicalizeMachine(struct qemud_driver *driver, virDomainDefPtr def)
5717 5718 5719 5720 5721 5722
{
    char *canonical = NULL;
    int i;

    for (i = 0; i < driver->caps->nguests; i++) {
        virCapsGuestPtr guest = driver->caps->guests[i];
5723
        virCapsGuestDomainInfoPtr info;
5724 5725 5726
        int j;

        for (j = 0; j < guest->arch.ndomains; j++) {
5727
            info = &guest->arch.domains[j]->info;
5728

5729 5730 5731 5732 5733 5734 5735 5736 5737
            if (!info->emulator || !STREQ(info->emulator, def->emulator))
                continue;

            if (!info->nmachines)
                info = &guest->arch.defaultInfo;

            if (qemudCanonicalizeMachineFromInfo(def, info, &canonical) < 0)
                return -1;
            goto out;
5738 5739
        }

5740 5741 5742 5743
        info = &guest->arch.defaultInfo;

        if (info->emulator && STREQ(info->emulator, def->emulator)) {
            if (qemudCanonicalizeMachineFromInfo(def, info, &canonical) < 0)
5744 5745 5746 5747
                return -1;
            goto out;
        }
    }
5748 5749 5750 5751

    if (qemudCanonicalizeMachineDirect(def, &canonical) < 0)
        return -1;

5752 5753 5754 5755 5756 5757 5758
out:
    if (canonical) {
        VIR_FREE(def->os.machine);
        def->os.machine = canonical;
    }
    return 0;
}
D
Daniel P. Berrange 已提交
5759

5760
static virDomainPtr qemudDomainDefine(virConnectPtr conn, const char *xml) {
5761
    struct qemud_driver *driver = conn->privateData;
5762
    virDomainDefPtr def;
5763
    virDomainObjPtr vm = NULL;
5764
    virDomainPtr dom = NULL;
5765
    virDomainEventPtr event = NULL;
5766
    int dupVM;
5767

5768
    qemuDriverLock(driver);
5769
    if (!(def = virDomainDefParseString(driver->caps, xml,
5770
                                        VIR_DOMAIN_XML_INACTIVE)))
5771
        goto cleanup;
5772

5773
    if (virSecurityDriverVerify(def) < 0)
5774 5775
        goto cleanup;

5776 5777
    if ((dupVM = virDomainObjIsDuplicate(&driver->domains, def, 0)) < 0)
        goto cleanup;
5778

5779
    if (qemudCanonicalizeMachine(driver, def) < 0)
5780 5781
        goto cleanup;

5782 5783 5784
    if (qemuAssignPCIAddresses(def) < 0)
        goto cleanup;

5785
    if (!(vm = virDomainAssignDef(driver->caps,
5786 5787
                                  &driver->domains,
                                  def))) {
5788
        goto cleanup;
5789
    }
5790
    def = NULL;
5791
    vm->persistent = 1;
5792

5793
    if (virDomainSaveConfig(driver->configDir,
5794
                            vm->newDef ? vm->newDef : vm->def) < 0) {
5795 5796
        virDomainRemoveInactive(&driver->domains,
                                vm);
5797
        vm = NULL;
5798
        goto cleanup;
5799 5800
    }

5801 5802
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_DEFINED,
5803
                                     !dupVM ?
5804 5805
                                     VIR_DOMAIN_EVENT_DEFINED_ADDED :
                                     VIR_DOMAIN_EVENT_DEFINED_UPDATED);
5806

5807
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
5808
    if (dom) dom->id = vm->def->id;
5809 5810

cleanup:
5811
    virDomainDefFree(def);
5812 5813
    if (vm)
        virDomainObjUnlock(vm);
5814 5815
    if (event)
        qemuDomainEventQueue(driver, event);
5816
    qemuDriverUnlock(driver);
5817
    return dom;
D
Daniel P. Berrange 已提交
5818 5819
}

5820
static int qemudDomainUndefine(virDomainPtr dom) {
5821 5822
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
5823
    virDomainEventPtr event = NULL;
5824
    int ret = -1;
D
Daniel P. Berrange 已提交
5825

5826
    qemuDriverLock(driver);
5827
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
5828

D
Daniel P. Berrange 已提交
5829
    if (!vm) {
5830 5831
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
5832 5833
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
5834
        goto cleanup;
D
Daniel P. Berrange 已提交
5835 5836
    }

D
Daniel P. Berrange 已提交
5837
    if (virDomainObjIsActive(vm)) {
5838 5839
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("cannot delete active domain"));
5840
        goto cleanup;
D
Daniel P. Berrange 已提交
5841 5842
    }

5843
    if (!vm->persistent) {
5844 5845
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("cannot undefine transient domain"));
5846
        goto cleanup;
5847 5848
    }

5849
    if (virDomainDeleteConfig(driver->configDir, driver->autostartDir, vm) < 0)
5850
        goto cleanup;
D
Daniel P. Berrange 已提交
5851

5852 5853 5854
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_UNDEFINED,
                                     VIR_DOMAIN_EVENT_UNDEFINED_REMOVED);
5855

5856 5857
    virDomainRemoveInactive(&driver->domains,
                            vm);
5858
    vm = NULL;
5859
    ret = 0;
D
Daniel P. Berrange 已提交
5860

5861
cleanup:
5862 5863
    if (vm)
        virDomainObjUnlock(vm);
5864 5865
    if (event)
        qemuDomainEventQueue(driver, event);
5866
    qemuDriverUnlock(driver);
5867
    return ret;
D
Daniel P. Berrange 已提交
5868 5869
}

5870

5871
static int qemudDomainChangeEjectableMedia(struct qemud_driver *driver,
5872
                                           virDomainObjPtr vm,
5873
                                           virDomainDiskDefPtr disk)
5874
{
5875
    virDomainDiskDefPtr origdisk = NULL;
5876
    int i;
5877
    int ret;
5878

5879
    origdisk = NULL;
5880
    for (i = 0 ; i < vm->def->ndisks ; i++) {
5881 5882
        if (vm->def->disks[i]->bus == disk->bus &&
            STREQ(vm->def->disks[i]->dst, disk->dst)) {
5883
            origdisk = vm->def->disks[i];
5884
            break;
5885
        }
5886 5887 5888
    }

    if (!origdisk) {
5889 5890 5891 5892
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("No device with bus '%s' and target '%s'"),
                        virDomainDiskBusTypeToString(disk->bus),
                        disk->dst);
5893 5894 5895
        return -1;
    }

5896
    if (!origdisk->info.alias) {
5897 5898
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("missing disk device alias name for %s"), origdisk->dst);
5899 5900
        return -1;
    }
5901

5902 5903
    if (origdisk->device != VIR_DOMAIN_DISK_DEVICE_FLOPPY &&
        origdisk->device != VIR_DOMAIN_DISK_DEVICE_CDROM) {
5904 5905 5906
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("Removable media not supported for %s device"),
                        virDomainDiskDeviceTypeToString(disk->device));
5907
        return -1;
5908
    }
5909

5910 5911
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
5912
        driver->securityDriver->domainSetSecurityImageLabel(vm, disk) < 0)
5913 5914
        return -1;

5915
    qemuDomainObjPrivatePtr priv = vm->privateData;
5916
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5917
    if (disk->src) {
5918
        const char *format = NULL;
5919 5920 5921
        if (disk->type != VIR_DOMAIN_DISK_TYPE_DIR) {
            if (disk->driverType)
                format = disk->driverType;
5922 5923 5924
            else if (origdisk->driverType)
                format = origdisk->driverType;
        }
5925 5926
        ret = qemuMonitorChangeMedia(priv->mon,
                                     origdisk->info.alias,
5927
                                     disk->src, format);
5928
    } else {
5929
        ret = qemuMonitorEjectMedia(priv->mon, origdisk->info.alias);
5930
    }
5931
    qemuDomainObjExitMonitorWithDriver(driver, vm);
5932

5933 5934 5935 5936 5937
    if (ret < 0)
        goto error;

    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
5938
        driver->securityDriver->domainRestoreSecurityImageLabel(vm, origdisk) < 0)
5939 5940 5941
        VIR_WARN("Unable to restore security label on ejected image %s", origdisk->src);

    VIR_FREE(origdisk->src);
5942 5943 5944 5945 5946
    origdisk->src = disk->src;
    disk->src = NULL;
    origdisk->type = disk->type;

    virDomainDiskDefFree(disk);
5947

5948
    return ret;
5949 5950 5951 5952

error:
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
5953
        driver->securityDriver->domainRestoreSecurityImageLabel(vm, disk) < 0)
5954
        VIR_WARN("Unable to restore security label on new media %s", disk->src);
5955
    return -1;
5956 5957
}

5958

5959
static int qemudDomainAttachPciDiskDevice(struct qemud_driver *driver,
5960
                                          virDomainObjPtr vm,
5961 5962
                                          virDomainDiskDefPtr disk,
                                          int qemuCmdFlags)
5963
{
5964
    int i, ret;
5965
    const char* type = virDomainDiskBusTypeToString(disk->bus);
5966
    qemuDomainObjPrivatePtr priv = vm->privateData;
5967 5968
    char *devstr = NULL;
    char *drivestr = NULL;
5969 5970

    for (i = 0 ; i < vm->def->ndisks ; i++) {
5971
        if (STREQ(vm->def->disks[i]->dst, disk->dst)) {
5972 5973
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            _("target %s already exists"), disk->dst);
5974 5975 5976 5977
            return -1;
        }
    }

5978 5979
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
5980
        driver->securityDriver->domainSetSecurityImageLabel(vm, disk) < 0)
5981 5982
        return -1;

5983
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
5984 5985
        if (qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &disk->info) < 0)
            goto error;
5986 5987
        if (qemuAssignDeviceDiskAlias(disk, qemuCmdFlags) < 0)
            goto error;
5988

5989 5990 5991
        if (!(drivestr = qemuBuildDriveStr(disk, 0, qemuCmdFlags)))
            goto error;

5992
        if (!(devstr = qemuBuildDriveDevStr(disk)))
5993 5994 5995
            goto error;
    }

5996
    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0) {
5997
        virReportOOMError();
5998
        goto error;
5999 6000
    }

6001
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6002 6003 6004 6005 6006 6007 6008 6009 6010 6011 6012 6013 6014 6015 6016 6017
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDrive(priv->mon, drivestr);
        if (ret == 0)
            qemuMonitorAddDevice(priv->mon, devstr);
            /* XXX remove the drive upon fail */
    } else {
        virDomainDevicePCIAddress guestAddr;
        ret = qemuMonitorAddPCIDisk(priv->mon,
                                    disk->src,
                                    type,
                                    &guestAddr);
        if (ret == 0) {
            disk->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
            memcpy(&disk->info.addr.pci, &guestAddr, sizeof(guestAddr));
        }
    }
6018
    qemuDomainObjExitMonitorWithDriver(driver, vm);
6019

6020 6021
    if (ret < 0)
        goto error;
6022

6023
    virDomainDiskInsertPreAlloced(vm->def, disk);
6024

6025 6026 6027
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

6028 6029 6030
    return 0;

error:
6031 6032 6033
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

6034 6035 6036 6037 6038
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (disk->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &disk->info) < 0)
        VIR_WARN("Unable to release PCI address on %s", disk->src);

6039 6040
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
6041
        driver->securityDriver->domainRestoreSecurityImageLabel(vm, disk) < 0)
6042
        VIR_WARN("Unable to restore security label on %s", disk->src);
6043 6044

    return -1;
6045
}
6046

6047

6048
static int qemudDomainAttachPciControllerDevice(struct qemud_driver *driver,
6049
                                                virDomainObjPtr vm,
6050 6051
                                                virDomainControllerDefPtr controller,
                                                int qemuCmdFlags)
6052
{
6053 6054
    int i;
    int ret = -1;
6055
    const char* type = virDomainControllerTypeToString(controller->type);
6056
    char *devstr = NULL;
6057 6058 6059
    qemuDomainObjPrivatePtr priv = vm->privateData;

    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
6060 6061
        if ((vm->def->controllers[i]->type == controller->type) &&
            (vm->def->controllers[i]->idx == controller->idx)) {
6062 6063 6064
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            _("target %s:%d already exists"),
                            type, controller->idx);
6065 6066 6067 6068
            return -1;
        }
    }

6069 6070 6071 6072 6073 6074
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &controller->info) < 0)
            goto cleanup;
        if (qemuAssignDeviceControllerAlias(controller) < 0)
            goto cleanup;
    }
6075

6076
    if (!(devstr = qemuBuildControllerDevStr(controller))) {
6077
        virReportOOMError();
6078 6079 6080
        goto cleanup;
    }

6081
    if (VIR_REALLOC_N(vm->def->controllers, vm->def->ncontrollers+1) < 0) {
6082
        virReportOOMError();
6083
        goto cleanup;
6084 6085 6086
    }

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6087 6088 6089 6090 6091 6092 6093
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDevice(priv->mon, devstr);
    } else {
        ret = qemuMonitorAttachPCIDiskController(priv->mon,
                                                 type,
                                                 &controller->info.addr.pci);
    }
6094 6095 6096
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    if (ret == 0) {
6097 6098
        controller->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
        virDomainControllerInsertPreAlloced(vm->def, controller);
6099 6100
    }

6101
cleanup:
6102 6103 6104 6105 6106 6107
    if ((ret != 0) &&
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (controller->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &controller->info) < 0)
        VIR_WARN0("Unable to release PCI address on controller");

6108
    VIR_FREE(devstr);
6109 6110 6111
    return ret;
}

6112

6113
static virDomainControllerDefPtr
6114
qemuDomainFindOrCreateSCSIDiskController(struct qemud_driver *driver,
6115
                                         virDomainObjPtr vm,
6116 6117
                                         int controller,
                                         int qemuCmdFlags)
6118 6119 6120 6121 6122 6123 6124 6125 6126 6127 6128 6129 6130
{
    int i;
    virDomainControllerDefPtr cont;
    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
        cont = vm->def->controllers[i];

        if (cont->type != VIR_DOMAIN_CONTROLLER_TYPE_SCSI)
            continue;

        if (cont->idx == controller)
            return cont;
    }

W
Wolfgang Mauerer 已提交
6131
    /* No SCSI controller present, for backward compatibility we
6132 6133
     * now hotplug a controller */
    if (VIR_ALLOC(cont) < 0) {
6134
        virReportOOMError();
6135 6136 6137 6138 6139 6140
        return NULL;
    }
    cont->type = VIR_DOMAIN_CONTROLLER_TYPE_SCSI;
    cont->idx = 0;

    VIR_INFO0("No SCSI controller present, hotplugging one");
6141
    if (qemudDomainAttachPciControllerDevice(driver,
6142
                                             vm, cont, qemuCmdFlags) < 0) {
6143 6144 6145 6146 6147 6148
        VIR_FREE(cont);
        return NULL;
    }
    return cont;
}

6149

6150
static int qemudDomainAttachSCSIDisk(struct qemud_driver *driver,
6151
                                     virDomainObjPtr vm,
6152
                                     virDomainDiskDefPtr disk,
6153 6154 6155 6156 6157 6158
                                     int qemuCmdFlags)
{
    int i;
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainControllerDefPtr cont;
    char *drivestr = NULL;
6159
    char *devstr = NULL;
6160 6161 6162
    int ret = -1;

    for (i = 0 ; i < vm->def->ndisks ; i++) {
6163
        if (STREQ(vm->def->disks[i]->dst, disk->dst)) {
6164 6165
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            _("target %s already exists"), disk->dst);
6166
            return -1;
6167 6168 6169
        }
    }

6170 6171 6172

    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
6173
        driver->securityDriver->domainSetSecurityImageLabel(vm, disk) < 0)
6174 6175
        return -1;

6176
    /* We should have an address already, so make sure */
6177
    if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE) {
6178 6179 6180
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("unexpected disk address type %s"),
                        virDomainDeviceAddressTypeToString(disk->info.type));
6181
        goto error;
6182 6183
    }

6184 6185 6186
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuAssignDeviceDiskAlias(disk, qemuCmdFlags) < 0)
            goto error;
6187
        if (!(devstr = qemuBuildDriveDevStr(disk)))
6188 6189 6190 6191 6192 6193
            goto error;
    }

    if (!(drivestr = qemuBuildDriveStr(disk, 0, qemuCmdFlags)))
        goto error;

6194
    for (i = 0 ; i <= disk->info.addr.drive.controller ; i++) {
6195
        cont = qemuDomainFindOrCreateSCSIDiskController(driver, vm, i, qemuCmdFlags);
6196
        if (!cont)
6197
            goto error;
6198 6199 6200
    }

    if (cont->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
6201 6202
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("SCSI controller %d was missing its PCI address"), cont->idx);
6203
        goto error;
6204 6205 6206
    }

    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0) {
6207
        virReportOOMError();
6208
        goto error;
6209 6210 6211
    }

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6212 6213 6214 6215 6216 6217 6218 6219 6220 6221 6222 6223 6224 6225 6226 6227 6228 6229 6230 6231
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDrive(priv->mon,
                                  drivestr);
        if (ret == 0)
            ret = qemuMonitorAddDevice(priv->mon,
                                       devstr);
            /* XXX should call 'drive_del' on error but this does not exist yet */
    } else {
        virDomainDeviceDriveAddress driveAddr;
        ret = qemuMonitorAttachDrive(priv->mon,
                                     drivestr,
                                     &cont->info.addr.pci,
                                     &driveAddr);
        if (ret == 0) {
            /* XXX we should probably validate that the addr matches
             * our existing defined addr instead of overwriting */
            disk->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE;
            memcpy(&disk->info.addr.drive, &driveAddr, sizeof(driveAddr));
        }
    }
6232 6233
    qemuDomainObjExitMonitorWithDriver(driver, vm);

6234 6235
    if (ret < 0)
        goto error;
6236

6237
    virDomainDiskInsertPreAlloced(vm->def, disk);
6238 6239

    VIR_FREE(devstr);
6240
    VIR_FREE(drivestr);
6241 6242 6243 6244

    return 0;

error:
6245
    VIR_FREE(devstr);
6246
    VIR_FREE(drivestr);
6247

6248 6249
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
6250
        driver->securityDriver->domainRestoreSecurityImageLabel(vm, disk) < 0)
6251
        VIR_WARN("Unable to restore security label on %s", disk->src);
6252 6253

    return -1;
6254 6255
}

6256

6257
static int qemudDomainAttachUsbMassstorageDevice(struct qemud_driver *driver,
6258
                                                 virDomainObjPtr vm,
6259 6260
                                                 virDomainDiskDefPtr disk,
                                                 int qemuCmdFlags)
6261
{
6262
    qemuDomainObjPrivatePtr priv = vm->privateData;
6263
    int i, ret;
6264 6265
    char *drivestr = NULL;
    char *devstr = NULL;
6266

6267
    for (i = 0 ; i < vm->def->ndisks ; i++) {
6268
        if (STREQ(vm->def->disks[i]->dst, disk->dst)) {
6269 6270
            qemuReportError(VIR_ERR_OPERATION_FAILED,
                            _("target %s already exists"), disk->dst);
6271 6272 6273 6274
            return -1;
        }
    }

6275 6276
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
6277
        driver->securityDriver->domainSetSecurityImageLabel(vm, disk) < 0)
6278 6279
        return -1;

6280
    if (!disk->src) {
6281 6282
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("disk source path is missing"));
6283
        goto error;
6284 6285
    }

6286
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
6287 6288
        if (qemuAssignDeviceDiskAlias(disk, qemuCmdFlags) < 0)
            goto error;
6289 6290
        if (!(drivestr = qemuBuildDriveStr(disk, 0, qemuCmdFlags)))
            goto error;
6291
        if (!(devstr = qemuBuildDriveDevStr(disk)))
6292 6293 6294
            goto error;
    }

6295
    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0) {
6296
        virReportOOMError();
6297
        goto error;
6298 6299
    }

6300
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6301 6302 6303 6304 6305 6306 6307 6308 6309 6310
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDrive(priv->mon,
                                  drivestr);
        if (ret == 0)
            ret = qemuMonitorAddDevice(priv->mon,
                                       devstr);
            /* XXX should call 'drive_del' on error but this does not exist yet */
    } else {
        ret = qemuMonitorAddUSBDisk(priv->mon, disk->src);
    }
6311
    qemuDomainObjExitMonitorWithDriver(driver, vm);
6312

6313 6314 6315
    if (ret < 0)
        goto error;

6316
    virDomainDiskInsertPreAlloced(vm->def, disk);
6317

6318 6319 6320
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

6321 6322 6323
    return 0;

error:
6324 6325 6326
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

6327 6328
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
6329
        driver->securityDriver->domainRestoreSecurityImageLabel(vm, disk) < 0)
6330
        VIR_WARN("Unable to restore security label on %s", disk->src);
6331 6332

    return -1;
6333 6334
}

6335

6336
/* XXX conn required for network -> bridge resolution */
M
Mark McLoughlin 已提交
6337
static int qemudDomainAttachNetDevice(virConnectPtr conn,
6338
                                      struct qemud_driver *driver,
M
Mark McLoughlin 已提交
6339
                                      virDomainObjPtr vm,
6340
                                      virDomainNetDefPtr net,
6341
                                      unsigned long long qemuCmdFlags)
M
Mark McLoughlin 已提交
6342
{
6343
    qemuDomainObjPrivatePtr priv = vm->privateData;
6344
    char *tapfd_name = NULL;
6345
    int tapfd = -1;
6346
    char *nicstr = NULL;
6347
    char *netstr = NULL;
6348
    int ret = -1;
6349
    virDomainDevicePCIAddress guestAddr;
6350
    int vlan;
M
Mark McLoughlin 已提交
6351 6352

    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_HOST_NET_ADD)) {
6353 6354
        qemuReportError(VIR_ERR_NO_SUPPORT, "%s",
                        _("installed qemu version does not support host_net_add"));
M
Mark McLoughlin 已提交
6355 6356 6357 6358 6359
        return -1;
    }

    if (net->type == VIR_DOMAIN_NET_TYPE_BRIDGE ||
        net->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
6360
        if (priv->monConfig->type != VIR_DOMAIN_CHR_TYPE_UNIX) {
6361 6362 6363 6364
            qemuReportError(VIR_ERR_NO_SUPPORT,
                            _("network device type '%s' cannot be attached: "
                              "qemu is not using a unix socket monitor"),
                            virDomainNetTypeToString(net->type));
6365 6366 6367 6368 6369
            return -1;
        }

        if ((tapfd = qemudNetworkIfaceConnect(conn, driver, net, qemuCmdFlags)) < 0)
            return -1;
6370 6371 6372 6373 6374 6375 6376 6377 6378
    } else if (net->type == VIR_DOMAIN_NET_TYPE_DIRECT) {
        if (priv->monConfig->type != VIR_DOMAIN_CHR_TYPE_UNIX) {
            qemuReportError(VIR_ERR_NO_SUPPORT,
                            _("network device type '%s' cannot be attached: "
                            "qemu is not using a unix socket monitor"),
                            virDomainNetTypeToString(net->type));
            return -1;
        }

S
Stefan Berger 已提交
6379
        if ((tapfd = qemudPhysIfaceConnect(conn, driver, net,
6380
                                           net->data.direct.linkdev,
6381 6382
                                           net->data.direct.mode,
                                           qemuCmdFlags)) < 0)
6383
            return -1;
M
Mark McLoughlin 已提交
6384 6385
    }

6386 6387
    if (VIR_REALLOC_N(vm->def->nets, vm->def->nnets+1) < 0)
        goto no_memory;
M
Mark McLoughlin 已提交
6388

6389 6390 6391 6392 6393
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_NET_NAME) ||
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
        if (qemuAssignDeviceNetAlias(vm->def, net, -1) < 0)
            goto cleanup;
    }
M
Mark McLoughlin 已提交
6394

6395 6396 6397 6398
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &net->info) < 0)
        goto cleanup;

6399
    vlan = qemuDomainNetVLAN(net);
M
Mark McLoughlin 已提交
6400

6401
    if (vlan < 0) {
6402 6403
        qemuReportError(VIR_ERR_NO_SUPPORT, "%s",
                        _("Unable to attach network devices without vlan"));
6404 6405 6406
        goto cleanup;
    }

6407
    if (tapfd != -1) {
6408
        if (virAsprintf(&tapfd_name, "fd-%s", net->info.alias) < 0)
6409 6410
            goto no_memory;

6411
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
6412
        if (qemuMonitorSendFileHandle(priv->mon, tapfd_name, tapfd) < 0) {
6413
            qemuDomainObjExitMonitorWithDriver(driver, vm);
6414
            goto cleanup;
6415
        }
6416
        qemuDomainObjExitMonitorWithDriver(driver, vm);
6417 6418
    }

6419
    /* FIXME - need to support vhost-net here (5th arg) */
6420
    if (!(netstr = qemuBuildHostNetStr(net, ' ',
6421
                                       vlan, tapfd_name, 0)))
6422
        goto try_tapfd_close;
M
Mark McLoughlin 已提交
6423

6424
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6425
    if (qemuMonitorAddHostNetwork(priv->mon, netstr) < 0) {
6426
        qemuDomainObjExitMonitorWithDriver(driver, vm);
6427
        goto try_tapfd_close;
6428
    }
6429
    qemuDomainObjExitMonitorWithDriver(driver, vm);
M
Mark McLoughlin 已提交
6430

6431 6432 6433
    if (tapfd != -1)
        close(tapfd);
    tapfd = -1;
M
Mark McLoughlin 已提交
6434

6435
    if (!(nicstr = qemuBuildNicStr(net, NULL, vlan)))
6436
        goto try_remove;
M
Mark McLoughlin 已提交
6437

6438
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6439
    if (qemuMonitorAddPCINetwork(priv->mon, nicstr,
6440
                                 &guestAddr) < 0) {
6441
        qemuDomainObjExitMonitorWithDriver(driver, vm);
6442
        goto try_remove;
6443
    }
6444
    net->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
6445
    memcpy(&net->info.addr.pci, &guestAddr, sizeof(guestAddr));
6446
    qemuDomainObjExitMonitorWithDriver(driver, vm);
6447

6448
    ret = 0;
M
Mark McLoughlin 已提交
6449 6450 6451

    vm->def->nets[vm->def->nnets++] = net;

6452
cleanup:
6453 6454 6455 6456 6457 6458
    if ((ret != 0) &&
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (net->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &net->info) < 0)
        VIR_WARN0("Unable to release PCI address on NIC");

6459 6460 6461 6462 6463
    VIR_FREE(nicstr);
    VIR_FREE(netstr);
    VIR_FREE(tapfd_name);
    if (tapfd != -1)
        close(tapfd);
6464

6465
    return ret;
6466

6467
try_remove:
6468
    if (vlan < 0) {
6469
        VIR_WARN0(_("Unable to remove network backend"));
6470 6471 6472 6473
    } else {
        char *hostnet_name;
        if (virAsprintf(&hostnet_name, "host%s", net->info.alias) < 0)
            goto no_memory;
6474
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
6475
        if (qemuMonitorRemoveHostNetwork(priv->mon, vlan, hostnet_name) < 0)
6476
            VIR_WARN(_("Failed to remove network backend for vlan %d, net %s"),
6477
                     vlan, hostnet_name);
6478
        qemuDomainObjExitMonitorWithDriver(driver, vm);
6479
        VIR_FREE(hostnet_name);
6480
    }
6481
    goto cleanup;
6482

6483
try_tapfd_close:
6484
    if (tapfd_name) {
6485
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
6486
        if (qemuMonitorCloseFileHandle(priv->mon, tapfd_name) < 0)
6487
            VIR_WARN(_("Failed to close tapfd with '%s'"), tapfd_name);
6488
        qemuDomainObjExitMonitorWithDriver(driver, vm);
6489
    }
6490

6491 6492
    goto cleanup;

6493
no_memory:
6494
    virReportOOMError();
6495
    goto cleanup;
M
Mark McLoughlin 已提交
6496 6497
}

6498

6499
static int qemudDomainAttachHostPciDevice(struct qemud_driver *driver,
6500
                                          virDomainObjPtr vm,
6501 6502
                                          virDomainHostdevDefPtr hostdev,
                                          int qemuCmdFlags)
6503
{
6504
    qemuDomainObjPrivatePtr priv = vm->privateData;
6505
    pciDevice *pci;
6506
    int ret;
6507
    virDomainDevicePCIAddress guestAddr;
6508
    char *devstr = NULL;
6509 6510

    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs+1) < 0) {
6511
        virReportOOMError();
6512 6513 6514
        return -1;
    }

6515
    pci = pciGetDevice(hostdev->source.subsys.u.pci.domain,
6516 6517 6518
                       hostdev->source.subsys.u.pci.bus,
                       hostdev->source.subsys.u.pci.slot,
                       hostdev->source.subsys.u.pci.function);
6519
    if (!pci)
6520
        return -1;
6521

6522 6523 6524 6525
    if (!pciDeviceIsAssignable(pci, !driver->relaxedACS) ||
        (hostdev->managed && pciDettachDevice(pci) < 0) ||
        pciResetDevice(pci, driver->activePciHostdevs) < 0) {
        pciFreeDevice(pci);
6526 6527 6528
        return -1;
    }

6529 6530
    if (pciDeviceListAdd(driver->activePciHostdevs, pci) < 0) {
        pciFreeDevice(pci);
6531
        return -1;
6532 6533
    }

6534
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
6535 6536
        if (qemuAssignDeviceHostdevAlias(vm->def, hostdev, -1) < 0)
            goto error;
6537 6538 6539 6540 6541 6542
        if (qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &hostdev->info) < 0)
            goto error;

        if (!(devstr = qemuBuildPCIHostdevDevStr(hostdev)))
            goto error;
    }
6543

6544
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6545 6546 6547 6548 6549 6550
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)
        ret = qemuMonitorAddDevice(priv->mon, devstr);
    else
        ret = qemuMonitorAddPCIHostDevice(priv->mon,
                                          &hostdev->source.subsys.u.pci,
                                          &guestAddr);
6551
    qemuDomainObjExitMonitorWithDriver(driver, vm);
6552
    if (ret < 0)
6553
        goto error;
6554
    hostdev->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
6555
    memcpy(&hostdev->info.addr.pci, &guestAddr, sizeof(guestAddr));
6556 6557 6558

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;

6559 6560
    VIR_FREE(devstr);

6561
    return 0;
6562 6563

error:
6564 6565 6566 6567 6568
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (hostdev->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &hostdev->info) < 0)
        VIR_WARN0("Unable to release PCI address on host device");

6569
    VIR_FREE(devstr);
6570
    pciDeviceListDel(driver->activePciHostdevs, pci);
6571 6572

    return -1;
6573 6574
}

6575

6576
static int qemudDomainAttachHostUsbDevice(struct qemud_driver *driver,
M
Mark McLoughlin 已提交
6577
                                          virDomainObjPtr vm,
6578 6579
                                          virDomainHostdevDefPtr hostdev,
                                          int qemuCmdFlags)
6580 6581
{
    int ret;
6582
    qemuDomainObjPrivatePtr priv = vm->privateData;
6583 6584
    char *devstr = NULL;

6585 6586 6587 6588 6589 6590
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuAssignDeviceHostdevAlias(vm->def, hostdev, -1) < 0)
            goto error;
        if (!(devstr = qemuBuildUSBHostdevDevStr(hostdev)))
            goto error;
    }
6591

6592
    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs+1) < 0) {
6593
        virReportOOMError();
6594
        goto error;
6595
    }
6596

6597
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6598 6599 6600
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)
        ret = qemuMonitorAddDevice(priv->mon, devstr);
    else
6601
        ret = qemuMonitorAddUSBDeviceExact(priv->mon,
6602 6603
                                           hostdev->source.subsys.u.usb.bus,
                                           hostdev->source.subsys.u.usb.device);
6604
    qemuDomainObjExitMonitorWithDriver(driver, vm);
6605 6606 6607 6608
    if (ret < 0)
        goto error;

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;
6609

6610
    VIR_FREE(devstr);
6611

6612 6613 6614 6615 6616
    return 0;

error:
    VIR_FREE(devstr);
    return -1;
6617 6618
}

6619

6620
static int qemudDomainAttachHostDevice(struct qemud_driver *driver,
M
Mark McLoughlin 已提交
6621
                                       virDomainObjPtr vm,
6622 6623
                                       virDomainHostdevDefPtr hostdev,
                                       int qemuCmdFlags)
M
Mark McLoughlin 已提交
6624 6625
{
    if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS) {
6626 6627 6628
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        _("hostdev mode '%s' not supported"),
                        virDomainHostdevModeTypeToString(hostdev->mode));
M
Mark McLoughlin 已提交
6629 6630 6631
        return -1;
    }

6632 6633 6634 6635 6636 6637 6638 6639 6640 6641 6642 6643 6644 6645 6646 6647 6648
    /* Resolve USB product/vendor to bus/device */
    if (hostdev->source.subsys.type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB &&
        hostdev->source.subsys.u.usb.vendor) {
        usbDevice *usb
            = usbFindDevice(hostdev->source.subsys.u.usb.vendor,
                            hostdev->source.subsys.u.usb.product);

        if (!usb)
            return -1;

        hostdev->source.subsys.u.usb.bus = usbDeviceGetBus(usb);
        hostdev->source.subsys.u.usb.device = usbDeviceGetDevno(usb);

        usbFreeDevice(usb);
    }


6649
    if (driver->securityDriver &&
6650
        driver->securityDriver->domainSetSecurityHostdevLabel &&
6651
        driver->securityDriver->domainSetSecurityHostdevLabel(vm, hostdev) < 0)
6652
        return -1;
M
Mark McLoughlin 已提交
6653 6654

    switch (hostdev->source.subsys.type) {
6655
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
6656
        if (qemudDomainAttachHostPciDevice(driver, vm,
6657
                                           hostdev, qemuCmdFlags) < 0)
6658 6659 6660
            goto error;
        break;

M
Mark McLoughlin 已提交
6661
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
6662
        if (qemudDomainAttachHostUsbDevice(driver, vm,
6663
                                           hostdev, qemuCmdFlags) < 0)
6664 6665 6666
            goto error;
        break;

M
Mark McLoughlin 已提交
6667
    default:
6668 6669 6670
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        _("hostdev subsys type '%s' not supported"),
                        virDomainHostdevSubsysTypeToString(hostdev->source.subsys.type));
6671
        goto error;
M
Mark McLoughlin 已提交
6672
    }
6673 6674 6675 6676 6677 6678

    return 0;

error:
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityHostdevLabel &&
6679
        driver->securityDriver->domainRestoreSecurityHostdevLabel(vm, hostdev) < 0)
6680 6681 6682
        VIR_WARN0("Unable to restore host device labelling on hotplug fail");

    return -1;
M
Mark McLoughlin 已提交
6683 6684
}

6685

6686
static int qemudDomainAttachDevice(virDomainPtr dom,
6687 6688
                                   const char *xml)
{
6689 6690 6691
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    virDomainDeviceDefPtr dev = NULL;
6692
    unsigned long long qemuCmdFlags;
6693
    virCgroupPtr cgroup = NULL;
6694
    int ret = -1;
6695

6696
    qemuDriverLock(driver);
6697
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6698
    if (!vm) {
6699 6700
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
6701 6702
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
6703
        goto cleanup;
6704 6705
    }

6706 6707 6708
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
6709
    if (!virDomainObjIsActive(vm)) {
6710 6711
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("cannot attach device on inactive domain"));
6712
        goto endjob;
6713 6714
    }

6715
    dev = virDomainDeviceDefParse(driver->caps, vm->def, xml,
6716
                                  VIR_DOMAIN_XML_INACTIVE);
6717
    if (dev == NULL)
6718
        goto endjob;
6719

6720 6721 6722
    if (qemudExtractVersionInfo(vm->def->emulator,
                                NULL,
                                &qemuCmdFlags) < 0)
6723
        goto endjob;
6724

6725
    if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
6726
        if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
6727
            if (virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0) !=0 ) {
6728 6729 6730
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                _("Unable to find cgroup for %s\n"),
                                vm->def->name);
6731
                goto endjob;
6732 6733 6734 6735 6736
            }
            if (dev->data.disk->src != NULL &&
                dev->data.disk->type == VIR_DOMAIN_DISK_TYPE_BLOCK &&
                virCgroupAllowDevicePath(cgroup,
                                         dev->data.disk->src) < 0) {
6737 6738 6739
                qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                _("unable to allow device %s"),
                                dev->data.disk->src);
6740
                goto endjob;
6741 6742 6743
            }
        }

6744
        switch (dev->data.disk->device) {
6745 6746
        case VIR_DOMAIN_DISK_DEVICE_CDROM:
        case VIR_DOMAIN_DISK_DEVICE_FLOPPY:
6747
            ret = qemudDomainChangeEjectableMedia(driver, vm, dev->data.disk);
6748 6749
            if (ret == 0)
                dev->data.disk = NULL;
6750
            break;
6751

6752 6753
        case VIR_DOMAIN_DISK_DEVICE_DISK:
            if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_USB) {
6754
                ret = qemudDomainAttachUsbMassstorageDevice(driver, vm,
6755
                                                            dev->data.disk, qemuCmdFlags);
6756 6757
                if (ret == 0)
                    dev->data.disk = NULL;
6758
            } else if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_VIRTIO) {
6759
                ret = qemudDomainAttachPciDiskDevice(driver, vm,
6760
                                                     dev->data.disk, qemuCmdFlags);
6761 6762
                if (ret == 0)
                    dev->data.disk = NULL;
6763
            } else if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_SCSI) {
6764
                ret = qemudDomainAttachSCSIDisk(driver, vm,
6765
                                                dev->data.disk, qemuCmdFlags);
6766 6767
                if (ret == 0)
                    dev->data.disk = NULL;
6768
            } else {
6769 6770 6771
                qemuReportError(VIR_ERR_NO_SUPPORT,
                                _("disk bus '%s' cannot be hotplugged."),
                                virDomainDiskBusTypeToString(dev->data.disk->bus));
6772
                /* fallthrough */
6773 6774
            }
            break;
6775

6776
        default:
6777 6778 6779
            qemuReportError(VIR_ERR_NO_SUPPORT,
                            _("disk device type '%s' cannot be hotplugged"),
                            virDomainDiskDeviceTypeToString(dev->data.disk->device));
6780 6781
            /* Fallthrough */
        }
6782
        if (ret != 0 && cgroup) {
6783 6784
            virCgroupDenyDevicePath(cgroup,
                                    dev->data.disk->src);
6785
        }
6786 6787
    } else if (dev->type == VIR_DOMAIN_DEVICE_CONTROLLER) {
        if (dev->data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_SCSI) {
6788
            ret = qemudDomainAttachPciControllerDevice(driver, vm,
6789
                                                       dev->data.controller, qemuCmdFlags);
6790 6791
            if (ret == 0)
                dev->data.controller = NULL;
6792
        } else {
6793 6794 6795
            qemuReportError(VIR_ERR_NO_SUPPORT,
                            _("disk controller bus '%s' cannot be hotplugged."),
                            virDomainControllerTypeToString(dev->data.controller->type));
6796 6797
            /* fallthrough */
        }
M
Mark McLoughlin 已提交
6798
    } else if (dev->type == VIR_DOMAIN_DEVICE_NET) {
6799 6800
        ret = qemudDomainAttachNetDevice(dom->conn, driver, vm,
                                         dev->data.net, qemuCmdFlags);
6801 6802
        if (ret == 0)
            dev->data.net = NULL;
M
Mark McLoughlin 已提交
6803
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
6804
        ret = qemudDomainAttachHostDevice(driver, vm,
6805
                                          dev->data.hostdev, qemuCmdFlags);
6806 6807
        if (ret == 0)
            dev->data.hostdev = NULL;
6808
    } else {
6809 6810 6811
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        _("device type '%s' cannot be attached"),
                        virDomainDeviceTypeToString(dev->type));
6812
        goto endjob;
6813 6814
    }

6815
    if (!ret && virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
6816 6817
        ret = -1;

6818
endjob:
6819 6820
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
6821

6822
cleanup:
6823 6824 6825
    if (cgroup)
        virCgroupFree(&cgroup);

6826
    virDomainDeviceDefFree(dev);
6827 6828
    if (vm)
        virDomainObjUnlock(vm);
6829
    qemuDriverUnlock(driver);
6830 6831 6832
    return ret;
}

6833 6834 6835 6836
static int qemudDomainAttachDeviceFlags(virDomainPtr dom,
                                        const char *xml,
                                        unsigned int flags) {
    if (flags & VIR_DOMAIN_DEVICE_MODIFY_CONFIG) {
6837 6838
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("cannot modify the persistent configuration of a domain"));
6839 6840 6841 6842 6843 6844
        return -1;
    }

    return qemudDomainAttachDevice(dom, xml);
}

6845
static int qemudDomainDetachPciDiskDevice(struct qemud_driver *driver,
6846
                                          virDomainObjPtr vm,
6847 6848
                                          virDomainDeviceDefPtr dev,
                                          unsigned long long qemuCmdFlags)
6849 6850 6851
{
    int i, ret = -1;
    virDomainDiskDefPtr detach = NULL;
6852
    qemuDomainObjPrivatePtr priv = vm->privateData;
6853 6854 6855 6856 6857 6858 6859 6860 6861

    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (STREQ(vm->def->disks[i]->dst, dev->data.disk->dst)) {
            detach = vm->def->disks[i];
            break;
        }
    }

    if (!detach) {
6862 6863
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("disk %s not found"), dev->data.disk->dst);
6864
        goto cleanup;
6865 6866
    }

6867 6868
    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
6869 6870
        qemuReportError(VIR_ERR_OPERATION_FAILED, "%s",
                        _("device cannot be detached without a PCI address"));
6871
        goto cleanup;
6872 6873
    }

6874
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6875 6876 6877 6878 6879 6880 6881 6882 6883 6884 6885
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuMonitorDelDevice(priv->mon, detach->info.alias) < 0) {
            qemuDomainObjExitMonitor(vm);
            goto cleanup;
        }
    } else {
        if (qemuMonitorRemovePCIDevice(priv->mon,
                                       &detach->info.addr.pci) < 0) {
            qemuDomainObjExitMonitor(vm);
            goto cleanup;
        }
6886
    }
6887
    qemuDomainObjExitMonitorWithDriver(driver, vm);
6888

6889 6890 6891 6892 6893 6894 6895 6896 6897 6898
    if (vm->def->ndisks > 1) {
        memmove(vm->def->disks + i,
                vm->def->disks + i + 1,
                sizeof(*vm->def->disks) *
                (vm->def->ndisks - (i + 1)));
        vm->def->ndisks--;
        if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks) < 0) {
            /* ignore, harmless */
        }
    } else {
6899
        VIR_FREE(vm->def->disks);
6900
        vm->def->ndisks = 0;
6901
    }
6902
    virDomainDiskDefFree(detach);
6903

6904 6905
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
6906
        driver->securityDriver->domainRestoreSecurityImageLabel(vm, dev->data.disk) < 0)
6907 6908
        VIR_WARN("Unable to restore security label on %s", dev->data.disk->src);

6909
    ret = 0;
6910 6911

cleanup:
6912 6913 6914
    return ret;
}

6915
static int qemudDomainDetachPciControllerDevice(struct qemud_driver *driver,
6916
                                                virDomainObjPtr vm,
6917 6918
                                                virDomainDeviceDefPtr dev,
                                                unsigned long long qemuCmdFlags)
6919 6920 6921 6922 6923 6924 6925 6926 6927 6928 6929 6930 6931 6932
{
    int i, ret = -1;
    virDomainControllerDefPtr detach = NULL;
    qemuDomainObjPrivatePtr priv = vm->privateData;

    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
        if ((vm->def->controllers[i]->type == dev->data.controller->type) &&
            (vm->def->controllers[i]->idx == dev->data.controller->idx)) {
            detach = vm->def->controllers[i];
            break;
        }
    }

    if (!detach) {
6933 6934 6935 6936
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("disk controller %s:%d not found"),
                        virDomainControllerTypeToString(dev->data.controller->type),
                        dev->data.controller->idx);
6937 6938 6939 6940 6941
        goto cleanup;
    }

    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
6942 6943
        qemuReportError(VIR_ERR_OPERATION_FAILED, "%s",
                        _("device cannot be detached without a PCI address"));
6944 6945 6946
        goto cleanup;
    }

6947 6948 6949 6950 6951
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuAssignDeviceControllerAlias(detach) < 0)
            goto cleanup;
    }

6952
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6953 6954 6955 6956 6957 6958 6959 6960 6961 6962 6963
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuMonitorDelDevice(priv->mon, detach->info.alias)) {
            qemuDomainObjExitMonitor(vm);
            goto cleanup;
        }
    } else {
        if (qemuMonitorRemovePCIDevice(priv->mon,
                                       &detach->info.addr.pci) < 0) {
            qemuDomainObjExitMonitor(vm);
            goto cleanup;
        }
6964 6965 6966 6967 6968 6969 6970 6971 6972 6973 6974 6975 6976 6977 6978 6979
    }
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    if (vm->def->ncontrollers > 1) {
        memmove(vm->def->controllers + i,
                vm->def->controllers + i + 1,
                sizeof(*vm->def->controllers) *
                (vm->def->ncontrollers - (i + 1)));
        vm->def->ncontrollers--;
        if (VIR_REALLOC_N(vm->def->controllers, vm->def->ncontrollers) < 0) {
            /* ignore, harmless */
        }
    } else {
        VIR_FREE(vm->def->controllers);
        vm->def->ncontrollers = 0;
    }
6980 6981 6982 6983 6984

    if (qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &detach->info) < 0) {
        VIR_WARN0("Unable to release PCI address on controller");
    }

6985 6986 6987 6988 6989 6990 6991 6992
    virDomainControllerDefFree(detach);

    ret = 0;

cleanup:
    return ret;
}

6993
static int
6994
qemudDomainDetachNetDevice(struct qemud_driver *driver,
6995
                           virDomainObjPtr vm,
6996 6997
                           virDomainDeviceDefPtr dev,
                           unsigned long long qemuCmdFlags)
6998 6999 7000
{
    int i, ret = -1;
    virDomainNetDefPtr detach = NULL;
7001
    qemuDomainObjPrivatePtr priv = vm->privateData;
7002 7003
    int vlan;
    char *hostnet_name = NULL;
7004 7005 7006 7007 7008 7009 7010 7011 7012 7013 7014

    for (i = 0 ; i < vm->def->nnets ; i++) {
        virDomainNetDefPtr net = vm->def->nets[i];

        if (!memcmp(net->mac, dev->data.net->mac,  sizeof(net->mac))) {
            detach = net;
            break;
        }
    }

    if (!detach) {
7015 7016 7017 7018 7019
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("network device %02x:%02x:%02x:%02x:%02x:%02x not found"),
                        dev->data.net->mac[0], dev->data.net->mac[1],
                        dev->data.net->mac[2], dev->data.net->mac[3],
                        dev->data.net->mac[4], dev->data.net->mac[5]);
7020 7021 7022
        goto cleanup;
    }

7023 7024
    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
7025 7026
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("device cannot be detached without a PCI address"));
7027 7028 7029
        goto cleanup;
    }

7030
    if ((vlan = qemuDomainNetVLAN(detach)) < 0) {
7031 7032
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("unable to determine original VLAN"));
7033 7034 7035 7036
        goto cleanup;
    }

    if (virAsprintf(&hostnet_name, "host%s", detach->info.alias) < 0) {
7037
        virReportOOMError();
7038 7039 7040
        goto cleanup;
    }

7041
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
7042 7043 7044 7045 7046 7047 7048 7049 7050 7051 7052
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuMonitorDelDevice(priv->mon, detach->info.alias) < 0) {
            qemuDomainObjExitMonitor(vm);
            goto cleanup;
        }
    } else {
        if (qemuMonitorRemovePCIDevice(priv->mon,
                                       &detach->info.addr.pci) < 0) {
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            goto cleanup;
        }
7053
    }
7054

7055
    if (qemuMonitorRemoveHostNetwork(priv->mon, vlan, hostnet_name) < 0) {
7056
        qemuDomainObjExitMonitorWithDriver(driver, vm);
7057
        goto cleanup;
7058
    }
7059
    qemuDomainObjExitMonitorWithDriver(driver, vm);
7060

7061 7062
#if WITH_MACVTAP
    if (detach->type == VIR_DOMAIN_NET_TYPE_DIRECT) {
S
Stefan Berger 已提交
7063 7064
        if (detach->ifname)
            delMacvtap(detach->ifname);
7065 7066 7067
    }
#endif

7068
    if ((driver->macFilter) && (detach->ifname != NULL)) {
7069
        if ((errno = networkDisallowMacOnPort(driver,
7070 7071
                                              detach->ifname,
                                              detach->mac))) {
7072
            virReportSystemError(errno,
7073 7074 7075 7076 7077
             _("failed to remove ebtables rule on  '%s'"),
                                 detach->ifname);
        }
    }

7078 7079 7080 7081 7082 7083 7084 7085 7086 7087
    if (vm->def->nnets > 1) {
        memmove(vm->def->nets + i,
                vm->def->nets + i + 1,
                sizeof(*vm->def->nets) *
                (vm->def->nnets - (i + 1)));
        vm->def->nnets--;
        if (VIR_REALLOC_N(vm->def->nets, vm->def->nnets) < 0) {
            /* ignore, harmless */
        }
    } else {
7088
        VIR_FREE(vm->def->nets);
7089
        vm->def->nnets = 0;
7090
    }
7091
    virDomainNetDefFree(detach);
7092

7093 7094 7095
    ret = 0;

cleanup:
7096
    VIR_FREE(hostnet_name);
7097 7098 7099
    return ret;
}

7100
static int qemudDomainDetachHostPciDevice(struct qemud_driver *driver,
7101
                                          virDomainObjPtr vm,
7102 7103
                                          virDomainDeviceDefPtr dev,
                                          unsigned long long qemuCmdFlags)
7104
{
7105
    virDomainHostdevDefPtr detach = NULL;
7106
    qemuDomainObjPrivatePtr priv = vm->privateData;
7107
    int i, ret;
7108
    pciDevice *pci;
7109 7110

    for (i = 0 ; i < vm->def->nhostdevs ; i++) {
7111 7112 7113 7114
        if (vm->def->hostdevs[i]->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS ||
            vm->def->hostdevs[i]->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI)
            continue;

7115 7116 7117 7118 7119 7120 7121 7122 7123 7124 7125 7126 7127 7128 7129
        unsigned domain   = vm->def->hostdevs[i]->source.subsys.u.pci.domain;
        unsigned bus      = vm->def->hostdevs[i]->source.subsys.u.pci.bus;
        unsigned slot     = vm->def->hostdevs[i]->source.subsys.u.pci.slot;
        unsigned function = vm->def->hostdevs[i]->source.subsys.u.pci.function;

        if (dev->data.hostdev->source.subsys.u.pci.domain   == domain &&
            dev->data.hostdev->source.subsys.u.pci.bus      == bus &&
            dev->data.hostdev->source.subsys.u.pci.slot     == slot &&
            dev->data.hostdev->source.subsys.u.pci.function == function) {
            detach = vm->def->hostdevs[i];
            break;
        }
    }

    if (!detach) {
7130 7131 7132 7133 7134 7135
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("host pci device %.4x:%.2x:%.2x.%.1x not found"),
                        dev->data.hostdev->source.subsys.u.pci.domain,
                        dev->data.hostdev->source.subsys.u.pci.bus,
                        dev->data.hostdev->source.subsys.u.pci.slot,
                        dev->data.hostdev->source.subsys.u.pci.function);
7136 7137 7138
        return -1;
    }

7139 7140
    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
7141 7142
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("device cannot be detached without a PCI address"));
7143 7144 7145
        return -1;
    }

7146
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
7147 7148 7149 7150 7151 7152 7153 7154 7155 7156 7157
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuMonitorDelDevice(priv->mon, detach->info.alias) < 0) {
            qemuDomainObjExitMonitor(vm);
            return -1;
        }
    } else {
        if (qemuMonitorRemovePCIDevice(priv->mon,
                                       &detach->info.addr.pci) < 0) {
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            return -1;
        }
7158
    }
7159
    qemuDomainObjExitMonitorWithDriver(driver, vm);
7160 7161 7162

    ret = 0;

7163
    pci = pciGetDevice(detach->source.subsys.u.pci.domain,
7164 7165 7166 7167 7168 7169
                       detach->source.subsys.u.pci.bus,
                       detach->source.subsys.u.pci.slot,
                       detach->source.subsys.u.pci.function);
    if (!pci)
        ret = -1;
    else {
7170
        pciDeviceSetManaged(pci, detach->managed);
7171 7172
        pciDeviceListDel(driver->activePciHostdevs, pci);
        if (pciResetDevice(pci, driver->activePciHostdevs) < 0)
7173
            ret = -1;
7174
        qemudReattachManagedDevice(pci);
7175
        pciFreeDevice(pci);
7176 7177
    }

7178 7179 7180 7181 7182 7183 7184 7185 7186 7187 7188 7189
    if (vm->def->nhostdevs > 1) {
        memmove(vm->def->hostdevs + i,
                vm->def->hostdevs + i + 1,
                sizeof(*vm->def->hostdevs) *
                (vm->def->nhostdevs - (i + 1)));
        vm->def->nhostdevs--;
        if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs) < 0) {
            /* ignore, harmless */
        }
    } else {
        VIR_FREE(vm->def->hostdevs);
        vm->def->nhostdevs = 0;
7190
    }
7191
    virDomainHostdevDefFree(detach);
7192 7193 7194 7195

    return ret;
}

7196 7197 7198 7199 7200 7201 7202 7203 7204 7205 7206 7207 7208 7209 7210 7211
static int qemudDomainDetachHostUsbDevice(struct qemud_driver *driver,
                                          virDomainObjPtr vm,
                                          virDomainDeviceDefPtr dev,
                                          unsigned long long qemuCmdFlags)
{
    virDomainHostdevDefPtr detach = NULL;
    qemuDomainObjPrivatePtr priv = vm->privateData;
    int i, ret;

    for (i = 0 ; i < vm->def->nhostdevs ; i++) {
        if (vm->def->hostdevs[i]->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS ||
            vm->def->hostdevs[i]->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB)
            continue;

        unsigned bus = vm->def->hostdevs[i]->source.subsys.u.usb.bus;
        unsigned device = vm->def->hostdevs[i]->source.subsys.u.usb.device;
7212 7213 7214 7215 7216 7217 7218 7219 7220 7221 7222 7223 7224 7225 7226 7227
        unsigned product = vm->def->hostdevs[i]->source.subsys.u.usb.product;
        unsigned vendor = vm->def->hostdevs[i]->source.subsys.u.usb.vendor;

        if (dev->data.hostdev->source.subsys.u.usb.bus &&
            dev->data.hostdev->source.subsys.u.usb.device) {
            if (dev->data.hostdev->source.subsys.u.usb.bus == bus &&
                dev->data.hostdev->source.subsys.u.usb.device == device) {
                detach = vm->def->hostdevs[i];
                break;
            }
        } else {
            if (dev->data.hostdev->source.subsys.u.usb.product == product &&
                dev->data.hostdev->source.subsys.u.usb.vendor == vendor) {
                detach = vm->def->hostdevs[i];
                break;
            }
7228 7229 7230 7231 7232 7233 7234 7235 7236 7237 7238 7239 7240 7241 7242 7243 7244 7245 7246 7247 7248 7249 7250 7251 7252 7253 7254 7255 7256 7257 7258 7259 7260 7261 7262 7263 7264 7265 7266 7267 7268 7269 7270 7271 7272 7273 7274 7275 7276 7277
        }
    }

    if (!detach) {
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("host usb device %03d.%03d not found"),
                        dev->data.hostdev->source.subsys.u.usb.bus,
                        dev->data.hostdev->source.subsys.u.usb.device);
        return -1;
    }

    if (!detach->info.alias) {
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("device cannot be detached without a device alias"));
        return -1;
    }

    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("device cannot be detached with this QEMU version"));
        return -1;
    }

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    if (qemuMonitorDelDevice(priv->mon, detach->info.alias) < 0) {
        qemuDomainObjExitMonitorWithDriver(driver, vm);
        return -1;
    }
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    ret = 0;

    if (vm->def->nhostdevs > 1) {
        memmove(vm->def->hostdevs + i,
                vm->def->hostdevs + i + 1,
                sizeof(*vm->def->hostdevs) *
                (vm->def->nhostdevs - (i + 1)));
        vm->def->nhostdevs--;
        if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs) < 0) {
            /* ignore, harmless */
        }
    } else {
        VIR_FREE(vm->def->hostdevs);
        vm->def->nhostdevs = 0;
    }
    virDomainHostdevDefFree(detach);

    return ret;
}

7278
static int qemudDomainDetachHostDevice(struct qemud_driver *driver,
7279
                                       virDomainObjPtr vm,
7280 7281
                                       virDomainDeviceDefPtr dev,
                                       unsigned long long qemuCmdFlags)
7282 7283 7284 7285 7286
{
    virDomainHostdevDefPtr hostdev = dev->data.hostdev;
    int ret;

    if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS) {
7287 7288 7289
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        _("hostdev mode '%s' not supported"),
                        virDomainHostdevModeTypeToString(hostdev->mode));
7290 7291 7292 7293 7294
        return -1;
    }

    switch (hostdev->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
7295
        ret = qemudDomainDetachHostPciDevice(driver, vm, dev, qemuCmdFlags);
7296
        break;
7297 7298 7299
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
        ret = qemudDomainDetachHostUsbDevice(driver, vm, dev, qemuCmdFlags);
        break;
7300
    default:
7301 7302 7303
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        _("hostdev subsys type '%s' not supported"),
                        virDomainHostdevSubsysTypeToString(hostdev->source.subsys.type));
7304 7305 7306
        return -1;
    }

7307
    if (driver->securityDriver &&
7308
        driver->securityDriver->domainRestoreSecurityHostdevLabel &&
7309
        driver->securityDriver->domainRestoreSecurityHostdevLabel(vm, dev->data.hostdev) < 0)
7310
        VIR_WARN0("Failed to restore host device labelling");
7311

7312 7313 7314
    return ret;
}

7315 7316
static int qemudDomainDetachDevice(virDomainPtr dom,
                                   const char *xml) {
7317 7318
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
7319
    unsigned long long qemuCmdFlags;
7320 7321
    virDomainDeviceDefPtr dev = NULL;
    int ret = -1;
7322

7323
    qemuDriverLock(driver);
7324
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
7325
    if (!vm) {
7326 7327
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
7328 7329
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
7330
        goto cleanup;
7331 7332
    }

7333 7334 7335
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
7336
    if (!virDomainObjIsActive(vm)) {
7337 7338
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("cannot detach device on inactive domain"));
7339
        goto endjob;
7340 7341
    }

7342
    dev = virDomainDeviceDefParse(driver->caps, vm->def, xml,
7343
                                  VIR_DOMAIN_XML_INACTIVE);
7344
    if (dev == NULL)
7345
        goto endjob;
7346

7347 7348 7349 7350
    if (qemudExtractVersionInfo(vm->def->emulator,
                                NULL,
                                &qemuCmdFlags) < 0)
        goto endjob;
7351 7352 7353

    if (dev->type == VIR_DOMAIN_DEVICE_DISK &&
        dev->data.disk->device == VIR_DOMAIN_DISK_DEVICE_DISK &&
7354
        dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_VIRTIO) {
7355
        ret = qemudDomainDetachPciDiskDevice(driver, vm, dev, qemuCmdFlags);
7356
    } else if (dev->type == VIR_DOMAIN_DEVICE_NET) {
7357
        ret = qemudDomainDetachNetDevice(driver, vm, dev, qemuCmdFlags);
7358 7359
    } else if (dev->type == VIR_DOMAIN_DEVICE_CONTROLLER) {
        if (dev->data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_SCSI) {
7360 7361
            ret = qemudDomainDetachPciControllerDevice(driver, vm, dev,
                                                       qemuCmdFlags);
7362
        } else {
7363 7364 7365
            qemuReportError(VIR_ERR_NO_SUPPORT,
                            _("disk controller bus '%s' cannot be hotunplugged."),
                            virDomainControllerTypeToString(dev->data.controller->type));
7366 7367
            /* fallthrough */
        }
7368
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
7369
        ret = qemudDomainDetachHostDevice(driver, vm, dev, qemuCmdFlags);
7370
    } else {
7371 7372
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        "%s", _("This type of device cannot be hot unplugged"));
7373
    }
7374

7375
    if (!ret && virDomainSaveStatus(driver->caps, driver->stateDir, vm) < 0)
7376 7377
        ret = -1;

7378
endjob:
7379 7380
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
7381

7382 7383
cleanup:
    virDomainDeviceDefFree(dev);
7384 7385
    if (vm)
        virDomainObjUnlock(vm);
7386
    qemuDriverUnlock(driver);
7387 7388 7389
    return ret;
}

7390 7391 7392 7393
static int qemudDomainDetachDeviceFlags(virDomainPtr dom,
                                        const char *xml,
                                        unsigned int flags) {
    if (flags & VIR_DOMAIN_DEVICE_MODIFY_CONFIG) {
7394 7395
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("cannot modify the persistent configuration of a domain"));
7396 7397 7398 7399 7400 7401
        return -1;
    }

    return qemudDomainDetachDevice(dom, xml);
}

7402
static int qemudDomainGetAutostart(virDomainPtr dom,
7403
                                   int *autostart) {
7404 7405 7406
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
7407

7408
    qemuDriverLock(driver);
7409
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
7410 7411
    qemuDriverUnlock(driver);

7412
    if (!vm) {
7413 7414
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
7415 7416
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
7417
        goto cleanup;
7418 7419 7420
    }

    *autostart = vm->autostart;
7421
    ret = 0;
7422

7423
cleanup:
7424 7425
    if (vm)
        virDomainObjUnlock(vm);
7426
    return ret;
7427 7428
}

7429
static int qemudDomainSetAutostart(virDomainPtr dom,
7430
                                   int autostart) {
7431 7432
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
7433 7434
    char *configFile = NULL, *autostartLink = NULL;
    int ret = -1;
7435

7436
    qemuDriverLock(driver);
7437
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
7438

7439
    if (!vm) {
7440 7441
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
7442 7443
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
7444
        goto cleanup;
7445 7446
    }

7447
    if (!vm->persistent) {
7448 7449
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("cannot set autostart for transient domain"));
7450
        goto cleanup;
7451 7452
    }

7453 7454
    autostart = (autostart != 0);

7455
    if (vm->autostart != autostart) {
7456
        if ((configFile = virDomainConfigFile(driver->configDir, vm->def->name)) == NULL)
7457
            goto cleanup;
7458
        if ((autostartLink = virDomainConfigFile(driver->autostartDir, vm->def->name)) == NULL)
7459
            goto cleanup;
7460

7461 7462
        if (autostart) {
            int err;
7463

7464
            if ((err = virFileMakePath(driver->autostartDir))) {
7465
                virReportSystemError(err,
7466 7467
                                     _("cannot create autostart directory %s"),
                                     driver->autostartDir);
7468 7469
                goto cleanup;
            }
7470

7471
            if (symlink(configFile, autostartLink) < 0) {
7472
                virReportSystemError(errno,
7473 7474
                                     _("Failed to create symlink '%s to '%s'"),
                                     autostartLink, configFile);
7475 7476 7477 7478
                goto cleanup;
            }
        } else {
            if (unlink(autostartLink) < 0 && errno != ENOENT && errno != ENOTDIR) {
7479
                virReportSystemError(errno,
7480 7481
                                     _("Failed to delete symlink '%s'"),
                                     autostartLink);
7482 7483
                goto cleanup;
            }
7484 7485
        }

7486
        vm->autostart = autostart;
7487
    }
7488
    ret = 0;
7489

7490 7491 7492
cleanup:
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
7493 7494
    if (vm)
        virDomainObjUnlock(vm);
7495
    qemuDriverUnlock(driver);
7496
    return ret;
7497 7498
}

7499 7500 7501 7502 7503

static char *qemuGetSchedulerType(virDomainPtr dom,
                                  int *nparams)
{
    struct qemud_driver *driver = dom->conn->privateData;
7504
    char *ret = NULL;
7505

7506
    qemuDriverLock(driver);
7507
    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
7508 7509
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        __FUNCTION__);
7510
        goto cleanup;
7511 7512 7513 7514 7515 7516 7517
    }

    if (nparams)
        *nparams = 1;

    ret = strdup("posix");
    if (!ret)
7518
        virReportOOMError();
7519 7520 7521

cleanup:
    qemuDriverUnlock(driver);
7522 7523 7524 7525 7526 7527 7528 7529 7530 7531 7532 7533 7534
    return ret;
}

static int qemuSetSchedulerParameters(virDomainPtr dom,
                                      virSchedParameterPtr params,
                                      int nparams)
{
    struct qemud_driver *driver = dom->conn->privateData;
    int i;
    virCgroupPtr group = NULL;
    virDomainObjPtr vm = NULL;
    int ret = -1;

7535
    qemuDriverLock(driver);
7536
    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
7537 7538
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        __FUNCTION__);
7539
        goto cleanup;
7540 7541 7542 7543 7544
    }

    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (vm == NULL) {
7545 7546
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("No such domain %s"), dom->uuid);
7547 7548 7549 7550
        goto cleanup;
    }

    if (virCgroupForDomain(driver->cgroup, vm->def->name, &group, 0) != 0) {
7551 7552
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("cannot find cgroup for domain %s"), vm->def->name);
7553 7554 7555 7556 7557 7558 7559 7560 7561
        goto cleanup;
    }

    for (i = 0; i < nparams; i++) {
        virSchedParameterPtr param = &params[i];

        if (STREQ(param->field, "cpu_shares")) {
            int rc;
            if (param->type != VIR_DOMAIN_SCHED_FIELD_ULLONG) {
7562 7563
                qemuReportError(VIR_ERR_INVALID_ARG, "%s",
                                _("invalid type for cpu_shares tunable, expected a 'ullong'"));
7564 7565 7566 7567 7568
                goto cleanup;
            }

            rc = virCgroupSetCpuShares(group, params[i].value.ul);
            if (rc != 0) {
7569
                virReportSystemError(-rc, "%s",
7570 7571 7572 7573
                                     _("unable to set cpu shares tunable"));
                goto cleanup;
            }
        } else {
7574 7575
            qemuReportError(VIR_ERR_INVALID_ARG,
                            _("Invalid parameter `%s'"), param->field);
7576 7577 7578 7579 7580 7581 7582 7583 7584
            goto cleanup;
        }
    }
    ret = 0;

cleanup:
    virCgroupFree(&group);
    if (vm)
        virDomainObjUnlock(vm);
7585
    qemuDriverUnlock(driver);
7586 7587 7588 7589 7590 7591 7592 7593 7594 7595 7596 7597 7598 7599
    return ret;
}

static int qemuGetSchedulerParameters(virDomainPtr dom,
                                      virSchedParameterPtr params,
                                      int *nparams)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virCgroupPtr group = NULL;
    virDomainObjPtr vm = NULL;
    unsigned long long val;
    int ret = -1;
    int rc;

7600
    qemuDriverLock(driver);
7601
    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
7602 7603
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        __FUNCTION__);
7604
        goto cleanup;
7605 7606 7607
    }

    if ((*nparams) != 1) {
7608 7609
        qemuReportError(VIR_ERR_INVALID_ARG,
                        "%s", _("Invalid parameter count"));
7610
        goto cleanup;
7611 7612 7613 7614 7615
    }

    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (vm == NULL) {
7616 7617
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("No such domain %s"), dom->uuid);
7618 7619 7620 7621
        goto cleanup;
    }

    if (virCgroupForDomain(driver->cgroup, vm->def->name, &group, 0) != 0) {
7622 7623
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("cannot find cgroup for domain %s"), vm->def->name);
7624 7625 7626 7627 7628
        goto cleanup;
    }

    rc = virCgroupGetCpuShares(group, &val);
    if (rc != 0) {
7629
        virReportSystemError(-rc, "%s",
7630 7631 7632 7633 7634
                             _("unable to get cpu shares tunable"));
        goto cleanup;
    }
    params[0].value.ul = val;
    params[0].type = VIR_DOMAIN_SCHED_FIELD_ULLONG;
C
Chris Lalancette 已提交
7635
    if (virStrcpyStatic(params[0].field, "cpu_shares") == NULL) {
7636 7637
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("Field cpu_shares too long for destination"));
C
Chris Lalancette 已提交
7638 7639
        goto cleanup;
    }
7640 7641 7642 7643 7644 7645 7646

    ret = 0;

cleanup:
    virCgroupFree(&group);
    if (vm)
        virDomainObjUnlock(vm);
7647
    qemuDriverUnlock(driver);
7648 7649 7650 7651
    return ret;
}


7652 7653 7654 7655 7656 7657 7658 7659 7660
/* This uses the 'info blockstats' monitor command which was
 * integrated into both qemu & kvm in late 2007.  If the command is
 * not supported we detect this and return the appropriate error.
 */
static int
qemudDomainBlockStats (virDomainPtr dom,
                       const char *path,
                       struct _virDomainBlockStats *stats)
{
7661
    struct qemud_driver *driver = dom->conn->privateData;
7662
    int i, ret = -1;
7663
    virDomainObjPtr vm;
7664
    virDomainDiskDefPtr disk = NULL;
7665

7666
    qemuDriverLock(driver);
7667
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
7668
    qemuDriverUnlock(driver);
7669
    if (!vm) {
7670 7671
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
7672 7673
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
7674
        goto cleanup;
7675
    }
7676 7677 7678 7679

    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
7680
    if (!virDomainObjIsActive (vm)) {
7681 7682
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
7683
        goto endjob;
7684 7685
    }

7686 7687 7688 7689 7690 7691 7692 7693
    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (STREQ(path, vm->def->disks[i]->dst)) {
            disk = vm->def->disks[i];
            break;
        }
    }

    if (!disk) {
7694 7695
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("invalid path: %s"), path);
7696
        goto endjob;
7697 7698
    }

7699
    if (!disk->info.alias) {
7700 7701
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("missing disk device alias name for %s"), disk->dst);
7702
        goto endjob;
7703
    }
7704

7705
    qemuDomainObjPrivatePtr priv = vm->privateData;
7706 7707
    qemuDomainObjEnterMonitor(vm);
    ret = qemuMonitorGetBlockStatsInfo(priv->mon,
7708
                                       disk->info.alias,
7709 7710 7711 7712 7713 7714
                                       &stats->rd_req,
                                       &stats->rd_bytes,
                                       &stats->wr_req,
                                       &stats->wr_bytes,
                                       &stats->errs);
    qemuDomainObjExitMonitor(vm);
7715

7716
endjob:
7717 7718
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
7719

7720
cleanup:
7721 7722
    if (vm)
        virDomainObjUnlock(vm);
7723
    return ret;
7724 7725
}

7726
#ifdef __linux__
7727 7728 7729 7730 7731
static int
qemudDomainInterfaceStats (virDomainPtr dom,
                           const char *path,
                           struct _virDomainInterfaceStats *stats)
{
7732 7733
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
7734
    int i;
7735
    int ret = -1;
7736

7737
    qemuDriverLock(driver);
7738
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
7739 7740
    qemuDriverUnlock(driver);

7741
    if (!vm) {
7742 7743
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
7744 7745
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
7746
        goto cleanup;
7747 7748
    }

D
Daniel P. Berrange 已提交
7749
    if (!virDomainObjIsActive(vm)) {
7750 7751
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
7752
        goto cleanup;
7753 7754 7755
    }

    /* Check the path is one of the domain's network interfaces. */
7756 7757
    for (i = 0 ; i < vm->def->nnets ; i++) {
        if (vm->def->nets[i]->ifname &&
7758 7759 7760 7761
            STREQ (vm->def->nets[i]->ifname, path)) {
            ret = 0;
            break;
        }
7762 7763
    }

7764
    if (ret == 0)
7765
        ret = linuxDomainInterfaceStats(path, stats);
7766
    else
7767 7768
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("invalid path, '%s' is not a known interface"), path);
7769

7770
cleanup:
7771 7772
    if (vm)
        virDomainObjUnlock(vm);
7773 7774
    return ret;
}
7775
#else
7776 7777 7778 7779
static int
qemudDomainInterfaceStats (virDomainPtr dom,
                           const char *path ATTRIBUTE_UNUSED,
                           struct _virDomainInterfaceStats *stats ATTRIBUTE_UNUSED)
7780 7781
    qemuReportError(VIR_ERR_NO_SUPPORT,
                    "%s", __FUNCTION__);
7782 7783
    return -1;
}
7784
#endif
7785

7786 7787 7788 7789 7790 7791 7792 7793 7794 7795 7796 7797 7798 7799 7800 7801
static int
qemudDomainMemoryStats (virDomainPtr dom,
                        struct _virDomainMemoryStat *stats,
                        unsigned int nr_stats)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    unsigned int ret = -1;

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);

    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
7802 7803
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
7804 7805 7806
        goto cleanup;
    }

7807 7808 7809
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

7810 7811 7812 7813 7814 7815
    if (virDomainObjIsActive(vm)) {
        qemuDomainObjPrivatePtr priv = vm->privateData;
        qemuDomainObjEnterMonitor(vm);
        ret = qemuMonitorTextGetMemoryStats(priv->mon, stats, nr_stats);
        qemuDomainObjExitMonitor(vm);
    } else {
7816 7817
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
7818 7819
    }

7820 7821 7822
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;

7823 7824 7825 7826 7827 7828
cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    return ret;
}

7829 7830 7831 7832 7833 7834 7835
static int
qemudDomainBlockPeek (virDomainPtr dom,
                      const char *path,
                      unsigned long long offset, size_t size,
                      void *buffer,
                      unsigned int flags ATTRIBUTE_UNUSED)
{
7836 7837 7838
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int fd = -1, ret = -1, i;
7839

7840
    qemuDriverLock(driver);
7841
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
7842 7843
    qemuDriverUnlock(driver);

7844
    if (!vm) {
7845 7846
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
7847 7848
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
7849
        goto cleanup;
7850 7851 7852
    }

    if (!path || path[0] == '\0') {
7853 7854
        qemuReportError(VIR_ERR_INVALID_ARG,
                        "%s", _("NULL or empty path"));
7855
        goto cleanup;
7856 7857 7858
    }

    /* Check the path belongs to this domain. */
7859 7860
    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (vm->def->disks[i]->src != NULL &&
7861 7862 7863 7864
            STREQ (vm->def->disks[i]->src, path)) {
            ret = 0;
            break;
        }
7865 7866
    }

7867 7868 7869 7870 7871
    if (ret == 0) {
        ret = -1;
        /* The path is correct, now try to open it and get its size. */
        fd = open (path, O_RDONLY);
        if (fd == -1) {
7872 7873
            virReportSystemError(errno,
                                 _("%s: failed to open"), path);
7874 7875
            goto cleanup;
        }
7876

7877 7878 7879 7880 7881 7882
        /* Seek and read. */
        /* NB. Because we configure with AC_SYS_LARGEFILE, off_t should
         * be 64 bits on all platforms.
         */
        if (lseek (fd, offset, SEEK_SET) == (off_t) -1 ||
            saferead (fd, buffer, size) == (ssize_t) -1) {
7883 7884
            virReportSystemError(errno,
                                 _("%s: failed to seek or read"), path);
7885 7886 7887 7888 7889
            goto cleanup;
        }

        ret = 0;
    } else {
7890 7891
        qemuReportError(VIR_ERR_INVALID_ARG,
                        "%s", _("invalid path"));
7892 7893
    }

7894 7895 7896
cleanup:
    if (fd >= 0)
        close (fd);
7897 7898
    if (vm)
        virDomainObjUnlock(vm);
7899 7900 7901
    return ret;
}

R
Richard W.M. Jones 已提交
7902 7903 7904 7905 7906 7907
static int
qemudDomainMemoryPeek (virDomainPtr dom,
                       unsigned long long offset, size_t size,
                       void *buffer,
                       unsigned int flags)
{
7908 7909
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
7910
    char *tmp = NULL;
R
Richard W.M. Jones 已提交
7911 7912
    int fd = -1, ret = -1;

7913
    qemuDriverLock(driver);
7914
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
7915
    qemuDriverUnlock(driver);
R
Richard W.M. Jones 已提交
7916 7917

    if (!vm) {
7918 7919
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
7920 7921
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
7922 7923 7924
        goto cleanup;
    }

7925
    if (flags != VIR_MEMORY_VIRTUAL && flags != VIR_MEMORY_PHYSICAL) {
7926 7927
        qemuReportError(VIR_ERR_INVALID_ARG,
                        "%s", _("flags parameter must be VIR_MEMORY_VIRTUAL or VIR_MEMORY_PHYSICAL"));
7928
        goto cleanup;
R
Richard W.M. Jones 已提交
7929 7930
    }

7931 7932 7933
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
7934
    if (!virDomainObjIsActive(vm)) {
7935 7936
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
7937
        goto endjob;
R
Richard W.M. Jones 已提交
7938 7939
    }

7940
    if (virAsprintf(&tmp, driver->cacheDir,  "/qemu.mem.XXXXXX") < 0) {
7941
        virReportOOMError();
7942
        goto endjob;
7943 7944
    }

R
Richard W.M. Jones 已提交
7945 7946
    /* Create a temporary filename. */
    if ((fd = mkstemp (tmp)) == -1) {
7947 7948
        virReportSystemError(errno,
                             _("mkstemp(\"%s\") failed"), tmp);
7949
        goto endjob;
R
Richard W.M. Jones 已提交
7950 7951
    }

7952
    qemuDomainObjPrivatePtr priv = vm->privateData;
7953
    qemuDomainObjEnterMonitor(vm);
7954
    if (flags == VIR_MEMORY_VIRTUAL) {
7955 7956
        if (qemuMonitorSaveVirtualMemory(priv->mon, offset, size, tmp) < 0) {
            qemuDomainObjExitMonitor(vm);
7957
            goto endjob;
7958
        }
7959
    } else {
7960 7961
        if (qemuMonitorSavePhysicalMemory(priv->mon, offset, size, tmp) < 0) {
            qemuDomainObjExitMonitor(vm);
7962
            goto endjob;
7963
        }
R
Richard W.M. Jones 已提交
7964
    }
7965
    qemuDomainObjExitMonitor(vm);
R
Richard W.M. Jones 已提交
7966 7967 7968

    /* Read the memory file into buffer. */
    if (saferead (fd, buffer, size) == (ssize_t) -1) {
7969 7970 7971
        virReportSystemError(errno,
                             _("failed to read temporary file "
                               "created with template %s"), tmp);
7972
        goto endjob;
R
Richard W.M. Jones 已提交
7973 7974 7975
    }

    ret = 0;
7976

7977
endjob:
7978 7979
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
7980

7981
cleanup:
7982
    VIR_FREE(tmp);
R
Richard W.M. Jones 已提交
7983 7984
    if (fd >= 0) close (fd);
    unlink (tmp);
7985 7986
    if (vm)
        virDomainObjUnlock(vm);
R
Richard W.M. Jones 已提交
7987 7988 7989
    return ret;
}

7990

7991
static int
7992 7993 7994 7995
qemuDomainEventRegister(virConnectPtr conn,
                        virConnectDomainEventCallback callback,
                        void *opaque,
                        virFreeCallback freecb)
7996
{
7997 7998 7999
    struct qemud_driver *driver = conn->privateData;
    int ret;

8000
    qemuDriverLock(driver);
8001 8002
    ret = virDomainEventCallbackListAdd(conn, driver->domainEventCallbacks,
                                        callback, opaque, freecb);
8003
    qemuDriverUnlock(driver);
8004

8005
    return ret;
8006 8007
}

8008

8009
static int
8010 8011
qemuDomainEventDeregister(virConnectPtr conn,
                          virConnectDomainEventCallback callback)
8012
{
8013 8014 8015
    struct qemud_driver *driver = conn->privateData;
    int ret;

8016
    qemuDriverLock(driver);
8017 8018 8019 8020 8021 8022
    if (driver->domainEventDispatching)
        ret = virDomainEventCallbackListMarkDelete(conn, driver->domainEventCallbacks,
                                                   callback);
    else
        ret = virDomainEventCallbackListRemove(conn, driver->domainEventCallbacks,
                                               callback);
8023
    qemuDriverUnlock(driver);
8024

8025
    return ret;
8026 8027
}

8028 8029 8030 8031 8032 8033 8034 8035 8036 8037 8038 8039 8040 8041 8042 8043 8044 8045 8046 8047 8048 8049 8050 8051 8052 8053 8054 8055 8056 8057 8058 8059 8060 8061 8062 8063 8064 8065 8066 8067 8068 8069 8070

static int
qemuDomainEventRegisterAny(virConnectPtr conn,
                           virDomainPtr dom,
                           int eventID,
                           virConnectDomainEventGenericCallback callback,
                           void *opaque,
                           virFreeCallback freecb)
{
    struct qemud_driver *driver = conn->privateData;
    int ret;

    qemuDriverLock(driver);
    ret = virDomainEventCallbackListAddID(conn,
                                          driver->domainEventCallbacks,
                                          dom, eventID,
                                          callback, opaque, freecb);
    qemuDriverUnlock(driver);

    return ret;
}


static int
qemuDomainEventDeregisterAny(virConnectPtr conn,
                             int callbackID)
{
    struct qemud_driver *driver = conn->privateData;
    int ret;

    qemuDriverLock(driver);
    if (driver->domainEventDispatching)
        ret = virDomainEventCallbackListMarkDeleteID(conn, driver->domainEventCallbacks,
                                                     callbackID);
    else
        ret = virDomainEventCallbackListRemoveID(conn, driver->domainEventCallbacks,
                                                 callbackID);
    qemuDriverUnlock(driver);

    return ret;
}


8071 8072
static void qemuDomainEventDispatchFunc(virConnectPtr conn,
                                        virDomainEventPtr event,
8073
                                        virConnectDomainEventGenericCallback cb,
8074 8075
                                        void *cbopaque,
                                        void *opaque)
8076
{
8077
    struct qemud_driver *driver = opaque;
8078

8079 8080 8081 8082 8083 8084 8085 8086 8087 8088 8089 8090 8091 8092 8093 8094 8095 8096 8097 8098 8099 8100 8101 8102 8103 8104 8105 8106 8107 8108 8109 8110 8111 8112 8113 8114 8115 8116 8117 8118 8119 8120 8121 8122
    /* Drop the lock whle dispatching, for sake of re-entrancy */
    qemuDriverUnlock(driver);
    virDomainEventDispatchDefaultFunc(conn, event, cb, cbopaque, NULL);
    qemuDriverLock(driver);
}

static void qemuDomainEventFlush(int timer ATTRIBUTE_UNUSED, void *opaque)
{
    struct qemud_driver *driver = opaque;
    virDomainEventQueue tempQueue;

    qemuDriverLock(driver);

    driver->domainEventDispatching = 1;

    /* Copy the queue, so we're reentrant safe */
    tempQueue.count = driver->domainEventQueue->count;
    tempQueue.events = driver->domainEventQueue->events;
    driver->domainEventQueue->count = 0;
    driver->domainEventQueue->events = NULL;

    virEventUpdateTimeout(driver->domainEventTimer, -1);
    virDomainEventQueueDispatch(&tempQueue,
                                driver->domainEventCallbacks,
                                qemuDomainEventDispatchFunc,
                                driver);

    /* Purge any deleted callbacks */
    virDomainEventCallbackListPurgeMarked(driver->domainEventCallbacks);

    driver->domainEventDispatching = 0;
    qemuDriverUnlock(driver);
}


/* driver must be locked before calling */
static void qemuDomainEventQueue(struct qemud_driver *driver,
                                 virDomainEventPtr event)
{
    if (virDomainEventQueuePush(driver->domainEventQueue,
                                event) < 0)
        virDomainEventFree(event);
    if (qemu_driver->domainEventQueue->count == 1)
        virEventUpdateTimeout(driver->domainEventTimer, 0);
8123 8124
}

D
Daniel Veillard 已提交
8125 8126
/* Migration support. */

C
Chris Lalancette 已提交
8127 8128 8129 8130 8131 8132 8133 8134 8135 8136 8137 8138 8139 8140 8141 8142 8143 8144 8145
/* Tunnelled migration stream support */
struct qemuStreamMigFile {
    int fd;

    int watch;
    unsigned int cbRemoved;
    unsigned int dispatching;
    virStreamEventCallback cb;
    void *opaque;
    virFreeCallback ff;
};

static int qemuStreamMigRemoveCallback(virStreamPtr stream)
{
    struct qemud_driver *driver = stream->conn->privateData;
    struct qemuStreamMigFile *qemust = stream->privateData;
    int ret = -1;

    if (!qemust) {
8146 8147
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("stream is not open"));
C
Chris Lalancette 已提交
8148 8149 8150 8151 8152
        return -1;
    }

    qemuDriverLock(driver);
    if (qemust->watch == 0) {
8153 8154
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("stream does not have a callback registered"));
C
Chris Lalancette 已提交
8155 8156 8157 8158 8159 8160 8161 8162 8163 8164 8165 8166 8167 8168 8169 8170 8171 8172 8173 8174 8175 8176 8177 8178 8179 8180 8181 8182
        goto cleanup;
    }

    virEventRemoveHandle(qemust->watch);
    if (qemust->dispatching)
        qemust->cbRemoved = 1;
    else if (qemust->ff)
        (qemust->ff)(qemust->opaque);

    qemust->watch = 0;
    qemust->ff = NULL;
    qemust->cb = NULL;
    qemust->opaque = NULL;

    ret = 0;

cleanup:
    qemuDriverUnlock(driver);
    return ret;
}

static int qemuStreamMigUpdateCallback(virStreamPtr stream, int events)
{
    struct qemud_driver *driver = stream->conn->privateData;
    struct qemuStreamMigFile *qemust = stream->privateData;
    int ret = -1;

    if (!qemust) {
8183 8184
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("stream is not open"));
C
Chris Lalancette 已提交
8185 8186 8187 8188 8189
        return -1;
    }

    qemuDriverLock(driver);
    if (qemust->watch == 0) {
8190 8191
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("stream does not have a callback registered"));
C
Chris Lalancette 已提交
8192 8193 8194 8195 8196 8197 8198 8199 8200 8201 8202 8203 8204 8205 8206 8207 8208 8209 8210 8211 8212 8213 8214 8215 8216 8217 8218 8219 8220 8221 8222 8223 8224 8225 8226 8227 8228 8229 8230 8231 8232 8233 8234 8235 8236 8237 8238 8239 8240 8241 8242 8243 8244 8245 8246 8247 8248
        goto cleanup;
    }

    virEventUpdateHandle(qemust->watch, events);

    ret = 0;

cleanup:
    qemuDriverUnlock(driver);
    return ret;
}

static void qemuStreamMigEvent(int watch ATTRIBUTE_UNUSED,
                               int fd ATTRIBUTE_UNUSED,
                               int events,
                               void *opaque)
{
    virStreamPtr stream = opaque;
    struct qemud_driver *driver = stream->conn->privateData;
    struct qemuStreamMigFile *qemust = stream->privateData;
    virStreamEventCallback cb;
    void *cbopaque;
    virFreeCallback ff;

    qemuDriverLock(driver);
    if (!qemust || !qemust->cb) {
        qemuDriverUnlock(driver);
        return;
    }

    cb = qemust->cb;
    cbopaque = qemust->opaque;
    ff = qemust->ff;
    qemust->dispatching = 1;
    qemuDriverUnlock(driver);

    cb(stream, events, cbopaque);

    qemuDriverLock(driver);
    qemust->dispatching = 0;
    if (qemust->cbRemoved && ff)
        (ff)(cbopaque);
    qemuDriverUnlock(driver);
}

static int
qemuStreamMigAddCallback(virStreamPtr st,
                         int events,
                         virStreamEventCallback cb,
                         void *opaque,
                         virFreeCallback ff)
{
    struct qemud_driver *driver = st->conn->privateData;
    struct qemuStreamMigFile *qemust = st->privateData;
    int ret = -1;

    if (!qemust) {
8249 8250
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("stream is not open"));
C
Chris Lalancette 已提交
8251 8252 8253 8254 8255
        return -1;
    }

    qemuDriverLock(driver);
    if (qemust->watch != 0) {
8256 8257
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("stream already has a callback registered"));
C
Chris Lalancette 已提交
8258 8259 8260 8261 8262 8263 8264 8265
        goto cleanup;
    }

    if ((qemust->watch = virEventAddHandle(qemust->fd,
                                           events,
                                           qemuStreamMigEvent,
                                           st,
                                           NULL)) < 0) {
8266 8267
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("cannot register file watch on stream"));
C
Chris Lalancette 已提交
8268 8269 8270 8271 8272 8273 8274 8275 8276 8277 8278 8279 8280 8281 8282 8283 8284 8285 8286 8287 8288 8289 8290 8291 8292 8293 8294 8295 8296 8297 8298 8299
        goto cleanup;
    }

    qemust->cbRemoved = 0;
    qemust->cb = cb;
    qemust->opaque = opaque;
    qemust->ff = ff;
    virStreamRef(st);

    ret = 0;

cleanup:
    qemuDriverUnlock(driver);
    return ret;
}

static void qemuStreamMigFree(struct qemuStreamMigFile *qemust)
{
    if (qemust->fd != -1)
        close(qemust->fd);
    VIR_FREE(qemust);
}

static struct qemuStreamMigFile *qemuStreamMigOpen(virStreamPtr st,
                                                   const char *unixfile)
{
    struct qemuStreamMigFile *qemust = NULL;
    struct sockaddr_un sa_qemu;
    int i = 0;
    int timeout = 3;
    int ret;

8300
    if (VIR_ALLOC(qemust) < 0) {
8301
        virReportOOMError();
C
Chris Lalancette 已提交
8302
        return NULL;
8303
    }
C
Chris Lalancette 已提交
8304 8305 8306 8307 8308 8309 8310 8311 8312 8313 8314 8315 8316 8317 8318 8319 8320 8321 8322 8323 8324 8325 8326 8327 8328 8329 8330 8331 8332 8333 8334 8335 8336 8337 8338 8339 8340 8341 8342 8343 8344 8345 8346 8347 8348 8349 8350 8351 8352 8353 8354 8355 8356 8357 8358 8359 8360 8361 8362 8363 8364

    qemust->fd = socket(AF_UNIX, SOCK_STREAM, 0);
    if (qemust->fd < 0)
        goto cleanup;

    memset(&sa_qemu, 0, sizeof(sa_qemu));
    sa_qemu.sun_family = AF_UNIX;
    if (virStrcpy(sa_qemu.sun_path, unixfile, sizeof(sa_qemu.sun_path)) == NULL)
        goto cleanup;

    do {
        ret = connect(qemust->fd, (struct sockaddr *)&sa_qemu, sizeof(sa_qemu));
        if (ret == 0)
            break;

        if (errno == ENOENT || errno == ECONNREFUSED) {
            /* ENOENT       : Socket may not have shown up yet
             * ECONNREFUSED : Leftover socket hasn't been removed yet */
            continue;
        }

        goto cleanup;
    } while ((++i <= timeout*5) && (usleep(.2 * 1000000) <= 0));

    if ((st->flags & VIR_STREAM_NONBLOCK) && virSetNonBlock(qemust->fd) < 0)
        goto cleanup;

    return qemust;

cleanup:
    qemuStreamMigFree(qemust);
    return NULL;
}

static int
qemuStreamMigClose(virStreamPtr st)
{
    struct qemud_driver *driver = st->conn->privateData;
    struct qemuStreamMigFile *qemust = st->privateData;

    if (!qemust)
        return 0;

    qemuDriverLock(driver);

    qemuStreamMigFree(qemust);

    st->privateData = NULL;

    qemuDriverUnlock(driver);

    return 0;
}

static int qemuStreamMigWrite(virStreamPtr st, const char *bytes, size_t nbytes)
{
    struct qemud_driver *driver = st->conn->privateData;
    struct qemuStreamMigFile *qemust = st->privateData;
    int ret;

    if (!qemust) {
8365 8366
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("stream is not open"));
C
Chris Lalancette 已提交
8367 8368 8369 8370 8371 8372 8373 8374 8375 8376 8377 8378 8379 8380
        return -1;
    }

    qemuDriverLock(driver);

retry:
    ret = write(qemust->fd, bytes, nbytes);
    if (ret < 0) {
        if (errno == EAGAIN || errno == EWOULDBLOCK) {
            ret = -2;
        } else if (errno == EINTR) {
            goto retry;
        } else {
            ret = -1;
8381
            virReportSystemError(errno, "%s",
C
Chris Lalancette 已提交
8382 8383 8384 8385 8386 8387 8388 8389 8390 8391 8392 8393 8394 8395 8396 8397 8398 8399 8400 8401 8402 8403 8404 8405 8406 8407 8408 8409 8410 8411 8412 8413 8414 8415 8416 8417 8418 8419
                                 _("cannot write to stream"));
        }
    }

    qemuDriverUnlock(driver);
    return ret;
}

static virStreamDriver qemuStreamMigDrv = {
    .streamSend = qemuStreamMigWrite,
    .streamFinish = qemuStreamMigClose,
    .streamAbort = qemuStreamMigClose,
    .streamAddCallback = qemuStreamMigAddCallback,
    .streamUpdateCallback = qemuStreamMigUpdateCallback,
    .streamRemoveCallback = qemuStreamMigRemoveCallback
};

/* Prepare is the first step, and it runs on the destination host.
 *
 * This version starts an empty VM listening on a localhost TCP port, and
 * sets up the corresponding virStream to handle the incoming data.
 */
static int
qemudDomainMigratePrepareTunnel(virConnectPtr dconn,
                                virStreamPtr st,
                                unsigned long flags,
                                const char *dname,
                                unsigned long resource ATTRIBUTE_UNUSED,
                                const char *dom_xml)
{
    struct qemud_driver *driver = dconn->privateData;
    virDomainDefPtr def = NULL;
    virDomainObjPtr vm = NULL;
    char *migrateFrom;
    virDomainEventPtr event = NULL;
    int ret = -1;
    int internalret;
    char *unixfile = NULL;
8420
    unsigned long long qemuCmdFlags;
C
Chris Lalancette 已提交
8421 8422 8423 8424
    struct qemuStreamMigFile *qemust = NULL;

    qemuDriverLock(driver);
    if (!dom_xml) {
8425 8426
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("no domain XML passed"));
C
Chris Lalancette 已提交
8427 8428 8429
        goto cleanup;
    }
    if (!(flags & VIR_MIGRATE_TUNNELLED)) {
8430
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
C
Chris Lalancette 已提交
8431 8432 8433 8434
                         "%s", _("PrepareTunnel called but no TUNNELLED flag set"));
        goto cleanup;
    }
    if (st == NULL) {
8435 8436
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("tunnelled migration requested but NULL stream passed"));
C
Chris Lalancette 已提交
8437 8438 8439 8440
        goto cleanup;
    }

    /* Parse the domain XML. */
8441
    if (!(def = virDomainDefParseString(driver->caps, dom_xml,
C
Chris Lalancette 已提交
8442
                                        VIR_DOMAIN_XML_INACTIVE))) {
8443 8444
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to parse XML"));
C
Chris Lalancette 已提交
8445 8446 8447 8448
        goto cleanup;
    }

    /* Target domain name, maybe renamed. */
8449 8450 8451 8452 8453 8454
    if (dname) {
        VIR_FREE(def->name);
        def->name = strdup(dname);
        if (def->name == NULL)
            goto cleanup;
    }
C
Chris Lalancette 已提交
8455

8456 8457
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
C
Chris Lalancette 已提交
8458

8459
    if (!(vm = virDomainAssignDef(driver->caps,
C
Chris Lalancette 已提交
8460 8461
                                  &driver->domains,
                                  def))) {
8462 8463
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to assign new VM"));
C
Chris Lalancette 已提交
8464 8465 8466 8467
        goto cleanup;
    }
    def = NULL;

8468 8469 8470
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

C
Chris Lalancette 已提交
8471 8472 8473 8474 8475
    /* Domain starts inactive, even if the domain XML had an id field. */
    vm->def->id = -1;

    if (virAsprintf(&unixfile, "%s/qemu.tunnelmigrate.dest.%s",
                    driver->stateDir, vm->def->name) < 0) {
8476
        virReportOOMError();
8477
        goto endjob;
C
Chris Lalancette 已提交
8478 8479 8480 8481 8482
    }
    unlink(unixfile);

    /* check that this qemu version supports the interactive exec */
    if (qemudExtractVersionInfo(vm->def->emulator, NULL, &qemuCmdFlags) < 0) {
8483 8484 8485
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("Cannot determine QEMU argv syntax %s"),
                        vm->def->emulator);
8486
        goto endjob;
C
Chris Lalancette 已提交
8487 8488 8489 8490 8491 8492
    }
    if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_UNIX)
        internalret = virAsprintf(&migrateFrom, "unix:%s", unixfile);
    else if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_EXEC)
        internalret = virAsprintf(&migrateFrom, "exec:nc -U -l %s", unixfile);
    else {
8493 8494
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("Destination qemu is too old to support tunnelled migration"));
8495
        goto endjob;
C
Chris Lalancette 已提交
8496 8497
    }
    if (internalret < 0) {
8498
        virReportOOMError();
8499
        goto endjob;
C
Chris Lalancette 已提交
8500 8501 8502 8503 8504 8505 8506 8507 8508 8509 8510 8511 8512 8513
    }
    /* Start the QEMU daemon, with the same command-line arguments plus
     * -incoming unix:/path/to/file or exec:nc -U /path/to/file
     */
    internalret = qemudStartVMDaemon(dconn, driver, vm, migrateFrom, -1);
    VIR_FREE(migrateFrom);
    if (internalret < 0) {
        /* Note that we don't set an error here because qemudStartVMDaemon
         * should have already done that.
         */
        if (!vm->persistent) {
            virDomainRemoveInactive(&driver->domains, vm);
            vm = NULL;
        }
8514
        goto endjob;
C
Chris Lalancette 已提交
8515 8516 8517 8518
    }

    qemust = qemuStreamMigOpen(st, unixfile);
    if (qemust == NULL) {
8519
        qemudShutdownVMDaemon(driver, vm);
8520
        if (!vm->persistent) {
8521 8522
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains, vm);
8523 8524
            vm = NULL;
        }
8525
        virReportSystemError(errno,
C
Chris Lalancette 已提交
8526 8527
                             _("cannot open unix socket '%s' for tunnelled migration"),
                             unixfile);
8528
        goto endjob;
C
Chris Lalancette 已提交
8529 8530 8531 8532 8533 8534 8535 8536 8537 8538
    }

    st->driver = &qemuStreamMigDrv;
    st->privateData = qemust;

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_MIGRATED);
    ret = 0;

8539
endjob:
8540 8541 8542
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
8543

C
Chris Lalancette 已提交
8544 8545
cleanup:
    virDomainDefFree(def);
8546 8547
    if (unixfile)
        unlink(unixfile);
C
Chris Lalancette 已提交
8548 8549 8550 8551 8552 8553 8554 8555 8556
    VIR_FREE(unixfile);
    if (vm)
        virDomainObjUnlock(vm);
    if (event)
        qemuDomainEventQueue(driver, event);
    qemuDriverUnlock(driver);
    return ret;
}

D
Daniel Veillard 已提交
8557 8558 8559 8560
/* Prepare is the first step, and it runs on the destination host.
 *
 * This starts an empty VM listening on a TCP port.
 */
8561
static int ATTRIBUTE_NONNULL (5)
D
Daniel Veillard 已提交
8562 8563 8564 8565 8566
qemudDomainMigratePrepare2 (virConnectPtr dconn,
                            char **cookie ATTRIBUTE_UNUSED,
                            int *cookielen ATTRIBUTE_UNUSED,
                            const char *uri_in,
                            char **uri_out,
C
Chris Lalancette 已提交
8567
                            unsigned long flags,
D
Daniel Veillard 已提交
8568 8569 8570 8571 8572
                            const char *dname,
                            unsigned long resource ATTRIBUTE_UNUSED,
                            const char *dom_xml)
{
    static int port = 0;
8573 8574
    struct qemud_driver *driver = dconn->privateData;
    virDomainDefPtr def = NULL;
D
Daniel Veillard 已提交
8575 8576
    virDomainObjPtr vm = NULL;
    int this_port;
8577
    char *hostname;
D
Daniel Veillard 已提交
8578 8579
    char migrateFrom [64];
    const char *p;
8580
    virDomainEventPtr event = NULL;
8581
    int ret = -1;
8582
    int internalret;
8583 8584

    *uri_out = NULL;
D
Daniel Veillard 已提交
8585

8586
    qemuDriverLock(driver);
C
Chris Lalancette 已提交
8587 8588 8589 8590
    if (flags & VIR_MIGRATE_TUNNELLED) {
        /* this is a logical error; we never should have gotten here with
         * VIR_MIGRATE_TUNNELLED set
         */
8591 8592
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("Tunnelled migration requested but invalid RPC method called"));
C
Chris Lalancette 已提交
8593 8594 8595
        goto cleanup;
    }

D
Daniel Veillard 已提交
8596
    if (!dom_xml) {
8597 8598
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        "%s", _("no domain XML passed"));
8599
        goto cleanup;
D
Daniel Veillard 已提交
8600 8601 8602 8603 8604 8605 8606 8607 8608 8609 8610 8611 8612 8613 8614 8615 8616
    }

    /* The URI passed in may be NULL or a string "tcp://somehostname:port".
     *
     * If the URI passed in is NULL then we allocate a port number
     * from our pool of port numbers and return a URI of
     * "tcp://ourhostname:port".
     *
     * If the URI passed in is not NULL then we try to parse out the
     * port number and use that (note that the hostname is assumed
     * to be a correct hostname which refers to the target machine).
     */
    if (uri_in == NULL) {
        this_port = QEMUD_MIGRATION_FIRST_PORT + port++;
        if (port == QEMUD_MIGRATION_NUM_PORTS) port = 0;

        /* Get hostname */
8617
        if ((hostname = virGetHostnameLocalhost(0)) == NULL)
8618
            goto cleanup;
D
Daniel Veillard 已提交
8619

8620 8621 8622 8623 8624
        /* XXX this really should have been a properly well-formed
         * URI, but we can't add in tcp:// now without breaking
         * compatability with old targets. We at least make the
         * new targets accept both syntaxes though.
         */
D
Daniel Veillard 已提交
8625
        /* Caller frees */
8626 8627 8628
        internalret = virAsprintf(uri_out, "tcp:%s:%d", hostname, this_port);
        VIR_FREE(hostname);
        if (internalret < 0) {
8629
            virReportOOMError();
8630
            goto cleanup;
D
Daniel Veillard 已提交
8631 8632 8633 8634 8635 8636
        }
    } else {
        /* Check the URI starts with "tcp:".  We will escape the
         * URI when passing it to the qemu monitor, so bad
         * characters in hostname part don't matter.
         */
8637
        if (!STRPREFIX (uri_in, "tcp:")) {
8638 8639
            qemuReportError (VIR_ERR_INVALID_ARG,
                             "%s", _("only tcp URIs are supported for KVM/QEMU migrations"));
8640
            goto cleanup;
D
Daniel Veillard 已提交
8641 8642 8643 8644
        }

        /* Get the port number. */
        p = strrchr (uri_in, ':');
8645 8646 8647 8648 8649 8650 8651 8652
        if (p == strchr(uri_in, ':')) {
            /* Generate a port */
            this_port = QEMUD_MIGRATION_FIRST_PORT + port++;
            if (port == QEMUD_MIGRATION_NUM_PORTS)
                port = 0;

            /* Caller frees */
            if (virAsprintf(uri_out, "%s:%d", uri_in, this_port) < 0) {
8653
                virReportOOMError();
8654 8655 8656 8657 8658 8659 8660
                goto cleanup;
            }

        } else {
            p++; /* definitely has a ':' in it, see above */
            this_port = virParseNumber (&p);
            if (this_port == -1 || p-uri_in != strlen (uri_in)) {
8661 8662
                qemuReportError(VIR_ERR_INVALID_ARG,
                                "%s", _("URI ended with incorrect ':port'"));
8663 8664
                goto cleanup;
            }
D
Daniel Veillard 已提交
8665 8666 8667
        }
    }

8668
    if (*uri_out)
8669 8670
        VIR_DEBUG("Generated uri_out=%s", *uri_out);

D
Daniel Veillard 已提交
8671
    /* Parse the domain XML. */
8672
    if (!(def = virDomainDefParseString(driver->caps, dom_xml,
8673
                                        VIR_DOMAIN_XML_INACTIVE))) {
8674 8675
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to parse XML"));
8676
        goto cleanup;
D
Daniel Veillard 已提交
8677 8678 8679
    }

    /* Target domain name, maybe renamed. */
8680 8681 8682 8683 8684 8685
    if (dname) {
        VIR_FREE(def->name);
        def->name = strdup(dname);
        if (def->name == NULL)
            goto cleanup;
    }
D
Daniel Veillard 已提交
8686

8687 8688
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
D
Daniel Veillard 已提交
8689

8690
    if (!(vm = virDomainAssignDef(driver->caps,
D
Daniel Veillard 已提交
8691 8692
                                  &driver->domains,
                                  def))) {
8693 8694
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to assign new VM"));
8695
        goto cleanup;
D
Daniel Veillard 已提交
8696
    }
8697
    def = NULL;
D
Daniel Veillard 已提交
8698

8699 8700 8701
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel Veillard 已提交
8702 8703 8704 8705 8706 8707 8708
    /* Domain starts inactive, even if the domain XML had an id field. */
    vm->def->id = -1;

    /* Start the QEMU daemon, with the same command-line arguments plus
     * -incoming tcp:0.0.0.0:port
     */
    snprintf (migrateFrom, sizeof (migrateFrom), "tcp:0.0.0.0:%d", this_port);
8709
    if (qemudStartVMDaemon (dconn, driver, vm, migrateFrom, -1) < 0) {
8710 8711 8712
        /* Note that we don't set an error here because qemudStartVMDaemon
         * should have already done that.
         */
8713
        if (!vm->persistent) {
8714 8715
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains, vm);
8716 8717
            vm = NULL;
        }
8718
        goto endjob;
D
Daniel Veillard 已提交
8719
    }
8720 8721 8722 8723

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_MIGRATED);
8724
    ret = 0;
D
Daniel Veillard 已提交
8725

8726
endjob:
8727 8728 8729
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
8730

8731 8732 8733 8734 8735
cleanup:
    virDomainDefFree(def);
    if (ret != 0) {
        VIR_FREE(*uri_out);
    }
8736 8737
    if (vm)
        virDomainObjUnlock(vm);
8738 8739
    if (event)
        qemuDomainEventQueue(driver, event);
8740
    qemuDriverUnlock(driver);
8741
    return ret;
C
Chris Lalancette 已提交
8742 8743 8744

}

8745 8746 8747 8748

/* Perform migration using QEMU's native TCP migrate support,
 * not encrypted obviously
 */
8749
static int doNativeMigrate(struct qemud_driver *driver,
8750 8751 8752 8753 8754 8755 8756
                           virDomainObjPtr vm,
                           const char *uri,
                           unsigned long flags ATTRIBUTE_UNUSED,
                           const char *dname ATTRIBUTE_UNUSED,
                           unsigned long resource)
{
    int ret = -1;
8757
    xmlURIPtr uribits = NULL;
8758
    qemuDomainObjPrivatePtr priv = vm->privateData;
8759 8760 8761 8762 8763 8764

    /* Issue the migrate command. */
    if (STRPREFIX(uri, "tcp:") && !STRPREFIX(uri, "tcp://")) {
        /* HACK: source host generates bogus URIs, so fix them up */
        char *tmpuri;
        if (virAsprintf(&tmpuri, "tcp://%s", uri + strlen("tcp:")) < 0) {
8765
            virReportOOMError();
8766 8767 8768 8769 8770 8771 8772 8773
            goto cleanup;
        }
        uribits = xmlParseURI(tmpuri);
        VIR_FREE(tmpuri);
    } else {
        uribits = xmlParseURI(uri);
    }
    if (!uribits) {
8774 8775
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("cannot parse URI %s"), uri);
8776 8777 8778
        goto cleanup;
    }

8779
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
8780
    if (resource > 0 &&
8781
        qemuMonitorSetMigrationSpeed(priv->mon, resource) < 0) {
8782
        qemuDomainObjExitMonitorWithDriver(driver, vm);
8783
        goto cleanup;
8784
    }
8785

8786
    if (qemuMonitorMigrateToHost(priv->mon, 1, uribits->server, uribits->port) < 0) {
8787
        qemuDomainObjExitMonitorWithDriver(driver, vm);
8788 8789
        goto cleanup;
    }
8790
    qemuDomainObjExitMonitorWithDriver(driver, vm);
8791

8792
    if (qemuDomainWaitForMigrationComplete(driver, vm) < 0)
8793 8794 8795 8796 8797 8798 8799 8800 8801 8802
        goto cleanup;

    ret = 0;

cleanup:
    xmlFreeURI(uribits);
    return ret;
}


8803 8804
#define TUNNEL_SEND_BUF_SIZE 65536

8805
static int doTunnelSendAll(virStreamPtr st,
8806 8807
                           int sock)
{
8808 8809 8810 8811 8812 8813 8814 8815
    char *buffer;
    int nbytes = TUNNEL_SEND_BUF_SIZE;

    if (VIR_ALLOC_N(buffer, TUNNEL_SEND_BUF_SIZE) < 0) {
        virReportOOMError();
        virStreamAbort(st);
        return -1;
    }
8816 8817 8818 8819 8820

    /* XXX should honour the 'resource' parameter here */
    for (;;) {
        nbytes = saferead(sock, buffer, nbytes);
        if (nbytes < 0) {
8821
            virReportSystemError(errno, "%s",
8822
                                 _("tunnelled migration failed to read from qemu"));
8823 8824
            virStreamAbort(st);
            VIR_FREE(buffer);
8825 8826 8827 8828 8829 8830 8831
            return -1;
        }
        else if (nbytes == 0)
            /* EOF; get out of here */
            break;

        if (virStreamSend(st, buffer, nbytes) < 0) {
8832 8833
            qemuReportError(VIR_ERR_OPERATION_FAILED, "%s",
                            _("Failed to write migration data to remote libvirtd"));
8834
            VIR_FREE(buffer);
8835 8836 8837 8838
            return -1;
        }
    }

8839 8840
    VIR_FREE(buffer);

8841 8842 8843 8844 8845 8846 8847
    if (virStreamFinish(st) < 0)
        /* virStreamFinish set the error for us */
        return -1;

    return 0;
}

C
Chris Lalancette 已提交
8848
static int doTunnelMigrate(virDomainPtr dom,
8849
                           struct qemud_driver *driver,
8850
                           virConnectPtr dconn,
C
Chris Lalancette 已提交
8851
                           virDomainObjPtr vm,
8852
                           const char *dom_xml,
C
Chris Lalancette 已提交
8853 8854 8855 8856 8857
                           const char *uri,
                           unsigned long flags,
                           const char *dname,
                           unsigned long resource)
{
8858
    qemuDomainObjPrivatePtr priv = vm->privateData;
8859 8860
    int client_sock = -1;
    int qemu_sock = -1;
C
Chris Lalancette 已提交
8861 8862
    struct sockaddr_un sa_qemu, sa_client;
    socklen_t addrlen;
8863
    virDomainPtr ddomain = NULL;
C
Chris Lalancette 已提交
8864
    int retval = -1;
8865
    virStreamPtr st = NULL;
C
Chris Lalancette 已提交
8866 8867
    char *unixfile = NULL;
    int internalret;
8868
    unsigned long long qemuCmdFlags;
C
Chris Lalancette 已提交
8869 8870 8871
    int status;
    unsigned long long transferred, remaining, total;

8872 8873 8874 8875 8876 8877 8878 8879
    /*
     * The order of operations is important here to avoid touching
     * the source VM until we are very sure we can successfully
     * start the migration operation.
     *
     *   1. setup local support infrastructure (eg sockets)
     *   2. setup destination fully
     *   3. start migration on source
C
Chris Lalancette 已提交
8880 8881
     */

8882

8883
    /* Stage 1. setup local support infrastructure */
C
Chris Lalancette 已提交
8884 8885 8886

    if (virAsprintf(&unixfile, "%s/qemu.tunnelmigrate.src.%s",
                    driver->stateDir, vm->def->name) < 0) {
8887
        virReportOOMError();
8888
        goto cleanup;
C
Chris Lalancette 已提交
8889 8890 8891 8892
    }

    qemu_sock = socket(AF_UNIX, SOCK_STREAM, 0);
    if (qemu_sock < 0) {
8893
        virReportSystemError(errno, "%s",
C
Chris Lalancette 已提交
8894
                             _("cannot open tunnelled migration socket"));
8895
        goto cleanup;
C
Chris Lalancette 已提交
8896 8897 8898 8899 8900
    }
    memset(&sa_qemu, 0, sizeof(sa_qemu));
    sa_qemu.sun_family = AF_UNIX;
    if (virStrcpy(sa_qemu.sun_path, unixfile,
                  sizeof(sa_qemu.sun_path)) == NULL) {
8901 8902 8903
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("Unix socket '%s' too big for destination"),
                        unixfile);
8904
        goto cleanup;
C
Chris Lalancette 已提交
8905 8906 8907
    }
    unlink(unixfile);
    if (bind(qemu_sock, (struct sockaddr *)&sa_qemu, sizeof(sa_qemu)) < 0) {
8908
        virReportSystemError(errno,
C
Chris Lalancette 已提交
8909 8910
                             _("Cannot bind to unix socket '%s' for tunnelled migration"),
                             unixfile);
8911
        goto cleanup;
C
Chris Lalancette 已提交
8912 8913
    }
    if (listen(qemu_sock, 1) < 0) {
8914
        virReportSystemError(errno,
C
Chris Lalancette 已提交
8915 8916
                             _("Cannot listen on unix socket '%s' for tunnelled migration"),
                             unixfile);
8917
        goto cleanup;
C
Chris Lalancette 已提交
8918 8919 8920 8921
    }

    /* check that this qemu version supports the unix migration */
    if (qemudExtractVersionInfo(vm->def->emulator, NULL, &qemuCmdFlags) < 0) {
8922 8923 8924
        qemuReportError(VIR_ERR_INTERNAL_ERROR,
                        _("Cannot extract Qemu version from '%s'"),
                        vm->def->emulator);
8925 8926 8927 8928 8929
        goto cleanup;
    }

    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_UNIX) &&
        !(qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_EXEC)) {
8930 8931
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("Source qemu is too old to support tunnelled migration"));
8932
        goto cleanup;
C
Chris Lalancette 已提交
8933
    }
8934 8935 8936 8937 8938 8939 8940 8941 8942 8943 8944 8945 8946 8947 8948 8949 8950 8951 8952 8953 8954


    /* Stage 2. setup destination fully
     *
     * Once stage 2 has completed successfully, we *must* call finish
     * to cleanup the target whether we succeed or fail
     */
    st = virStreamNew(dconn, 0);
    if (st == NULL)
        /* virStreamNew only fails on OOM, and it reports the error itself */
        goto cleanup;

    internalret = dconn->driver->domainMigratePrepareTunnel(dconn, st,
                                                            flags, dname,
                                                            resource, dom_xml);

    if (internalret < 0)
        /* domainMigratePrepareTunnel sets the error for us */
        goto cleanup;

    /*   3. start migration on source */
8955
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
C
Chris Lalancette 已提交
8956
    if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_UNIX)
8957
        internalret = qemuMonitorMigrateToUnix(priv->mon, 1, unixfile);
C
Chris Lalancette 已提交
8958 8959
    else if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_EXEC) {
        const char *args[] = { "nc", "-U", unixfile, NULL };
8960
        internalret = qemuMonitorMigrateToCommand(priv->mon, 1, args, "/dev/null");
8961 8962
    } else {
        internalret = -1;
C
Chris Lalancette 已提交
8963
    }
8964
    qemuDomainObjExitMonitorWithDriver(driver, vm);
C
Chris Lalancette 已提交
8965
    if (internalret < 0) {
8966 8967
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("tunnelled migration monitor command failed"));
8968
        goto finish;
C
Chris Lalancette 已提交
8969 8970
    }

8971 8972 8973
    /* From this point onwards we *must* call cancel to abort the
     * migration on source if anything goes wrong */

C
Chris Lalancette 已提交
8974 8975 8976
    /* it is also possible that the migrate didn't fail initially, but
     * rather failed later on.  Check the output of "info migrate"
     */
8977
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
8978 8979
    if (qemuMonitorGetMigrationStatus(priv->mon,
                                      &status,
C
Chris Lalancette 已提交
8980 8981 8982
                                      &transferred,
                                      &remaining,
                                      &total) < 0) {
8983
        qemuDomainObjExitMonitorWithDriver(driver, vm);
8984
        goto cancel;
C
Chris Lalancette 已提交
8985
    }
8986
    qemuDomainObjExitMonitorWithDriver(driver, vm);
C
Chris Lalancette 已提交
8987 8988

    if (status == QEMU_MONITOR_MIGRATION_STATUS_ERROR) {
8989 8990
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s",_("migrate failed"));
8991
        goto cancel;
C
Chris Lalancette 已提交
8992 8993 8994 8995 8996 8997
    }

    addrlen = sizeof(sa_client);
    while ((client_sock = accept(qemu_sock, (struct sockaddr *)&sa_client, &addrlen)) < 0) {
        if (errno == EAGAIN || errno == EINTR)
            continue;
8998
        virReportSystemError(errno, "%s",
C
Chris Lalancette 已提交
8999
                             _("tunnelled migration failed to accept from qemu"));
9000
        goto cancel;
C
Chris Lalancette 已提交
9001 9002
    }

9003
    retval = doTunnelSendAll(st, client_sock);
9004

9005
cancel:
9006
    if (retval != 0) {
9007
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
9008
        qemuMonitorMigrateCancel(priv->mon);
9009
        qemuDomainObjExitMonitorWithDriver(driver, vm);
9010
    }
C
Chris Lalancette 已提交
9011

9012
finish:
C
Chris Lalancette 已提交
9013 9014 9015
    dname = dname ? dname : dom->name;
    ddomain = dconn->driver->domainMigrateFinish2
        (dconn, dname, NULL, 0, uri, flags, retval);
9016 9017 9018 9019 9020 9021 9022

cleanup:
    if (client_sock != -1)
        close(client_sock);
    if (qemu_sock != -1)
        close(qemu_sock);

C
Chris Lalancette 已提交
9023 9024 9025
    if (ddomain)
        virUnrefDomain(ddomain);

9026 9027 9028 9029
    if (unixfile) {
        unlink(unixfile);
        VIR_FREE(unixfile);
    }
C
Chris Lalancette 已提交
9030

9031 9032 9033
    if (st)
        /* don't call virStreamFree(), because that resets any pending errors */
        virUnrefStream(st);
9034 9035 9036 9037
    return retval;
}


9038 9039 9040 9041
/* This is essentially a simplified re-impl of
 * virDomainMigrateVersion2 from libvirt.c, but running in source
 * libvirtd context, instead of client app context */
static int doNonTunnelMigrate(virDomainPtr dom,
9042
                              struct qemud_driver *driver,
9043 9044 9045 9046 9047 9048 9049 9050 9051 9052 9053 9054 9055 9056 9057 9058 9059 9060 9061 9062 9063 9064 9065 9066 9067
                              virConnectPtr dconn,
                              virDomainObjPtr vm,
                              const char *dom_xml,
                              const char *uri ATTRIBUTE_UNUSED,
                              unsigned long flags,
                              const char *dname,
                              unsigned long resource)
{
    virDomainPtr ddomain = NULL;
    int retval = -1;
    char *uri_out = NULL;

    /* NB we don't pass 'uri' into this, since that's the libvirtd
     * URI in this context - so we let dest pick it */
    if (dconn->driver->domainMigratePrepare2(dconn,
                                             NULL, /* cookie */
                                             0, /* cookielen */
                                             NULL, /* uri */
                                             &uri_out,
                                             flags, dname,
                                             resource, dom_xml) < 0)
        /* domainMigratePrepare2 sets the error for us */
        goto cleanup;

    if (uri_out == NULL) {
9068 9069
        qemuReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                        _("domainMigratePrepare2 did not set uri"));
9070
        goto cleanup;
9071 9072
    }

9073
    if (doNativeMigrate(driver, vm, uri_out, flags, dname, resource) < 0)
9074 9075 9076 9077 9078 9079 9080 9081 9082 9083 9084 9085 9086 9087 9088 9089 9090
        goto finish;

    retval = 0;

finish:
    dname = dname ? dname : dom->name;
    ddomain = dconn->driver->domainMigrateFinish2
        (dconn, dname, NULL, 0, uri_out, flags, retval);

    if (ddomain)
        virUnrefDomain(ddomain);

cleanup:
    return retval;
}


9091
static int doPeer2PeerMigrate(virDomainPtr dom,
9092
                              struct qemud_driver *driver,
9093 9094 9095 9096 9097 9098 9099 9100 9101 9102 9103 9104 9105 9106 9107 9108
                              virDomainObjPtr vm,
                              const char *uri,
                              unsigned long flags,
                              const char *dname,
                              unsigned long resource)
{
    int ret = -1;
    virConnectPtr dconn = NULL;
    char *dom_xml;

    /* the order of operations is important here; we make sure the
     * destination side is completely setup before we touch the source
     */

    dconn = virConnectOpen(uri);
    if (dconn == NULL) {
9109 9110
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        _("Failed to connect to remote libvirt URI %s"), uri);
9111 9112 9113
        return -1;
    }
    if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
9114
                                  VIR_DRV_FEATURE_MIGRATION_P2P)) {
9115 9116
        qemuReportError(VIR_ERR_OPERATION_FAILED, "%s",
                        _("Destination libvirt does not support peer-to-peer migration protocol"));
9117 9118 9119
        goto cleanup;
    }

9120
    dom_xml = virDomainDefFormat(vm->def, VIR_DOMAIN_XML_SECURE);
9121
    if (!dom_xml) {
9122 9123
        qemuReportError(VIR_ERR_OPERATION_FAILED,
                        "%s", _("failed to get domain xml"));
9124 9125 9126
        goto cleanup;
    }

9127
    if (flags & VIR_MIGRATE_TUNNELLED)
9128
        ret = doTunnelMigrate(dom, driver, dconn, vm, dom_xml, uri, flags, dname, resource);
9129
    else
9130
        ret = doNonTunnelMigrate(dom, driver, dconn, vm, dom_xml, uri, flags, dname, resource);
9131 9132 9133

cleanup:
    VIR_FREE(dom_xml);
C
Chris Lalancette 已提交
9134 9135 9136
    /* don't call virConnectClose(), because that resets any pending errors */
    virUnrefConnect(dconn);

9137
    return ret;
D
Daniel Veillard 已提交
9138 9139
}

9140

D
Daniel Veillard 已提交
9141 9142 9143 9144 9145 9146
/* Perform is the second step, and it runs on the source host. */
static int
qemudDomainMigratePerform (virDomainPtr dom,
                           const char *cookie ATTRIBUTE_UNUSED,
                           int cookielen ATTRIBUTE_UNUSED,
                           const char *uri,
9147
                           unsigned long flags,
9148
                           const char *dname,
D
Daniel Veillard 已提交
9149 9150
                           unsigned long resource)
{
9151 9152
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
9153
    virDomainEventPtr event = NULL;
9154
    int ret = -1;
9155
    int resume = 0;
9156
    qemuDomainObjPrivatePtr priv;
D
Daniel Veillard 已提交
9157

9158
    qemuDriverLock(driver);
9159
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
D
Daniel Veillard 已提交
9160
    if (!vm) {
9161 9162
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
9163 9164
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
9165
        goto cleanup;
D
Daniel Veillard 已提交
9166
    }
9167
    priv = vm->privateData;
D
Daniel Veillard 已提交
9168

9169 9170
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;
9171
    priv->jobActive = QEMU_JOB_MIGRATION;
9172

D
Daniel P. Berrange 已提交
9173
    if (!virDomainObjIsActive(vm)) {
9174 9175
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
9176
        goto endjob;
D
Daniel Veillard 已提交
9177 9178
    }

9179 9180 9181
    memset(&priv->jobInfo, 0, sizeof(priv->jobInfo));
    priv->jobInfo.type = VIR_DOMAIN_JOB_UNBOUNDED;

9182
    resume = vm->state == VIR_DOMAIN_RUNNING;
9183
    if (!(flags & VIR_MIGRATE_LIVE) && vm->state == VIR_DOMAIN_RUNNING) {
9184
        if (qemuDomainMigrateOffline(driver, vm) < 0)
9185
            goto endjob;
9186 9187
    }

9188
    if ((flags & (VIR_MIGRATE_TUNNELLED | VIR_MIGRATE_PEER2PEER))) {
9189
        if (doPeer2PeerMigrate(dom, driver, vm, uri, flags, dname, resource) < 0)
9190
            /* doPeer2PeerMigrate already set the error, so just get out */
9191
            goto endjob;
9192
    } else {
9193
        if (doNativeMigrate(driver, vm, uri, flags, dname, resource) < 0)
9194
            goto endjob;
9195 9196
    }

D
Daniel Veillard 已提交
9197
    /* Clean up the source domain. */
9198
    qemudShutdownVMDaemon(driver, vm);
9199
    resume = 0;
9200 9201 9202 9203

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     VIR_DOMAIN_EVENT_STOPPED_MIGRATED);
C
Chris Lalancette 已提交
9204
    if (!vm->persistent || (flags & VIR_MIGRATE_UNDEFINE_SOURCE)) {
9205
        virDomainDeleteConfig(driver->configDir, driver->autostartDir, vm);
9206 9207
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains, vm);
9208 9209
        vm = NULL;
    }
9210
    ret = 0;
D
Daniel Veillard 已提交
9211

9212
endjob:
9213
    if (resume && vm->state == VIR_DOMAIN_PAUSED) {
9214
        /* we got here through some sort of failure; start the domain again */
9215
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
9216
        if (qemuMonitorStartCPUs(priv->mon, dom->conn) < 0) {
9217 9218 9219 9220
            /* Hm, we already know we are in error here.  We don't want to
             * overwrite the previous error, though, so we just throw something
             * to the logs and hope for the best
             */
9221
            VIR_ERROR(_("Failed to resume guest %s after failure"),
9222
                      vm->def->name);
9223
        }
9224
        qemuDomainObjExitMonitorWithDriver(driver, vm);
9225

9226
        vm->state = VIR_DOMAIN_RUNNING;
9227 9228 9229 9230
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_RESUMED,
                                         VIR_DOMAIN_EVENT_RESUMED_MIGRATED);
    }
9231 9232 9233
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
9234

9235
cleanup:
9236 9237
    if (vm)
        virDomainObjUnlock(vm);
9238 9239
    if (event)
        qemuDomainEventQueue(driver, event);
9240
    qemuDriverUnlock(driver);
9241
    return ret;
D
Daniel Veillard 已提交
9242 9243 9244 9245 9246 9247 9248 9249 9250
}

/* Finish is the third and final step, and it runs on the destination host. */
static virDomainPtr
qemudDomainMigrateFinish2 (virConnectPtr dconn,
                           const char *dname,
                           const char *cookie ATTRIBUTE_UNUSED,
                           int cookielen ATTRIBUTE_UNUSED,
                           const char *uri ATTRIBUTE_UNUSED,
C
Chris Lalancette 已提交
9251
                           unsigned long flags,
D
Daniel Veillard 已提交
9252 9253
                           int retcode)
{
9254 9255 9256
    struct qemud_driver *driver = dconn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;
9257
    virDomainEventPtr event = NULL;
9258
    virErrorPtr orig_err;
C
Chris Lalancette 已提交
9259
    int newVM = 1;
D
Daniel Veillard 已提交
9260

9261 9262 9263
    /* Migration failed. Save the current error so nothing squashes it */
    orig_err = virSaveLastError();

9264
    qemuDriverLock(driver);
9265
    vm = virDomainFindByName(&driver->domains, dname);
D
Daniel Veillard 已提交
9266
    if (!vm) {
9267 9268
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching name '%s'"), dname);
9269
        goto cleanup;
D
Daniel Veillard 已提交
9270 9271
    }

9272 9273 9274
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel Veillard 已提交
9275 9276 9277 9278
    /* Did the migration go as planned?  If yes, return the domain
     * object, but if no, clean up the empty qemu process.
     */
    if (retcode == 0) {
C
Chris Lalancette 已提交
9279 9280 9281 9282 9283
        if (flags & VIR_MIGRATE_PERSIST_DEST) {
            if (vm->persistent)
                newVM = 0;
            vm->persistent = 1;

9284
            if (virDomainSaveConfig(driver->configDir, vm->def) < 0) {
C
Chris Lalancette 已提交
9285 9286 9287 9288 9289 9290 9291 9292 9293 9294
                /* Hmpf.  Migration was successful, but making it persistent
                 * was not.  If we report successful, then when this domain
                 * shuts down, management tools are in for a surprise.  On the
                 * other hand, if we report failure, then the management tools
                 * might try to restart the domain on the source side, even
                 * though the domain is actually running on the destination.
                 * Return a NULL dom pointer, and hope that this is a rare
                 * situation and management tools are smart.
                 */
                vm = NULL;
9295
                goto endjob;
C
Chris Lalancette 已提交
9296 9297 9298 9299 9300 9301 9302 9303 9304
            }

            event = virDomainEventNewFromObj(vm,
                                             VIR_DOMAIN_EVENT_DEFINED,
                                             newVM ?
                                             VIR_DOMAIN_EVENT_DEFINED_ADDED :
                                             VIR_DOMAIN_EVENT_DEFINED_UPDATED);
            if (event)
                qemuDomainEventQueue(driver, event);
9305
            event = NULL;
C
Chris Lalancette 已提交
9306 9307

        }
9308
        qemuDomainObjPrivatePtr priv = vm->privateData;
D
Daniel Veillard 已提交
9309
        dom = virGetDomain (dconn, vm->def->name, vm->def->uuid);
9310

9311 9312 9313 9314 9315 9316 9317 9318
        if (!(flags & VIR_MIGRATE_PAUSED)) {
            /* run 'cont' on the destination, which allows migration on qemu
             * >= 0.10.6 to work properly.  This isn't strictly necessary on
             * older qemu's, but it also doesn't hurt anything there
             */
            qemuDomainObjEnterMonitorWithDriver(driver, vm);
            if (qemuMonitorStartCPUs(priv->mon, dconn) < 0) {
                if (virGetLastError() == NULL)
9319 9320
                    qemuReportError(VIR_ERR_INTERNAL_ERROR,
                                    "%s", _("resume operation failed"));
9321 9322 9323
                qemuDomainObjExitMonitorWithDriver(driver, vm);
                goto endjob;
            }
9324
            qemuDomainObjExitMonitorWithDriver(driver, vm);
9325 9326

            vm->state = VIR_DOMAIN_RUNNING;
9327 9328
        }

9329 9330 9331
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_RESUMED,
                                         VIR_DOMAIN_EVENT_RESUMED_MIGRATED);
9332 9333 9334 9335 9336 9337
        if (vm->state == VIR_DOMAIN_PAUSED) {
            qemuDomainEventQueue(driver, event);
            event = virDomainEventNewFromObj(vm,
                                             VIR_DOMAIN_EVENT_SUSPENDED,
                                             VIR_DOMAIN_EVENT_SUSPENDED_PAUSED);
        }
9338
        virDomainSaveStatus(driver->caps, driver->stateDir, vm);
D
Daniel Veillard 已提交
9339
    } else {
9340
        qemudShutdownVMDaemon(driver, vm);
9341 9342 9343
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STOPPED,
                                         VIR_DOMAIN_EVENT_STOPPED_FAILED);
9344
        if (!vm->persistent) {
9345 9346
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains, vm);
9347 9348
            vm = NULL;
        }
D
Daniel Veillard 已提交
9349
    }
9350

9351
endjob:
9352 9353 9354
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
9355

9356
cleanup:
9357 9358 9359 9360
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
9361 9362
    if (vm)
        virDomainObjUnlock(vm);
9363 9364
    if (event)
        qemuDomainEventQueue(driver, event);
9365
    qemuDriverUnlock(driver);
9366
    return dom;
D
Daniel Veillard 已提交
9367 9368
}

9369 9370 9371 9372 9373 9374 9375 9376 9377 9378 9379 9380 9381 9382 9383 9384
static int
qemudNodeDeviceGetPciInfo (virNodeDevicePtr dev,
                           unsigned *domain,
                           unsigned *bus,
                           unsigned *slot,
                           unsigned *function)
{
    virNodeDeviceDefPtr def = NULL;
    virNodeDevCapsDefPtr cap;
    char *xml = NULL;
    int ret = -1;

    xml = virNodeDeviceGetXMLDesc(dev, 0);
    if (!xml)
        goto out;

9385
    def = virNodeDeviceDefParseString(xml, EXISTING_DEVICE);
9386 9387 9388 9389 9390 9391 9392 9393 9394 9395 9396 9397 9398 9399 9400 9401 9402
    if (!def)
        goto out;

    cap = def->caps;
    while (cap) {
        if (cap->type == VIR_NODE_DEV_CAP_PCI_DEV) {
            *domain   = cap->data.pci_dev.domain;
            *bus      = cap->data.pci_dev.bus;
            *slot     = cap->data.pci_dev.slot;
            *function = cap->data.pci_dev.function;
            break;
        }

        cap = cap->next;
    }

    if (!cap) {
9403 9404
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("device %s is not a PCI device"), dev->name);
9405 9406 9407 9408 9409 9410 9411 9412 9413 9414 9415 9416 9417 9418 9419 9420 9421 9422 9423 9424
        goto out;
    }

    ret = 0;
out:
    virNodeDeviceDefFree(def);
    VIR_FREE(xml);
    return ret;
}

static int
qemudNodeDeviceDettach (virNodeDevicePtr dev)
{
    pciDevice *pci;
    unsigned domain, bus, slot, function;
    int ret = -1;

    if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0)
        return -1;

9425
    pci = pciGetDevice(domain, bus, slot, function);
9426 9427 9428
    if (!pci)
        return -1;

9429
    if (pciDettachDevice(pci) < 0)
9430 9431 9432 9433
        goto out;

    ret = 0;
out:
9434
    pciFreeDevice(pci);
9435 9436 9437 9438 9439 9440 9441 9442 9443 9444 9445 9446 9447
    return ret;
}

static int
qemudNodeDeviceReAttach (virNodeDevicePtr dev)
{
    pciDevice *pci;
    unsigned domain, bus, slot, function;
    int ret = -1;

    if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0)
        return -1;

9448
    pci = pciGetDevice(domain, bus, slot, function);
9449 9450 9451
    if (!pci)
        return -1;

9452
    if (pciReAttachDevice(pci) < 0)
9453 9454 9455 9456
        goto out;

    ret = 0;
out:
9457
    pciFreeDevice(pci);
9458 9459 9460 9461 9462 9463
    return ret;
}

static int
qemudNodeDeviceReset (virNodeDevicePtr dev)
{
9464
    struct qemud_driver *driver = dev->conn->privateData;
9465 9466 9467 9468 9469 9470 9471
    pciDevice *pci;
    unsigned domain, bus, slot, function;
    int ret = -1;

    if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0)
        return -1;

9472
    pci = pciGetDevice(domain, bus, slot, function);
9473 9474 9475
    if (!pci)
        return -1;

9476 9477
    qemuDriverLock(driver);

9478
    if (pciResetDevice(pci, driver->activePciHostdevs) < 0)
9479 9480 9481 9482
        goto out;

    ret = 0;
out:
9483
    qemuDriverUnlock(driver);
9484
    pciFreeDevice(pci);
9485 9486 9487
    return ret;
}

9488 9489 9490 9491 9492 9493 9494 9495 9496 9497 9498
static int
qemuCPUCompare(virConnectPtr conn,
               const char *xmlDesc,
               unsigned int flags ATTRIBUTE_UNUSED)
{
    struct qemud_driver *driver = conn->privateData;
    int ret = VIR_CPU_COMPARE_ERROR;

    qemuDriverLock(driver);

    if (!driver->caps || !driver->caps->host.cpu) {
9499 9500
        qemuReportError(VIR_ERR_NO_SUPPORT,
                        "%s", _("cannot get host CPU capabilities"));
9501 9502
    }
    else
9503
        ret = cpuCompareXML(driver->caps->host.cpu, xmlDesc);
9504 9505 9506 9507 9508 9509

    qemuDriverUnlock(driver);

    return ret;
}

9510

9511 9512 9513 9514 9515 9516 9517 9518 9519 9520 9521 9522 9523
static char *
qemuCPUBaseline(virConnectPtr conn ATTRIBUTE_UNUSED,
                const char **xmlCPUs,
                unsigned int ncpus,
                unsigned int flags ATTRIBUTE_UNUSED)
{
    char *cpu;

    cpu = cpuBaselineXML(xmlCPUs, ncpus, NULL, 0);

    return cpu;
}

9524 9525 9526 9527 9528 9529 9530 9531 9532 9533 9534 9535 9536 9537 9538 9539 9540 9541 9542 9543 9544 9545 9546 9547 9548 9549 9550 9551 9552 9553 9554 9555 9556 9557 9558 9559 9560 9561 9562 9563 9564 9565 9566

static int qemuDomainGetJobInfo(virDomainPtr dom,
                                virDomainJobInfoPtr info) {
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
    qemuDomainObjPrivatePtr priv;

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    priv = vm->privateData;

    if (virDomainObjIsActive(vm)) {
        if (priv->jobActive) {
            memcpy(info, &priv->jobInfo, sizeof(*info));
        } else {
            memset(info, 0, sizeof(*info));
            info->type = VIR_DOMAIN_JOB_NONE;
        }
    } else {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
        goto cleanup;
    }

    ret = 0;

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    return ret;
}


9567 9568 9569 9570 9571 9572 9573 9574 9575 9576 9577 9578 9579 9580 9581 9582 9583 9584 9585 9586 9587 9588
static int qemuDomainAbortJob(virDomainPtr dom) {
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
    qemuDomainObjPrivatePtr priv;

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    priv = vm->privateData;

    if (virDomainObjIsActive(vm)) {
        if (priv->jobActive) {
            VIR_DEBUG("Requesting cancellation of job on vm %s", vm->def->name);
9589
            priv->jobSignals |= QEMU_JOB_SIGNAL_CANCEL;
9590 9591 9592 9593 9594 9595 9596 9597 9598 9599 9600 9601 9602 9603 9604 9605 9606 9607 9608 9609
        } else {
            qemuReportError(VIR_ERR_OPERATION_INVALID,
                            "%s", _("no job is active on the domain"));
            goto cleanup;
        }
    } else {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
        goto cleanup;
    }

    ret = 0;

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    return ret;
}


9610 9611 9612 9613 9614 9615 9616 9617 9618 9619 9620 9621 9622 9623 9624 9625 9626 9627 9628 9629 9630 9631 9632 9633 9634 9635 9636 9637 9638 9639 9640 9641 9642 9643 9644 9645 9646 9647 9648 9649 9650 9651 9652 9653 9654 9655 9656 9657 9658 9659 9660 9661 9662 9663
static int
qemuDomainMigrateSetMaxDowntime(virDomainPtr dom,
                                unsigned long long downtime,
                                unsigned int flags)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    qemuDomainObjPrivatePtr priv;
    int ret = -1;

    if (flags != 0) {
        qemuReportError(VIR_ERR_INVALID_ARG,
                        _("unsupported flags (0x%x) passed to '%s'"), flags, __FUNCTION__);
        return -1;
    }

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemuReportError(VIR_ERR_NO_DOMAIN,
                        _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    if (!virDomainObjIsActive(vm)) {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not running"));
        goto cleanup;
    }

    priv = vm->privateData;

    if (priv->jobActive != QEMU_JOB_MIGRATION) {
        qemuReportError(VIR_ERR_OPERATION_INVALID,
                        "%s", _("domain is not being migrated"));
        goto cleanup;
    }

    VIR_DEBUG("Requesting migration downtime change to %llums", downtime);
    priv->jobSignals |= QEMU_JOB_SIGNAL_MIGRATE_DOWNTIME;
    priv->jobSignalsData.migrateDowntime = downtime;
    ret = 0;

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    qemuDriverUnlock(driver);
    return ret;
}


9664 9665 9666 9667 9668
static virDriver qemuDriver = {
    VIR_DRV_QEMU,
    "QEMU",
    qemudOpen, /* open */
    qemudClose, /* close */
D
Daniel Veillard 已提交
9669
    qemudSupportsFeature, /* supports_feature */
9670 9671
    qemudGetType, /* type */
    qemudGetVersion, /* version */
9672
    NULL, /* libvirtVersion (impl. in libvirt.c) */
9673
    virGetHostname, /* getHostname */
9674
    qemudGetMaxVCPUs, /* getMaxVcpus */
9675
    nodeGetInfo, /* nodeGetInfo */
9676 9677 9678
    qemudGetCapabilities, /* getCapabilities */
    qemudListDomains, /* listDomains */
    qemudNumDomains, /* numOfDomains */
9679
    qemudDomainCreate, /* domainCreateXML */
9680 9681 9682 9683 9684
    qemudDomainLookupByID, /* domainLookupByID */
    qemudDomainLookupByUUID, /* domainLookupByUUID */
    qemudDomainLookupByName, /* domainLookupByName */
    qemudDomainSuspend, /* domainSuspend */
    qemudDomainResume, /* domainResume */
9685
    qemudDomainShutdown, /* domainShutdown */
9686 9687 9688
    NULL, /* domainReboot */
    qemudDomainDestroy, /* domainDestroy */
    qemudDomainGetOSType, /* domainGetOSType */
9689
    qemudDomainGetMaxMemory, /* domainGetMaxMemory */
9690
    NULL, /* domainSetMaxMemory */
9691
    qemudDomainSetMemory, /* domainSetMemory */
9692 9693 9694
    qemudDomainGetInfo, /* domainGetInfo */
    qemudDomainSave, /* domainSave */
    qemudDomainRestore, /* domainRestore */
P
Paolo Bonzini 已提交
9695
    qemudDomainCoreDump, /* domainCoreDump */
9696
    qemudDomainSetVcpus, /* domainSetVcpus */
9697 9698
    qemudDomainPinVcpu, /* domainPinVcpu */
    qemudDomainGetVcpus, /* domainGetVcpus */
9699
    qemudDomainGetMaxVcpus, /* domainGetMaxVcpus */
9700 9701
    qemudDomainGetSecurityLabel, /* domainGetSecurityLabel */
    qemudNodeGetSecurityModel, /* nodeGetSecurityModel */
9702
    qemudDomainDumpXML, /* domainDumpXML */
9703
    qemuDomainXMLFromNative, /* domainXmlFromNative */
9704
    qemuDomainXMLToNative, /* domainXMLToNative */
9705 9706
    qemudListDefinedDomains, /* listDefinedDomains */
    qemudNumDefinedDomains, /* numOfDefinedDomains */
9707 9708 9709
    qemudDomainStart, /* domainCreate */
    qemudDomainDefine, /* domainDefineXML */
    qemudDomainUndefine, /* domainUndefine */
9710
    qemudDomainAttachDevice, /* domainAttachDevice */
9711
    qemudDomainAttachDeviceFlags, /* domainAttachDeviceFlags */
9712
    qemudDomainDetachDevice, /* domainDetachDevice */
9713
    qemudDomainDetachDeviceFlags, /* domainDetachDeviceFlags */
9714 9715
    qemudDomainGetAutostart, /* domainGetAutostart */
    qemudDomainSetAutostart, /* domainSetAutostart */
9716 9717 9718
    qemuGetSchedulerType, /* domainGetSchedulerType */
    qemuGetSchedulerParameters, /* domainGetSchedulerParameters */
    qemuSetSchedulerParameters, /* domainSetSchedulerParameters */
D
Daniel Veillard 已提交
9719 9720
    NULL, /* domainMigratePrepare (v1) */
    qemudDomainMigratePerform, /* domainMigratePerform */
9721
    NULL, /* domainMigrateFinish */
9722
    qemudDomainBlockStats, /* domainBlockStats */
9723
    qemudDomainInterfaceStats, /* domainInterfaceStats */
9724
    qemudDomainMemoryStats, /* domainMemoryStats */
9725
    qemudDomainBlockPeek, /* domainBlockPeek */
R
Richard W.M. Jones 已提交
9726
    qemudDomainMemoryPeek, /* domainMemoryPeek */
9727 9728
    nodeGetCellsFreeMemory, /* nodeGetCellsFreeMemory */
    nodeGetFreeMemory,  /* getFreeMemory */
9729 9730
    qemuDomainEventRegister, /* domainEventRegister */
    qemuDomainEventDeregister, /* domainEventDeregister */
D
Daniel Veillard 已提交
9731 9732
    qemudDomainMigratePrepare2, /* domainMigratePrepare2 */
    qemudDomainMigrateFinish2, /* domainMigrateFinish2 */
9733 9734 9735
    qemudNodeDeviceDettach, /* nodeDeviceDettach */
    qemudNodeDeviceReAttach, /* nodeDeviceReAttach */
    qemudNodeDeviceReset, /* nodeDeviceReset */
C
Chris Lalancette 已提交
9736
    qemudDomainMigratePrepareTunnel, /* domainMigratePrepareTunnel */
9737 9738 9739 9740
    qemuIsEncrypted,
    qemuIsSecure,
    qemuDomainIsActive,
    qemuDomainIsPersistent,
9741
    qemuCPUCompare, /* cpuCompare */
9742
    qemuCPUBaseline, /* cpuBaseline */
9743
    qemuDomainGetJobInfo, /* domainGetJobInfo */
9744
    qemuDomainAbortJob, /* domainAbortJob */
9745
    qemuDomainMigrateSetMaxDowntime, /* domainMigrateSetMaxDowntime */
9746 9747
    qemuDomainEventRegisterAny, /* domainEventRegisterAny */
    qemuDomainEventDeregisterAny, /* domainEventDeregisterAny */
9748 9749 9750
};


9751
static virStateDriver qemuStateDriver = {
9752
    .name = "QEMU",
9753 9754 9755 9756
    .initialize = qemudStartup,
    .cleanup = qemudShutdown,
    .reload = qemudReload,
    .active = qemudActive,
9757
};
9758

9759
int qemuRegister(void) {
9760 9761 9762 9763
    virRegisterDriver(&qemuDriver);
    virRegisterStateDriver(&qemuStateDriver);
    return 0;
}