libvirt.c 612.9 KB
Newer Older
D
Daniel P. Berrange 已提交
1
/*
2
 * libvirt.c: Main interfaces for the libvirt library to handle virtualization
D
Daniel Veillard 已提交
3 4
 *           domains from a process running in domain 0
 *
E
Eric Blake 已提交
5
 * Copyright (C) 2005-2006, 2008-2014 Red Hat, Inc.
D
Daniel Veillard 已提交
6
 *
O
Osier Yang 已提交
7 8 9 10 11 12 13 14 15 16 17
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
D
Daniel Veillard 已提交
20 21 22 23
 *
 * Daniel Veillard <veillard@redhat.com>
 */

24
#include <config.h>
D
Daniel Veillard 已提交
25

26
#include <stdio.h>
27
#include <stdlib.h>
28
#include <string.h>
29 30 31
#include <sys/types.h>
#include <sys/stat.h>
#include <unistd.h>
E
Eric Blake 已提交
32
#include <sys/wait.h>
33
#include <time.h>
34

35 36
#include <libxml/parser.h>
#include <libxml/xpath.h>
37 38
#include "getpass.h"

39
#ifdef HAVE_WINSOCK2_H
40
# include <winsock2.h>
41
#endif
42

43
#ifdef WITH_CURL
44 45 46
# include <curl/curl.h>
#endif

47
#include "virerror.h"
48
#include "virlog.h"
49
#include "datatypes.h"
50
#include "driver.h"
51

52
#include "viruuid.h"
53
#include "viralloc.h"
54
#include "configmake.h"
55
#include "intprops.h"
56
#include "virconf.h"
57
#if WITH_GNUTLS
58 59 60
# if WITH_GNUTLS_GCRYPT
#  include <gcrypt.h>
# endif
61 62
# include "rpc/virnettlscontext.h"
#endif
63
#include "vircommand.h"
64
#include "virfile.h"
65
#include "virrandom.h"
M
Martin Kletzander 已提交
66
#include "viruri.h"
67
#include "virthread.h"
68
#include "virstring.h"
E
Eric Blake 已提交
69
#include "virutil.h"
70
#include "virtypedparam.h"
71

72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94
#ifdef WITH_TEST
# include "test/test_driver.h"
#endif
#ifdef WITH_REMOTE
# include "remote/remote_driver.h"
#endif
#ifdef WITH_OPENVZ
# include "openvz/openvz_driver.h"
#endif
#ifdef WITH_VMWARE
# include "vmware/vmware_driver.h"
#endif
#ifdef WITH_PHYP
# include "phyp/phyp_driver.h"
#endif
#ifdef WITH_ESX
# include "esx/esx_driver.h"
#endif
#ifdef WITH_HYPERV
# include "hyperv/hyperv_driver.h"
#endif
#ifdef WITH_XENAPI
# include "xenapi/xenapi_driver.h"
95
#endif
D
Dmitry Guryanov 已提交
96 97 98
#ifdef WITH_PARALLELS
# include "parallels/parallels_driver.h"
#endif
R
Roman Bogorodskiy 已提交
99 100 101
#ifdef WITH_BHYVE
# include "bhyve/bhyve_driver.h"
#endif
102

103 104
#define VIR_FROM_THIS VIR_FROM_NONE

105 106
VIR_LOG_INIT("libvirt");

D
Daniel Veillard 已提交
107 108 109
/*
 * TODO:
 * - use lock to protect against concurrent accesses ?
D
Daniel Veillard 已提交
110
 * - use reference counting to guarantee coherent pointer state ?
D
Daniel Veillard 已提交
111 112
 */

113
#define MAX_DRIVERS 20
114

115 116 117 118 119 120 121 122 123 124
#define virDriverCheckTabMaxReturn(count, ret)                          \
    do {                                                                \
        if ((count) >= MAX_DRIVERS) {                                   \
            virReportError(VIR_ERR_INTERNAL_ERROR,                      \
                           _("Too many drivers, cannot register %s"),   \
                           driver->name);                               \
            return ret;                                                 \
        }                                                               \
    } while (0)

125
static virDriverPtr virDriverTab[MAX_DRIVERS];
126
static int virDriverTabCount = 0;
127
static virNetworkDriverPtr virNetworkDriverTab[MAX_DRIVERS];
128
static int virNetworkDriverTabCount = 0;
D
Daniel Veillard 已提交
129 130
static virInterfaceDriverPtr virInterfaceDriverTab[MAX_DRIVERS];
static int virInterfaceDriverTabCount = 0;
131 132
static virStorageDriverPtr virStorageDriverTab[MAX_DRIVERS];
static int virStorageDriverTabCount = 0;
133 134
static virNodeDeviceDriverPtr virNodeDeviceDriverTab[MAX_DRIVERS];
static int virNodeDeviceDriverTabCount = 0;
135 136
static virSecretDriverPtr virSecretDriverTab[MAX_DRIVERS];
static int virSecretDriverTabCount = 0;
S
Stefan Berger 已提交
137 138
static virNWFilterDriverPtr virNWFilterDriverTab[MAX_DRIVERS];
static int virNWFilterDriverTabCount = 0;
A
Atsushi SAKAI 已提交
139
#ifdef WITH_LIBVIRTD
140 141
static virStateDriverPtr virStateDriverTab[MAX_DRIVERS];
static int virStateDriverTabCount = 0;
A
Atsushi SAKAI 已提交
142
#endif
143

144

145
#if defined(POLKIT_AUTH)
146 147 148
static int
virConnectAuthGainPolkit(const char *privilege)
{
E
Eric Blake 已提交
149 150
    virCommandPtr cmd;
    int ret = -1;
151

152
    if (geteuid() == 0)
153 154
        return 0;

E
Eric Blake 已提交
155
    cmd = virCommandNewArgList(POLKIT_AUTH, "--obtain", privilege, NULL);
156
    if (virCommandRun(cmd, NULL) < 0)
E
Eric Blake 已提交
157
        goto cleanup;
158

E
Eric Blake 已提交
159
    ret = 0;
160
 cleanup:
E
Eric Blake 已提交
161 162
    virCommandFree(cmd);
    return ret;
163 164 165
}
#endif

166 167 168 169 170 171

static int
virConnectAuthCallbackDefault(virConnectCredentialPtr cred,
                              unsigned int ncred,
                              void *cbdata ATTRIBUTE_UNUSED)
{
172
    size_t i;
173

174
    for (i = 0; i < ncred; i++) {
175 176
        char buf[1024];
        char *bufptr = buf;
177
        size_t len;
178 179

        switch (cred[i].type) {
180 181 182 183
        case VIR_CRED_EXTERNAL: {
            if (STRNEQ(cred[i].challenge, "PolicyKit"))
                return -1;

184
#if defined(POLKIT_AUTH)
185
            if (virConnectAuthGainPolkit(cred[i].prompt) < 0)
186
                return -1;
187 188 189 190 191 192 193
#else
            /*
             * Ignore & carry on. Although we can't auth
             * directly, the user may have authenticated
             * themselves already outside context of libvirt
             */
#endif
194 195
            break;
        }
196

197 198 199 200
        case VIR_CRED_USERNAME:
        case VIR_CRED_AUTHNAME:
        case VIR_CRED_ECHOPROMPT:
        case VIR_CRED_REALM:
201
            if (printf("%s: ", cred[i].prompt) < 0)
202 203 204 205
                return -1;
            if (fflush(stdout) != 0)
                return -1;

206 207 208 209 210 211 212
            if (!fgets(buf, sizeof(buf), stdin)) {
                if (feof(stdin)) { /* Treat EOF as "" */
                    buf[0] = '\0';
                    break;
                }
                return -1;
            }
213 214 215
            len = strlen(buf);
            if (len != 0 && buf[len-1] == '\n')
                buf[len-1] = '\0';
216 217 218 219
            break;

        case VIR_CRED_PASSPHRASE:
        case VIR_CRED_NOECHOPROMPT:
220
            if (printf("%s: ", cred[i].prompt) < 0)
221 222 223 224
                return -1;
            if (fflush(stdout) != 0)
                return -1;

225 226 227 228
            bufptr = getpass("");
            if (!bufptr)
                return -1;
            break;
229 230 231

        default:
            return -1;
232 233
        }

D
Daniel P. Berrange 已提交
234
        if (cred[i].type != VIR_CRED_EXTERNAL) {
235 236 237
            if (VIR_STRDUP(cred[i].result,
                           STREQ(bufptr, "") && cred[i].defresult ?
                           cred[i].defresult : bufptr) < 0)
D
Daniel P. Berrange 已提交
238 239 240
                return -1;
            cred[i].resultlen = strlen(cred[i].result);
        }
241 242 243 244 245
    }

    return 0;
}

246

247 248 249 250 251 252 253 254 255 256
/* Don't typically want VIR_CRED_USERNAME. It enables you to authenticate
 * as one user, and act as another. It just results in annoying
 * prompts for the username twice & is very rarely what you want
 */
static int virConnectCredTypeDefault[] = {
    VIR_CRED_AUTHNAME,
    VIR_CRED_ECHOPROMPT,
    VIR_CRED_REALM,
    VIR_CRED_PASSPHRASE,
    VIR_CRED_NOECHOPROMPT,
257
    VIR_CRED_EXTERNAL,
258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278
};

static virConnectAuth virConnectAuthDefault = {
    virConnectCredTypeDefault,
    sizeof(virConnectCredTypeDefault)/sizeof(int),
    virConnectAuthCallbackDefault,
    NULL,
};

/*
 * virConnectAuthPtrDefault
 *
 * A default implementation of the authentication callbacks. This
 * implementation is suitable for command line based tools. It will
 * prompt for username, passwords, realm and one time keys as needed.
 * It will print on STDOUT, and read from STDIN. If this is not
 * suitable for the application's needs an alternative implementation
 * should be provided.
 */
virConnectAuthPtr virConnectAuthPtrDefault = &virConnectAuthDefault;

279 280
#if HAVE_WINSOCK2_H
static int
281
winsock_init(void)
282 283 284 285 286 287 288
{
    WORD winsock_version, err;
    WSADATA winsock_data;

    /* http://msdn2.microsoft.com/en-us/library/ms742213.aspx */
    winsock_version = MAKEWORD (2, 2);
    err = WSAStartup (winsock_version, &winsock_data);
J
Jim Meyering 已提交
289
    return err == 0 ? 0 : -1;
290 291 292
}
#endif

293

294
#ifdef WITH_GNUTLS_GCRYPT
295 296
static int
virTLSMutexInit(void **priv)
297
{
D
Daniel P. Berrange 已提交
298 299
    virMutexPtr lock = NULL;

300
    if (VIR_ALLOC_QUIET(lock) < 0)
D
Daniel P. Berrange 已提交
301 302 303 304 305 306 307 308 309 310 311
        return ENOMEM;

    if (virMutexInit(lock) < 0) {
        VIR_FREE(lock);
        return errno;
    }

    *priv = lock;
    return 0;
}

312 313 314

static int
virTLSMutexDestroy(void **priv)
D
Daniel P. Berrange 已提交
315 316 317 318 319 320 321
{
    virMutexPtr lock = *priv;
    virMutexDestroy(lock);
    VIR_FREE(lock);
    return 0;
}

322 323 324

static int
virTLSMutexLock(void **priv)
D
Daniel P. Berrange 已提交
325 326 327 328 329 330
{
    virMutexPtr lock = *priv;
    virMutexLock(lock);
    return 0;
}

331 332 333

static int
virTLSMutexUnlock(void **priv)
D
Daniel P. Berrange 已提交
334 335 336 337 338 339
{
    virMutexPtr lock = *priv;
    virMutexUnlock(lock);
    return 0;
}

340

D
Daniel P. Berrange 已提交
341
static struct gcry_thread_cbs virTLSThreadImpl = {
342
    /* GCRY_THREAD_OPTION_VERSION was added in gcrypt 1.4.2 */
343
# ifdef GCRY_THREAD_OPTION_VERSION
D
Daniel P. Berrange 已提交
344
    (GCRY_THREAD_OPTION_PTHREAD | (GCRY_THREAD_OPTION_VERSION << 8)),
345
# else
346
    GCRY_THREAD_OPTION_PTHREAD,
347
# endif
D
Daniel P. Berrange 已提交
348 349 350 351 352 353 354
    NULL,
    virTLSMutexInit,
    virTLSMutexDestroy,
    virTLSMutexLock,
    virTLSMutexUnlock,
    NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL
};
355
#endif /* WITH_GNUTLS_GCRYPT */
D
Daniel P. Berrange 已提交
356

357

358 359
static bool virGlobalError = false;
static virOnceControl virGlobalOnce = VIR_ONCE_CONTROL_INITIALIZER;
360

361 362 363
static void
virGlobalInit(void)
{
364 365 366 367 368
    /* It would be nice if we could trace the use of this call, to
     * help diagnose in log files if a user calls something other than
     * virConnectOpen first.  But we can't rely on VIR_DEBUG working
     * until after initialization is complete, and since this is
     * one-shot, we never get here again.  */
369
    if (virThreadInitialize() < 0 ||
370
        virErrorInitialize() < 0)
371
        goto error;
372

373
#ifndef LIBVIRT_SETUID_RPC_CLIENT
374 375 376 377 378 379 380
    if (virIsSUID()) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("libvirt.so is not safe to use from setuid programs"));
        goto error;
    }
#endif

381
#ifdef WITH_GNUTLS_GCRYPT
382 383 384 385 386 387 388 389 390 391 392 393 394
    /*
     * This sequence of API calls it copied exactly from
     * gnutls 2.12.23 source lib/gcrypt/init.c, with
     * exception that GCRYCTL_ENABLE_QUICK_RANDOM, is
     * dropped
     */
    if (gcry_control(GCRYCTL_ANY_INITIALIZATION_P) == 0) {
        gcry_control(GCRYCTL_SET_THREAD_CBS, &virTLSThreadImpl);
        gcry_check_version(NULL);

        gcry_control(GCRYCTL_DISABLE_SECMEM, NULL, 0);
        gcry_control(GCRYCTL_INITIALIZATION_FINISHED, NULL, 0);
    }
395
#endif
D
Daniel P. Berrange 已提交
396

397
    virLogSetFromEnv();
398

399
#ifdef WITH_GNUTLS
400
    virNetTLSInit();
401
#endif
402

403
#if WITH_CURL
404 405 406
    curl_global_init(CURL_GLOBAL_DEFAULT);
#endif

407
    VIR_DEBUG("register drivers");
408

409
#if HAVE_WINSOCK2_H
410
    if (winsock_init() == -1)
411
        goto error;
412 413
#endif

414
    if (!bindtextdomain(PACKAGE, LOCALEDIR))
415
        goto error;
416

417 418 419 420 421
    /*
     * Note we must avoid everything except 'remote' driver
     * for virt-login-shell usage
     */
#ifndef LIBVIRT_SETUID_RPC_CLIENT
422
    /*
423 424
     * Note that the order is important: the first ones have a higher
     * priority when calling virConnectOpen.
425
     */
426
# ifdef WITH_TEST
427 428
    if (testRegister() == -1)
        goto error;
429 430
# endif
# ifdef WITH_OPENVZ
431 432
    if (openvzRegister() == -1)
        goto error;
433 434
# endif
# ifdef WITH_VMWARE
435 436
    if (vmwareRegister() == -1)
        goto error;
437 438
# endif
# ifdef WITH_PHYP
439 440
    if (phypRegister() == -1)
        goto error;
441 442
# endif
# ifdef WITH_ESX
443 444
    if (esxRegister() == -1)
        goto error;
445 446
# endif
# ifdef WITH_HYPERV
447 448
    if (hypervRegister() == -1)
        goto error;
449 450
# endif
# ifdef WITH_XENAPI
451 452
    if (xenapiRegister() == -1)
        goto error;
453 454
# endif
# ifdef WITH_PARALLELS
455 456
    if (parallelsRegister() == -1)
        goto error;
457
# endif
D
Dmitry Guryanov 已提交
458
#endif
459
#ifdef WITH_REMOTE
460
    if (remoteRegister() == -1)
461
        goto error;
462
#endif
D
Daniel P. Berrange 已提交
463

464 465
    return;

466
 error:
467 468 469
    virGlobalError = true;
}

470

471 472 473 474 475
/**
 * virInitialize:
 *
 * Initialize the library.
 *
476 477 478 479 480 481
 * This method is invoked automatically by any of the virConnectOpen() API
 * calls, and by virGetVersion(). Since release 1.0.0, there is no need to
 * call this method even in a multithreaded application, since
 * initialization is performed in a thread safe manner; but applications
 * using an older version of the library should manually call this before
 * setting up competing threads that attempt virConnectOpen in parallel.
482
 *
483 484 485 486 487
 * The only other time it would be necessary to call virInitialize is if the
 * application did not invoke virConnectOpen as its first API call, such
 * as when calling virEventRegisterImpl() before setting up connections,
 * or when using virSetErrorFunc() to alter error reporting of the first
 * connection attempt.
488 489 490 491 492 493 494 495 496 497 498
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
virInitialize(void)
{
    if (virOnce(&virGlobalOnce, virGlobalInit) < 0)
        return -1;

    if (virGlobalError)
        return -1;
499
    return 0;
500 501
}

502

503 504
#ifdef WIN32
BOOL WINAPI
505
DllMain(HINSTANCE instance, DWORD reason, LPVOID ignore);
506 507

BOOL WINAPI
508 509 510
DllMain(HINSTANCE instance ATTRIBUTE_UNUSED,
        DWORD reason,
        LPVOID ignore ATTRIBUTE_UNUSED)
511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535
{
    switch (reason) {
    case DLL_PROCESS_ATTACH:
        virInitialize();
        break;

    case DLL_THREAD_ATTACH:
        /* Nothing todo in libvirt yet */
        break;

    case DLL_THREAD_DETACH:
        /* Release per-thread local data */
        virThreadOnExit();
        break;

    case DLL_PROCESS_DETACH:
        /* Don't bother releasing per-thread data
           since (hopefully) windows cleans up
           everything on process exit */
        break;
    }

    return TRUE;
}
#endif
536

537

538 539 540 541 542 543 544 545 546 547 548
/**
 * virRegisterNetworkDriver:
 * @driver: pointer to a network driver block
 *
 * Register a network virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterNetworkDriver(virNetworkDriverPtr driver)
{
549
    virCheckNonNullArgReturn(driver, -1);
550
    virDriverCheckTabMaxReturn(virNetworkDriverTabCount, -1);
551

552
    VIR_DEBUG("registering %s as network driver %d",
553 554
           driver->name, virNetworkDriverTabCount);

555 556
    virNetworkDriverTab[virNetworkDriverTabCount] = driver;
    return virNetworkDriverTabCount++;
557 558
}

559

D
Daniel Veillard 已提交
560 561
/**
 * virRegisterInterfaceDriver:
L
Laine Stump 已提交
562
 * @driver: pointer to an interface driver block
D
Daniel Veillard 已提交
563
 *
L
Laine Stump 已提交
564
 * Register an interface virtualization driver
D
Daniel Veillard 已提交
565 566 567 568 569 570
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterInterfaceDriver(virInterfaceDriverPtr driver)
{
571
    virCheckNonNullArgReturn(driver, -1);
572
    virDriverCheckTabMaxReturn(virInterfaceDriverTabCount, -1);
D
Daniel Veillard 已提交
573

574
    VIR_DEBUG("registering %s as interface driver %d",
D
Daniel Veillard 已提交
575 576 577 578 579 580
           driver->name, virInterfaceDriverTabCount);

    virInterfaceDriverTab[virInterfaceDriverTabCount] = driver;
    return virInterfaceDriverTabCount++;
}

581

582 583 584 585 586 587 588 589 590 591 592
/**
 * virRegisterStorageDriver:
 * @driver: pointer to a storage driver block
 *
 * Register a storage virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterStorageDriver(virStorageDriverPtr driver)
{
593
    virCheckNonNullArgReturn(driver, -1);
594
    virDriverCheckTabMaxReturn(virStorageDriverTabCount, -1);
595

596
    VIR_DEBUG("registering %s as storage driver %d",
597 598
           driver->name, virStorageDriverTabCount);

599 600 601 602
    virStorageDriverTab[virStorageDriverTabCount] = driver;
    return virStorageDriverTabCount++;
}

603

604
/**
605
 * virRegisterNodeDeviceDriver:
606 607 608 609 610 611 612
 * @driver: pointer to a device monitor block
 *
 * Register a device monitor
 *
 * Returns the driver priority or -1 in case of error.
 */
int
613
virRegisterNodeDeviceDriver(virNodeDeviceDriverPtr driver)
614
{
615
    virCheckNonNullArgReturn(driver, -1);
616
    virDriverCheckTabMaxReturn(virNodeDeviceDriverTabCount, -1);
617

618
    VIR_DEBUG("registering %s as device driver %d",
619
           driver->name, virNodeDeviceDriverTabCount);
620

621 622
    virNodeDeviceDriverTab[virNodeDeviceDriverTabCount] = driver;
    return virNodeDeviceDriverTabCount++;
623 624
}

625

626 627 628 629 630 631 632 633 634 635 636
/**
 * virRegisterSecretDriver:
 * @driver: pointer to a secret driver block
 *
 * Register a secret driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterSecretDriver(virSecretDriverPtr driver)
{
637
    virCheckNonNullArgReturn(driver, -1);
638
    virDriverCheckTabMaxReturn(virSecretDriverTabCount, -1);
639

640
    VIR_DEBUG("registering %s as secret driver %d",
641 642 643 644 645 646
           driver->name, virSecretDriverTabCount);

    virSecretDriverTab[virSecretDriverTabCount] = driver;
    return virSecretDriverTabCount++;
}

647

S
Stefan Berger 已提交
648 649 650 651 652 653 654 655 656 657 658
/**
 * virRegisterNWFilterDriver:
 * @driver: pointer to a network filter driver block
 *
 * Register a network filter virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterNWFilterDriver(virNWFilterDriverPtr driver)
{
659
    virCheckNonNullArgReturn(driver, -1);
660
    virDriverCheckTabMaxReturn(virNWFilterDriverTabCount, -1);
S
Stefan Berger 已提交
661

662
    VIR_DEBUG("registering %s as network filter driver %d",
S
Stefan Berger 已提交
663 664 665 666 667 668 669
           driver->name, virNWFilterDriverTabCount);

    virNWFilterDriverTab[virNWFilterDriverTabCount] = driver;
    return virNWFilterDriverTabCount++;
}


670 671 672 673 674 675 676 677 678 679 680
/**
 * virRegisterDriver:
 * @driver: pointer to a driver block
 *
 * Register a virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterDriver(virDriverPtr driver)
{
681 682
    VIR_DEBUG("driver=%p name=%s", driver,
              driver ? NULLSTR(driver->name) : "(null)");
683

684
    virCheckNonNullArgReturn(driver, -1);
685
    virDriverCheckTabMaxReturn(virDriverTabCount, -1);
686

687
    VIR_DEBUG("registering %s as driver %d",
688 689
           driver->name, virDriverTabCount);

690 691
    virDriverTab[virDriverTabCount] = driver;
    return virDriverTabCount++;
692 693
}

694

A
Atsushi SAKAI 已提交
695
#ifdef WITH_LIBVIRTD
696 697 698 699 700 701 702 703 704 705 706
/**
 * virRegisterStateDriver:
 * @driver: pointer to a driver block
 *
 * Register a virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterStateDriver(virStateDriverPtr driver)
{
707
    virCheckNonNullArgReturn(driver, -1);
708
    virDriverCheckTabMaxReturn(virStateDriverTabCount, -1);
709 710 711 712 713

    virStateDriverTab[virStateDriverTabCount] = driver;
    return virStateDriverTabCount++;
}

714

715 716
/**
 * virStateInitialize:
717
 * @privileged: set to true if running with root privilege, false otherwise
718 719
 * @callback: callback to invoke to inhibit shutdown of the daemon
 * @opaque: data to pass to @callback
720
 *
721 722 723 724 725
 * Initialize all virtualization drivers. Accomplished in two phases,
 * the first being state and structure initialization followed by any
 * auto start supported by the driver.  This is done to ensure dependencies
 * that some drivers may have on another driver having been initialized
 * will exist, such as the storage driver's need to use the secret driver.
726
 *
727
 * Returns 0 if all succeed, -1 upon any failure.
728
 */
729 730 731 732
int
virStateInitialize(bool privileged,
                   virStateInhibitCallback callback,
                   void *opaque)
733
{
734
    size_t i;
735 736 737 738

    if (virInitialize() < 0)
        return -1;

739
    for (i = 0; i < virStateDriverTabCount; i++) {
740
        if (virStateDriverTab[i]->stateInitialize) {
741
            VIR_DEBUG("Running global init for %s state driver",
742
                      virStateDriverTab[i]->name);
743 744 745
            if (virStateDriverTab[i]->stateInitialize(privileged,
                                                      callback,
                                                      opaque) < 0) {
746 747 748 749
                virErrorPtr err = virGetLastError();
                VIR_ERROR(_("Initialization of %s state driver failed: %s"),
                          virStateDriverTab[i]->name,
                          err && err->message ? err->message : _("Unknown problem"));
750 751
                return -1;
            }
752
        }
753
    }
754 755 756 757 758 759 760 761

    for (i = 0; i < virStateDriverTabCount; i++) {
        if (virStateDriverTab[i]->stateAutoStart) {
            VIR_DEBUG("Running global auto start for %s state driver",
                      virStateDriverTab[i]->name);
            virStateDriverTab[i]->stateAutoStart();
        }
    }
762
    return 0;
763 764
}

765

766 767 768 769 770
/**
 * virStateCleanup:
 *
 * Run each virtualization driver's cleanup method.
 *
771
 * Returns 0 if all succeed, -1 upon any failure.
772
 */
773 774 775
int
virStateCleanup(void)
{
776 777
    size_t i;
    int ret = 0;
778

779
    for (i = 0; i < virStateDriverTabCount; i++) {
780 781
        if (virStateDriverTab[i]->stateCleanup &&
            virStateDriverTab[i]->stateCleanup() < 0)
782 783 784 785 786
            ret = -1;
    }
    return ret;
}

787

788 789 790 791 792
/**
 * virStateReload:
 *
 * Run each virtualization driver's reload method.
 *
793
 * Returns 0 if all succeed, -1 upon any failure.
794
 */
795 796 797
int
virStateReload(void)
{
798 799
    size_t i;
    int ret = 0;
800

801
    for (i = 0; i < virStateDriverTabCount; i++) {
802 803
        if (virStateDriverTab[i]->stateReload &&
            virStateDriverTab[i]->stateReload() < 0)
804 805 806 807 808
            ret = -1;
    }
    return ret;
}

809

810 811 812 813 814 815 816
/**
 * virStateStop:
 *
 * Run each virtualization driver's "stop" method.
 *
 * Returns 0 if successful, -1 on failure
 */
817 818 819
int
virStateStop(void)
{
820 821
    size_t i;
    int ret = 0;
822

823
    for (i = 0; i < virStateDriverTabCount; i++) {
824 825
        if (virStateDriverTab[i]->stateStop &&
            virStateDriverTab[i]->stateStop())
826 827 828 829
            ret = 1;
    }
    return ret;
}
830
#endif /* WITH_LIBVIRTD */
831 832


833 834 835
/**
 * virGetVersion:
 * @libVer: return value for the library version (OUT)
836 837 838 839 840 841 842 843 844 845
 * @type: ignored; pass NULL
 * @typeVer: pass NULL; for historical purposes duplicates @libVer if
 * non-NULL
 *
 * Provides version information. @libVer is the version of the
 * library and will always be set unless an error occurs, in which case
 * an error code will be returned. @typeVer exists for historical
 * compatibility; if it is not NULL it will duplicate @libVer (it was
 * originally intended to return hypervisor information based on @type,
 * but due to the design of remote clients this is not reliable). To
846
 * get the version of the running hypervisor use the virConnectGetVersion()
847
 * function instead. To get the libvirt library version used by a
848 849 850
 * connection use the virConnectGetLibVersion() instead.
 *
 * This function includes a call to virInitialize() when necessary.
851 852 853 854 855
 *
 * Returns -1 in case of failure, 0 otherwise, and values for @libVer and
 *       @typeVer have the format major * 1,000,000 + minor * 1,000 + release.
 */
int
856
virGetVersion(unsigned long *libVer, const char *type ATTRIBUTE_UNUSED,
857 858
              unsigned long *typeVer)
{
859 860
    if (virInitialize() < 0)
        goto error;
861
    VIR_DEBUG("libVir=%p, type=%s, typeVer=%p", libVer, type, typeVer);
862

863
    virResetLastError();
864
    if (libVer == NULL)
865
        goto error;
866 867
    *libVer = LIBVIR_VERSION_NUMBER;

868
    if (typeVer != NULL)
869 870
        *typeVer = LIBVIR_VERSION_NUMBER;

871
    return 0;
872

873
 error:
874 875
    virDispatchError(NULL);
    return -1;
876 877
}

878

879
static char *
880
virConnectGetConfigFilePath(void)
881 882 883 884 885
{
    char *path;
    if (geteuid() == 0) {
        if (virAsprintf(&path, "%s/libvirt/libvirt.conf",
                        SYSCONFDIR) < 0)
886
            return NULL;
887
    } else {
888
        char *userdir = virGetUserConfigDirectory();
889
        if (!userdir)
890
            return NULL;
891

892
        if (virAsprintf(&path, "%s/libvirt.conf",
893 894
                        userdir) < 0) {
            VIR_FREE(userdir);
895
            return NULL;
896 897
        }
        VIR_FREE(userdir);
898 899 900 901 902
    }

    return path;
}

903

904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925
static int
virConnectGetConfigFile(virConfPtr *conf)
{
    char *filename = NULL;
    int ret = -1;

    *conf = NULL;

    if (!(filename = virConnectGetConfigFilePath()))
        goto cleanup;

    if (!virFileExists(filename)) {
        ret = 0;
        goto cleanup;
    }

    VIR_DEBUG("Loading config file '%s'", filename);
    if (!(*conf = virConfReadFile(filename, 0)))
        goto cleanup;

    ret = 0;

926
 cleanup:
927 928 929 930
    VIR_FREE(filename);
    return ret;
}

931 932
#define URI_ALIAS_CHARS "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789_-"

933

934
static int
935 936
virConnectOpenFindURIAliasMatch(virConfValuePtr value, const char *alias,
                                char **uri)
937 938
{
    virConfValuePtr entry;
W
Wen Ruo Lv 已提交
939 940
    size_t alias_len;

941
    if (value->type != VIR_CONF_LIST) {
942 943
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Expected a list for 'uri_aliases' config parameter"));
944 945 946 947
        return -1;
    }

    entry = value->list;
W
Wen Ruo Lv 已提交
948
    alias_len = strlen(alias);
949 950 951 952 953
    while (entry) {
        char *offset;
        size_t safe;

        if (entry->type != VIR_CONF_STRING) {
954 955
            virReportError(VIR_ERR_CONF_SYNTAX, "%s",
                           _("Expected a string for 'uri_aliases' config parameter list entry"));
956 957 958 959
            return -1;
        }

        if (!(offset = strchr(entry->str, '='))) {
960 961
            virReportError(VIR_ERR_CONF_SYNTAX,
                           _("Malformed 'uri_aliases' config entry '%s', expected 'alias=uri://host/path'"),
962 963 964 965 966 967
                            entry->str);
            return -1;
        }

        safe  = strspn(entry->str, URI_ALIAS_CHARS);
        if (safe < (offset - entry->str)) {
968 969
            virReportError(VIR_ERR_CONF_SYNTAX,
                           _("Malformed 'uri_aliases' config entry '%s', aliases may only contain 'a-Z, 0-9, _, -'"),
970 971 972 973
                            entry->str);
            return -1;
        }

W
Wen Ruo Lv 已提交
974 975
        if (alias_len == (offset - entry->str) &&
            STREQLEN(entry->str, alias, alias_len)) {
976 977
            VIR_DEBUG("Resolved alias '%s' to '%s'",
                      alias, offset+1);
978
            return VIR_STRDUP(*uri, offset+1);
979 980 981 982 983 984 985 986 987 988
        }

        entry = entry->next;
    }

    VIR_DEBUG("No alias found for '%s', passing through to drivers",
              alias);
    return 0;
}

989

990
static int
991 992
virConnectOpenResolveURIAlias(virConfPtr conf,
                              const char *alias, char **uri)
993 994 995 996 997 998
{
    int ret = -1;
    virConfValuePtr value = NULL;

    *uri = NULL;

999
    if ((value = virConfGetValue(conf, "uri_aliases")))
1000 1001 1002 1003
        ret = virConnectOpenFindURIAliasMatch(value, alias, uri);
    else
        ret = 0;

1004 1005 1006 1007 1008 1009 1010 1011 1012 1013
    return ret;
}


static int
virConnectGetDefaultURI(virConfPtr conf,
                        const char **name)
{
    int ret = -1;
    virConfValuePtr value = NULL;
1014
    const char *defname = virGetEnvBlockSUID("LIBVIRT_DEFAULT_URI");
1015 1016 1017 1018 1019
    if (defname && *defname) {
        VIR_DEBUG("Using LIBVIRT_DEFAULT_URI '%s'", defname);
        *name = defname;
    } else if ((value = virConfGetValue(conf, "uri_default"))) {
        if (value->type != VIR_CONF_STRING) {
1020 1021
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Expected a string for 'uri_default' config parameter"));
1022 1023 1024 1025 1026 1027 1028
            goto cleanup;
        }
        VIR_DEBUG("Using config file uri '%s'", value->str);
        *name = value->str;
    }

    ret = 0;
1029
 cleanup:
1030 1031 1032
    return ret;
}

1033

1034
static virConnectPtr
1035 1036 1037
do_open(const char *name,
        virConnectAuthPtr auth,
        unsigned int flags)
1038
{
1039 1040
    size_t i;
    int res;
1041
    virConnectPtr ret;
1042
    virConfPtr conf = NULL;
1043 1044 1045 1046

    ret = virGetConnect();
    if (ret == NULL)
        return NULL;
1047

1048 1049 1050 1051 1052 1053
    if (virConnectGetConfigFile(&conf) < 0)
        goto failed;

    if (name && name[0] == '\0')
        name = NULL;

1054 1055 1056 1057 1058 1059
    if (!name && virIsSUID()) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("An explicit URI must be provided when setuid"));
        goto failed;
    }

1060
    /*
E
Eric Blake 已提交
1061 1062 1063
     * If no URI is passed, then check for an environment string if not
     * available probe the compiled in drivers to find a default hypervisor
     * if detectable.
1064
     */
1065 1066 1067
    if (!name &&
        virConnectGetDefaultURI(conf, &name) < 0)
        goto failed;
1068

1069
    if (name) {
1070
        char *alias = NULL;
1071 1072 1073 1074 1075 1076 1077
        /* Convert xen -> xen:/// for back compat */
        if (STRCASEEQ(name, "xen"))
            name = "xen:///";

        /* Convert xen:// -> xen:/// because xmlParseURI cannot parse the
         * former.  This allows URIs such as xen://localhost to work.
         */
1078
        if (STREQ(name, "xen://"))
1079 1080
            name = "xen:///";

1081
        if (!(flags & VIR_CONNECT_NO_ALIASES) &&
1082
            virConnectOpenResolveURIAlias(conf, name, &alias) < 0)
1083 1084
            goto failed;

1085
        if (!(ret->uri = virURIParse(alias ? alias : name))) {
1086
            VIR_FREE(alias);
1087 1088
            goto failed;
        }
1089

1090
        VIR_DEBUG("name \"%s\" to URI components:\n"
1091 1092 1093 1094 1095 1096
                  "  scheme %s\n"
                  "  server %s\n"
                  "  user %s\n"
                  "  port %d\n"
                  "  path %s\n",
                  alias ? alias : name,
1097
                  NULLSTR(ret->uri->scheme), NULLSTR(ret->uri->server),
1098 1099 1100 1101
                  NULLSTR(ret->uri->user), ret->uri->port,
                  NULLSTR(ret->uri->path));

        VIR_FREE(alias);
1102
    } else {
1103
        VIR_DEBUG("no name, allowing driver auto-select");
1104 1105
    }

1106 1107 1108
    /* Cleansing flags */
    ret->flags = flags & VIR_CONNECT_RO;

1109
    for (i = 0; i < virDriverTabCount; i++) {
1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123
        /* We're going to probe the remote driver next. So we have already
         * probed all other client-side-only driver before, but none of them
         * accepted the URI.
         * If the scheme corresponds to a known but disabled client-side-only
         * driver then report a useful error, instead of a cryptic one about
         * not being able to connect to libvirtd or not being able to find
         * certificates. */
        if (virDriverTab[i]->no == VIR_DRV_REMOTE &&
            ret->uri != NULL && ret->uri->scheme != NULL &&
            (
#ifndef WITH_PHYP
             STRCASEEQ(ret->uri->scheme, "phyp") ||
#endif
#ifndef WITH_ESX
1124
             STRCASEEQ(ret->uri->scheme, "vpx") ||
1125 1126
             STRCASEEQ(ret->uri->scheme, "esx") ||
             STRCASEEQ(ret->uri->scheme, "gsx") ||
M
Matthias Bolte 已提交
1127 1128 1129
#endif
#ifndef WITH_HYPERV
             STRCASEEQ(ret->uri->scheme, "hyperv") ||
1130 1131 1132
#endif
#ifndef WITH_XENAPI
             STRCASEEQ(ret->uri->scheme, "xenapi") ||
D
Dmitry Guryanov 已提交
1133 1134 1135
#endif
#ifndef WITH_PARALLELS
             STRCASEEQ(ret->uri->scheme, "parallels") ||
1136 1137
#endif
             false)) {
1138
            virReportErrorHelper(VIR_FROM_NONE, VIR_ERR_CONFIG_UNSUPPORTED,
1139 1140 1141 1142 1143 1144
                                 __FILE__, __FUNCTION__, __LINE__,
                                 _("libvirt was built without the '%s' driver"),
                                 ret->uri->scheme);
            goto failed;
        }

1145
        VIR_DEBUG("trying driver %zu (%s) ...", i, virDriverTab[i]->name);
1146
        ret->driver = virDriverTab[i];
1147
        res = virDriverTab[i]->connectOpen(ret, auth, flags);
1148
        VIR_DEBUG("driver %zu %s returned %s",
O
Osier Yang 已提交
1149 1150 1151 1152 1153 1154
                  i, virDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1155
            break;
O
Osier Yang 已提交
1156
        } else if (res == VIR_DRV_OPEN_ERROR) {
1157
            ret->driver = NULL;
O
Osier Yang 已提交
1158
            goto failed;
1159 1160
        } else {
            ret->driver = NULL;
1161
        }
1162 1163
    }

1164
    if (!ret->driver) {
1165
        /* If we reach here, then all drivers declined the connection. */
1166
        virReportError(VIR_ERR_NO_CONNECT, "%s", NULLSTR(name));
1167
        goto failed;
1168 1169
    }

1170
    for (i = 0; i < virNetworkDriverTabCount; i++) {
1171
        res = virNetworkDriverTab[i]->networkOpen(ret, auth, flags);
1172
        VIR_DEBUG("network driver %zu %s returned %s",
O
Osier Yang 已提交
1173 1174 1175 1176 1177 1178
                  i, virNetworkDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1179 1180
            ret->networkDriver = virNetworkDriverTab[i];
            break;
O
Osier Yang 已提交
1181 1182
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1183
        }
1184
    }
1185

D
Daniel Veillard 已提交
1186
    for (i = 0; i < virInterfaceDriverTabCount; i++) {
1187
        res = virInterfaceDriverTab[i]->interfaceOpen(ret, auth, flags);
1188
        VIR_DEBUG("interface driver %zu %s returned %s",
O
Osier Yang 已提交
1189 1190 1191 1192 1193 1194
                  i, virInterfaceDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
D
Daniel Veillard 已提交
1195 1196
            ret->interfaceDriver = virInterfaceDriverTab[i];
            break;
O
Osier Yang 已提交
1197 1198
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
D
Daniel Veillard 已提交
1199 1200
        }
    }
1201 1202 1203

    /* Secondary driver for storage. Optional */
    for (i = 0; i < virStorageDriverTabCount; i++) {
1204
        res = virStorageDriverTab[i]->storageOpen(ret, auth, flags);
1205
        VIR_DEBUG("storage driver %zu %s returned %s",
O
Osier Yang 已提交
1206 1207 1208 1209 1210 1211
                  i, virStorageDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1212 1213
            ret->storageDriver = virStorageDriverTab[i];
            break;
O
Osier Yang 已提交
1214 1215
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1216 1217 1218
        }
    }

1219
    /* Node driver (optional) */
1220
    for (i = 0; i < virNodeDeviceDriverTabCount; i++) {
1221
        res = virNodeDeviceDriverTab[i]->nodeDeviceOpen(ret, auth, flags);
1222
        VIR_DEBUG("node driver %zu %s returned %s",
1223
                  i, virNodeDeviceDriverTab[i]->name,
O
Osier Yang 已提交
1224 1225 1226 1227 1228
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1229
            ret->nodeDeviceDriver = virNodeDeviceDriverTab[i];
1230
            break;
O
Osier Yang 已提交
1231 1232
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1233 1234 1235
        }
    }

1236 1237
    /* Secret manipulation driver. Optional */
    for (i = 0; i < virSecretDriverTabCount; i++) {
1238
        res = virSecretDriverTab[i]->secretOpen(ret, auth, flags);
1239
        VIR_DEBUG("secret driver %zu %s returned %s",
O
Osier Yang 已提交
1240 1241 1242 1243 1244 1245
                  i, virSecretDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1246 1247
            ret->secretDriver = virSecretDriverTab[i];
            break;
O
Osier Yang 已提交
1248 1249
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1250 1251 1252
        }
    }

S
Stefan Berger 已提交
1253 1254
    /* Network filter driver. Optional */
    for (i = 0; i < virNWFilterDriverTabCount; i++) {
1255
        res = virNWFilterDriverTab[i]->nwfilterOpen(ret, auth, flags);
1256
        VIR_DEBUG("nwfilter driver %zu %s returned %s",
O
Osier Yang 已提交
1257 1258 1259 1260 1261 1262
                  i, virNWFilterDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
S
Stefan Berger 已提交
1263 1264
            ret->nwfilterDriver = virNWFilterDriverTab[i];
            break;
O
Osier Yang 已提交
1265 1266
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
S
Stefan Berger 已提交
1267 1268 1269
        }
    }

1270 1271
    virConfFree(conf);

1272
    return ret;
1273

1274
 failed:
1275
    virConfFree(conf);
1276
    virObjectUnref(ret);
1277

1278
    return NULL;
1279 1280
}

1281

1282 1283
/**
 * virConnectOpen:
1284
 * @name: (optional) URI of the hypervisor
1285
 *
1286
 * This function should be called first to get a connection to the
1287 1288
 * Hypervisor and xen store
 *
1289 1290 1291 1292 1293
 * If @name is NULL, if the LIBVIRT_DEFAULT_URI environment variable is set,
 * then it will be used. Otherwise if the client configuration file
 * has the "uri_default" parameter set, then it will be used. Finally
 * probing will be done to determine a suitable default driver to activate.
 * This involves trying each hypervisor in turn until one successfully opens.
1294 1295 1296 1297 1298 1299
 *
 * If connecting to an unprivileged hypervisor driver which requires
 * the libvirtd daemon to be active, it will automatically be launched
 * if not already running. This can be prevented by setting the
 * environment variable LIBVIRT_AUTOSTART=0
 *
1300
 * URIs are documented at http://libvirt.org/uri.html
E
Eric Blake 已提交
1301 1302
 *
 * Returns a pointer to the hypervisor connection or NULL in case of error
1303 1304
 */
virConnectPtr
1305
virConnectOpen(const char *name)
1306
{
1307
    virConnectPtr ret = NULL;
1308 1309 1310

    if (virInitialize() < 0)
        goto error;
1311

1312
    VIR_DEBUG("name=%s", NULLSTR(name));
1313
    virResetLastError();
1314
    ret = do_open(name, NULL, 0);
1315 1316 1317 1318
    if (!ret)
        goto error;
    return ret;

1319
 error:
1320 1321
    virDispatchError(NULL);
    return NULL;
1322 1323
}

1324

1325
/**
1326
 * virConnectOpenReadOnly:
1327
 * @name: (optional) URI of the hypervisor
1328
 *
1329
 * This function should be called first to get a restricted connection to the
D
Daniel Veillard 已提交
1330
 * library functionalities. The set of APIs usable are then restricted
1331
 * on the available methods to control the domains.
1332
 *
1333 1334 1335
 * See virConnectOpen for notes about environment variables which can
 * have an effect on opening drivers
 *
1336
 * URIs are documented at http://libvirt.org/uri.html
E
Eric Blake 已提交
1337 1338
 *
 * Returns a pointer to the hypervisor connection or NULL in case of error
1339
 */
1340
virConnectPtr
1341 1342
virConnectOpenReadOnly(const char *name)
{
1343
    virConnectPtr ret = NULL;
1344 1345 1346

    if (virInitialize() < 0)
        goto error;
1347

1348
    VIR_DEBUG("name=%s", NULLSTR(name));
1349
    virResetLastError();
1350
    ret = do_open(name, NULL, VIR_CONNECT_RO);
1351 1352 1353 1354
    if (!ret)
        goto error;
    return ret;

1355
 error:
1356 1357
    virDispatchError(NULL);
    return NULL;
1358 1359
}

1360

1361 1362
/**
 * virConnectOpenAuth:
1363
 * @name: (optional) URI of the hypervisor
1364
 * @auth: Authenticate callback parameters
1365
 * @flags: bitwise-OR of virConnectFlags
1366
 *
1367
 * This function should be called first to get a connection to the
1368
 * Hypervisor. If necessary, authentication will be performed fetching
1369 1370
 * credentials via the callback
 *
1371 1372 1373
 * See virConnectOpen for notes about environment variables which can
 * have an effect on opening drivers
 *
1374
 * URIs are documented at http://libvirt.org/uri.html
E
Eric Blake 已提交
1375 1376
 *
 * Returns a pointer to the hypervisor connection or NULL in case of error
1377 1378 1379 1380
 */
virConnectPtr
virConnectOpenAuth(const char *name,
                   virConnectAuthPtr auth,
1381
                   unsigned int flags)
1382
{
1383
    virConnectPtr ret = NULL;
1384 1385 1386

    if (virInitialize() < 0)
        goto error;
1387

1388
    VIR_DEBUG("name=%s, auth=%p, flags=%x", NULLSTR(name), auth, flags);
1389
    virResetLastError();
1390
    ret = do_open(name, auth, flags);
1391 1392 1393 1394
    if (!ret)
        goto error;
    return ret;

1395
 error:
1396 1397
    virDispatchError(NULL);
    return NULL;
D
Daniel Veillard 已提交
1398 1399
}

1400

D
Daniel Veillard 已提交
1401
/**
1402
 * virConnectClose:
D
Daniel Veillard 已提交
1403 1404 1405 1406 1407 1408 1409
 * @conn: pointer to the hypervisor connection
 *
 * This function closes the connection to the Hypervisor. This should
 * not be called if further interaction with the Hypervisor are needed
 * especially if there is running domain which need further monitoring by
 * the application.
 *
1410 1411 1412 1413 1414 1415 1416 1417
 * Connections are reference counted; the count is explicitly
 * increased by the initial open (virConnectOpen, virConnectOpenAuth,
 * and the like) as well as virConnectRef; it is also temporarily
 * increased by other API that depend on the connection remaining
 * alive.  The open and every virConnectRef call should have a
 * matching virConnectClose, and all other references will be released
 * after the corresponding operation completes.
 *
1418 1419 1420 1421 1422 1423 1424 1425 1426 1427
 * Returns a positive number if at least 1 reference remains on
 * success. The returned value should not be assumed to be the total
 * reference count. A return of 0 implies no references remain and
 * the connection is closed and memory has been freed. A return of -1
 * implies a failure.
 *
 * It is possible for the last virConnectClose to return a positive
 * value if some other object still has a temporary reference to the
 * connection, but the application should not try to further use a
 * connection after the virConnectClose that matches the initial open.
D
Daniel Veillard 已提交
1428 1429
 */
int
1430 1431
virConnectClose(virConnectPtr conn)
{
1432
    VIR_DEBUG("conn=%p", conn);
1433

1434 1435
    virResetLastError();

1436
    virCheckConnectReturn(conn, -1);
1437

1438 1439 1440
    if (!virObjectUnref(conn))
        return 0;
    return 1;
D
Daniel Veillard 已提交
1441 1442
}

1443

1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457
/**
 * virConnectRef:
 * @conn: the connection to hold a reference on
 *
 * Increment the reference count on the connection. For each
 * additional call to this method, there shall be a corresponding
 * call to virConnectClose to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a connection would increment
 * the reference count.
D
Daniel Veillard 已提交
1458 1459
 *
 * Returns 0 in case of success, -1 in case of failure
1460 1461 1462 1463
 */
int
virConnectRef(virConnectPtr conn)
{
1464 1465
    VIR_DEBUG("conn=%p refs=%d", conn, conn ? conn->object.u.s.refs : 0);

1466 1467
    virResetLastError();

1468
    virCheckConnectReturn(conn, -1);
1469
    virObjectRef(conn);
1470 1471 1472
    return 0;
}

1473

D
Daniel Veillard 已提交
1474 1475
/*
 * Not for public use.  This function is part of the internal
1476 1477 1478
 * implementation of driver features in the remote case.
 */
int
1479
virConnectSupportsFeature(virConnectPtr conn, int feature)
1480
{
1481
    int ret;
1482
    VIR_DEBUG("conn=%p, feature=%d", conn, feature);
1483

1484 1485
    virResetLastError();

1486
    virCheckConnectReturn(conn, -1);
1487

1488
    if (!conn->driver->connectSupportsFeature)
1489 1490
        ret = 0;
    else
1491
        ret = conn->driver->connectSupportsFeature(conn, feature);
1492 1493

    if (ret < 0)
1494
        virDispatchError(conn);
1495

1496
    return ret;
1497 1498
}

1499

1500 1501 1502 1503
/**
 * virConnectGetType:
 * @conn: pointer to the hypervisor connection
 *
1504 1505 1506 1507 1508
 * Get the name of the Hypervisor driver used. This is merely the driver
 * name; for example, both KVM and QEMU guests are serviced by the
 * driver for the qemu:// URI, so a return of "QEMU" does not indicate
 * whether KVM acceleration is present.  For more details about the
 * hypervisor, use virConnectGetCapabilities().
1509 1510
 *
 * Returns NULL in case of error, a static zero terminated string otherwise.
1511 1512 1513
 *
 * See also:
 * http://www.redhat.com/archives/libvir-list/2007-February/msg00096.html
1514 1515
 */
const char *
1516 1517
virConnectGetType(virConnectPtr conn)
{
1518
    const char *ret;
1519
    VIR_DEBUG("conn=%p", conn);
1520

1521 1522
    virResetLastError();

1523
    virCheckConnectReturn(conn, NULL);
1524

1525 1526
    if (conn->driver->connectGetType) {
        ret = conn->driver->connectGetType(conn);
1527
        if (ret) return ret;
1528
    }
1529
    return conn->driver->name;
1530 1531
}

1532

D
Daniel Veillard 已提交
1533
/**
1534
 * virConnectGetVersion:
D
Daniel Veillard 已提交
1535
 * @conn: pointer to the hypervisor connection
1536
 * @hvVer: return value for the version of the running hypervisor (OUT)
D
Daniel Veillard 已提交
1537
 *
1538
 * Get the version level of the Hypervisor running. This may work only with
1539
 * hypervisor call, i.e. with privileged access to the hypervisor, not
1540
 * with a Read-Only connection.
D
Daniel Veillard 已提交
1541
 *
1542 1543 1544
 * Returns -1 in case of error, 0 otherwise. if the version can't be
 *    extracted by lack of capacities returns 0 and @hvVer is 0, otherwise
 *    @hvVer value is major * 1,000,000 + minor * 1,000 + release
D
Daniel Veillard 已提交
1545
 */
1546
int
1547 1548
virConnectGetVersion(virConnectPtr conn, unsigned long *hvVer)
{
1549
    VIR_DEBUG("conn=%p, hvVer=%p", conn, hvVer);
1550

1551 1552
    virResetLastError();

1553
    virCheckConnectReturn(conn, -1);
1554
    virCheckNonNullArgGoto(hvVer, error);
1555

1556 1557
    if (conn->driver->connectGetVersion) {
        int ret = conn->driver->connectGetVersion(conn, hvVer);
1558 1559 1560 1561
        if (ret < 0)
            goto error;
        return ret;
    }
D
Daniel P. Berrange 已提交
1562

1563
    virReportUnsupportedError();
1564

1565
 error:
1566
    virDispatchError(conn);
1567
    return -1;
1568 1569
}

1570

1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585
/**
 * virConnectGetLibVersion:
 * @conn: pointer to the hypervisor connection
 * @libVer: returns the libvirt library version used on the connection (OUT)
 *
 * Provides @libVer, which is the version of libvirt used by the
 *   daemon running on the @conn host
 *
 * Returns -1 in case of failure, 0 otherwise, and values for @libVer have
 *      the format major * 1,000,000 + minor * 1,000 + release.
 */
int
virConnectGetLibVersion(virConnectPtr conn, unsigned long *libVer)
{
    int ret = -1;
1586
    VIR_DEBUG("conn=%p, libVir=%p", conn, libVer);
1587 1588 1589

    virResetLastError();

1590
    virCheckConnectReturn(conn, -1);
1591
    virCheckNonNullArgGoto(libVer, error);
1592

1593 1594
    if (conn->driver->connectGetLibVersion) {
        ret = conn->driver->connectGetLibVersion(conn, libVer);
1595 1596 1597 1598 1599
        if (ret < 0)
            goto error;
        return ret;
    }

1600 1601 1602
    *libVer = LIBVIR_VERSION_NUMBER;
    return 0;

1603
 error:
1604
    virDispatchError(conn);
1605 1606 1607
    return ret;
}

1608

1609 1610 1611 1612
/**
 * virConnectGetHostname:
 * @conn: pointer to a hypervisor connection
 *
E
Eric Blake 已提交
1613 1614 1615 1616
 * This returns a system hostname on which the hypervisor is
 * running (based on the result of the gethostname system call, but
 * possibly expanded to a fully-qualified domain name via getaddrinfo).
 * If we are connected to a remote system, then this returns the
1617 1618 1619 1620 1621 1622
 * hostname of the remote system.
 *
 * Returns the hostname which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
1623
virConnectGetHostname(virConnectPtr conn)
1624
{
1625
    VIR_DEBUG("conn=%p", conn);
1626

1627 1628
    virResetLastError();

1629
    virCheckConnectReturn(conn, NULL);
1630

1631 1632
    if (conn->driver->connectGetHostname) {
        char *ret = conn->driver->connectGetHostname(conn);
1633 1634 1635 1636
        if (!ret)
            goto error;
        return ret;
    }
1637

1638
    virReportUnsupportedError();
1639

1640
 error:
1641
    virDispatchError(conn);
1642 1643 1644
    return NULL;
}

1645

1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661
/**
 * virConnectGetURI:
 * @conn: pointer to a hypervisor connection
 *
 * This returns the URI (name) of the hypervisor connection.
 * Normally this is the same as or similar to the string passed
 * to the virConnectOpen/virConnectOpenReadOnly call, but
 * the driver may make the URI canonical.  If name == NULL
 * was passed to virConnectOpen, then the driver will return
 * a non-NULL URI which can be used to connect to the same
 * hypervisor later.
 *
 * Returns the URI string which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
1662
virConnectGetURI(virConnectPtr conn)
1663
{
1664
    char *name;
1665
    VIR_DEBUG("conn=%p", conn);
1666

1667 1668
    virResetLastError();

1669
    virCheckConnectReturn(conn, NULL);
1670

1671
    if (!(name = virURIFormat(conn->uri)))
1672
        goto error;
1673

1674
    return name;
1675

1676
 error:
1677
    virDispatchError(conn);
1678
    return NULL;
1679 1680
}

1681

E
Eric Blake 已提交
1682 1683 1684
/**
 * virConnectGetSysinfo:
 * @conn: pointer to a hypervisor connection
1685
 * @flags: extra flags; not used yet, so callers should always pass 0
E
Eric Blake 已提交
1686 1687 1688 1689 1690 1691 1692 1693 1694 1695
 *
 * This returns the XML description of the sysinfo details for the
 * host on which the hypervisor is running, in the same format as the
 * <sysinfo> element of a domain XML.  This information is generally
 * available only for hypervisors running with root privileges.
 *
 * Returns the XML string which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
1696
virConnectGetSysinfo(virConnectPtr conn, unsigned int flags)
E
Eric Blake 已提交
1697
{
E
Eric Blake 已提交
1698
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
E
Eric Blake 已提交
1699 1700 1701

    virResetLastError();

1702
    virCheckConnectReturn(conn, NULL);
E
Eric Blake 已提交
1703

1704 1705
    if (conn->driver->connectGetSysinfo) {
        char *ret = conn->driver->connectGetSysinfo(conn, flags);
E
Eric Blake 已提交
1706 1707 1708 1709 1710
        if (!ret)
            goto error;
        return ret;
    }

1711
    virReportUnsupportedError();
E
Eric Blake 已提交
1712

1713
 error:
E
Eric Blake 已提交
1714 1715 1716 1717
    virDispatchError(conn);
    return NULL;
}

1718

1719 1720 1721 1722 1723
/**
 * virConnectGetMaxVcpus:
 * @conn: pointer to the hypervisor connection
 * @type: value of the 'type' attribute in the <domain> element
 *
1724
 * Provides the maximum number of virtual CPUs supported for a guest VM of a
1725 1726 1727 1728 1729 1730 1731 1732 1733
 * specific type. The 'type' parameter here corresponds to the 'type'
 * attribute in the <domain> element of the XML.
 *
 * Returns the maximum of virtual CPU or -1 in case of error.
 */
int
virConnectGetMaxVcpus(virConnectPtr conn,
                      const char *type)
{
1734
    VIR_DEBUG("conn=%p, type=%s", conn, type);
1735

1736 1737
    virResetLastError();

1738
    virCheckConnectReturn(conn, -1);
1739

1740 1741
    if (conn->driver->connectGetMaxVcpus) {
        int ret = conn->driver->connectGetMaxVcpus(conn, type);
1742 1743 1744 1745
        if (ret < 0)
            goto error;
        return ret;
    }
1746

1747
    virReportUnsupportedError();
1748
 error:
1749
    virDispatchError(conn);
1750
    return -1;
1751 1752
}

1753

1754
/**
1755
 * virConnectListDomains:
1756 1757 1758 1759
 * @conn: pointer to the hypervisor connection
 * @ids: array to collect the list of IDs of active domains
 * @maxids: size of @ids
 *
1760
 * Collect the list of active domains, and store their IDs in array @ids
1761
 *
1762 1763 1764 1765 1766 1767 1768 1769
 * For inactive domains, see virConnectListDefinedDomains().  For more
 * control over the results, see virConnectListAllDomains().
 *
 * Returns the number of domains found or -1 in case of error.  Note that
 * this command is inherently racy; a domain can be started between a
 * call to virConnectNumOfDomains() and this call; you are only guaranteed
 * that all currently active domains were listed if the return is less
 * than @maxids.
1770 1771
 */
int
1772 1773
virConnectListDomains(virConnectPtr conn, int *ids, int maxids)
{
1774
    VIR_DEBUG("conn=%p, ids=%p, maxids=%d", conn, ids, maxids);
1775

1776 1777
    virResetLastError();

1778
    virCheckConnectReturn(conn, -1);
1779 1780
    virCheckNonNullArgGoto(ids, error);
    virCheckNonNegativeArgGoto(maxids, error);
1781

1782 1783
    if (conn->driver->connectListDomains) {
        int ret = conn->driver->connectListDomains(conn, ids, maxids);
1784 1785 1786 1787
        if (ret < 0)
            goto error;
        return ret;
    }
1788

1789
    virReportUnsupportedError();
1790
 error:
1791
    virDispatchError(conn);
1792
    return -1;
D
Daniel Veillard 已提交
1793 1794
}

1795

K
 
Karel Zak 已提交
1796 1797 1798 1799
/**
 * virConnectNumOfDomains:
 * @conn: pointer to the hypervisor connection
 *
1800 1801
 * Provides the number of active domains.
 *
K
 
Karel Zak 已提交
1802 1803 1804
 * Returns the number of domain found or -1 in case of error
 */
int
1805 1806
virConnectNumOfDomains(virConnectPtr conn)
{
1807
    VIR_DEBUG("conn=%p", conn);
1808

1809 1810
    virResetLastError();

1811
    virCheckConnectReturn(conn, -1);
K
Karel Zak 已提交
1812

1813 1814
    if (conn->driver->connectNumOfDomains) {
        int ret = conn->driver->connectNumOfDomains(conn);
1815 1816 1817 1818
        if (ret < 0)
            goto error;
        return ret;
    }
1819

1820
    virReportUnsupportedError();
1821
 error:
1822
    virDispatchError(conn);
1823
    return -1;
K
 
Karel Zak 已提交
1824 1825
}

1826

1827 1828 1829 1830
/**
 * virDomainGetConnect:
 * @dom: pointer to a domain
 *
1831
 * Provides the connection pointer associated with a domain.  The
1832 1833 1834
 * reference counter on the connection is not increased by this
 * call.
 *
1835 1836 1837 1838
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the domain object together.
 *
1839 1840 1841
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
1842
virDomainGetConnect(virDomainPtr dom)
1843
{
1844
    VIR_DOMAIN_DEBUG(dom);
1845

1846 1847
    virResetLastError();

1848 1849
    virCheckDomainReturn(dom, NULL);

1850 1851 1852
    return dom->conn;
}

1853

D
Daniel Veillard 已提交
1854
/**
1855
 * virDomainCreateXML:
D
Daniel Veillard 已提交
1856
 * @conn: pointer to the hypervisor connection
D
Daniel Veillard 已提交
1857
 * @xmlDesc: string containing an XML description of the domain
1858
 * @flags: bitwise-OR of supported virDomainCreateFlags
D
Daniel Veillard 已提交
1859
 *
1860
 * Launch a new guest domain, based on an XML description similar
1861
 * to the one returned by virDomainGetXMLDesc()
1862
 * This function may require privileged access to the hypervisor.
1863 1864 1865
 * The domain is not persistent, so its definition will disappear when it
 * is destroyed, or if the host is restarted (see virDomainDefineXML() to
 * define persistent domains).
1866
 *
1867 1868 1869 1870 1871 1872 1873
 * If the VIR_DOMAIN_START_PAUSED flag is set, the guest domain
 * will be started, but its CPUs will remain paused. The CPUs
 * can later be manually started using virDomainResume.
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
E
Eric Blake 已提交
1874
 * client application crashes / loses its connection to the
1875
 * libvirtd daemon. Any domains marked for auto destroy will
1876
 * block attempts at migration, save-to-file, or snapshots.
1877
 *
D
Daniel Veillard 已提交
1878 1879
 * Returns a new domain object or NULL in case of failure
 */
1880
virDomainPtr
1881 1882
virDomainCreateXML(virConnectPtr conn, const char *xmlDesc,
                   unsigned int flags)
1883
{
1884
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
1885

1886 1887
    virResetLastError();

1888
    virCheckConnectReturn(conn, NULL);
1889
    virCheckNonNullArgGoto(xmlDesc, error);
1890
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
1891

1892 1893
    if (conn->driver->domainCreateXML) {
        virDomainPtr ret;
1894
        ret = conn->driver->domainCreateXML(conn, xmlDesc, flags);
1895 1896 1897 1898
        if (!ret)
            goto error;
        return ret;
    }
1899

1900
    virReportUnsupportedError();
1901
 error:
1902
    virDispatchError(conn);
1903
    return NULL;
D
Daniel Veillard 已提交
1904 1905
}

1906

1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952
/**
 * virDomainCreateXMLWithFiles:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: string containing an XML description of the domain
 * @nfiles: number of file descriptors passed
 * @files: list of file descriptors passed
 * @flags: bitwise-OR of supported virDomainCreateFlags
 *
 * Launch a new guest domain, based on an XML description similar
 * to the one returned by virDomainGetXMLDesc()
 * This function may require privileged access to the hypervisor.
 * The domain is not persistent, so its definition will disappear when it
 * is destroyed, or if the host is restarted (see virDomainDefineXML() to
 * define persistent domains).
 *
 * @files provides an array of file descriptors which will be
 * made available to the 'init' process of the guest. The file
 * handles exposed to the guest will be renumbered to start
 * from 3 (ie immediately following stderr). This is only
 * supported for guests which use container based virtualization
 * technology.
 *
 * If the VIR_DOMAIN_START_PAUSED flag is set, the guest domain
 * will be started, but its CPUs will remain paused. The CPUs
 * can later be manually started using virDomainResume.
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
 * client application crashes / loses its connection to the
 * libvirtd daemon. Any domains marked for auto destroy will
 * block attempts at migration, save-to-file, or snapshots.
 *
 * Returns a new domain object or NULL in case of failure
 */
virDomainPtr
virDomainCreateXMLWithFiles(virConnectPtr conn, const char *xmlDesc,
                            unsigned int nfiles,
                            int *files,
                            unsigned int flags)
{
    VIR_DEBUG("conn=%p, xmlDesc=%s, nfiles=%u, files=%p, flags=%x",
              conn, xmlDesc, nfiles, files, flags);

    virResetLastError();

1953
    virCheckConnectReturn(conn, NULL);
1954
    virCheckNonNullArgGoto(xmlDesc, error);
1955
    virCheckReadOnlyGoto(conn->flags, error);
1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966

    if (conn->driver->domainCreateXMLWithFiles) {
        virDomainPtr ret;
        ret = conn->driver->domainCreateXMLWithFiles(conn, xmlDesc,
                                                     nfiles, files,
                                                     flags);
        if (!ret)
            goto error;
        return ret;
    }

1967
    virReportUnsupportedError();
1968
 error:
1969 1970 1971 1972
    virDispatchError(conn);
    return NULL;
}

1973

1974 1975 1976 1977
/**
 * virDomainCreateLinux:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: string containing an XML description of the domain
1978
 * @flags: extra flags; not used yet, so callers should always pass 0
1979 1980 1981
 *
 * Deprecated after 0.4.6.
 * Renamed to virDomainCreateXML() providing identical functionality.
1982
 * This existing name will left indefinitely for API compatibility.
1983 1984 1985 1986 1987 1988 1989
 *
 * Returns a new domain object or NULL in case of failure
 */
virDomainPtr
virDomainCreateLinux(virConnectPtr conn, const char *xmlDesc,
                     unsigned int flags)
{
1990
    return virDomainCreateXML(conn, xmlDesc, flags);
1991
}
1992

1993

1994
/**
1995
 * virDomainLookupByID:
1996 1997 1998 1999
 * @conn: pointer to the hypervisor connection
 * @id: the domain ID number
 *
 * Try to find a domain based on the hypervisor ID number
D
Daniel Veillard 已提交
2000 2001
 * Note that this won't work for inactive domains which have an ID of -1,
 * in that case a lookup based on the Name or UUId need to be done instead.
2002
 *
2003 2004
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
2005
 */
2006
virDomainPtr
2007 2008
virDomainLookupByID(virConnectPtr conn, int id)
{
2009
    VIR_DEBUG("conn=%p, id=%d", conn, id);
2010

2011 2012
    virResetLastError();

2013
    virCheckConnectReturn(conn, NULL);
2014
    virCheckNonNegativeArgGoto(id, error);
2015

2016 2017
    if (conn->driver->domainLookupByID) {
        virDomainPtr ret;
2018
        ret = conn->driver->domainLookupByID(conn, id);
2019 2020 2021 2022
        if (!ret)
            goto error;
        return ret;
    }
2023

2024
    virReportUnsupportedError();
2025

2026
 error:
2027
    virDispatchError(conn);
2028
    return NULL;
2029 2030
}

2031

2032 2033 2034
/**
 * virDomainLookupByUUID:
 * @conn: pointer to the hypervisor connection
K
Karel Zak 已提交
2035
 * @uuid: the raw UUID for the domain
2036 2037 2038
 *
 * Try to lookup a domain on the given hypervisor based on its UUID.
 *
2039 2040
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
2041 2042
 */
virDomainPtr
2043 2044
virDomainLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
{
2045
    VIR_UUID_DEBUG(conn, uuid);
2046

2047 2048
    virResetLastError();

2049
    virCheckConnectReturn(conn, NULL);
2050
    virCheckNonNullArgGoto(uuid, error);
2051

2052 2053
    if (conn->driver->domainLookupByUUID) {
        virDomainPtr ret;
2054
        ret = conn->driver->domainLookupByUUID(conn, uuid);
2055 2056 2057 2058
        if (!ret)
            goto error;
        return ret;
    }
2059

2060
    virReportUnsupportedError();
2061

2062
 error:
2063
    virDispatchError(conn);
2064
    return NULL;
2065 2066
}

2067

K
Karel Zak 已提交
2068 2069 2070 2071 2072 2073 2074
/**
 * virDomainLookupByUUIDString:
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the domain
 *
 * Try to lookup a domain on the given hypervisor based on its UUID.
 *
2075 2076
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
K
Karel Zak 已提交
2077 2078 2079 2080
 */
virDomainPtr
virDomainLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
2081
    unsigned char uuid[VIR_UUID_BUFLEN];
2082
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
2083

2084 2085
    virResetLastError();

2086
    virCheckConnectReturn(conn, NULL);
2087
    virCheckNonNullArgGoto(uuidstr, error);
2088 2089

    if (virUUIDParse(uuidstr, uuid) < 0) {
2090 2091 2092
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
2093
        goto error;
K
Karel Zak 已提交
2094
    }
2095

K
Karel Zak 已提交
2096
    return virDomainLookupByUUID(conn, &uuid[0]);
2097

2098
 error:
2099
    virDispatchError(conn);
2100
    return NULL;
K
Karel Zak 已提交
2101 2102
}

2103

2104 2105 2106 2107 2108
/**
 * virDomainLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the domain
 *
2109
 * Try to lookup a domain on the given hypervisor based on its name.
2110
 *
2111 2112
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
2113 2114
 */
virDomainPtr
2115 2116
virDomainLookupByName(virConnectPtr conn, const char *name)
{
2117
    VIR_DEBUG("conn=%p, name=%s", conn, name);
2118

2119 2120
    virResetLastError();

2121
    virCheckConnectReturn(conn, NULL);
2122
    virCheckNonNullArgGoto(name, error);
2123

2124 2125
    if (conn->driver->domainLookupByName) {
        virDomainPtr dom;
2126
        dom = conn->driver->domainLookupByName(conn, name);
2127 2128 2129 2130
        if (!dom)
            goto error;
        return dom;
    }
2131

2132
    virReportUnsupportedError();
2133

2134
 error:
2135
    virDispatchError(conn);
2136
    return NULL;
2137 2138
}

2139

D
Daniel Veillard 已提交
2140
/**
2141
 * virDomainDestroy:
D
Daniel Veillard 已提交
2142 2143 2144
 * @domain: a domain object
 *
 * Destroy the domain object. The running instance is shutdown if not down
2145 2146
 * already and all resources used by it are given back to the hypervisor. This
 * does not free the associated virDomainPtr object.
2147
 * This function may require privileged access.
D
Daniel Veillard 已提交
2148
 *
2149 2150
 * virDomainDestroy first requests that a guest terminate
 * (e.g. SIGTERM), then waits for it to comply. After a reasonable
2151
 * timeout, if the guest still exists, virDomainDestroy will
2152 2153 2154 2155 2156 2157
 * forcefully terminate the guest (e.g. SIGKILL) if necessary (which
 * may produce undesirable results, for example unflushed disk cache
 * in the guest). To avoid this possibility, it's recommended to
 * instead call virDomainDestroyFlags, sending the
 * VIR_DOMAIN_DESTROY_GRACEFUL flag.
 *
2158 2159 2160 2161
 * If the domain is transient and has any snapshot metadata (see
 * virDomainSnapshotNum()), then that metadata will automatically
 * be deleted when the domain quits.
 *
D
Daniel Veillard 已提交
2162
 * Returns 0 in case of success and -1 in case of failure.
2163
 */
D
Daniel Veillard 已提交
2164
int
2165 2166
virDomainDestroy(virDomainPtr domain)
{
2167
    virConnectPtr conn;
2168

2169
    VIR_DOMAIN_DEBUG(domain);
2170

2171 2172
    virResetLastError();

2173
    virCheckDomainReturn(domain, -1);
2174
    conn = domain->conn;
2175

2176
    virCheckReadOnlyGoto(conn->flags, error);
2177

2178 2179
    if (conn->driver->domainDestroy) {
        int ret;
2180
        ret = conn->driver->domainDestroy(domain);
2181 2182 2183 2184
        if (ret < 0)
            goto error;
        return ret;
    }
2185

2186
    virReportUnsupportedError();
2187

2188
 error:
2189
    virDispatchError(conn);
2190
    return -1;
2191 2192
}

2193

2194 2195 2196
/**
 * virDomainDestroyFlags:
 * @domain: a domain object
2197
 * @flags: bitwise-OR of virDomainDestroyFlagsValues
2198 2199 2200 2201 2202 2203
 *
 * Destroy the domain object. The running instance is shutdown if not down
 * already and all resources used by it are given back to the hypervisor.
 * This does not free the associated virDomainPtr object.
 * This function may require privileged access.
 *
2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219
 * Calling this function with no @flags set (equal to zero) is
 * equivalent to calling virDomainDestroy, and after a reasonable
 * timeout will forcefully terminate the guest (e.g. SIGKILL) if
 * necessary (which may produce undesirable results, for example
 * unflushed disk cache in the guest). Including
 * VIR_DOMAIN_DESTROY_GRACEFUL in the flags will prevent the forceful
 * termination of the guest, and virDomainDestroyFlags will instead
 * return an error if the guest doesn't terminate by the end of the
 * timeout; at that time, the management application can decide if
 * calling again without VIR_DOMAIN_DESTROY_GRACEFUL is appropriate.
 *
 * Another alternative which may produce cleaner results for the
 * guest's disks is to use virDomainShutdown() instead, but that
 * depends on guest support (some hypervisor/guest combinations may
 * ignore the shutdown request).
 *
2220 2221 2222 2223 2224 2225 2226 2227 2228
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainDestroyFlags(virDomainPtr domain,
                      unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
2229
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
2230 2231 2232

    virResetLastError();

2233
    virCheckDomainReturn(domain, -1);
2234
    conn = domain->conn;
2235

2236
    virCheckReadOnlyGoto(conn->flags, error);
2237 2238 2239 2240 2241 2242 2243 2244 2245

    if (conn->driver->domainDestroyFlags) {
        int ret;
        ret = conn->driver->domainDestroyFlags(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

2246
    virReportUnsupportedError();
2247

2248
 error:
2249 2250 2251 2252
    virDispatchError(conn);
    return -1;
}

2253

2254 2255 2256 2257 2258 2259 2260 2261 2262 2263
/**
 * virDomainFree:
 * @domain: a domain object
 *
 * Free the domain object. The running instance is kept alive.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2264 2265
virDomainFree(virDomainPtr domain)
{
2266
    VIR_DOMAIN_DEBUG(domain);
2267

2268 2269
    virResetLastError();

2270 2271
    virCheckDomainReturn(domain, -1);

2272
    virObjectUnref(domain);
2273
    return 0;
D
Daniel Veillard 已提交
2274 2275
}

2276

2277 2278
/**
 * virDomainRef:
D
Daniel Veillard 已提交
2279
 * @domain: the domain to hold a reference on
2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290
 *
 * Increment the reference count on the domain. For each
 * additional call to this method, there shall be a corresponding
 * call to virDomainFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a domain would increment
 * the reference count.
D
Daniel Veillard 已提交
2291 2292
 *
 * Returns 0 in case of success and -1 in case of failure.
2293 2294 2295 2296
 */
int
virDomainRef(virDomainPtr domain)
{
2297 2298
    VIR_DOMAIN_DEBUG(domain, "refs=%d", domain ? domain->object.u.s.refs : 0);

2299 2300
    virResetLastError();

2301
    virCheckDomainReturn(domain, -1);
2302 2303

    virObjectRef(domain);
2304 2305 2306 2307
    return 0;
}


D
Daniel Veillard 已提交
2308
/**
2309
 * virDomainSuspend:
D
Daniel Veillard 已提交
2310 2311 2312
 * @domain: a domain object
 *
 * Suspends an active domain, the process is frozen without further access
2313
 * to CPU resources and I/O but the memory used by the domain at the
2314
 * hypervisor level will stay allocated. Use virDomainResume() to reactivate
D
Daniel Veillard 已提交
2315
 * the domain.
2316
 * This function may require privileged access.
2317 2318
 * Moreover, suspend may not be supported if domain is in some
 * special state like VIR_DOMAIN_PMSUSPENDED.
D
Daniel Veillard 已提交
2319 2320 2321 2322
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2323 2324
virDomainSuspend(virDomainPtr domain)
{
2325
    virConnectPtr conn;
2326

2327
    VIR_DOMAIN_DEBUG(domain);
2328

2329 2330
    virResetLastError();

2331
    virCheckDomainReturn(domain, -1);
2332 2333
    conn = domain->conn;

2334 2335
    virCheckReadOnlyGoto(conn->flags, error);

2336 2337
    if (conn->driver->domainSuspend) {
        int ret;
2338
        ret = conn->driver->domainSuspend(domain);
2339 2340 2341 2342
        if (ret < 0)
            goto error;
        return ret;
    }
2343

2344
    virReportUnsupportedError();
2345

2346
 error:
2347
    virDispatchError(domain->conn);
2348
    return -1;
D
Daniel Veillard 已提交
2349 2350
}

2351

D
Daniel Veillard 已提交
2352
/**
2353
 * virDomainResume:
D
Daniel Veillard 已提交
2354 2355
 * @domain: a domain object
 *
D
Dan Kenigsberg 已提交
2356
 * Resume a suspended domain, the process is restarted from the state where
2357
 * it was frozen by calling virDomainSuspend().
2358
 * This function may require privileged access
2359 2360
 * Moreover, resume may not be supported if domain is in some
 * special state like VIR_DOMAIN_PMSUSPENDED.
D
Daniel Veillard 已提交
2361 2362 2363 2364
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2365 2366
virDomainResume(virDomainPtr domain)
{
2367
    virConnectPtr conn;
2368

2369
    VIR_DOMAIN_DEBUG(domain);
2370

2371 2372
    virResetLastError();

2373
    virCheckDomainReturn(domain, -1);
2374 2375
    conn = domain->conn;

2376 2377
    virCheckReadOnlyGoto(conn->flags, error);

2378 2379
    if (conn->driver->domainResume) {
        int ret;
2380
        ret = conn->driver->domainResume(domain);
2381 2382 2383 2384
        if (ret < 0)
            goto error;
        return ret;
    }
2385

2386
    virReportUnsupportedError();
2387

2388
 error:
2389
    virDispatchError(domain->conn);
2390
    return -1;
D
Daniel Veillard 已提交
2391 2392
}

2393

2394 2395 2396
/**
 * virDomainPMSuspendForDuration:
 * @dom: a domain object
2397 2398 2399
 * @target: a value from virNodeSuspendTarget
 * @duration: duration in seconds to suspend, or 0 for indefinite
 * @flags: extra flags; not used yet, so callers should always pass 0
2400
 *
2401 2402 2403 2404 2405
 * Attempt to have the guest enter the given @target power management
 * suspension level.  If @duration is non-zero, also schedule the guest to
 * resume normal operation after that many seconds, if nothing else has
 * resumed it earlier.  Some hypervisors require that @duration be 0, for
 * an indefinite suspension.
2406
 *
2407
 * Dependent on hypervisor used, this may require a
2408 2409
 * guest agent to be available, e.g. QEMU.
 *
2410 2411 2412 2413 2414 2415 2416
 * Beware that at least for QEMU, the domain's process will be terminated
 * when VIR_NODE_SUSPEND_TARGET_DISK is used and a new process will be
 * launched when libvirt is asked to wake up the domain. As a result of
 * this, any runtime changes, such as device hotplug or memory settings,
 * are lost unless such changes were made with VIR_DOMAIN_AFFECT_CONFIG
 * flag.
 *
2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432
 * Returns: 0 on success,
 *          -1 on failure.
 */
int
virDomainPMSuspendForDuration(virDomainPtr dom,
                              unsigned int target,
                              unsigned long long duration,
                              unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "target=%u duration=%llu flags=%x",
                     target, duration, flags);

    virResetLastError();

2433
    virCheckDomainReturn(dom, -1);
2434 2435
    conn = dom->conn;

2436
    virCheckReadOnlyGoto(conn->flags, error);
2437 2438 2439 2440 2441 2442 2443 2444 2445 2446

    if (conn->driver->domainPMSuspendForDuration) {
        int ret;
        ret = conn->driver->domainPMSuspendForDuration(dom, target,
                                                       duration, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

2447
    virReportUnsupportedError();
2448

2449
 error:
2450 2451 2452 2453
    virDispatchError(conn);
    return -1;
}

2454

2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476
/**
 * virDomainPMWakeup:
 * @dom: a domain object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Inject a wakeup into the guest that previously used
 * virDomainPMSuspendForDuration, rather than waiting for the
 * previously requested duration (if any) to elapse.
 *
 * Returns: 0 on success,
 *          -1 on failure.
 */
int
virDomainPMWakeup(virDomainPtr dom,
                  unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);

    virResetLastError();

2477
    virCheckDomainReturn(dom, -1);
2478 2479
    conn = dom->conn;

2480
    virCheckReadOnlyGoto(conn->flags, error);
2481 2482 2483 2484 2485 2486 2487 2488 2489

    if (conn->driver->domainPMWakeup) {
        int ret;
        ret = conn->driver->domainPMWakeup(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

2490
    virReportUnsupportedError();
2491

2492
 error:
2493 2494 2495 2496
    virDispatchError(conn);
    return -1;
}

2497

2498 2499 2500 2501 2502 2503
/**
 * virDomainSave:
 * @domain: a domain object
 * @to: path for the output file
 *
 * This method will suspend a domain and save its memory contents to
2504
 * a file on disk. After the call, if successful, the domain is not
2505
 * listed as running anymore (this ends the life of a transient domain).
2506
 * Use virDomainRestore() to restore a domain after saving.
2507
 *
2508 2509 2510
 * See virDomainSaveFlags() for more control.  Also, a save file can
 * be inspected or modified slightly with virDomainSaveImageGetXMLDesc()
 * and virDomainSaveImageDefineXML().
2511
 *
2512 2513 2514
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2515 2516
virDomainSave(virDomainPtr domain, const char *to)
{
2517
    virConnectPtr conn;
2518 2519

    VIR_DOMAIN_DEBUG(domain, "to=%s", to);
2520

2521 2522
    virResetLastError();

2523
    virCheckDomainReturn(domain, -1);
2524
    conn = domain->conn;
2525 2526

    virCheckReadOnlyGoto(conn->flags, error);
2527
    virCheckNonNullArgGoto(to, error);
2528

2529 2530 2531
    if (conn->driver->domainSave) {
        int ret;
        char *absolute_to;
2532

2533 2534
        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
2535 2536
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute output file path"));
2537 2538
            goto error;
        }
2539

2540 2541 2542
        ret = conn->driver->domainSave(domain, absolute_to);

        VIR_FREE(absolute_to);
2543

2544 2545 2546 2547
        if (ret < 0)
            goto error;
        return ret;
    }
2548

2549
    virReportUnsupportedError();
2550

2551
 error:
2552
    virDispatchError(domain->conn);
2553
    return -1;
2554 2555
}

2556

2557 2558 2559 2560 2561 2562 2563 2564 2565
/**
 * virDomainSaveFlags:
 * @domain: a domain object
 * @to: path for the output file
 * @dxml: (optional) XML config for adjusting guest xml used on restore
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
 *
 * This method will suspend a domain and save its memory contents to
 * a file on disk. After the call, if successful, the domain is not
2566
 * listed as running anymore (this ends the life of a transient domain).
2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579 2580
 * Use virDomainRestore() to restore a domain after saving.
 *
 * If the hypervisor supports it, @dxml can be used to alter
 * host-specific portions of the domain XML that will be used when
 * restoring an image.  For example, it is possible to alter the
 * backing filename that is associated with a disk device, in order to
 * prepare for file renaming done as part of backing up the disk
 * device while the domain is stopped.
 *
 * If @flags includes VIR_DOMAIN_SAVE_BYPASS_CACHE, then libvirt will
 * attempt to bypass the file system cache while creating the file, or
 * fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
2581 2582 2583 2584 2585 2586
 * Normally, the saved state file will remember whether the domain was
 * running or paused, and restore defaults to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override what state gets saved into the file.  These
 * two flags are mutually exclusive.
 *
2587 2588 2589
 * A save file can be inspected or modified slightly with
 * virDomainSaveImageGetXMLDesc() and virDomainSaveImageDefineXML().
 *
E
Eric Blake 已提交
2590 2591 2592 2593
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation; in that case, use virDomainBlockJobAbort()
 * to stop the block copy first.
 *
2594 2595 2596 2597 2598 2599 2600 2601
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSaveFlags(virDomainPtr domain, const char *to,
                   const char *dxml, unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
2602
    VIR_DOMAIN_DEBUG(domain, "to=%s, dxml=%s, flags=%x",
2603 2604 2605 2606
                     to, NULLSTR(dxml), flags);

    virResetLastError();

2607
    virCheckDomainReturn(domain, -1);
2608
    conn = domain->conn;
2609 2610

    virCheckReadOnlyGoto(conn->flags, error);
2611
    virCheckNonNullArgGoto(to, error);
2612

2613
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
2614
        virReportInvalidArg(flags, "%s",
2615 2616
                            _("running and paused flags are mutually "
                              "exclusive"));
2617 2618 2619
        goto error;
    }

2620 2621 2622 2623 2624 2625
    if (conn->driver->domainSaveFlags) {
        int ret;
        char *absolute_to;

        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
2626 2627
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute output file path"));
2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639
            goto error;
        }

        ret = conn->driver->domainSaveFlags(domain, absolute_to, dxml, flags);

        VIR_FREE(absolute_to);

        if (ret < 0)
            goto error;
        return ret;
    }

2640
    virReportUnsupportedError();
2641

2642
 error:
2643 2644 2645 2646
    virDispatchError(domain->conn);
    return -1;
}

2647

2648 2649
/**
 * virDomainRestore:
2650
 * @conn: pointer to the hypervisor connection
2651
 * @from: path to the input file
2652 2653 2654
 *
 * This method will restore a domain saved to disk by virDomainSave().
 *
2655 2656
 * See virDomainRestoreFlags() for more control.
 *
2657 2658 2659
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2660 2661
virDomainRestore(virConnectPtr conn, const char *from)
{
2662
    VIR_DEBUG("conn=%p, from=%s", conn, from);
2663

2664 2665
    virResetLastError();

2666
    virCheckConnectReturn(conn, -1);
2667
    virCheckReadOnlyGoto(conn->flags, error);
2668
    virCheckNonNullArgGoto(from, error);
D
Daniel Veillard 已提交
2669

2670 2671 2672
    if (conn->driver->domainRestore) {
        int ret;
        char *absolute_from;
2673

2674 2675
        /* We must absolutize the file path as the restore is done out of process */
        if (virFileAbsPath(from, &absolute_from) < 0) {
2676 2677
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2678 2679
            goto error;
        }
2680

2681 2682 2683 2684
        ret = conn->driver->domainRestore(conn, absolute_from);

        VIR_FREE(absolute_from);

2685 2686 2687 2688
        if (ret < 0)
            goto error;
        return ret;
    }
2689

2690
    virReportUnsupportedError();
2691

2692
 error:
2693
    virDispatchError(conn);
2694
    return -1;
D
Daniel Veillard 已提交
2695 2696
}

2697

2698 2699 2700 2701 2702 2703 2704 2705 2706 2707 2708 2709 2710 2711 2712 2713 2714 2715 2716
/**
 * virDomainRestoreFlags:
 * @conn: pointer to the hypervisor connection
 * @from: path to the input file
 * @dxml: (optional) XML config for adjusting guest xml used on restore
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
 *
 * This method will restore a domain saved to disk by virDomainSave().
 *
 * If the hypervisor supports it, @dxml can be used to alter
 * host-specific portions of the domain XML that will be used when
 * restoring an image.  For example, it is possible to alter the
 * backing filename that is associated with a disk device, in order to
 * prepare for file renaming done as part of backing up the disk
 * device while the domain is stopped.
 *
 * If @flags includes VIR_DOMAIN_SAVE_BYPASS_CACHE, then libvirt will
 * attempt to bypass the file system cache while restoring the file, or
 * fail if it cannot do so for the given system; this can allow less
2717
 * pressure on file system cache, but also risks slowing restores from NFS.
2718
 *
2719 2720 2721 2722 2723 2724
 * Normally, the saved state file will remember whether the domain was
 * running or paused, and restore defaults to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override the default read from the file.  These two
 * flags are mutually exclusive.
 *
2725 2726 2727 2728
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainRestoreFlags(virConnectPtr conn, const char *from, const char *dxml,
2729
                      unsigned int flags)
2730 2731 2732 2733 2734 2735
{
    VIR_DEBUG("conn=%p, from=%s, dxml=%s, flags=%x",
              conn, from, NULLSTR(dxml), flags);

    virResetLastError();

2736
    virCheckConnectReturn(conn, -1);
2737
    virCheckReadOnlyGoto(conn->flags, error);
2738
    virCheckNonNullArgGoto(from, error);
2739

2740
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
2741
        virReportInvalidArg(flags, "%s",
2742 2743
                            _("running and paused flags are mutually "
                              "exclusive"));
2744 2745 2746
        goto error;
    }

2747 2748 2749 2750 2751 2752
    if (conn->driver->domainRestoreFlags) {
        int ret;
        char *absolute_from;

        /* We must absolutize the file path as the restore is done out of process */
        if (virFileAbsPath(from, &absolute_from) < 0) {
2753 2754
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767
            goto error;
        }

        ret = conn->driver->domainRestoreFlags(conn, absolute_from, dxml,
                                               flags);

        VIR_FREE(absolute_from);

        if (ret < 0)
            goto error;
        return ret;
    }

2768
    virReportUnsupportedError();
2769

2770
 error:
2771 2772 2773 2774
    virDispatchError(conn);
    return -1;
}

2775

2776 2777 2778 2779 2780 2781 2782 2783 2784 2785 2786 2787 2788 2789 2790 2791 2792 2793 2794 2795 2796 2797 2798 2799 2800 2801 2802
/**
 * virDomainSaveImageGetXMLDesc:
 * @conn: pointer to the hypervisor connection
 * @file: path to saved state file
 * @flags: bitwise-OR of subset of virDomainXMLFlags
 *
 * This method will extract the XML describing the domain at the time
 * a saved state file was created.  @file must be a file created
 * previously by virDomainSave() or virDomainSaveFlags().
 *
 * No security-sensitive data will be included unless @flags contains
 * VIR_DOMAIN_XML_SECURE; this flag is rejected on read-only
 * connections.  For this API, @flags should not contain either
 * VIR_DOMAIN_XML_INACTIVE or VIR_DOMAIN_XML_UPDATE_CPU.
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of
 * error.  The caller must free() the returned value.
 */
char *
virDomainSaveImageGetXMLDesc(virConnectPtr conn, const char *file,
                             unsigned int flags)
{
    VIR_DEBUG("conn=%p, file=%s, flags=%x",
              conn, file, flags);

    virResetLastError();

2803
    virCheckConnectReturn(conn, NULL);
2804
    virCheckNonNullArgGoto(file, error);
2805 2806

    if ((conn->flags & VIR_CONNECT_RO) && (flags & VIR_DOMAIN_XML_SECURE)) {
2807 2808
        virReportError(VIR_ERR_OPERATION_DENIED, "%s",
                       _("virDomainSaveImageGetXMLDesc with secure flag"));
2809 2810 2811 2812 2813 2814 2815 2816 2817
        goto error;
    }

    if (conn->driver->domainSaveImageGetXMLDesc) {
        char *ret;
        char *absolute_file;

        /* We must absolutize the file path as the read is done out of process */
        if (virFileAbsPath(file, &absolute_file) < 0) {
2818 2819
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2820 2821 2822 2823 2824 2825 2826 2827 2828 2829 2830 2831 2832
            goto error;
        }

        ret = conn->driver->domainSaveImageGetXMLDesc(conn, absolute_file,
                                                      flags);

        VIR_FREE(absolute_file);

        if (!ret)
            goto error;
        return ret;
    }

2833
    virReportUnsupportedError();
2834

2835
 error:
2836 2837 2838 2839
    virDispatchError(conn);
    return NULL;
}

2840

2841 2842 2843 2844 2845
/**
 * virDomainSaveImageDefineXML:
 * @conn: pointer to the hypervisor connection
 * @file: path to saved state file
 * @dxml: XML config for adjusting guest xml used on restore
2846
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
2847 2848 2849 2850 2851 2852 2853 2854 2855 2856 2857
 *
 * This updates the definition of a domain stored in a saved state
 * file.  @file must be a file created previously by virDomainSave()
 * or virDomainSaveFlags().
 *
 * @dxml can be used to alter host-specific portions of the domain XML
 * that will be used when restoring an image.  For example, it is
 * possible to alter the backing filename that is associated with a
 * disk device, to match renaming done as part of backing up the disk
 * device while the domain is stopped.
 *
2858 2859 2860 2861 2862 2863 2864
 * Normally, the saved state file will remember whether the domain was
 * running or paused, and restore defaults to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override the default saved into the file; omitting both
 * leaves the file's default unchanged.  These two flags are mutually
 * exclusive.
 *
2865 2866 2867 2868 2869 2870 2871 2872 2873 2874 2875
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSaveImageDefineXML(virConnectPtr conn, const char *file,
                            const char *dxml, unsigned int flags)
{
    VIR_DEBUG("conn=%p, file=%s, dxml=%s, flags=%x",
              conn, file, dxml, flags);

    virResetLastError();

2876
    virCheckConnectReturn(conn, -1);
2877
    virCheckReadOnlyGoto(conn->flags, error);
2878 2879
    virCheckNonNullArgGoto(file, error);
    virCheckNonNullArgGoto(dxml, error);
2880

2881
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
2882
        virReportInvalidArg(flags, "%s",
2883 2884
                            _("running and paused flags are mutually "
                              "exclusive"));
2885 2886 2887
        goto error;
    }

2888 2889 2890 2891 2892 2893
    if (conn->driver->domainSaveImageDefineXML) {
        int ret;
        char *absolute_file;

        /* We must absolutize the file path as the read is done out of process */
        if (virFileAbsPath(file, &absolute_file) < 0) {
2894 2895
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2896 2897 2898 2899 2900 2901 2902 2903 2904 2905 2906 2907 2908
            goto error;
        }

        ret = conn->driver->domainSaveImageDefineXML(conn, absolute_file,
                                                     dxml, flags);

        VIR_FREE(absolute_file);

        if (ret < 0)
            goto error;
        return ret;
    }

2909
    virReportUnsupportedError();
2910

2911
 error:
2912 2913 2914 2915
    virDispatchError(conn);
    return -1;
}

2916

D
Daniel Veillard 已提交
2917 2918 2919 2920
/**
 * virDomainCoreDump:
 * @domain: a domain object
 * @to: path for the core file
2921
 * @flags: bitwise-OR of virDomainCoreDumpFlags
D
Daniel Veillard 已提交
2922 2923 2924
 *
 * This method will dump the core of a domain on a given file for analysis.
 * Note that for remote Xen Daemon the file path will be interpreted in
2925 2926
 * the remote host. Hypervisors may require  the user to manually ensure
 * proper permissions on the file named by @to.
D
Daniel Veillard 已提交
2927
 *
2928 2929 2930 2931
 * If @flags includes VIR_DUMP_CRASH, then leave the guest shut off with
 * a crashed state after the dump completes.  If @flags includes
 * VIR_DUMP_LIVE, then make the core dump while continuing to allow
 * the guest to run; otherwise, the guest is suspended during the dump.
2932 2933
 * VIR_DUMP_RESET flag forces reset of the quest after dump.
 * The above three flags are mutually exclusive.
2934 2935 2936 2937 2938 2939
 *
 * Additionally, if @flags includes VIR_DUMP_BYPASS_CACHE, then libvirt
 * will attempt to bypass the file system cache while creating the file,
 * or fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
2940 2941
 * For more control over the output format, see virDomainCoreDumpWithFormat().
 *
D
Daniel Veillard 已提交
2942 2943 2944
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2945
virDomainCoreDump(virDomainPtr domain, const char *to, unsigned int flags)
D
Daniel Veillard 已提交
2946 2947
{
    virConnectPtr conn;
2948

2949
    VIR_DOMAIN_DEBUG(domain, "to=%s, flags=%x", to, flags);
D
Daniel Veillard 已提交
2950

2951 2952
    virResetLastError();

2953
    virCheckDomainReturn(domain, -1);
D
Daniel Veillard 已提交
2954
    conn = domain->conn;
2955 2956

    virCheckReadOnlyGoto(conn->flags, error);
2957
    virCheckNonNullArgGoto(to, error);
D
Daniel Veillard 已提交
2958

2959
    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_LIVE)) {
2960 2961
        virReportInvalidArg(flags, "%s",
                            _("crash and live flags are mutually exclusive"));
2962 2963 2964
        goto error;
    }

2965
    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_RESET)) {
2966
        virReportInvalidArg(flags, "%s",
2967 2968 2969 2970 2971
                         _("crash and reset flags are mutually exclusive"));
        goto error;
    }

    if ((flags & VIR_DUMP_LIVE) && (flags & VIR_DUMP_RESET)) {
2972 2973
        virReportInvalidArg(flags, "%s",
                            _("live and reset flags are mutually exclusive"));
2974 2975 2976
        goto error;
    }

2977 2978 2979
    if (conn->driver->domainCoreDump) {
        int ret;
        char *absolute_to;
D
Daniel Veillard 已提交
2980

2981 2982
        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
2983 2984
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute core file path"));
2985 2986
            goto error;
        }
D
Daniel Veillard 已提交
2987

2988 2989 2990
        ret = conn->driver->domainCoreDump(domain, absolute_to, flags);

        VIR_FREE(absolute_to);
D
Daniel Veillard 已提交
2991

2992 2993 2994 2995
        if (ret < 0)
            goto error;
        return ret;
    }
2996

2997
    virReportUnsupportedError();
2998

2999
 error:
3000
    virDispatchError(domain->conn);
3001
    return -1;
3002 3003
}

3004 3005 3006 3007 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 3029 3030 3031 3032 3033 3034 3035 3036 3037 3038 3039 3040 3041 3042 3043 3044 3045 3046 3047 3048 3049 3050 3051 3052 3053 3054 3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065 3066 3067 3068 3069 3070 3071 3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097
/**
 * virDomainCoreDumpWithFormat:
 * @domain: a domain object
 * @to: path for the core file
 * @dumpformat: format of domain memory's dump
 * @flags: bitwise-OR of virDomainCoreDumpFlags
 *
 * This method will dump the core of a domain on a given file for analysis.
 * Note that for remote Xen Daemon the file path will be interpreted in
 * the remote host. Hypervisors may require  the user to manually ensure
 * proper permissions on the file named by @to.
 *
 * @dumpformat controls which format the dump will have; use of
 * VIR_DOMAIN_CORE_DUMP_FORMAT_RAW mirrors what virDomainCoreDump() will
 * perform.  Not all hypervisors are able to support all formats.
 *
 * If @flags includes VIR_DUMP_CRASH, then leave the guest shut off with
 * a crashed state after the dump completes.  If @flags includes
 * VIR_DUMP_LIVE, then make the core dump while continuing to allow
 * the guest to run; otherwise, the guest is suspended during the dump.
 * VIR_DUMP_RESET flag forces reset of the quest after dump.
 * The above three flags are mutually exclusive.
 *
 * Additionally, if @flags includes VIR_DUMP_BYPASS_CACHE, then libvirt
 * will attempt to bypass the file system cache while creating the file,
 * or fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainCoreDumpWithFormat(virDomainPtr domain, const char *to,
                            unsigned int dumpformat, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "to=%s, dumpformat=%u, flags=%x",
                     to, dumpformat, flags);

    virResetLastError();

    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
    virCheckNonNullArgGoto(to, error);

    if (dumpformat >= VIR_DOMAIN_CORE_DUMP_FORMAT_LAST) {
        virReportInvalidArg(flags, _("dumpformat '%d' is not supported"),
                            dumpformat);
        goto error;
    }

    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_LIVE)) {
        virReportInvalidArg(flags, "%s",
                            _("crash and live flags are mutually exclusive"));
        goto error;
    }

    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_RESET)) {
        virReportInvalidArg(flags, "%s",
                            _("crash and reset flags are mutually exclusive"));
        goto error;
    }

    if ((flags & VIR_DUMP_LIVE) && (flags & VIR_DUMP_RESET)) {
        virReportInvalidArg(flags, "%s",
                            _("live and reset flags are mutually exclusive"));
        goto error;
    }

    if (conn->driver->domainCoreDumpWithFormat) {
        int ret;
        char *absolute_to;

        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute core file path"));
            goto error;
        }

        ret = conn->driver->domainCoreDumpWithFormat(domain, absolute_to,
                                                     dumpformat, flags);

        VIR_FREE(absolute_to);

        if (ret < 0)
            goto error;
        return ret;
    }

    virReportUnsupportedError();

3098
 error:
3099 3100 3101 3102
    virDispatchError(domain->conn);
    return -1;
}

3103

3104 3105 3106 3107 3108
/**
 * virDomainScreenshot:
 * @domain: a domain object
 * @stream: stream to use as output
 * @screen: monitor ID to take screenshot from
3109
 * @flags: extra flags; not used yet, so callers should always pass 0
3110 3111 3112 3113 3114 3115 3116
 *
 * Take a screenshot of current domain console as a stream. The image format
 * is hypervisor specific. Moreover, some hypervisors supports multiple
 * displays per domain. These can be distinguished by @screen argument.
 *
 * This call sets up a stream; subsequent use of stream API is necessary
 * to transfer actual data, determine how much data is successfully
J
Ján Tomko 已提交
3117
 * transferred, and detect any errors.
3118 3119 3120 3121
 *
 * The screen ID is the sequential number of screen. In case of multiple
 * graphics cards, heads are enumerated before devices, e.g. having
 * two graphics cards, both with four heads, screen ID 5 addresses
3122
 * the second head on the second card.
3123 3124 3125 3126 3127 3128 3129 3130 3131 3132
 *
 * Returns a string representing the mime-type of the image format, or
 * NULL upon error. The caller must free() the returned value.
 */
char *
virDomainScreenshot(virDomainPtr domain,
                    virStreamPtr stream,
                    unsigned int screen,
                    unsigned int flags)
{
E
Eric Blake 已提交
3133
    VIR_DOMAIN_DEBUG(domain, "stream=%p, flags=%x", stream, flags);
3134 3135 3136

    virResetLastError();

3137
    virCheckDomainReturn(domain, NULL);
3138 3139 3140 3141 3142 3143 3144 3145
    virCheckStreamGoto(stream, error);
    virCheckReadOnlyGoto(domain->conn->flags, error);

    if (domain->conn != stream->conn) {
        virReportInvalidArg(stream,
                            _("stream in %s must match connection of domain '%s'"),
                            __FUNCTION__, domain->name);
        goto error;
3146 3147 3148
    }

    if (domain->conn->driver->domainScreenshot) {
3149
        char *ret;
3150 3151 3152 3153 3154 3155 3156 3157
        ret = domain->conn->driver->domainScreenshot(domain, stream,
                                                     screen, flags);

        if (ret == NULL)
            goto error;
        return ret;
    }

3158
    virReportUnsupportedError();
3159

3160
 error:
3161 3162 3163 3164
    virDispatchError(domain->conn);
    return NULL;
}

3165

3166 3167 3168 3169
/**
 * virDomainShutdown:
 * @domain: a domain object
 *
3170
 * Shutdown a domain, the domain object is still usable thereafter, but
3171
 * the domain OS is being stopped. Note that the guest OS may ignore the
3172 3173 3174
 * request. Additionally, the hypervisor may check and support the domain
 * 'on_poweroff' XML setting resulting in a domain that reboots instead of
 * shutting down. For guests that react to a shutdown request, the differences
3175 3176 3177 3178
 * from virDomainDestroy() are that the guests disk storage will be in a
 * stable state rather than having the (virtual) power cord pulled, and
 * this command returns as soon as the shutdown request is issued rather
 * than blocking until the guest is no longer running.
3179
 *
3180 3181 3182
 * If the domain is transient and has any snapshot metadata (see
 * virDomainSnapshotNum()), then that metadata will automatically
 * be deleted when the domain quits.
3183 3184 3185 3186
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
3187 3188
virDomainShutdown(virDomainPtr domain)
{
3189
    virConnectPtr conn;
3190

3191
    VIR_DOMAIN_DEBUG(domain);
3192

3193 3194
    virResetLastError();

3195
    virCheckDomainReturn(domain, -1);
3196 3197
    conn = domain->conn;

3198 3199
    virCheckReadOnlyGoto(conn->flags, error);

3200 3201
    if (conn->driver->domainShutdown) {
        int ret;
3202
        ret = conn->driver->domainShutdown(domain);
3203 3204 3205 3206
        if (ret < 0)
            goto error;
        return ret;
    }
3207

3208
    virReportUnsupportedError();
3209

3210
 error:
3211
    virDispatchError(domain->conn);
3212
    return -1;
3213 3214
}

3215

3216 3217 3218 3219 3220 3221 3222
/**
 * virDomainShutdownFlags:
 * @domain: a domain object
 * @flags: bitwise-OR of virDomainShutdownFlagValues
 *
 * Shutdown a domain, the domain object is still usable thereafter but
 * the domain OS is being stopped. Note that the guest OS may ignore the
3223 3224 3225
 * request. Additionally, the hypervisor may check and support the domain
 * 'on_poweroff' XML setting resulting in a domain that reboots instead of
 * shutting down. For guests that react to a shutdown request, the differences
3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236
 * from virDomainDestroy() are that the guest's disk storage will be in a
 * stable state rather than having the (virtual) power cord pulled, and
 * this command returns as soon as the shutdown request is issued rather
 * than blocking until the guest is no longer running.
 *
 * If the domain is transient and has any snapshot metadata (see
 * virDomainSnapshotNum()), then that metadata will automatically
 * be deleted when the domain quits.
 *
 * If @flags is set to zero, then the hypervisor will choose the
 * method of shutdown it considers best. To have greater control
3237 3238 3239
 * pass one or more of the virDomainShutdownFlagValues. The order
 * in which the hypervisor tries each shutdown method is undefined,
 * and a hypervisor is not required to support all methods.
3240
 *
3241 3242 3243
 * To use guest agent (VIR_DOMAIN_SHUTDOWN_GUEST_AGENT) the domain XML
 * must have <channel> configured.
 *
3244 3245 3246 3247 3248 3249 3250
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainShutdownFlags(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;

3251
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
3252 3253 3254

    virResetLastError();

3255
    virCheckDomainReturn(domain, -1);
3256 3257
    conn = domain->conn;

3258 3259
    virCheckReadOnlyGoto(conn->flags, error);

3260 3261 3262 3263 3264 3265 3266 3267
    if (conn->driver->domainShutdownFlags) {
        int ret;
        ret = conn->driver->domainShutdownFlags(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3268
    virReportUnsupportedError();
3269

3270
 error:
3271 3272 3273 3274
    virDispatchError(domain->conn);
    return -1;
}

3275

3276 3277 3278
/**
 * virDomainReboot:
 * @domain: a domain object
3279
 * @flags: bitwise-OR of virDomainRebootFlagValues
3280
 *
3281
 * Reboot a domain, the domain object is still usable thereafter, but
3282 3283
 * the domain OS is being stopped for a restart.
 * Note that the guest OS may ignore the request.
3284 3285 3286
 * Additionally, the hypervisor may check and support the domain
 * 'on_reboot' XML setting resulting in a domain that shuts down instead
 * of rebooting.
3287
 *
3288 3289
 * If @flags is set to zero, then the hypervisor will choose the
 * method of shutdown it considers best. To have greater control
3290
 * pass one or more of the virDomainRebootFlagValues. The order
3291 3292
 * in which the hypervisor tries each shutdown method is undefined,
 * and a hypervisor is not required to support all methods.
3293 3294 3295 3296
 *
 * To use guest agent (VIR_DOMAIN_REBOOT_GUEST_AGENT) the domain XML
 * must have <channel> configured.
 *
3297 3298 3299 3300 3301
 * Due to implementation limitations in some drivers (the qemu driver,
 * for instance) it is not advised to migrate or save a guest that is
 * rebooting as a result of this API. Migrating such a guest can lead
 * to a plain shutdown on the destination.
 *
3302 3303 3304 3305 3306
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainReboot(virDomainPtr domain, unsigned int flags)
{
3307
    virConnectPtr conn;
3308

3309
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
3310

3311 3312
    virResetLastError();

3313
    virCheckDomainReturn(domain, -1);
3314 3315
    conn = domain->conn;

3316 3317
    virCheckReadOnlyGoto(conn->flags, error);

3318 3319
    if (conn->driver->domainReboot) {
        int ret;
3320
        ret = conn->driver->domainReboot(domain, flags);
3321 3322 3323 3324
        if (ret < 0)
            goto error;
        return ret;
    }
3325

3326
    virReportUnsupportedError();
X
Xu He Jie 已提交
3327

3328
 error:
X
Xu He Jie 已提交
3329 3330 3331 3332
    virDispatchError(domain->conn);
    return -1;
}

3333

X
Xu He Jie 已提交
3334 3335 3336
/**
 * virDomainReset:
 * @domain: a domain object
3337
 * @flags: extra flags; not used yet, so callers should always pass 0
X
Xu He Jie 已提交
3338 3339 3340 3341 3342 3343 3344 3345 3346 3347 3348 3349 3350 3351 3352 3353 3354 3355 3356
 *
 * Reset a domain immediately without any guest OS shutdown.
 * Reset emulates the power reset button on a machine, where all
 * hardware sees the RST line set and reinitializes internal state.
 *
 * Note that there is a risk of data loss caused by reset without any
 * guest OS shutdown.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainReset(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);

    virResetLastError();

3357
    virCheckDomainReturn(domain, -1);
X
Xu He Jie 已提交
3358 3359
    conn = domain->conn;

3360 3361
    virCheckReadOnlyGoto(conn->flags, error);

X
Xu He Jie 已提交
3362 3363
    if (conn->driver->domainReset) {
        int ret;
3364
        ret = conn->driver->domainReset(domain, flags);
X
Xu He Jie 已提交
3365 3366 3367 3368 3369
        if (ret < 0)
            goto error;
        return ret;
    }

3370
    virReportUnsupportedError();
3371

3372
 error:
3373
    virDispatchError(domain->conn);
3374
    return -1;
3375 3376
}

3377

3378
/**
3379
 * virDomainGetName:
3380 3381 3382 3383 3384 3385 3386 3387
 * @domain: a domain object
 *
 * Get the public name for that domain
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the domain object.
 */
const char *
3388 3389
virDomainGetName(virDomainPtr domain)
{
3390
    VIR_DEBUG("domain=%p", domain);
3391

3392 3393
    virResetLastError();

3394 3395
    virCheckDomainReturn(domain, NULL);

3396
    return domain->name;
3397 3398
}

3399

3400 3401 3402
/**
 * virDomainGetUUID:
 * @domain: a domain object
3403
 * @uuid: pointer to a VIR_UUID_BUFLEN bytes array
3404 3405 3406 3407 3408 3409
 *
 * Get the UUID for a domain
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
3410 3411
virDomainGetUUID(virDomainPtr domain, unsigned char *uuid)
{
3412
    VIR_DOMAIN_DEBUG(domain, "uuid=%p", uuid);
3413

3414 3415
    virResetLastError();

3416
    virCheckDomainReturn(domain, -1);
3417
    virCheckNonNullArgGoto(uuid, error);
D
Daniel Veillard 已提交
3418

3419 3420
    memcpy(uuid, &domain->uuid[0], VIR_UUID_BUFLEN);

3421
    return 0;
3422

3423
 error:
3424 3425
    virDispatchError(domain->conn);
    return -1;
3426 3427
}

3428

K
Karel Zak 已提交
3429 3430 3431
/**
 * virDomainGetUUIDString:
 * @domain: a domain object
3432
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
K
Karel Zak 已提交
3433
 *
3434
 * Get the UUID for a domain as string. For more information about
K
Karel Zak 已提交
3435 3436 3437 3438 3439 3440 3441
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virDomainGetUUIDString(virDomainPtr domain, char *buf)
{
3442
    VIR_DOMAIN_DEBUG(domain, "buf=%p", buf);
3443

3444 3445
    virResetLastError();

3446
    virCheckDomainReturn(domain, -1);
3447
    virCheckNonNullArgGoto(buf, error);
3448

E
Eric Blake 已提交
3449
    virUUIDFormat(domain->uuid, buf);
3450
    return 0;
3451

3452
 error:
3453
    virDispatchError(domain->conn);
3454
    return -1;
K
Karel Zak 已提交
3455 3456
}

3457

3458
/**
3459
 * virDomainGetID:
3460 3461 3462 3463 3464 3465 3466
 * @domain: a domain object
 *
 * Get the hypervisor ID number for the domain
 *
 * Returns the domain ID number or (unsigned int) -1 in case of error
 */
unsigned int
3467 3468
virDomainGetID(virDomainPtr domain)
{
3469
    VIR_DOMAIN_DEBUG(domain);
3470

3471 3472
    virResetLastError();

3473 3474
    virCheckDomainReturn(domain, (unsigned int)-1);

3475
    return domain->id;
3476 3477
}

3478

3479 3480 3481 3482 3483 3484
/**
 * virDomainGetOSType:
 * @domain: a domain object
 *
 * Get the type of domain operation system.
 *
3485 3486
 * Returns the new string or NULL in case of error, the string must be
 *         freed by the caller.
3487 3488
 */
char *
3489 3490
virDomainGetOSType(virDomainPtr domain)
{
3491
    virConnectPtr conn;
3492

3493
    VIR_DOMAIN_DEBUG(domain);
3494

3495 3496
    virResetLastError();

3497
    virCheckDomainReturn(domain, NULL);
3498 3499
    conn = domain->conn;

3500 3501
    if (conn->driver->domainGetOSType) {
        char *ret;
3502
        ret = conn->driver->domainGetOSType(domain);
3503 3504 3505 3506
        if (!ret)
            goto error;
        return ret;
    }
3507

3508
    virReportUnsupportedError();
3509

3510
 error:
3511
    virDispatchError(domain->conn);
3512
    return NULL;
3513 3514
}

3515

3516
/**
3517
 * virDomainGetMaxMemory:
3518
 * @domain: a domain object or NULL
3519
 *
3520 3521 3522 3523
 * Retrieve the maximum amount of physical memory allocated to a
 * domain. If domain is NULL, then this get the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
 *
3524 3525
 * Returns the memory size in kibibytes (blocks of 1024 bytes), or 0 in
 * case of error.
3526 3527
 */
unsigned long
3528 3529
virDomainGetMaxMemory(virDomainPtr domain)
{
3530
    virConnectPtr conn;
3531

3532
    VIR_DOMAIN_DEBUG(domain);
3533

3534 3535
    virResetLastError();

3536
    virCheckDomainReturn(domain, 0);
3537 3538
    conn = domain->conn;

3539
    if (conn->driver->domainGetMaxMemory) {
3540
        unsigned long long ret;
3541
        ret = conn->driver->domainGetMaxMemory(domain);
3542 3543
        if (ret == 0)
            goto error;
3544
        if ((unsigned long) ret != ret) {
3545 3546
            virReportError(VIR_ERR_OVERFLOW, _("result too large: %llu"),
                           ret);
3547 3548
            goto error;
        }
3549 3550
        return ret;
    }
3551

3552
    virReportUnsupportedError();
3553

3554
 error:
3555
    virDispatchError(domain->conn);
3556
    return 0;
3557 3558
}

3559

D
Daniel Veillard 已提交
3560
/**
3561
 * virDomainSetMaxMemory:
D
Daniel Veillard 已提交
3562
 * @domain: a domain object or NULL
3563
 * @memory: the memory size in kibibytes (blocks of 1024 bytes)
3564
 *
D
Daniel Veillard 已提交
3565 3566 3567
 * Dynamically change the maximum amount of physical memory allocated to a
 * domain. If domain is NULL, then this change the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
3568
 * This function may require privileged access to the hypervisor.
D
Daniel Veillard 已提交
3569
 *
3570 3571 3572
 * This command is hypervisor-specific for whether active, persistent,
 * or both configurations are changed; for more control, use
 * virDomainSetMemoryFlags().
3573
 *
D
Daniel Veillard 已提交
3574 3575 3576
 * Returns 0 in case of success and -1 in case of failure.
 */
int
3577 3578
virDomainSetMaxMemory(virDomainPtr domain, unsigned long memory)
{
3579
    virConnectPtr conn;
3580 3581

    VIR_DOMAIN_DEBUG(domain, "memory=%lu", memory);
3582

3583 3584
    virResetLastError();

3585
    virCheckDomainReturn(domain, -1);
3586
    conn = domain->conn;
3587

3588 3589 3590
    virCheckReadOnlyGoto(conn->flags, error);
    virCheckNonZeroArgGoto(memory, error);

3591 3592
    if (conn->driver->domainSetMaxMemory) {
        int ret;
3593
        ret = conn->driver->domainSetMaxMemory(domain, memory);
3594 3595 3596 3597
        if (ret < 0)
            goto error;
        return ret;
    }
3598

3599
    virReportUnsupportedError();
3600

3601
 error:
3602
    virDispatchError(domain->conn);
3603
    return -1;
3604
}
3605

3606

3607 3608 3609
/**
 * virDomainSetMemory:
 * @domain: a domain object or NULL
3610
 * @memory: the memory size in kibibytes (blocks of 1024 bytes)
3611
 *
3612 3613 3614
 * Dynamically change the target amount of physical memory allocated to a
 * domain. If domain is NULL, then this change the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
3615
 * This function may require privileged access to the hypervisor.
3616
 *
3617 3618 3619
 * This command only changes the runtime configuration of the domain,
 * so can only be called on an active domain.
 *
3620 3621 3622 3623 3624 3625
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSetMemory(virDomainPtr domain, unsigned long memory)
{
    virConnectPtr conn;
3626 3627

    VIR_DOMAIN_DEBUG(domain, "memory=%lu", memory);
3628

3629 3630
    virResetLastError();

3631
    virCheckDomainReturn(domain, -1);
3632
    conn = domain->conn;
3633

3634 3635 3636
    virCheckReadOnlyGoto(conn->flags, error);
    virCheckNonZeroArgGoto(memory, error);

3637 3638
    if (conn->driver->domainSetMemory) {
        int ret;
3639
        ret = conn->driver->domainSetMemory(domain, memory);
3640 3641 3642 3643
        if (ret < 0)
            goto error;
        return ret;
    }
3644

3645
    virReportUnsupportedError();
3646

3647
 error:
3648
    virDispatchError(domain->conn);
3649
    return -1;
D
Daniel Veillard 已提交
3650 3651
}

3652

3653
/**
3654
 * virDomainSetMemoryFlags:
3655
 * @domain: a domain object or NULL
3656
 * @memory: the memory size in kibibytes (blocks of 1024 bytes)
3657
 * @flags: bitwise-OR of virDomainMemoryModFlags
3658 3659 3660 3661
 *
 * Dynamically change the target amount of physical memory allocated to a
 * domain. If domain is NULL, then this change the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
3662
 * This function may require privileged access to the hypervisor.
3663
 *
3664 3665
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set. If VIR_DOMAIN_AFFECT_LIVE is set, the change affects
3666
 * a running domain and will fail if domain is not active.
3667
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
3668
 * and will fail for transient domains. If neither flag is specified
3669
 * (that is, @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain
3670 3671
 * modifies persistent setup, while an active domain is hypervisor-dependent
 * on whether just live or both live and persistent state is changed.
3672 3673
 * If VIR_DOMAIN_MEM_MAXIMUM is set, the change affects domain's maximum memory
 * size rather than current memory size.
3674
 * Not all hypervisors can support all flag combinations.
3675 3676 3677 3678 3679 3680 3681 3682 3683
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetMemoryFlags(virDomainPtr domain, unsigned long memory,
                        unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
3684
    VIR_DOMAIN_DEBUG(domain, "memory=%lu, flags=%x", memory, flags);
3685 3686 3687

    virResetLastError();

3688 3689
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
3690

3691
    virCheckReadOnlyGoto(conn->flags, error);
3692
    virCheckNonZeroArgGoto(memory, error);
3693 3694 3695 3696 3697 3698 3699 3700 3701

    if (conn->driver->domainSetMemoryFlags) {
        int ret;
        ret = conn->driver->domainSetMemoryFlags(domain, memory, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3702
    virReportUnsupportedError();
3703

3704
 error:
3705 3706 3707 3708
    virDispatchError(domain->conn);
    return -1;
}

3709

3710 3711 3712 3713 3714 3715 3716 3717 3718 3719 3720 3721 3722 3723 3724 3725 3726 3727 3728 3729 3730 3731 3732 3733 3734 3735 3736 3737 3738 3739 3740 3741
/**
 * virDomainSetMemoryStatsPeriod:
 * @domain: a domain object or NULL
 * @period: the period in seconds for stats collection
 * @flags: bitwise-OR of virDomainMemoryModFlags
 *
 * Dynamically change the domain memory balloon driver statistics collection
 * period. Use 0 to disable and a positive value to enable.
 *
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set. If VIR_DOMAIN_AFFECT_LIVE is set, the change affects
 * a running domain and will fail if domain is not active.
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
 * and will fail for transient domains. If neither flag is specified
 * (that is, @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain
 * modifies persistent setup, while an active domain is hypervisor-dependent
 * on whether just live or both live and persistent state is changed.
 *
 * Not all hypervisors can support all flag combinations.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetMemoryStatsPeriod(virDomainPtr domain, int period,
                              unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "peroid=%d, flags=%x", period, flags);

    virResetLastError();

3742 3743
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
3744

3745
    virCheckReadOnlyGoto(conn->flags, error);
3746 3747 3748 3749 3750 3751 3752 3753 3754 3755 3756 3757

    /* This must be positive to set the balloon collection period */
    virCheckNonNegativeArgGoto(period, error);

    if (conn->driver->domainSetMemoryStatsPeriod) {
        int ret;
        ret = conn->driver->domainSetMemoryStatsPeriod(domain, period, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3758
    virReportUnsupportedError();
3759

3760
 error:
3761 3762 3763 3764
    virDispatchError(domain->conn);
    return -1;
}

3765

E
Eric Blake 已提交
3766 3767 3768
/* Helper function called to validate incoming client array on any
 * interface that sets typed parameters in the hypervisor.  */
static int
3769
virTypedParameterValidateSet(virConnectPtr conn,
E
Eric Blake 已提交
3770 3771 3772 3773
                             virTypedParameterPtr params,
                             int nparams)
{
    bool string_okay;
3774
    size_t i;
E
Eric Blake 已提交
3775

3776 3777
    string_okay = VIR_DRV_SUPPORTS_FEATURE(conn->driver,
                                           conn,
E
Eric Blake 已提交
3778 3779 3780 3781
                                           VIR_DRV_FEATURE_TYPED_PARAM_STRING);
    for (i = 0; i < nparams; i++) {
        if (strnlen(params[i].field, VIR_TYPED_PARAM_FIELD_LENGTH) ==
            VIR_TYPED_PARAM_FIELD_LENGTH) {
3782 3783 3784 3785
            virReportInvalidArg(params,
                                _("string parameter name '%.*s' too long"),
                                VIR_TYPED_PARAM_FIELD_LENGTH,
                                params[i].field);
E
Eric Blake 已提交
3786 3787 3788 3789 3790
            return -1;
        }
        if (params[i].type == VIR_TYPED_PARAM_STRING) {
            if (string_okay) {
                if (!params[i].value.s) {
3791 3792 3793
                    virReportInvalidArg(params,
                                        _("NULL string parameter '%s'"),
                                        params[i].field);
E
Eric Blake 已提交
3794 3795 3796
                    return -1;
                }
            } else {
3797 3798 3799
                virReportInvalidArg(params,
                                    _("string parameter '%s' unsupported"),
                                    params[i].field);
E
Eric Blake 已提交
3800 3801 3802 3803 3804 3805 3806
                return -1;
            }
        }
    }
    return 0;
}

3807

3808 3809 3810 3811
/**
 * virDomainSetMemoryParameters:
 * @domain: pointer to domain object
 * @params: pointer to memory parameter objects
3812
 * @nparams: number of memory parameter (this value can be the same or
3813
 *          less than the number of parameters supported)
3814
 * @flags: bitwise-OR of virDomainModificationImpact
3815
 *
3816
 * Change all or a subset of the memory tunables.
3817
 * This function may require privileged access to the hypervisor.
3818 3819 3820 3821 3822
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetMemoryParameters(virDomainPtr domain,
3823
                             virTypedParameterPtr params,
3824 3825 3826
                             int nparams, unsigned int flags)
{
    virConnectPtr conn;
3827

3828
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
3829
                     params, nparams, flags);
3830
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
3831 3832 3833

    virResetLastError();

3834 3835 3836 3837
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
3838 3839 3840
    virCheckNonNullArgGoto(params, error);
    virCheckPositiveArgGoto(nparams, error);

3841
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
3842
        goto error;
E
Eric Blake 已提交
3843

3844 3845
    if (conn->driver->domainSetMemoryParameters) {
        int ret;
3846
        ret = conn->driver->domainSetMemoryParameters(domain, params, nparams, flags);
3847 3848 3849 3850 3851
        if (ret < 0)
            goto error;
        return ret;
    }

3852
    virReportUnsupportedError();
3853

3854
 error:
3855 3856 3857 3858
    virDispatchError(domain->conn);
    return -1;
}

3859

3860 3861 3862 3863 3864
/**
 * virDomainGetMemoryParameters:
 * @domain: pointer to domain object
 * @params: pointer to memory parameter object
 *          (return value, allocated by the caller)
3865
 * @nparams: pointer to number of memory parameters; input and output
E
Eric Blake 已提交
3866
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
3867
 *
3868 3869 3870 3871
 * Get all memory parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.
3872
 *
3873 3874 3875
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
3876
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
3877 3878
 * again.
 *
3879
 * Here is a sample code snippet:
3880
 *
3881 3882
 *   if (virDomainGetMemoryParameters(dom, NULL, &nparams, 0) == 0 &&
 *       nparams != 0) {
3883 3884 3885 3886 3887 3888
 *       if ((params = malloc(sizeof(*params) * nparams)) == NULL)
 *           goto error;
 *       memset(params, 0, sizeof(*params) * nparams);
 *       if (virDomainGetMemoryParameters(dom, params, &nparams, 0))
 *           goto error;
 *   }
3889
 *
3890
 * This function may require privileged access to the hypervisor. This function
3891
 * expects the caller to allocate the @params.
3892 3893 3894 3895 3896
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetMemoryParameters(virDomainPtr domain,
3897
                             virTypedParameterPtr params,
3898 3899 3900
                             int *nparams, unsigned int flags)
{
    virConnectPtr conn;
3901

3902
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
3903
                     params, (nparams) ? *nparams : -1, flags);
3904 3905 3906

    virResetLastError();

3907
    virCheckDomainReturn(domain, -1);
3908 3909 3910 3911 3912
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

E
Eric Blake 已提交
3913 3914 3915
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
3916 3917 3918 3919

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
3920
        virReportInvalidArg(flags,
3921 3922
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
3923
                            __FUNCTION__);
3924 3925
        goto error;
    }
3926 3927 3928 3929
    conn = domain->conn;

    if (conn->driver->domainGetMemoryParameters) {
        int ret;
3930
        ret = conn->driver->domainGetMemoryParameters(domain, params, nparams, flags);
3931 3932 3933 3934
        if (ret < 0)
            goto error;
        return ret;
    }
3935
    virReportUnsupportedError();
3936

3937
 error:
3938 3939 3940 3941
    virDispatchError(domain->conn);
    return -1;
}

3942

3943 3944 3945 3946 3947 3948 3949 3950 3951 3952 3953 3954 3955 3956 3957 3958 3959 3960 3961 3962 3963 3964
/**
 * virDomainSetNumaParameters:
 * @domain: pointer to domain object
 * @params: pointer to numa parameter objects
 * @nparams: number of numa parameters (this value can be the same or
 *          less than the number of parameters supported)
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Change all or a subset of the numa tunables.
 * This function may require privileged access to the hypervisor.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetNumaParameters(virDomainPtr domain,
                           virTypedParameterPtr params,
                           int nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
                     params, nparams, flags);
3965
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
3966 3967 3968

    virResetLastError();

3969
    virCheckDomainReturn(domain, -1);
3970
    virCheckReadOnlyGoto(domain->conn->flags, error);
3971 3972
    virCheckNonNullArgGoto(params, error);
    virCheckPositiveArgGoto(nparams, error);
3973
    if (virTypedParameterValidateSet(domain->conn, params, nparams) < 0)
3974
        goto error;
3975 3976 3977 3978 3979 3980 3981 3982 3983 3984 3985 3986

    conn = domain->conn;

    if (conn->driver->domainSetNumaParameters) {
        int ret;
        ret = conn->driver->domainSetNumaParameters(domain, params, nparams,
                                                    flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3987
    virReportUnsupportedError();
3988

3989
 error:
3990 3991 3992 3993
    virDispatchError(domain->conn);
    return -1;
}

3994

3995 3996 3997 3998 3999 4000 4001 4002 4003 4004 4005 4006 4007 4008 4009 4010 4011 4012 4013 4014 4015 4016 4017 4018 4019 4020 4021 4022 4023 4024 4025 4026 4027 4028 4029 4030 4031 4032
/**
 * virDomainGetNumaParameters:
 * @domain: pointer to domain object
 * @params: pointer to numa parameter object
 *          (return value, allocated by the caller)
 * @nparams: pointer to number of numa parameters
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
 *
 * Get all numa parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.
 *
 * See virDomainGetMemoryParameters() for an equivalent usage example.
 *
 * This function may require privileged access to the hypervisor. This function
 * expects the caller to allocate the @params.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetNumaParameters(virDomainPtr domain,
                           virTypedParameterPtr params,
                           int *nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
                     params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

4033
    virCheckDomainReturn(domain, -1);
4034 4035 4036 4037 4038
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

4039 4040 4041 4042 4043 4044 4045 4046 4047 4048 4049 4050 4051 4052
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    conn = domain->conn;

    if (conn->driver->domainGetNumaParameters) {
        int ret;
        ret = conn->driver->domainGetNumaParameters(domain, params, nparams,
                                                    flags);
        if (ret < 0)
            goto error;
        return ret;
    }
4053
    virReportUnsupportedError();
4054

4055
 error:
4056 4057 4058 4059
    virDispatchError(domain->conn);
    return -1;
}

4060

4061 4062 4063 4064
/**
 * virDomainSetBlkioParameters:
 * @domain: pointer to domain object
 * @params: pointer to blkio parameter objects
4065
 * @nparams: number of blkio parameters (this value can be the same or
4066
 *          less than the number of parameters supported)
E
Eric Blake 已提交
4067
 * @flags: bitwise-OR of virDomainModificationImpact
4068
 *
4069
 * Change all or a subset of the blkio tunables.
4070
 * This function may require privileged access to the hypervisor.
4071 4072 4073 4074 4075
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetBlkioParameters(virDomainPtr domain,
4076 4077
                            virTypedParameterPtr params,
                            int nparams, unsigned int flags)
4078 4079 4080
{
    virConnectPtr conn;

4081
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
4082
                     params, nparams, flags);
4083
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
4084 4085 4086

    virResetLastError();

4087 4088 4089 4090
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
4091 4092 4093
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

4094
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
4095
        goto error;
E
Eric Blake 已提交
4096

4097 4098
    if (conn->driver->domainSetBlkioParameters) {
        int ret;
4099
        ret = conn->driver->domainSetBlkioParameters(domain, params, nparams, flags);
4100 4101 4102 4103 4104
        if (ret < 0)
            goto error;
        return ret;
    }

4105
    virReportUnsupportedError();
4106

4107
 error:
4108 4109 4110 4111
    virDispatchError(domain->conn);
    return -1;
}

4112

4113 4114 4115 4116 4117
/**
 * virDomainGetBlkioParameters:
 * @domain: pointer to domain object
 * @params: pointer to blkio parameter object
 *          (return value, allocated by the caller)
4118
 * @nparams: pointer to number of blkio parameters; input and output
E
Eric Blake 已提交
4119
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
4120
 *
4121 4122 4123 4124 4125 4126 4127 4128 4129 4130 4131 4132
 * Get all blkio parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.
 *
 * See virDomainGetMemoryParameters() for an equivalent usage example.
4133
 *
4134
 * This function may require privileged access to the hypervisor. This function
4135 4136 4137 4138 4139 4140
 * expects the caller to allocate the @params.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetBlkioParameters(virDomainPtr domain,
4141 4142
                            virTypedParameterPtr params,
                            int *nparams, unsigned int flags)
4143 4144 4145
{
    virConnectPtr conn;

4146
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
4147 4148 4149 4150
                     params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

4151
    virCheckDomainReturn(domain, -1);
4152 4153 4154 4155 4156
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

E
Eric Blake 已提交
4157 4158 4159
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
4160 4161 4162 4163

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
4164
        virReportInvalidArg(flags,
4165 4166
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
4167
                            __FUNCTION__);
4168 4169
        goto error;
    }
4170 4171 4172 4173
    conn = domain->conn;

    if (conn->driver->domainGetBlkioParameters) {
        int ret;
4174
        ret = conn->driver->domainGetBlkioParameters(domain, params, nparams, flags);
4175 4176 4177 4178
        if (ret < 0)
            goto error;
        return ret;
    }
4179
    virReportUnsupportedError();
4180

4181
 error:
4182 4183 4184 4185
    virDispatchError(domain->conn);
    return -1;
}

4186

4187 4188
/**
 * virDomainGetInfo:
4189
 * @domain: a domain object
4190
 * @info: pointer to a virDomainInfo structure allocated by the user
4191
 *
4192
 * Extract information about a domain. Note that if the connection
4193
 * used to get the domain is limited only a partial set of the information
4194 4195 4196 4197 4198
 * can be extracted.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
4199 4200
virDomainGetInfo(virDomainPtr domain, virDomainInfoPtr info)
{
4201
    virConnectPtr conn;
4202 4203

    VIR_DOMAIN_DEBUG(domain, "info=%p", info);
4204

4205 4206
    virResetLastError();

4207 4208 4209
    if (info)
        memset(info, 0, sizeof(*info));

4210
    virCheckDomainReturn(domain, -1);
4211
    virCheckNonNullArgGoto(info, error);
4212

4213 4214
    conn = domain->conn;

4215 4216
    if (conn->driver->domainGetInfo) {
        int ret;
4217
        ret = conn->driver->domainGetInfo(domain, info);
4218 4219 4220 4221
        if (ret < 0)
            goto error;
        return ret;
    }
4222

4223
    virReportUnsupportedError();
4224

4225
 error:
4226
    virDispatchError(domain->conn);
4227
    return -1;
4228
}
4229

4230

4231 4232 4233 4234 4235 4236
/**
 * virDomainGetState:
 * @domain: a domain object
 * @state: returned state of the domain (one of virDomainState)
 * @reason: returned reason which led to @state (one of virDomain*Reason
 * corresponding to the current state); it is allowed to be NULL
4237
 * @flags: extra flags; not used yet, so callers should always pass 0
4238 4239 4240 4241 4242 4243 4244 4245 4246 4247 4248 4249 4250 4251
 *
 * Extract domain state. Each state can be accompanied with a reason (if known)
 * which led to the state.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetState(virDomainPtr domain,
                  int *state,
                  int *reason,
                  unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
4252 4253
    VIR_DOMAIN_DEBUG(domain, "state=%p, reason=%p, flags=%x",
                     state, reason, flags);
4254 4255 4256

    virResetLastError();

4257
    virCheckDomainReturn(domain, -1);
4258
    virCheckNonNullArgGoto(state, error);
4259 4260 4261 4262 4263 4264

    conn = domain->conn;
    if (conn->driver->domainGetState) {
        int ret;
        ret = conn->driver->domainGetState(domain, state, reason, flags);
        if (ret < 0)
4265 4266 4267 4268
            goto error;
        return ret;
    }

4269
    virReportUnsupportedError();
4270

4271
 error:
4272 4273 4274 4275
    virDispatchError(domain->conn);
    return -1;
}

4276

4277 4278 4279 4280
/**
 * virDomainGetControlInfo:
 * @domain: a domain object
 * @info: pointer to a virDomainControlInfo structure allocated by the user
4281
 * @flags: extra flags; not used yet, so callers should always pass 0
4282 4283 4284 4285 4286 4287 4288 4289 4290 4291 4292 4293
 *
 * Extract details about current state of control interface to a domain.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetControlInfo(virDomainPtr domain,
                        virDomainControlInfoPtr info,
                        unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
4294
    VIR_DOMAIN_DEBUG(domain, "info=%p, flags=%x", info, flags);
4295 4296 4297

    virResetLastError();

4298
    virCheckDomainReturn(domain, -1);
4299
    virCheckNonNullArgGoto(info, error);
4300 4301 4302 4303 4304 4305

    conn = domain->conn;
    if (conn->driver->domainGetControlInfo) {
        int ret;
        ret = conn->driver->domainGetControlInfo(domain, info, flags);
        if (ret < 0)
4306 4307 4308 4309
            goto error;
        return ret;
    }

4310
    virReportUnsupportedError();
4311

4312
 error:
4313 4314 4315 4316
    virDispatchError(domain->conn);
    return -1;
}

4317

4318 4319 4320
/**
 * virDomainGetXMLDesc:
 * @domain: a domain object
4321
 * @flags: bitwise-OR of virDomainXMLFlags
4322 4323
 *
 * Provide an XML description of the domain. The description may be reused
4324
 * later to relaunch the domain with virDomainCreateXML().
4325
 *
4326 4327 4328 4329 4330 4331 4332 4333 4334 4335
 * No security-sensitive data will be included unless @flags contains
 * VIR_DOMAIN_XML_SECURE; this flag is rejected on read-only
 * connections.  If @flags includes VIR_DOMAIN_XML_INACTIVE, then the
 * XML represents the configuration that will be used on the next boot
 * of a persistent domain; otherwise, the configuration represents the
 * currently running domain.  If @flags contains
 * VIR_DOMAIN_XML_UPDATE_CPU, then the portion of the domain XML
 * describing CPU capabilities is modified to match actual
 * capabilities of the host.
 *
4336 4337 4338 4339
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
4340
virDomainGetXMLDesc(virDomainPtr domain, unsigned int flags)
4341
{
4342
    virConnectPtr conn;
4343

4344
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
4345

4346 4347
    virResetLastError();

4348
    virCheckDomainReturn(domain, NULL);
4349 4350
    conn = domain->conn;

4351
    if ((conn->flags & VIR_CONNECT_RO) && (flags & VIR_DOMAIN_XML_SECURE)) {
4352 4353
        virReportError(VIR_ERR_OPERATION_DENIED, "%s",
                       _("virDomainGetXMLDesc with secure flag"));
4354 4355 4356
        goto error;
    }

4357
    if (conn->driver->domainGetXMLDesc) {
4358
        char *ret;
4359
        ret = conn->driver->domainGetXMLDesc(domain, flags);
4360 4361 4362 4363
        if (!ret)
            goto error;
        return ret;
    }
4364

4365
    virReportUnsupportedError();
4366

4367
 error:
4368
    virDispatchError(domain->conn);
4369
    return NULL;
4370
}
4371

4372

4373 4374 4375 4376 4377
/**
 * virConnectDomainXMLFromNative:
 * @conn: a connection object
 * @nativeFormat: configuration format importing from
 * @nativeConfig: the configuration data to import
4378
 * @flags: extra flags; not used yet, so callers should always pass 0
4379 4380 4381 4382 4383 4384 4385 4386
 *
 * Reads native configuration data  describing a domain, and
 * generates libvirt domain XML. The format of the native
 * data is hypervisor dependant.
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
4387 4388 4389 4390 4391
char *
virConnectDomainXMLFromNative(virConnectPtr conn,
                              const char *nativeFormat,
                              const char *nativeConfig,
                              unsigned int flags)
4392
{
E
Eric Blake 已提交
4393
    VIR_DEBUG("conn=%p, format=%s, config=%s, flags=%x",
4394
              conn, nativeFormat, nativeConfig, flags);
4395 4396 4397

    virResetLastError();

4398
    virCheckConnectReturn(conn, NULL);
4399
    virCheckReadOnlyGoto(conn->flags, error);
4400

4401 4402
    virCheckNonNullArgGoto(nativeFormat, error);
    virCheckNonNullArgGoto(nativeConfig, error);
4403

4404
    if (conn->driver->connectDomainXMLFromNative) {
4405
        char *ret;
4406 4407 4408 4409
        ret = conn->driver->connectDomainXMLFromNative(conn,
                                                       nativeFormat,
                                                       nativeConfig,
                                                       flags);
4410 4411 4412 4413 4414
        if (!ret)
            goto error;
        return ret;
    }

4415
    virReportUnsupportedError();
4416

4417
 error:
4418
    virDispatchError(conn);
4419 4420 4421
    return NULL;
}

4422

4423 4424 4425 4426 4427
/**
 * virConnectDomainXMLToNative:
 * @conn: a connection object
 * @nativeFormat: configuration format exporting to
 * @domainXml: the domain configuration to export
4428
 * @flags: extra flags; not used yet, so callers should always pass 0
4429 4430
 *
 * Reads a domain XML configuration document, and generates
E
Eric Blake 已提交
4431
 * a native configuration file describing the domain.
4432 4433 4434 4435 4436
 * The format of the native data is hypervisor dependant.
 *
 * Returns a 0 terminated UTF-8 encoded native config datafile, or NULL in case of error.
 *         the caller must free() the returned value.
 */
4437 4438 4439 4440 4441
char *
virConnectDomainXMLToNative(virConnectPtr conn,
                            const char *nativeFormat,
                            const char *domainXml,
                            unsigned int flags)
4442
{
E
Eric Blake 已提交
4443
    VIR_DEBUG("conn=%p, format=%s, xml=%s, flags=%x",
4444
              conn, nativeFormat, domainXml, flags);
4445 4446 4447

    virResetLastError();

4448
    virCheckConnectReturn(conn, NULL);
4449
    virCheckReadOnlyGoto(conn->flags, error);
4450

4451 4452
    virCheckNonNullArgGoto(nativeFormat, error);
    virCheckNonNullArgGoto(domainXml, error);
4453

4454
    if (conn->driver->connectDomainXMLToNative) {
4455
        char *ret;
4456 4457 4458 4459
        ret = conn->driver->connectDomainXMLToNative(conn,
                                                     nativeFormat,
                                                     domainXml,
                                                     flags);
4460 4461 4462 4463 4464
        if (!ret)
            goto error;
        return ret;
    }

4465
    virReportUnsupportedError();
4466

4467
 error:
4468
    virDispatchError(conn);
4469 4470 4471 4472
    return NULL;
}


4473 4474 4475 4476 4477 4478 4479 4480 4481 4482 4483 4484 4485 4486 4487 4488
/*
 * Sequence v1:
 *
 *  Dst: Prepare
 *        - Get ready to accept incoming VM
 *        - Generate optional cookie to pass to src
 *
 *  Src: Perform
 *        - Start migration and wait for send completion
 *        - Kill off VM if successful, resume if failed
 *
 *  Dst: Finish
 *        - Wait for recv completion and check status
 *        - Kill off VM if unsuccessful
 *
 */
4489
static virDomainPtr
4490 4491 4492 4493 4494 4495
virDomainMigrateVersion1(virDomainPtr domain,
                         virConnectPtr dconn,
                         unsigned long flags,
                         const char *dname,
                         const char *uri,
                         unsigned long bandwidth)
4496 4497 4498 4499
{
    virDomainPtr ddomain = NULL;
    char *uri_out = NULL;
    char *cookie = NULL;
4500 4501
    int cookielen = 0, ret;
    virDomainInfo info;
4502
    unsigned int destflags;
4503

4504
    VIR_DOMAIN_DEBUG(domain,
E
Eric Blake 已提交
4505
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
4506
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);
4507

4508
    ret = virDomainGetInfo(domain, &info);
4509
    if (ret == 0 && info.state == VIR_DOMAIN_PAUSED)
4510
        flags |= VIR_MIGRATE_PAUSED;
4511

4512 4513
    destflags = flags & ~(VIR_MIGRATE_ABORT_ON_ERROR |
                          VIR_MIGRATE_AUTO_CONVERGE);
4514 4515 4516 4517 4518 4519 4520 4521 4522 4523 4524 4525 4526

    /* Prepare the migration.
     *
     * The destination host may return a cookie, or leave cookie as
     * NULL.
     *
     * The destination host MUST set uri_out if uri_in is NULL.
     *
     * If uri_in is non-NULL, then the destination host may modify
     * the URI by setting uri_out.  If it does not wish to modify
     * the URI, it should leave uri_out as NULL.
     */
    if (dconn->driver->domainMigratePrepare
4527
        (dconn, &cookie, &cookielen, uri, &uri_out, destflags, dname,
4528 4529 4530 4531
         bandwidth) == -1)
        goto done;

    if (uri == NULL && uri_out == NULL) {
4532 4533
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("domainMigratePrepare did not set uri"));
4534 4535 4536 4537 4538 4539 4540 4541 4542 4543 4544 4545 4546 4547 4548 4549 4550 4551 4552 4553
        goto done;
    }
    if (uri_out)
        uri = uri_out; /* Did domainMigratePrepare change URI? */

    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete.
     */
    if (domain->conn->driver->domainMigratePerform
        (domain, cookie, cookielen, uri, flags, dname, bandwidth) == -1)
        goto done;

    /* Get the destination domain and return it or error.
     * 'domain' no longer actually exists at this point
     * (or so we hope), but we still use the object in memory
     * in order to get the name.
     */
    dname = dname ? dname : domain->name;
    if (dconn->driver->domainMigrateFinish)
        ddomain = dconn->driver->domainMigrateFinish
4554
            (dconn, dname, cookie, cookielen, uri, destflags);
4555
    else
4556
        ddomain = virDomainLookupByName(dconn, dname);
4557

4558
 done:
4559 4560
    VIR_FREE(uri_out);
    VIR_FREE(cookie);
4561 4562 4563
    return ddomain;
}

4564

4565 4566 4567 4568 4569 4570 4571 4572 4573 4574 4575 4576 4577 4578 4579 4580 4581 4582 4583
/*
 * Sequence v2:
 *
 *  Src: DumpXML
 *        - Generate XML to pass to dst
 *
 *  Dst: Prepare
 *        - Get ready to accept incoming VM
 *        - Generate optional cookie to pass to src
 *
 *  Src: Perform
 *        - Start migration and wait for send completion
 *        - Kill off VM if successful, resume if failed
 *
 *  Dst: Finish
 *        - Wait for recv completion and check status
 *        - Kill off VM if unsuccessful
 *
 */
4584
static virDomainPtr
4585 4586 4587 4588 4589 4590
virDomainMigrateVersion2(virDomainPtr domain,
                         virConnectPtr dconn,
                         unsigned long flags,
                         const char *dname,
                         const char *uri,
                         unsigned long bandwidth)
4591 4592 4593 4594 4595 4596
{
    virDomainPtr ddomain = NULL;
    char *uri_out = NULL;
    char *cookie = NULL;
    char *dom_xml = NULL;
    int cookielen = 0, ret;
4597
    virDomainInfo info;
4598
    virErrorPtr orig_err = NULL;
4599
    unsigned int getxml_flags = 0;
4600
    int cancelled;
4601
    unsigned long destflags;
4602

4603
    VIR_DOMAIN_DEBUG(domain,
E
Eric Blake 已提交
4604
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
4605
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);
4606 4607 4608 4609 4610 4611 4612 4613 4614 4615 4616 4617 4618 4619 4620 4621 4622

    /* Prepare the migration.
     *
     * The destination host may return a cookie, or leave cookie as
     * NULL.
     *
     * The destination host MUST set uri_out if uri_in is NULL.
     *
     * If uri_in is non-NULL, then the destination host may modify
     * the URI by setting uri_out.  If it does not wish to modify
     * the URI, it should leave uri_out as NULL.
     */

    /* In version 2 of the protocol, the prepare step is slightly
     * different.  We fetch the domain XML of the source domain
     * and pass it to Prepare2.
     */
4623
    if (!domain->conn->driver->domainGetXMLDesc) {
4624
        virReportUnsupportedError();
4625 4626
        return NULL;
    }
4627 4628 4629 4630 4631 4632 4633 4634 4635

    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_XML_MIGRATABLE)) {
        getxml_flags |= VIR_DOMAIN_XML_MIGRATABLE;
    } else {
        getxml_flags |= VIR_DOMAIN_XML_SECURE | VIR_DOMAIN_XML_UPDATE_CPU;
    }

    dom_xml = domain->conn->driver->domainGetXMLDesc(domain, getxml_flags);
4636 4637 4638
    if (!dom_xml)
        return NULL;

4639
    ret = virDomainGetInfo(domain, &info);
4640
    if (ret == 0 && info.state == VIR_DOMAIN_PAUSED)
4641 4642
        flags |= VIR_MIGRATE_PAUSED;

4643 4644
    destflags = flags & ~(VIR_MIGRATE_ABORT_ON_ERROR |
                          VIR_MIGRATE_AUTO_CONVERGE);
4645 4646

    VIR_DEBUG("Prepare2 %p flags=%lx", dconn, destflags);
4647
    ret = dconn->driver->domainMigratePrepare2
4648
        (dconn, &cookie, &cookielen, uri, &uri_out, destflags, dname,
4649
         bandwidth, dom_xml);
4650
    VIR_FREE(dom_xml);
4651 4652 4653 4654
    if (ret == -1)
        goto done;

    if (uri == NULL && uri_out == NULL) {
4655 4656
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("domainMigratePrepare2 did not set uri"));
4657
        cancelled = 1;
4658 4659
        /* Make sure Finish doesn't overwrite the error */
        orig_err = virSaveLastError();
4660
        goto finish;
4661 4662 4663 4664 4665 4666 4667
    }
    if (uri_out)
        uri = uri_out; /* Did domainMigratePrepare2 change URI? */

    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete.
     */
4668
    VIR_DEBUG("Perform %p", domain->conn);
4669 4670 4671
    ret = domain->conn->driver->domainMigratePerform
        (domain, cookie, cookielen, uri, flags, dname, bandwidth);

4672 4673 4674 4675
    /* Perform failed. Make sure Finish doesn't overwrite the error */
    if (ret < 0)
        orig_err = virSaveLastError();

4676 4677 4678 4679 4680
    /* If Perform returns < 0, then we need to cancel the VM
     * startup on the destination
     */
    cancelled = ret < 0 ? 1 : 0;

4681
 finish:
4682 4683 4684 4685 4686
    /* In version 2 of the migration protocol, we pass the
     * status code from the sender to the destination host,
     * so it can do any cleanup if the migration failed.
     */
    dname = dname ? dname : domain->name;
4687
    VIR_DEBUG("Finish2 %p ret=%d", dconn, ret);
4688
    ddomain = dconn->driver->domainMigrateFinish2
4689
        (dconn, dname, cookie, cookielen, uri, destflags, cancelled);
4690 4691
    if (cancelled && ddomain)
        VIR_ERROR(_("finish step ignored that migration was cancelled"));
4692

4693
 done:
4694 4695 4696 4697
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
4698 4699
    VIR_FREE(uri_out);
    VIR_FREE(cookie);
4700 4701 4702
    return ddomain;
}

4703

4704 4705 4706 4707 4708 4709 4710 4711 4712 4713 4714 4715 4716 4717 4718 4719 4720 4721 4722 4723 4724 4725 4726
/*
 * Sequence v3:
 *
 *  Src: Begin
 *        - Generate XML to pass to dst
 *        - Generate optional cookie to pass to dst
 *
 *  Dst: Prepare
 *        - Get ready to accept incoming VM
 *        - Generate optional cookie to pass to src
 *
 *  Src: Perform
 *        - Start migration and wait for send completion
 *        - Generate optional cookie to pass to dst
 *
 *  Dst: Finish
 *        - Wait for recv completion and check status
 *        - Kill off VM if failed, resume if success
 *        - Generate optional cookie to pass to src
 *
 *  Src: Confirm
 *        - Kill off VM if success, resume if failed
 *
4727 4728 4729 4730
  * If useParams is true, params and nparams contain migration parameters and
  * we know it's safe to call the API which supports extensible parameters.
  * Otherwise, we have to use xmlin, dname, uri, and bandwidth and pass them
  * to the old-style APIs.
4731 4732
 */
static virDomainPtr
4733 4734 4735 4736 4737 4738 4739 4740 4741 4742
virDomainMigrateVersion3Full(virDomainPtr domain,
                             virConnectPtr dconn,
                             const char *xmlin,
                             const char *dname,
                             const char *uri,
                             unsigned long long bandwidth,
                             virTypedParameterPtr params,
                             int nparams,
                             bool useParams,
                             unsigned int flags)
4743 4744 4745 4746 4747 4748 4749 4750 4751 4752 4753
{
    virDomainPtr ddomain = NULL;
    char *uri_out = NULL;
    char *cookiein = NULL;
    char *cookieout = NULL;
    char *dom_xml = NULL;
    int cookieinlen = 0;
    int cookieoutlen = 0;
    int ret;
    virDomainInfo info;
    virErrorPtr orig_err = NULL;
4754 4755
    int cancelled = 1;
    unsigned long protection = 0;
4756
    bool notify_source = true;
4757
    unsigned int destflags;
4758 4759
    int state;
    virTypedParameterPtr tmp;
4760

4761 4762 4763 4764 4765 4766
    VIR_DOMAIN_DEBUG(domain,
                     "dconn=%p, xmlin=%s, dname=%s, uri=%s, bandwidth=%llu, "
                     "params=%p, nparams=%d, useParams=%d, flags=%x",
                     dconn, NULLSTR(xmlin), NULLSTR(dname), NULLSTR(uri),
                     bandwidth, params, nparams, useParams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
4767

4768 4769 4770 4771 4772 4773 4774 4775 4776 4777 4778 4779
    if ((!useParams &&
         (!domain->conn->driver->domainMigrateBegin3 ||
          !domain->conn->driver->domainMigratePerform3 ||
          !domain->conn->driver->domainMigrateConfirm3 ||
          !dconn->driver->domainMigratePrepare3 ||
          !dconn->driver->domainMigrateFinish3)) ||
        (useParams &&
         (!domain->conn->driver->domainMigrateBegin3Params ||
          !domain->conn->driver->domainMigratePerform3Params ||
          !domain->conn->driver->domainMigrateConfirm3Params ||
          !dconn->driver->domainMigratePrepare3Params ||
          !dconn->driver->domainMigrateFinish3Params))) {
4780
        virReportUnsupportedError();
4781 4782 4783
        return NULL;
    }

4784 4785 4786 4787
    if (virTypedParamsCopy(&tmp, params, nparams) < 0)
        return NULL;
    params = tmp;

4788 4789 4790 4791
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION))
        protection = VIR_MIGRATE_CHANGE_PROTECTION;

4792
    VIR_DEBUG("Begin3 %p", domain->conn);
4793 4794 4795 4796 4797 4798 4799 4800 4801
    if (useParams) {
        dom_xml = domain->conn->driver->domainMigrateBegin3Params
            (domain, params, nparams, &cookieout, &cookieoutlen,
             flags | protection);
    } else {
        dom_xml = domain->conn->driver->domainMigrateBegin3
            (domain, xmlin, &cookieout, &cookieoutlen,
             flags | protection, dname, bandwidth);
    }
4802 4803 4804
    if (!dom_xml)
        goto done;

4805 4806 4807 4808 4809 4810 4811
    if (useParams) {
        /* If source is new enough to support extensible migration parameters,
         * it's certainly new enough to support virDomainGetState. */
        ret = virDomainGetState(domain, &state, NULL, 0);
    } else {
        ret = virDomainGetInfo(domain, &info);
        state = info.state;
4812
    }
4813 4814
    if (ret == 0 && state == VIR_DOMAIN_PAUSED)
        flags |= VIR_MIGRATE_PAUSED;
4815

4816 4817
    destflags = flags & ~(VIR_MIGRATE_ABORT_ON_ERROR |
                          VIR_MIGRATE_AUTO_CONVERGE);
4818 4819

    VIR_DEBUG("Prepare3 %p flags=%x", dconn, destflags);
4820 4821 4822 4823
    cookiein = cookieout;
    cookieinlen = cookieoutlen;
    cookieout = NULL;
    cookieoutlen = 0;
4824 4825 4826 4827 4828 4829 4830 4831 4832 4833 4834 4835 4836
    if (useParams) {
        if (virTypedParamsReplaceString(&params, &nparams,
                                        VIR_MIGRATE_PARAM_DEST_XML,
                                        dom_xml) < 0)
            goto done;
        ret = dconn->driver->domainMigratePrepare3Params
            (dconn, params, nparams, cookiein, cookieinlen,
             &cookieout, &cookieoutlen, &uri_out, destflags);
    } else {
        ret = dconn->driver->domainMigratePrepare3
            (dconn, cookiein, cookieinlen, &cookieout, &cookieoutlen,
             uri, &uri_out, destflags, dname, bandwidth, dom_xml);
    }
4837 4838 4839 4840 4841 4842 4843 4844 4845 4846 4847
    if (ret == -1) {
        if (protection) {
            /* Begin already started a migration job so we need to cancel it by
             * calling Confirm while making sure it doesn't overwrite the error
             */
            orig_err = virSaveLastError();
            goto confirm;
        } else {
            goto done;
        }
    }
4848

4849 4850 4851 4852 4853 4854
    /* Did domainMigratePrepare3 change URI? */
    if (uri_out) {
        uri = uri_out;
        if (useParams &&
            virTypedParamsReplaceString(&params, &nparams,
                                        VIR_MIGRATE_PARAM_URI,
4855 4856 4857
                                        uri_out) < 0) {
            cancelled = 1;
            orig_err = virSaveLastError();
4858
            goto finish;
4859
        }
4860 4861 4862
    } else if (!uri &&
               virTypedParamsGetString(params, nparams,
                                       VIR_MIGRATE_PARAM_URI, &uri) <= 0) {
4863 4864
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("domainMigratePrepare3 did not set uri"));
4865 4866 4867
        cancelled = 1;
        orig_err = virSaveLastError();
        goto finish;
4868 4869
    }

L
liguang 已提交
4870 4871 4872 4873 4874 4875 4876 4877
    if (flags & VIR_MIGRATE_OFFLINE) {
        VIR_DEBUG("Offline migration, skipping Perform phase");
        VIR_FREE(cookieout);
        cookieoutlen = 0;
        cancelled = 0;
        goto finish;
    }

4878 4879 4880 4881 4882 4883 4884 4885 4886 4887 4888
    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete. The src VM should remain
     * running, but in paused state until the destination can
     * confirm migration completion.
     */
    VIR_DEBUG("Perform3 %p uri=%s", domain->conn, uri);
    VIR_FREE(cookiein);
    cookiein = cookieout;
    cookieinlen = cookieoutlen;
    cookieout = NULL;
    cookieoutlen = 0;
4889
    /* dconnuri not relevant in non-P2P modes, so left NULL here */
4890 4891 4892 4893 4894 4895 4896 4897 4898 4899
    if (useParams) {
        ret = domain->conn->driver->domainMigratePerform3Params
            (domain, NULL, params, nparams, cookiein, cookieinlen,
             &cookieout, &cookieoutlen, flags | protection);
    } else {
        ret = domain->conn->driver->domainMigratePerform3
            (domain, NULL, cookiein, cookieinlen,
             &cookieout, &cookieoutlen, NULL,
             uri, flags | protection, dname, bandwidth);
    }
4900 4901

    /* Perform failed. Make sure Finish doesn't overwrite the error */
4902
    if (ret < 0) {
4903
        orig_err = virSaveLastError();
4904 4905 4906 4907 4908
        /* Perform failed so we don't need to call confirm to let source know
         * about the failure.
         */
        notify_source = false;
    }
4909 4910 4911 4912 4913 4914

    /* If Perform returns < 0, then we need to cancel the VM
     * startup on the destination
     */
    cancelled = ret < 0 ? 1 : 0;

4915
 finish:
4916 4917 4918 4919 4920 4921 4922 4923 4924 4925 4926 4927
    /*
     * The status code from the source is passed to the destination.
     * The dest can cleanup if the source indicated it failed to
     * send all migration data. Returns NULL for ddomain if
     * the dest was unable to complete migration.
     */
    VIR_DEBUG("Finish3 %p ret=%d", dconn, ret);
    VIR_FREE(cookiein);
    cookiein = cookieout;
    cookieinlen = cookieoutlen;
    cookieout = NULL;
    cookieoutlen = 0;
4928 4929 4930 4931 4932 4933
    if (useParams) {
        if (virTypedParamsGetString(params, nparams,
                                    VIR_MIGRATE_PARAM_DEST_NAME, NULL) <= 0 &&
            virTypedParamsReplaceString(&params, &nparams,
                                        VIR_MIGRATE_PARAM_DEST_NAME,
                                        domain->name) < 0) {
4934
            ddomain = NULL;
4935 4936 4937 4938 4939 4940 4941 4942 4943 4944 4945
        } else {
            ddomain = dconn->driver->domainMigrateFinish3Params
                (dconn, params, nparams, cookiein, cookieinlen,
                 &cookieout, &cookieoutlen, destflags, cancelled);
        }
    } else {
        dname = dname ? dname : domain->name;
        ddomain = dconn->driver->domainMigrateFinish3
            (dconn, dname, cookiein, cookieinlen, &cookieout, &cookieoutlen,
             NULL, uri, destflags, cancelled);
    }
4946 4947
    if (cancelled && ddomain)
        VIR_ERROR(_("finish step ignored that migration was cancelled"));
4948 4949 4950 4951 4952 4953 4954 4955

    /* If ddomain is NULL, then we were unable to start
     * the guest on the target, and must restart on the
     * source. There is a small chance that the ddomain
     * is NULL due to an RPC failure, in which case
     * ddomain could in fact be running on the dest.
     * The lock manager plugins should take care of
     * safety in this scenario.
4956
     */
4957
    cancelled = ddomain == NULL ? 1 : 0;
4958

4959 4960 4961 4962 4963 4964
    /* If finish3 set an error, and we don't have an earlier
     * one we need to preserve it in case confirm3 overwrites
     */
    if (!orig_err)
        orig_err = virSaveLastError();

4965
 confirm:
4966
    /*
4967 4968 4969
     * If cancelled, then src VM will be restarted, else it will be killed.
     * Don't do this if migration failed on source and thus it was already
     * cancelled there.
4970
     */
4971 4972 4973 4974 4975 4976 4977
    if (notify_source) {
        VIR_DEBUG("Confirm3 %p ret=%d domain=%p", domain->conn, ret, domain);
        VIR_FREE(cookiein);
        cookiein = cookieout;
        cookieinlen = cookieoutlen;
        cookieout = NULL;
        cookieoutlen = 0;
4978 4979 4980 4981 4982 4983 4984 4985 4986
        if (useParams) {
            ret = domain->conn->driver->domainMigrateConfirm3Params
                (domain, params, nparams, cookiein, cookieinlen,
                 flags | protection, cancelled);
        } else {
            ret = domain->conn->driver->domainMigrateConfirm3
                (domain, cookiein, cookieinlen,
                 flags | protection, cancelled);
        }
4987 4988 4989 4990 4991 4992 4993 4994 4995
        /* If Confirm3 returns -1, there's nothing more we can
         * do, but fortunately worst case is that there is a
         * domain left in 'paused' state on source.
         */
        if (ret < 0) {
            VIR_WARN("Guest %s probably left in 'paused' state on source",
                     domain->name);
        }
    }
4996

4997
 done:
4998 4999 5000 5001
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
5002
    VIR_FREE(dom_xml);
5003 5004 5005
    VIR_FREE(uri_out);
    VIR_FREE(cookiein);
    VIR_FREE(cookieout);
5006
    virTypedParamsFree(params, nparams);
5007 5008 5009
    return ddomain;
}

5010

5011 5012 5013 5014 5015 5016 5017 5018 5019 5020 5021 5022 5023
static virDomainPtr
virDomainMigrateVersion3(virDomainPtr domain,
                         virConnectPtr dconn,
                         const char *xmlin,
                         unsigned long flags,
                         const char *dname,
                         const char *uri,
                         unsigned long bandwidth)
{
    return virDomainMigrateVersion3Full(domain, dconn, xmlin, dname, uri,
                                        bandwidth, NULL, 0, false, flags);
}

5024

J
Jiri Denemark 已提交
5025 5026 5027 5028 5029 5030 5031 5032 5033 5034 5035
static virDomainPtr
virDomainMigrateVersion3Params(virDomainPtr domain,
                               virConnectPtr dconn,
                               virTypedParameterPtr params,
                               int nparams,
                               unsigned int flags)
{
    return virDomainMigrateVersion3Full(domain, dconn, NULL, NULL, NULL, 0,
                                        params, nparams, true, flags);
}

5036

5037 5038 5039 5040 5041 5042 5043 5044 5045 5046 5047 5048 5049 5050
/*
 * In normal migration, the libvirt client co-ordinates communication
 * between the 2 libvirtd instances on source & dest hosts.
 *
 * In this peer-2-peer migration alternative, the libvirt client
 * only talks to the source libvirtd instance. The source libvirtd
 * then opens its own connection to the destination and co-ordinates
 * migration itself.
 *
 * If useParams is true, params and nparams contain migration parameters and
 * we know it's safe to call the API which supports extensible parameters.
 * Otherwise, we have to use xmlin, dname, uri, and bandwidth and pass them
 * to the old-style APIs.
 */
5051
static int
5052 5053 5054 5055 5056 5057 5058 5059 5060 5061
virDomainMigratePeer2PeerFull(virDomainPtr domain,
                              const char *dconnuri,
                              const char *xmlin,
                              const char *dname,
                              const char *uri,
                              unsigned long long bandwidth,
                              virTypedParameterPtr params,
                              int nparams,
                              bool useParams,
                              unsigned int flags)
5062
{
M
Martin Kletzander 已提交
5063
    virURIPtr tempuri = NULL;
5064

5065 5066 5067 5068 5069 5070
    VIR_DOMAIN_DEBUG(domain,
                     "dconnuri=%s, xmlin=%s, dname=%s, uri=%s, bandwidth=%llu "
                     "params=%p, nparams=%d, useParams=%d, flags=%x",
                     dconnuri, NULLSTR(xmlin), NULLSTR(dname), NULLSTR(uri),
                     bandwidth, params, nparams, useParams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
5071

5072 5073 5074 5075
    if ((useParams && !domain->conn->driver->domainMigratePerform3Params) ||
        (!useParams &&
         !domain->conn->driver->domainMigratePerform &&
         !domain->conn->driver->domainMigratePerform3)) {
5076
        virReportUnsupportedError();
5077 5078 5079
        return -1;
    }

5080
    if (!(tempuri = virURIParse(dconnuri)))
5081
        return -1;
5082
    if (!tempuri->server || STRPREFIX(tempuri->server, "localhost")) {
5083 5084 5085
        virReportInvalidArg(dconnuri,
                            _("unable to parse server from dconnuri in %s"),
                            __FUNCTION__);
5086
        virURIFree(tempuri);
5087 5088
        return -1;
    }
5089
    virURIFree(tempuri);
5090

5091 5092 5093 5094 5095 5096 5097
    if (useParams) {
        VIR_DEBUG("Using migration protocol 3 with extensible parameters");
        return domain->conn->driver->domainMigratePerform3Params
                (domain, dconnuri, params, nparams,
                 NULL, 0, NULL, NULL, flags);
    } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                        VIR_DRV_FEATURE_MIGRATION_V3)) {
5098
        VIR_DEBUG("Using migration protocol 3");
5099 5100 5101
        return domain->conn->driver->domainMigratePerform3
                (domain, xmlin, NULL, 0, NULL, NULL, dconnuri,
                 uri, flags, dname, bandwidth);
5102 5103
    } else {
        VIR_DEBUG("Using migration protocol 2");
5104
        if (xmlin) {
5105 5106 5107
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during "
                             "migration"));
5108 5109
            return -1;
        }
5110
        if (uri) {
5111 5112
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unable to override peer2peer migration URI"));
5113 5114
            return -1;
        }
5115 5116
        return domain->conn->driver->domainMigratePerform
                (domain, NULL, 0, dconnuri, flags, dname, bandwidth);
5117
    }
5118 5119
}

5120

5121 5122 5123 5124 5125 5126 5127 5128 5129 5130 5131 5132 5133
static int
virDomainMigratePeer2Peer(virDomainPtr domain,
                          const char *xmlin,
                          unsigned long flags,
                          const char *dname,
                          const char *dconnuri,
                          const char *uri,
                          unsigned long bandwidth)
{
    return virDomainMigratePeer2PeerFull(domain, dconnuri, xmlin, dname, uri,
                                         bandwidth, NULL, 0, false, flags);
}

5134

J
Jiri Denemark 已提交
5135 5136 5137 5138 5139 5140 5141 5142 5143 5144 5145
static int
virDomainMigratePeer2PeerParams(virDomainPtr domain,
                                const char *dconnuri,
                                virTypedParameterPtr params,
                                int nparams,
                                unsigned int flags)
{
    return virDomainMigratePeer2PeerFull(domain, dconnuri, NULL, NULL, NULL, 0,
                                         params, nparams, true, flags);
}

5146

C
Chris Lalancette 已提交
5147
/*
5148
 * In normal migration, the libvirt client co-ordinates communication
5149
 * between the 2 libvirtd instances on source & dest hosts.
C
Chris Lalancette 已提交
5150
 *
5151 5152 5153
 * Some hypervisors support an alternative, direct migration where
 * there is no requirement for a libvirtd instance on the dest host.
 * In this case
5154
 *
5155 5156
 * eg, XenD can talk direct to XenD, so libvirtd on dest does not
 * need to be involved at all, or even running
C
Chris Lalancette 已提交
5157
 */
5158
static int
5159 5160 5161 5162 5163 5164
virDomainMigrateDirect(virDomainPtr domain,
                       const char *xmlin,
                       unsigned long flags,
                       const char *dname,
                       const char *uri,
                       unsigned long bandwidth)
5165
{
5166 5167 5168 5169
    VIR_DOMAIN_DEBUG(domain,
                     "xmlin=%s, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
                     NULLSTR(xmlin), flags, NULLSTR(dname), NULLSTR(uri),
                     bandwidth);
5170

5171
    if (!domain->conn->driver->domainMigratePerform) {
5172
        virReportUnsupportedError();
5173 5174 5175
        return -1;
    }

C
Chris Lalancette 已提交
5176 5177 5178
    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete.
     */
5179 5180 5181
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATION_V3)) {
        VIR_DEBUG("Using migration protocol 3");
5182 5183
        /* dconn URI not relevant in direct migration, since no
         * target libvirtd is involved */
5184
        return domain->conn->driver->domainMigratePerform3(domain,
5185
                                                           xmlin,
5186 5187 5188 5189
                                                           NULL, /* cookiein */
                                                           0,    /* cookieinlen */
                                                           NULL, /* cookieoutlen */
                                                           NULL, /* cookieoutlen */
5190
                                                           NULL, /* dconnuri */
5191 5192 5193 5194 5195 5196
                                                           uri,
                                                           flags,
                                                           dname,
                                                           bandwidth);
    } else {
        VIR_DEBUG("Using migration protocol 2");
5197
        if (xmlin) {
5198 5199
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during migration"));
5200 5201
            return -1;
        }
5202 5203 5204 5205 5206 5207 5208 5209
        return domain->conn->driver->domainMigratePerform(domain,
                                                          NULL, /* cookie */
                                                          0,    /* cookielen */
                                                          uri,
                                                          flags,
                                                          dname,
                                                          bandwidth);
    }
C
Chris Lalancette 已提交
5210 5211
}

5212

5213 5214 5215 5216
/**
 * virDomainMigrate:
 * @domain: a domain object
 * @dconn: destination host (a connection object)
5217
 * @flags: bitwise-OR of virDomainMigrateFlags
5218 5219
 * @dname: (optional) rename domain to this at destination
 * @uri: (optional) dest hostname/URI as seen from the source host
5220
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5221 5222 5223 5224 5225
 *
 * Migrate the domain object from its current host to the destination
 * host given by dconn (a connection to the destination host).
 *
 * Flags may be one of more of the following:
5226 5227 5228
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
C
Chris Lalancette 已提交
5229 5230 5231 5232
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
5233
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
5234 5235 5236 5237
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
5238 5239 5240
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
5241
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
5242
 *   VIR_MIGRATE_OFFLINE Migrate offline
5243 5244 5245 5246 5247
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 * Applications using the VIR_MIGRATE_PEER2PEER flag will probably
 * prefer to invoke virDomainMigrateToURI, avoiding the need to
 * open connection to the destination host themselves.
5248 5249 5250 5251 5252 5253
 *
 * If a hypervisor supports renaming domains during migration,
 * then you may set the dname parameter to the new name (otherwise
 * it keeps the same name).  If this is not supported by the
 * hypervisor, dname must be NULL or else you will get an error.
 *
5254 5255 5256 5257 5258 5259 5260 5261 5262 5263 5264
 * If the VIR_MIGRATE_PEER2PEER flag is set, the uri parameter
 * must be a valid libvirt connection URI, by which the source
 * libvirt driver can connect to the destination libvirt. If
 * omitted, the dconn connection object will be queried for its
 * current URI.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, the URI parameter
 * takes a hypervisor specific format. The hypervisor capabilities
 * XML includes details of the support URI schemes. If omitted
 * the dconn will be asked for a default URI.
 *
5265 5266 5267 5268
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
5269
 * In either case it is typically only necessary to specify a
5270 5271
 * URI if the destination host has multiple interfaces and a
 * specific interface is required to transmit migration data.
5272
 *
5273
 * The maximum bandwidth (in MiB/s) that will be used to do migration
5274 5275 5276 5277 5278 5279 5280 5281 5282 5283 5284 5285 5286 5287 5288 5289 5290 5291
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns the new domain object if the migration was successful,
 *   or NULL in case of error.  Note that the new domain object
 *   exists in the scope of the destination connection (dconn).
 */
virDomainPtr
5292 5293 5294 5295 5296 5297
virDomainMigrate(virDomainPtr domain,
                 virConnectPtr dconn,
                 unsigned long flags,
                 const char *dname,
                 const char *uri,
                 unsigned long bandwidth)
5298 5299
{
    virDomainPtr ddomain = NULL;
5300

5301 5302
    VIR_DOMAIN_DEBUG(domain,
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
5303
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);
5304

5305 5306
    virResetLastError();

5307
    /* First checkout the source */
5308
    virCheckDomainReturn(domain, NULL);
5309
    virCheckReadOnlyGoto(domain->conn->flags, error);
5310

5311
    /* Now checkout the destination */
5312
    virCheckConnectGoto(dconn, error);
5313
    virCheckReadOnlyGoto(dconn->flags, error);
5314

5315 5316 5317 5318 5319 5320 5321 5322 5323
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

L
liguang 已提交
5324 5325 5326
    if (flags & VIR_MIGRATE_OFFLINE) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5327 5328 5329
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the source host"));
L
liguang 已提交
5330 5331 5332 5333
            goto error;
        }
        if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5334 5335 5336
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the destination host"));
L
liguang 已提交
5337 5338 5339 5340
            goto error;
        }
    }

5341
    if (flags & VIR_MIGRATE_PEER2PEER) {
5342 5343
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
5344 5345 5346
            char *dstURI = NULL;
            if (uri == NULL) {
                dstURI = virConnectGetURI(dconn);
5347
                if (!dstURI)
5348 5349
                    return NULL;
            }
5350

5351
            VIR_DEBUG("Using peer2peer migration");
5352
            if (virDomainMigratePeer2Peer(domain, NULL, flags, dname,
5353
                                          uri ? uri : dstURI, NULL, bandwidth) < 0) {
5354 5355 5356 5357
                VIR_FREE(dstURI);
                goto error;
            }
            VIR_FREE(dstURI);
C
Chris Lalancette 已提交
5358

5359
            ddomain = virDomainLookupByName(dconn, dname ? dname : domain->name);
5360 5361
        } else {
            /* This driver does not support peer to peer migration */
5362
            virReportUnsupportedError();
5363 5364
            goto error;
        }
5365
    } else {
5366 5367 5368 5369 5370 5371 5372 5373
        /* Change protection requires support only on source side, and
         * is only needed in v3 migration, which automatically re-adds
         * the flag for just the source side.  We mask it out for
         * non-peer2peer to allow migration from newer source to an
         * older destination that rejects the flag.  */
        if (flags & VIR_MIGRATE_CHANGE_PROTECTION &&
            !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION)) {
5374 5375
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("cannot enforce change protection"));
5376 5377 5378
            goto error;
        }
        flags &= ~VIR_MIGRATE_CHANGE_PROTECTION;
5379
        if (flags & VIR_MIGRATE_TUNNELLED) {
5380 5381
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("cannot perform tunnelled migration without using peer2peer flag"));
5382 5383 5384
            goto error;
        }

C
Chris Lalancette 已提交
5385 5386
        /* Check that migration is supported by both drivers. */
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
5387
                                     VIR_DRV_FEATURE_MIGRATION_V3) &&
C
Chris Lalancette 已提交
5388
            VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
5389 5390
                                     VIR_DRV_FEATURE_MIGRATION_V3)) {
            VIR_DEBUG("Using migration protocol 3");
5391 5392
            ddomain = virDomainMigrateVersion3(domain, dconn, NULL,
                                               flags, dname, uri, bandwidth);
5393 5394 5395 5396 5397
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V2) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                          VIR_DRV_FEATURE_MIGRATION_V2)) {
            VIR_DEBUG("Using migration protocol 2");
5398 5399
            ddomain = virDomainMigrateVersion2(domain, dconn, flags,
                                               dname, uri, bandwidth);
5400 5401 5402 5403 5404
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V1) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                            VIR_DRV_FEATURE_MIGRATION_V1)) {
            VIR_DEBUG("Using migration protocol 1");
5405 5406 5407 5408
            ddomain = virDomainMigrateVersion1(domain, dconn, flags,
                                               dname, uri, bandwidth);
        } else {
            /* This driver does not support any migration method */
5409
            virReportUnsupportedError();
5410 5411 5412 5413 5414 5415 5416 5417 5418
            goto error;
        }
    }

    if (ddomain == NULL)
        goto error;

    return ddomain;

5419
 error:
5420 5421 5422 5423 5424 5425 5426 5427 5428
    virDispatchError(domain->conn);
    return NULL;
}


/**
 * virDomainMigrate2:
 * @domain: a domain object
 * @dconn: destination host (a connection object)
5429
 * @flags: bitwise-OR of virDomainMigrateFlags
5430 5431 5432
 * @dxml: (optional) XML config for launching guest on target
 * @dname: (optional) rename domain to this at destination
 * @uri: (optional) dest hostname/URI as seen from the source host
5433
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5434 5435 5436 5437 5438 5439 5440 5441 5442 5443 5444 5445 5446
 *
 * Migrate the domain object from its current host to the destination
 * host given by dconn (a connection to the destination host).
 *
 * Flags may be one of more of the following:
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
5447 5448 5449 5450
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
5451 5452 5453
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
5454
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
5455
 *   VIR_MIGRATE_OFFLINE Migrate offline
5456 5457 5458 5459 5460 5461 5462 5463 5464 5465 5466 5467 5468 5469 5470 5471 5472 5473 5474 5475 5476 5477
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 * Applications using the VIR_MIGRATE_PEER2PEER flag will probably
 * prefer to invoke virDomainMigrateToURI, avoiding the need to
 * open connection to the destination host themselves.
 *
 * If a hypervisor supports renaming domains during migration,
 * then you may set the dname parameter to the new name (otherwise
 * it keeps the same name).  If this is not supported by the
 * hypervisor, dname must be NULL or else you will get an error.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is set, the uri parameter
 * must be a valid libvirt connection URI, by which the source
 * libvirt driver can connect to the destination libvirt. If
 * omitted, the dconn connection object will be queried for its
 * current URI.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, the URI parameter
 * takes a hypervisor specific format. The hypervisor capabilities
 * XML includes details of the support URI schemes. If omitted
 * the dconn will be asked for a default URI.
 *
5478 5479 5480 5481
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
5482 5483 5484 5485
 * In either case it is typically only necessary to specify a
 * URI if the destination host has multiple interfaces and a
 * specific interface is required to transmit migration data.
 *
5486
 * The maximum bandwidth (in MiB/s) that will be used to do migration
5487 5488 5489 5490 5491 5492 5493 5494 5495 5496 5497 5498 5499
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
5500 5501 5502 5503 5504 5505 5506 5507
 * If the hypervisor supports it, @dxml can be used to alter
 * host-specific portions of the domain XML that will be used on
 * the destination.  For example, it is possible to alter the
 * backing filename that is associated with a disk device, in order
 * to account for naming differences between source and destination
 * in accessing the underlying storage.  The migration will fail
 * if @dxml would cause any guest-visible changes.  Pass NULL
 * if no changes are needed to the XML between source and destination.
5508
 * @dxml cannot be used to rename the domain during migration (use
5509 5510
 * @dname for that purpose).  Domain name in @dxml must match the
 * original domain name.
5511
 *
5512 5513 5514 5515 5516 5517 5518 5519 5520 5521 5522 5523 5524 5525 5526
 * Returns the new domain object if the migration was successful,
 *   or NULL in case of error.  Note that the new domain object
 *   exists in the scope of the destination connection (dconn).
 */
virDomainPtr
virDomainMigrate2(virDomainPtr domain,
                  virConnectPtr dconn,
                  const char *dxml,
                  unsigned long flags,
                  const char *dname,
                  const char *uri,
                  unsigned long bandwidth)
{
    virDomainPtr ddomain = NULL;

5527 5528
    VIR_DOMAIN_DEBUG(domain,
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
5529 5530 5531 5532 5533
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);

    virResetLastError();

    /* First checkout the source */
5534
    virCheckDomainReturn(domain, NULL);
5535
    virCheckReadOnlyGoto(domain->conn->flags, error);
5536 5537

    /* Now checkout the destination */
5538
    virCheckConnectGoto(dconn, error);
5539
    virCheckReadOnlyGoto(dconn->flags, error);
5540

5541 5542 5543 5544 5545 5546 5547 5548 5549
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

L
liguang 已提交
5550 5551 5552
    if (flags & VIR_MIGRATE_OFFLINE) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5553 5554 5555
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the source host"));
L
liguang 已提交
5556 5557 5558 5559
            goto error;
        }
        if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5560 5561 5562
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the destination host"));
L
liguang 已提交
5563 5564 5565 5566
            goto error;
        }
    }

5567
    if (flags & VIR_MIGRATE_PEER2PEER) {
5568 5569
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
5570 5571 5572 5573 5574 5575 5576 5577 5578 5579 5580 5581
            char *dstURI = virConnectGetURI(dconn);
            if (!dstURI)
                return NULL;

            VIR_DEBUG("Using peer2peer migration");
            if (virDomainMigratePeer2Peer(domain, dxml, flags, dname,
                                          dstURI, uri, bandwidth) < 0) {
                VIR_FREE(dstURI);
                goto error;
            }
            VIR_FREE(dstURI);

5582
            ddomain = virDomainLookupByName(dconn, dname ? dname : domain->name);
5583 5584
        } else {
            /* This driver does not support peer to peer migration */
5585
            virReportUnsupportedError();
5586 5587 5588
            goto error;
        }
    } else {
5589 5590 5591 5592 5593 5594 5595 5596
        /* Change protection requires support only on source side, and
         * is only needed in v3 migration, which automatically re-adds
         * the flag for just the source side.  We mask it out for
         * non-peer2peer to allow migration from newer source to an
         * older destination that rejects the flag.  */
        if (flags & VIR_MIGRATE_CHANGE_PROTECTION &&
            !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION)) {
5597 5598
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("cannot enforce change protection"));
5599 5600 5601
            goto error;
        }
        flags &= ~VIR_MIGRATE_CHANGE_PROTECTION;
5602
        if (flags & VIR_MIGRATE_TUNNELLED) {
5603 5604
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("cannot perform tunnelled migration without using peer2peer flag"));
5605 5606 5607 5608 5609 5610 5611 5612 5613 5614 5615 5616 5617 5618 5619 5620 5621
            goto error;
        }

        /* Check that migration is supported by both drivers. */
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_V3) &&
            VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                     VIR_DRV_FEATURE_MIGRATION_V3)) {
            VIR_DEBUG("Using migration protocol 3");
            ddomain = virDomainMigrateVersion3(domain, dconn, dxml,
                                               flags, dname, uri, bandwidth);
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V2) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                          VIR_DRV_FEATURE_MIGRATION_V2)) {
            VIR_DEBUG("Using migration protocol 2");
            if (dxml) {
5622 5623
                virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                               _("Unable to change target guest XML during migration"));
5624 5625 5626 5627 5628 5629 5630 5631 5632 5633
                goto error;
            }
            ddomain = virDomainMigrateVersion2(domain, dconn, flags,
                                               dname, uri, bandwidth);
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V1) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                            VIR_DRV_FEATURE_MIGRATION_V1)) {
            VIR_DEBUG("Using migration protocol 1");
            if (dxml) {
5634 5635
                virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                               _("Unable to change target guest XML during migration"));
5636 5637 5638 5639
                goto error;
            }
            ddomain = virDomainMigrateVersion1(domain, dconn, flags,
                                               dname, uri, bandwidth);
5640
        } else {
5641
            /* This driver does not support any migration method */
5642
            virReportUnsupportedError();
C
Chris Lalancette 已提交
5643 5644
            goto error;
        }
5645 5646
    }

5647 5648
    if (ddomain == NULL)
        goto error;
D
Daniel Veillard 已提交
5649

5650
    return ddomain;
5651

5652
 error:
5653
    virDispatchError(domain->conn);
5654
    return NULL;
5655 5656
}

5657

J
Jiri Denemark 已提交
5658 5659 5660 5661 5662 5663 5664 5665 5666 5667 5668 5669 5670 5671 5672 5673 5674 5675 5676 5677 5678 5679 5680 5681 5682 5683 5684 5685 5686 5687 5688 5689 5690 5691 5692 5693 5694 5695 5696 5697 5698 5699 5700 5701 5702 5703 5704 5705 5706 5707 5708 5709 5710
/**
 * virDomainMigrate3:
 * @domain: a domain object
 * @dconn: destination host (a connection object)
 * @params: (optional) migration parameters
 * @nparams: (optional) number of migration parameters in @params
 * @flags: bitwise-OR of virDomainMigrateFlags
 *
 * Migrate the domain object from its current host to the destination host
 * given by dconn (a connection to the destination host).
 *
 * See virDomainMigrateFlags documentation for description of individual flags.
 *
 * VIR_MIGRATE_TUNNELLED and VIR_MIGRATE_PEER2PEER are not supported by this
 * API, use virDomainMigrateToURI3 instead.
 *
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns the new domain object if the migration was successful,
 *   or NULL in case of error.  Note that the new domain object
 *   exists in the scope of the destination connection (dconn).
 */
virDomainPtr
virDomainMigrate3(virDomainPtr domain,
                  virConnectPtr dconn,
                  virTypedParameterPtr params,
                  unsigned int nparams,
                  unsigned int flags)
{
    virDomainPtr ddomain = NULL;
    const char *compatParams[] = { VIR_MIGRATE_PARAM_URI,
                                   VIR_MIGRATE_PARAM_DEST_NAME,
                                   VIR_MIGRATE_PARAM_DEST_XML,
                                   VIR_MIGRATE_PARAM_BANDWIDTH };
    const char *uri = NULL;
    const char *dname = NULL;
    const char *dxml = NULL;
    unsigned long long bandwidth = 0;

    VIR_DOMAIN_DEBUG(domain, "dconn=%p, params=%p, nparms=%u flags=%x",
                     dconn, params, nparams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

    /* First checkout the source */
5711
    virCheckDomainReturn(domain, NULL);
5712
    virCheckReadOnlyGoto(domain->conn->flags, error);
J
Jiri Denemark 已提交
5713 5714

    /* Now checkout the destination */
5715
    virCheckConnectGoto(dconn, error);
5716
    virCheckReadOnlyGoto(dconn->flags, error);
J
Jiri Denemark 已提交
5717 5718 5719 5720 5721 5722 5723 5724 5725 5726 5727 5728 5729 5730 5731 5732 5733 5734 5735

    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }
    if (flags & (VIR_MIGRATE_PEER2PEER | VIR_MIGRATE_TUNNELLED)) {
        virReportInvalidArg(flags, "%s",
                            _("use virDomainMigrateToURI3 for peer-to-peer "
                              "migration"));
        goto error;
    }

    if (flags & VIR_MIGRATE_OFFLINE) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5736 5737 5738
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the source host"));
J
Jiri Denemark 已提交
5739 5740 5741 5742
            goto error;
        }
        if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5743 5744 5745
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the destination host"));
J
Jiri Denemark 已提交
5746 5747 5748 5749 5750 5751 5752 5753 5754 5755 5756 5757
            goto error;
        }
    }

    /* Change protection requires support only on source side, and
     * is only needed in v3 migration, which automatically re-adds
     * the flag for just the source side.  We mask it out to allow
     * migration from newer source to an older destination that
     * rejects the flag.  */
    if (flags & VIR_MIGRATE_CHANGE_PROTECTION &&
        !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                  VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION)) {
5758 5759
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("cannot enforce change protection"));
J
Jiri Denemark 已提交
5760 5761 5762 5763 5764 5765 5766 5767 5768 5769 5770 5771 5772 5773 5774 5775 5776 5777
        goto error;
    }
    flags &= ~VIR_MIGRATE_CHANGE_PROTECTION;

    /* Prefer extensible API but fall back to older migration APIs if params
     * only contains parameters which were supported by the older API. */
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATION_PARAMS) &&
        VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                 VIR_DRV_FEATURE_MIGRATION_PARAMS)) {
        VIR_DEBUG("Using migration protocol 3 with extensible parameters");
        ddomain = virDomainMigrateVersion3Params(domain, dconn, params,
                                                 nparams, flags);
        goto done;
    }

    if (!virTypedParamsCheck(params, nparams, compatParams,
                             ARRAY_CARDINALITY(compatParams))) {
5778 5779 5780
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("Migration APIs with extensible parameters are not "
                         "supported but extended parameters were passed"));
J
Jiri Denemark 已提交
5781 5782 5783 5784 5785 5786 5787 5788 5789 5790 5791 5792 5793 5794 5795 5796 5797 5798 5799 5800 5801 5802 5803 5804 5805 5806 5807
        goto error;
    }

    if (virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_URI, &uri) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_NAME, &dname) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_XML, &dxml) < 0 ||
        virTypedParamsGetULLong(params, nparams,
                                VIR_MIGRATE_PARAM_BANDWIDTH, &bandwidth) < 0) {
        goto error;
    }

    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATION_V3) &&
        VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                 VIR_DRV_FEATURE_MIGRATION_V3)) {
        VIR_DEBUG("Using migration protocol 3");
        ddomain = virDomainMigrateVersion3(domain, dconn, dxml, flags,
                                           dname, uri, bandwidth);
    } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                        VIR_DRV_FEATURE_MIGRATION_V2) &&
               VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_V2)) {
        VIR_DEBUG("Using migration protocol 2");
        if (dxml) {
5808 5809 5810
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during "
                             "migration"));
J
Jiri Denemark 已提交
5811 5812 5813 5814 5815 5816 5817 5818 5819 5820
            goto error;
        }
        ddomain = virDomainMigrateVersion2(domain, dconn, flags,
                                           dname, uri, bandwidth);
    } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                        VIR_DRV_FEATURE_MIGRATION_V1) &&
               VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                        VIR_DRV_FEATURE_MIGRATION_V1)) {
        VIR_DEBUG("Using migration protocol 1");
        if (dxml) {
5821 5822 5823
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during "
                             "migration"));
J
Jiri Denemark 已提交
5824 5825 5826 5827 5828 5829
            goto error;
        }
        ddomain = virDomainMigrateVersion1(domain, dconn, flags,
                                           dname, uri, bandwidth);
    } else {
        /* This driver does not support any migration method */
5830
        virReportUnsupportedError();
J
Jiri Denemark 已提交
5831 5832 5833
        goto error;
    }

5834
 done:
J
Jiri Denemark 已提交
5835 5836 5837 5838 5839
    if (ddomain == NULL)
        goto error;

    return ddomain;

5840
 error:
J
Jiri Denemark 已提交
5841 5842 5843 5844 5845
    virDispatchError(domain->conn);
    return NULL;
}


5846 5847 5848 5849
/**
 * virDomainMigrateToURI:
 * @domain: a domain object
 * @duri: mandatory URI for the destination host
5850
 * @flags: bitwise-OR of virDomainMigrateFlags
5851
 * @dname: (optional) rename domain to this at destination
5852
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5853 5854
 *
 * Migrate the domain object from its current host to the destination
D
Dan Kenigsberg 已提交
5855
 * host given by duri.
5856 5857 5858 5859 5860
 *
 * Flags may be one of more of the following:
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
5861 5862 5863 5864
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
5865 5866 5867 5868 5869
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
5870 5871 5872
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
5873
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
5874
 *   VIR_MIGRATE_OFFLINE Migrate offline
5875
 *
5876 5877 5878 5879 5880 5881 5882 5883 5884 5885
 * The operation of this API hinges on the VIR_MIGRATE_PEER2PEER flag.
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, the duri parameter
 * takes a hypervisor specific format. The uri_transports element of the
 * hypervisor capabilities XML includes details of the supported URI
 * schemes. Not all hypervisors will support this mode of migration, so
 * if the VIR_MIGRATE_PEER2PEER flag is not set, then it may be necessary
 * to use the alternative virDomainMigrate API providing and explicit
 * virConnectPtr for the destination host.
 *
 * If the VIR_MIGRATE_PEER2PEER flag IS set, the duri parameter
5886
 * must be a valid libvirt connection URI, by which the source
D
Dan Kenigsberg 已提交
5887
 * libvirt driver can connect to the destination libvirt.
5888
 *
5889 5890
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 *
5891 5892 5893 5894
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
5895 5896 5897 5898 5899
 * If a hypervisor supports renaming domains during migration,
 * the dname parameter specifies the new name for the domain.
 * Setting dname to NULL keeps the domain name the same.  If domain
 * renaming is not supported by the hypervisor, dname must be NULL or
 * else an error will be returned.
5900
 *
5901
 * The maximum bandwidth (in MiB/s) that will be used to do migration
5902 5903 5904 5905 5906 5907 5908 5909 5910 5911 5912 5913 5914 5915 5916 5917
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns 0 if the migration succeeded, -1 upon error.
 */
int
5918 5919 5920 5921 5922
virDomainMigrateToURI(virDomainPtr domain,
                      const char *duri,
                      unsigned long flags,
                      const char *dname,
                      unsigned long bandwidth)
5923
{
5924
    VIR_DOMAIN_DEBUG(domain, "duri=%p, flags=%lx, dname=%s, bandwidth=%lu",
5925
                     NULLSTR(duri), flags, NULLSTR(dname), bandwidth);
5926 5927 5928 5929

    virResetLastError();

    /* First checkout the source */
5930
    virCheckDomainReturn(domain, -1);
5931
    virCheckReadOnlyGoto(domain->conn->flags, error);
5932

5933
    virCheckNonNullArgGoto(duri, error);
5934

5935 5936 5937 5938 5939 5940 5941 5942 5943
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

L
liguang 已提交
5944 5945 5946
    if (flags & VIR_MIGRATE_OFFLINE &&
        !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                  VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5947 5948 5949
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("offline migration is not supported by "
                         "the source host"));
L
liguang 已提交
5950 5951 5952
        goto error;
    }

5953
    if (flags & VIR_MIGRATE_PEER2PEER) {
5954 5955
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
5956
            VIR_DEBUG("Using peer2peer migration");
5957
            if (virDomainMigratePeer2Peer(domain, NULL, flags,
5958
                                          dname, duri, NULL, bandwidth) < 0)
5959 5960 5961
                goto error;
        } else {
            /* No peer to peer migration supported */
5962
            virReportUnsupportedError();
5963 5964 5965
            goto error;
        }
    } else {
5966 5967
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_DIRECT)) {
5968
            VIR_DEBUG("Using direct migration");
5969 5970
            if (virDomainMigrateDirect(domain, NULL, flags,
                                       dname, duri, bandwidth) < 0)
5971 5972 5973
                goto error;
        } else {
            /* Cannot do a migration with only the perform step */
5974 5975 5976
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("direct migration is not supported by the"
                             " connection driver"));
5977 5978 5979 5980 5981 5982
            goto error;
        }
    }

    return 0;

5983
 error:
5984
    virDispatchError(domain->conn);
5985 5986 5987 5988
    return -1;
}


5989 5990 5991 5992 5993 5994
/**
 * virDomainMigrateToURI2:
 * @domain: a domain object
 * @dconnuri: (optional) URI for target libvirtd if @flags includes VIR_MIGRATE_PEER2PEER
 * @miguri: (optional) URI for invoking the migration, not if @flags includs VIR_MIGRATE_TUNNELLED
 * @dxml: (optional) XML config for launching guest on target
5995
 * @flags: bitwise-OR of virDomainMigrateFlags
5996
 * @dname: (optional) rename domain to this at destination
5997
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5998 5999 6000 6001 6002 6003 6004 6005 6006 6007 6008 6009
 *
 * Migrate the domain object from its current host to the destination
 * host given by duri.
 *
 * Flags may be one of more of the following:
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
6010 6011 6012 6013 6014
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
6015 6016 6017
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
6018
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
6019
 *   VIR_MIGRATE_OFFLINE Migrate offline
6020 6021 6022 6023 6024 6025 6026 6027 6028 6029 6030 6031 6032 6033 6034 6035 6036
 *
 * The operation of this API hinges on the VIR_MIGRATE_PEER2PEER flag.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is set, the @dconnuri parameter
 * must be a valid libvirt connection URI, by which the source
 * libvirt driver can connect to the destination libvirt. If the
 * VIR_MIGRATE_PEER2PEER flag is NOT set, then @dconnuri must be
 * NULL.
 *
 * If the VIR_MIGRATE_TUNNELLED flag is NOT set, then the @miguri
 * parameter allows specification of a URI to use to initiate the
 * VM migration. It takes a hypervisor specific format. The uri_transports
 * element of the hypervisor capabilities XML includes details of the
 * supported URI schemes.
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 *
6037 6038 6039 6040
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
6041 6042 6043 6044 6045 6046 6047 6048 6049 6050 6051 6052 6053 6054 6055
 * If a hypervisor supports changing the configuration of the guest
 * during migration, the @dxml parameter specifies the new config
 * for the guest. The configuration must include an identical set
 * of virtual devices, to ensure a stable guest ABI across migration.
 * Only parameters related to host side configuration can be
 * changed in the XML. Hypervisors will validate this and refuse to
 * allow migration if the provided XML would cause a change in the
 * guest ABI,
 *
 * If a hypervisor supports renaming domains during migration,
 * the dname parameter specifies the new name for the domain.
 * Setting dname to NULL keeps the domain name the same.  If domain
 * renaming is not supported by the hypervisor, dname must be NULL or
 * else an error will be returned.
 *
6056
 * The maximum bandwidth (in MiB/s) that will be used to do migration
6057 6058 6059 6060 6061 6062 6063 6064 6065 6066 6067 6068 6069 6070 6071 6072 6073 6074 6075 6076 6077 6078 6079 6080 6081
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns 0 if the migration succeeded, -1 upon error.
 */
int
virDomainMigrateToURI2(virDomainPtr domain,
                       const char *dconnuri,
                       const char *miguri,
                       const char *dxml,
                       unsigned long flags,
                       const char *dname,
                       unsigned long bandwidth)
{
    VIR_DOMAIN_DEBUG(domain, "dconnuri=%s, miguri=%s, dxml=%s, "
6082
                     "flags=%lx, dname=%s, bandwidth=%lu",
6083 6084 6085 6086 6087 6088
                     NULLSTR(dconnuri), NULLSTR(miguri), NULLSTR(dxml),
                     flags, NULLSTR(dname), bandwidth);

    virResetLastError();

    /* First checkout the source */
6089
    virCheckDomainReturn(domain, -1);
6090
    virCheckReadOnlyGoto(domain->conn->flags, error);
6091

6092 6093 6094 6095 6096 6097 6098 6099 6100
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

6101
    if (flags & VIR_MIGRATE_PEER2PEER) {
6102 6103
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
6104 6105 6106 6107 6108 6109
            VIR_DEBUG("Using peer2peer migration");
            if (virDomainMigratePeer2Peer(domain, dxml, flags,
                                          dname, dconnuri, miguri, bandwidth) < 0)
                goto error;
        } else {
            /* No peer to peer migration supported */
6110
            virReportUnsupportedError();
6111 6112 6113
            goto error;
        }
    } else {
6114 6115
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_DIRECT)) {
6116 6117 6118 6119 6120 6121
            VIR_DEBUG("Using direct migration");
            if (virDomainMigrateDirect(domain, dxml, flags,
                                       dname, miguri, bandwidth) < 0)
                goto error;
        } else {
            /* Cannot do a migration with only the perform step */
6122 6123 6124
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("direct migration is not supported by the"
                             " connection driver"));
6125 6126 6127 6128 6129 6130
            goto error;
        }
    }

    return 0;

6131
 error:
6132 6133 6134 6135 6136
    virDispatchError(domain->conn);
    return -1;
}


J
Jiri Denemark 已提交
6137 6138 6139 6140 6141 6142 6143 6144 6145 6146 6147 6148 6149 6150 6151 6152 6153 6154 6155 6156 6157 6158 6159 6160 6161 6162 6163 6164 6165 6166 6167 6168 6169 6170 6171 6172 6173 6174 6175 6176 6177 6178 6179 6180 6181 6182 6183 6184 6185 6186 6187 6188 6189 6190 6191 6192 6193 6194 6195 6196 6197
/**
 * virDomainMigrateToURI3:
 * @domain: a domain object
 * @dconnuri: (optional) URI for target libvirtd if @flags includes VIR_MIGRATE_PEER2PEER
 * @params: (optional) migration parameters
 * @nparams: (optional) number of migration parameters in @params
 * @flags: bitwise-OR of virDomainMigrateFlags
 *
 * Migrate the domain object from its current host to the destination host
 * given by URI.
 *
 * See virDomainMigrateFlags documentation for description of individual flags.
 *
 * The operation of this API hinges on the VIR_MIGRATE_PEER2PEER flag.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is set, the @dconnuri parameter must be a
 * valid libvirt connection URI, by which the source libvirt daemon can connect
 * to the destination libvirt.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, then @dconnuri must be NULL
 * and VIR_MIGRATE_PARAM_URI migration parameter must be filled in with
 * hypervisor specific URI used to initiate the migration. This is called
 * "direct" migration.
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 *
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns 0 if the migration succeeded, -1 upon error.
 */
int
virDomainMigrateToURI3(virDomainPtr domain,
                       const char *dconnuri,
                       virTypedParameterPtr params,
                       unsigned int nparams,
                       unsigned int flags)
{
    bool compat;
    const char *compatParams[] = { VIR_MIGRATE_PARAM_URI,
                                   VIR_MIGRATE_PARAM_DEST_NAME,
                                   VIR_MIGRATE_PARAM_DEST_XML,
                                   VIR_MIGRATE_PARAM_BANDWIDTH };
    const char *uri = NULL;
    const char *dname = NULL;
    const char *dxml = NULL;
    unsigned long long bandwidth = 0;

    VIR_DOMAIN_DEBUG(domain, "dconnuri=%s, params=%p, nparms=%u flags=%x",
                     NULLSTR(dconnuri), params, nparams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

    /* First checkout the source */
6198
    virCheckDomainReturn(domain, -1);
6199
    virCheckReadOnlyGoto(domain->conn->flags, error);
J
Jiri Denemark 已提交
6200 6201 6202 6203 6204 6205 6206 6207 6208 6209 6210 6211 6212 6213 6214 6215 6216 6217 6218 6219 6220 6221 6222 6223 6224 6225 6226

    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

    compat = virTypedParamsCheck(params, nparams, compatParams,
                                 ARRAY_CARDINALITY(compatParams));

    if (virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_URI, &uri) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_NAME, &dname) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_XML, &dxml) < 0 ||
        virTypedParamsGetULLong(params, nparams,
                                VIR_MIGRATE_PARAM_BANDWIDTH, &bandwidth) < 0) {
        goto error;
    }

    if (flags & VIR_MIGRATE_PEER2PEER) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_P2P)) {
6227 6228 6229
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                           _("Peer-to-peer migration is not supported by "
                             "the connection driver"));
J
Jiri Denemark 已提交
6230 6231 6232 6233 6234 6235 6236 6237 6238 6239 6240 6241 6242 6243 6244
            goto error;
        }

        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_PARAMS)) {
            VIR_DEBUG("Using peer2peer migration with extensible parameters");
            if (virDomainMigratePeer2PeerParams(domain, dconnuri, params,
                                                nparams, flags) < 0)
                goto error;
        } else if (compat) {
            VIR_DEBUG("Using peer2peer migration");
            if (virDomainMigratePeer2Peer(domain, dxml, flags, dname,
                                          dconnuri, uri, bandwidth) < 0)
                goto error;
        } else {
6245 6246 6247 6248
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Peer-to-peer migration with extensible "
                             "parameters is not supported but extended "
                             "parameters were passed"));
J
Jiri Denemark 已提交
6249 6250 6251 6252 6253 6254
            goto error;
        }
    } else {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_DIRECT)) {
            /* Cannot do a migration with only the perform step */
6255 6256 6257
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                           _("Direct migration is not supported by the"
                             " connection driver"));
J
Jiri Denemark 已提交
6258 6259 6260 6261
            goto error;
        }

        if (!compat) {
6262 6263 6264
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Direct migration does not support extensible "
                             "parameters"));
J
Jiri Denemark 已提交
6265 6266 6267 6268 6269 6270 6271 6272 6273 6274 6275
            goto error;
        }

        VIR_DEBUG("Using direct migration");
        if (virDomainMigrateDirect(domain, dxml, flags,
                                   dname, uri, bandwidth) < 0)
            goto error;
    }

    return 0;

6276
 error:
J
Jiri Denemark 已提交
6277 6278 6279 6280 6281
    virDispatchError(domain->conn);
    return -1;
}


D
Daniel Veillard 已提交
6282 6283
/*
 * Not for public use.  This function is part of the internal
6284 6285 6286
 * implementation of migration in the remote case.
 */
int
6287 6288 6289 6290 6291 6292 6293 6294
virDomainMigratePrepare(virConnectPtr dconn,
                        char **cookie,
                        int *cookielen,
                        const char *uri_in,
                        char **uri_out,
                        unsigned long flags,
                        const char *dname,
                        unsigned long bandwidth)
6295
{
J
John Levon 已提交
6296
    VIR_DEBUG("dconn=%p, cookie=%p, cookielen=%p, uri_in=%s, uri_out=%p, "
6297
              "flags=%lx, dname=%s, bandwidth=%lu", dconn, cookie, cookielen,
J
John Levon 已提交
6298
              NULLSTR(uri_in), uri_out, flags, NULLSTR(dname), bandwidth);
6299

6300 6301
    virResetLastError();

6302
    virCheckConnectReturn(dconn, -1);
6303
    virCheckReadOnlyGoto(dconn->flags, error);
6304

6305 6306
    if (dconn->driver->domainMigratePrepare) {
        int ret;
6307 6308 6309
        ret = dconn->driver->domainMigratePrepare(dconn, cookie, cookielen,
                                                  uri_in, uri_out,
                                                  flags, dname, bandwidth);
6310 6311 6312 6313
        if (ret < 0)
            goto error;
        return ret;
    }
6314

6315
    virReportUnsupportedError();
6316

6317
 error:
6318
    virDispatchError(dconn);
6319 6320 6321
    return -1;
}

6322

D
Daniel Veillard 已提交
6323 6324
/*
 * Not for public use.  This function is part of the internal
6325 6326 6327
 * implementation of migration in the remote case.
 */
int
6328 6329 6330 6331 6332 6333 6334
virDomainMigratePerform(virDomainPtr domain,
                        const char *cookie,
                        int cookielen,
                        const char *uri,
                        unsigned long flags,
                        const char *dname,
                        unsigned long bandwidth)
6335 6336
{
    virConnectPtr conn;
6337

6338
    VIR_DOMAIN_DEBUG(domain, "cookie=%p, cookielen=%d, uri=%s, flags=%lx, "
6339 6340
                     "dname=%s, bandwidth=%lu", cookie, cookielen, uri, flags,
                     NULLSTR(dname), bandwidth);
6341

6342 6343
    virResetLastError();

6344
    virCheckDomainReturn(domain, -1);
6345 6346
    conn = domain->conn;

6347
    virCheckReadOnlyGoto(conn->flags, error);
6348

6349 6350
    if (conn->driver->domainMigratePerform) {
        int ret;
6351 6352 6353
        ret = conn->driver->domainMigratePerform(domain, cookie, cookielen,
                                                 uri,
                                                 flags, dname, bandwidth);
6354 6355 6356 6357
        if (ret < 0)
            goto error;
        return ret;
    }
6358

6359
    virReportUnsupportedError();
6360

6361
 error:
6362
    virDispatchError(domain->conn);
6363 6364 6365
    return -1;
}

6366

D
Daniel Veillard 已提交
6367 6368
/*
 * Not for public use.  This function is part of the internal
6369 6370 6371
 * implementation of migration in the remote case.
 */
virDomainPtr
6372 6373 6374 6375 6376 6377
virDomainMigrateFinish(virConnectPtr dconn,
                       const char *dname,
                       const char *cookie,
                       int cookielen,
                       const char *uri,
                       unsigned long flags)
6378
{
J
John Levon 已提交
6379
    VIR_DEBUG("dconn=%p, dname=%s, cookie=%p, cookielen=%d, uri=%s, "
6380
              "flags=%lx", dconn, NULLSTR(dname), cookie, cookielen,
J
John Levon 已提交
6381
              uri, flags);
6382

6383 6384
    virResetLastError();

6385
    virCheckConnectReturn(dconn, NULL);
6386
    virCheckReadOnlyGoto(dconn->flags, error);
6387

6388 6389
    if (dconn->driver->domainMigrateFinish) {
        virDomainPtr ret;
6390 6391 6392
        ret = dconn->driver->domainMigrateFinish(dconn, dname,
                                                 cookie, cookielen,
                                                 uri, flags);
6393 6394 6395 6396
        if (!ret)
            goto error;
        return ret;
    }
6397

6398
    virReportUnsupportedError();
6399

6400
 error:
6401
    virDispatchError(dconn);
6402
    return NULL;
D
Daniel Veillard 已提交
6403 6404 6405
}


D
Daniel Veillard 已提交
6406 6407
/*
 * Not for public use.  This function is part of the internal
D
Daniel Veillard 已提交
6408 6409 6410
 * implementation of migration in the remote case.
 */
int
6411 6412 6413 6414 6415 6416 6417 6418 6419
virDomainMigratePrepare2(virConnectPtr dconn,
                         char **cookie,
                         int *cookielen,
                         const char *uri_in,
                         char **uri_out,
                         unsigned long flags,
                         const char *dname,
                         unsigned long bandwidth,
                         const char *dom_xml)
D
Daniel Veillard 已提交
6420
{
J
John Levon 已提交
6421
    VIR_DEBUG("dconn=%p, cookie=%p, cookielen=%p, uri_in=%s, uri_out=%p,"
6422
              "flags=%lx, dname=%s, bandwidth=%lu, dom_xml=%s", dconn,
J
John Levon 已提交
6423 6424
              cookie, cookielen, uri_in, uri_out, flags, NULLSTR(dname),
              bandwidth, dom_xml);
D
Daniel Veillard 已提交
6425

6426 6427
    virResetLastError();

6428
    virCheckConnectReturn(dconn, -1);
6429
    virCheckReadOnlyGoto(dconn->flags, error);
6430

6431 6432
    if (dconn->driver->domainMigratePrepare2) {
        int ret;
6433 6434 6435 6436
        ret = dconn->driver->domainMigratePrepare2(dconn, cookie, cookielen,
                                                   uri_in, uri_out,
                                                   flags, dname, bandwidth,
                                                   dom_xml);
6437 6438 6439 6440
        if (ret < 0)
            goto error;
        return ret;
    }
D
Daniel Veillard 已提交
6441

6442
    virReportUnsupportedError();
6443

6444
 error:
6445
    virDispatchError(dconn);
D
Daniel Veillard 已提交
6446 6447 6448
    return -1;
}

6449

D
Daniel Veillard 已提交
6450 6451
/*
 * Not for public use.  This function is part of the internal
D
Daniel Veillard 已提交
6452 6453 6454
 * implementation of migration in the remote case.
 */
virDomainPtr
6455 6456 6457 6458 6459 6460 6461
virDomainMigrateFinish2(virConnectPtr dconn,
                        const char *dname,
                        const char *cookie,
                        int cookielen,
                        const char *uri,
                        unsigned long flags,
                        int retcode)
D
Daniel Veillard 已提交
6462
{
J
John Levon 已提交
6463
    VIR_DEBUG("dconn=%p, dname=%s, cookie=%p, cookielen=%d, uri=%s, "
6464
              "flags=%lx, retcode=%d", dconn, NULLSTR(dname), cookie,
J
John Levon 已提交
6465
              cookielen, uri, flags, retcode);
D
Daniel Veillard 已提交
6466

6467 6468
    virResetLastError();

6469
    virCheckConnectReturn(dconn, NULL);
6470
    virCheckReadOnlyGoto(dconn->flags, error);
6471

6472 6473
    if (dconn->driver->domainMigrateFinish2) {
        virDomainPtr ret;
6474 6475 6476 6477
        ret = dconn->driver->domainMigrateFinish2(dconn, dname,
                                                  cookie, cookielen,
                                                  uri, flags,
                                                  retcode);
6478
        if (!ret && !retcode)
6479 6480 6481
            goto error;
        return ret;
    }
D
Daniel Veillard 已提交
6482

6483
    virReportUnsupportedError();
6484

6485
 error:
6486
    virDispatchError(dconn);
D
Daniel Veillard 已提交
6487
    return NULL;
6488 6489 6490
}


C
Chris Lalancette 已提交
6491 6492 6493 6494 6495 6496 6497 6498 6499 6500 6501 6502
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepareTunnel(virConnectPtr conn,
                              virStreamPtr st,
                              unsigned long flags,
                              const char *dname,
                              unsigned long bandwidth,
                              const char *dom_xml)
{
6503
    VIR_DEBUG("conn=%p, stream=%p, flags=%lx, dname=%s, "
6504
              "bandwidth=%lu, dom_xml=%s", conn, st, flags,
C
Chris Lalancette 已提交
6505 6506 6507 6508
              NULLSTR(dname), bandwidth, dom_xml);

    virResetLastError();

6509
    virCheckConnectReturn(conn, -1);
6510
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
6511 6512

    if (conn != st->conn) {
6513 6514 6515
        virReportInvalidArg(conn,
                            _("conn in %s must match stream connection"),
                            __FUNCTION__);
C
Chris Lalancette 已提交
6516 6517 6518 6519
        goto error;
    }

    if (conn->driver->domainMigratePrepareTunnel) {
6520
        int rv = conn->driver->domainMigratePrepareTunnel(conn, st,
C
Chris Lalancette 已提交
6521 6522 6523 6524 6525 6526 6527
                                                          flags, dname,
                                                          bandwidth, dom_xml);
        if (rv < 0)
            goto error;
        return rv;
    }

6528
    virReportUnsupportedError();
C
Chris Lalancette 已提交
6529

6530
 error:
6531
    virDispatchError(conn);
C
Chris Lalancette 已提交
6532 6533 6534
    return -1;
}

6535

6536 6537 6538 6539 6540 6541
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
char *
virDomainMigrateBegin3(virDomainPtr domain,
6542
                       const char *xmlin,
6543 6544 6545 6546 6547 6548 6549 6550
                       char **cookieout,
                       int *cookieoutlen,
                       unsigned long flags,
                       const char *dname,
                       unsigned long bandwidth)
{
    virConnectPtr conn;

6551
    VIR_DOMAIN_DEBUG(domain, "xmlin=%s cookieout=%p, cookieoutlen=%p, "
6552
                     "flags=%lx, dname=%s, bandwidth=%lu",
6553
                     NULLSTR(xmlin), cookieout, cookieoutlen, flags,
6554 6555 6556 6557
                     NULLSTR(dname), bandwidth);

    virResetLastError();

6558
    virCheckDomainReturn(domain, NULL);
6559 6560
    conn = domain->conn;

6561
    virCheckReadOnlyGoto(conn->flags, error);
6562 6563 6564

    if (conn->driver->domainMigrateBegin3) {
        char *xml;
6565
        xml = conn->driver->domainMigrateBegin3(domain, xmlin,
6566 6567 6568 6569 6570 6571 6572 6573
                                                cookieout, cookieoutlen,
                                                flags, dname, bandwidth);
        VIR_DEBUG("xml %s", NULLSTR(xml));
        if (!xml)
            goto error;
        return xml;
    }

6574
    virReportUnsupportedError();
6575

6576
 error:
6577 6578 6579 6580 6581 6582 6583 6584 6585 6586 6587 6588 6589 6590 6591 6592 6593 6594 6595 6596 6597 6598
    virDispatchError(domain->conn);
    return NULL;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepare3(virConnectPtr dconn,
                         const char *cookiein,
                         int cookieinlen,
                         char **cookieout,
                         int *cookieoutlen,
                         const char *uri_in,
                         char **uri_out,
                         unsigned long flags,
                         const char *dname,
                         unsigned long bandwidth,
                         const char *dom_xml)
{
6599 6600 6601 6602 6603
    VIR_DEBUG("dconn=%p, cookiein=%p, cookieinlen=%d, cookieout=%p, "
              "cookieoutlen=%p, uri_in=%s, uri_out=%p, flags=%lx, dname=%s, "
              "bandwidth=%lu, dom_xml=%s",
              dconn, cookiein, cookieinlen, cookieout, cookieoutlen, uri_in,
              uri_out, flags, NULLSTR(dname), bandwidth, dom_xml);
6604 6605 6606

    virResetLastError();

6607
    virCheckConnectReturn(dconn, -1);
6608
    virCheckReadOnlyGoto(dconn->flags, error);
6609 6610 6611 6612 6613 6614 6615 6616 6617 6618 6619 6620 6621 6622

    if (dconn->driver->domainMigratePrepare3) {
        int ret;
        ret = dconn->driver->domainMigratePrepare3(dconn,
                                                   cookiein, cookieinlen,
                                                   cookieout, cookieoutlen,
                                                   uri_in, uri_out,
                                                   flags, dname, bandwidth,
                                                   dom_xml);
        if (ret < 0)
            goto error;
        return ret;
    }

6623
    virReportUnsupportedError();
6624

6625
 error:
6626 6627 6628 6629
    virDispatchError(dconn);
    return -1;
}

6630

6631 6632 6633 6634 6635 6636 6637 6638 6639 6640 6641 6642 6643 6644 6645 6646
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepareTunnel3(virConnectPtr conn,
                               virStreamPtr st,
                               const char *cookiein,
                               int cookieinlen,
                               char **cookieout,
                               int *cookieoutlen,
                               unsigned long flags,
                               const char *dname,
                               unsigned long bandwidth,
                               const char *dom_xml)
{
6647 6648 6649
    VIR_DEBUG("conn=%p, stream=%p, cookiein=%p, cookieinlen=%d, cookieout=%p, "
              "cookieoutlen=%p, flags=%lx, dname=%s, bandwidth=%lu, "
              "dom_xml=%s",
6650 6651 6652 6653 6654
              conn, st, cookiein, cookieinlen, cookieout, cookieoutlen, flags,
              NULLSTR(dname), bandwidth, dom_xml);

    virResetLastError();

6655
    virCheckConnectReturn(conn, -1);
6656
    virCheckReadOnlyGoto(conn->flags, error);
6657 6658

    if (conn != st->conn) {
6659 6660 6661
        virReportInvalidArg(conn,
                            _("conn in %s must match stream connection"),
                            __FUNCTION__);
6662 6663 6664 6665 6666 6667 6668 6669 6670 6671 6672 6673 6674 6675
        goto error;
    }

    if (conn->driver->domainMigratePrepareTunnel3) {
        int rv = conn->driver->domainMigratePrepareTunnel3(conn, st,
                                                           cookiein, cookieinlen,
                                                           cookieout, cookieoutlen,
                                                           flags, dname,
                                                           bandwidth, dom_xml);
        if (rv < 0)
            goto error;
        return rv;
    }

6676
    virReportUnsupportedError();
6677

6678
 error:
6679 6680 6681 6682 6683 6684 6685 6686 6687 6688 6689
    virDispatchError(conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePerform3(virDomainPtr domain,
6690
                         const char *xmlin,
6691 6692 6693 6694
                         const char *cookiein,
                         int cookieinlen,
                         char **cookieout,
                         int *cookieoutlen,
6695
                         const char *dconnuri,
6696 6697 6698 6699 6700 6701 6702
                         const char *uri,
                         unsigned long flags,
                         const char *dname,
                         unsigned long bandwidth)
{
    virConnectPtr conn;

6703
    VIR_DOMAIN_DEBUG(domain, "xmlin=%s cookiein=%p, cookieinlen=%d, "
6704
                     "cookieout=%p, cookieoutlen=%p, dconnuri=%s, "
6705
                     "uri=%s, flags=%lx, dname=%s, bandwidth=%lu",
6706
                     NULLSTR(xmlin), cookiein, cookieinlen,
6707 6708
                     cookieout, cookieoutlen, NULLSTR(dconnuri),
                     NULLSTR(uri), flags, NULLSTR(dname), bandwidth);
6709 6710 6711

    virResetLastError();

6712
    virCheckDomainReturn(domain, -1);
6713 6714
    conn = domain->conn;

6715
    virCheckReadOnlyGoto(conn->flags, error);
6716 6717 6718

    if (conn->driver->domainMigratePerform3) {
        int ret;
6719
        ret = conn->driver->domainMigratePerform3(domain, xmlin,
6720 6721
                                                  cookiein, cookieinlen,
                                                  cookieout, cookieoutlen,
6722
                                                  dconnuri, uri,
6723 6724 6725 6726 6727 6728
                                                  flags, dname, bandwidth);
        if (ret < 0)
            goto error;
        return ret;
    }

6729
    virReportUnsupportedError();
6730

6731
 error:
6732 6733 6734 6735 6736 6737 6738 6739 6740
    virDispatchError(domain->conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
6741
virDomainPtr
6742 6743 6744 6745 6746 6747
virDomainMigrateFinish3(virConnectPtr dconn,
                        const char *dname,
                        const char *cookiein,
                        int cookieinlen,
                        char **cookieout,
                        int *cookieoutlen,
6748
                        const char *dconnuri,
6749 6750
                        const char *uri,
                        unsigned long flags,
6751
                        int cancelled)
6752 6753
{
    VIR_DEBUG("dconn=%p, dname=%s, cookiein=%p, cookieinlen=%d, cookieout=%p,"
6754
              "cookieoutlen=%p, dconnuri=%s, uri=%s, flags=%lx, retcode=%d",
6755
              dconn, NULLSTR(dname), cookiein, cookieinlen, cookieout,
6756
              cookieoutlen, NULLSTR(dconnuri), NULLSTR(uri), flags, cancelled);
6757 6758 6759

    virResetLastError();

6760
    virCheckConnectReturn(dconn, NULL);
6761
    virCheckReadOnlyGoto(dconn->flags, error);
6762 6763

    if (dconn->driver->domainMigrateFinish3) {
6764
        virDomainPtr ret;
6765 6766 6767
        ret = dconn->driver->domainMigrateFinish3(dconn, dname,
                                                  cookiein, cookieinlen,
                                                  cookieout, cookieoutlen,
6768
                                                  dconnuri, uri, flags,
6769
                                                  cancelled);
6770
        if (!ret && !cancelled)
6771 6772 6773 6774
            goto error;
        return ret;
    }

6775
    virReportUnsupportedError();
6776

6777
 error:
6778
    virDispatchError(dconn);
6779
    return NULL;
6780 6781 6782 6783 6784 6785 6786 6787 6788 6789 6790 6791 6792 6793 6794 6795
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigrateConfirm3(virDomainPtr domain,
                         const char *cookiein,
                         int cookieinlen,
                         unsigned long flags,
                         int cancelled)
{
    virConnectPtr conn;

6796 6797
    VIR_DOMAIN_DEBUG(domain,
                     "cookiein=%p, cookieinlen=%d, flags=%lx, cancelled=%d",
6798 6799 6800 6801
                     cookiein, cookieinlen, flags, cancelled);

    virResetLastError();

6802
    virCheckDomainReturn(domain, -1);
6803 6804
    conn = domain->conn;

6805
    virCheckReadOnlyGoto(conn->flags, error);
6806 6807 6808 6809 6810 6811 6812 6813 6814 6815 6816

    if (conn->driver->domainMigrateConfirm3) {
        int ret;
        ret = conn->driver->domainMigrateConfirm3(domain,
                                                  cookiein, cookieinlen,
                                                  flags, cancelled);
        if (ret < 0)
            goto error;
        return ret;
    }

6817
    virReportUnsupportedError();
6818

6819
 error:
6820 6821 6822 6823
    virDispatchError(domain->conn);
    return -1;
}

C
Chris Lalancette 已提交
6824

6825 6826 6827 6828 6829 6830 6831 6832 6833 6834 6835 6836 6837 6838 6839 6840 6841 6842 6843 6844 6845
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
char *
virDomainMigrateBegin3Params(virDomainPtr domain,
                             virTypedParameterPtr params,
                             int nparams,
                             char **cookieout,
                             int *cookieoutlen,
                             unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, "
                     "cookieout=%p, cookieoutlen=%p, flags=%x",
                     params, nparams, cookieout, cookieoutlen, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6846
    virCheckDomainReturn(domain, NULL);
6847 6848
    conn = domain->conn;

6849
    virCheckReadOnlyGoto(conn->flags, error);
6850 6851 6852 6853 6854 6855 6856 6857 6858 6859 6860 6861

    if (conn->driver->domainMigrateBegin3Params) {
        char *xml;
        xml = conn->driver->domainMigrateBegin3Params(domain, params, nparams,
                                                      cookieout, cookieoutlen,
                                                      flags);
        VIR_DEBUG("xml %s", NULLSTR(xml));
        if (!xml)
            goto error;
        return xml;
    }

6862
    virReportUnsupportedError();
6863

6864
 error:
6865 6866 6867 6868 6869 6870 6871 6872 6873 6874 6875 6876 6877 6878 6879 6880 6881 6882 6883 6884 6885 6886 6887 6888 6889 6890 6891 6892
    virDispatchError(domain->conn);
    return NULL;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepare3Params(virConnectPtr dconn,
                               virTypedParameterPtr params,
                               int nparams,
                               const char *cookiein,
                               int cookieinlen,
                               char **cookieout,
                               int *cookieoutlen,
                               char **uri_out,
                               unsigned int flags)
{
    VIR_DEBUG("dconn=%p, params=%p, nparams=%d, cookiein=%p, cookieinlen=%d, "
              "cookieout=%p, cookieoutlen=%p, uri_out=%p, flags=%x",
              dconn, params, nparams, cookiein, cookieinlen,
              cookieout, cookieoutlen, uri_out, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6893
    virCheckConnectReturn(dconn, -1);
6894
    virCheckReadOnlyGoto(dconn->flags, error);
6895 6896 6897 6898 6899 6900 6901 6902 6903 6904 6905 6906

    if (dconn->driver->domainMigratePrepare3Params) {
        int ret;
        ret = dconn->driver->domainMigratePrepare3Params(dconn, params, nparams,
                                                         cookiein, cookieinlen,
                                                         cookieout, cookieoutlen,
                                                         uri_out, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

6907
    virReportUnsupportedError();
6908

6909
 error:
6910 6911 6912 6913 6914 6915 6916 6917 6918 6919 6920 6921 6922 6923 6924 6925 6926 6927 6928 6929 6930 6931 6932 6933 6934 6935 6936 6937
    virDispatchError(dconn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepareTunnel3Params(virConnectPtr conn,
                                     virStreamPtr st,
                                     virTypedParameterPtr params,
                                     int nparams,
                                     const char *cookiein,
                                     int cookieinlen,
                                     char **cookieout,
                                     int *cookieoutlen,
                                     unsigned int flags)
{
    VIR_DEBUG("conn=%p, stream=%p, params=%p, nparams=%d, cookiein=%p, "
              "cookieinlen=%d, cookieout=%p, cookieoutlen=%p, flags=%x",
              conn, st, params, nparams, cookiein, cookieinlen,
              cookieout, cookieoutlen, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6938
    virCheckConnectReturn(conn, -1);
6939
    virCheckReadOnlyGoto(conn->flags, error);
6940 6941 6942 6943 6944 6945 6946 6947 6948 6949 6950 6951 6952 6953 6954 6955 6956 6957

    if (conn != st->conn) {
        virReportInvalidArg(conn,
                            _("conn in %s must match stream connection"),
                            __FUNCTION__);
        goto error;
    }

    if (conn->driver->domainMigratePrepareTunnel3Params) {
        int rv;
        rv = conn->driver->domainMigratePrepareTunnel3Params(
                conn, st, params, nparams, cookiein, cookieinlen,
                cookieout, cookieoutlen, flags);
        if (rv < 0)
            goto error;
        return rv;
    }

6958
    virReportUnsupportedError();
6959

6960
 error:
6961 6962 6963 6964 6965 6966 6967 6968 6969 6970 6971 6972 6973 6974 6975 6976 6977 6978 6979 6980 6981 6982 6983 6984 6985 6986 6987 6988 6989 6990
    virDispatchError(conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePerform3Params(virDomainPtr domain,
                               const char *dconnuri,
                               virTypedParameterPtr params,
                               int nparams,
                               const char *cookiein,
                               int cookieinlen,
                               char **cookieout,
                               int *cookieoutlen,
                               unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "dconnuri=%s, params=%p, nparams=%d, cookiein=%p, "
                     "cookieinlen=%d, cookieout=%p, cookieoutlen=%p, flags=%x",
                     NULLSTR(dconnuri), params, nparams, cookiein,
                     cookieinlen, cookieout, cookieoutlen, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6991
    virCheckDomainReturn(domain, -1);
6992 6993
    conn = domain->conn;

6994
    virCheckReadOnlyGoto(conn->flags, error);
6995 6996 6997 6998 6999 7000 7001 7002 7003 7004 7005

    if (conn->driver->domainMigratePerform3Params) {
        int ret;
        ret = conn->driver->domainMigratePerform3Params(
                domain, dconnuri, params, nparams, cookiein, cookieinlen,
                cookieout, cookieoutlen, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7006
    virReportUnsupportedError();
7007

7008
 error:
7009 7010 7011 7012 7013 7014 7015 7016 7017 7018 7019 7020 7021 7022 7023 7024 7025 7026 7027 7028 7029 7030 7031 7032 7033 7034 7035 7036
    virDispatchError(domain->conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
virDomainPtr
virDomainMigrateFinish3Params(virConnectPtr dconn,
                              virTypedParameterPtr params,
                              int nparams,
                              const char *cookiein,
                              int cookieinlen,
                              char **cookieout,
                              int *cookieoutlen,
                              unsigned int flags,
                              int cancelled)
{
    VIR_DEBUG("dconn=%p, params=%p, nparams=%d, cookiein=%p, cookieinlen=%d, "
              "cookieout=%p, cookieoutlen=%p, flags=%x, cancelled=%d",
              dconn, params, nparams, cookiein, cookieinlen, cookieout,
              cookieoutlen, flags, cancelled);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

7037
    virCheckConnectReturn(dconn, NULL);
7038
    virCheckReadOnlyGoto(dconn->flags, error);
7039 7040 7041 7042 7043 7044

    if (dconn->driver->domainMigrateFinish3Params) {
        virDomainPtr ret;
        ret = dconn->driver->domainMigrateFinish3Params(
                dconn, params, nparams, cookiein, cookieinlen,
                cookieout, cookieoutlen, flags, cancelled);
7045
        if (!ret && !cancelled)
7046 7047 7048 7049
            goto error;
        return ret;
    }

7050
    virReportUnsupportedError();
7051

7052
 error:
7053 7054 7055 7056 7057 7058 7059 7060 7061 7062 7063 7064 7065 7066 7067 7068 7069 7070 7071 7072 7073 7074 7075 7076 7077 7078 7079
    virDispatchError(dconn);
    return NULL;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigrateConfirm3Params(virDomainPtr domain,
                               virTypedParameterPtr params,
                               int nparams,
                               const char *cookiein,
                               int cookieinlen,
                               unsigned int flags,
                               int cancelled)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, cookiein=%p, "
                     "cookieinlen=%d, flags=%x, cancelled=%d",
                     params, nparams, cookiein, cookieinlen, flags, cancelled);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

7080
    virCheckDomainReturn(domain, -1);
7081 7082
    conn = domain->conn;

7083
    virCheckReadOnlyGoto(conn->flags, error);
7084 7085 7086 7087 7088 7089 7090 7091 7092 7093 7094

    if (conn->driver->domainMigrateConfirm3Params) {
        int ret;
        ret = conn->driver->domainMigrateConfirm3Params(
                domain, params, nparams,
                cookiein, cookieinlen, flags, cancelled);
        if (ret < 0)
            goto error;
        return ret;
    }

7095
    virReportUnsupportedError();
7096

7097
 error:
7098 7099 7100 7101 7102
    virDispatchError(domain->conn);
    return -1;
}


7103 7104 7105 7106
/**
 * virNodeGetInfo:
 * @conn: pointer to the hypervisor connection
 * @info: pointer to a virNodeInfo structure allocated by the user
7107
 *
7108 7109 7110 7111 7112
 * Extract hardware information about the node.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
7113 7114
virNodeGetInfo(virConnectPtr conn, virNodeInfoPtr info)
{
7115
    VIR_DEBUG("conn=%p, info=%p", conn, info);
7116

7117 7118
    virResetLastError();

7119
    virCheckConnectReturn(conn, -1);
7120
    virCheckNonNullArgGoto(info, error);
7121

7122 7123
    if (conn->driver->nodeGetInfo) {
        int ret;
7124
        ret = conn->driver->nodeGetInfo(conn, info);
7125 7126 7127 7128
        if (ret < 0)
            goto error;
        return ret;
    }
7129

7130
    virReportUnsupportedError();
7131

7132
 error:
7133
    virDispatchError(conn);
7134
    return -1;
7135
}
7136

7137

7138 7139 7140 7141 7142 7143
/**
 * virConnectGetCapabilities:
 * @conn: pointer to the hypervisor connection
 *
 * Provides capabilities of the hypervisor / driver.
 *
7144 7145
 * Returns NULL in case of error, or an XML string
 * defining the capabilities.
7146 7147 7148
 * The client must free the returned string after use.
 */
char *
7149
virConnectGetCapabilities(virConnectPtr conn)
7150
{
7151
    VIR_DEBUG("conn=%p", conn);
7152

7153 7154
    virResetLastError();

7155
    virCheckConnectReturn(conn, NULL);
7156

7157
    if (conn->driver->connectGetCapabilities) {
7158
        char *ret;
7159
        ret = conn->driver->connectGetCapabilities(conn);
7160 7161
        if (!ret)
            goto error;
7162
        VIR_DEBUG("conn=%p ret=%s", conn, ret);
7163 7164
        return ret;
    }
7165

7166
    virReportUnsupportedError();
7167

7168
 error:
7169
    virDispatchError(conn);
7170 7171 7172
    return NULL;
}

7173

7174 7175 7176
/**
 * virNodeGetCPUStats:
 * @conn: pointer to the hypervisor connection.
7177
 * @cpuNum: number of node cpu. (VIR_NODE_CPU_STATS_ALL_CPUS means total cpu
7178 7179 7180 7181
 *          statistics)
 * @params: pointer to node cpu time parameter objects
 * @nparams: number of node cpu time parameter (this value should be same or
 *          less than the number of parameters supported)
7182
 * @flags: extra flags; not used yet, so callers should always pass 0
7183 7184 7185
 *
 * This function provides individual cpu statistics of the node.
 * If you want to get total cpu statistics of the node, you must specify
7186
 * VIR_NODE_CPU_STATS_ALL_CPUS to @cpuNum.
7187 7188 7189 7190 7191 7192
 * The @params array will be filled with the values equal to the number of
 * parameters suggested by @nparams
 *
 * As the value of @nparams is dynamic, call the API setting @nparams to 0 and
 * @params as NULL, the API returns the number of parameters supported by the
 * HV by updating @nparams on SUCCESS. The caller should then allocate @params
7193
 * array, i.e. (sizeof(@virNodeCPUStats) * @nparams) bytes and call
7194 7195 7196 7197
 * the API again.
 *
 * Here is a sample code snippet:
 *
E
Eric Blake 已提交
7198 7199 7200 7201 7202 7203 7204 7205
 *   if (virNodeGetCPUStats(conn, cpuNum, NULL, &nparams, 0) == 0 &&
 *       nparams != 0) {
 *       if ((params = malloc(sizeof(virNodeCPUStats) * nparams)) == NULL)
 *           goto error;
 *       memset(params, 0, sizeof(virNodeCPUStats) * nparams);
 *       if (virNodeGetCPUStats(conn, cpuNum, params, &nparams, 0))
 *           goto error;
 *   }
7206 7207 7208 7209 7210 7211 7212 7213 7214 7215 7216 7217 7218 7219 7220 7221 7222 7223 7224 7225 7226 7227
 *
 * This function doesn't require privileged access to the hypervisor.
 * This function expects the caller to allocate the @params.
 *
 * CPU time Statistics:
 *
 * VIR_NODE_CPU_STATS_KERNEL:
 *     The cumulative CPU time which spends by kernel,
 *     when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_USER:
 *     The cumulative CPU time which spends by user processes,
 *     when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_IDLE:
 *     The cumulative idle CPU time, when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_IOWAIT:
 *     The cumulative I/O wait CPU time, when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_UTILIZATION:
 *     The CPU utilization. The usage value is in percent and 100%
 *     represents all CPUs on the server.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
7228 7229 7230 7231 7232
int
virNodeGetCPUStats(virConnectPtr conn,
                   int cpuNum,
                   virNodeCPUStatsPtr params,
                   int *nparams, unsigned int flags)
7233
{
7234
    VIR_DEBUG("conn=%p, cpuNum=%d, params=%p, nparams=%d, flags=%x",
7235 7236 7237 7238
              conn, cpuNum, params, nparams ? *nparams : -1, flags);

    virResetLastError();

7239
    virCheckConnectReturn(conn, -1);
7240 7241
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
7242
    if (cpuNum < 0 && cpuNum != VIR_NODE_CPU_STATS_ALL_CPUS) {
7243
        virReportInvalidArg(cpuNum,
7244 7245
                            _("cpuNum in %s only accepts %d as a negative "
                              "value"),
7246
                            __FUNCTION__, VIR_NODE_CPU_STATS_ALL_CPUS);
7247 7248 7249 7250 7251
        goto error;
    }

    if (conn->driver->nodeGetCPUStats) {
        int ret;
7252
        ret = conn->driver->nodeGetCPUStats(conn, cpuNum, params, nparams, flags);
7253 7254 7255 7256
        if (ret < 0)
            goto error;
        return ret;
    }
7257
    virReportUnsupportedError();
7258

7259
 error:
7260 7261 7262 7263
    virDispatchError(conn);
    return -1;
}

7264

7265 7266 7267
/**
 * virNodeGetMemoryStats:
 * @conn: pointer to the hypervisor connection.
7268 7269
 * @cellNum: number of node cell. (VIR_NODE_MEMORY_STATS_ALL_CELLS means total
 *           cell statistics)
7270 7271 7272
 * @params: pointer to node memory stats objects
 * @nparams: number of node memory stats (this value should be same or
 *          less than the number of stats supported)
7273
 * @flags: extra flags; not used yet, so callers should always pass 0
7274 7275
 *
 * This function provides memory stats of the node.
7276
 * If you want to get total memory statistics of the node, you must specify
7277
 * VIR_NODE_MEMORY_STATS_ALL_CELLS to @cellNum.
7278 7279 7280 7281 7282 7283
 * The @params array will be filled with the values equal to the number of
 * stats suggested by @nparams
 *
 * As the value of @nparams is dynamic, call the API setting @nparams to 0 and
 * @params as NULL, the API returns the number of parameters supported by the
 * HV by updating @nparams on SUCCESS. The caller should then allocate @params
7284
 * array, i.e. (sizeof(@virNodeMemoryStats) * @nparams) bytes and call
7285 7286 7287 7288
 * the API again.
 *
 * Here is the sample code snippet:
 *
E
Eric Blake 已提交
7289 7290 7291 7292 7293 7294 7295 7296
 *   if (virNodeGetMemoryStats(conn, cellNum, NULL, &nparams, 0) == 0 &&
 *       nparams != 0) {
 *       if ((params = malloc(sizeof(virNodeMemoryStats) * nparams)) == NULL)
 *           goto error;
 *       memset(params, cellNum, 0, sizeof(virNodeMemoryStats) * nparams);
 *       if (virNodeGetMemoryStats(conn, params, &nparams, 0))
 *           goto error;
 *   }
7297 7298 7299 7300 7301 7302
 *
 * This function doesn't require privileged access to the hypervisor.
 * This function expects the caller to allocate the @params.
 *
 * Memory Stats:
 *
7303
 * VIR_NODE_MEMORY_STATS_TOTAL:
7304
 *     The total memory usage.(KB)
7305
 * VIR_NODE_MEMORY_STATS_FREE:
7306 7307
 *     The free memory usage.(KB)
 *     On linux, this usage includes buffers and cached.
7308
 * VIR_NODE_MEMORY_STATS_BUFFERS:
7309
 *     The buffers memory usage.(KB)
7310
 * VIR_NODE_MEMORY_STATS_CACHED:
7311 7312 7313 7314
 *     The cached memory usage.(KB)
 *
 * Returns -1 in case of error, 0 in case of success.
 */
7315 7316 7317 7318 7319
int
virNodeGetMemoryStats(virConnectPtr conn,
                      int cellNum,
                      virNodeMemoryStatsPtr params,
                      int *nparams, unsigned int flags)
7320
{
7321
    VIR_DEBUG("conn=%p, cellNum=%d, params=%p, nparams=%d, flags=%x",
7322 7323 7324 7325
              conn, cellNum, params, nparams ? *nparams : -1, flags);

    virResetLastError();

7326
    virCheckConnectReturn(conn, -1);
7327 7328
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
7329
    if (cellNum < 0 && cellNum != VIR_NODE_MEMORY_STATS_ALL_CELLS) {
7330
        virReportInvalidArg(cpuNum,
7331 7332
                            _("cellNum in %s only accepts %d as a negative "
                              "value"),
7333
                            __FUNCTION__, VIR_NODE_MEMORY_STATS_ALL_CELLS);
7334 7335 7336 7337 7338
        goto error;
    }

    if (conn->driver->nodeGetMemoryStats) {
        int ret;
7339
        ret = conn->driver->nodeGetMemoryStats(conn, cellNum, params, nparams, flags);
7340 7341 7342 7343
        if (ret < 0)
            goto error;
        return ret;
    }
7344
    virReportUnsupportedError();
7345

7346
 error:
7347 7348 7349 7350
    virDispatchError(conn);
    return -1;
}

7351

7352 7353 7354
/**
 * virNodeGetFreeMemory:
 * @conn: pointer to the hypervisor connection
7355
 *
D
Daniel Veillard 已提交
7356
 * provides the free memory available on the Node
7357
 * Note: most libvirt APIs provide memory sizes in kibibytes, but in this
D
Daniel Veillard 已提交
7358
 * function the returned value is in bytes. Divide by 1024 as necessary.
7359
 *
D
Daniel Veillard 已提交
7360
 * Returns the available free memory in bytes or 0 in case of error
7361 7362 7363 7364
 */
unsigned long long
virNodeGetFreeMemory(virConnectPtr conn)
{
7365
    VIR_DEBUG("conn=%p", conn);
7366

7367 7368
    virResetLastError();

7369
    virCheckConnectReturn(conn, 0);
7370

7371
    if (conn->driver->nodeGetFreeMemory) {
7372
        unsigned long long ret;
7373
        ret = conn->driver->nodeGetFreeMemory(conn);
7374 7375 7376 7377
        if (ret == 0)
            goto error;
        return ret;
    }
7378

7379
    virReportUnsupportedError();
7380

7381
 error:
7382
    virDispatchError(conn);
7383 7384 7385
    return 0;
}

7386

7387 7388 7389 7390 7391 7392 7393 7394 7395 7396
/**
 * virNodeSuspendForDuration:
 * @conn: pointer to the hypervisor connection
 * @target: the state to which the host must be suspended to,
 *         such as: VIR_NODE_SUSPEND_TARGET_MEM (Suspend-to-RAM)
 *                  VIR_NODE_SUSPEND_TARGET_DISK (Suspend-to-Disk)
 *                  VIR_NODE_SUSPEND_TARGET_HYBRID (Hybrid-Suspend,
 *                  which is a combination of the former modes).
 * @duration: the time duration in seconds for which the host
 *            has to be suspended
7397
 * @flags: extra flags; not used yet, so callers should always pass 0
7398 7399 7400 7401 7402 7403 7404 7405 7406 7407 7408 7409 7410 7411 7412 7413
 *
 * Attempt to suspend the node (host machine) for the given duration of
 * time in the specified state (Suspend-to-RAM, Suspend-to-Disk or
 * Hybrid-Suspend). Schedule the node's Real-Time-Clock interrupt to
 * resume the node after the duration is complete.
 *
 * Returns 0 on success (i.e., the node will be suspended after a short
 * delay), -1 on failure (the operation is not supported, or an attempted
 * suspend is already underway).
 */
int
virNodeSuspendForDuration(virConnectPtr conn,
                          unsigned int target,
                          unsigned long long duration,
                          unsigned int flags)
{
7414 7415
    VIR_DEBUG("conn=%p, target=%d, duration=%lld, flags=%x",
              conn, target, duration, flags);
7416 7417 7418

    virResetLastError();

7419
    virCheckConnectReturn(conn, -1);
7420
    virCheckReadOnlyGoto(conn->flags, error);
7421 7422 7423 7424 7425 7426 7427 7428 7429 7430

    if (conn->driver->nodeSuspendForDuration) {
        int ret;
        ret = conn->driver->nodeSuspendForDuration(conn, target,
                                                   duration, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7431
    virReportUnsupportedError();
7432

7433
 error:
7434 7435 7436 7437
    virDispatchError(conn);
    return -1;
}

7438

7439 7440 7441 7442 7443 7444 7445 7446
/*
 * virNodeGetMemoryParameters:
 * @conn: pointer to the hypervisor connection
 * @params: pointer to memory parameter object
 *          (return value, allocated by the caller)
 * @nparams: pointer to number of memory parameters; input and output
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
7447 7448 7449 7450
 * Get all node memory parameters (parameters unsupported by OS will be
 * omitted).  On input, @nparams gives the size of the @params array;
 * on output, @nparams gives how many slots were filled with parameter
 * information, which might be less but will not exceed the input value.
7451 7452 7453 7454 7455 7456 7457 7458 7459 7460 7461 7462 7463 7464 7465 7466 7467 7468 7469 7470 7471
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.  See virDomainGetMemoryParameters() for an equivalent usage
 * example.
 *
 * Returns 0 in case of success, and -1 in case of failure.
 */
int
virNodeGetMemoryParameters(virConnectPtr conn,
                           virTypedParameterPtr params,
                           int *nparams,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, params=%p, nparams=%p, flags=%x",
              conn, params, nparams, flags);

    virResetLastError();

7472
    virCheckConnectReturn(conn, -1);
7473 7474 7475 7476 7477 7478 7479 7480 7481 7482 7483 7484 7485 7486 7487 7488 7489 7490
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

    if (VIR_DRV_SUPPORTS_FEATURE(conn->driver, conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    if (conn->driver->nodeGetMemoryParameters) {
        int ret;
        ret = conn->driver->nodeGetMemoryParameters(conn, params,
                                                    nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7491
    virReportUnsupportedError();
7492

7493
 error:
7494 7495 7496 7497
    virDispatchError(conn);
    return -1;
}

7498

7499 7500 7501 7502 7503 7504 7505 7506 7507
/*
 * virNodeSetMemoryParameters:
 * @conn: pointer to the hypervisor connection
 * @params: pointer to scheduler parameter objects
 * @nparams: number of scheduler parameter objects
 *          (this value can be the same or less than the returned
 *           value nparams of virDomainGetSchedulerType)
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
7508 7509
 * Change all or a subset of the node memory tunables. The function
 * fails if not all of the tunables are supported.
O
Osier Yang 已提交
7510 7511 7512 7513 7514 7515
 *
 * Note that it's not recommended to use this function while the
 * outside tuning program is running (such as ksmtuned under Linux),
 * as they could change the tunables in parallel, which could cause
 * conflicts.
 *
7516 7517 7518 7519 7520 7521 7522 7523 7524 7525 7526 7527
 * This function may require privileged access to the hypervisor.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virNodeSetMemoryParameters(virConnectPtr conn,
                           virTypedParameterPtr params,
                           int nparams,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, params=%p, nparams=%d, flags=%x",
              conn, params, nparams, flags);
7528
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
7529 7530 7531

    virResetLastError();

7532
    virCheckConnectReturn(conn, -1);
7533
    virCheckReadOnlyGoto(conn->flags, error);
7534 7535 7536 7537 7538 7539 7540 7541 7542 7543 7544 7545 7546 7547 7548
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
        goto error;

    if (conn->driver->nodeSetMemoryParameters) {
        int ret;
        ret = conn->driver->nodeSetMemoryParameters(conn, params,
                                                          nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7549
    virReportUnsupportedError();
7550

7551
 error:
7552 7553 7554
    virDispatchError(conn);
    return -1;
}
7555

7556

7557 7558 7559
/**
 * virDomainGetSchedulerType:
 * @domain: pointer to domain object
7560 7561
 * @nparams: pointer to number of scheduler parameters, can be NULL
 *           (return value)
7562
 *
7563
 * Get the scheduler type and the number of scheduler parameters.
7564 7565 7566 7567 7568 7569 7570 7571
 *
 * Returns NULL in case of error. The caller must free the returned string.
 */
char *
virDomainGetSchedulerType(virDomainPtr domain, int *nparams)
{
    virConnectPtr conn;
    char *schedtype;
7572 7573

    VIR_DOMAIN_DEBUG(domain, "nparams=%p", nparams);
7574

7575 7576
    virResetLastError();

7577
    virCheckDomainReturn(domain, NULL);
7578 7579 7580
    conn = domain->conn;

    if (conn->driver->domainGetSchedulerType){
7581
        schedtype = conn->driver->domainGetSchedulerType(domain, nparams);
7582 7583
        if (!schedtype)
            goto error;
7584 7585 7586
        return schedtype;
    }

7587
    virReportUnsupportedError();
7588

7589
 error:
7590
    virDispatchError(domain->conn);
7591 7592 7593 7594 7595 7596 7597
    return NULL;
}


/**
 * virDomainGetSchedulerParameters:
 * @domain: pointer to domain object
7598
 * @params: pointer to scheduler parameter objects
7599
 *          (return value)
7600
 * @nparams: pointer to number of scheduler parameter objects
7601 7602 7603 7604 7605 7606 7607
 *          (this value should generally be as large as the returned value
 *           nparams of virDomainGetSchedulerType()); input and output
 *
 * Get all scheduler parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.  @nparams cannot be 0.
7608
 *
7609
 * It is hypervisor specific whether this returns the live or
7610
 * persistent state; for more control, use
7611
 * virDomainGetSchedulerParametersFlags().
7612 7613 7614 7615 7616
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetSchedulerParameters(virDomainPtr domain,
7617
                                virTypedParameterPtr params, int *nparams)
7618 7619
{
    virConnectPtr conn;
7620 7621

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%p", params, nparams);
7622

7623 7624
    virResetLastError();

7625
    virCheckDomainReturn(domain, -1);
7626

7627 7628 7629
    virCheckNonNullArgGoto(params, error);
    virCheckNonNullArgGoto(nparams, error);
    virCheckPositiveArgGoto(*nparams, error);
7630

7631 7632
    conn = domain->conn;

7633 7634
    if (conn->driver->domainGetSchedulerParameters) {
        int ret;
7635
        ret = conn->driver->domainGetSchedulerParameters(domain, params, nparams);
7636 7637 7638 7639
        if (ret < 0)
            goto error;
        return ret;
    }
7640

7641
    virReportUnsupportedError();
7642

7643
 error:
7644
    virDispatchError(domain->conn);
7645 7646 7647
    return -1;
}

7648

7649 7650 7651 7652 7653 7654 7655
/**
 * virDomainGetSchedulerParametersFlags:
 * @domain: pointer to domain object
 * @params: pointer to scheduler parameter object
 *          (return value)
 * @nparams: pointer to number of scheduler parameter
 *          (this value should be same than the returned value
7656
 *           nparams of virDomainGetSchedulerType()); input and output
E
Eric Blake 已提交
7657
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
7658
 *
7659 7660 7661 7662
 * Get all scheduler parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.  @nparams cannot be 0.
7663
 *
7664 7665
 * The value of @flags can be exactly VIR_DOMAIN_AFFECT_CURRENT,
 * VIR_DOMAIN_AFFECT_LIVE, or VIR_DOMAIN_AFFECT_CONFIG.
7666
 *
7667 7668
 * Here is a sample code snippet:
 *
E
Eric Blake 已提交
7669 7670 7671 7672 7673 7674 7675 7676
 *   char *ret = virDomainGetSchedulerType(dom, &nparams);
 *   if (ret && nparams != 0) {
 *       if ((params = malloc(sizeof(*params) * nparams)) == NULL)
 *           goto error;
 *       memset(params, 0, sizeof(*params) * nparams);
 *       if (virDomainGetSchedulerParametersFlags(dom, params, &nparams, 0))
 *           goto error;
 *   }
7677
 *
7678 7679 7680 7681 7682 7683 7684 7685 7686
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetSchedulerParametersFlags(virDomainPtr domain,
                                     virTypedParameterPtr params, int *nparams,
                                     unsigned int flags)
{
    virConnectPtr conn;

7687
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%p, flags=%x",
7688 7689 7690 7691
                     params, nparams, flags);

    virResetLastError();

7692
    virCheckDomainReturn(domain, -1);
7693

7694 7695 7696
    virCheckNonNullArgGoto(params, error);
    virCheckNonNullArgGoto(nparams, error);
    virCheckPositiveArgGoto(*nparams, error);
7697

E
Eric Blake 已提交
7698 7699 7700
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
7701 7702 7703 7704

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
7705
        virReportInvalidArg(flags,
7706 7707
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
7708
                            __FUNCTION__);
7709 7710
        goto error;
    }
7711 7712 7713 7714
    conn = domain->conn;

    if (conn->driver->domainGetSchedulerParametersFlags) {
        int ret;
7715 7716
        ret = conn->driver->domainGetSchedulerParametersFlags(domain, params,
                                                              nparams, flags);
7717 7718 7719 7720 7721
        if (ret < 0)
            goto error;
        return ret;
    }

7722
    virReportUnsupportedError();
7723

7724
 error:
7725 7726 7727 7728
    virDispatchError(domain->conn);
    return -1;
}

7729

7730 7731 7732 7733
/**
 * virDomainSetSchedulerParameters:
 * @domain: pointer to domain object
 * @params: pointer to scheduler parameter objects
7734 7735
 * @nparams: number of scheduler parameter objects
 *          (this value can be the same or less than the returned value
7736 7737
 *           nparams of virDomainGetSchedulerType)
 *
7738 7739 7740 7741
 * Change all or a subset or the scheduler parameters.  It is
 * hypervisor-specific whether this sets live, persistent, or both
 * settings; for more control, use
 * virDomainSetSchedulerParametersFlags.
7742 7743 7744 7745
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
7746
virDomainSetSchedulerParameters(virDomainPtr domain,
7747
                                virTypedParameterPtr params, int nparams)
7748 7749
{
    virConnectPtr conn;
7750 7751

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d", params, nparams);
7752
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
7753

7754 7755
    virResetLastError();

7756 7757
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
7758

7759
    virCheckReadOnlyGoto(conn->flags, error);
7760 7761 7762
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

7763
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
7764
        goto error;
7765

7766 7767
    if (conn->driver->domainSetSchedulerParameters) {
        int ret;
7768
        ret = conn->driver->domainSetSchedulerParameters(domain, params, nparams);
7769 7770 7771 7772
        if (ret < 0)
            goto error;
        return ret;
    }
7773

7774
    virReportUnsupportedError();
7775

7776
 error:
7777 7778 7779 7780 7781 7782 7783 7784 7785
    virDispatchError(domain->conn);
    return -1;
}


/**
 * virDomainSetSchedulerParametersFlags:
 * @domain: pointer to domain object
 * @params: pointer to scheduler parameter objects
7786 7787
 * @nparams: number of scheduler parameter objects
 *          (this value can be the same or less than the returned value
7788
 *           nparams of virDomainGetSchedulerType)
7789
 * @flags: bitwise-OR of virDomainModificationImpact
7790
 *
7791
 * Change a subset or all scheduler parameters.  The value of @flags
7792 7793 7794
 * should be either VIR_DOMAIN_AFFECT_CURRENT, or a bitwise-or of
 * values from VIR_DOMAIN_AFFECT_LIVE and
 * VIR_DOMAIN_AFFECT_CURRENT, although hypervisors vary in which
7795
 * flags are supported.
7796 7797 7798 7799 7800
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetSchedulerParametersFlags(virDomainPtr domain,
7801
                                     virTypedParameterPtr params,
7802 7803 7804 7805 7806
                                     int nparams,
                                     unsigned int flags)
{
    virConnectPtr conn;

7807
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
7808
                     params, nparams, flags);
7809
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
7810 7811 7812

    virResetLastError();

7813 7814
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
7815

7816
    virCheckReadOnlyGoto(conn->flags, error);
7817 7818 7819
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

7820
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
7821
        goto error;
7822

7823 7824 7825 7826 7827 7828 7829 7830 7831 7832 7833
    if (conn->driver->domainSetSchedulerParametersFlags) {
        int ret;
        ret = conn->driver->domainSetSchedulerParametersFlags(domain,
                                                              params,
                                                              nparams,
                                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7834
    virReportUnsupportedError();
7835

7836
 error:
7837
    virDispatchError(domain->conn);
7838 7839 7840 7841
    return -1;
}


7842
/**
7843
 * virDomainBlockStats:
7844
 * @dom: pointer to the domain object
7845
 * @disk: path to the block device, or device shorthand
7846 7847 7848 7849 7850 7851
 * @stats: block device stats (returned)
 * @size: size of stats structure
 *
 * This function returns block device (disk) stats for block
 * devices attached to the domain.
 *
7852
 * The @disk parameter is either the device target shorthand (the
7853 7854 7855 7856
 * <target dev='...'/> sub-element, such as "xvda"), or (since 0.9.8)
 * an unambiguous source name of the block device (the <source
 * file='...'/> sub-element, such as "/path/to/image").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
7857 7858 7859
 * elements within //domain/devices/disk. Some drivers might also
 * accept the empty string for the @disk parameter, and then yield
 * summary stats for the entire domain.
7860 7861 7862 7863 7864 7865 7866 7867 7868 7869 7870
 *
 * Domains may have more than one block device.  To get stats for
 * each you should make multiple calls to this function.
 *
 * Individual fields within the stats structure may be returned
 * as -1, which indicates that the hypervisor does not support
 * that particular statistic.
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
7871 7872
virDomainBlockStats(virDomainPtr dom, const char *disk,
                    virDomainBlockStatsPtr stats, size_t size)
7873 7874 7875
{
    virConnectPtr conn;
    struct _virDomainBlockStats stats2 = { -1, -1, -1, -1, -1 };
7876

7877
    VIR_DOMAIN_DEBUG(dom, "disk=%s, stats=%p, size=%zi", disk, stats, size);
7878

7879 7880
    virResetLastError();

7881
    virCheckDomainReturn(dom, -1);
7882 7883 7884 7885 7886 7887
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(stats, error);
    if (size > sizeof(stats2)) {
        virReportInvalidArg(size,
                            _("size in %s must not exceed %zu"),
                            __FUNCTION__, sizeof(stats2));
7888 7889
        goto error;
    }
7890 7891 7892
    conn = dom->conn;

    if (conn->driver->domainBlockStats) {
7893
        if (conn->driver->domainBlockStats(dom, disk, &stats2) == -1)
7894
            goto error;
7895

7896
        memcpy(stats, &stats2, size);
7897 7898 7899
        return 0;
    }

7900
    virReportUnsupportedError();
7901

7902
 error:
7903
    virDispatchError(dom->conn);
7904 7905 7906
    return -1;
}

7907

O
Osier Yang 已提交
7908 7909 7910
/**
 * virDomainBlockStatsFlags:
 * @dom: pointer to domain object
7911
 * @disk: path to the block device, or device shorthand
O
Osier Yang 已提交
7912 7913
 * @params: pointer to block stats parameter object
 *          (return value)
7914
 * @nparams: pointer to number of block stats; input and output
E
Eric Blake 已提交
7915
 * @flags: bitwise-OR of virTypedParameterFlags
O
Osier Yang 已提交
7916 7917 7918 7919
 *
 * This function is to get block stats parameters for block
 * devices attached to the domain.
 *
7920
 * The @disk parameter is either the device target shorthand (the
7921 7922 7923 7924
 * <target dev='...'/> sub-element, such as "xvda"), or (since 0.9.8)
 * an unambiguous source name of the block device (the <source
 * file='...'/> sub-element, such as "/path/to/image").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
7925 7926 7927
 * elements within //domain/devices/disk. Some drivers might also
 * accept the empty string for the @disk parameter, and then yield
 * summary stats for the entire domain.
O
Osier Yang 已提交
7928 7929 7930 7931
 *
 * Domains may have more than one block device.  To get stats for
 * each you should make multiple calls to this function.
 *
7932 7933 7934 7935
 * On input, @nparams gives the size of the @params array; on output,
 * @nparams gives how many slots were filled with parameter
 * information, which might be less but will not exceed the input
 * value.
O
Osier Yang 已提交
7936
 *
7937 7938 7939 7940 7941
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. (Note that block devices of different types
 * might support different parameters, so it might be necessary to compute
 * @nparams for each block device). The caller should then allocate @params
O
Osier Yang 已提交
7942
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
7943
 * again. See virDomainGetMemoryParameters() for more details.
O
Osier Yang 已提交
7944 7945 7946
 *
 * Returns -1 in case of error, 0 in case of success.
 */
7947 7948 7949 7950 7951 7952
int
virDomainBlockStatsFlags(virDomainPtr dom,
                         const char *disk,
                         virTypedParameterPtr params,
                         int *nparams,
                         unsigned int flags)
O
Osier Yang 已提交
7953 7954 7955
{
    virConnectPtr conn;

7956 7957
    VIR_DOMAIN_DEBUG(dom, "disk=%s, params=%p, nparams=%d, flags=%x",
                     disk, params, nparams ? *nparams : -1, flags);
O
Osier Yang 已提交
7958 7959 7960

    virResetLastError();

7961
    virCheckDomainReturn(dom, -1);
7962 7963 7964 7965 7966 7967
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

E
Eric Blake 已提交
7968 7969 7970
    if (VIR_DRV_SUPPORTS_FEATURE(dom->conn->driver, dom->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
O
Osier Yang 已提交
7971 7972 7973 7974
    conn = dom->conn;

    if (conn->driver->domainBlockStatsFlags) {
        int ret;
7975
        ret = conn->driver->domainBlockStatsFlags(dom, disk, params, nparams, flags);
O
Osier Yang 已提交
7976 7977 7978 7979
        if (ret < 0)
            goto error;
        return ret;
    }
7980
    virReportUnsupportedError();
O
Osier Yang 已提交
7981

7982
 error:
O
Osier Yang 已提交
7983 7984 7985 7986 7987
    virDispatchError(dom->conn);
    return -1;
}


7988
/**
7989
 * virDomainInterfaceStats:
7990 7991 7992 7993 7994 7995 7996 7997 7998 7999
 * @dom: pointer to the domain object
 * @path: path to the interface
 * @stats: network interface stats (returned)
 * @size: size of stats structure
 *
 * This function returns network interface stats for interfaces
 * attached to the domain.
 *
 * The path parameter is the name of the network interface.
 *
D
Dan Kenigsberg 已提交
8000
 * Domains may have more than one network interface.  To get stats for
8001 8002 8003 8004 8005 8006 8007 8008 8009
 * each you should make multiple calls to this function.
 *
 * Individual fields within the stats structure may be returned
 * as -1, which indicates that the hypervisor does not support
 * that particular statistic.
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8010 8011
virDomainInterfaceStats(virDomainPtr dom, const char *path,
                        virDomainInterfaceStatsPtr stats, size_t size)
8012 8013 8014 8015
{
    virConnectPtr conn;
    struct _virDomainInterfaceStats stats2 = { -1, -1, -1, -1,
                                               -1, -1, -1, -1 };
8016 8017 8018

    VIR_DOMAIN_DEBUG(dom, "path=%s, stats=%p, size=%zi",
                     path, stats, size);
8019

8020 8021
    virResetLastError();

8022
    virCheckDomainReturn(dom, -1);
8023 8024 8025 8026 8027 8028
    virCheckNonNullArgGoto(path, error);
    virCheckNonNullArgGoto(stats, error);
    if (size > sizeof(stats2)) {
        virReportInvalidArg(size,
                            _("size in %s must not exceed %zu"),
                            __FUNCTION__, sizeof(stats2));
8029 8030
        goto error;
    }
8031

8032 8033 8034
    conn = dom->conn;

    if (conn->driver->domainInterfaceStats) {
8035
        if (conn->driver->domainInterfaceStats(dom, path, &stats2) == -1)
8036
            goto error;
8037

8038
        memcpy(stats, &stats2, size);
8039 8040 8041
        return 0;
    }

8042
    virReportUnsupportedError();
8043

8044
 error:
8045
    virDispatchError(dom->conn);
8046 8047 8048
    return -1;
}

8049 8050

/**
8051 8052 8053 8054 8055 8056 8057 8058
 * virDomainSetInterfaceParameters:
 * @domain: pointer to domain object
 * @device: the interface name or mac address
 * @params: pointer to interface parameter objects
 * @nparams: number of interface parameter (this value can be the same or
 *          less than the number of parameters supported)
 * @flags: bitwise-OR of virDomainModificationImpact
 *
8059 8060
 * Change a subset or all parameters of interface; currently this
 * includes bandwidth parameters.  The value of @flags should be
8061 8062
 * either VIR_DOMAIN_AFFECT_CURRENT, or a bitwise-or of values
 * VIR_DOMAIN_AFFECT_LIVE and VIR_DOMAIN_AFFECT_CONFIG, although
8063 8064
 * hypervisors vary in which flags are supported.
 *
8065 8066 8067 8068 8069 8070 8071 8072 8073 8074 8075 8076 8077 8078
 * This function may require privileged access to the hypervisor.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetInterfaceParameters(virDomainPtr domain,
                                const char *device,
                                virTypedParameterPtr params,
                                int nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "device=%s, params=%p, nparams=%d, flags=%x",
                     device, params, nparams, flags);
8079
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
8080 8081 8082

    virResetLastError();

8083 8084 8085 8086
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
8087 8088 8089
    virCheckNonNullArgGoto(params, error);
    virCheckPositiveArgGoto(nparams, error);

8090
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
8091
        goto error;
8092 8093 8094

    if (conn->driver->domainSetInterfaceParameters) {
        int ret;
8095 8096 8097
        ret = conn->driver->domainSetInterfaceParameters(domain, device,
                                                         params, nparams,
                                                         flags);
8098 8099 8100 8101 8102
        if (ret < 0)
            goto error;
        return ret;
    }

8103
    virReportUnsupportedError();
8104

8105
 error:
8106 8107 8108 8109
    virDispatchError(domain->conn);
    return -1;
}

8110 8111

/**
8112 8113 8114 8115 8116
 * virDomainGetInterfaceParameters:
 * @domain: pointer to domain object
 * @device: the interface name or mac address
 * @params: pointer to interface parameter objects
 *          (return value, allocated by the caller)
8117 8118
 * @nparams: pointer to number of interface parameter; input and output
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
8119 8120 8121 8122 8123 8124 8125 8126 8127 8128 8129 8130 8131 8132 8133 8134 8135 8136 8137 8138 8139 8140 8141 8142 8143 8144 8145 8146 8147 8148 8149
 *
 * Get all interface parameters. On input, @nparams gives the size of
 * the @params array; on output, @nparams gives how many slots were
 * filled with parameter information, which might be less but will not
 * exceed the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the
 * API again. See virDomainGetMemoryParameters() for an equivalent usage
 * example.
 *
 * This function may require privileged access to the hypervisor. This function
 * expects the caller to allocate the @params.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetInterfaceParameters(virDomainPtr domain,
                                const char *device,
                                virTypedParameterPtr params,
                                int *nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "device=%s, params=%p, nparams=%d, flags=%x",
                     device, params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

8150
    virCheckDomainReturn(domain, -1);
8151 8152 8153 8154 8155
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

8156 8157 8158 8159 8160 8161 8162 8163
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    conn = domain->conn;

    if (conn->driver->domainGetInterfaceParameters) {
        int ret;
8164 8165 8166
        ret = conn->driver->domainGetInterfaceParameters(domain, device,
                                                         params, nparams,
                                                         flags);
8167 8168 8169 8170
        if (ret < 0)
            goto error;
        return ret;
    }
8171
    virReportUnsupportedError();
8172

8173
 error:
8174 8175 8176 8177
    virDispatchError(domain->conn);
    return -1;
}

8178

8179 8180 8181 8182 8183
/**
 * virDomainMemoryStats:
 * @dom: pointer to the domain object
 * @stats: nr_stats-sized array of stat structures (returned)
 * @nr_stats: number of memory statistics requested
8184
 * @flags: extra flags; not used yet, so callers should always pass 0
8185 8186 8187 8188 8189 8190 8191 8192 8193 8194 8195 8196 8197 8198 8199 8200 8201 8202 8203 8204 8205
 *
 * This function provides memory statistics for the domain.
 *
 * Up to 'nr_stats' elements of 'stats' will be populated with memory statistics
 * from the domain.  Only statistics supported by the domain, the driver, and
 * this version of libvirt will be returned.
 *
 * Memory Statistics:
 *
 * VIR_DOMAIN_MEMORY_STAT_SWAP_IN:
 *     The total amount of data read from swap space (in kb).
 * VIR_DOMAIN_MEMORY_STAT_SWAP_OUT:
 *     The total amount of memory written out to swap space (in kb).
 * VIR_DOMAIN_MEMORY_STAT_MAJOR_FAULT:
 *     The number of page faults that required disk IO to service.
 * VIR_DOMAIN_MEMORY_STAT_MINOR_FAULT:
 *     The number of page faults serviced without disk IO.
 * VIR_DOMAIN_MEMORY_STAT_UNUSED:
 *     The amount of memory which is not being used for any purpose (in kb).
 * VIR_DOMAIN_MEMORY_STAT_AVAILABLE:
 *     The total amount of memory available to the domain's OS (in kb).
8206 8207
 * VIR_DOMAIN_MEMORY_STAT_ACTUAL_BALLOON:
 *     Current balloon value (in kb).
8208 8209 8210
 *
 * Returns: The number of stats provided or -1 in case of failure.
 */
8211 8212 8213
int
virDomainMemoryStats(virDomainPtr dom, virDomainMemoryStatPtr stats,
                     unsigned int nr_stats, unsigned int flags)
8214 8215 8216
{
    virConnectPtr conn;
    unsigned long nr_stats_ret = 0;
8217

E
Eric Blake 已提交
8218 8219
    VIR_DOMAIN_DEBUG(dom, "stats=%p, nr_stats=%u, flags=%x",
                     stats, nr_stats, flags);
8220 8221 8222

    virResetLastError();

8223
    virCheckDomainReturn(dom, -1);
8224

8225 8226 8227 8228 8229 8230 8231 8232
    if (!stats || nr_stats == 0)
        return 0;

    if (nr_stats > VIR_DOMAIN_MEMORY_STAT_NR)
        nr_stats = VIR_DOMAIN_MEMORY_STAT_NR;

    conn = dom->conn;
    if (conn->driver->domainMemoryStats) {
8233 8234
        nr_stats_ret = conn->driver->domainMemoryStats(dom, stats, nr_stats,
                                                       flags);
8235 8236 8237 8238 8239
        if (nr_stats_ret == -1)
            goto error;
        return nr_stats_ret;
    }

8240
    virReportUnsupportedError();
8241

8242
 error:
8243
    virDispatchError(dom->conn);
8244 8245 8246
    return -1;
}

8247

R
Richard W.M. Jones 已提交
8248 8249 8250
/**
 * virDomainBlockPeek:
 * @dom: pointer to the domain object
8251
 * @disk: path to the block device, or device shorthand
R
Richard W.M. Jones 已提交
8252 8253 8254
 * @offset: offset within block device
 * @size: size to read
 * @buffer: return buffer (must be at least size bytes)
8255
 * @flags: extra flags; not used yet, so callers should always pass 0
R
Richard W.M. Jones 已提交
8256 8257 8258 8259 8260 8261 8262 8263 8264 8265 8266 8267 8268 8269
 *
 * This function allows you to read the contents of a domain's
 * disk device.
 *
 * Typical uses for this are to determine if the domain has
 * written a Master Boot Record (indicating that the domain
 * has completed installation), or to try to work out the state
 * of the domain's filesystems.
 *
 * (Note that in the local case you might try to open the
 * block device or file directly, but that won't work in the
 * remote case, nor if you don't have sufficient permission.
 * Hence the need for this call).
 *
8270
 * The @disk parameter is either an unambiguous source name of the
8271 8272 8273 8274 8275
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
R
Richard W.M. Jones 已提交
8276 8277 8278 8279 8280 8281 8282
 *
 * 'offset' and 'size' represent an area which must lie entirely
 * within the device or file.  'size' may be 0 to test if the
 * call would succeed.
 *
 * 'buffer' is the return buffer and must be at least 'size' bytes.
 *
R
Richard W.M. Jones 已提交
8283 8284 8285
 * NB. The remote driver imposes a 64K byte limit on 'size'.
 * For your program to be able to work reliably over a remote
 * connection you should split large requests to <= 65536 bytes.
M
Michal Privoznik 已提交
8286
 * However, with 0.9.13 this RPC limit has been raised to 1M byte.
8287 8288
 * Starting with version 1.0.6 the RPC limit has been raised again.
 * Now large requests up to 16M byte are supported.
R
Richard W.M. Jones 已提交
8289
 *
R
Richard W.M. Jones 已提交
8290 8291 8292
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8293 8294 8295 8296 8297 8298
virDomainBlockPeek(virDomainPtr dom,
                   const char *disk,
                   unsigned long long offset /* really 64 bits */,
                   size_t size,
                   void *buffer,
                   unsigned int flags)
R
Richard W.M. Jones 已提交
8299 8300
{
    virConnectPtr conn;
8301

8302 8303
    VIR_DOMAIN_DEBUG(dom, "disk=%s, offset=%lld, size=%zi, buffer=%p, flags=%x",
                     disk, offset, size, buffer, flags);
R
Richard W.M. Jones 已提交
8304

8305 8306
    virResetLastError();

8307
    virCheckDomainReturn(dom, -1);
R
Richard W.M. Jones 已提交
8308
    conn = dom->conn;
8309

8310
    virCheckReadOnlyGoto(conn->flags, error);
8311
    virCheckNonNullArgGoto(disk, error);
R
Richard W.M. Jones 已提交
8312 8313

    /* Allow size == 0 as an access test. */
8314 8315
    if (size > 0)
        virCheckNonNullArgGoto(buffer, error);
R
Richard W.M. Jones 已提交
8316

8317 8318
    if (conn->driver->domainBlockPeek) {
        int ret;
8319
        ret = conn->driver->domainBlockPeek(dom, disk, offset, size,
8320 8321 8322 8323 8324
                                            buffer, flags);
        if (ret < 0)
            goto error;
        return ret;
    }
R
Richard W.M. Jones 已提交
8325

8326
    virReportUnsupportedError();
8327

8328
 error:
8329
    virDispatchError(dom->conn);
R
Richard W.M. Jones 已提交
8330 8331
    return -1;
}
8332

8333

O
Osier Yang 已提交
8334 8335 8336 8337
/**
 * virDomainBlockResize:
 * @dom: pointer to the domain object
 * @disk: path to the block image, or shorthand
E
Eric Blake 已提交
8338 8339
 * @size: new size of the block image, see below for unit
 * @flags: bitwise-OR of virDomainBlockResizeFlags
O
Osier Yang 已提交
8340
 *
E
Eric Blake 已提交
8341
 * Resize a block device of domain while the domain is running.  If
8342 8343 8344 8345 8346
 * @flags is 0, then @size is in kibibytes (blocks of 1024 bytes);
 * since 0.9.11, if @flags includes VIR_DOMAIN_BLOCK_RESIZE_BYTES,
 * @size is in bytes instead.  @size is taken directly as the new
 * size.  Depending on the file format, the hypervisor may round up
 * to the next alignment boundary.
O
Osier Yang 已提交
8347 8348 8349 8350 8351 8352 8353 8354
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
E
Eric Blake 已提交
8355 8356 8357
 * Note that this call may fail if the underlying virtualization hypervisor
 * does not support it; this call requires privileged access to the
 * hypervisor.
O
Osier Yang 已提交
8358 8359 8360 8361
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8362 8363 8364 8365
virDomainBlockResize(virDomainPtr dom,
                     const char *disk,
                     unsigned long long size,
                     unsigned int flags)
O
Osier Yang 已提交
8366 8367 8368 8369 8370 8371 8372
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "disk=%s, size=%llu, flags=%x", disk, size, flags);

    virResetLastError();

8373
    virCheckDomainReturn(dom, -1);
O
Osier Yang 已提交
8374 8375
    conn = dom->conn;

8376
    virCheckReadOnlyGoto(conn->flags, error);
8377
    virCheckNonNullArgGoto(disk, error);
O
Osier Yang 已提交
8378 8379 8380

    if (conn->driver->domainBlockResize) {
        int ret;
8381
        ret = conn->driver->domainBlockResize(dom, disk, size, flags);
O
Osier Yang 已提交
8382 8383 8384 8385 8386
        if (ret < 0)
            goto error;
        return ret;
    }

8387
    virReportUnsupportedError();
O
Osier Yang 已提交
8388

8389
 error:
O
Osier Yang 已提交
8390 8391 8392 8393
    virDispatchError(dom->conn);
    return -1;
}

8394

R
Richard W.M. Jones 已提交
8395 8396 8397 8398 8399 8400
/**
 * virDomainMemoryPeek:
 * @dom: pointer to the domain object
 * @start: start of memory to peek
 * @size: size of memory to peek
 * @buffer: return buffer (must be at least size bytes)
8401
 * @flags: bitwise-OR of virDomainMemoryFlags
R
Richard W.M. Jones 已提交
8402 8403 8404 8405 8406 8407 8408 8409 8410 8411 8412 8413 8414 8415 8416 8417 8418 8419 8420 8421 8422
 *
 * This function allows you to read the contents of a domain's
 * memory.
 *
 * The memory which is read is controlled by the 'start', 'size'
 * and 'flags' parameters.
 *
 * If 'flags' is VIR_MEMORY_VIRTUAL then the 'start' and 'size'
 * parameters are interpreted as virtual memory addresses for
 * whichever task happens to be running on the domain at the
 * moment.  Although this sounds haphazard it is in fact what
 * you want in order to read Linux kernel state, because it
 * ensures that pointers in the kernel image can be interpreted
 * coherently.
 *
 * 'buffer' is the return buffer and must be at least 'size' bytes.
 * 'size' may be 0 to test if the call would succeed.
 *
 * NB. The remote driver imposes a 64K byte limit on 'size'.
 * For your program to be able to work reliably over a remote
 * connection you should split large requests to <= 65536 bytes.
M
Michal Privoznik 已提交
8423
 * However, with 0.9.13 this RPC limit has been raised to 1M byte.
8424 8425
 * Starting with version 1.0.6 the RPC limit has been raised again.
 * Now large requests up to 16M byte are supported.
R
Richard W.M. Jones 已提交
8426 8427 8428 8429
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8430 8431 8432 8433 8434
virDomainMemoryPeek(virDomainPtr dom,
                    unsigned long long start /* really 64 bits */,
                    size_t size,
                    void *buffer,
                    unsigned int flags)
R
Richard W.M. Jones 已提交
8435 8436
{
    virConnectPtr conn;
8437

8438
    VIR_DOMAIN_DEBUG(dom, "start=%lld, size=%zi, buffer=%p, flags=%x",
8439
                     start, size, buffer, flags);
R
Richard W.M. Jones 已提交
8440

8441 8442
    virResetLastError();

8443
    virCheckDomainReturn(dom, -1);
R
Richard W.M. Jones 已提交
8444 8445
    conn = dom->conn;

8446
    virCheckReadOnlyGoto(conn->flags, error);
8447

8448
    /* Note on access to physical memory: A VIR_MEMORY_PHYSICAL flag is
R
Richard W.M. Jones 已提交
8449 8450 8451 8452 8453 8454
     * a possibility.  However it isn't really useful unless the caller
     * can also access registers, particularly CR3 on x86 in order to
     * get the Page Table Directory.  Since registers are different on
     * every architecture, that would imply another call to get the
     * machine registers.
     *
8455
     * The QEMU driver handles VIR_MEMORY_VIRTUAL, mapping it
R
Richard W.M. Jones 已提交
8456 8457 8458
     * to the qemu 'memsave' command which does the virtual to physical
     * mapping inside qemu.
     *
8459 8460 8461
     * The QEMU driver also handles VIR_MEMORY_PHYSICAL, mapping it
     * to the qemu 'pmemsave' command.
     *
R
Richard W.M. Jones 已提交
8462 8463 8464 8465 8466 8467 8468 8469
     * At time of writing there is no Xen driver.  However the Xen
     * hypervisor only lets you map physical pages from other domains,
     * and so the Xen driver would have to do the virtual to physical
     * mapping by chasing 2, 3 or 4-level page tables from the PTD.
     * There is example code in libxc (xc_translate_foreign_address)
     * which does this, although we cannot copy this code directly
     * because of incompatible licensing.
     */
8470

8471 8472
    /* Exactly one of these two flags must be set.  */
    if (!(flags & VIR_MEMORY_VIRTUAL) == !(flags & VIR_MEMORY_PHYSICAL)) {
8473
        virReportInvalidArg(flags,
8474 8475
                            _("flags in %s must include VIR_MEMORY_VIRTUAL or "
                              "VIR_MEMORY_PHYSICAL"),
8476
                            __FUNCTION__);
8477
        goto error;
R
Richard W.M. Jones 已提交
8478 8479 8480
    }

    /* Allow size == 0 as an access test. */
8481 8482
    if (size > 0)
        virCheckNonNullArgGoto(buffer, error);
R
Richard W.M. Jones 已提交
8483

8484 8485
    if (conn->driver->domainMemoryPeek) {
        int ret;
8486 8487
        ret = conn->driver->domainMemoryPeek(dom, start, size,
                                             buffer, flags);
8488 8489 8490 8491
        if (ret < 0)
            goto error;
        return ret;
    }
R
Richard W.M. Jones 已提交
8492

8493
    virReportUnsupportedError();
8494

8495
 error:
8496
    virDispatchError(dom->conn);
R
Richard W.M. Jones 已提交
8497 8498 8499
    return -1;
}

8500

8501 8502 8503
/**
 * virDomainGetBlockInfo:
 * @domain: a domain object
8504
 * @disk: path to the block device, or device shorthand
8505
 * @info: pointer to a virDomainBlockInfo structure allocated by the user
8506
 * @flags: extra flags; not used yet, so callers should always pass 0
8507 8508 8509
 *
 * Extract information about a domain's block device.
 *
8510
 * The @disk parameter is either an unambiguous source name of the
8511 8512 8513 8514 8515
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
8516 8517 8518 8519 8520 8521 8522 8523 8524 8525 8526 8527 8528 8529 8530 8531 8532 8533 8534 8535 8536 8537 8538 8539 8540 8541 8542 8543 8544 8545 8546 8547 8548 8549 8550 8551 8552 8553 8554 8555 8556 8557 8558 8559 8560 8561 8562 8563 8564 8565 8566 8567 8568
 *
 * For QEMU domains, the allocation and physical virDomainBlockInfo
 * values returned will generally be the same, except when using a
 * non raw, block backing device, such as qcow2 for an active domain.
 * When the persistent domain is not active, QEMU will return the
 * default which is the same value for allocation and physical.
 *
 * Active QEMU domains can return an allocation value which is more
 * representative of the currently used blocks by the device compared
 * to the physical size of the device. Applications can use/monitor
 * the allocation value with the understanding that if the domain
 * becomes inactive during an attempt to get the value, the default
 * values will be returned. Thus, the application should check
 * after the call for the domain being inactive if the values are
 * the same. Optionally, the application could be watching for a
 * shutdown event and then ignore any values received afterwards.
 * This can be an issue when a domain is being migrated and the
 * exact timing of the domain being made inactive and check of
 * the allocation value results the default being returned. For
 * a transient domain in the similar situation, this call will return
 * -1 and an error message indicating the "domain is not running".
 *
 * The following is some pseudo code illustrating the call sequence:
 *
 *   ...
 *   virDomainPtr dom;
 *   virDomainBlockInfo info;
 *   char *device;
 *   ...
 *   // Either get a list of all domains or a specific domain
 *   // via a virDomainLookupBy*() call.
 *   //
 *   // It's also required to fill in the device pointer, but that's
 *   // specific to the implementation. For the purposes of this example
 *   // a qcow2 backed device name string would need to be provided.
 *   ...
 *   // If the following call is made on a persistent domain with a
 *   // qcow2 block backed block device, then it's possible the returned
 *   // allocation equals the physical value. In that case, the domain
 *   // that may have been active prior to calling has become inactive,
 *   // such as is the case during a domain migration. Thus once we
 *   // get data returned, check for active domain when the values are
 *   // the same.
 *   if (virDomainGetBlockInfo(dom, device, &info, 0) < 0)
 *       goto failure;
 *   if (info.allocation == info.physical) {
 *       // If the domain is no longer active,
 *       // then the defaults are being returned.
 *       if (!virDomainIsActive())
 *               goto ignore_return;
 *   }
 *   // Do something with the allocation and physical values
 *   ...
8569
 *
8570 8571 8572
 * Returns 0 in case of success and -1 in case of failure.
 */
int
8573
virDomainGetBlockInfo(virDomainPtr domain, const char *disk,
8574
                      virDomainBlockInfoPtr info, unsigned int flags)
8575 8576
{
    virConnectPtr conn;
8577

E
Eric Blake 已提交
8578
    VIR_DOMAIN_DEBUG(domain, "info=%p, flags=%x", info, flags);
8579 8580 8581

    virResetLastError();

8582 8583 8584
    if (info)
        memset(info, 0, sizeof(*info));

8585
    virCheckDomainReturn(domain, -1);
8586 8587
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(info, error);
8588 8589 8590 8591 8592

    conn = domain->conn;

    if (conn->driver->domainGetBlockInfo) {
        int ret;
8593
        ret = conn->driver->domainGetBlockInfo(domain, disk, info, flags);
8594 8595 8596 8597 8598
        if (ret < 0)
            goto error;
        return ret;
    }

8599
    virReportUnsupportedError();
8600

8601
 error:
8602 8603 8604 8605 8606
    virDispatchError(domain->conn);
    return -1;
}


8607 8608 8609 8610 8611 8612 8613 8614 8615 8616 8617
/************************************************************************
 *									*
 *		Handling of defined but not running domains		*
 *									*
 ************************************************************************/

/**
 * virDomainDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xml: the XML description for the domain, preferably in UTF-8
 *
8618 8619
 * Define a domain, but does not start it.
 * This definition is persistent, until explicitly undefined with
8620
 * virDomainUndefine(). A previous definition for this domain would be
8621
 * overridden if it already exists.
8622
 *
E
Eric Blake 已提交
8623 8624 8625 8626 8627
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation on a transient domain with the same id as the
 * domain being defined; in that case, use virDomainBlockJobAbort() to
 * stop the block copy first.
 *
8628 8629 8630
 * Returns NULL in case of error, a pointer to the domain otherwise
 */
virDomainPtr
8631 8632
virDomainDefineXML(virConnectPtr conn, const char *xml)
{
8633
    VIR_DEBUG("conn=%p, xml=%s", conn, xml);
8634

8635 8636
    virResetLastError();

8637
    virCheckConnectReturn(conn, NULL);
8638
    virCheckReadOnlyGoto(conn->flags, error);
8639
    virCheckNonNullArgGoto(xml, error);
8640

8641 8642
    if (conn->driver->domainDefineXML) {
        virDomainPtr ret;
8643
        ret = conn->driver->domainDefineXML(conn, xml);
8644 8645 8646 8647
        if (!ret)
            goto error;
        return ret;
    }
8648

8649
    virReportUnsupportedError();
8650

8651
 error:
8652
    virDispatchError(conn);
8653
    return NULL;
8654 8655
}

8656

8657 8658 8659 8660
/**
 * virDomainUndefine:
 * @domain: pointer to a defined domain
 *
O
Osier Yang 已提交
8661 8662 8663 8664 8665
 * Undefine a domain. If the domain is running, it's converted to
 * transient domain, without stopping it. If the domain is inactive,
 * the domain configuration is removed.
 *
 * If the domain has a managed save image (see
8666 8667 8668
 * virDomainHasManagedSaveImage()), or if it is inactive and has any
 * snapshot metadata (see virDomainSnapshotNum()), then the undefine will
 * fail. See virDomainUndefineFlags() for more control.
8669 8670 8671 8672
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
8673 8674
virDomainUndefine(virDomainPtr domain)
{
8675
    virConnectPtr conn;
8676

8677
    VIR_DOMAIN_DEBUG(domain);
8678

8679 8680
    virResetLastError();

8681
    virCheckDomainReturn(domain, -1);
8682
    conn = domain->conn;
8683

8684
    virCheckReadOnlyGoto(conn->flags, error);
8685

8686 8687
    if (conn->driver->domainUndefine) {
        int ret;
8688
        ret = conn->driver->domainUndefine(domain);
8689 8690 8691 8692
        if (ret < 0)
            goto error;
        return ret;
    }
8693

8694
    virReportUnsupportedError();
8695

8696
 error:
8697
    virDispatchError(domain->conn);
8698
    return -1;
8699 8700
}

8701

O
Osier Yang 已提交
8702 8703 8704
/**
 * virDomainUndefineFlags:
 * @domain: pointer to a defined domain
8705
 * @flags: bitwise-OR of supported virDomainUndefineFlagsValues
O
Osier Yang 已提交
8706 8707 8708 8709 8710 8711 8712 8713 8714
 *
 * Undefine a domain. If the domain is running, it's converted to
 * transient domain, without stopping it. If the domain is inactive,
 * the domain configuration is removed.
 *
 * If the domain has a managed save image (see virDomainHasManagedSaveImage()),
 * then including VIR_DOMAIN_UNDEFINE_MANAGED_SAVE in @flags will also remove
 * that file, and omitting the flag will cause the undefine process to fail.
 *
8715 8716 8717 8718 8719 8720 8721 8722 8723
 * If the domain is inactive and has any snapshot metadata (see
 * virDomainSnapshotNum()), then including
 * VIR_DOMAIN_UNDEFINE_SNAPSHOTS_METADATA in @flags will also remove
 * that metadata.  Omitting the flag will cause the undefine of an
 * inactive domain to fail.  Active snapshots will retain snapshot
 * metadata until the (now-transient) domain halts, regardless of
 * whether this flag is present.  On hypervisors where snapshots do
 * not use libvirt metadata, this flag has no effect.
 *
O
Osier Yang 已提交
8724 8725 8726 8727 8728 8729 8730 8731 8732 8733 8734 8735
 * Returns 0 in case of success, -1 in case of error
 */
int
virDomainUndefineFlags(virDomainPtr domain,
                       unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);

    virResetLastError();

8736
    virCheckDomainReturn(domain, -1);
O
Osier Yang 已提交
8737
    conn = domain->conn;
8738

8739
    virCheckReadOnlyGoto(conn->flags, error);
O
Osier Yang 已提交
8740 8741 8742

    if (conn->driver->domainUndefineFlags) {
        int ret;
8743
        ret = conn->driver->domainUndefineFlags(domain, flags);
O
Osier Yang 已提交
8744 8745 8746 8747 8748
        if (ret < 0)
            goto error;
        return ret;
    }

8749
    virReportUnsupportedError();
O
Osier Yang 已提交
8750

8751
 error:
O
Osier Yang 已提交
8752 8753 8754 8755 8756
    virDispatchError(domain->conn);
    return -1;
}


8757 8758 8759 8760
/**
 * virConnectNumOfDefinedDomains:
 * @conn: pointer to the hypervisor connection
 *
8761
 * Provides the number of defined but inactive domains.
8762 8763 8764 8765 8766 8767
 *
 * Returns the number of domain found or -1 in case of error
 */
int
virConnectNumOfDefinedDomains(virConnectPtr conn)
{
8768
    VIR_DEBUG("conn=%p", conn);
8769

8770 8771
    virResetLastError();

8772
    virCheckConnectReturn(conn, -1);
8773

8774
    if (conn->driver->connectNumOfDefinedDomains) {
8775
        int ret;
8776
        ret = conn->driver->connectNumOfDefinedDomains(conn);
8777 8778 8779 8780
        if (ret < 0)
            goto error;
        return ret;
    }
8781

8782
    virReportUnsupportedError();
8783

8784
 error:
8785
    virDispatchError(conn);
8786
    return -1;
8787 8788
}

8789

8790 8791 8792 8793 8794 8795
/**
 * virConnectListDefinedDomains:
 * @conn: pointer to the hypervisor connection
 * @names: pointer to an array to store the names
 * @maxnames: size of the array
 *
8796 8797
 * list the defined but inactive domains, stores the pointers to the names
 * in @names
8798
 *
8799 8800 8801 8802 8803 8804 8805 8806
 * For active domains, see virConnectListDomains().  For more control over
 * the results, see virConnectListAllDomains().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a domain can be defined between
 * a call to virConnectNumOfDefinedDomains() and this call; you are only
 * guaranteed that all currently defined domains were listed if the return
 * is less than @maxids.  The client must call free() on each returned name.
8807 8808
 */
int
8809
virConnectListDefinedDomains(virConnectPtr conn, char **const names,
8810 8811
                             int maxnames)
{
8812
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
8813

8814 8815
    virResetLastError();

8816
    virCheckConnectReturn(conn, -1);
8817 8818
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
8819

8820
    if (conn->driver->connectListDefinedDomains) {
8821
        int ret;
8822
        ret = conn->driver->connectListDefinedDomains(conn, names, maxnames);
8823 8824 8825 8826
        if (ret < 0)
            goto error;
        return ret;
    }
8827

8828
    virReportUnsupportedError();
8829

8830
 error:
8831
    virDispatchError(conn);
8832
    return -1;
8833 8834
}

8835

8836 8837 8838 8839 8840 8841 8842 8843 8844 8845 8846 8847 8848 8849 8850 8851 8852 8853 8854 8855 8856 8857 8858 8859 8860 8861 8862 8863 8864 8865 8866 8867 8868 8869 8870 8871 8872 8873 8874 8875 8876 8877 8878 8879 8880 8881 8882 8883
/**
 * virConnectListAllDomains:
 * @conn: Pointer to the hypervisor connection.
 * @domains: Pointer to a variable to store the array containing domain objects
 *           or NULL if the list is not required (just returns number of guests).
 * @flags: bitwise-OR of virConnectListAllDomainsFlags
 *
 * Collect a possibly-filtered list of all domains, and return an allocated
 * array of information for each.  This API solves the race inherent in
 * virConnectListDomains() and virConnectListDefinedDomains().
 *
 * Normally, all domains are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted domains.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a domain, and where all bits
 * within a group describe all possible domains.  Some hypervisors might
 * reject explicit bits from a group where the hypervisor cannot make a
 * distinction (for example, not all hypervisors can tell whether domains
 * have snapshots).  For a group supported by a given hypervisor, the
 * behavior when no bits of a group are set is identical to the behavior
 * when all bits in that group are set.  When setting bits from more than
 * one group, it is possible to select an impossible combination (such
 * as an inactive transient domain), in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_CONNECT_LIST_DOMAINS_ACTIVE (online
 * domains) and VIR_CONNECT_LIST_DOMAINS_INACTIVE (offline domains).
 *
 * The next group of @flags is VIR_CONNECT_LIST_DOMAINS_PERSISTENT (defined
 * domains) and VIR_CONNECT_LIST_DOMAINS_TRANSIENT (running but not defined).
 *
 * The next group of @flags covers various domain states:
 * VIR_CONNECT_LIST_DOMAINS_RUNNING, VIR_CONNECT_LIST_DOMAINS_PAUSED,
 * VIR_CONNECT_LIST_DOMAINS_SHUTOFF, and a catch-all for all other states
 * (such as crashed, this catch-all covers the possibility of adding new
 * states).
 *
 * The remaining groups cover boolean attributes commonly asked about
 * domains; they include VIR_CONNECT_LIST_DOMAINS_MANAGEDSAVE and
 * VIR_CONNECT_LIST_DOMAINS_NO_MANAGEDSAVE, for filtering based on whether
 * a managed save image exists; VIR_CONNECT_LIST_DOMAINS_AUTOSTART and
 * VIR_CONNECT_LIST_DOMAINS_NO_AUTOSTART, for filtering based on autostart;
 * VIR_CONNECT_LIST_DOMAINS_HAS_SNAPSHOT and
 * VIR_CONNECT_LIST_DOMAINS_NO_SNAPSHOT, for filtering based on whether
 * a domain has snapshots.
 *
 * Example of usage:
 *
E
Eric Blake 已提交
8884 8885 8886 8887 8888 8889 8890 8891 8892 8893 8894 8895 8896 8897
 *   virDomainPtr *domains;
 *   size_t i;
 *   int ret;
 *   unsigned int flags = VIR_CONNECT_LIST_DOMAINS_RUNNING |
 *                        VIR_CONNECT_LIST_DOMAINS_PERSISTENT;
 *   ret = virConnectListAllDomains(conn, &domains, flags);
 *   if (ret < 0)
 *       error();
 *   for (i = 0; i < ret; i++) {
 *        do_something_with_domain(domains[i]);
 *        //here or in a separate loop if needed
 *        virDomainFree(domains[i]);
 *   }
 *   free(domains);
E
Eric Blake 已提交
8898 8899 8900 8901 8902 8903
 *
 * Returns the number of domains found or -1 and sets domains to NULL in case of
 * error.  On success, the array stored into @domains is guaranteed to have an
 * extra allocated element set to NULL but not included in the return count, to
 * make iteration easier. The caller is responsible for calling virDomainFree()
 * on each array element, then calling free() on @domains.
8904 8905 8906 8907 8908 8909 8910 8911 8912 8913 8914 8915 8916
 */
int
virConnectListAllDomains(virConnectPtr conn,
                         virDomainPtr **domains,
                         unsigned int flags)
{
    VIR_DEBUG("conn=%p, domains=%p, flags=%x", conn, domains, flags);

    virResetLastError();

    if (domains)
        *domains = NULL;

8917
    virCheckConnectReturn(conn, -1);
8918

8919
    if (conn->driver->connectListAllDomains) {
8920
        int ret;
8921
        ret = conn->driver->connectListAllDomains(conn, domains, flags);
8922 8923 8924 8925 8926
        if (ret < 0)
            goto error;
        return ret;
    }

8927
    virReportUnsupportedError();
8928

8929
 error:
8930 8931 8932 8933
    virDispatchError(conn);
    return -1;
}

8934

8935 8936 8937 8938
/**
 * virDomainCreate:
 * @domain: pointer to a defined domain
 *
8939
 * Launch a defined domain. If the call succeeds the domain moves from the
8940 8941 8942
 * defined to the running domains pools.  The domain will be paused only
 * if restoring from managed state created from a paused domain.  For more
 * control, see virDomainCreateWithFlags().
8943 8944 8945 8946
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
8947 8948
virDomainCreate(virDomainPtr domain)
{
8949
    virConnectPtr conn;
8950

8951
    VIR_DOMAIN_DEBUG(domain);
8952

8953 8954
    virResetLastError();

8955
    virCheckDomainReturn(domain, -1);
8956
    conn = domain->conn;
8957

8958
    virCheckReadOnlyGoto(conn->flags, error);
8959

8960 8961
    if (conn->driver->domainCreate) {
        int ret;
8962
        ret = conn->driver->domainCreate(domain);
8963 8964 8965 8966
        if (ret < 0)
            goto error;
        return ret;
    }
8967

8968
    virReportUnsupportedError();
8969

8970
 error:
8971
    virDispatchError(domain->conn);
8972
    return -1;
8973 8974
}

8975

8976 8977 8978
/**
 * virDomainCreateWithFlags:
 * @domain: pointer to a defined domain
8979
 * @flags: bitwise-OR of supported virDomainCreateFlags
8980 8981 8982 8983
 *
 * Launch a defined domain. If the call succeeds the domain moves from the
 * defined to the running domains pools.
 *
8984 8985 8986 8987 8988 8989
 * If the VIR_DOMAIN_START_PAUSED flag is set, or if the guest domain
 * has a managed save image that requested paused state (see
 * virDomainManagedSave()) the guest domain will be started, but its
 * CPUs will remain paused. The CPUs can later be manually started
 * using virDomainResume().  In all other cases, the guest domain will
 * be running.
8990 8991 8992 8993
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
E
Eric Blake 已提交
8994
 * client application crashes / loses its connection to the
8995
 * libvirtd daemon. Any domains marked for auto destroy will
8996
 * block attempts at migration, save-to-file, or snapshots.
8997
 *
8998 8999 9000 9001 9002 9003
 * If the VIR_DOMAIN_START_BYPASS_CACHE flag is set, and there is a
 * managed save file for this domain (created by virDomainManagedSave()),
 * then libvirt will attempt to bypass the file system cache while restoring
 * the file, or fail if it cannot do so for the given system; this can allow
 * less pressure on file system cache, but also risks slowing loads from NFS.
 *
9004 9005 9006
 * If the VIR_DOMAIN_START_FORCE_BOOT flag is set, then any managed save
 * file for this domain is discarded, and the domain boots from scratch.
 *
9007 9008 9009
 * Returns 0 in case of success, -1 in case of error
 */
int
9010 9011
virDomainCreateWithFlags(virDomainPtr domain, unsigned int flags)
{
9012
    virConnectPtr conn;
9013

9014
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
9015 9016 9017

    virResetLastError();

9018
    virCheckDomainReturn(domain, -1);
9019
    conn = domain->conn;
9020

9021
    virCheckReadOnlyGoto(conn->flags, error);
9022 9023 9024

    if (conn->driver->domainCreateWithFlags) {
        int ret;
9025
        ret = conn->driver->domainCreateWithFlags(domain, flags);
9026 9027 9028 9029 9030
        if (ret < 0)
            goto error;
        return ret;
    }

9031
    virReportUnsupportedError();
9032

9033
 error:
9034 9035 9036 9037
    virDispatchError(domain->conn);
    return -1;
}

9038

9039 9040 9041 9042 9043 9044 9045 9046 9047 9048 9049 9050 9051 9052 9053 9054 9055 9056 9057 9058 9059 9060 9061 9062 9063 9064 9065 9066 9067 9068 9069 9070 9071 9072 9073 9074 9075 9076 9077 9078 9079 9080 9081 9082 9083 9084 9085 9086 9087 9088 9089 9090 9091
/**
 * virDomainCreateWithFiles:
 * @domain: pointer to a defined domain
 * @nfiles: number of file descriptors passed
 * @files: list of file descriptors passed
 * @flags: bitwise-OR of supported virDomainCreateFlags
 *
 * Launch a defined domain. If the call succeeds the domain moves from the
 * defined to the running domains pools.
 *
 * @files provides an array of file descriptors which will be
 * made available to the 'init' process of the guest. The file
 * handles exposed to the guest will be renumbered to start
 * from 3 (ie immediately following stderr). This is only
 * supported for guests which use container based virtualization
 * technology.
 *
 * If the VIR_DOMAIN_START_PAUSED flag is set, or if the guest domain
 * has a managed save image that requested paused state (see
 * virDomainManagedSave()) the guest domain will be started, but its
 * CPUs will remain paused. The CPUs can later be manually started
 * using virDomainResume().  In all other cases, the guest domain will
 * be running.
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
 * client application crashes / loses its connection to the
 * libvirtd daemon. Any domains marked for auto destroy will
 * block attempts at migration, save-to-file, or snapshots.
 *
 * If the VIR_DOMAIN_START_BYPASS_CACHE flag is set, and there is a
 * managed save file for this domain (created by virDomainManagedSave()),
 * then libvirt will attempt to bypass the file system cache while restoring
 * the file, or fail if it cannot do so for the given system; this can allow
 * less pressure on file system cache, but also risks slowing loads from NFS.
 *
 * If the VIR_DOMAIN_START_FORCE_BOOT flag is set, then any managed save
 * file for this domain is discarded, and the domain boots from scratch.
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
virDomainCreateWithFiles(virDomainPtr domain, unsigned int nfiles,
                         int *files, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "nfiles=%u, files=%p, flags=%x",
                     nfiles, files, flags);

    virResetLastError();

9092
    virCheckDomainReturn(domain, -1);
9093
    conn = domain->conn;
9094

9095
    virCheckReadOnlyGoto(conn->flags, error);
9096 9097 9098 9099 9100 9101 9102 9103 9104 9105 9106

    if (conn->driver->domainCreateWithFiles) {
        int ret;
        ret = conn->driver->domainCreateWithFiles(domain,
                                                  nfiles, files,
                                                  flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9107
    virReportUnsupportedError();
9108

9109
 error:
9110 9111 9112 9113
    virDispatchError(domain->conn);
    return -1;
}

9114

9115 9116 9117
/**
 * virDomainGetAutostart:
 * @domain: a domain object
9118
 * @autostart: the value returned
9119
 *
9120
 * Provides a boolean value indicating whether the domain
9121 9122 9123 9124 9125 9126 9127
 * configured to be automatically started when the host
 * machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virDomainGetAutostart(virDomainPtr domain,
9128 9129 9130
                      int *autostart)
{
    virConnectPtr conn;
9131 9132

    VIR_DOMAIN_DEBUG(domain, "autostart=%p", autostart);
9133

9134 9135
    virResetLastError();

9136
    virCheckDomainReturn(domain, -1);
9137
    virCheckNonNullArgGoto(autostart, error);
9138

9139 9140
    conn = domain->conn;

9141 9142
    if (conn->driver->domainGetAutostart) {
        int ret;
9143
        ret = conn->driver->domainGetAutostart(domain, autostart);
9144 9145 9146 9147
        if (ret < 0)
            goto error;
        return ret;
    }
9148

9149
    virReportUnsupportedError();
9150

9151
 error:
9152
    virDispatchError(domain->conn);
9153
    return -1;
9154 9155
}

9156

9157 9158 9159
/**
 * virDomainSetAutostart:
 * @domain: a domain object
9160
 * @autostart: whether the domain should be automatically started 0 or 1
9161 9162 9163 9164 9165 9166 9167 9168
 *
 * Configure the domain to be automatically started
 * when the host machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virDomainSetAutostart(virDomainPtr domain,
9169 9170 9171
                      int autostart)
{
    virConnectPtr conn;
9172 9173

    VIR_DOMAIN_DEBUG(domain, "autostart=%d", autostart);
9174

9175 9176
    virResetLastError();

9177
    virCheckDomainReturn(domain, -1);
9178 9179
    conn = domain->conn;

9180
    virCheckReadOnlyGoto(conn->flags, error);
9181

9182 9183
    if (conn->driver->domainSetAutostart) {
        int ret;
9184
        ret = conn->driver->domainSetAutostart(domain, autostart);
9185 9186 9187 9188
        if (ret < 0)
            goto error;
        return ret;
    }
9189

9190
    virReportUnsupportedError();
9191

9192
 error:
9193
    virDispatchError(domain->conn);
9194
    return -1;
9195 9196
}

9197

9198 9199 9200
/**
 * virDomainInjectNMI:
 * @domain: pointer to domain object, or NULL for Domain0
9201
 * @flags: extra flags; not used yet, so callers should always pass 0
9202 9203 9204 9205 9206
 *
 * Send NMI to the guest
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
9207 9208
int
virDomainInjectNMI(virDomainPtr domain, unsigned int flags)
9209 9210
{
    virConnectPtr conn;
9211
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
9212 9213 9214

    virResetLastError();

9215
    virCheckDomainReturn(domain, -1);
9216 9217
    conn = domain->conn;

9218 9219
    virCheckReadOnlyGoto(conn->flags, error);

9220 9221 9222 9223 9224 9225 9226 9227
    if (conn->driver->domainInjectNMI) {
        int ret;
        ret = conn->driver->domainInjectNMI(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9228
    virReportUnsupportedError();
9229

9230
 error:
9231 9232 9233 9234
    virDispatchError(domain->conn);
    return -1;
}

9235

9236 9237 9238 9239 9240 9241 9242
/**
 * virDomainSendKey:
 * @domain:    pointer to domain object, or NULL for Domain0
 * @codeset:   the code set of keycodes, from virKeycodeSet
 * @holdtime:  the duration (in milliseconds) that the keys will be held
 * @keycodes:  array of keycodes
 * @nkeycodes: number of keycodes, up to VIR_DOMAIN_SEND_KEY_MAX_KEYS
9243
 * @flags: extra flags; not used yet, so callers should always pass 0
9244 9245 9246 9247 9248
 *
 * Send key(s) to the guest.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
9249 9250 9251 9252 9253 9254 9255
int
virDomainSendKey(virDomainPtr domain,
                 unsigned int codeset,
                 unsigned int holdtime,
                 unsigned int *keycodes,
                 int nkeycodes,
                 unsigned int flags)
9256 9257
{
    virConnectPtr conn;
9258
    VIR_DOMAIN_DEBUG(domain, "codeset=%u, holdtime=%u, nkeycodes=%u, flags=%x",
9259 9260 9261 9262
                     codeset, holdtime, nkeycodes, flags);

    virResetLastError();

9263
    virCheckDomainReturn(domain, -1);
9264 9265 9266
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
9267 9268 9269 9270 9271 9272 9273 9274 9275 9276
    virCheckNonNullArgGoto(keycodes, error);
    virCheckPositiveArgGoto(nkeycodes, error);

    if (nkeycodes > VIR_DOMAIN_SEND_KEY_MAX_KEYS) {
        virReportInvalidArg(nkeycodes,
                            _("nkeycodes in %s must be <= %d"),
                            __FUNCTION__, VIR_DOMAIN_SEND_KEY_MAX_KEYS);
        goto error;
    }

9277 9278 9279 9280 9281 9282 9283 9284 9285
    if (conn->driver->domainSendKey) {
        int ret;
        ret = conn->driver->domainSendKey(domain, codeset, holdtime,
                                          keycodes, nkeycodes, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9286
    virReportUnsupportedError();
9287

9288
 error:
9289 9290 9291 9292
    virDispatchError(domain->conn);
    return -1;
}

9293 9294 9295 9296 9297 9298 9299 9300 9301 9302 9303 9304 9305 9306 9307 9308 9309 9310 9311 9312 9313 9314 9315 9316 9317

/**
 * virDomainSendProcessSignal:
 * @domain: pointer to domain object
 * @pid_value: a positive integer process ID, or negative integer process group ID
 * @signum: a signal from the virDomainProcessSignal enum
 * @flags: one of the virDomainProcessSignalFlag values
 *
 * Send a signal to the designated process in the guest
 *
 * The signal numbers must be taken from the virDomainProcessSignal
 * enum. These will be translated to the corresponding signal
 * number for the guest OS, by the guest agent delivering the
 * signal. If there is no mapping from virDomainProcessSignal to
 * the native OS signals, this API will report an error.
 *
 * If @pid_value is an integer greater than zero, it is
 * treated as a process ID. If @pid_value is an integer
 * less than zero, it is treated as a process group ID.
 * All the @pid_value numbers are from the container/guest
 * namespace. The value zero is not valid.
 *
 * Not all hypervisors will support sending signals to
 * arbitrary processes or process groups. If this API is
 * implemented the minimum requirement is to be able to
9318
 * use @pid_value == 1 (i.e. kill init). No other value is
9319 9320 9321 9322 9323 9324 9325 9326
 * required to be supported.
 *
 * If the @signum is VIR_DOMAIN_PROCESS_SIGNAL_NOP then this
 * API will simply report whether the process is running in
 * the container/guest.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
9327 9328 9329 9330 9331
int
virDomainSendProcessSignal(virDomainPtr domain,
                           long long pid_value,
                           unsigned int signum,
                           unsigned int flags)
9332 9333 9334 9335 9336 9337 9338
{
    virConnectPtr conn;
    VIR_DOMAIN_DEBUG(domain, "pid=%lld, signum=%u flags=%x",
                     pid_value, signum, flags);

    virResetLastError();

9339 9340
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9341 9342

    virCheckNonZeroArgGoto(pid_value, error);
9343
    virCheckReadOnlyGoto(conn->flags, error);
9344 9345 9346 9347 9348 9349 9350 9351 9352 9353 9354 9355

    if (conn->driver->domainSendProcessSignal) {
        int ret;
        ret = conn->driver->domainSendProcessSignal(domain,
                                                    pid_value,
                                                    signum,
                                                    flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9356
    virReportUnsupportedError();
9357

9358
 error:
9359 9360 9361 9362 9363
    virDispatchError(domain->conn);
    return -1;
}


9364 9365 9366 9367 9368 9369 9370
/**
 * virDomainSetVcpus:
 * @domain: pointer to domain object, or NULL for Domain0
 * @nvcpus: the new number of virtual CPUs for this domain
 *
 * Dynamically change the number of virtual CPUs used by the domain.
 * Note that this call may fail if the underlying virtualization hypervisor
9371
 * does not support it or if growing the number is arbitrarily limited.
9372
 * This function may require privileged access to the hypervisor.
9373
 *
9374 9375 9376
 * Note that if this call is executed before the guest has finished booting,
 * the guest may fail to process the change.
 *
9377
 * This command only changes the runtime configuration of the domain,
E
Eric Blake 已提交
9378 9379 9380
 * so can only be called on an active domain.  It is hypervisor-dependent
 * whether it also affects persistent configuration; for more control,
 * use virDomainSetVcpusFlags().
9381
 *
9382 9383 9384 9385 9386
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetVcpus(virDomainPtr domain, unsigned int nvcpus)
{
9387
    virConnectPtr conn;
9388 9389

    VIR_DOMAIN_DEBUG(domain, "nvcpus=%u", nvcpus);
9390

9391 9392
    virResetLastError();

9393 9394
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9395

9396
    virCheckReadOnlyGoto(conn->flags, error);
9397 9398
    virCheckNonZeroArgGoto(nvcpus, error);

9399 9400
    if (conn->driver->domainSetVcpus) {
        int ret;
9401
        ret = conn->driver->domainSetVcpus(domain, nvcpus);
9402 9403 9404 9405
        if (ret < 0)
            goto error;
        return ret;
    }
9406

9407
    virReportUnsupportedError();
9408

9409
 error:
9410
    virDispatchError(domain->conn);
9411
    return -1;
9412 9413
}

9414

E
Eric Blake 已提交
9415 9416 9417 9418
/**
 * virDomainSetVcpusFlags:
 * @domain: pointer to domain object, or NULL for Domain0
 * @nvcpus: the new number of virtual CPUs for this domain, must be at least 1
9419
 * @flags: bitwise-OR of virDomainVcpuFlags
E
Eric Blake 已提交
9420 9421 9422
 *
 * Dynamically change the number of virtual CPUs used by the domain.
 * Note that this call may fail if the underlying virtualization hypervisor
9423
 * does not support it or if growing the number is arbitrarily limited.
9424
 * This function may require privileged access to the hypervisor.
E
Eric Blake 已提交
9425
 *
9426
 * @flags may include VIR_DOMAIN_AFFECT_LIVE to affect a running
E
Eric Blake 已提交
9427
 * domain (which may fail if domain is not active), or
9428
 * VIR_DOMAIN_AFFECT_CONFIG to affect the next boot via the XML
E
Eric Blake 已提交
9429
 * description of the domain.  Both flags may be set.
9430 9431 9432 9433
 * If neither flag is specified (that is, @flags is VIR_DOMAIN_AFFECT_CURRENT),
 * then an inactive domain modifies persistent setup, while an active domain
 * is hypervisor-dependent on whether just live or both live and persistent
 * state is changed.
E
Eric Blake 已提交
9434
 *
9435 9436 9437
 * Note that if this call is executed before the guest has finished booting,
 * the guest may fail to process the change.
 *
E
Eric Blake 已提交
9438
 * If @flags includes VIR_DOMAIN_VCPU_MAXIMUM, then
9439
 * VIR_DOMAIN_AFFECT_LIVE must be clear, and only the maximum virtual
E
Eric Blake 已提交
9440 9441 9442 9443
 * CPU limit is altered; generally, this value must be less than or
 * equal to virConnectGetMaxVcpus().  Otherwise, this call affects the
 * current virtual CPU limit, which must be less than or equal to the
 * maximum limit.
9444
 *
9445 9446 9447 9448
 * If @flags includes VIR_DOMAIN_VCPU_GUEST, then the state of processors is
 * modified inside the guest instead of the hypervisor. This flag can only
 * be used with live guests and is incompatible with VIR_DOMAIN_VCPU_MAXIMUM.
 * The usage of this flag may require a guest agent configured.
9449
 *
9450
 * Not all hypervisors can support all flag combinations.
E
Eric Blake 已提交
9451 9452 9453 9454 9455 9456 9457 9458
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetVcpusFlags(virDomainPtr domain, unsigned int nvcpus,
                       unsigned int flags)
{
    virConnectPtr conn;
9459

9460
    VIR_DOMAIN_DEBUG(domain, "nvcpus=%u, flags=%x", nvcpus, flags);
E
Eric Blake 已提交
9461 9462 9463

    virResetLastError();

9464
    virCheckDomainReturn(domain, -1);
9465
    virCheckReadOnlyGoto(domain->conn->flags, error);
E
Eric Blake 已提交
9466

9467
    if (flags & VIR_DOMAIN_VCPU_GUEST &&
9468 9469 9470
        flags & VIR_DOMAIN_VCPU_MAXIMUM) {
        virReportInvalidArg(flags,
                            _("flags 'VIR_DOMAIN_VCPU_MAXIMUM' and "
9471
                              "'VIR_DOMAIN_VCPU_GUEST' in '%s' are mutually "
9472 9473 9474 9475
                              "exclusive"), __FUNCTION__);
        goto error;
    }

9476 9477
    virCheckNonZeroArgGoto(nvcpus, error);

E
Eric Blake 已提交
9478
    if ((unsigned short) nvcpus != nvcpus) {
9479
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u"), nvcpus);
E
Eric Blake 已提交
9480 9481
        goto error;
    }
E
Eric Blake 已提交
9482 9483 9484 9485
    conn = domain->conn;

    if (conn->driver->domainSetVcpusFlags) {
        int ret;
9486
        ret = conn->driver->domainSetVcpusFlags(domain, nvcpus, flags);
E
Eric Blake 已提交
9487 9488 9489 9490 9491
        if (ret < 0)
            goto error;
        return ret;
    }

9492
    virReportUnsupportedError();
E
Eric Blake 已提交
9493

9494
 error:
E
Eric Blake 已提交
9495 9496 9497 9498
    virDispatchError(domain->conn);
    return -1;
}

9499

E
Eric Blake 已提交
9500 9501 9502
/**
 * virDomainGetVcpusFlags:
 * @domain: pointer to domain object, or NULL for Domain0
9503
 * @flags: bitwise-OR of virDomainVcpuFlags
E
Eric Blake 已提交
9504 9505 9506
 *
 * Query the number of virtual CPUs used by the domain.  Note that
 * this call may fail if the underlying virtualization hypervisor does
9507
 * not support it.  This function may require privileged access to the
E
Eric Blake 已提交
9508 9509
 * hypervisor.
 *
9510 9511 9512 9513 9514 9515 9516
 * If @flags includes VIR_DOMAIN_AFFECT_LIVE, this will query a
 * running domain (which will fail if domain is not active); if
 * it includes VIR_DOMAIN_AFFECT_CONFIG, this will query the XML
 * description of the domain.  It is an error to set both flags.
 * If neither flag is set (that is, VIR_DOMAIN_AFFECT_CURRENT),
 * then the configuration queried depends on whether the domain
 * is currently running.
E
Eric Blake 已提交
9517 9518 9519
 *
 * If @flags includes VIR_DOMAIN_VCPU_MAXIMUM, then the maximum
 * virtual CPU limit is queried.  Otherwise, this call queries the
9520 9521
 * current virtual CPU count.
 *
9522
 * If @flags includes VIR_DOMAIN_VCPU_GUEST, then the state of the processors
9523
 * is queried in the guest instead of the hypervisor. This flag is only usable
9524
 * on live domains. Guest agent may be needed for this flag to be available.
E
Eric Blake 已提交
9525
 *
9526
 * Returns the number of vCPUs in case of success, -1 in case of failure.
E
Eric Blake 已提交
9527 9528 9529 9530 9531
 */
int
virDomainGetVcpusFlags(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;
9532

9533
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
E
Eric Blake 已提交
9534 9535 9536

    virResetLastError();

9537
    virCheckDomainReturn(domain, -1);
9538 9539 9540 9541
    conn = domain->conn;

    if (flags & VIR_DOMAIN_VCPU_GUEST)
        virCheckReadOnlyGoto(conn->flags, error);
E
Eric Blake 已提交
9542

9543
    /* At most one of these two flags should be set.  */
9544 9545
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
9546
        virReportInvalidArg(flags,
9547 9548
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
9549
                            __FUNCTION__);
E
Eric Blake 已提交
9550 9551 9552 9553 9554
        goto error;
    }

    if (conn->driver->domainGetVcpusFlags) {
        int ret;
9555
        ret = conn->driver->domainGetVcpusFlags(domain, flags);
E
Eric Blake 已提交
9556 9557 9558 9559 9560
        if (ret < 0)
            goto error;
        return ret;
    }

9561
    virReportUnsupportedError();
E
Eric Blake 已提交
9562

9563
 error:
E
Eric Blake 已提交
9564 9565 9566 9567
    virDispatchError(domain->conn);
    return -1;
}

9568

9569 9570 9571 9572 9573
/**
 * virDomainPinVcpu:
 * @domain: pointer to domain object, or NULL for Domain0
 * @vcpu: virtual CPU number
 * @cpumap: pointer to a bit map of real CPUs (in 8-bit bytes) (IN)
E
Eric Blake 已提交
9574 9575 9576
 *      Each bit set to 1 means that corresponding CPU is usable.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
9577
 * @maplen: number of bytes in cpumap, from 1 up to size of CPU map in
O
Osier Yang 已提交
9578 9579 9580
 *      underlying virtualization system (Xen...).
 *      If maplen < size, missing bytes are set to zero.
 *      If maplen > size, failure code is returned.
9581
 *
9582
 * Dynamically change the real CPUs which can be allocated to a virtual CPU.
9583
 * This function may require privileged access to the hypervisor.
9584
 *
9585 9586 9587
 * This command only changes the runtime configuration of the domain,
 * so can only be called on an active domain.
 *
9588 9589 9590 9591 9592 9593
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainPinVcpu(virDomainPtr domain, unsigned int vcpu,
                 unsigned char *cpumap, int maplen)
{
9594
    virConnectPtr conn;
9595 9596 9597

    VIR_DOMAIN_DEBUG(domain, "vcpu=%u, cpumap=%p, maplen=%d",
                     vcpu, cpumap, maplen);
9598

9599 9600
    virResetLastError();

9601 9602
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9603

9604
    virCheckReadOnlyGoto(conn->flags, error);
9605 9606 9607 9608
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);

    if ((unsigned short) vcpu != vcpu) {
9609
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u"), vcpu);
9610
        goto error;
9611
    }
9612

9613 9614
    if (conn->driver->domainPinVcpu) {
        int ret;
9615
        ret = conn->driver->domainPinVcpu(domain, vcpu, cpumap, maplen);
9616 9617 9618 9619
        if (ret < 0)
            goto error;
        return ret;
    }
9620

9621
    virReportUnsupportedError();
9622

9623
 error:
9624
    virDispatchError(domain->conn);
9625
    return -1;
9626 9627
}

9628

9629 9630 9631 9632 9633 9634 9635 9636 9637 9638 9639 9640
/**
 * virDomainPinVcpuFlags:
 * @domain: pointer to domain object, or NULL for Domain0
 * @vcpu: virtual CPU number
 * @cpumap: pointer to a bit map of real CPUs (in 8-bit bytes) (IN)
 *      Each bit set to 1 means that corresponding CPU is usable.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
 * @maplen: number of bytes in cpumap, from 1 up to size of CPU map in
 *      underlying virtualization system (Xen...).
 *      If maplen < size, missing bytes are set to zero.
 *      If maplen > size, failure code is returned.
9641
 * @flags: bitwise-OR of virDomainModificationImpact
9642 9643
 *
 * Dynamically change the real CPUs which can be allocated to a virtual CPU.
9644
 * This function may require privileged access to the hypervisor.
9645 9646 9647 9648 9649 9650 9651 9652 9653 9654 9655 9656
 *
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set.
 * If VIR_DOMAIN_AFFECT_LIVE is set, the change affects a running domain
 * and may fail if domain is not alive.
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
 * and will fail for transient domains. If neither flag is specified (that is,
 * @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain modifies
 * persistent setup, while an active domain is hypervisor-dependent on whether
 * just live or both live and persistent state is changed.
 * Not all hypervisors can support all flag combinations.
 *
E
Eric Blake 已提交
9657
 * See also virDomainGetVcpuPinInfo for querying this information.
9658
 *
9659 9660 9661 9662 9663 9664 9665 9666 9667
 * Returns 0 in case of success, -1 in case of failure.
 *
 */
int
virDomainPinVcpuFlags(virDomainPtr domain, unsigned int vcpu,
                      unsigned char *cpumap, int maplen, unsigned int flags)
{
    virConnectPtr conn;

9668
    VIR_DOMAIN_DEBUG(domain, "vcpu=%u, cpumap=%p, maplen=%d, flags=%x",
9669 9670
                     vcpu, cpumap, maplen, flags);

9671 9672 9673 9674
    virResetLastError();

    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9675

9676
    virCheckReadOnlyGoto(conn->flags, error);
9677 9678 9679 9680
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);

    if ((unsigned short) vcpu != vcpu) {
9681
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u"), vcpu);
9682 9683 9684 9685 9686
        goto error;
    }

    if (conn->driver->domainPinVcpuFlags) {
        int ret;
9687
        ret = conn->driver->domainPinVcpuFlags(domain, vcpu, cpumap, maplen, flags);
9688 9689 9690 9691 9692
        if (ret < 0)
            goto error;
        return ret;
    }

9693
    virReportUnsupportedError();
9694

9695
 error:
9696 9697 9698 9699
    virDispatchError(domain->conn);
    return -1;
}

9700

9701
/**
E
Eric Blake 已提交
9702
 * virDomainGetVcpuPinInfo:
9703 9704 9705 9706 9707 9708 9709 9710 9711 9712 9713 9714
 * @domain: pointer to domain object, or NULL for Domain0
 * @ncpumaps: the number of cpumap (listed first to match virDomainGetVcpus)
 * @cpumaps: pointer to a bit map of real CPUs for all vcpus of this
 *     domain (in 8-bit bytes) (OUT)
 *     It's assumed there is <ncpumaps> cpumap in cpumaps array.
 *     The memory allocated to cpumaps must be (ncpumaps * maplen) bytes
 *     (ie: calloc(ncpumaps, maplen)).
 *     One cpumap inside cpumaps has the format described in
 *     virDomainPinVcpu() API.
 *     Must not be NULL.
 * @maplen: the number of bytes in one cpumap, from 1 up to size of CPU map.
 *     Must be positive.
9715
 * @flags: bitwise-OR of virDomainModificationImpact
9716 9717 9718 9719 9720 9721 9722 9723 9724 9725
 *     Must not be VIR_DOMAIN_AFFECT_LIVE and
 *     VIR_DOMAIN_AFFECT_CONFIG concurrently.
 *
 * Query the CPU affinity setting of all virtual CPUs of domain, store it
 * in cpumaps.
 *
 * Returns the number of virtual CPUs in case of success,
 * -1 in case of failure.
 */
int
9726 9727
virDomainGetVcpuPinInfo(virDomainPtr domain, int ncpumaps,
                        unsigned char *cpumaps, int maplen, unsigned int flags)
9728 9729 9730
{
    virConnectPtr conn;

9731
    VIR_DOMAIN_DEBUG(domain, "ncpumaps=%d, cpumaps=%p, maplen=%d, flags=%x",
9732 9733 9734 9735
                     ncpumaps, cpumaps, maplen, flags);

    virResetLastError();

9736 9737
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9738

9739 9740 9741 9742
    virCheckNonNullArgGoto(cpumaps, error);
    virCheckPositiveArgGoto(ncpumaps, error);
    virCheckPositiveArgGoto(maplen, error);

E
Eric Blake 已提交
9743
    if (INT_MULTIPLY_OVERFLOW(ncpumaps, maplen)) {
9744 9745
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %d * %d"),
                       ncpumaps, maplen);
E
Eric Blake 已提交
9746 9747
        goto error;
    }
9748

9749 9750 9751
    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
9752
        virReportInvalidArg(flags,
9753 9754
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
9755
                            __FUNCTION__);
9756 9757
        goto error;
    }
9758

E
Eric Blake 已提交
9759
    if (conn->driver->domainGetVcpuPinInfo) {
9760
        int ret;
9761 9762
        ret = conn->driver->domainGetVcpuPinInfo(domain, ncpumaps,
                                                 cpumaps, maplen, flags);
9763 9764 9765 9766 9767
        if (ret < 0)
            goto error;
        return ret;
    }

9768
    virReportUnsupportedError();
9769

9770
 error:
9771 9772 9773 9774
    virDispatchError(domain->conn);
    return -1;
}

9775

9776 9777 9778 9779 9780 9781 9782 9783 9784 9785 9786 9787 9788 9789 9790 9791 9792 9793 9794 9795 9796 9797 9798 9799 9800 9801 9802 9803 9804 9805 9806 9807 9808 9809 9810 9811 9812 9813 9814 9815 9816 9817 9818
/**
 * virDomainPinEmulator:
 * @domain: pointer to domain object, or NULL for Domain0
 * @cpumap: pointer to a bit map of real CPUs (in 8-bit bytes) (IN)
 *      Each bit set to 1 means that corresponding CPU is usable.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
 * @maplen: number of bytes in cpumap, from 1 up to size of CPU map in
 *      underlying virtualization system (Xen...).
 *      If maplen < size, missing bytes are set to zero.
 *      If maplen > size, failure code is returned.
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Dynamically change the real CPUs which can be allocated to all emulator
 * threads. This function may require privileged access to the hypervisor.
 *
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set.
 * If VIR_DOMAIN_AFFECT_LIVE is set, the change affects a running domain
 * and may fail if domain is not alive.
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
 * and will fail for transient domains. If neither flag is specified (that is,
 * @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain modifies
 * persistent setup, while an active domain is hypervisor-dependent on whether
 * just live or both live and persistent state is changed.
 * Not all hypervisors can support all flag combinations.
 *
 * See also virDomainGetEmulatorPinInfo for querying this information.
 *
 * Returns 0 in case of success, -1 in case of failure.
 *
 */
int
virDomainPinEmulator(virDomainPtr domain, unsigned char *cpumap,
                     int maplen, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cpumap=%p, maplen=%d, flags=%x",
                     cpumap, maplen, flags);

    virResetLastError();

9819 9820
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9821

9822
    virCheckReadOnlyGoto(conn->flags, error);
9823

9824 9825
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);
9826 9827 9828

    if (conn->driver->domainPinEmulator) {
        int ret;
9829
        ret = conn->driver->domainPinEmulator(domain, cpumap, maplen, flags);
9830 9831 9832 9833 9834
        if (ret < 0)
            goto error;
        return ret;
    }

9835
    virReportUnsupportedError();
9836

9837
 error:
9838 9839 9840 9841
    virDispatchError(domain->conn);
    return -1;
}

9842

9843 9844 9845 9846 9847 9848 9849 9850 9851 9852 9853 9854 9855 9856 9857 9858 9859 9860 9861 9862 9863 9864 9865 9866 9867 9868 9869 9870 9871 9872 9873
/**
 * virDomainGetEmulatorPinInfo:
 * @domain: pointer to domain object, or NULL for Domain0
 * @cpumap: pointer to a bit map of real CPUs for all emulator threads of
 *     this domain (in 8-bit bytes) (OUT)
 *     There is only one cpumap for all emulator threads.
 *     Must not be NULL.
 * @maplen: the number of bytes in one cpumap, from 1 up to size of CPU map.
 *     Must be positive.
 * @flags: bitwise-OR of virDomainModificationImpact
 *     Must not be VIR_DOMAIN_AFFECT_LIVE and
 *     VIR_DOMAIN_AFFECT_CONFIG concurrently.
 *
 * Query the CPU affinity setting of all emulator threads of domain, store
 * it in cpumap.
 *
 * Returns 1 in case of success,
 * 0 in case of no emulator threads are pined to pcpus,
 * -1 in case of failure.
 */
int
virDomainGetEmulatorPinInfo(virDomainPtr domain, unsigned char *cpumap,
                            int maplen, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cpumap=%p, maplen=%d, flags=%x",
                     cpumap, maplen, flags);

    virResetLastError();

9874
    virCheckDomainReturn(domain, -1);
9875

9876 9877
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);
9878 9879 9880 9881

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
9882 9883 9884 9885
        virReportInvalidArg(flags,
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
                            __FUNCTION__);
9886 9887 9888 9889 9890 9891 9892 9893 9894 9895 9896 9897 9898
        goto error;
    }
    conn = domain->conn;

    if (conn->driver->domainGetEmulatorPinInfo) {
        int ret;
        ret = conn->driver->domainGetEmulatorPinInfo(domain, cpumap,
                                                     maplen, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9899
    virReportUnsupportedError();
9900

9901
 error:
9902 9903 9904 9905
    virDispatchError(domain->conn);
    return -1;
}

9906

9907 9908 9909 9910 9911
/**
 * virDomainGetVcpus:
 * @domain: pointer to domain object, or NULL for Domain0
 * @info: pointer to an array of virVcpuInfo structures (OUT)
 * @maxinfo: number of structures in info array
D
Dan Kenigsberg 已提交
9912
 * @cpumaps: pointer to a bit map of real CPUs for all vcpus of this
9913
 *      domain (in 8-bit bytes) (OUT)
O
Osier Yang 已提交
9914 9915 9916 9917 9918
 *      If cpumaps is NULL, then no cpumap information is returned by the API.
 *      It's assumed there is <maxinfo> cpumap in cpumaps array.
 *      The memory allocated to cpumaps must be (maxinfo * maplen) bytes
 *      (ie: calloc(maxinfo, maplen)).
 *      One cpumap inside cpumaps has the format described in
9919 9920
 *      virDomainPinVcpu() API.
 * @maplen: number of bytes in one cpumap, from 1 up to size of CPU map in
O
Osier Yang 已提交
9921 9922
 *      underlying virtualization system (Xen...).
 *      Must be zero when cpumaps is NULL and positive when it is non-NULL.
9923
 *
9924
 * Extract information about virtual CPUs of domain, store it in info array
9925 9926 9927
 * and also in cpumaps if this pointer isn't NULL.  This call may fail
 * on an inactive domain.
 *
E
Eric Blake 已提交
9928
 * See also virDomainGetVcpuPinInfo for querying just cpumaps, including on
9929
 * an inactive domain.
9930 9931 9932 9933 9934
 *
 * Returns the number of info filled in case of success, -1 in case of failure.
 */
int
virDomainGetVcpus(virDomainPtr domain, virVcpuInfoPtr info, int maxinfo,
9935
                  unsigned char *cpumaps, int maplen)
9936
{
9937
    virConnectPtr conn;
9938 9939 9940

    VIR_DOMAIN_DEBUG(domain, "info=%p, maxinfo=%d, cpumaps=%p, maplen=%d",
                     info, maxinfo, cpumaps, maplen);
9941

9942 9943
    virResetLastError();

9944
    virCheckDomainReturn(domain, -1);
9945 9946
    virCheckNonNullArgGoto(info, error);
    virCheckPositiveArgGoto(maxinfo, error);
9947 9948 9949

    /* Ensure that domainGetVcpus (aka remoteDomainGetVcpus) does not
       try to memcpy anything into a NULL pointer.  */
9950 9951 9952 9953 9954
    if (cpumaps)
        virCheckPositiveArgGoto(maplen, error);
    else
        virCheckZeroArgGoto(maplen, error);

E
Eric Blake 已提交
9955
    if (cpumaps && INT_MULTIPLY_OVERFLOW(maxinfo, maplen)) {
9956 9957
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %d * %d"),
                       maxinfo, maplen);
E
Eric Blake 已提交
9958 9959
        goto error;
    }
9960

9961 9962
    conn = domain->conn;

9963 9964
    if (conn->driver->domainGetVcpus) {
        int ret;
9965 9966
        ret = conn->driver->domainGetVcpus(domain, info, maxinfo,
                                           cpumaps, maplen);
9967 9968 9969 9970
        if (ret < 0)
            goto error;
        return ret;
    }
9971

9972
    virReportUnsupportedError();
9973

9974
 error:
9975
    virDispatchError(domain->conn);
9976
    return -1;
9977
}
9978

9979

9980 9981 9982
/**
 * virDomainGetMaxVcpus:
 * @domain: pointer to domain object
9983
 *
9984 9985
 * Provides the maximum number of virtual CPUs supported for
 * the guest VM. If the guest is inactive, this is basically
E
Eric Blake 已提交
9986
 * the same as virConnectGetMaxVcpus(). If the guest is running
9987
 * this will reflect the maximum number of virtual CPUs the
E
Eric Blake 已提交
9988
 * guest was booted with.  For more details, see virDomainGetVcpusFlags().
9989 9990 9991 9992
 *
 * Returns the maximum of virtual CPU or -1 in case of error.
 */
int
9993 9994
virDomainGetMaxVcpus(virDomainPtr domain)
{
9995
    virConnectPtr conn;
9996

9997
    VIR_DOMAIN_DEBUG(domain);
9998

9999 10000
    virResetLastError();

10001
    virCheckDomainReturn(domain, -1);
10002 10003
    conn = domain->conn;

10004 10005
    if (conn->driver->domainGetMaxVcpus) {
        int ret;
10006
        ret = conn->driver->domainGetMaxVcpus(domain);
10007 10008 10009 10010
        if (ret < 0)
            goto error;
        return ret;
    }
10011

10012
    virReportUnsupportedError();
10013

10014
 error:
10015
    virDispatchError(domain->conn);
10016
    return -1;
10017 10018
}

10019

10020 10021 10022 10023 10024
/**
 * virDomainGetSecurityLabel:
 * @domain: a domain object
 * @seclabel: pointer to a virSecurityLabel structure
 *
10025 10026 10027
 * Extract security label of an active domain. The 'label' field
 * in the @seclabel argument will be initialized to the empty
 * string if the domain is not running under a security model.
10028
 *
10029
 * Returns 0 in case of success, -1 in case of failure
10030 10031 10032 10033 10034 10035
 */
int
virDomainGetSecurityLabel(virDomainPtr domain, virSecurityLabelPtr seclabel)
{
    virConnectPtr conn;

10036 10037
    VIR_DOMAIN_DEBUG(domain, "seclabel=%p", seclabel);

10038 10039
    virResetLastError();

10040 10041
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10042

10043
    virCheckNonNullArgGoto(seclabel, error);
10044

10045 10046 10047 10048 10049 10050 10051 10052
    if (conn->driver->domainGetSecurityLabel) {
        int ret;
        ret = conn->driver->domainGetSecurityLabel(domain, seclabel);
        if (ret < 0)
            goto error;
        return ret;
    }

10053
    virReportUnsupportedError();
10054

10055
 error:
10056
    virDispatchError(domain->conn);
10057
    return -1;
10058 10059
}

10060

M
Marcelo Cerri 已提交
10061 10062 10063 10064 10065 10066 10067 10068 10069 10070 10071 10072 10073 10074 10075 10076 10077 10078 10079 10080
/**
 * virDomainGetSecurityLabelList:
 * @domain: a domain object
 * @seclabels: will be auto-allocated and filled with domains' security labels.
 * Caller must free memory on return.
 *
 * Extract the security labels of an active domain. The 'label' field
 * in the @seclabels argument will be initialized to the empty
 * string if the domain is not running under a security model.
 *
 * Returns number of elemnets in @seclabels on success, -1 in case of failure.
 */
int
virDomainGetSecurityLabelList(virDomainPtr domain,
                              virSecurityLabelPtr* seclabels)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "seclabels=%p", seclabels);

10081 10082
    virResetLastError();

10083
    virCheckDomainReturn(domain, -1);
M
Marcelo Cerri 已提交
10084

10085
    virCheckNonNullArgGoto(seclabels, error);
M
Marcelo Cerri 已提交
10086 10087 10088 10089 10090 10091 10092 10093 10094 10095 10096

    conn = domain->conn;

    if (conn->driver->domainGetSecurityLabelList) {
        int ret;
        ret = conn->driver->domainGetSecurityLabelList(domain, seclabels);
        if (ret < 0)
            goto error;
        return ret;
    }

10097
    virReportUnsupportedError();
M
Marcelo Cerri 已提交
10098

10099
 error:
M
Marcelo Cerri 已提交
10100 10101 10102
    virDispatchError(domain->conn);
    return -1;
}
10103 10104 10105 10106 10107 10108 10109 10110 10111 10112 10113 10114 10115 10116 10117 10118 10119 10120 10121 10122 10123 10124 10125 10126 10127 10128 10129 10130 10131 10132 10133 10134 10135 10136 10137 10138 10139 10140 10141 10142 10143 10144 10145 10146 10147
/**
 * virDomainSetMetadata:
 * @domain: a domain object
 * @type: type of description, from virDomainMetadataType
 * @metadata: new metadata text
 * @key: XML namespace key, or NULL
 * @uri: XML namespace URI, or NULL
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Sets the appropriate domain element given by @type to the
 * value of @description.  A @type of VIR_DOMAIN_METADATA_DESCRIPTION
 * is free-form text; VIR_DOMAIN_METADATA_TITLE is free-form, but no
 * newlines are permitted, and should be short (although the length is
 * not enforced). For these two options @key and @uri are irrelevant and
 * must be set to NULL.
 *
 * For type VIR_DOMAIN_METADATA_ELEMENT @metadata  must be well-formed
 * XML belonging to namespace defined by @uri with local name @key.
 *
 * Passing NULL for @metadata says to remove that element from the
 * domain XML (passing the empty string leaves the element present).
 *
 * The resulting metadata will be present in virDomainGetXMLDesc(),
 * as well as quick access through virDomainGetMetadata().
 *
 * @flags controls whether the live domain, persistent configuration,
 * or both will be modified.
 *
 * Returns 0 on success, -1 in case of failure.
 */
int
virDomainSetMetadata(virDomainPtr domain,
                     int type,
                     const char *metadata,
                     const char *key,
                     const char *uri,
                     unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain,
                     "type=%d, metadata='%s', key='%s', uri='%s', flags=%x",
                     type, NULLSTR(metadata), NULLSTR(key), NULLSTR(uri),
                     flags);

10148 10149
    virResetLastError();

10150
    virCheckDomainReturn(domain, -1);
10151 10152
    conn = domain->conn;

10153
    virCheckReadOnlyGoto(conn->flags, error);
10154 10155 10156 10157

    switch (type) {
    case VIR_DOMAIN_METADATA_TITLE:
        if (metadata && strchr(metadata, '\n')) {
10158
            virReportInvalidArg(metadata,
10159 10160
                                _("metadata title in %s can't contain "
                                  "newlines"),
10161 10162
                                __FUNCTION__);
            goto error;
10163 10164 10165
        }
        /* fallthrough */
    case VIR_DOMAIN_METADATA_DESCRIPTION:
10166 10167
        virCheckNullArgGoto(uri, error);
        virCheckNullArgGoto(key, error);
10168 10169
        break;
    case VIR_DOMAIN_METADATA_ELEMENT:
10170
        virCheckNonNullArgGoto(uri, error);
10171 10172
        if (metadata)
            virCheckNonNullArgGoto(key, error);
10173 10174 10175 10176 10177 10178 10179 10180 10181 10182 10183 10184 10185 10186 10187
        break;
    default:
        /* For future expansion */
        break;
    }

    if (conn->driver->domainSetMetadata) {
        int ret;
        ret = conn->driver->domainSetMetadata(domain, type, metadata, key, uri,
                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

10188
    virReportUnsupportedError();
10189

10190
 error:
10191 10192 10193 10194
    virDispatchError(domain->conn);
    return -1;
}

10195

10196 10197 10198 10199 10200 10201 10202 10203 10204 10205 10206 10207 10208 10209 10210 10211 10212 10213 10214 10215 10216 10217 10218 10219 10220 10221 10222 10223 10224 10225 10226 10227 10228 10229
/**
 * virDomainGetMetadata:
 * @domain: a domain object
 * @type: type of description, from virDomainMetadataType
 * @uri: XML namespace identifier
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Retrieves the appropriate domain element given by @type.
 * If VIR_DOMAIN_METADATA_ELEMENT is requested parameter @uri
 * must be set to the name of the namespace the requested elements
 * belong to, otherwise must be NULL.
 *
 * If an element of the domain XML is not present, the resulting
 * error will be VIR_ERR_NO_DOMAIN_METADATA.  This method forms
 * a shortcut for seeing information from virDomainSetMetadata()
 * without having to go through virDomainGetXMLDesc().
 *
 * @flags controls whether the live domain or persistent
 * configuration will be queried.
 *
 * Returns the metadata string on success (caller must free),
 * or NULL in case of failure.
 */
char *
virDomainGetMetadata(virDomainPtr domain,
                     int type,
                     const char *uri,
                     unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "type=%d, uri='%s', flags=%x",
                     type, NULLSTR(uri), flags);

10230 10231
    virResetLastError();

10232
    virCheckDomainReturn(domain, NULL);
10233 10234 10235

    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
10236
        virReportInvalidArg(flags,
10237 10238
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
10239
                            __FUNCTION__);
10240 10241 10242 10243 10244 10245
        goto error;
    }

    switch (type) {
    case VIR_DOMAIN_METADATA_TITLE:
    case VIR_DOMAIN_METADATA_DESCRIPTION:
10246
        virCheckNullArgGoto(uri, error);
10247 10248
        break;
    case VIR_DOMAIN_METADATA_ELEMENT:
10249
        virCheckNonNullArgGoto(uri, error);
10250 10251 10252 10253 10254 10255 10256 10257 10258 10259 10260 10261 10262 10263 10264
        break;
    default:
        /* For future expansion */
        break;
    }

    conn = domain->conn;

    if (conn->driver->domainGetMetadata) {
        char *ret;
        if (!(ret = conn->driver->domainGetMetadata(domain, type, uri, flags)))
            goto error;
        return ret;
    }

10265
    virReportUnsupportedError();
10266

10267
 error:
10268 10269 10270 10271
    virDispatchError(domain->conn);
    return NULL;
}

10272

10273 10274 10275 10276 10277
/**
 * virNodeGetSecurityModel:
 * @conn: a connection object
 * @secmodel: pointer to a virSecurityModel structure
 *
10278 10279 10280
 * Extract the security model of a hypervisor. The 'model' field
 * in the @secmodel argument may be initialized to the empty
 * string if the driver has not activated a security model.
10281
 *
10282
 * Returns 0 in case of success, -1 in case of failure
10283 10284 10285 10286
 */
int
virNodeGetSecurityModel(virConnectPtr conn, virSecurityModelPtr secmodel)
{
10287
    VIR_DEBUG("conn=%p secmodel=%p", conn, secmodel);
10288

10289 10290
    virResetLastError();

10291
    virCheckConnectReturn(conn, -1);
10292
    virCheckNonNullArgGoto(secmodel, error);
10293 10294 10295 10296 10297 10298 10299

    if (conn->driver->nodeGetSecurityModel) {
        int ret;
        ret = conn->driver->nodeGetSecurityModel(conn, secmodel);
        if (ret < 0)
            goto error;
        return ret;
10300 10301
    }

10302
    virReportUnsupportedError();
10303

10304
 error:
10305
    virDispatchError(conn);
10306
    return -1;
10307
}
10308

10309

10310 10311 10312 10313
/**
 * virDomainAttachDevice:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10314
 *
10315 10316
 * Create a virtual device attachment to backend.  This function,
 * having hotplug semantics, is only allowed on an active domain.
10317
 *
10318 10319 10320 10321
 * For compatibility, this method can also be used to change the media
 * in an existing CDROM/Floppy device, however, applications are
 * recommended to use the virDomainUpdateDeviceFlag method instead.
 *
10322 10323 10324
 * Returns 0 in case of success, -1 in case of failure.
 */
int
10325
virDomainAttachDevice(virDomainPtr domain, const char *xml)
10326 10327
{
    virConnectPtr conn;
10328 10329

    VIR_DOMAIN_DEBUG(domain, "xml=%s", xml);
10330

10331 10332
    virResetLastError();

10333 10334
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10335

10336
    virCheckNonNullArgGoto(xml, error);
10337
    virCheckReadOnlyGoto(conn->flags, error);
10338

10339
    if (conn->driver->domainAttachDevice) {
J
Jim Fehlig 已提交
10340
       int ret;
10341
       ret = conn->driver->domainAttachDevice(domain, xml);
J
Jim Fehlig 已提交
10342 10343 10344 10345 10346
       if (ret < 0)
          goto error;
       return ret;
    }

10347
    virReportUnsupportedError();
J
Jim Fehlig 已提交
10348

10349
 error:
J
Jim Fehlig 已提交
10350 10351 10352 10353
    virDispatchError(domain->conn);
    return -1;
}

10354

J
Jim Fehlig 已提交
10355 10356 10357 10358
/**
 * virDomainAttachDeviceFlags:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10359
 * @flags: bitwise-OR of virDomainDeviceModifyFlags
J
Jim Fehlig 已提交
10360 10361
 *
 * Attach a virtual device to a domain, using the flags parameter
10362
 * to control how the device is attached.  VIR_DOMAIN_AFFECT_CURRENT
J
Jim Fehlig 已提交
10363
 * specifies that the device allocation is made based on current domain
10364
 * state.  VIR_DOMAIN_AFFECT_LIVE specifies that the device shall be
J
Jim Fehlig 已提交
10365
 * allocated to the active domain instance only and is not added to the
10366
 * persisted domain configuration.  VIR_DOMAIN_AFFECT_CONFIG
J
Jim Fehlig 已提交
10367 10368 10369 10370 10371 10372
 * specifies that the device shall be allocated to the persisted domain
 * configuration only.  Note that the target hypervisor must return an
 * error if unable to satisfy flags.  E.g. the hypervisor driver will
 * return failure if LIVE is specified but it only supports modifying the
 * persisted device allocation.
 *
10373 10374 10375 10376
 * For compatibility, this method can also be used to change the media
 * in an existing CDROM/Floppy device, however, applications are
 * recommended to use the virDomainUpdateDeviceFlag method instead.
 *
J
Jim Fehlig 已提交
10377 10378 10379 10380 10381 10382 10383
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainAttachDeviceFlags(virDomainPtr domain,
                           const char *xml, unsigned int flags)
{
    virConnectPtr conn;
10384

10385
    VIR_DOMAIN_DEBUG(domain, "xml=%s, flags=%x", xml, flags);
J
Jim Fehlig 已提交
10386 10387 10388

    virResetLastError();

10389 10390
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10391

10392
    virCheckNonNullArgGoto(xml, error);
10393
    virCheckReadOnlyGoto(conn->flags, error);
J
Jim Fehlig 已提交
10394 10395

    if (conn->driver->domainAttachDeviceFlags) {
10396
        int ret;
J
Jim Fehlig 已提交
10397
        ret = conn->driver->domainAttachDeviceFlags(domain, xml, flags);
10398 10399 10400 10401
        if (ret < 0)
            goto error;
        return ret;
    }
10402

10403
    virReportUnsupportedError();
10404

10405
 error:
10406
    virDispatchError(domain->conn);
10407
    return -1;
10408 10409
}

10410

10411 10412 10413 10414
/**
 * virDomainDetachDevice:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10415
 *
10416 10417
 * Destroy a virtual device attachment to backend.  This function,
 * having hot-unplug semantics, is only allowed on an active domain.
10418 10419 10420 10421
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
10422
virDomainDetachDevice(virDomainPtr domain, const char *xml)
10423 10424
{
    virConnectPtr conn;
10425 10426

    VIR_DOMAIN_DEBUG(domain, "xml=%s", xml);
10427

10428 10429
    virResetLastError();

10430 10431
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10432

10433
    virCheckNonNullArgGoto(xml, error);
10434
    virCheckReadOnlyGoto(conn->flags, error);
10435

10436 10437
    if (conn->driver->domainDetachDevice) {
        int ret;
10438
        ret = conn->driver->domainDetachDevice(domain, xml);
J
Jim Fehlig 已提交
10439 10440 10441 10442 10443
         if (ret < 0)
             goto error;
         return ret;
     }

10444
    virReportUnsupportedError();
J
Jim Fehlig 已提交
10445

10446
 error:
J
Jim Fehlig 已提交
10447 10448 10449 10450
    virDispatchError(domain->conn);
    return -1;
}

10451

J
Jim Fehlig 已提交
10452 10453 10454 10455
/**
 * virDomainDetachDeviceFlags:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10456
 * @flags: bitwise-OR of virDomainDeviceModifyFlags
J
Jim Fehlig 已提交
10457 10458
 *
 * Detach a virtual device from a domain, using the flags parameter
10459
 * to control how the device is detached.  VIR_DOMAIN_AFFECT_CURRENT
J
Jim Fehlig 已提交
10460
 * specifies that the device allocation is removed based on current domain
10461
 * state.  VIR_DOMAIN_AFFECT_LIVE specifies that the device shall be
J
Jim Fehlig 已提交
10462
 * deallocated from the active domain instance only and is not from the
10463
 * persisted domain configuration.  VIR_DOMAIN_AFFECT_CONFIG
J
Jim Fehlig 已提交
10464 10465 10466 10467 10468 10469
 * specifies that the device shall be deallocated from the persisted domain
 * configuration only.  Note that the target hypervisor must return an
 * error if unable to satisfy flags.  E.g. the hypervisor driver will
 * return failure if LIVE is specified but it only supports removing the
 * persisted device allocation.
 *
E
Eric Blake 已提交
10470 10471 10472 10473
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation on the device being detached; in that case,
 * use virDomainBlockJobAbort() to stop the block copy first.
 *
10474 10475 10476 10477 10478 10479 10480 10481 10482 10483 10484 10485 10486 10487 10488 10489
 * Beware that depending on the hypervisor and device type, detaching a device
 * from a running domain may be asynchronous. That is, calling
 * virDomainDetachDeviceFlags may just request device removal while the device
 * is actually removed later (in cooperation with a guest OS). Previously,
 * this fact was ignored and the device could have been removed from domain
 * configuration before it was actually removed by the hypervisor causing
 * various failures on subsequent operations. To check whether the device was
 * successfully removed, either recheck domain configuration using
 * virDomainGetXMLDesc() or add handler for VIR_DOMAIN_EVENT_ID_DEVICE_REMOVED
 * event. In case the device is already gone when virDomainDetachDeviceFlags
 * returns, the event is delivered before this API call ends. To help existing
 * clients work better in most cases, this API will try to transform an
 * asynchronous device removal that finishes shortly after the request into
 * a synchronous removal. In other words, this API may wait a bit for the
 * removal to complete in case it was not synchronous.
 *
J
Jim Fehlig 已提交
10490 10491 10492 10493 10494 10495 10496
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainDetachDeviceFlags(virDomainPtr domain,
                           const char *xml, unsigned int flags)
{
    virConnectPtr conn;
10497

10498
    VIR_DOMAIN_DEBUG(domain, "xml=%s, flags=%x", xml, flags);
J
Jim Fehlig 已提交
10499 10500 10501

    virResetLastError();

10502 10503
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10504

10505
    virCheckNonNullArgGoto(xml, error);
10506
    virCheckReadOnlyGoto(conn->flags, error);
J
Jim Fehlig 已提交
10507 10508 10509 10510

    if (conn->driver->domainDetachDeviceFlags) {
        int ret;
        ret = conn->driver->domainDetachDeviceFlags(domain, xml, flags);
10511 10512 10513 10514 10515
        if (ret < 0)
            goto error;
        return ret;
    }

10516
    virReportUnsupportedError();
10517

10518
 error:
10519 10520 10521 10522
    virDispatchError(domain->conn);
    return -1;
}

10523

10524 10525 10526 10527
/**
 * virDomainUpdateDeviceFlags:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10528
 * @flags: bitwise-OR of virDomainDeviceModifyFlags
10529 10530
 *
 * Change a virtual device on a domain, using the flags parameter
10531
 * to control how the device is changed.  VIR_DOMAIN_AFFECT_CURRENT
10532
 * specifies that the device change is made based on current domain
10533
 * state.  VIR_DOMAIN_AFFECT_LIVE specifies that the device shall be
10534
 * changed on the active domain instance only and is not added to the
10535
 * persisted domain configuration. VIR_DOMAIN_AFFECT_CONFIG
10536 10537 10538 10539 10540 10541 10542 10543 10544 10545 10546 10547 10548 10549 10550 10551 10552
 * specifies that the device shall be changed on the persisted domain
 * configuration only.  Note that the target hypervisor must return an
 * error if unable to satisfy flags.  E.g. the hypervisor driver will
 * return failure if LIVE is specified but it only supports modifying the
 * persisted device allocation.
 *
 * This method is used for actions such changing CDROM/Floppy device
 * media, altering the graphics configuration such as password,
 * reconfiguring the NIC device backend connectivity, etc.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainUpdateDeviceFlags(virDomainPtr domain,
                           const char *xml, unsigned int flags)
{
    virConnectPtr conn;
10553

10554
    VIR_DOMAIN_DEBUG(domain, "xml=%s, flags=%x", xml, flags);
10555 10556 10557

    virResetLastError();

10558 10559
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10560

10561
    virCheckNonNullArgGoto(xml, error);
10562
    virCheckReadOnlyGoto(conn->flags, error);
10563 10564 10565 10566

    if (conn->driver->domainUpdateDeviceFlags) {
        int ret;
        ret = conn->driver->domainUpdateDeviceFlags(domain, xml, flags);
10567 10568 10569 10570
        if (ret < 0)
            goto error;
        return ret;
    }
10571

10572
    virReportUnsupportedError();
10573

10574
 error:
10575
    virDispatchError(domain->conn);
10576
    return -1;
10577
}
10578

10579

10580 10581 10582 10583 10584 10585 10586 10587 10588 10589
/**
 * virNodeGetCellsFreeMemory:
 * @conn: pointer to the hypervisor connection
 * @freeMems: pointer to the array of unsigned long long
 * @startCell: index of first cell to return freeMems info on.
 * @maxCells: Maximum number of cells for which freeMems information can
 *            be returned.
 *
 * This call returns the amount of free memory in one or more NUMA cells.
 * The @freeMems array must be allocated by the caller and will be filled
10590
 * with the amount of free memory in bytes for each cell requested,
10591 10592 10593 10594 10595 10596 10597 10598 10599 10600
 * starting with startCell (in freeMems[0]), up to either
 * (startCell + maxCells), or the number of additional cells in the node,
 * whichever is smaller.
 *
 * Returns the number of entries filled in freeMems, or -1 in case of error.
 */
int
virNodeGetCellsFreeMemory(virConnectPtr conn, unsigned long long *freeMems,
                          int startCell, int maxCells)
{
10601
    VIR_DEBUG("conn=%p, freeMems=%p, startCell=%d, maxCells=%d",
10602 10603
          conn, freeMems, startCell, maxCells);

10604 10605
    virResetLastError();

10606
    virCheckConnectReturn(conn, -1);
10607 10608 10609
    virCheckNonNullArgGoto(freeMems, error);
    virCheckPositiveArgGoto(maxCells, error);
    virCheckNonNegativeArgGoto(startCell, error);
10610

10611 10612
    if (conn->driver->nodeGetCellsFreeMemory) {
        int ret;
10613
        ret = conn->driver->nodeGetCellsFreeMemory(conn, freeMems, startCell, maxCells);
10614 10615 10616 10617
        if (ret < 0)
            goto error;
        return ret;
    }
10618

10619
    virReportUnsupportedError();
10620

10621
 error:
10622
    virDispatchError(conn);
10623 10624 10625
    return -1;
}

10626

10627 10628 10629 10630
/**
 * virNetworkGetConnect:
 * @net: pointer to a network
 *
10631
 * Provides the connection pointer associated with a network.  The
10632 10633 10634
 * reference counter on the connection is not increased by this
 * call.
 *
10635 10636 10637 10638
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the network object together.
 *
10639 10640 10641
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
10642
virNetworkGetConnect(virNetworkPtr net)
10643
{
10644
    VIR_DEBUG("net=%p", net);
10645

10646 10647
    virResetLastError();

10648 10649
    virCheckNetworkReturn(net, NULL);

10650 10651 10652
    return net->conn;
}

10653

10654 10655 10656 10657 10658 10659 10660 10661 10662 10663 10664 10665 10666 10667 10668 10669 10670 10671 10672 10673 10674 10675 10676 10677 10678 10679 10680 10681 10682 10683 10684 10685 10686 10687 10688 10689 10690 10691 10692 10693 10694 10695 10696 10697 10698 10699 10700
/**
 * virConnectListAllNetworks:
 * @conn: Pointer to the hypervisor connection.
 * @nets: Pointer to a variable to store the array containing the network
 *        objects or NULL if the list is not required (just returns number
 *        of networks).
 * @flags: bitwise-OR of virConnectListAllNetworksFlags.
 *
 * Collect the list of networks, and allocate an array to store those
 * objects. This API solves the race inherent between virConnectListNetworks
 * and virConnectListDefinedNetworks.
 *
 * Normally, all networks are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted networks.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a network, and where all bits
 * within a group describe all possible networks.
 *
 * The first group of @flags is VIR_CONNECT_LIST_NETWORKS_ACTIVE (up) and
 * VIR_CONNECT_LIST_NETWORKS_INACTIVE (down) to filter the networks by state.
 *
 * The second group of @flags is VIR_CONNECT_LIST_NETWORKS_PERSISTENT (defined)
 * and VIR_CONNECT_LIST_NETWORKS_TRANSIENT (running but not defined), to filter
 * the networks by whether they have persistent config or not.
 *
 * The third group of @flags is VIR_CONNECT_LIST_NETWORKS_AUTOSTART
 * and VIR_CONNECT_LIST_NETWORKS_NO_AUTOSTART, to filter the networks by
 * whether they are marked as autostart or not.
 *
 * Returns the number of networks found or -1 and sets @nets to  NULL in case
 * of error.  On success, the array stored into @nets is guaranteed to have an
 * extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virNetworkFree() on each array element, then calling free() on @nets.
 */
int
virConnectListAllNetworks(virConnectPtr conn,
                          virNetworkPtr **nets,
                          unsigned int flags)
{
    VIR_DEBUG("conn=%p, nets=%p, flags=%x", conn, nets, flags);

    virResetLastError();

    if (nets)
        *nets = NULL;

10701
    virCheckConnectReturn(conn, -1);
10702 10703

    if (conn->networkDriver &&
10704
        conn->networkDriver->connectListAllNetworks) {
10705
        int ret;
10706
        ret = conn->networkDriver->connectListAllNetworks(conn, nets, flags);
10707 10708 10709 10710 10711
        if (ret < 0)
            goto error;
        return ret;
    }

10712
    virReportUnsupportedError();
10713

10714
 error:
10715 10716 10717 10718 10719
    virDispatchError(conn);
    return -1;
}


10720 10721 10722 10723 10724 10725 10726 10727 10728 10729 10730
/**
 * virConnectNumOfNetworks:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of active networks.
 *
 * Returns the number of network found or -1 in case of error
 */
int
virConnectNumOfNetworks(virConnectPtr conn)
{
10731
    VIR_DEBUG("conn=%p", conn);
10732

10733 10734
    virResetLastError();

10735
    virCheckConnectReturn(conn, -1);
10736

10737
    if (conn->networkDriver && conn->networkDriver->connectNumOfNetworks) {
10738
        int ret;
10739
        ret = conn->networkDriver->connectNumOfNetworks(conn);
10740 10741 10742 10743
        if (ret < 0)
            goto error;
        return ret;
    }
10744

10745
    virReportUnsupportedError();
10746

10747
 error:
10748
    virDispatchError(conn);
10749
    return -1;
10750 10751
}

10752

10753 10754 10755 10756 10757 10758 10759 10760
/**
 * virConnectListNetworks:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of active networks
 * @maxnames: size of @names
 *
 * Collect the list of active networks, and store their names in @names
 *
10761 10762 10763 10764 10765 10766
 * For more control over the results, see virConnectListAllNetworks().
 *
 * Returns the number of networks found or -1 in case of error.  Note that
 * this command is inherently racy; a network can be started between a call
 * to virConnectNumOfNetworks() and this call; you are only guaranteed that
 * all currently active networks were listed if the return is less than
J
John Ferlan 已提交
10767
 * @maxnames. The client must call free() on each returned name.
10768 10769
 */
int
10770
virConnectListNetworks(virConnectPtr conn, char **const names, int maxnames)
10771
{
10772
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
10773

10774 10775
    virResetLastError();

10776
    virCheckConnectReturn(conn, -1);
10777 10778
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
10779

10780
    if (conn->networkDriver && conn->networkDriver->connectListNetworks) {
10781
        int ret;
10782
        ret = conn->networkDriver->connectListNetworks(conn, names, maxnames);
10783 10784 10785 10786
        if (ret < 0)
            goto error;
        return ret;
    }
10787

10788
    virReportUnsupportedError();
10789

10790
 error:
10791
    virDispatchError(conn);
10792
    return -1;
10793 10794
}

10795

10796 10797 10798 10799 10800 10801 10802 10803 10804 10805 10806
/**
 * virConnectNumOfDefinedNetworks:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of inactive networks.
 *
 * Returns the number of networks found or -1 in case of error
 */
int
virConnectNumOfDefinedNetworks(virConnectPtr conn)
{
10807
    VIR_DEBUG("conn=%p", conn);
10808

10809 10810
    virResetLastError();

10811
    virCheckConnectReturn(conn, -1);
10812

10813
    if (conn->networkDriver && conn->networkDriver->connectNumOfDefinedNetworks) {
10814
        int ret;
10815
        ret = conn->networkDriver->connectNumOfDefinedNetworks(conn);
10816 10817 10818 10819
        if (ret < 0)
            goto error;
        return ret;
    }
10820

10821
    virReportUnsupportedError();
10822

10823
 error:
10824
    virDispatchError(conn);
10825
    return -1;
10826 10827
}

10828

10829 10830 10831 10832 10833 10834 10835 10836
/**
 * virConnectListDefinedNetworks:
 * @conn: pointer to the hypervisor connection
 * @names: pointer to an array to store the names
 * @maxnames: size of the array
 *
 * list the inactive networks, stores the pointers to the names in @names
 *
10837 10838 10839 10840 10841 10842 10843
 * For more control over the results, see virConnectListAllNetworks().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a network can be defined between
 * a call to virConnectNumOfDefinedNetworks() and this call; you are only
 * guaranteed that all currently defined networks were listed if the return
 * is less than @maxnames.  The client must call free() on each returned name.
10844 10845
 */
int
10846
virConnectListDefinedNetworks(virConnectPtr conn, char **const names,
10847 10848
                              int maxnames)
{
10849
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
10850

10851 10852
    virResetLastError();

10853
    virCheckConnectReturn(conn, -1);
10854 10855
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
10856

10857
    if (conn->networkDriver && conn->networkDriver->connectListDefinedNetworks) {
10858
        int ret;
10859
        ret = conn->networkDriver->connectListDefinedNetworks(conn, names, maxnames);
10860 10861 10862 10863
        if (ret < 0)
            goto error;
        return ret;
    }
10864

10865
    virReportUnsupportedError();
10866

10867
 error:
10868
    virDispatchError(conn);
10869
    return -1;
10870 10871
}

10872

10873 10874 10875 10876 10877 10878 10879
/**
 * virNetworkLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the network
 *
 * Try to lookup a network on the given hypervisor based on its name.
 *
10880 10881
 * Returns a new network object or NULL in case of failure.  If the
 * network cannot be found, then VIR_ERR_NO_NETWORK error is raised.
10882 10883 10884 10885
 */
virNetworkPtr
virNetworkLookupByName(virConnectPtr conn, const char *name)
{
10886
    VIR_DEBUG("conn=%p, name=%s", conn, name);
10887

10888 10889
    virResetLastError();

10890
    virCheckConnectReturn(conn, NULL);
10891
    virCheckNonNullArgGoto(name, error);
10892

10893 10894
    if (conn->networkDriver && conn->networkDriver->networkLookupByName) {
        virNetworkPtr ret;
10895
        ret = conn->networkDriver->networkLookupByName(conn, name);
10896 10897 10898 10899
        if (!ret)
            goto error;
        return ret;
    }
10900

10901
    virReportUnsupportedError();
10902

10903
 error:
10904
    virDispatchError(conn);
10905
    return NULL;
10906 10907
}

10908

10909 10910 10911 10912 10913 10914 10915
/**
 * virNetworkLookupByUUID:
 * @conn: pointer to the hypervisor connection
 * @uuid: the raw UUID for the network
 *
 * Try to lookup a network on the given hypervisor based on its UUID.
 *
10916 10917
 * Returns a new network object or NULL in case of failure.  If the
 * network cannot be found, then VIR_ERR_NO_NETWORK error is raised.
10918 10919 10920 10921
 */
virNetworkPtr
virNetworkLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
{
10922
    VIR_UUID_DEBUG(conn, uuid);
10923

10924 10925
    virResetLastError();

10926
    virCheckConnectReturn(conn, NULL);
10927
    virCheckNonNullArgGoto(uuid, error);
10928

10929 10930
    if (conn->networkDriver && conn->networkDriver->networkLookupByUUID){
        virNetworkPtr ret;
10931
        ret = conn->networkDriver->networkLookupByUUID(conn, uuid);
10932 10933 10934 10935
        if (!ret)
            goto error;
        return ret;
    }
10936

10937
    virReportUnsupportedError();
10938

10939
 error:
10940
    virDispatchError(conn);
10941
    return NULL;
10942 10943
}

10944

10945 10946 10947 10948 10949 10950 10951
/**
 * virNetworkLookupByUUIDString:
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the network
 *
 * Try to lookup a network on the given hypervisor based on its UUID.
 *
10952 10953
 * Returns a new network object or NULL in case of failure.  If the
 * network cannot be found, then VIR_ERR_NO_NETWORK error is raised.
10954 10955 10956 10957 10958
 */
virNetworkPtr
virNetworkLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
    unsigned char uuid[VIR_UUID_BUFLEN];
10959
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
10960

10961 10962
    virResetLastError();

10963
    virCheckConnectReturn(conn, NULL);
10964
    virCheckNonNullArgGoto(uuidstr, error);
10965

10966
    if (virUUIDParse(uuidstr, uuid) < 0) {
10967 10968 10969
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
10970
        goto error;
10971 10972 10973
    }

    return virNetworkLookupByUUID(conn, &uuid[0]);
10974

10975
 error:
10976
    virDispatchError(conn);
10977
    return NULL;
10978 10979
}

10980

10981 10982 10983 10984 10985 10986 10987 10988 10989 10990 10991 10992 10993
/**
 * virNetworkCreateXML:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: an XML description of the network
 *
 * Create and start a new virtual network, based on an XML description
 * similar to the one returned by virNetworkGetXMLDesc()
 *
 * Returns a new network object or NULL in case of failure
 */
virNetworkPtr
virNetworkCreateXML(virConnectPtr conn, const char *xmlDesc)
{
10994
    VIR_DEBUG("conn=%p, xmlDesc=%s", conn, xmlDesc);
10995

10996 10997
    virResetLastError();

10998
    virCheckConnectReturn(conn, NULL);
10999
    virCheckNonNullArgGoto(xmlDesc, error);
11000
    virCheckReadOnlyGoto(conn->flags, error);
11001

11002 11003
    if (conn->networkDriver && conn->networkDriver->networkCreateXML) {
        virNetworkPtr ret;
11004
        ret = conn->networkDriver->networkCreateXML(conn, xmlDesc);
11005 11006 11007 11008
        if (!ret)
            goto error;
        return ret;
    }
11009

11010
    virReportUnsupportedError();
11011

11012
 error:
11013
    virDispatchError(conn);
11014
    return NULL;
11015 11016
}

11017

11018 11019 11020 11021 11022 11023 11024 11025 11026 11027
/**
 * virNetworkDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xml: the XML description for the network, preferably in UTF-8
 *
 * Define a network, but does not create it
 *
 * Returns NULL in case of error, a pointer to the network otherwise
 */
virNetworkPtr
11028 11029
virNetworkDefineXML(virConnectPtr conn, const char *xml)
{
11030
    VIR_DEBUG("conn=%p, xml=%s", conn, xml);
11031

11032 11033
    virResetLastError();

11034
    virCheckConnectReturn(conn, NULL);
11035
    virCheckReadOnlyGoto(conn->flags, error);
11036
    virCheckNonNullArgGoto(xml, error);
11037

11038 11039
    if (conn->networkDriver && conn->networkDriver->networkDefineXML) {
        virNetworkPtr ret;
11040
        ret = conn->networkDriver->networkDefineXML(conn, xml);
11041 11042 11043 11044
        if (!ret)
            goto error;
        return ret;
    }
11045

11046
    virReportUnsupportedError();
11047

11048
 error:
11049
    virDispatchError(conn);
11050
    return NULL;
11051 11052
}

11053

11054 11055 11056 11057 11058 11059 11060 11061 11062
/**
 * virNetworkUndefine:
 * @network: pointer to a defined network
 *
 * Undefine a network but does not stop it if it is running
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
11063 11064
virNetworkUndefine(virNetworkPtr network)
{
11065
    virConnectPtr conn;
11066
    VIR_DEBUG("network=%p", network);
11067

11068 11069
    virResetLastError();

11070
    virCheckNetworkReturn(network, -1);
11071
    conn = network->conn;
11072

11073
    virCheckReadOnlyGoto(conn->flags, error);
11074

11075 11076
    if (conn->networkDriver && conn->networkDriver->networkUndefine) {
        int ret;
11077
        ret = conn->networkDriver->networkUndefine(network);
11078 11079 11080 11081
        if (ret < 0)
            goto error;
        return ret;
    }
11082

11083
    virReportUnsupportedError();
11084

11085
 error:
11086 11087 11088 11089
    virDispatchError(network->conn);
    return -1;
}

11090

11091 11092 11093 11094 11095 11096 11097 11098 11099 11100 11101 11102 11103 11104 11105 11106 11107 11108 11109 11110 11111 11112 11113 11114 11115 11116 11117 11118 11119 11120 11121 11122 11123
/**
 * virNetworkUpdate:
 * @network: pointer to a defined network
 * @section: which section of the network to update
 *           (see virNetworkUpdateSection for descriptions)
 * @command: what action to perform (add/delete/modify)
 *           (see virNetworkUpdateCommand for descriptions)
 * @parentIndex: which parent element, if there are multiple parents
 *           of the same type (e.g. which <ip> element when modifying
 *           a <dhcp>/<host> element), or "-1" for "don't care" or
 *           "automatically find appropriate one".
 * @xml: the XML description for the network, preferably in UTF-8
 * @flags: bitwise OR of virNetworkUpdateFlags.
 *
 * Update the definition of an existing network, either its live
 * running state, its persistent configuration, or both.
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
virNetworkUpdate(virNetworkPtr network,
                 unsigned int command, /* virNetworkUpdateCommand */
                 unsigned int section, /* virNetworkUpdateSection */
                 int parentIndex,
                 const char *xml,
                 unsigned int flags)
{
    virConnectPtr conn;
    VIR_DEBUG("network=%p, section=%d, parentIndex=%d, xml=%s, flags=0x%x",
              network, section, parentIndex, xml, flags);

    virResetLastError();

11124
    virCheckNetworkReturn(network, -1);
11125 11126
    conn = network->conn;

11127
    virCheckReadOnlyGoto(conn->flags, error);
11128 11129 11130 11131 11132 11133 11134 11135 11136 11137 11138
    virCheckNonNullArgGoto(xml, error);

    if (conn->networkDriver && conn->networkDriver->networkUpdate) {
        int ret;
        ret = conn->networkDriver->networkUpdate(network, section, command,
                                                 parentIndex, xml, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

11139
    virReportUnsupportedError();
11140

11141
 error:
11142
    virDispatchError(network->conn);
11143
    return -1;
11144 11145
}

11146

11147 11148 11149 11150 11151 11152 11153 11154 11155 11156
/**
 * virNetworkCreate:
 * @network: pointer to a defined network
 *
 * Create and start a defined network. If the call succeed the network
 * moves from the defined to the running networks pools.
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
11157 11158
virNetworkCreate(virNetworkPtr network)
{
11159
    virConnectPtr conn;
11160
    VIR_DEBUG("network=%p", network);
11161

11162 11163
    virResetLastError();

11164
    virCheckNetworkReturn(network, -1);
11165
    conn = network->conn;
11166

11167
    virCheckReadOnlyGoto(conn->flags, error);
11168

11169 11170
    if (conn->networkDriver && conn->networkDriver->networkCreate) {
        int ret;
11171
        ret = conn->networkDriver->networkCreate(network);
11172 11173 11174 11175
        if (ret < 0)
            goto error;
        return ret;
    }
11176

11177
    virReportUnsupportedError();
11178

11179
 error:
11180
    virDispatchError(network->conn);
11181
    return -1;
11182 11183
}

11184

11185 11186 11187 11188 11189
/**
 * virNetworkDestroy:
 * @network: a network object
 *
 * Destroy the network object. The running instance is shutdown if not down
11190 11191 11192
 * already and all resources used by it are given back to the hypervisor. This
 * does not free the associated virNetworkPtr object.
 * This function may require privileged access
11193 11194 11195 11196 11197 11198 11199
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNetworkDestroy(virNetworkPtr network)
{
    virConnectPtr conn;
11200
    VIR_DEBUG("network=%p", network);
11201

11202 11203
    virResetLastError();

11204
    virCheckNetworkReturn(network, -1);
11205
    conn = network->conn;
11206

11207
    virCheckReadOnlyGoto(conn->flags, error);
11208

11209 11210
    if (conn->networkDriver && conn->networkDriver->networkDestroy) {
        int ret;
11211
        ret = conn->networkDriver->networkDestroy(network);
11212 11213 11214 11215
        if (ret < 0)
            goto error;
        return ret;
    }
11216

11217
    virReportUnsupportedError();
11218

11219
 error:
11220
    virDispatchError(network->conn);
11221
    return -1;
11222 11223
}

11224

11225 11226 11227 11228 11229 11230 11231 11232 11233 11234 11235 11236
/**
 * virNetworkFree:
 * @network: a network object
 *
 * Free the network object. The running instance is kept alive.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNetworkFree(virNetworkPtr network)
{
11237
    VIR_DEBUG("network=%p", network);
11238

11239 11240
    virResetLastError();

11241 11242
    virCheckNetworkReturn(network, -1);

11243
    virObjectUnref(network);
11244
    return 0;
11245 11246
}

11247

11248 11249
/**
 * virNetworkRef:
D
Daniel Veillard 已提交
11250
 * @network: the network to hold a reference on
11251 11252 11253 11254 11255 11256 11257 11258 11259 11260 11261
 *
 * Increment the reference count on the network. For each
 * additional call to this method, there shall be a corresponding
 * call to virNetworkFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a network would increment
 * the reference count.
D
Daniel Veillard 已提交
11262 11263
 *
 * Returns 0 in case of success, -1 in case of failure.
11264 11265 11266 11267
 */
int
virNetworkRef(virNetworkPtr network)
{
11268 11269 11270
    VIR_DEBUG("network=%p refs=%d", network,
              network ? network->object.u.s.refs : 0);

11271 11272
    virResetLastError();

11273 11274
    virCheckNetworkReturn(network, -1);

11275
    virObjectRef(network);
11276 11277 11278
    return 0;
}

11279

11280 11281 11282 11283 11284 11285 11286 11287 11288 11289 11290 11291
/**
 * virNetworkGetName:
 * @network: a network object
 *
 * Get the public name for that network
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the network object.
 */
const char *
virNetworkGetName(virNetworkPtr network)
{
11292
    VIR_DEBUG("network=%p", network);
11293

11294 11295
    virResetLastError();

11296 11297
    virCheckNetworkReturn(network, NULL);

11298
    return network->name;
11299 11300
}

11301

11302 11303 11304 11305 11306 11307 11308 11309 11310 11311 11312 11313
/**
 * virNetworkGetUUID:
 * @network: a network object
 * @uuid: pointer to a VIR_UUID_BUFLEN bytes array
 *
 * Get the UUID for a network
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkGetUUID(virNetworkPtr network, unsigned char *uuid)
{
11314
    VIR_DEBUG("network=%p, uuid=%p", network, uuid);
11315

11316 11317
    virResetLastError();

11318
    virCheckNetworkReturn(network, -1);
11319
    virCheckNonNullArgGoto(uuid, error);
11320 11321 11322

    memcpy(uuid, &network->uuid[0], VIR_UUID_BUFLEN);

11323
    return 0;
11324

11325
 error:
11326
    virDispatchError(network->conn);
11327
    return -1;
11328 11329
}

11330

11331 11332 11333 11334 11335 11336 11337 11338 11339 11340 11341 11342 11343
/**
 * virNetworkGetUUIDString:
 * @network: a network object
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
 *
 * Get the UUID for a network as string. For more information about
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkGetUUIDString(virNetworkPtr network, char *buf)
{
11344
    VIR_DEBUG("network=%p, buf=%p", network, buf);
11345

11346 11347
    virResetLastError();

11348
    virCheckNetworkReturn(network, -1);
11349
    virCheckNonNullArgGoto(buf, error);
11350

E
Eric Blake 已提交
11351
    virUUIDFormat(network->uuid, buf);
11352
    return 0;
11353

11354
 error:
11355
    virDispatchError(network->conn);
11356
    return -1;
11357 11358
}

11359

11360 11361 11362
/**
 * virNetworkGetXMLDesc:
 * @network: a network object
11363
 * @flags: bitwise-OR of virNetworkXMLFlags
11364 11365 11366 11367
 *
 * Provide an XML description of the network. The description may be reused
 * later to relaunch the network with virNetworkCreateXML().
 *
11368 11369 11370 11371 11372
 * Normally, if a network included a physical function, the output includes
 * all virtual functions tied to that physical interface.  If @flags includes
 * VIR_NETWORK_XML_INACTIVE, then the expansion of virtual interfaces is
 * not performed.
 *
11373 11374 11375 11376
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
11377
virNetworkGetXMLDesc(virNetworkPtr network, unsigned int flags)
11378
{
11379
    virConnectPtr conn;
11380
    VIR_DEBUG("network=%p, flags=%x", network, flags);
11381

11382 11383
    virResetLastError();

11384
    virCheckNetworkReturn(network, NULL);
11385 11386
    conn = network->conn;

11387
    if (conn->networkDriver && conn->networkDriver->networkGetXMLDesc) {
11388
        char *ret;
11389
        ret = conn->networkDriver->networkGetXMLDesc(network, flags);
11390 11391 11392 11393
        if (!ret)
            goto error;
        return ret;
    }
11394

11395
    virReportUnsupportedError();
11396

11397
 error:
11398
    virDispatchError(network->conn);
11399
    return NULL;
11400
}
11401

11402

11403 11404 11405 11406
/**
 * virNetworkGetBridgeName:
 * @network: a network object
 *
11407
 * Provides a bridge interface name to which a domain may connect
11408 11409 11410 11411 11412 11413 11414 11415
 * a network interface in order to join the network.
 *
 * Returns a 0 terminated interface name, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
virNetworkGetBridgeName(virNetworkPtr network)
{
11416
    virConnectPtr conn;
11417
    VIR_DEBUG("network=%p", network);
11418

11419 11420
    virResetLastError();

11421
    virCheckNetworkReturn(network, NULL);
11422 11423
    conn = network->conn;

11424 11425
    if (conn->networkDriver && conn->networkDriver->networkGetBridgeName) {
        char *ret;
11426
        ret = conn->networkDriver->networkGetBridgeName(network);
11427 11428 11429 11430
        if (!ret)
            goto error;
        return ret;
    }
11431

11432
    virReportUnsupportedError();
11433

11434
 error:
11435
    virDispatchError(network->conn);
11436
    return NULL;
11437
}
11438

11439

11440 11441 11442
/**
 * virNetworkGetAutostart:
 * @network: a network object
11443
 * @autostart: the value returned
11444
 *
11445
 * Provides a boolean value indicating whether the network
11446 11447 11448 11449 11450 11451 11452
 * configured to be automatically started when the host
 * machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkGetAutostart(virNetworkPtr network,
11453 11454 11455
                       int *autostart)
{
    virConnectPtr conn;
11456
    VIR_DEBUG("network=%p, autostart=%p", network, autostart);
11457

11458 11459
    virResetLastError();

11460
    virCheckNetworkReturn(network, -1);
11461
    virCheckNonNullArgGoto(autostart, error);
11462

11463 11464
    conn = network->conn;

11465 11466
    if (conn->networkDriver && conn->networkDriver->networkGetAutostart) {
        int ret;
11467
        ret = conn->networkDriver->networkGetAutostart(network, autostart);
11468 11469 11470 11471
        if (ret < 0)
            goto error;
        return ret;
    }
11472

11473
    virReportUnsupportedError();
11474

11475
 error:
11476
    virDispatchError(network->conn);
11477
    return -1;
11478 11479
}

11480

11481 11482 11483
/**
 * virNetworkSetAutostart:
 * @network: a network object
11484
 * @autostart: whether the network should be automatically started 0 or 1
11485 11486 11487 11488 11489 11490 11491 11492
 *
 * Configure the network to be automatically started
 * when the host machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkSetAutostart(virNetworkPtr network,
11493 11494 11495
                       int autostart)
{
    virConnectPtr conn;
11496
    VIR_DEBUG("network=%p, autostart=%d", network, autostart);
11497

11498 11499
    virResetLastError();

11500
    virCheckNetworkReturn(network, -1);
11501 11502
    conn = network->conn;

11503 11504
    virCheckReadOnlyGoto(conn->flags, error);

11505 11506
    if (conn->networkDriver && conn->networkDriver->networkSetAutostart) {
        int ret;
11507
        ret = conn->networkDriver->networkSetAutostart(network, autostart);
11508 11509 11510 11511
        if (ret < 0)
            goto error;
        return ret;
    }
11512

11513
    virReportUnsupportedError();
11514

11515
 error:
11516
    virDispatchError(network->conn);
11517
    return -1;
11518
}
11519

11520

D
Daniel Veillard 已提交
11521 11522
/**
 * virInterfaceGetConnect:
L
Laine Stump 已提交
11523
 * @iface: pointer to an interface
D
Daniel Veillard 已提交
11524 11525 11526 11527 11528 11529 11530 11531 11532 11533 11534 11535
 *
 * Provides the connection pointer associated with an interface.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the interface object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
11536
virInterfaceGetConnect(virInterfacePtr iface)
D
Daniel Veillard 已提交
11537
{
11538
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11539 11540 11541

    virResetLastError();

11542 11543
    virCheckInterfaceReturn(iface, NULL);

11544
    return iface->conn;
D
Daniel Veillard 已提交
11545 11546
}

11547

11548 11549 11550 11551 11552 11553 11554 11555 11556 11557 11558 11559 11560 11561 11562 11563 11564 11565 11566 11567 11568 11569 11570 11571 11572 11573 11574 11575 11576 11577 11578 11579 11580 11581 11582 11583 11584 11585 11586
/**
 * virConnectListAllInterfaces:
 * @conn: Pointer to the hypervisor connection.
 * @ifaces: Pointer to a variable to store the array containing the interface
 *          objects or NULL if the list is not required (just returns number
 *          of interfaces).
 * @flags: bitwise-OR of virConnectListAllInterfacesFlags.
 *
 * Collect the list of interfaces, and allocate an array to store those
 * objects. This API solves the race inherent between virConnectListInterfaces
 * and virConnectListDefinedInterfaces.
 *
 * Normally, all interfaces are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted interfaces.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a interface, and where all bits
 * within a group describe all possible interfaces.
 *
 * The only group of @flags is VIR_CONNECT_LIST_INTERFACES_ACTIVE (up) and
 * VIR_CONNECT_LIST_INTERFACES_INACTIVE (down) to filter the interfaces by state.
 *
 * Returns the number of interfaces found or -1 and sets @ifaces to  NULL in case
 * of error.  On success, the array stored into @ifaces is guaranteed to have an
 * extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virStorageInterfaceFree() on each array element, then calling free() on @ifaces.
 */
int
virConnectListAllInterfaces(virConnectPtr conn,
                            virInterfacePtr **ifaces,
                            unsigned int flags)
{
    VIR_DEBUG("conn=%p, ifaces=%p, flags=%x", conn, ifaces, flags);

    virResetLastError();

    if (ifaces)
        *ifaces = NULL;

11587
    virCheckConnectReturn(conn, -1);
11588 11589

    if (conn->interfaceDriver &&
11590
        conn->interfaceDriver->connectListAllInterfaces) {
11591
        int ret;
11592
        ret = conn->interfaceDriver->connectListAllInterfaces(conn, ifaces, flags);
11593 11594 11595 11596 11597
        if (ret < 0)
            goto error;
        return ret;
    }

11598
    virReportUnsupportedError();
11599

11600
 error:
11601 11602 11603 11604
    virDispatchError(conn);
    return -1;
}

11605

D
Daniel Veillard 已提交
11606 11607 11608 11609
/**
 * virConnectNumOfInterfaces:
 * @conn: pointer to the hypervisor connection
 *
11610
 * Provides the number of active interfaces on the physical host.
D
Daniel Veillard 已提交
11611
 *
11612
 * Returns the number of active interfaces found or -1 in case of error
D
Daniel Veillard 已提交
11613 11614 11615 11616
 */
int
virConnectNumOfInterfaces(virConnectPtr conn)
{
11617
    VIR_DEBUG("conn=%p", conn);
D
Daniel Veillard 已提交
11618 11619 11620

    virResetLastError();

11621
    virCheckConnectReturn(conn, -1);
D
Daniel Veillard 已提交
11622

11623
    if (conn->interfaceDriver && conn->interfaceDriver->connectNumOfInterfaces) {
D
Daniel Veillard 已提交
11624
        int ret;
11625
        ret = conn->interfaceDriver->connectNumOfInterfaces(conn);
D
Daniel Veillard 已提交
11626 11627 11628 11629 11630
        if (ret < 0)
            goto error;
        return ret;
    }

11631
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11632

11633
 error:
11634
    virDispatchError(conn);
D
Daniel Veillard 已提交
11635 11636 11637
    return -1;
}

11638

D
Daniel Veillard 已提交
11639 11640 11641 11642 11643 11644
/**
 * virConnectListInterfaces:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of interfaces
 * @maxnames: size of @names
 *
11645 11646
 * Collect the list of active physical host interfaces,
 * and store their names in @names
D
Daniel Veillard 已提交
11647
 *
11648 11649 11650 11651 11652 11653
 * For more control over the results, see virConnectListAllInterfaces().
 *
 * Returns the number of interfaces found or -1 in case of error.  Note that
 * this command is inherently racy; a interface can be started between a call
 * to virConnectNumOfInterfaces() and this call; you are only guaranteed that
 * all currently active interfaces were listed if the return is less than
J
John Ferlan 已提交
11654
 * @maxnames. The client must call free() on each returned name.
D
Daniel Veillard 已提交
11655 11656 11657 11658
 */
int
virConnectListInterfaces(virConnectPtr conn, char **const names, int maxnames)
{
11659
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
D
Daniel Veillard 已提交
11660 11661 11662

    virResetLastError();

11663
    virCheckConnectReturn(conn, -1);
11664 11665
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
D
Daniel Veillard 已提交
11666

11667
    if (conn->interfaceDriver && conn->interfaceDriver->connectListInterfaces) {
D
Daniel Veillard 已提交
11668
        int ret;
11669
        ret = conn->interfaceDriver->connectListInterfaces(conn, names, maxnames);
D
Daniel Veillard 已提交
11670 11671 11672 11673 11674
        if (ret < 0)
            goto error;
        return ret;
    }

11675
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11676

11677
 error:
11678
    virDispatchError(conn);
D
Daniel Veillard 已提交
11679 11680 11681
    return -1;
}

11682

11683 11684 11685 11686 11687 11688 11689 11690 11691 11692 11693
/**
 * virConnectNumOfDefinedInterfaces:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of defined (inactive) interfaces on the physical host.
 *
 * Returns the number of defined interface found or -1 in case of error
 */
int
virConnectNumOfDefinedInterfaces(virConnectPtr conn)
{
11694
    VIR_DEBUG("conn=%p", conn);
11695 11696 11697

    virResetLastError();

11698
    virCheckConnectReturn(conn, -1);
11699

11700
    if (conn->interfaceDriver && conn->interfaceDriver->connectNumOfDefinedInterfaces) {
11701
        int ret;
11702
        ret = conn->interfaceDriver->connectNumOfDefinedInterfaces(conn);
11703 11704 11705 11706 11707
        if (ret < 0)
            goto error;
        return ret;
    }

11708
    virReportUnsupportedError();
11709

11710
 error:
11711
    virDispatchError(conn);
11712 11713 11714
    return -1;
}

11715

11716 11717 11718 11719 11720 11721 11722 11723 11724
/**
 * virConnectListDefinedInterfaces:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of interfaces
 * @maxnames: size of @names
 *
 * Collect the list of defined (inactive) physical host interfaces,
 * and store their names in @names.
 *
11725 11726 11727 11728 11729 11730 11731
 * For more control over the results, see virConnectListAllInterfaces().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a interface can be defined between
 * a call to virConnectNumOfDefinedInterfaces() and this call; you are only
 * guaranteed that all currently defined interfaces were listed if the return
 * is less than @maxnames.  The client must call free() on each returned name.
11732 11733 11734 11735 11736 11737
 */
int
virConnectListDefinedInterfaces(virConnectPtr conn,
                                char **const names,
                                int maxnames)
{
11738
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
11739 11740 11741

    virResetLastError();

11742
    virCheckConnectReturn(conn, -1);
11743 11744
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
11745

11746
    if (conn->interfaceDriver && conn->interfaceDriver->connectListDefinedInterfaces) {
11747
        int ret;
11748
        ret = conn->interfaceDriver->connectListDefinedInterfaces(conn, names, maxnames);
11749 11750 11751 11752 11753
        if (ret < 0)
            goto error;
        return ret;
    }

11754
    virReportUnsupportedError();
11755

11756
 error:
11757
    virDispatchError(conn);
11758 11759 11760
    return -1;
}

11761

D
Daniel Veillard 已提交
11762 11763 11764 11765 11766 11767 11768 11769 11770 11771 11772 11773 11774
/**
 * virInterfaceLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the interface
 *
 * Try to lookup an interface on the given hypervisor based on its name.
 *
 * Returns a new interface object or NULL in case of failure.  If the
 * interface cannot be found, then VIR_ERR_NO_INTERFACE error is raised.
 */
virInterfacePtr
virInterfaceLookupByName(virConnectPtr conn, const char *name)
{
11775
    VIR_DEBUG("conn=%p, name=%s", conn, name);
D
Daniel Veillard 已提交
11776 11777 11778

    virResetLastError();

11779
    virCheckConnectReturn(conn, NULL);
11780
    virCheckNonNullArgGoto(name, error);
D
Daniel Veillard 已提交
11781 11782 11783

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceLookupByName) {
        virInterfacePtr ret;
11784
        ret = conn->interfaceDriver->interfaceLookupByName(conn, name);
D
Daniel Veillard 已提交
11785 11786 11787 11788 11789
        if (!ret)
            goto error;
        return ret;
    }

11790
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11791

11792
 error:
11793
    virDispatchError(conn);
D
Daniel Veillard 已提交
11794 11795 11796
    return NULL;
}

11797

D
Daniel Veillard 已提交
11798 11799 11800 11801 11802 11803 11804 11805 11806 11807 11808 11809 11810
/**
 * virInterfaceLookupByMACString:
 * @conn: pointer to the hypervisor connection
 * @macstr: the MAC for the interface (null-terminated ASCII format)
 *
 * Try to lookup an interface on the given hypervisor based on its MAC.
 *
 * Returns a new interface object or NULL in case of failure.  If the
 * interface cannot be found, then VIR_ERR_NO_INTERFACE error is raised.
 */
virInterfacePtr
virInterfaceLookupByMACString(virConnectPtr conn, const char *macstr)
{
11811
    VIR_DEBUG("conn=%p, macstr=%s", conn, macstr);
D
Daniel Veillard 已提交
11812 11813 11814

    virResetLastError();

11815
    virCheckConnectReturn(conn, NULL);
11816
    virCheckNonNullArgGoto(macstr, error);
D
Daniel Veillard 已提交
11817 11818 11819

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceLookupByMACString) {
        virInterfacePtr ret;
11820
        ret = conn->interfaceDriver->interfaceLookupByMACString(conn, macstr);
D
Daniel Veillard 已提交
11821 11822 11823 11824 11825
        if (!ret)
            goto error;
        return ret;
    }

11826
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11827

11828
 error:
11829
    virDispatchError(conn);
D
Daniel Veillard 已提交
11830 11831 11832
    return NULL;
}

11833

D
Daniel Veillard 已提交
11834 11835
/**
 * virInterfaceGetName:
L
Laine Stump 已提交
11836
 * @iface: an interface object
D
Daniel Veillard 已提交
11837 11838 11839 11840 11841 11842 11843
 *
 * Get the public name for that interface
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the interface object.
 */
const char *
11844
virInterfaceGetName(virInterfacePtr iface)
D
Daniel Veillard 已提交
11845
{
11846
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11847 11848 11849

    virResetLastError();

11850 11851
    virCheckInterfaceReturn(iface, NULL);

11852
    return iface->name;
D
Daniel Veillard 已提交
11853 11854
}

11855

D
Daniel Veillard 已提交
11856 11857
/**
 * virInterfaceGetMACString:
L
Laine Stump 已提交
11858
 * @iface: an interface object
D
Daniel Veillard 已提交
11859
 *
L
Laine Stump 已提交
11860
 * Get the MAC for an interface as string. For more information about
D
Daniel Veillard 已提交
11861 11862 11863 11864 11865 11866 11867
 * MAC see RFC4122.
 *
 * Returns a pointer to the MAC address (in null-terminated ASCII
 * format) or NULL, the string need not be deallocated its lifetime
 * will be the same as the interface object.
 */
const char *
11868
virInterfaceGetMACString(virInterfacePtr iface)
D
Daniel Veillard 已提交
11869
{
11870
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11871 11872 11873

    virResetLastError();

11874 11875
    virCheckInterfaceReturn(iface, NULL);

11876
    return iface->mac;
D
Daniel Veillard 已提交
11877 11878
}

11879

D
Daniel Veillard 已提交
11880 11881
/**
 * virInterfaceGetXMLDesc:
L
Laine Stump 已提交
11882
 * @iface: an interface object
11883
 * @flags: bitwise-OR of extraction flags. Current valid bits:
11884 11885 11886 11887
 *
 *      VIR_INTERFACE_XML_INACTIVE - return the static configuration,
 *                                   suitable for use redefining the
 *                                   interface via virInterfaceDefineXML()
D
Daniel Veillard 已提交
11888
 *
11889 11890 11891 11892 11893
 * Provide an XML description of the interface. If
 * VIR_INTERFACE_XML_INACTIVE is set, the description may be reused
 * later to redefine the interface with virInterfaceDefineXML(). If it
 * is not set, the ip address and netmask will be the current live
 * setting of the interface, not the settings from the config files.
D
Daniel Veillard 已提交
11894 11895 11896 11897 11898
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
11899
virInterfaceGetXMLDesc(virInterfacePtr iface, unsigned int flags)
D
Daniel Veillard 已提交
11900 11901
{
    virConnectPtr conn;
11902
    VIR_DEBUG("iface=%p, flags=%x", iface, flags);
D
Daniel Veillard 已提交
11903 11904 11905

    virResetLastError();

11906
    virCheckInterfaceReturn(iface, NULL);
11907
    conn = iface->conn;
D
Daniel Veillard 已提交
11908 11909 11910

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceGetXMLDesc) {
        char *ret;
11911
        ret = conn->interfaceDriver->interfaceGetXMLDesc(iface, flags);
D
Daniel Veillard 已提交
11912 11913 11914 11915 11916
        if (!ret)
            goto error;
        return ret;
    }

11917
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11918

11919
 error:
11920
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
11921 11922 11923
    return NULL;
}

11924

D
Daniel Veillard 已提交
11925 11926 11927 11928
/**
 * virInterfaceDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xml: the XML description for the interface, preferably in UTF-8
11929
 * @flags: extra flags; not used yet, so callers should always pass 0
D
Daniel Veillard 已提交
11930
 *
11931 11932 11933 11934 11935 11936 11937 11938 11939 11940 11941
 * Define an interface (or modify existing interface configuration).
 *
 * Normally this change in the interface configuration is immediately
 * permanent/persistent, but if virInterfaceChangeBegin() has been
 * previously called (i.e. if an interface config transaction is
 * open), the new interface definition will only become permanent if
 * virInterfaceChangeCommit() is called prior to the next reboot of
 * the system running libvirtd. Prior to that time, it can be
 * explicitly removed using virInterfaceChangeRollback(), or will be
 * automatically removed during the next reboot of the system running
 * libvirtd.
D
Daniel Veillard 已提交
11942 11943 11944 11945 11946 11947
 *
 * Returns NULL in case of error, a pointer to the interface otherwise
 */
virInterfacePtr
virInterfaceDefineXML(virConnectPtr conn, const char *xml, unsigned int flags)
{
11948
    VIR_DEBUG("conn=%p, xml=%s, flags=%x", conn, xml, flags);
D
Daniel Veillard 已提交
11949 11950 11951

    virResetLastError();

11952
    virCheckConnectReturn(conn, NULL);
11953
    virCheckReadOnlyGoto(conn->flags, error);
11954
    virCheckNonNullArgGoto(xml, error);
D
Daniel Veillard 已提交
11955 11956 11957

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceDefineXML) {
        virInterfacePtr ret;
11958
        ret = conn->interfaceDriver->interfaceDefineXML(conn, xml, flags);
D
Daniel Veillard 已提交
11959 11960 11961 11962 11963
        if (!ret)
            goto error;
        return ret;
    }

11964
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11965

11966
 error:
11967
    virDispatchError(conn);
D
Daniel Veillard 已提交
11968 11969 11970
    return NULL;
}

11971

D
Daniel Veillard 已提交
11972 11973
/**
 * virInterfaceUndefine:
11974
 * @iface: pointer to a defined interface
D
Daniel Veillard 已提交
11975 11976 11977 11978
 *
 * Undefine an interface, ie remove it from the config.
 * This does not free the associated virInterfacePtr object.
 *
11979 11980 11981 11982 11983 11984 11985 11986 11987 11988
 * Normally this change in the interface configuration is
 * permanent/persistent, but if virInterfaceChangeBegin() has been
 * previously called (i.e. if an interface config transaction is
 * open), the removal of the interface definition will only become
 * permanent if virInterfaceChangeCommit() is called prior to the next
 * reboot of the system running libvirtd. Prior to that time, the
 * definition can be explicitly restored using
 * virInterfaceChangeRollback(), or will be automatically restored
 * during the next reboot of the system running libvirtd.
 *
D
Daniel Veillard 已提交
11989 11990 11991
 * Returns 0 in case of success, -1 in case of error
 */
int
11992 11993
virInterfaceUndefine(virInterfacePtr iface)
{
D
Daniel Veillard 已提交
11994
    virConnectPtr conn;
11995
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11996 11997 11998

    virResetLastError();

11999
    virCheckInterfaceReturn(iface, -1);
12000
    conn = iface->conn;
12001

12002
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
12003 12004 12005

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceUndefine) {
        int ret;
12006
        ret = conn->interfaceDriver->interfaceUndefine(iface);
D
Daniel Veillard 已提交
12007 12008 12009 12010 12011
        if (ret < 0)
            goto error;
        return ret;
    }

12012
    virReportUnsupportedError();
D
Daniel Veillard 已提交
12013

12014
 error:
12015
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
12016 12017 12018
    return -1;
}

12019

D
Daniel Veillard 已提交
12020 12021
/**
 * virInterfaceCreate:
12022
 * @iface: pointer to a defined interface
12023
 * @flags: extra flags; not used yet, so callers should always pass 0
D
Daniel Veillard 已提交
12024
 *
12025
 * Activate an interface (i.e. call "ifup").
D
Daniel Veillard 已提交
12026
 *
12027 12028 12029 12030
 * If there was an open network config transaction at the time this
 * interface was defined (that is, if virInterfaceChangeBegin() had
 * been called), the interface will be brought back down (and then
 * undefined) if virInterfaceChangeRollback() is called.
W
Wangyufei (A) 已提交
12031
 *
D
Daniel Veillard 已提交
12032 12033 12034
 * Returns 0 in case of success, -1 in case of error
 */
int
12035
virInterfaceCreate(virInterfacePtr iface, unsigned int flags)
D
Daniel Veillard 已提交
12036 12037
{
    virConnectPtr conn;
12038
    VIR_DEBUG("iface=%p, flags=%x", iface, flags);
D
Daniel Veillard 已提交
12039 12040 12041

    virResetLastError();

12042
    virCheckInterfaceReturn(iface, -1);
12043
    conn = iface->conn;
12044

12045
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
12046 12047 12048

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceCreate) {
        int ret;
12049
        ret = conn->interfaceDriver->interfaceCreate(iface, flags);
D
Daniel Veillard 已提交
12050 12051 12052 12053 12054
        if (ret < 0)
            goto error;
        return ret;
    }

12055
    virReportUnsupportedError();
D
Daniel Veillard 已提交
12056

12057
 error:
12058
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
12059 12060 12061
    return -1;
}

12062

D
Daniel Veillard 已提交
12063 12064
/**
 * virInterfaceDestroy:
12065
 * @iface: an interface object
12066
 * @flags: extra flags; not used yet, so callers should always pass 0
D
Daniel Veillard 已提交
12067 12068 12069 12070 12071
 *
 * deactivate an interface (ie call "ifdown")
 * This does not remove the interface from the config, and
 * does not free the associated virInterfacePtr object.
 *
12072 12073 12074 12075 12076 12077 12078

 * If there is an open network config transaction at the time this
 * interface is destroyed (that is, if virInterfaceChangeBegin() had
 * been called), and if the interface is later undefined and then
 * virInterfaceChangeRollback() is called, the restoral of the
 * interface definition will also bring the interface back up.
 *
D
Daniel Veillard 已提交
12079 12080 12081
 * Returns 0 in case of success and -1 in case of failure.
 */
int
12082
virInterfaceDestroy(virInterfacePtr iface, unsigned int flags)
D
Daniel Veillard 已提交
12083 12084
{
    virConnectPtr conn;
12085
    VIR_DEBUG("iface=%p, flags=%x", iface, flags);
D
Daniel Veillard 已提交
12086 12087 12088

    virResetLastError();

12089
    virCheckInterfaceReturn(iface, -1);
12090
    conn = iface->conn;
12091

12092
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
12093 12094 12095

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceDestroy) {
        int ret;
12096
        ret = conn->interfaceDriver->interfaceDestroy(iface, flags);
D
Daniel Veillard 已提交
12097 12098 12099 12100 12101
        if (ret < 0)
            goto error;
        return ret;
    }

12102
    virReportUnsupportedError();
D
Daniel Veillard 已提交
12103

12104
 error:
12105
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
12106 12107 12108
    return -1;
}

12109

D
Daniel Veillard 已提交
12110 12111
/**
 * virInterfaceRef:
12112
 * @iface: the interface to hold a reference on
D
Daniel Veillard 已提交
12113 12114 12115 12116 12117 12118 12119 12120 12121
 *
 * Increment the reference count on the interface. For each
 * additional call to this method, there shall be a corresponding
 * call to virInterfaceFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
L
Laine Stump 已提交
12122
 * it. ie, each new thread using an interface would increment
D
Daniel Veillard 已提交
12123 12124 12125 12126 12127
 * the reference count.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
12128
virInterfaceRef(virInterfacePtr iface)
D
Daniel Veillard 已提交
12129
{
12130 12131
    VIR_DEBUG("iface=%p refs=%d", iface, iface ? iface->object.u.s.refs : 0);

12132 12133
    virResetLastError();

12134 12135
    virCheckInterfaceReturn(iface, -1);

12136
    virObjectRef(iface);
D
Daniel Veillard 已提交
12137 12138 12139
    return 0;
}

12140

D
Daniel Veillard 已提交
12141 12142
/**
 * virInterfaceFree:
L
Laine Stump 已提交
12143
 * @iface: an interface object
D
Daniel Veillard 已提交
12144 12145 12146 12147 12148 12149 12150
 *
 * Free the interface object. The interface itself is unaltered.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
12151
virInterfaceFree(virInterfacePtr iface)
D
Daniel Veillard 已提交
12152
{
12153
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
12154 12155 12156

    virResetLastError();

12157 12158
    virCheckInterfaceReturn(iface, -1);

12159
    virObjectUnref(iface);
12160
    return 0;
D
Daniel Veillard 已提交
12161 12162
}

12163

12164 12165 12166
/**
 * virInterfaceChangeBegin:
 * @conn: pointer to hypervisor connection
12167
 * @flags: extra flags; not used yet, so callers should always pass 0
12168
 *
Y
Yuri Chornoivan 已提交
12169
 * This function creates a restore point to which one can return
12170 12171
 * later by calling virInterfaceChangeRollback(). This function should
 * be called before any transaction with interface configuration.
Y
Yuri Chornoivan 已提交
12172
 * Once it is known that a new configuration works, it can be committed via
12173 12174 12175 12176 12177 12178 12179 12180 12181 12182 12183
 * virInterfaceChangeCommit(), which frees the restore point.
 *
 * If virInterfaceChangeBegin() is called when a transaction is
 * already opened, this function will fail, and a
 * VIR_ERR_INVALID_OPERATION will be logged.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virInterfaceChangeBegin(virConnectPtr conn, unsigned int flags)
{
12184
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
12185 12186 12187

    virResetLastError();

12188
    virCheckConnectReturn(conn, -1);
12189
    virCheckReadOnlyGoto(conn->flags, error);
12190 12191 12192 12193 12194 12195 12196 12197 12198

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceChangeBegin) {
        int ret;
        ret = conn->interfaceDriver->interfaceChangeBegin(conn, flags);
        if (ret < 0)
           goto error;
        return ret;
    }

12199
    virReportUnsupportedError();
12200

12201
 error:
12202 12203 12204 12205
    virDispatchError(conn);
    return -1;
}

12206

12207 12208 12209
/**
 * virInterfaceChangeCommit:
 * @conn: pointer to hypervisor connection
12210
 * @flags: extra flags; not used yet, so callers should always pass 0
12211 12212 12213 12214 12215 12216 12217 12218 12219 12220 12221 12222 12223
 *
 * This commits the changes made to interfaces and frees the restore point
 * created by virInterfaceChangeBegin().
 *
 * If virInterfaceChangeCommit() is called when a transaction is not
 * opened, this function will fail, and a VIR_ERR_INVALID_OPERATION
 * will be logged.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virInterfaceChangeCommit(virConnectPtr conn, unsigned int flags)
{
12224
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
12225 12226 12227

    virResetLastError();

12228
    virCheckConnectReturn(conn, -1);
12229
    virCheckReadOnlyGoto(conn->flags, error);
12230 12231 12232 12233 12234 12235 12236 12237 12238

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceChangeCommit) {
        int ret;
        ret = conn->interfaceDriver->interfaceChangeCommit(conn, flags);
        if (ret < 0)
           goto error;
        return ret;
    }

12239
    virReportUnsupportedError();
12240

12241
 error:
12242 12243 12244 12245
    virDispatchError(conn);
    return -1;
}

12246

12247 12248 12249
/**
 * virInterfaceChangeRollback:
 * @conn: pointer to hypervisor connection
12250
 * @flags: extra flags; not used yet, so callers should always pass 0
12251 12252 12253 12254 12255 12256 12257 12258 12259 12260 12261 12262 12263
 *
 * This cancels changes made to interfaces settings by restoring previous
 * state created by virInterfaceChangeBegin().
 *
 * If virInterfaceChangeRollback() is called when a transaction is not
 * opened, this function will fail, and a VIR_ERR_INVALID_OPERATION
 * will be logged.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virInterfaceChangeRollback(virConnectPtr conn, unsigned int flags)
{
12264
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
12265 12266 12267

    virResetLastError();

12268
    virCheckConnectReturn(conn, -1);
12269
    virCheckReadOnlyGoto(conn->flags, error);
12270 12271 12272 12273 12274 12275 12276 12277 12278 12279

    if (conn->interfaceDriver &&
        conn->interfaceDriver->interfaceChangeRollback) {
        int ret;
        ret = conn->interfaceDriver->interfaceChangeRollback(conn, flags);
        if (ret < 0)
           goto error;
        return ret;
    }

12280
    virReportUnsupportedError();
12281

12282
 error:
12283 12284 12285 12286
    virDispatchError(conn);
    return -1;
}

12287 12288 12289

/**
 * virStoragePoolGetConnect:
12290
 * @pool: pointer to a pool
12291 12292 12293 12294 12295 12296 12297 12298 12299 12300 12301 12302
 *
 * Provides the connection pointer associated with a storage pool.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the pool object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
12303
virStoragePoolGetConnect(virStoragePoolPtr pool)
12304
{
12305
    VIR_DEBUG("pool=%p", pool);
12306

12307 12308
    virResetLastError();

12309 12310
    virCheckStoragePoolReturn(pool, NULL);

12311 12312 12313
    return pool->conn;
}

12314

12315 12316 12317 12318 12319 12320 12321 12322 12323 12324 12325 12326 12327 12328 12329 12330 12331 12332 12333 12334 12335 12336 12337 12338 12339 12340 12341 12342 12343 12344 12345 12346 12347 12348 12349 12350 12351 12352 12353 12354 12355 12356 12357 12358 12359 12360 12361 12362 12363 12364 12365 12366 12367 12368 12369 12370 12371 12372 12373 12374 12375 12376
/**
 * virConnectListAllStoragePools:
 * @conn: Pointer to the hypervisor connection.
 * @pools: Pointer to a variable to store the array containing storage pool
 *         objects or NULL if the list is not required (just returns number
 *         of pools).
 * @flags: bitwise-OR of virConnectListAllStoragePoolsFlags.
 *
 * Collect the list of storage pools, and allocate an array to store those
 * objects. This API solves the race inherent between
 * virConnectListStoragePools and virConnectListDefinedStoragePools.
 *
 * Normally, all storage pools are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted pools.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a pool, and where all bits
 * within a group describe all possible pools.
 *
 * The first group of @flags is VIR_CONNECT_LIST_STORAGE_POOLS_ACTIVE (online)
 * and VIR_CONNECT_LIST_STORAGE_POOLS_INACTIVE (offline) to filter the pools
 * by state.
 *
 * The second group of @flags is VIR_CONNECT_LIST_STORAGE_POOLS_PERSITENT
 * (defined) and VIR_CONNECT_LIST_STORAGE_POOLS_TRANSIENT (running but not
 * defined), to filter the pools by whether they have persistent config or not.
 *
 * The third group of @flags is VIR_CONNECT_LIST_STORAGE_POOLS_AUTOSTART
 * and VIR_CONNECT_LIST_STORAGE_POOLS_NO_AUTOSTART, to filter the pools by
 * whether they are marked as autostart or not.
 *
 * The last group of @flags is provided to filter the pools by the types,
 * the flags include:
 * VIR_CONNECT_LIST_STORAGE_POOLS_DIR
 * VIR_CONNECT_LIST_STORAGE_POOLS_FS
 * VIR_CONNECT_LIST_STORAGE_POOLS_NETFS
 * VIR_CONNECT_LIST_STORAGE_POOLS_LOGICAL
 * VIR_CONNECT_LIST_STORAGE_POOLS_DISK
 * VIR_CONNECT_LIST_STORAGE_POOLS_ISCSI
 * VIR_CONNECT_LIST_STORAGE_POOLS_SCSI
 * VIR_CONNECT_LIST_STORAGE_POOLS_MPATH
 * VIR_CONNECT_LIST_STORAGE_POOLS_RBD
 * VIR_CONNECT_LIST_STORAGE_POOLS_SHEEPDOG
 *
 * Returns the number of storage pools found or -1 and sets @pools to
 * NULL in case of error.  On success, the array stored into @pools is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virStoragePoolFree() on each array element, then calling
 * free() on @pools.
 */
int
virConnectListAllStoragePools(virConnectPtr conn,
                              virStoragePoolPtr **pools,
                              unsigned int flags)
{
    VIR_DEBUG("conn=%p, pools=%p, flags=%x", conn, pools, flags);

    virResetLastError();

    if (pools)
        *pools = NULL;

12377
    virCheckConnectReturn(conn, -1);
12378 12379

    if (conn->storageDriver &&
12380
        conn->storageDriver->connectListAllStoragePools) {
12381
        int ret;
12382
        ret = conn->storageDriver->connectListAllStoragePools(conn, pools, flags);
12383 12384 12385 12386 12387
        if (ret < 0)
            goto error;
        return ret;
    }

12388
    virReportUnsupportedError();
12389

12390
 error:
12391 12392 12393 12394
    virDispatchError(conn);
    return -1;
}

12395

12396 12397 12398 12399 12400 12401 12402 12403 12404
/**
 * virConnectNumOfStoragePools:
 * @conn: pointer to hypervisor connection
 *
 * Provides the number of active storage pools
 *
 * Returns the number of pools found, or -1 on error
 */
int
O
Osier Yang 已提交
12405
virConnectNumOfStoragePools(virConnectPtr conn)
12406
{
12407
    VIR_DEBUG("conn=%p", conn);
12408

12409 12410
    virResetLastError();

12411
    virCheckConnectReturn(conn, -1);
12412

12413
    if (conn->storageDriver && conn->storageDriver->connectNumOfStoragePools) {
12414
        int ret;
12415
        ret = conn->storageDriver->connectNumOfStoragePools(conn);
12416 12417 12418 12419
        if (ret < 0)
            goto error;
        return ret;
    }
12420

12421
    virReportUnsupportedError();
12422

12423
 error:
12424
    virDispatchError(conn);
12425 12426 12427
    return -1;
}

12428

12429 12430 12431 12432 12433 12434
/**
 * virConnectListStoragePools:
 * @conn: pointer to hypervisor connection
 * @names: array of char * to fill with pool names (allocated by caller)
 * @maxnames: size of the names array
 *
12435 12436 12437 12438 12439
 * Provides the list of names of active storage pools up to maxnames.
 * If there are more than maxnames, the remaining names will be silently
 * ignored.
 *
 * For more control over the results, see virConnectListAllStoragePools().
12440
 *
12441 12442 12443 12444
 * Returns the number of pools found or -1 in case of error.  Note that
 * this command is inherently racy; a pool can be started between a call to
 * virConnectNumOfStoragePools() and this call; you are only guaranteed
 * that all currently active pools were listed if the return is less than
J
John Ferlan 已提交
12445
 * @maxnames. The client must call free() on each returned name.
12446 12447
 */
int
O
Osier Yang 已提交
12448 12449 12450
virConnectListStoragePools(virConnectPtr conn,
                           char **const names,
                           int maxnames)
12451
{
12452
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
12453

12454 12455
    virResetLastError();

12456
    virCheckConnectReturn(conn, -1);
12457 12458
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
12459

12460
    if (conn->storageDriver && conn->storageDriver->connectListStoragePools) {
12461
        int ret;
12462
        ret = conn->storageDriver->connectListStoragePools(conn, names, maxnames);
12463 12464 12465 12466
        if (ret < 0)
            goto error;
        return ret;
    }
12467

12468
    virReportUnsupportedError();
12469

12470
 error:
12471
    virDispatchError(conn);
12472
    return -1;
12473 12474 12475 12476 12477 12478 12479 12480 12481 12482 12483 12484 12485 12486
}


/**
 * virConnectNumOfDefinedStoragePools:
 * @conn: pointer to hypervisor connection
 *
 * Provides the number of inactive storage pools
 *
 * Returns the number of pools found, or -1 on error
 */
int
virConnectNumOfDefinedStoragePools(virConnectPtr conn)
{
12487
    VIR_DEBUG("conn=%p", conn);
12488

12489 12490
    virResetLastError();

12491
    virCheckConnectReturn(conn, -1);
12492

12493
    if (conn->storageDriver && conn->storageDriver->connectNumOfDefinedStoragePools) {
12494
        int ret;
12495
        ret = conn->storageDriver->connectNumOfDefinedStoragePools(conn);
12496 12497 12498 12499
        if (ret < 0)
            goto error;
        return ret;
    }
12500

12501
    virReportUnsupportedError();
12502

12503
 error:
12504
    virDispatchError(conn);
12505 12506 12507 12508 12509 12510 12511 12512 12513 12514
    return -1;
}


/**
 * virConnectListDefinedStoragePools:
 * @conn: pointer to hypervisor connection
 * @names: array of char * to fill with pool names (allocated by caller)
 * @maxnames: size of the names array
 *
12515 12516 12517
 * Provides the list of names of inactive storage pools up to maxnames.
 * If there are more than maxnames, the remaining names will be silently
 * ignored.
12518
 *
12519 12520 12521 12522 12523 12524 12525
 * For more control over the results, see virConnectListAllStoragePools().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a pool can be defined between
 * a call to virConnectNumOfDefinedStoragePools() and this call; you are only
 * guaranteed that all currently defined pools were listed if the return
 * is less than @maxnames.  The client must call free() on each returned name.
12526 12527 12528 12529 12530 12531
 */
int
virConnectListDefinedStoragePools(virConnectPtr conn,
                                  char **const names,
                                  int maxnames)
{
12532
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
12533

12534 12535
    virResetLastError();

12536
    virCheckConnectReturn(conn, -1);
12537 12538
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
12539

12540
    if (conn->storageDriver && conn->storageDriver->connectListDefinedStoragePools) {
12541
        int ret;
12542
        ret = conn->storageDriver->connectListDefinedStoragePools(conn, names, maxnames);
12543 12544 12545 12546
        if (ret < 0)
            goto error;
        return ret;
    }
12547

12548
    virReportUnsupportedError();
12549

12550
 error:
12551
    virDispatchError(conn);
12552 12553 12554 12555
    return -1;
}


12556 12557 12558 12559 12560
/**
 * virConnectFindStoragePoolSources:
 * @conn: pointer to hypervisor connection
 * @type: type of storage pool sources to discover
 * @srcSpec: XML document specifying discovery source
12561
 * @flags: extra flags; not used yet, so callers should always pass 0
12562 12563 12564 12565 12566 12567 12568 12569 12570 12571 12572 12573 12574 12575 12576 12577 12578 12579 12580 12581 12582
 *
 * Talks to a storage backend and attempts to auto-discover the set of
 * available storage pool sources. e.g. For iSCSI this would be a set of
 * iSCSI targets. For NFS this would be a list of exported paths.  The
 * srcSpec (optional for some storage pool types, e.g. local ones) is
 * an instance of the storage pool's source element specifying where
 * to look for the pools.
 *
 * srcSpec is not required for some types (e.g., those querying
 * local storage resources only)
 *
 * Returns an xml document consisting of a SourceList element
 * containing a source document appropriate to the given pool
 * type for each discovered source.
 */
char *
virConnectFindStoragePoolSources(virConnectPtr conn,
                                 const char *type,
                                 const char *srcSpec,
                                 unsigned int flags)
{
12583
    VIR_DEBUG("conn=%p, type=%s, src=%s, flags=%x",
O
Osier Yang 已提交
12584
              conn, NULLSTR(type), NULLSTR(srcSpec), flags);
12585 12586 12587

    virResetLastError();

12588
    virCheckConnectReturn(conn, NULL);
12589
    virCheckNonNullArgGoto(type, error);
12590
    virCheckReadOnlyGoto(conn->flags, error);
12591

12592
    if (conn->storageDriver && conn->storageDriver->connectFindStoragePoolSources) {
12593
        char *ret;
12594
        ret = conn->storageDriver->connectFindStoragePoolSources(conn, type, srcSpec, flags);
12595 12596 12597 12598
        if (!ret)
            goto error;
        return ret;
    }
12599

12600
    virReportUnsupportedError();
12601

12602
 error:
12603
    virDispatchError(conn);
12604 12605 12606 12607
    return NULL;
}


12608 12609 12610 12611 12612 12613 12614 12615 12616 12617 12618 12619 12620
/**
 * virStoragePoolLookupByName:
 * @conn: pointer to hypervisor connection
 * @name: name of pool to fetch
 *
 * Fetch a storage pool based on its unique name
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByName(virConnectPtr conn,
                           const char *name)
{
12621
    VIR_DEBUG("conn=%p, name=%s", conn, name);
12622

12623 12624
    virResetLastError();

12625
    virCheckConnectReturn(conn, NULL);
12626
    virCheckNonNullArgGoto(name, error);
12627

12628
    if (conn->storageDriver && conn->storageDriver->storagePoolLookupByName) {
12629
        virStoragePoolPtr ret;
12630
        ret = conn->storageDriver->storagePoolLookupByName(conn, name);
12631 12632 12633 12634
        if (!ret)
            goto error;
        return ret;
    }
12635

12636
    virReportUnsupportedError();
12637

12638
 error:
12639
    virDispatchError(conn);
12640 12641 12642 12643 12644 12645 12646 12647 12648 12649 12650 12651 12652 12653 12654 12655 12656
    return NULL;
}


/**
 * virStoragePoolLookupByUUID:
 * @conn: pointer to hypervisor connection
 * @uuid: globally unique id of pool to fetch
 *
 * Fetch a storage pool based on its globally unique id
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByUUID(virConnectPtr conn,
                           const unsigned char *uuid)
{
12657
    VIR_UUID_DEBUG(conn, uuid);
12658

12659 12660
    virResetLastError();

12661
    virCheckConnectReturn(conn, NULL);
12662
    virCheckNonNullArgGoto(uuid, error);
12663

12664
    if (conn->storageDriver && conn->storageDriver->storagePoolLookupByUUID) {
12665
        virStoragePoolPtr ret;
12666
        ret = conn->storageDriver->storagePoolLookupByUUID(conn, uuid);
12667 12668 12669 12670
        if (!ret)
            goto error;
        return ret;
    }
12671

12672
    virReportUnsupportedError();
12673

12674
 error:
12675
    virDispatchError(conn);
12676
    return NULL;
12677 12678 12679 12680 12681 12682 12683 12684 12685 12686 12687 12688 12689 12690
}


/**
 * virStoragePoolLookupByUUIDString:
 * @conn: pointer to hypervisor connection
 * @uuidstr: globally unique id of pool to fetch
 *
 * Fetch a storage pool based on its globally unique id
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByUUIDString(virConnectPtr conn,
12691
                                 const char *uuidstr)
12692 12693
{
    unsigned char uuid[VIR_UUID_BUFLEN];
12694
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
12695

12696 12697
    virResetLastError();

12698
    virCheckConnectReturn(conn, NULL);
12699
    virCheckNonNullArgGoto(uuidstr, error);
12700 12701

    if (virUUIDParse(uuidstr, uuid) < 0) {
12702 12703 12704
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
12705
        goto error;
12706 12707 12708
    }

    return virStoragePoolLookupByUUID(conn, uuid);
12709

12710
 error:
12711
    virDispatchError(conn);
12712
    return NULL;
12713 12714 12715 12716 12717 12718 12719 12720 12721 12722 12723 12724 12725 12726
}


/**
 * virStoragePoolLookupByVolume:
 * @vol: pointer to storage volume
 *
 * Fetch a storage pool which contains a particular volume
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByVolume(virStorageVolPtr vol)
{
12727
    VIR_DEBUG("vol=%p", vol);
12728

12729 12730
    virResetLastError();

12731
    virCheckStorageVolReturn(vol, NULL);
12732

12733
    if (vol->conn->storageDriver && vol->conn->storageDriver->storagePoolLookupByVolume) {
12734
        virStoragePoolPtr ret;
12735
        ret = vol->conn->storageDriver->storagePoolLookupByVolume(vol);
12736 12737 12738 12739
        if (!ret)
            goto error;
        return ret;
    }
12740

12741
    virReportUnsupportedError();
12742

12743
 error:
12744
    virDispatchError(vol->conn);
12745
    return NULL;
12746 12747
}

12748

12749 12750 12751 12752
/**
 * virStoragePoolCreateXML:
 * @conn: pointer to hypervisor connection
 * @xmlDesc: XML description for new pool
12753
 * @flags: extra flags; not used yet, so callers should always pass 0
12754 12755
 *
 * Create a new storage based on its XML description. The
D
Daniel Veillard 已提交
12756
 * pool is not persistent, so its definition will disappear
12757 12758 12759 12760 12761 12762 12763 12764 12765
 * when it is destroyed, or if the host is restarted
 *
 * Returns a virStoragePoolPtr object, or NULL if creation failed
 */
virStoragePoolPtr
virStoragePoolCreateXML(virConnectPtr conn,
                        const char *xmlDesc,
                        unsigned int flags)
{
E
Eric Blake 已提交
12766
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
12767

12768 12769
    virResetLastError();

12770
    virCheckConnectReturn(conn, NULL);
12771
    virCheckNonNullArgGoto(xmlDesc, error);
12772
    virCheckReadOnlyGoto(conn->flags, error);
12773

12774
    if (conn->storageDriver && conn->storageDriver->storagePoolCreateXML) {
12775
        virStoragePoolPtr ret;
12776
        ret = conn->storageDriver->storagePoolCreateXML(conn, xmlDesc, flags);
12777 12778 12779 12780
        if (!ret)
            goto error;
        return ret;
    }
12781

12782
    virReportUnsupportedError();
12783

12784
 error:
12785
    virDispatchError(conn);
12786 12787 12788
    return NULL;
}

12789

12790 12791 12792 12793
/**
 * virStoragePoolDefineXML:
 * @conn: pointer to hypervisor connection
 * @xml: XML description for new pool
12794
 * @flags: extra flags; not used yet, so callers should always pass 0
12795 12796
 *
 * Define a new inactive storage pool based on its XML description. The
D
Daniel Veillard 已提交
12797
 * pool is persistent, until explicitly undefined.
12798 12799 12800 12801 12802 12803 12804 12805
 *
 * Returns a virStoragePoolPtr object, or NULL if creation failed
 */
virStoragePoolPtr
virStoragePoolDefineXML(virConnectPtr conn,
                        const char *xml,
                        unsigned int flags)
{
E
Eric Blake 已提交
12806
    VIR_DEBUG("conn=%p, xml=%s, flags=%x", conn, xml, flags);
12807

12808 12809
    virResetLastError();

12810
    virCheckConnectReturn(conn, NULL);
12811
    virCheckReadOnlyGoto(conn->flags, error);
12812
    virCheckNonNullArgGoto(xml, error);
12813

12814
    if (conn->storageDriver && conn->storageDriver->storagePoolDefineXML) {
12815
        virStoragePoolPtr ret;
12816
        ret = conn->storageDriver->storagePoolDefineXML(conn, xml, flags);
12817 12818 12819 12820
        if (!ret)
            goto error;
        return ret;
    }
12821

12822
    virReportUnsupportedError();
12823

12824
 error:
12825
    virDispatchError(conn);
12826
    return NULL;
12827 12828
}

12829

12830 12831 12832
/**
 * virStoragePoolBuild:
 * @pool: pointer to storage pool
12833
 * @flags: bitwise-OR of virStoragePoolBuildFlags
O
Osier Yang 已提交
12834 12835 12836
 *
 * Currently only filesystem pool accepts flags VIR_STORAGE_POOL_BUILD_OVERWRITE
 * and VIR_STORAGE_POOL_BUILD_NO_OVERWRITE.
12837 12838 12839 12840 12841 12842 12843 12844 12845 12846
 *
 * Build the underlying storage pool
 *
 * Returns 0 on success, or -1 upon failure
 */
int
virStoragePoolBuild(virStoragePoolPtr pool,
                    unsigned int flags)
{
    virConnectPtr conn;
12847
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
12848

12849 12850
    virResetLastError();

12851
    virCheckStoragePoolReturn(pool, -1);
12852
    conn = pool->conn;
12853

12854
    virCheckReadOnlyGoto(conn->flags, error);
12855

12856
    if (conn->storageDriver && conn->storageDriver->storagePoolBuild) {
12857
        int ret;
12858
        ret = conn->storageDriver->storagePoolBuild(pool, flags);
12859 12860 12861 12862
        if (ret < 0)
            goto error;
        return ret;
    }
12863

12864
    virReportUnsupportedError();
12865

12866
 error:
12867
    virDispatchError(pool->conn);
12868
    return -1;
12869 12870 12871 12872 12873 12874 12875 12876 12877
}


/**
 * virStoragePoolUndefine:
 * @pool: pointer to storage pool
 *
 * Undefine an inactive storage pool
 *
12878
 * Returns 0 on success, -1 on failure
12879 12880 12881 12882 12883
 */
int
virStoragePoolUndefine(virStoragePoolPtr pool)
{
    virConnectPtr conn;
12884
    VIR_DEBUG("pool=%p", pool);
12885

12886 12887
    virResetLastError();

12888
    virCheckStoragePoolReturn(pool, -1);
12889
    conn = pool->conn;
12890

12891
    virCheckReadOnlyGoto(conn->flags, error);
12892

12893
    if (conn->storageDriver && conn->storageDriver->storagePoolUndefine) {
12894
        int ret;
12895
        ret = conn->storageDriver->storagePoolUndefine(pool);
12896 12897 12898 12899
        if (ret < 0)
            goto error;
        return ret;
    }
12900

12901
    virReportUnsupportedError();
12902

12903
 error:
12904
    virDispatchError(pool->conn);
12905
    return -1;
12906 12907 12908 12909 12910 12911
}


/**
 * virStoragePoolCreate:
 * @pool: pointer to storage pool
12912
 * @flags: extra flags; not used yet, so callers should always pass 0
12913 12914 12915 12916 12917 12918 12919 12920 12921 12922
 *
 * Starts an inactive storage pool
 *
 * Returns 0 on success, or -1 if it could not be started
 */
int
virStoragePoolCreate(virStoragePoolPtr pool,
                     unsigned int flags)
{
    virConnectPtr conn;
E
Eric Blake 已提交
12923
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
12924

12925 12926
    virResetLastError();

12927
    virCheckStoragePoolReturn(pool, -1);
12928
    conn = pool->conn;
12929

12930
    virCheckReadOnlyGoto(conn->flags, error);
12931

12932
    if (conn->storageDriver && conn->storageDriver->storagePoolCreate) {
12933
        int ret;
12934
        ret = conn->storageDriver->storagePoolCreate(pool, flags);
12935 12936 12937 12938
        if (ret < 0)
            goto error;
        return ret;
    }
12939

12940
    virReportUnsupportedError();
12941

12942
 error:
12943
    virDispatchError(pool->conn);
12944
    return -1;
12945 12946 12947 12948 12949 12950 12951 12952 12953 12954 12955 12956 12957 12958 12959 12960 12961 12962 12963
}


/**
 * virStoragePoolDestroy:
 * @pool: pointer to storage pool
 *
 * Destroy an active storage pool. This will deactivate the
 * pool on the host, but keep any persistent config associated
 * with it. If it has a persistent config it can later be
 * restarted with virStoragePoolCreate(). This does not free
 * the associated virStoragePoolPtr object.
 *
 * Returns 0 on success, or -1 if it could not be destroyed
 */
int
virStoragePoolDestroy(virStoragePoolPtr pool)
{
    virConnectPtr conn;
12964
    VIR_DEBUG("pool=%p", pool);
12965

12966 12967
    virResetLastError();

12968
    virCheckStoragePoolReturn(pool, -1);
12969
    conn = pool->conn;
12970

12971
    virCheckReadOnlyGoto(conn->flags, error);
12972

12973
    if (conn->storageDriver && conn->storageDriver->storagePoolDestroy) {
12974
        int ret;
12975
        ret = conn->storageDriver->storagePoolDestroy(pool);
12976 12977 12978 12979
        if (ret < 0)
            goto error;
        return ret;
    }
12980

12981
    virReportUnsupportedError();
12982

12983
 error:
12984
    virDispatchError(pool->conn);
12985 12986 12987
    return -1;
}

12988

12989 12990 12991
/**
 * virStoragePoolDelete:
 * @pool: pointer to storage pool
12992
 * @flags: bitwise-OR of virStoragePoolDeleteFlags
12993 12994 12995 12996 12997 12998 12999 13000 13001 13002 13003 13004
 *
 * Delete the underlying pool resources. This is
 * a non-recoverable operation. The virStoragePoolPtr object
 * itself is not free'd.
 *
 * Returns 0 on success, or -1 if it could not be obliterate
 */
int
virStoragePoolDelete(virStoragePoolPtr pool,
                     unsigned int flags)
{
    virConnectPtr conn;
13005
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
13006

13007 13008
    virResetLastError();

13009
    virCheckStoragePoolReturn(pool, -1);
13010
    conn = pool->conn;
13011

13012
    virCheckReadOnlyGoto(conn->flags, error);
13013

13014
    if (conn->storageDriver && conn->storageDriver->storagePoolDelete) {
13015
        int ret;
13016
        ret = conn->storageDriver->storagePoolDelete(pool, flags);
13017 13018 13019 13020
        if (ret < 0)
            goto error;
        return ret;
    }
13021

13022
    virReportUnsupportedError();
13023

13024
 error:
13025
    virDispatchError(pool->conn);
13026 13027 13028 13029 13030 13031 13032 13033 13034 13035 13036 13037 13038 13039 13040 13041
    return -1;
}


/**
 * virStoragePoolFree:
 * @pool: pointer to storage pool
 *
 * Free a storage pool object, releasing all memory associated with
 * it. Does not change the state of the pool on the host.
 *
 * Returns 0 on success, or -1 if it could not be free'd.
 */
int
virStoragePoolFree(virStoragePoolPtr pool)
{
13042
    VIR_DEBUG("pool=%p", pool);
13043

13044 13045
    virResetLastError();

13046 13047
    virCheckStoragePoolReturn(pool, -1);

13048
    virObjectUnref(pool);
13049
    return 0;
13050 13051 13052 13053

}


13054 13055
/**
 * virStoragePoolRef:
D
Daniel Veillard 已提交
13056
 * @pool: the pool to hold a reference on
13057 13058 13059 13060 13061 13062 13063 13064 13065 13066 13067
 *
 * Increment the reference count on the pool. For each
 * additional call to this method, there shall be a corresponding
 * call to virStoragePoolFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a pool would increment
 * the reference count.
D
Daniel Veillard 已提交
13068 13069
 *
 * Returns 0 in case of success, -1 in case of failure.
13070 13071 13072 13073
 */
int
virStoragePoolRef(virStoragePoolPtr pool)
{
13074 13075
    VIR_DEBUG("pool=%p refs=%d", pool, pool ? pool->object.u.s.refs : 0);

13076 13077
    virResetLastError();

13078 13079
    virCheckStoragePoolReturn(pool, -1);

13080
    virObjectRef(pool);
13081 13082 13083
    return 0;
}

13084

13085 13086 13087
/**
 * virStoragePoolRefresh:
 * @pool: pointer to storage pool
13088
 * @flags: extra flags; not used yet, so callers should always pass 0
13089 13090 13091 13092 13093
 *
 * Request that the pool refresh its list of volumes. This may
 * involve communicating with a remote server, and/or initializing
 * new devices at the OS layer
 *
13094
 * Returns 0 if the volume list was refreshed, -1 on failure
13095 13096 13097 13098 13099 13100
 */
int
virStoragePoolRefresh(virStoragePoolPtr pool,
                      unsigned int flags)
{
    virConnectPtr conn;
E
Eric Blake 已提交
13101
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
13102

13103 13104
    virResetLastError();

13105
    virCheckStoragePoolReturn(pool, -1);
13106
    conn = pool->conn;
13107

13108
    virCheckReadOnlyGoto(conn->flags, error);
13109

13110
    if (conn->storageDriver && conn->storageDriver->storagePoolRefresh) {
13111
        int ret;
13112
        ret = conn->storageDriver->storagePoolRefresh(pool, flags);
13113 13114 13115 13116
        if (ret < 0)
            goto error;
        return ret;
    }
13117

13118
    virReportUnsupportedError();
13119

13120
 error:
13121
    virDispatchError(pool->conn);
13122 13123 13124 13125 13126 13127 13128 13129 13130 13131
    return -1;
}


/**
 * virStoragePoolGetName:
 * @pool: pointer to storage pool
 *
 * Fetch the locally unique name of the storage pool
 *
13132
 * Returns the name of the pool, or NULL on error
13133 13134 13135 13136
 */
const char*
virStoragePoolGetName(virStoragePoolPtr pool)
{
13137
    VIR_DEBUG("pool=%p", pool);
13138

13139 13140
    virResetLastError();

13141 13142
    virCheckStoragePoolReturn(pool, NULL);

13143
    return pool->name;
13144 13145 13146 13147 13148 13149 13150 13151 13152 13153
}


/**
 * virStoragePoolGetUUID:
 * @pool: pointer to storage pool
 * @uuid: buffer of VIR_UUID_BUFLEN bytes in size
 *
 * Fetch the globally unique ID of the storage pool
 *
13154
 * Returns 0 on success, or -1 on error;
13155 13156 13157 13158 13159
 */
int
virStoragePoolGetUUID(virStoragePoolPtr pool,
                      unsigned char *uuid)
{
13160
    VIR_DEBUG("pool=%p, uuid=%p", pool, uuid);
13161

13162 13163
    virResetLastError();

13164
    virCheckStoragePoolReturn(pool, -1);
13165
    virCheckNonNullArgGoto(uuid, error);
13166 13167 13168

    memcpy(uuid, &pool->uuid[0], VIR_UUID_BUFLEN);

13169
    return 0;
13170

13171
 error:
13172
    virDispatchError(pool->conn);
13173
    return -1;
13174 13175
}

13176

13177 13178 13179 13180 13181 13182 13183
/**
 * virStoragePoolGetUUIDString:
 * @pool: pointer to storage pool
 * @buf: buffer of VIR_UUID_STRING_BUFLEN bytes in size
 *
 * Fetch the globally unique ID of the storage pool as a string
 *
13184
 * Returns 0 on success, or -1 on error;
13185 13186 13187 13188 13189
 */
int
virStoragePoolGetUUIDString(virStoragePoolPtr pool,
                            char *buf)
{
13190
    VIR_DEBUG("pool=%p, buf=%p", pool, buf);
13191

13192 13193
    virResetLastError();

13194
    virCheckStoragePoolReturn(pool, -1);
13195
    virCheckNonNullArgGoto(buf, error);
13196

E
Eric Blake 已提交
13197
    virUUIDFormat(pool->uuid, buf);
13198
    return 0;
13199

13200
 error:
13201
    virDispatchError(pool->conn);
13202
    return -1;
13203 13204 13205 13206 13207 13208 13209 13210 13211 13212 13213
}


/**
 * virStoragePoolGetInfo:
 * @pool: pointer to storage pool
 * @info: pointer at which to store info
 *
 * Get volatile information about the storage pool
 * such as free space / usage summary
 *
13214
 * Returns 0 on success, or -1 on failure.
13215 13216 13217 13218 13219 13220
 */
int
virStoragePoolGetInfo(virStoragePoolPtr pool,
                      virStoragePoolInfoPtr info)
{
    virConnectPtr conn;
13221
    VIR_DEBUG("pool=%p, info=%p", pool, info);
13222

13223 13224
    virResetLastError();

13225 13226 13227
    if (info)
        memset(info, 0, sizeof(*info));

13228
    virCheckStoragePoolReturn(pool, -1);
13229
    virCheckNonNullArgGoto(info, error);
13230 13231 13232

    conn = pool->conn;

13233
    if (conn->storageDriver->storagePoolGetInfo) {
13234
        int ret;
13235
        ret = conn->storageDriver->storagePoolGetInfo(pool, info);
13236 13237 13238 13239
        if (ret < 0)
            goto error;
        return ret;
    }
13240

13241
    virReportUnsupportedError();
13242

13243
 error:
13244
    virDispatchError(pool->conn);
13245
    return -1;
13246 13247 13248 13249 13250 13251
}


/**
 * virStoragePoolGetXMLDesc:
 * @pool: pointer to storage pool
13252
 * @flags: bitwise-OR of virStorageXMLFlags
13253 13254 13255 13256 13257
 *
 * Fetch an XML document describing all aspects of the
 * storage pool. This is suitable for later feeding back
 * into the virStoragePoolCreateXML method.
 *
13258
 * Returns a XML document, or NULL on error
13259 13260 13261 13262 13263 13264
 */
char *
virStoragePoolGetXMLDesc(virStoragePoolPtr pool,
                         unsigned int flags)
{
    virConnectPtr conn;
13265
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
13266

13267 13268
    virResetLastError();

13269
    virCheckStoragePoolReturn(pool, NULL);
13270 13271
    conn = pool->conn;

13272
    if (conn->storageDriver && conn->storageDriver->storagePoolGetXMLDesc) {
13273
        char *ret;
13274
        ret = conn->storageDriver->storagePoolGetXMLDesc(pool, flags);
13275 13276 13277 13278
        if (!ret)
            goto error;
        return ret;
    }
13279

13280
    virReportUnsupportedError();
13281

13282
 error:
13283
    virDispatchError(pool->conn);
13284
    return NULL;
13285 13286 13287 13288 13289 13290 13291 13292 13293 13294 13295
}


/**
 * virStoragePoolGetAutostart:
 * @pool: pointer to storage pool
 * @autostart: location in which to store autostart flag
 *
 * Fetches the value of the autostart flag, which determines
 * whether the pool is automatically started at boot time
 *
13296
 * Returns 0 on success, -1 on failure
13297 13298 13299 13300 13301 13302
 */
int
virStoragePoolGetAutostart(virStoragePoolPtr pool,
                           int *autostart)
{
    virConnectPtr conn;
13303
    VIR_DEBUG("pool=%p, autostart=%p", pool, autostart);
13304

13305 13306
    virResetLastError();

13307
    virCheckStoragePoolReturn(pool, -1);
13308
    virCheckNonNullArgGoto(autostart, error);
13309 13310 13311

    conn = pool->conn;

13312
    if (conn->storageDriver && conn->storageDriver->storagePoolGetAutostart) {
13313
        int ret;
13314
        ret = conn->storageDriver->storagePoolGetAutostart(pool, autostart);
13315 13316 13317 13318
        if (ret < 0)
            goto error;
        return ret;
    }
13319

13320
    virReportUnsupportedError();
13321

13322
 error:
13323
    virDispatchError(pool->conn);
13324 13325 13326 13327 13328 13329 13330 13331 13332 13333 13334
    return -1;
}


/**
 * virStoragePoolSetAutostart:
 * @pool: pointer to storage pool
 * @autostart: new flag setting
 *
 * Sets the autostart flag
 *
13335
 * Returns 0 on success, -1 on failure
13336 13337 13338 13339 13340 13341
 */
int
virStoragePoolSetAutostart(virStoragePoolPtr pool,
                           int autostart)
{
    virConnectPtr conn;
13342
    VIR_DEBUG("pool=%p, autostart=%d", pool, autostart);
13343

13344 13345
    virResetLastError();

13346
    virCheckStoragePoolReturn(pool, -1);
13347 13348
    conn = pool->conn;

13349 13350
    virCheckReadOnlyGoto(conn->flags, error);

13351
    if (conn->storageDriver && conn->storageDriver->storagePoolSetAutostart) {
13352
        int ret;
13353
        ret = conn->storageDriver->storagePoolSetAutostart(pool, autostart);
13354 13355 13356 13357
        if (ret < 0)
            goto error;
        return ret;
    }
13358

13359
    virReportUnsupportedError();
13360

13361
 error:
13362
    virDispatchError(pool->conn);
13363 13364 13365
    return -1;
}

13366

13367 13368 13369 13370 13371 13372 13373 13374 13375 13376 13377 13378 13379 13380 13381 13382 13383 13384 13385 13386 13387 13388 13389 13390 13391 13392 13393
/**
 * virStoragePoolListAllVolumes:
 * @pool: Pointer to storage pool
 * @vols: Pointer to a variable to store the array containing storage volume
 *        objects or NULL if the list is not required (just returns number
 *        of volumes).
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Collect the list of storage volumes, and allocate an array to store those
 * objects.
 *
 * Returns the number of storage volumes found or -1 and sets @vols to
 * NULL in case of error.  On success, the array stored into @vols is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virStorageVolFree() on each array element, then calling
 * free() on @vols.
 */
int
virStoragePoolListAllVolumes(virStoragePoolPtr pool,
                             virStorageVolPtr **vols,
                             unsigned int flags)
{
    VIR_DEBUG("pool=%p, vols=%p, flags=%x", pool, vols, flags);

    virResetLastError();

13394
    virCheckStoragePoolReturn(pool, -1);
13395 13396

    if (pool->conn->storageDriver &&
13397
        pool->conn->storageDriver->storagePoolListAllVolumes) {
13398
        int ret;
13399
        ret = pool->conn->storageDriver->storagePoolListAllVolumes(pool, vols, flags);
13400 13401 13402 13403 13404
        if (ret < 0)
            goto error;
        return ret;
    }

13405
    virReportUnsupportedError();
13406

13407
 error:
13408 13409 13410
    virDispatchError(pool->conn);
    return -1;
}
13411

13412

13413 13414 13415 13416 13417 13418 13419 13420 13421 13422 13423
/**
 * virStoragePoolNumOfVolumes:
 * @pool: pointer to storage pool
 *
 * Fetch the number of storage volumes within a pool
 *
 * Returns the number of storage pools, or -1 on failure
 */
int
virStoragePoolNumOfVolumes(virStoragePoolPtr pool)
{
13424
    VIR_DEBUG("pool=%p", pool);
13425

13426 13427
    virResetLastError();

13428
    virCheckStoragePoolReturn(pool, -1);
13429

13430
    if (pool->conn->storageDriver && pool->conn->storageDriver->storagePoolNumOfVolumes) {
13431
        int ret;
13432
        ret = pool->conn->storageDriver->storagePoolNumOfVolumes(pool);
13433 13434 13435 13436
        if (ret < 0)
            goto error;
        return ret;
    }
13437

13438
    virReportUnsupportedError();
13439

13440
 error:
13441
    virDispatchError(pool->conn);
13442 13443 13444 13445 13446 13447 13448 13449 13450 13451 13452 13453 13454
    return -1;
}


/**
 * virStoragePoolListVolumes:
 * @pool: pointer to storage pool
 * @names: array in which to storage volume names
 * @maxnames: size of names array
 *
 * Fetch list of storage volume names, limiting to
 * at most maxnames.
 *
13455 13456
 * To list the volume objects directly, see virStoragePoolListAllVolumes().
 *
13457 13458 13459 13460 13461 13462 13463
 * Returns the number of names fetched, or -1 on error
 */
int
virStoragePoolListVolumes(virStoragePoolPtr pool,
                          char **const names,
                          int maxnames)
{
13464
    VIR_DEBUG("pool=%p, names=%p, maxnames=%d", pool, names, maxnames);
13465

13466 13467
    virResetLastError();

13468
    virCheckStoragePoolReturn(pool, -1);
13469 13470
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
13471

13472
    if (pool->conn->storageDriver && pool->conn->storageDriver->storagePoolListVolumes) {
13473
        int ret;
13474
        ret = pool->conn->storageDriver->storagePoolListVolumes(pool, names, maxnames);
13475 13476 13477 13478
        if (ret < 0)
            goto error;
        return ret;
    }
13479

13480
    virReportUnsupportedError();
13481

13482
 error:
13483
    virDispatchError(pool->conn);
13484 13485 13486 13487 13488 13489
    return -1;
}


/**
 * virStorageVolGetConnect:
13490
 * @vol: pointer to a pool
13491 13492 13493 13494 13495 13496 13497 13498 13499 13500 13501 13502
 *
 * Provides the connection pointer associated with a storage volume.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the volume object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
13503
virStorageVolGetConnect(virStorageVolPtr vol)
13504
{
13505
    VIR_DEBUG("vol=%p", vol);
13506

13507 13508
    virResetLastError();

13509 13510
    virCheckStorageVolReturn(vol, NULL);

13511 13512 13513 13514 13515 13516 13517 13518 13519 13520 13521 13522
    return vol->conn;
}


/**
 * virStorageVolLookupByName:
 * @pool: pointer to storage pool
 * @name: name of storage volume
 *
 * Fetch a pointer to a storage volume based on its name
 * within a pool
 *
13523
 * Returns a storage volume, or NULL if not found / error
13524 13525 13526 13527 13528
 */
virStorageVolPtr
virStorageVolLookupByName(virStoragePoolPtr pool,
                          const char *name)
{
13529
    VIR_DEBUG("pool=%p, name=%s", pool, name);
13530

13531 13532
    virResetLastError();

13533
    virCheckStoragePoolReturn(pool, NULL);
13534
    virCheckNonNullArgGoto(name, error);
13535

13536
    if (pool->conn->storageDriver && pool->conn->storageDriver->storageVolLookupByName) {
13537
        virStorageVolPtr ret;
13538
        ret = pool->conn->storageDriver->storageVolLookupByName(pool, name);
13539 13540 13541 13542
        if (!ret)
            goto error;
        return ret;
    }
13543

13544
    virReportUnsupportedError();
13545

13546
 error:
13547
    virDispatchError(pool->conn);
13548 13549 13550 13551 13552 13553 13554 13555 13556 13557 13558 13559
    return NULL;
}


/**
 * virStorageVolLookupByKey:
 * @conn: pointer to hypervisor connection
 * @key: globally unique key
 *
 * Fetch a pointer to a storage volume based on its
 * globally unique key
 *
13560
 * Returns a storage volume, or NULL if not found / error
13561 13562 13563 13564 13565
 */
virStorageVolPtr
virStorageVolLookupByKey(virConnectPtr conn,
                         const char *key)
{
13566
    VIR_DEBUG("conn=%p, key=%s", conn, key);
13567

13568 13569
    virResetLastError();

13570
    virCheckConnectReturn(conn, NULL);
13571
    virCheckNonNullArgGoto(key, error);
13572

13573
    if (conn->storageDriver && conn->storageDriver->storageVolLookupByKey) {
13574
        virStorageVolPtr ret;
13575
        ret = conn->storageDriver->storageVolLookupByKey(conn, key);
13576 13577 13578 13579
        if (!ret)
            goto error;
        return ret;
    }
13580

13581
    virReportUnsupportedError();
13582

13583
 error:
13584
    virDispatchError(conn);
13585 13586 13587
    return NULL;
}

13588

13589 13590 13591 13592 13593 13594 13595 13596
/**
 * virStorageVolLookupByPath:
 * @conn: pointer to hypervisor connection
 * @path: locally unique path
 *
 * Fetch a pointer to a storage volume based on its
 * locally (host) unique path
 *
13597
 * Returns a storage volume, or NULL if not found / error
13598 13599 13600 13601 13602
 */
virStorageVolPtr
virStorageVolLookupByPath(virConnectPtr conn,
                          const char *path)
{
13603
    VIR_DEBUG("conn=%p, path=%s", conn, path);
13604

13605 13606
    virResetLastError();

13607
    virCheckConnectReturn(conn, NULL);
13608
    virCheckNonNullArgGoto(path, error);
13609

13610
    if (conn->storageDriver && conn->storageDriver->storageVolLookupByPath) {
13611
        virStorageVolPtr ret;
13612
        ret = conn->storageDriver->storageVolLookupByPath(conn, path);
13613 13614 13615 13616
        if (!ret)
            goto error;
        return ret;
    }
13617

13618
    virReportUnsupportedError();
13619

13620
 error:
13621
    virDispatchError(conn);
13622 13623 13624 13625 13626 13627 13628 13629 13630 13631 13632
    return NULL;
}


/**
 * virStorageVolGetName:
 * @vol: pointer to storage volume
 *
 * Fetch the storage volume name. This is unique
 * within the scope of a pool
 *
13633
 * Returns the volume name, or NULL on error
13634 13635 13636 13637
 */
const char*
virStorageVolGetName(virStorageVolPtr vol)
{
13638
    VIR_DEBUG("vol=%p", vol);
13639

13640 13641
    virResetLastError();

13642 13643
    virCheckStorageVolReturn(vol, NULL);

13644
    return vol->name;
13645 13646 13647 13648 13649 13650 13651 13652
}


/**
 * virStorageVolGetKey:
 * @vol: pointer to storage volume
 *
 * Fetch the storage volume key. This is globally
13653
 * unique, so the same volume will have the same
13654 13655
 * key no matter what host it is accessed from
 *
13656
 * Returns the volume key, or NULL on error
13657 13658 13659 13660
 */
const char*
virStorageVolGetKey(virStorageVolPtr vol)
{
13661
    VIR_DEBUG("vol=%p", vol);
13662

13663 13664
    virResetLastError();

13665 13666
    virCheckStorageVolReturn(vol, NULL);

13667
    return vol->key;
13668 13669 13670 13671 13672 13673
}


/**
 * virStorageVolCreateXML:
 * @pool: pointer to storage pool
E
Eric Blake 已提交
13674
 * @xmlDesc: description of volume to create
13675
 * @flags: bitwise-OR of virStorageVolCreateFlags
13676 13677 13678
 *
 * Create a storage volume within a pool based
 * on an XML description. Not all pools support
13679 13680 13681 13682 13683 13684
 * creation of volumes.
 *
 * Since 1.0.1 VIR_STORAGE_VOL_CREATE_PREALLOC_METADATA
 * in flags can be used to get higher performance with
 * qcow2 image files which don't support full preallocation,
 * by creating a sparse image file with metadata.
13685
 *
13686
 * Returns the storage volume, or NULL on error
13687 13688 13689
 */
virStorageVolPtr
virStorageVolCreateXML(virStoragePoolPtr pool,
E
Eric Blake 已提交
13690
                       const char *xmlDesc,
13691 13692
                       unsigned int flags)
{
E
Eric Blake 已提交
13693
    VIR_DEBUG("pool=%p, xmlDesc=%s, flags=%x", pool, xmlDesc, flags);
13694

13695 13696
    virResetLastError();

13697
    virCheckStoragePoolReturn(pool, NULL);
E
Eric Blake 已提交
13698
    virCheckNonNullArgGoto(xmlDesc, error);
13699
    virCheckReadOnlyGoto(pool->conn->flags, error);
13700

13701
    if (pool->conn->storageDriver && pool->conn->storageDriver->storageVolCreateXML) {
13702
        virStorageVolPtr ret;
13703
        ret = pool->conn->storageDriver->storageVolCreateXML(pool, xmlDesc, flags);
13704 13705 13706 13707
        if (!ret)
            goto error;
        return ret;
    }
13708

13709
    virReportUnsupportedError();
13710

13711
 error:
13712
    virDispatchError(pool->conn);
13713 13714 13715 13716
    return NULL;
}


13717 13718 13719
/**
 * virStorageVolCreateXMLFrom:
 * @pool: pointer to parent pool for the new volume
E
Eric Blake 已提交
13720
 * @xmlDesc: description of volume to create
13721
 * @clonevol: storage volume to use as input
13722
 * @flags: bitwise-OR of virStorageVolCreateFlags
13723 13724 13725 13726 13727 13728
 *
 * Create a storage volume in the parent pool, using the
 * 'clonevol' volume as input. Information for the new
 * volume (name, perms)  are passed via a typical volume
 * XML description.
 *
13729 13730 13731 13732 13733
 * Since 1.0.1 VIR_STORAGE_VOL_CREATE_PREALLOC_METADATA
 * in flags can be used to get higher performance with
 * qcow2 image files which don't support full preallocation,
 * by creating a sparse image file with metadata.
 *
13734
 * Returns the storage volume, or NULL on error
13735 13736 13737
 */
virStorageVolPtr
virStorageVolCreateXMLFrom(virStoragePoolPtr pool,
E
Eric Blake 已提交
13738
                           const char *xmlDesc,
13739 13740 13741
                           virStorageVolPtr clonevol,
                           unsigned int flags)
{
E
Eric Blake 已提交
13742 13743
    VIR_DEBUG("pool=%p, xmlDesc=%s, clonevol=%p, flags=%x",
              pool, xmlDesc, clonevol, flags);
13744 13745 13746

    virResetLastError();

13747
    virCheckStoragePoolReturn(pool, NULL);
13748
    virCheckStorageVolGoto(clonevol, error);
E
Eric Blake 已提交
13749
    virCheckNonNullArgGoto(xmlDesc, error);
13750
    virCheckReadOnlyGoto(pool->conn->flags | clonevol->conn->flags, error);
13751 13752

    if (pool->conn->storageDriver &&
13753
        pool->conn->storageDriver->storageVolCreateXMLFrom) {
13754
        virStorageVolPtr ret;
13755
        ret = pool->conn->storageDriver->storageVolCreateXMLFrom(pool, xmlDesc,
13756
                                                          clonevol, flags);
13757 13758 13759 13760 13761
        if (!ret)
            goto error;
        return ret;
    }

13762
    virReportUnsupportedError();
13763

13764
 error:
13765
    virDispatchError(pool->conn);
13766 13767 13768 13769
    return NULL;
}


13770 13771 13772 13773 13774 13775
/**
 * virStorageVolDownload:
 * @vol: pointer to volume to download from
 * @stream: stream to use as output
 * @offset: position in @vol to start reading from
 * @length: limit on amount of data to download
13776
 * @flags: extra flags; not used yet, so callers should always pass 0
13777 13778 13779 13780 13781 13782 13783 13784 13785 13786 13787 13788 13789 13790 13791 13792 13793 13794 13795 13796
 *
 * Download the content of the volume as a stream. If @length
 * is zero, then the remaining contents of the volume after
 * @offset will be downloaded.
 *
 * This call sets up an asynchronous stream; subsequent use of
 * stream APIs is necessary to transfer the actual data,
 * determine how much data is successfully transferred, and
 * detect any errors. The results will be unpredictable if
 * another active stream is writing to the storage volume.
 *
 * Returns 0, or -1 upon error.
 */
int
virStorageVolDownload(virStorageVolPtr vol,
                      virStreamPtr stream,
                      unsigned long long offset,
                      unsigned long long length,
                      unsigned int flags)
{
E
Eric Blake 已提交
13797
    VIR_DEBUG("vol=%p, stream=%p, offset=%llu, length=%llu, flags=%x",
13798 13799 13800 13801
              vol, stream, offset, length, flags);

    virResetLastError();

13802
    virCheckStorageVolReturn(vol, -1);
13803 13804
    virCheckStreamGoto(stream, error);
    virCheckReadOnlyGoto(vol->conn->flags, error);
13805

13806 13807 13808 13809 13810
    if (vol->conn != stream->conn) {
        virReportInvalidArg(stream,
                            _("stream in %s must match connection of volume '%s'"),
                            __FUNCTION__, vol->name);
        goto error;
13811 13812 13813
    }

    if (vol->conn->storageDriver &&
13814
        vol->conn->storageDriver->storageVolDownload) {
13815
        int ret;
13816
        ret = vol->conn->storageDriver->storageVolDownload(vol,
O
Osier Yang 已提交
13817 13818 13819 13820
                                                           stream,
                                                           offset,
                                                           length,
                                                           flags);
13821 13822 13823 13824 13825
        if (ret < 0)
            goto error;
        return ret;
    }

13826
    virReportUnsupportedError();
13827

13828
 error:
13829 13830 13831 13832 13833 13834 13835 13836 13837 13838 13839
    virDispatchError(vol->conn);
    return -1;
}


/**
 * virStorageVolUpload:
 * @vol: pointer to volume to upload
 * @stream: stream to use as input
 * @offset: position to start writing to
 * @length: limit on amount of data to upload
13840
 * @flags: extra flags; not used yet, so callers should always pass 0
13841 13842 13843 13844 13845 13846 13847 13848 13849 13850 13851 13852 13853 13854 13855 13856 13857 13858 13859 13860 13861 13862
 *
 * Upload new content to the volume from a stream. This call
 * will fail if @offset + @length exceeds the size of the
 * volume. Otherwise, if @length is non-zero, an error
 * will be raised if an attempt is made to upload greater
 * than @length bytes of data.
 *
 * This call sets up an asynchronous stream; subsequent use of
 * stream APIs is necessary to transfer the actual data,
 * determine how much data is successfully transferred, and
 * detect any errors. The results will be unpredictable if
 * another active stream is writing to the storage volume.
 *
 * Returns 0, or -1 upon error.
 */
int
virStorageVolUpload(virStorageVolPtr vol,
                    virStreamPtr stream,
                    unsigned long long offset,
                    unsigned long long length,
                    unsigned int flags)
{
E
Eric Blake 已提交
13863
    VIR_DEBUG("vol=%p, stream=%p, offset=%llu, length=%llu, flags=%x",
13864 13865 13866 13867
              vol, stream, offset, length, flags);

    virResetLastError();

13868
    virCheckStorageVolReturn(vol, -1);
13869 13870
    virCheckStreamGoto(stream, error);
    virCheckReadOnlyGoto(vol->conn->flags, error);
13871

13872 13873 13874 13875 13876
    if (vol->conn != stream->conn) {
        virReportInvalidArg(stream,
                            _("stream in %s must match connection of volume '%s'"),
                            __FUNCTION__, vol->name);
        goto error;
13877 13878 13879
    }

    if (vol->conn->storageDriver &&
13880
        vol->conn->storageDriver->storageVolUpload) {
13881
        int ret;
13882
        ret = vol->conn->storageDriver->storageVolUpload(vol,
13883 13884 13885 13886 13887 13888 13889 13890 13891
                                                  stream,
                                                  offset,
                                                  length,
                                                  flags);
        if (ret < 0)
            goto error;
        return ret;
    }

13892
    virReportUnsupportedError();
13893

13894
 error:
13895 13896 13897 13898 13899
    virDispatchError(vol->conn);
    return -1;
}


13900 13901 13902
/**
 * virStorageVolDelete:
 * @vol: pointer to storage volume
13903
 * @flags: extra flags; not used yet, so callers should always pass 0
13904 13905 13906
 *
 * Delete the storage volume from the pool
 *
13907
 * Returns 0 on success, or -1 on error
13908 13909 13910 13911 13912 13913
 */
int
virStorageVolDelete(virStorageVolPtr vol,
                    unsigned int flags)
{
    virConnectPtr conn;
13914
    VIR_DEBUG("vol=%p, flags=%x", vol, flags);
13915

13916 13917
    virResetLastError();

13918
    virCheckStorageVolReturn(vol, -1);
13919
    conn = vol->conn;
13920

13921
    virCheckReadOnlyGoto(conn->flags, error);
13922

13923
    if (conn->storageDriver && conn->storageDriver->storageVolDelete) {
13924
        int ret;
13925
        ret = conn->storageDriver->storageVolDelete(vol, flags);
13926 13927 13928 13929
        if (ret < 0)
            goto error;
        return ret;
    }
13930

13931
    virReportUnsupportedError();
13932

13933
 error:
13934
    virDispatchError(vol->conn);
13935 13936 13937 13938
    return -1;
}


13939 13940 13941
/**
 * virStorageVolWipe:
 * @vol: pointer to storage volume
13942
 * @flags: extra flags; not used yet, so callers should always pass 0
13943 13944 13945 13946 13947 13948 13949 13950 13951 13952
 *
 * Ensure data previously on a volume is not accessible to future reads
 *
 * Returns 0 on success, or -1 on error
 */
int
virStorageVolWipe(virStorageVolPtr vol,
                  unsigned int flags)
{
    virConnectPtr conn;
13953
    VIR_DEBUG("vol=%p, flags=%x", vol, flags);
13954 13955 13956

    virResetLastError();

13957
    virCheckStorageVolReturn(vol, -1);
13958
    conn = vol->conn;
13959

13960
    virCheckReadOnlyGoto(conn->flags, error);
13961

13962
    if (conn->storageDriver && conn->storageDriver->storageVolWipe) {
13963
        int ret;
13964
        ret = conn->storageDriver->storageVolWipe(vol, flags);
13965 13966 13967 13968 13969 13970
        if (ret < 0) {
            goto error;
        }
        return ret;
    }

13971
    virReportUnsupportedError();
13972

13973
 error:
13974 13975 13976 13977 13978
    virDispatchError(vol->conn);
    return -1;
}


13979 13980 13981 13982 13983 13984 13985 13986 13987 13988 13989 13990 13991 13992 13993 13994 13995 13996 13997 13998 13999
/**
 * virStorageVolWipePattern:
 * @vol: pointer to storage volume
 * @algorithm: one of virStorageVolWipeAlgorithm
 * @flags: future flags, use 0 for now
 *
 * Similar to virStorageVolWipe, but one can choose
 * between different wiping algorithms.
 *
 * Returns 0 on success, or -1 on error.
 */
int
virStorageVolWipePattern(virStorageVolPtr vol,
                         unsigned int algorithm,
                         unsigned int flags)
{
    virConnectPtr conn;
    VIR_DEBUG("vol=%p, algorithm=%u, flags=%x", vol, algorithm, flags);

    virResetLastError();

14000
    virCheckStorageVolReturn(vol, -1);
14001
    conn = vol->conn;
14002

14003
    virCheckReadOnlyGoto(conn->flags, error);
14004

14005
    if (conn->storageDriver && conn->storageDriver->storageVolWipePattern) {
14006
        int ret;
14007
        ret = conn->storageDriver->storageVolWipePattern(vol, algorithm, flags);
14008 14009 14010 14011 14012 14013
        if (ret < 0) {
            goto error;
        }
        return ret;
    }

14014
    virReportUnsupportedError();
14015

14016
 error:
14017 14018 14019 14020
    virDispatchError(vol->conn);
    return -1;
}

14021

14022 14023 14024 14025 14026
/**
 * virStorageVolFree:
 * @vol: pointer to storage volume
 *
 * Release the storage volume handle. The underlying
14027
 * storage volume continues to exist.
14028
 *
14029
 * Returns 0 on success, or -1 on error
14030 14031 14032 14033
 */
int
virStorageVolFree(virStorageVolPtr vol)
{
14034
    VIR_DEBUG("vol=%p", vol);
14035

14036 14037
    virResetLastError();

14038 14039
    virCheckStorageVolReturn(vol, -1);

14040
    virObjectUnref(vol);
14041
    return 0;
14042 14043 14044
}


14045 14046
/**
 * virStorageVolRef:
D
Daniel Veillard 已提交
14047
 * @vol: the vol to hold a reference on
14048 14049 14050 14051 14052 14053 14054 14055 14056 14057 14058
 *
 * Increment the reference count on the vol. For each
 * additional call to this method, there shall be a corresponding
 * call to virStorageVolFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a vol would increment
 * the reference count.
D
Daniel Veillard 已提交
14059 14060
 *
 * Returns 0 in case of success, -1 in case of failure.
14061 14062 14063 14064
 */
int
virStorageVolRef(virStorageVolPtr vol)
{
14065 14066
    VIR_DEBUG("vol=%p refs=%d", vol, vol ? vol->object.u.s.refs : 0);

14067 14068
    virResetLastError();

14069 14070
    virCheckStorageVolReturn(vol, -1);

14071
    virObjectRef(vol);
14072 14073 14074
    return 0;
}

14075

14076 14077 14078 14079 14080 14081 14082 14083
/**
 * virStorageVolGetInfo:
 * @vol: pointer to storage volume
 * @info: pointer at which to store info
 *
 * Fetches volatile information about the storage
 * volume such as its current allocation
 *
14084
 * Returns 0 on success, or -1 on failure
14085 14086 14087 14088 14089 14090
 */
int
virStorageVolGetInfo(virStorageVolPtr vol,
                     virStorageVolInfoPtr info)
{
    virConnectPtr conn;
14091
    VIR_DEBUG("vol=%p, info=%p", vol, info);
14092

14093 14094
    virResetLastError();

14095 14096 14097
    if (info)
        memset(info, 0, sizeof(*info));

14098
    virCheckStorageVolReturn(vol, -1);
14099
    virCheckNonNullArgGoto(info, error);
14100 14101 14102

    conn = vol->conn;

14103
    if (conn->storageDriver->storageVolGetInfo){
14104
        int ret;
14105
        ret = conn->storageDriver->storageVolGetInfo(vol, info);
14106 14107 14108 14109
        if (ret < 0)
            goto error;
        return ret;
    }
14110

14111
    virReportUnsupportedError();
14112

14113
 error:
14114
    virDispatchError(vol->conn);
14115 14116 14117 14118 14119 14120 14121
    return -1;
}


/**
 * virStorageVolGetXMLDesc:
 * @vol: pointer to storage volume
14122
 * @flags: extra flags; not used yet, so callers should always pass 0
14123 14124 14125 14126
 *
 * Fetch an XML document describing all aspects of
 * the storage volume
 *
14127
 * Returns the XML document, or NULL on error
14128 14129 14130 14131 14132 14133
 */
char *
virStorageVolGetXMLDesc(virStorageVolPtr vol,
                        unsigned int flags)
{
    virConnectPtr conn;
14134
    VIR_DEBUG("vol=%p, flags=%x", vol, flags);
14135

14136 14137
    virResetLastError();

14138
    virCheckStorageVolReturn(vol, NULL);
14139 14140
    conn = vol->conn;

14141
    if (conn->storageDriver && conn->storageDriver->storageVolGetXMLDesc) {
14142
        char *ret;
14143
        ret = conn->storageDriver->storageVolGetXMLDesc(vol, flags);
14144 14145 14146 14147
        if (!ret)
            goto error;
        return ret;
    }
14148

14149
    virReportUnsupportedError();
14150

14151
 error:
14152
    virDispatchError(vol->conn);
14153
    return NULL;
14154 14155 14156 14157 14158 14159 14160 14161 14162 14163 14164 14165 14166
}


/**
 * virStorageVolGetPath:
 * @vol: pointer to storage volume
 *
 * Fetch the storage volume path. Depending on the pool
 * configuration this is either persistent across hosts,
 * or dynamically assigned at pool startup. Consult
 * pool documentation for information on getting the
 * persistent naming
 *
14167 14168
 * Returns the storage volume path, or NULL on error. The
 * caller must free() the returned path after use.
14169 14170 14171 14172 14173
 */
char *
virStorageVolGetPath(virStorageVolPtr vol)
{
    virConnectPtr conn;
14174
    VIR_DEBUG("vol=%p", vol);
14175

14176 14177
    virResetLastError();

14178
    virCheckStorageVolReturn(vol, NULL);
14179 14180
    conn = vol->conn;

14181
    if (conn->storageDriver && conn->storageDriver->storageVolGetPath) {
14182
        char *ret;
14183
        ret = conn->storageDriver->storageVolGetPath(vol);
14184 14185 14186 14187
        if (!ret)
            goto error;
        return ret;
    }
14188

14189
    virReportUnsupportedError();
14190

14191
 error:
14192
    virDispatchError(vol->conn);
14193 14194
    return NULL;
}
14195

14196

14197 14198 14199 14200 14201 14202 14203 14204 14205
/**
 * virStorageVolResize:
 * @vol: pointer to storage volume
 * @capacity: new capacity, in bytes
 * @flags: bitwise-OR of virStorageVolResizeFlags
 *
 * Changes the capacity of the storage volume @vol to @capacity. The
 * operation will fail if the new capacity requires allocation that would
 * exceed the remaining free space in the parent pool.  The contents of
14206 14207
 * the new capacity will appear as all zero bytes. The capacity value will
 * be rounded to the granularity supported by the hypervisor.
14208 14209 14210 14211 14212 14213 14214 14215
 *
 * Normally, the operation will attempt to affect capacity with a minimum
 * impact on allocation (that is, the default operation favors a sparse
 * resize).  If @flags contains VIR_STORAGE_VOL_RESIZE_ALLOCATE, then the
 * operation will ensure that allocation is sufficient for the new
 * capacity; this may make the operation take noticeably longer.
 *
 * Normally, the operation treats @capacity as the new size in bytes;
A
Alex Jia 已提交
14216
 * but if @flags contains VIR_STORAGE_VOL_RESIZE_DELTA, then @capacity
14217 14218 14219 14220 14221
 * represents the size difference to add to the current size.  It is
 * up to the storage pool implementation whether unaligned requests are
 * rounded up to the next valid boundary, or rejected.
 *
 * Normally, this operation should only be used to enlarge capacity;
A
Alex Jia 已提交
14222
 * but if @flags contains VIR_STORAGE_VOL_RESIZE_SHRINK, it is possible to
14223
 * attempt a reduction in capacity even though it might cause data loss.
A
Alex Jia 已提交
14224
 * If VIR_STORAGE_VOL_RESIZE_DELTA is also present, then @capacity is
E
Eric Blake 已提交
14225 14226 14227
 * subtracted from the current size; without it, @capacity represents
 * the absolute new size regardless of whether it is larger or smaller
 * than the current size.
14228 14229 14230 14231 14232
 *
 * Returns 0 on success, or -1 on error.
 */
int
virStorageVolResize(virStorageVolPtr vol,
E
Eric Blake 已提交
14233
                    unsigned long long capacity,
14234 14235 14236
                    unsigned int flags)
{
    virConnectPtr conn;
E
Eric Blake 已提交
14237
    VIR_DEBUG("vol=%p capacity=%llu flags=%x", vol, capacity, flags);
14238 14239 14240

    virResetLastError();

14241
    virCheckStorageVolReturn(vol, -1);
14242 14243
    conn = vol->conn;

14244
    virCheckReadOnlyGoto(conn->flags, error);
14245

E
Eric Blake 已提交
14246 14247 14248
    /* Zero capacity is only valid with either delta or shrink.  */
    if (capacity == 0 && !((flags & VIR_STORAGE_VOL_RESIZE_DELTA) ||
                           (flags & VIR_STORAGE_VOL_RESIZE_SHRINK))) {
14249
        virReportInvalidArg(capacity,
14250 14251
                            _("capacity in %s cannot be zero without 'delta' "
                              "or 'shrink' flags set"),
14252
                            __FUNCTION__);
14253 14254 14255
        goto error;
    }

14256
    if (conn->storageDriver && conn->storageDriver->storageVolResize) {
14257
        int ret;
14258
        ret = conn->storageDriver->storageVolResize(vol, capacity, flags);
14259 14260 14261 14262 14263
        if (ret < 0)
            goto error;
        return ret;
    }

14264
    virReportUnsupportedError();
14265

14266
 error:
14267 14268 14269
    virDispatchError(vol->conn);
    return -1;
}
14270

14271

14272 14273 14274 14275
/**
 * virNodeNumOfDevices:
 * @conn: pointer to the hypervisor connection
 * @cap: capability name
14276
 * @flags: extra flags; not used yet, so callers should always pass 0
14277 14278 14279 14280 14281 14282 14283 14284 14285 14286 14287
 *
 * Provides the number of node devices.
 *
 * If the optional 'cap'  argument is non-NULL, then the count
 * will be restricted to devices with the specified capability
 *
 * Returns the number of node devices or -1 in case of error
 */
int
virNodeNumOfDevices(virConnectPtr conn, const char *cap, unsigned int flags)
{
14288
    VIR_DEBUG("conn=%p, cap=%s, flags=%x", conn, NULLSTR(cap), flags);
14289

14290 14291
    virResetLastError();

14292
    virCheckConnectReturn(conn, -1);
14293

14294
    if (conn->nodeDeviceDriver && conn->nodeDeviceDriver->nodeNumOfDevices) {
14295
        int ret;
14296
        ret = conn->nodeDeviceDriver->nodeNumOfDevices(conn, cap, flags);
14297 14298 14299 14300
        if (ret < 0)
            goto error;
        return ret;
    }
14301

14302
    virReportUnsupportedError();
14303

14304
 error:
14305
    virDispatchError(conn);
14306 14307 14308
    return -1;
}

14309

14310 14311 14312 14313 14314 14315 14316 14317 14318 14319 14320 14321 14322 14323 14324 14325 14326 14327 14328 14329 14330 14331 14332 14333 14334 14335 14336 14337
/**
 * virConnectListAllNodeDevices:
 * @conn: Pointer to the hypervisor connection.
 * @devices: Pointer to a variable to store the array containing the node
 *           device objects or NULL if the list is not required (just returns
 *           number of node devices).
 * @flags: bitwise-OR of virConnectListAllNodeDevices.
 *
 * Collect the list of node devices, and allocate an array to store those
 * objects.
 *
 * Normally, all node devices are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted node devices.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a node device, and where all bits
 * within a group describe all possible node devices.
 *
 * Only one group of the @flags is provided to filter the node devices by
 * capability type, flags include:
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SYSTEM
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_PCI_DEV
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_USB_DEV
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_USB_INTERFACE
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_NET
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI_HOST
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI_TARGET
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_STORAGE
14338 14339
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_FC_HOST
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_VPORTS
14340
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI_GENERIC
14341 14342 14343 14344 14345 14346 14347 14348 14349 14350 14351 14352 14353 14354 14355 14356 14357 14358 14359 14360
 *
 * Returns the number of node devices found or -1 and sets @devices to NULL in
 * case of error.  On success, the array stored into @devices is guaranteed to
 * have an extra allocated element set to NULL but not included in the return
 * count, to make iteration easier.  The caller is responsible for calling
 * virNodeDeviceFree() on each array element, then calling free() on
 * @devices.
 */
int
virConnectListAllNodeDevices(virConnectPtr conn,
                             virNodeDevicePtr **devices,
                             unsigned int flags)
{
    VIR_DEBUG("conn=%p, devices=%p, flags=%x", conn, devices, flags);

    virResetLastError();

    if (devices)
        *devices = NULL;

14361
    virCheckConnectReturn(conn, -1);
14362

14363 14364
    if (conn->nodeDeviceDriver &&
        conn->nodeDeviceDriver->connectListAllNodeDevices) {
14365
        int ret;
14366
        ret = conn->nodeDeviceDriver->connectListAllNodeDevices(conn, devices, flags);
14367 14368 14369 14370 14371
        if (ret < 0)
            goto error;
        return ret;
    }

14372
    virReportUnsupportedError();
14373

14374
 error:
14375 14376 14377
    virDispatchError(conn);
    return -1;
}
14378

14379

14380 14381 14382 14383 14384 14385
/**
 * virNodeListDevices:
 * @conn: pointer to the hypervisor connection
 * @cap: capability name
 * @names: array to collect the list of node device names
 * @maxnames: size of @names
14386
 * @flags: extra flags; not used yet, so callers should always pass 0
14387 14388 14389
 *
 * Collect the list of node devices, and store their names in @names
 *
14390 14391
 * For more control over the results, see virConnectListAllNodeDevices().
 *
14392 14393 14394 14395 14396 14397 14398 14399 14400 14401 14402
 * If the optional 'cap'  argument is non-NULL, then the count
 * will be restricted to devices with the specified capability
 *
 * Returns the number of node devices found or -1 in case of error
 */
int
virNodeListDevices(virConnectPtr conn,
                   const char *cap,
                   char **const names, int maxnames,
                   unsigned int flags)
{
14403
    VIR_DEBUG("conn=%p, cap=%s, names=%p, maxnames=%d, flags=%x",
14404 14405
          conn, cap, names, maxnames, flags);

14406 14407
    virResetLastError();

14408
    virCheckConnectReturn(conn, -1);
14409 14410
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
14411

14412
    if (conn->nodeDeviceDriver && conn->nodeDeviceDriver->nodeListDevices) {
14413
        int ret;
14414
        ret = conn->nodeDeviceDriver->nodeListDevices(conn, cap, names, maxnames, flags);
14415 14416 14417 14418
        if (ret < 0)
            goto error;
        return ret;
    }
14419

14420
    virReportUnsupportedError();
14421

14422
 error:
14423
    virDispatchError(conn);
14424 14425 14426 14427 14428 14429 14430 14431 14432 14433 14434 14435 14436
    return -1;
}


/**
 * virNodeDeviceLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: unique device name
 *
 * Lookup a node device by its name.
 *
 * Returns a virNodeDevicePtr if found, NULL otherwise.
 */
14437 14438
virNodeDevicePtr
virNodeDeviceLookupByName(virConnectPtr conn, const char *name)
14439
{
14440
    VIR_DEBUG("conn=%p, name=%p", conn, name);
14441

14442 14443
    virResetLastError();

14444
    virCheckConnectReturn(conn, NULL);
14445
    virCheckNonNullArgGoto(name, error);
14446

14447
    if (conn->nodeDeviceDriver && conn->nodeDeviceDriver->nodeDeviceLookupByName) {
14448
        virNodeDevicePtr ret;
14449
        ret = conn->nodeDeviceDriver->nodeDeviceLookupByName(conn, name);
14450 14451 14452 14453
        if (!ret)
            goto error;
        return ret;
    }
14454

14455
    virReportUnsupportedError();
14456

14457
 error:
14458
    virDispatchError(conn);
14459 14460 14461
    return NULL;
}

14462

14463 14464 14465 14466 14467 14468 14469 14470 14471 14472 14473 14474 14475 14476 14477 14478 14479 14480 14481 14482 14483
/**
 * virNodeDeviceLookupSCSIHostByWWN:
 * @conn: pointer to the hypervisor connection
 * @wwnn: WWNN of the SCSI Host.
 * @wwpn: WWPN of the SCSI Host.
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Lookup SCSI Host which is capable with 'fc_host' by its WWNN and WWPN.
 *
 * Returns a virNodeDevicePtr if found, NULL otherwise.
 */
virNodeDevicePtr
virNodeDeviceLookupSCSIHostByWWN(virConnectPtr conn,
                                 const char *wwnn,
                                 const char *wwpn,
                                 unsigned int flags)
{
    VIR_DEBUG("conn=%p, wwnn=%p, wwpn=%p, flags=%x", conn, wwnn, wwpn, flags);

    virResetLastError();

14484
    virCheckConnectReturn(conn, NULL);
14485 14486 14487
    virCheckNonNullArgGoto(wwnn, error);
    virCheckNonNullArgGoto(wwpn, error);

14488 14489
    if (conn->nodeDeviceDriver &&
        conn->nodeDeviceDriver->nodeDeviceLookupSCSIHostByWWN) {
14490
        virNodeDevicePtr ret;
14491
        ret = conn->nodeDeviceDriver->nodeDeviceLookupSCSIHostByWWN(conn, wwnn,
14492 14493 14494 14495 14496 14497
                                                             wwpn, flags);
        if (!ret)
            goto error;
        return ret;
    }

14498
    virReportUnsupportedError();
14499

14500
 error:
14501 14502 14503
    virDispatchError(conn);
    return NULL;
}
14504

14505

14506 14507 14508
/**
 * virNodeDeviceGetXMLDesc:
 * @dev: pointer to the node device
14509
 * @flags: extra flags; not used yet, so callers should always pass 0
14510 14511 14512 14513
 *
 * Fetch an XML document describing all aspects of
 * the device.
 *
14514
 * Returns the XML document, or NULL on error
14515
 */
14516 14517
char *
virNodeDeviceGetXMLDesc(virNodeDevicePtr dev, unsigned int flags)
14518
{
E
Eric Blake 已提交
14519
    VIR_DEBUG("dev=%p, conn=%p, flags=%x", dev, dev ? dev->conn : NULL, flags);
14520

14521 14522
    virResetLastError();

14523
    virCheckNodeDeviceReturn(dev, NULL);
14524

14525
    if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceGetXMLDesc) {
14526
        char *ret;
14527
        ret = dev->conn->nodeDeviceDriver->nodeDeviceGetXMLDesc(dev, flags);
14528 14529 14530 14531
        if (!ret)
            goto error;
        return ret;
    }
14532

14533
    virReportUnsupportedError();
14534

14535
 error:
14536
    virDispatchError(dev->conn);
14537 14538 14539 14540 14541 14542 14543 14544
    return NULL;
}


/**
 * virNodeDeviceGetName:
 * @dev: the device
 *
D
Daniel Veillard 已提交
14545 14546 14547
 * Just return the device name
 *
 * Returns the device name or NULL in case of error
14548
 */
14549 14550
const char *
virNodeDeviceGetName(virNodeDevicePtr dev)
14551
{
14552
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14553

14554 14555
    virResetLastError();

14556
    virCheckNodeDeviceReturn(dev, NULL);
14557 14558 14559 14560

    return dev->name;
}

14561

14562 14563 14564 14565
/**
 * virNodeDeviceGetParent:
 * @dev: the device
 *
D
Daniel Veillard 已提交
14566 14567
 * Accessor for the parent of the device
 *
14568 14569
 * Returns the name of the device's parent, or NULL if an
 * error occurred or when the device has no parent.
14570
 */
14571 14572
const char *
virNodeDeviceGetParent(virNodeDevicePtr dev)
14573
{
14574
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14575

14576 14577
    virResetLastError();

14578
    virCheckNodeDeviceReturn(dev, NULL);
14579

14580
    if (!dev->parent) {
14581 14582
        if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceGetParent) {
            dev->parent = dev->conn->nodeDeviceDriver->nodeDeviceGetParent(dev);
14583
        } else {
14584
            virReportUnsupportedError();
14585
            virDispatchError(dev->conn);
14586 14587 14588 14589
            return NULL;
        }
    }
    return dev->parent;
14590 14591
}

14592

14593 14594 14595 14596
/**
 * virNodeDeviceNumOfCaps:
 * @dev: the device
 *
D
Daniel Veillard 已提交
14597 14598
 * Accessor for the number of capabilities supported by the device.
 *
14599 14600
 * Returns the number of capabilities supported by the device or -1
 * in case of error.
14601
 */
14602 14603
int
virNodeDeviceNumOfCaps(virNodeDevicePtr dev)
14604
{
14605
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14606

14607 14608
    virResetLastError();

14609
    virCheckNodeDeviceReturn(dev, -1);
14610

14611
    if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceNumOfCaps) {
14612
        int ret;
14613
        ret = dev->conn->nodeDeviceDriver->nodeDeviceNumOfCaps(dev);
14614 14615 14616 14617
        if (ret < 0)
            goto error;
        return ret;
    }
14618

14619
    virReportUnsupportedError();
14620

14621
 error:
14622
    virDispatchError(dev->conn);
14623 14624 14625
    return -1;
}

14626

14627 14628 14629 14630 14631 14632 14633 14634
/**
 * virNodeDeviceListCaps:
 * @dev: the device
 * @names: array to collect the list of capability names
 * @maxnames: size of @names
 *
 * Lists the names of the capabilities supported by the device.
 *
14635 14636
 * Returns the number of capability names listed in @names or -1
 * in case of error.
14637
 */
14638 14639 14640 14641
int
virNodeDeviceListCaps(virNodeDevicePtr dev,
                      char **const names,
                      int maxnames)
14642
{
14643
    VIR_DEBUG("dev=%p, conn=%p, names=%p, maxnames=%d",
14644 14645
          dev, dev ? dev->conn : NULL, names, maxnames);

14646 14647
    virResetLastError();

14648
    virCheckNodeDeviceReturn(dev, -1);
14649 14650
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
14651

14652
    if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceListCaps) {
14653
        int ret;
14654
        ret = dev->conn->nodeDeviceDriver->nodeDeviceListCaps(dev, names, maxnames);
14655 14656 14657 14658
        if (ret < 0)
            goto error;
        return ret;
    }
14659

14660
    virReportUnsupportedError();
14661

14662
 error:
14663
    virDispatchError(dev->conn);
14664 14665 14666 14667 14668 14669 14670 14671 14672 14673 14674 14675 14676
    return -1;
}


/**
 * virNodeDeviceFree:
 * @dev: pointer to the node device
 *
 * Drops a reference to the node device, freeing it if
 * this was the last reference.
 *
 * Returns the 0 for success, -1 for error.
 */
14677 14678
int
virNodeDeviceFree(virNodeDevicePtr dev)
14679
{
14680
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14681

14682 14683
    virResetLastError();

14684 14685
    virCheckNodeDeviceReturn(dev, -1);

14686
    virObjectUnref(dev);
14687
    return 0;
14688 14689 14690
}


14691 14692
/**
 * virNodeDeviceRef:
D
Daniel Veillard 已提交
14693
 * @dev: the dev to hold a reference on
14694 14695 14696 14697 14698 14699 14700 14701 14702 14703 14704
 *
 * Increment the reference count on the dev. For each
 * additional call to this method, there shall be a corresponding
 * call to virNodeDeviceFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a dev would increment
 * the reference count.
D
Daniel Veillard 已提交
14705 14706
 *
 * Returns 0 in case of success, -1 in case of failure.
14707 14708 14709 14710
 */
int
virNodeDeviceRef(virNodeDevicePtr dev)
{
14711 14712
    VIR_DEBUG("dev=%p refs=%d", dev, dev ? dev->object.u.s.refs : 0);

14713 14714
    virResetLastError();

14715 14716
    virCheckNodeDeviceReturn(dev, -1);

14717
    virObjectRef(dev);
14718 14719 14720
    return 0;
}

14721

14722
/**
D
Daniel Veillard 已提交
14723
 * virNodeDeviceDettach:
14724 14725 14726 14727 14728 14729 14730 14731 14732 14733 14734 14735 14736 14737
 * @dev: pointer to the node device
 *
 * Dettach the node device from the node itself so that it may be
 * assigned to a guest domain.
 *
 * Depending on the hypervisor, this may involve operations such
 * as unbinding any device drivers from the device, binding the
 * device to a dummy device driver and resetting the device.
 *
 * If the device is currently in use by the node, this method may
 * fail.
 *
 * Once the device is not assigned to any guest, it may be re-attached
 * to the node using the virNodeDeviceReattach() method.
D
Daniel Veillard 已提交
14738
 *
14739 14740 14741 14742 14743
 * If the caller needs control over which backend driver will be used
 * during PCI device assignment (to use something other than the
 * default, for example VFIO), the newer virNodeDeviceDetachFlags()
 * API should be used instead.
 *
D
Daniel Veillard 已提交
14744
 * Returns 0 in case of success, -1 in case of failure.
14745 14746 14747 14748
 */
int
virNodeDeviceDettach(virNodeDevicePtr dev)
{
14749
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14750 14751 14752

    virResetLastError();

14753
    virCheckNodeDeviceReturn(dev, -1);
14754
    virCheckReadOnlyGoto(dev->conn->flags, error);
14755

14756 14757
    if (dev->conn->driver->nodeDeviceDettach) {
        int ret;
14758
        ret = dev->conn->driver->nodeDeviceDettach(dev);
14759 14760 14761 14762 14763
        if (ret < 0)
            goto error;
        return ret;
    }

14764
    virReportUnsupportedError();
14765

14766
 error:
14767
    virDispatchError(dev->conn);
14768
    return -1;
14769 14770
}

14771

14772 14773 14774 14775 14776 14777 14778 14779 14780 14781 14782 14783 14784 14785 14786 14787 14788 14789 14790 14791 14792 14793 14794 14795 14796 14797 14798 14799 14800 14801 14802 14803 14804 14805 14806 14807 14808 14809
/**
 * virNodeDeviceDetachFlags:
 * @dev: pointer to the node device
 * @driverName: name of backend driver that will be used
 *              for later device assignment to a domain. NULL
 *              means "use the hypervisor default driver"
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Detach the node device from the node itself so that it may be
 * assigned to a guest domain.
 *
 * Depending on the hypervisor, this may involve operations such as
 * unbinding any device drivers from the device, binding the device to
 * a dummy device driver and resetting the device. Different backend
 * drivers expect the device to be bound to different dummy
 * devices. For example, QEMU's "kvm" backend driver (the default)
 * expects the device to be bound to "pci-stub", but its "vfio"
 * backend driver expects the device to be bound to "vfio-pci".
 *
 * If the device is currently in use by the node, this method may
 * fail.
 *
 * Once the device is not assigned to any guest, it may be re-attached
 * to the node using the virNodeDeviceReAttach() method.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virNodeDeviceDetachFlags(virNodeDevicePtr dev,
                         const char *driverName,
                         unsigned int flags)
{
    VIR_DEBUG("dev=%p, conn=%p driverName=%s flags=%x",
              dev, dev ? dev->conn : NULL,
              driverName ? driverName : "(default)", flags);

    virResetLastError();

14810
    virCheckNodeDeviceReturn(dev, -1);
14811
    virCheckReadOnlyGoto(dev->conn->flags, error);
14812 14813 14814 14815 14816 14817 14818 14819 14820

    if (dev->conn->driver->nodeDeviceDetachFlags) {
        int ret;
        ret = dev->conn->driver->nodeDeviceDetachFlags(dev, driverName, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

14821
    virReportUnsupportedError();
14822

14823
 error:
14824 14825 14826 14827
    virDispatchError(dev->conn);
    return -1;
}

14828

14829 14830 14831 14832 14833 14834 14835 14836 14837 14838 14839 14840
/**
 * virNodeDeviceReAttach:
 * @dev: pointer to the node device
 *
 * Re-attach a previously dettached node device to the node so that it
 * may be used by the node again.
 *
 * Depending on the hypervisor, this may involve operations such
 * as resetting the device, unbinding it from a dummy device driver
 * and binding it to its appropriate driver.
 *
 * If the device is currently in use by a guest, this method may fail.
D
Daniel Veillard 已提交
14841 14842
 *
 * Returns 0 in case of success, -1 in case of failure.
14843 14844 14845 14846
 */
int
virNodeDeviceReAttach(virNodeDevicePtr dev)
{
14847
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14848 14849 14850

    virResetLastError();

14851
    virCheckNodeDeviceReturn(dev, -1);
14852
    virCheckReadOnlyGoto(dev->conn->flags, error);
14853

14854 14855
    if (dev->conn->driver->nodeDeviceReAttach) {
        int ret;
14856
        ret = dev->conn->driver->nodeDeviceReAttach(dev);
14857 14858 14859 14860 14861
        if (ret < 0)
            goto error;
        return ret;
    }

14862
    virReportUnsupportedError();
14863

14864
 error:
14865
    virDispatchError(dev->conn);
14866
    return -1;
14867 14868
}

14869

14870 14871 14872 14873 14874 14875 14876 14877 14878 14879 14880 14881 14882 14883
/**
 * virNodeDeviceReset:
 * @dev: pointer to the node device
 *
 * Reset a previously dettached node device to the node before or
 * after assigning it to a guest.
 *
 * The exact reset semantics depends on the hypervisor and device
 * type but, for example, KVM will attempt to reset PCI devices with
 * a Function Level Reset, Secondary Bus Reset or a Power Management
 * D-State reset.
 *
 * If the reset will affect other devices which are currently in use,
 * this function may fail.
D
Daniel Veillard 已提交
14884 14885
 *
 * Returns 0 in case of success, -1 in case of failure.
14886 14887 14888 14889
 */
int
virNodeDeviceReset(virNodeDevicePtr dev)
{
14890
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14891 14892 14893

    virResetLastError();

14894
    virCheckNodeDeviceReturn(dev, -1);
14895
    virCheckReadOnlyGoto(dev->conn->flags, error);
14896

14897 14898
    if (dev->conn->driver->nodeDeviceReset) {
        int ret;
14899
        ret = dev->conn->driver->nodeDeviceReset(dev);
14900 14901 14902 14903 14904
        if (ret < 0)
            goto error;
        return ret;
    }

14905
    virReportUnsupportedError();
14906

14907
 error:
14908
    virDispatchError(dev->conn);
14909
    return -1;
14910 14911
}

14912

14913 14914 14915 14916
/**
 * virNodeDeviceCreateXML:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: string containing an XML description of the device to be created
14917
 * @flags: extra flags; not used yet, so callers should always pass 0
14918 14919 14920 14921 14922 14923 14924 14925 14926 14927 14928
 *
 * Create a new device on the VM host machine, for example, virtual
 * HBAs created using vport_create.
 *
 * Returns a node device object if successful, NULL in case of failure
 */
virNodeDevicePtr
virNodeDeviceCreateXML(virConnectPtr conn,
                       const char *xmlDesc,
                       unsigned int flags)
{
14929
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
14930 14931 14932

    virResetLastError();

14933
    virCheckConnectReturn(conn, NULL);
14934
    virCheckReadOnlyGoto(conn->flags, error);
14935
    virCheckNonNullArgGoto(xmlDesc, error);
14936

14937 14938 14939
    if (conn->nodeDeviceDriver &&
        conn->nodeDeviceDriver->nodeDeviceCreateXML) {
        virNodeDevicePtr dev = conn->nodeDeviceDriver->nodeDeviceCreateXML(conn, xmlDesc, flags);
14940 14941 14942 14943 14944
        if (dev == NULL)
            goto error;
        return dev;
    }

14945
    virReportUnsupportedError();
14946

14947
 error:
14948
    virDispatchError(conn);
14949 14950 14951 14952 14953 14954 14955 14956
    return NULL;
}


/**
 * virNodeDeviceDestroy:
 * @dev: a device object
 *
14957 14958 14959
 * Destroy the device object. The virtual device (only works for vHBA
 * currently) is removed from the host operating system.  This function
 * may require privileged access.
14960 14961 14962 14963 14964 14965
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNodeDeviceDestroy(virNodeDevicePtr dev)
{
14966
    VIR_DEBUG("dev=%p", dev);
14967 14968 14969

    virResetLastError();

14970
    virCheckNodeDeviceReturn(dev, -1);
14971
    virCheckReadOnlyGoto(dev->conn->flags, error);
14972

14973 14974 14975
    if (dev->conn->nodeDeviceDriver &&
        dev->conn->nodeDeviceDriver->nodeDeviceDestroy) {
        int retval = dev->conn->nodeDeviceDriver->nodeDeviceDestroy(dev);
14976 14977 14978 14979 14980 14981 14982
        if (retval < 0) {
            goto error;
        }

        return 0;
    }

14983
    virReportUnsupportedError();
14984

14985
 error:
14986
    virDispatchError(dev->conn);
14987 14988 14989 14990
    return -1;
}


14991 14992 14993 14994 14995 14996 14997 14998 14999
/*
 * Domain Event Notification
 */

/**
 * virConnectDomainEventRegister:
 * @conn: pointer to the connection
 * @cb: callback to the function handling domain events
 * @opaque: opaque data to pass on to the callback
D
Daniel Veillard 已提交
15000
 * @freecb: optional function to deallocate opaque when not used anymore
15001
 *
15002
 * Adds a callback to receive notifications of domain lifecycle events
E
Eric Blake 已提交
15003 15004 15005
 * occurring on a connection.  This function requires that an event loop
 * has been previously registered with virEventRegisterImpl() or
 * virEventRegisterDefaultImpl().
15006 15007
 *
 * Use of this method is no longer recommended. Instead applications
15008
 * should try virConnectDomainEventRegisterAny() which has a more flexible
E
Eric Blake 已提交
15009
 * API contract.
15010
 *
15011 15012
 * The virDomainPtr object handle passed into the callback upon delivery
 * of an event is only valid for the duration of execution of the callback.
15013 15014
 * If the callback wishes to keep the domain object after the callback returns,
 * it shall take a reference to it, by calling virDomainRef.
15015 15016 15017
 * The reference can be released once the object is no longer required
 * by calling virDomainFree.
 *
15018 15019 15020
 * Returns 0 on success, -1 on failure.  Older versions of some hypervisors
 * sometimes returned a positive number on success, but without any reliable
 * semantics on what that number represents.
15021 15022 15023 15024
 */
int
virConnectDomainEventRegister(virConnectPtr conn,
                              virConnectDomainEventCallback cb,
15025 15026
                              void *opaque,
                              virFreeCallback freecb)
15027
{
15028
    VIR_DEBUG("conn=%p, cb=%p, opaque=%p, freecb=%p", conn, cb, opaque, freecb);
15029
    virResetLastError();
15030

15031
    virCheckConnectReturn(conn, -1);
15032
    virCheckNonNullArgGoto(cb, error);
15033

15034
    if (conn->driver && conn->driver->connectDomainEventRegister) {
15035
        int ret;
15036
        ret = conn->driver->connectDomainEventRegister(conn, cb, opaque, freecb);
15037 15038 15039 15040 15041
        if (ret < 0)
            goto error;
        return ret;
    }

15042
    virReportUnsupportedError();
15043
 error:
15044
    virDispatchError(conn);
15045 15046 15047
    return -1;
}

15048

15049 15050 15051 15052 15053
/**
 * virConnectDomainEventDeregister:
 * @conn: pointer to the connection
 * @cb: callback to the function handling domain events
 *
15054 15055
 * Removes a callback previously registered with the
 * virConnectDomainEventRegister() function.
15056 15057
 *
 * Use of this method is no longer recommended. Instead applications
15058
 * should try virConnectDomainEventDeregisterAny() which has a more flexible
15059
 * API contract
15060
 *
15061 15062 15063
 * Returns 0 on success, -1 on failure.  Older versions of some hypervisors
 * sometimes returned a positive number on success, but without any reliable
 * semantics on what that number represents.
15064 15065 15066 15067 15068
 */
int
virConnectDomainEventDeregister(virConnectPtr conn,
                                virConnectDomainEventCallback cb)
{
15069
    VIR_DEBUG("conn=%p, cb=%p", conn, cb);
15070 15071

    virResetLastError();
15072

15073
    virCheckConnectReturn(conn, -1);
15074 15075
    virCheckNonNullArgGoto(cb, error);

15076
    if (conn->driver && conn->driver->connectDomainEventDeregister) {
15077
        int ret;
15078
        ret = conn->driver->connectDomainEventDeregister(conn, cb);
15079 15080 15081
        if (ret < 0)
            goto error;
        return ret;
15082 15083
    }

15084
    virReportUnsupportedError();
15085
 error:
15086
    virDispatchError(conn);
15087 15088
    return -1;
}
15089

15090

15091 15092 15093 15094 15095 15096 15097 15098 15099 15100 15101 15102 15103
/**
 * virSecretGetConnect:
 * @secret: A virSecret secret
 *
 * Provides the connection pointer associated with a secret.  The reference
 * counter on the connection is not increased by this call.
 *
 * WARNING: When writing libvirt bindings in other languages, do not use this
 * function.  Instead, store the connection and the secret object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
15104
virSecretGetConnect(virSecretPtr secret)
15105
{
15106
    VIR_DEBUG("secret=%p", secret);
15107 15108 15109

    virResetLastError();

15110 15111
    virCheckSecretReturn(secret, NULL);

15112 15113 15114
    return secret->conn;
}

15115

15116 15117 15118 15119 15120 15121 15122 15123 15124 15125 15126 15127 15128 15129 15130
/**
 * virConnectNumOfSecrets:
 * @conn: virConnect connection
 *
 * Fetch number of currently defined secrets.
 *
 * Returns the number currently defined secrets.
 */
int
virConnectNumOfSecrets(virConnectPtr conn)
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

15131
    virCheckConnectReturn(conn, -1);
15132 15133

    if (conn->secretDriver != NULL &&
15134
        conn->secretDriver->connectNumOfSecrets != NULL) {
15135 15136
        int ret;

15137
        ret = conn->secretDriver->connectNumOfSecrets(conn);
15138 15139 15140 15141 15142
        if (ret < 0)
            goto error;
        return ret;
    }

15143
    virReportUnsupportedError();
15144

15145
 error:
15146
    virDispatchError(conn);
15147 15148 15149
    return -1;
}

15150

15151 15152 15153 15154 15155 15156 15157 15158 15159 15160 15161 15162 15163 15164 15165 15166 15167 15168 15169 15170 15171 15172 15173 15174 15175 15176 15177 15178 15179 15180 15181 15182 15183 15184 15185 15186 15187 15188 15189 15190 15191 15192 15193 15194 15195
/**
 * virConnectListAllSecrets:
 * @conn: Pointer to the hypervisor connection.
 * @secrets: Pointer to a variable to store the array containing the secret
 *           objects or NULL if the list is not required (just returns the
 *           number of secrets).
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Collect the list of secrets, and allocate an array to store those
 * objects.
 *
 * Normally, all secrets are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted secrets. The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a secret, and where all bits
 * within a group describe all possible secrets.
 *
 * The first group of @flags is used to filter secrets by its storage
 * location. Flag VIR_CONNECT_LIST_SECRETS_EPHEMERAL selects secrets that
 * are kept only in memory. Flag VIR_CONNECT_LIST_SECRETS_NO_EPHEMERAL
 * selects secrets that are kept in persistent storage.
 *
 * The second group of @flags is used to filter secrets by privacy. Flag
 * VIR_CONNECT_LIST_SECRETS_PRIVATE seclets secrets that are never revealed
 * to any caller of libvirt nor to any other node. Flag
 * VIR_CONNECT_LIST_SECRETS_NO_PRIVATE selects non-private secrets.
 *
 * Returns the number of secrets found or -1 and sets @secrets to NULL in case
 * of error.  On success, the array stored into @secrets is guaranteed to
 * have an extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virSecretFree() on each array element, then calling free() on @secrets.
 */
int
virConnectListAllSecrets(virConnectPtr conn,
                         virSecretPtr **secrets,
                         unsigned int flags)
{
    VIR_DEBUG("conn=%p, secrets=%p, flags=%x", conn, secrets, flags);

    virResetLastError();

    if (secrets)
        *secrets = NULL;

15196
    virCheckConnectReturn(conn, -1);
15197 15198

    if (conn->secretDriver &&
15199
        conn->secretDriver->connectListAllSecrets) {
15200
        int ret;
15201
        ret = conn->secretDriver->connectListAllSecrets(conn, secrets, flags);
15202 15203 15204 15205 15206
        if (ret < 0)
            goto error;
        return ret;
    }

15207
    virReportUnsupportedError();
15208

15209
 error:
15210 15211 15212 15213
    virDispatchError(conn);
    return -1;
}

15214

15215 15216 15217 15218 15219 15220 15221 15222 15223 15224 15225 15226 15227 15228 15229 15230 15231
/**
 * virConnectListSecrets:
 * @conn: virConnect connection
 * @uuids: Pointer to an array to store the UUIDs
 * @maxuuids: size of the array.
 *
 * List UUIDs of defined secrets, store pointers to names in uuids.
 *
 * Returns the number of UUIDs provided in the array, or -1 on failure.
 */
int
virConnectListSecrets(virConnectPtr conn, char **uuids, int maxuuids)
{
    VIR_DEBUG("conn=%p, uuids=%p, maxuuids=%d", conn, uuids, maxuuids);

    virResetLastError();

15232
    virCheckConnectReturn(conn, -1);
15233 15234
    virCheckNonNullArgGoto(uuids, error);
    virCheckNonNegativeArgGoto(maxuuids, error);
15235

15236
    if (conn->secretDriver != NULL && conn->secretDriver->connectListSecrets != NULL) {
15237 15238
        int ret;

15239
        ret = conn->secretDriver->connectListSecrets(conn, uuids, maxuuids);
15240 15241 15242 15243 15244
        if (ret < 0)
            goto error;
        return ret;
    }

15245
    virReportUnsupportedError();
15246

15247
 error:
15248
    virDispatchError(conn);
15249 15250 15251
    return -1;
}

15252

15253
/**
15254 15255 15256
 * virSecretLookupByUUID:
 * @conn: pointer to the hypervisor connection
 * @uuid: the raw UUID for the secret
15257
 *
15258 15259
 * Try to lookup a secret on the given hypervisor based on its UUID.
 * Uses the 16 bytes of raw data to describe the UUID
15260
 *
15261 15262
 * Returns a new secret object or NULL in case of failure.  If the
 * secret cannot be found, then VIR_ERR_NO_SECRET error is raised.
15263 15264
 */
virSecretPtr
15265
virSecretLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
15266
{
15267
    VIR_UUID_DEBUG(conn, uuid);
15268 15269 15270

    virResetLastError();

15271
    virCheckConnectReturn(conn, NULL);
15272
    virCheckNonNullArgGoto(uuid, error);
15273

15274
    if (conn->secretDriver &&
15275
        conn->secretDriver->secretLookupByUUID) {
15276
        virSecretPtr ret;
15277
        ret = conn->secretDriver->secretLookupByUUID(conn, uuid);
15278
        if (!ret)
15279 15280 15281 15282
            goto error;
        return ret;
    }

15283
    virReportUnsupportedError();
15284

15285
 error:
15286
    virDispatchError(conn);
15287 15288 15289
    return NULL;
}

15290

15291 15292 15293 15294 15295 15296 15297 15298 15299 15300 15301 15302 15303 15304 15305
/**
 * virSecretLookupByUUIDString:
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the secret
 *
 * Try to lookup a secret on the given hypervisor based on its UUID.
 * Uses the printable string value to describe the UUID
 *
 * Returns a new secret object or NULL in case of failure.  If the
 * secret cannot be found, then VIR_ERR_NO_SECRET error is raised.
 */
virSecretPtr
virSecretLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
    unsigned char uuid[VIR_UUID_BUFLEN];
15306
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
15307 15308 15309

    virResetLastError();

15310
    virCheckConnectReturn(conn, NULL);
15311
    virCheckNonNullArgGoto(uuidstr, error);
15312 15313

    if (virUUIDParse(uuidstr, uuid) < 0) {
15314 15315 15316
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
15317 15318 15319 15320 15321
        goto error;
    }

    return virSecretLookupByUUID(conn, &uuid[0]);

15322
 error:
15323
    virDispatchError(conn);
15324 15325 15326 15327
    return NULL;
}


15328 15329 15330 15331 15332 15333 15334 15335 15336 15337 15338 15339 15340 15341 15342 15343 15344 15345
/**
 * virSecretLookupByUsage:
 * @conn: pointer to the hypervisor connection
 * @usageType: the type of secret usage
 * @usageID: identifier of the object using the secret
 *
 * Try to lookup a secret on the given hypervisor based on its usage
 * The usageID is unique within the set of secrets sharing the
 * same usageType value.
 *
 * Returns a new secret object or NULL in case of failure.  If the
 * secret cannot be found, then VIR_ERR_NO_SECRET error is raised.
 */
virSecretPtr
virSecretLookupByUsage(virConnectPtr conn,
                       int usageType,
                       const char *usageID)
{
15346
    VIR_DEBUG("conn=%p, usageType=%d usageID=%s", conn, usageType, NULLSTR(usageID));
15347 15348 15349

    virResetLastError();

15350
    virCheckConnectReturn(conn, NULL);
15351
    virCheckNonNullArgGoto(usageID, error);
15352 15353

    if (conn->secretDriver &&
15354
        conn->secretDriver->secretLookupByUsage) {
15355
        virSecretPtr ret;
15356
        ret = conn->secretDriver->secretLookupByUsage(conn, usageType, usageID);
15357 15358 15359 15360 15361
        if (!ret)
            goto error;
        return ret;
    }

15362
    virReportUnsupportedError();
15363

15364
 error:
15365
    virDispatchError(conn);
15366 15367 15368 15369
    return NULL;
}


15370 15371 15372 15373
/**
 * virSecretDefineXML:
 * @conn: virConnect connection
 * @xml: XML describing the secret.
15374
 * @flags: extra flags; not used yet, so callers should always pass 0
15375
 *
D
Dan Kenigsberg 已提交
15376
 * If XML specifies a UUID, locates the specified secret and replaces all
15377 15378 15379 15380 15381 15382
 * attributes of the secret specified by UUID by attributes specified in xml
 * (any attributes not specified in xml are discarded).
 *
 * Otherwise, creates a new secret with an automatically chosen UUID, and
 * initializes its attributes from xml.
 *
W
Wang Yufei 已提交
15383
 * Returns a secret on success, NULL on failure.
15384 15385 15386 15387
 */
virSecretPtr
virSecretDefineXML(virConnectPtr conn, const char *xml, unsigned int flags)
{
15388
    VIR_DEBUG("conn=%p, xml=%s, flags=%x", conn, xml, flags);
15389 15390 15391

    virResetLastError();

15392
    virCheckConnectReturn(conn, NULL);
15393
    virCheckReadOnlyGoto(conn->flags, error);
15394
    virCheckNonNullArgGoto(xml, error);
15395

15396
    if (conn->secretDriver != NULL && conn->secretDriver->secretDefineXML != NULL) {
15397 15398
        virSecretPtr ret;

15399
        ret = conn->secretDriver->secretDefineXML(conn, xml, flags);
15400 15401 15402 15403 15404
        if (ret == NULL)
            goto error;
        return ret;
    }

15405
    virReportUnsupportedError();
15406

15407
 error:
15408
    virDispatchError(conn);
15409 15410 15411
    return NULL;
}

15412

15413
/**
15414
 * virSecretGetUUID:
15415
 * @secret: A virSecret secret
15416
 * @uuid: buffer of VIR_UUID_BUFLEN bytes in size
15417 15418 15419
 *
 * Fetches the UUID of the secret.
 *
15420 15421
 * Returns 0 on success with the uuid buffer being filled, or
 * -1 upon failure.
15422
 */
15423 15424
int
virSecretGetUUID(virSecretPtr secret, unsigned char *uuid)
15425 15426 15427 15428 15429
{
    VIR_DEBUG("secret=%p", secret);

    virResetLastError();

15430
    virCheckSecretReturn(secret, -1);
15431
    virCheckNonNullArgGoto(uuid, error);
15432

15433 15434 15435
    memcpy(uuid, &secret->uuid[0], VIR_UUID_BUFLEN);

    return 0;
15436

15437
 error:
15438 15439
    virDispatchError(secret->conn);
    return -1;
15440 15441
}

15442

15443 15444 15445 15446 15447 15448 15449 15450 15451 15452 15453 15454 15455
/**
 * virSecretGetUUIDString:
 * @secret: a secret object
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
 *
 * Get the UUID for a secret as string. For more information about
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virSecretGetUUIDString(virSecretPtr secret, char *buf)
{
15456
    VIR_DEBUG("secret=%p, buf=%p", secret, buf);
15457 15458

    virResetLastError();
15459

15460
    virCheckSecretReturn(secret, -1);
15461
    virCheckNonNullArgGoto(buf, error);
15462

E
Eric Blake 已提交
15463
    virUUIDFormat(secret->uuid, buf);
15464
    return 0;
15465

15466
 error:
15467
    virDispatchError(secret->conn);
15468
    return -1;
15469 15470
}

15471

15472 15473 15474 15475 15476 15477 15478 15479 15480 15481 15482 15483 15484 15485 15486 15487
/**
 * virSecretGetUsageType:
 * @secret: a secret object
 *
 * Get the type of object which uses this secret. The returned
 * value is one of the constants defined in the virSecretUsageType
 * enumeration. More values may be added to this enumeration in
 * the future, so callers should expect to see usage types they
 * do not explicitly know about.
 *
 * Returns a positive integer identifying the type of object,
 * or -1 upon error.
 */
int
virSecretGetUsageType(virSecretPtr secret)
{
15488
    VIR_DEBUG("secret=%p", secret);
15489 15490 15491

    virResetLastError();

15492 15493
    virCheckSecretReturn(secret, -1);

15494
    return secret->usageType;
15495 15496
}

15497

15498 15499 15500 15501 15502 15503 15504 15505 15506 15507 15508 15509 15510 15511 15512 15513 15514 15515 15516
/**
 * virSecretGetUsageID:
 * @secret: a secret object
 *
 * Get the unique identifier of the object with which this
 * secret is to be used. The format of the identifier is
 * dependant on the usage type of the secret. For a secret
 * with a usage type of VIR_SECRET_USAGE_TYPE_VOLUME the
 * identifier will be a fully qualfied path name. The
 * identifiers are intended to be unique within the set of
 * all secrets sharing the same usage type. ie, there shall
 * only ever be one secret for each volume path.
 *
 * Returns a string identifying the object using the secret,
 * or NULL upon error
 */
const char *
virSecretGetUsageID(virSecretPtr secret)
{
15517
    VIR_DEBUG("secret=%p", secret);
15518 15519 15520

    virResetLastError();

15521 15522
    virCheckSecretReturn(secret, NULL);

15523
    return secret->usageID;
15524 15525
}

15526

15527 15528 15529
/**
 * virSecretGetXMLDesc:
 * @secret: A virSecret secret
15530
 * @flags: extra flags; not used yet, so callers should always pass 0
15531 15532 15533 15534 15535 15536 15537 15538 15539 15540 15541
 *
 * Fetches an XML document describing attributes of the secret.
 *
 * Returns the XML document on success, NULL on failure.  The caller must
 * free() the XML.
 */
char *
virSecretGetXMLDesc(virSecretPtr secret, unsigned int flags)
{
    virConnectPtr conn;

15542
    VIR_DEBUG("secret=%p, flags=%x", secret, flags);
15543 15544 15545

    virResetLastError();

15546
    virCheckSecretReturn(secret, NULL);
15547
    conn = secret->conn;
15548

15549
    if (conn->secretDriver != NULL && conn->secretDriver->secretGetXMLDesc != NULL) {
15550 15551
        char *ret;

15552
        ret = conn->secretDriver->secretGetXMLDesc(secret, flags);
15553 15554 15555 15556 15557
        if (ret == NULL)
            goto error;
        return ret;
    }

15558
    virReportUnsupportedError();
15559

15560
 error:
15561
    virDispatchError(conn);
15562 15563 15564
    return NULL;
}

15565

15566 15567 15568 15569 15570
/**
 * virSecretSetValue:
 * @secret: A virSecret secret
 * @value: Value of the secret
 * @value_size: Size of the value
15571
 * @flags: extra flags; not used yet, so callers should always pass 0
15572 15573 15574 15575 15576 15577 15578 15579 15580 15581 15582
 *
 * Sets the value of a secret.
 *
 * Returns 0 on success, -1 on failure.
 */
int
virSecretSetValue(virSecretPtr secret, const unsigned char *value,
                  size_t value_size, unsigned int flags)
{
    virConnectPtr conn;

15583
    VIR_DEBUG("secret=%p, value=%p, value_size=%zu, flags=%x", secret, value,
15584 15585 15586 15587
              value_size, flags);

    virResetLastError();

15588
    virCheckSecretReturn(secret, -1);
15589
    conn = secret->conn;
15590

15591
    virCheckReadOnlyGoto(conn->flags, error);
15592
    virCheckNonNullArgGoto(value, error);
15593

15594
    if (conn->secretDriver != NULL && conn->secretDriver->secretSetValue != NULL) {
15595 15596
        int ret;

15597
        ret = conn->secretDriver->secretSetValue(secret, value, value_size, flags);
15598 15599 15600 15601 15602
        if (ret < 0)
            goto error;
        return ret;
    }

15603
    virReportUnsupportedError();
15604

15605
 error:
15606
    virDispatchError(conn);
15607 15608 15609
    return -1;
}

15610

15611 15612 15613 15614
/**
 * virSecretGetValue:
 * @secret: A virSecret connection
 * @value_size: Place for storing size of the secret value
15615
 * @flags: extra flags; not used yet, so callers should always pass 0
15616 15617 15618 15619 15620 15621 15622 15623 15624 15625 15626
 *
 * Fetches the value of a secret.
 *
 * Returns the secret value on success, NULL on failure.  The caller must
 * free() the secret value.
 */
unsigned char *
virSecretGetValue(virSecretPtr secret, size_t *value_size, unsigned int flags)
{
    virConnectPtr conn;

15627
    VIR_DEBUG("secret=%p, value_size=%p, flags=%x", secret, value_size, flags);
15628 15629 15630

    virResetLastError();

15631
    virCheckSecretReturn(secret, NULL);
15632
    conn = secret->conn;
15633

15634
    virCheckReadOnlyGoto(conn->flags, error);
15635
    virCheckNonNullArgGoto(value_size, error);
15636

15637
    if (conn->secretDriver != NULL && conn->secretDriver->secretGetValue != NULL) {
15638 15639
        unsigned char *ret;

15640
        ret = conn->secretDriver->secretGetValue(secret, value_size, flags, 0);
15641 15642 15643 15644 15645
        if (ret == NULL)
            goto error;
        return ret;
    }

15646
    virReportUnsupportedError();
15647

15648
 error:
15649
    virDispatchError(conn);
15650 15651 15652
    return NULL;
}

15653

15654 15655 15656 15657 15658 15659 15660 15661 15662 15663 15664 15665 15666 15667 15668 15669 15670 15671
/**
 * virSecretUndefine:
 * @secret: A virSecret secret
 *
 * Deletes the specified secret.  This does not free the associated
 * virSecretPtr object.
 *
 * Returns 0 on success, -1 on failure.
 */
int
virSecretUndefine(virSecretPtr secret)
{
    virConnectPtr conn;

    VIR_DEBUG("secret=%p", secret);

    virResetLastError();

15672
    virCheckSecretReturn(secret, -1);
15673
    conn = secret->conn;
15674

15675
    virCheckReadOnlyGoto(conn->flags, error);
15676

15677
    if (conn->secretDriver != NULL && conn->secretDriver->secretUndefine != NULL) {
15678 15679
        int ret;

15680
        ret = conn->secretDriver->secretUndefine(secret);
15681 15682 15683 15684 15685
        if (ret < 0)
            goto error;
        return ret;
    }

15686
    virReportUnsupportedError();
15687

15688
 error:
15689
    virDispatchError(conn);
15690 15691 15692
    return -1;
}

15693

15694 15695 15696 15697 15698 15699 15700 15701 15702 15703 15704 15705 15706 15707 15708 15709 15710 15711 15712
/**
 * virSecretRef:
 * @secret: the secret to hold a reference on
 *
 * Increment the reference count on the secret. For each additional call to
 * this method, there shall be a corresponding call to virSecretFree to release
 * the reference count, once the caller no longer needs the reference to this
 * object.
 *
 * This method is typically useful for applications where multiple threads are
 * using a connection, and it is required that the connection remain open until
 * all threads have finished using it. ie, each new thread using a secret would
 * increment the reference count.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virSecretRef(virSecretPtr secret)
{
15713 15714 15715
    VIR_DEBUG("secret=%p refs=%d", secret,
              secret ? secret->object.u.s.refs : 0);

15716 15717
    virResetLastError();

15718 15719
    virCheckSecretReturn(secret, -1);

15720
    virObjectRef(secret);
15721 15722 15723
    return 0;
}

15724

15725 15726 15727 15728 15729 15730
/**
 * virSecretFree:
 * @secret: pointer to a secret
 *
 * Release the secret handle. The underlying secret continues to exist.
 *
15731
 * Returns 0 on success, or -1 on error
15732 15733 15734 15735
 */
int
virSecretFree(virSecretPtr secret)
{
15736
    VIR_DEBUG("secret=%p", secret);
15737 15738 15739

    virResetLastError();

15740 15741
    virCheckSecretReturn(secret, -1);

15742
    virObjectUnref(secret);
15743 15744
    return 0;
}
15745 15746 15747 15748 15749


/**
 * virStreamNew:
 * @conn: pointer to the connection
15750
 * @flags: bitwise-OR of virStreamFlags
15751 15752 15753 15754 15755 15756 15757 15758 15759 15760 15761 15762 15763 15764 15765 15766 15767 15768 15769 15770 15771
 *
 * Creates a new stream object which can be used to perform
 * streamed I/O with other public API function.
 *
 * When no longer needed, a stream object must be released
 * with virStreamFree. If a data stream has been used,
 * then the application must call virStreamFinish or
 * virStreamAbort before free'ing to, in order to notify
 * the driver of termination.
 *
 * If a non-blocking data stream is required passed
 * VIR_STREAM_NONBLOCK for flags, otherwise pass 0.
 *
 * Returns the new stream, or NULL upon error
 */
virStreamPtr
virStreamNew(virConnectPtr conn,
             unsigned int flags)
{
    virStreamPtr st;

15772
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
15773 15774 15775

    virResetLastError();

15776
    virCheckConnectReturn(conn, NULL);
15777 15778 15779 15780

    st = virGetStream(conn);
    if (st)
        st->flags = flags;
15781 15782
    else
        virDispatchError(conn);
15783 15784 15785 15786 15787 15788 15789 15790 15791 15792 15793 15794 15795 15796 15797 15798 15799 15800 15801

    return st;
}


/**
 * virStreamRef:
 * @stream: pointer to the stream
 *
 * Increment the reference count on the stream. For each
 * additional call to this method, there shall be a corresponding
 * call to virStreamFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * Returns 0 in case of success, -1 in case of failure
 */
int
virStreamRef(virStreamPtr stream)
{
15802 15803 15804
    VIR_DEBUG("stream=%p refs=%d", stream,
              stream ? stream->object.u.s.refs : 0);

15805 15806
    virResetLastError();

15807 15808
    virCheckStreamReturn(stream, -1);

15809
    virObjectRef(stream);
15810 15811 15812 15813 15814 15815 15816 15817 15818 15819 15820 15821 15822
    return 0;
}


/**
 * virStreamSend:
 * @stream: pointer to the stream object
 * @data: buffer to write to stream
 * @nbytes: size of @data buffer
 *
 * Write a series of bytes to the stream. This method may
 * block the calling application for an arbitrary amount
 * of time. Once an application has finished sending data
15823
 * it should call virStreamFinish to wait for successful
15824
 * confirmation from the driver, or detect any error.
15825 15826
 *
 * This method may not be used if a stream source has been
15827
 * registered.
15828 15829 15830 15831 15832
 *
 * Errors are not guaranteed to be reported synchronously
 * with the call, but may instead be delayed until a
 * subsequent call.
 *
D
Dan Kenigsberg 已提交
15833
 * An example using this with a hypothetical file upload
15834 15835
 * API looks like
 *
15836
 *     virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
15837
 *     int fd = open("demo.iso", O_RDONLY);
15838 15839 15840 15841 15842 15843 15844
 *
 *     virConnectUploadFile(conn, "demo.iso", st);
 *
 *     while (1) {
 *          char buf[1024];
 *          int got = read(fd, buf, 1024);
 *          if (got < 0) {
15845
 *             virStreamAbort(st);
15846 15847 15848 15849 15850
 *             break;
 *          }
 *          if (got == 0) {
 *             virStreamFinish(st);
 *             break;
15851
 *          }
15852 15853
 *          int offset = 0;
 *          while (offset < got) {
E
Eric Blake 已提交
15854
 *             int sent = virStreamSend(st, buf+offset, got-offset);
15855 15856 15857 15858 15859 15860 15861 15862 15863 15864 15865 15866
 *             if (sent < 0) {
 *                virStreamAbort(st);
 *                goto done;
 *             }
 *             offset += sent;
 *          }
 *      }
 *      if (virStreamFinish(st) < 0)
 *         ... report an error ....
 *    done:
 *      virStreamFree(st);
 *      close(fd);
15867 15868 15869 15870 15871 15872 15873 15874 15875 15876 15877
 *
 * Returns the number of bytes written, which may be less
 * than requested.
 *
 * Returns -1 upon error, at which time the stream will
 * be marked as aborted, and the caller should now release
 * the stream with virStreamFree.
 *
 * Returns -2 if the outgoing transmit buffers are full &
 * the stream is marked as non-blocking.
 */
15878 15879 15880 15881
int
virStreamSend(virStreamPtr stream,
              const char *data,
              size_t nbytes)
15882
{
15883
    VIR_DEBUG("stream=%p, data=%p, nbytes=%zi", stream, data, nbytes);
15884 15885 15886

    virResetLastError();

15887
    virCheckStreamReturn(stream, -1);
15888
    virCheckNonNullArgGoto(data, error);
15889

15890 15891 15892 15893 15894 15895 15896 15897 15898 15899 15900
    if (stream->driver &&
        stream->driver->streamSend) {
        int ret;
        ret = (stream->driver->streamSend)(stream, data, nbytes);
        if (ret == -2)
            return -2;
        if (ret < 0)
            goto error;
        return ret;
    }

15901
    virReportUnsupportedError();
15902

15903
 error:
15904
    virDispatchError(stream->conn);
15905 15906 15907 15908 15909 15910 15911
    return -1;
}


/**
 * virStreamRecv:
 * @stream: pointer to the stream object
15912
 * @data: buffer to read into from stream
15913 15914
 * @nbytes: size of @data buffer
 *
15915
 * Reads a series of bytes from the stream. This method may
15916 15917 15918 15919 15920 15921 15922
 * block the calling application for an arbitrary amount
 * of time.
 *
 * Errors are not guaranteed to be reported synchronously
 * with the call, but may instead be delayed until a
 * subsequent call.
 *
D
Dan Kenigsberg 已提交
15923
 * An example using this with a hypothetical file download
15924 15925
 * API looks like
 *
15926
 *     virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
15927
 *     int fd = open("demo.iso", O_WRONLY, 0600);
15928 15929 15930 15931 15932 15933 15934 15935 15936 15937 15938 15939 15940 15941
 *
 *     virConnectDownloadFile(conn, "demo.iso", st);
 *
 *     while (1) {
 *         char buf[1024];
 *         int got = virStreamRecv(st, buf, 1024);
 *         if (got < 0)
 *            break;
 *         if (got == 0) {
 *            virStreamFinish(st);
 *            break;
 *         }
 *         int offset = 0;
 *         while (offset < got) {
E
Eric Blake 已提交
15942
 *            int sent = write(fd, buf + offset, got - offset);
15943 15944 15945 15946 15947 15948 15949 15950 15951 15952 15953 15954
 *            if (sent < 0) {
 *               virStreamAbort(st);
 *               goto done;
 *            }
 *            offset += sent;
 *         }
 *     }
 *     if (virStreamFinish(st) < 0)
 *        ... report an error ....
 *   done:
 *     virStreamFree(st);
 *     close(fd);
15955 15956 15957 15958 15959 15960 15961 15962 15963 15964 15965 15966 15967 15968 15969 15970
 *
 *
 * Returns the number of bytes read, which may be less
 * than requested.
 *
 * Returns 0 when the end of the stream is reached, at
 * which time the caller should invoke virStreamFinish()
 * to get confirmation of stream completion.
 *
 * Returns -1 upon error, at which time the stream will
 * be marked as aborted, and the caller should now release
 * the stream with virStreamFree.
 *
 * Returns -2 if there is no data pending to be read & the
 * stream is marked as non-blocking.
 */
15971 15972 15973 15974
int
virStreamRecv(virStreamPtr stream,
              char *data,
              size_t nbytes)
15975
{
15976
    VIR_DEBUG("stream=%p, data=%p, nbytes=%zi", stream, data, nbytes);
15977 15978 15979

    virResetLastError();

15980
    virCheckStreamReturn(stream, -1);
15981
    virCheckNonNullArgGoto(data, error);
15982

15983 15984 15985 15986 15987 15988 15989 15990 15991 15992 15993
    if (stream->driver &&
        stream->driver->streamRecv) {
        int ret;
        ret = (stream->driver->streamRecv)(stream, data, nbytes);
        if (ret == -2)
            return -2;
        if (ret < 0)
            goto error;
        return ret;
    }

15994
    virReportUnsupportedError();
15995

15996
 error:
15997
    virDispatchError(stream->conn);
15998 15999 16000 16001 16002 16003 16004 16005 16006 16007 16008 16009
    return -1;
}


/**
 * virStreamSendAll:
 * @stream: pointer to the stream object
 * @handler: source callback for reading data from application
 * @opaque: application defined data
 *
 * Send the entire data stream, reading the data from the
 * requested data source. This is simply a convenient alternative
16010
 * to virStreamSend, for apps that do blocking-I/O.
16011
 *
D
Dan Kenigsberg 已提交
16012
 * An example using this with a hypothetical file upload
16013 16014 16015 16016 16017 16018 16019 16020 16021
 * API looks like
 *
 *   int mysource(virStreamPtr st, char *buf, int nbytes, void *opaque) {
 *       int *fd = opaque;
 *
 *       return read(*fd, buf, nbytes);
 *   }
 *
 *   virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
16022
 *   int fd = open("demo.iso", O_RDONLY);
16023 16024 16025 16026 16027 16028 16029 16030 16031 16032 16033
 *
 *   virConnectUploadFile(conn, st);
 *   if (virStreamSendAll(st, mysource, &fd) < 0) {
 *      ...report an error ...
 *      goto done;
 *   }
 *   if (virStreamFinish(st) < 0)
 *      ...report an error...
 *   virStreamFree(st);
 *   close(fd);
 *
16034
 * Returns 0 if all the data was successfully sent. The caller
16035 16036 16037 16038 16039 16040 16041
 * should invoke virStreamFinish(st) to flush the stream upon
 * success and then virStreamFree
 *
 * Returns -1 upon any error, with virStreamAbort() already
 * having been called,  so the caller need only call
 * virStreamFree()
 */
16042 16043 16044 16045
int
virStreamSendAll(virStreamPtr stream,
                 virStreamSourceFunc handler,
                 void *opaque)
16046 16047 16048 16049
{
    char *bytes = NULL;
    int want = 1024*64;
    int ret = -1;
16050
    VIR_DEBUG("stream=%p, handler=%p, opaque=%p", stream, handler, opaque);
16051 16052 16053

    virResetLastError();

16054
    virCheckStreamReturn(stream, -1);
16055
    virCheckNonNullArgGoto(handler, cleanup);
16056

16057
    if (stream->flags & VIR_STREAM_NONBLOCK) {
16058 16059
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("data sources cannot be used for non-blocking streams"));
16060 16061 16062
        goto cleanup;
    }

16063
    if (VIR_ALLOC_N(bytes, want) < 0)
16064 16065 16066 16067 16068 16069 16070 16071 16072 16073 16074 16075 16076 16077 16078 16079 16080 16081 16082 16083 16084
        goto cleanup;

    for (;;) {
        int got, offset = 0;
        got = (handler)(stream, bytes, want, opaque);
        if (got < 0) {
            virStreamAbort(stream);
            goto cleanup;
        }
        if (got == 0)
            break;
        while (offset < got) {
            int done;
            done = virStreamSend(stream, bytes + offset, got - offset);
            if (done < 0)
                goto cleanup;
            offset += done;
        }
    }
    ret = 0;

16085
 cleanup:
16086 16087 16088
    VIR_FREE(bytes);

    if (ret != 0)
16089
        virDispatchError(stream->conn);
16090 16091 16092 16093 16094 16095 16096 16097 16098 16099 16100 16101 16102

    return ret;
}


/**
 * virStreamRecvAll:
 * @stream: pointer to the stream object
 * @handler: sink callback for writing data to application
 * @opaque: application defined data
 *
 * Receive the entire data stream, sending the data to the
 * requested data sink. This is simply a convenient alternative
16103
 * to virStreamRecv, for apps that do blocking-I/O.
16104
 *
D
Dan Kenigsberg 已提交
16105
 * An example using this with a hypothetical file download
16106 16107 16108 16109 16110 16111 16112 16113 16114
 * API looks like
 *
 *   int mysink(virStreamPtr st, const char *buf, int nbytes, void *opaque) {
 *       int *fd = opaque;
 *
 *       return write(*fd, buf, nbytes);
 *   }
 *
 *   virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
16115
 *   int fd = open("demo.iso", O_WRONLY);
16116 16117 16118 16119 16120 16121 16122 16123 16124 16125 16126
 *
 *   virConnectUploadFile(conn, st);
 *   if (virStreamRecvAll(st, mysink, &fd) < 0) {
 *      ...report an error ...
 *      goto done;
 *   }
 *   if (virStreamFinish(st) < 0)
 *      ...report an error...
 *   virStreamFree(st);
 *   close(fd);
 *
16127
 * Returns 0 if all the data was successfully received. The caller
16128 16129 16130 16131 16132 16133 16134
 * should invoke virStreamFinish(st) to flush the stream upon
 * success and then virStreamFree
 *
 * Returns -1 upon any error, with virStreamAbort() already
 * having been called,  so the caller need only call
 * virStreamFree()
 */
16135 16136 16137 16138
int
virStreamRecvAll(virStreamPtr stream,
                 virStreamSinkFunc handler,
                 void *opaque)
16139 16140 16141 16142
{
    char *bytes = NULL;
    int want = 1024*64;
    int ret = -1;
16143
    VIR_DEBUG("stream=%p, handler=%p, opaque=%p", stream, handler, opaque);
16144 16145 16146

    virResetLastError();

16147
    virCheckStreamReturn(stream, -1);
16148
    virCheckNonNullArgGoto(handler, cleanup);
16149

16150
    if (stream->flags & VIR_STREAM_NONBLOCK) {
16151 16152
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("data sinks cannot be used for non-blocking streams"));
16153 16154 16155 16156
        goto cleanup;
    }


16157
    if (VIR_ALLOC_N(bytes, want) < 0)
16158 16159 16160 16161 16162 16163 16164 16165 16166 16167 16168 16169 16170 16171 16172 16173 16174 16175 16176 16177 16178
        goto cleanup;

    for (;;) {
        int got, offset = 0;
        got = virStreamRecv(stream, bytes, want);
        if (got < 0)
            goto cleanup;
        if (got == 0)
            break;
        while (offset < got) {
            int done;
            done = (handler)(stream, bytes + offset, got - offset, opaque);
            if (done < 0) {
                virStreamAbort(stream);
                goto cleanup;
            }
            offset += done;
        }
    }
    ret = 0;

16179
 cleanup:
16180 16181 16182
    VIR_FREE(bytes);

    if (ret != 0)
16183
        virDispatchError(stream->conn);
16184 16185 16186 16187 16188 16189

    return ret;
}


/**
M
Matthias Bolte 已提交
16190
 * virStreamEventAddCallback:
16191 16192 16193 16194 16195 16196 16197 16198 16199 16200 16201 16202 16203
 * @stream: pointer to the stream object
 * @events: set of events to monitor
 * @cb: callback to invoke when an event occurs
 * @opaque: application defined data
 * @ff: callback to free @opaque data
 *
 * Register a callback to be notified when a stream
 * becomes writable, or readable. This is most commonly
 * used in conjunction with non-blocking data streams
 * to integrate into an event loop
 *
 * Returns 0 on success, -1 upon error
 */
16204 16205 16206 16207 16208 16209
int
virStreamEventAddCallback(virStreamPtr stream,
                          int events,
                          virStreamEventCallback cb,
                          void *opaque,
                          virFreeCallback ff)
16210
{
16211 16212
    VIR_DEBUG("stream=%p, events=%d, cb=%p, opaque=%p, ff=%p",
              stream, events, cb, opaque, ff);
16213 16214 16215

    virResetLastError();

16216
    virCheckStreamReturn(stream, -1);
16217 16218

    if (stream->driver &&
16219
        stream->driver->streamEventAddCallback) {
16220
        int ret;
16221
        ret = (stream->driver->streamEventAddCallback)(stream, events, cb, opaque, ff);
16222 16223 16224 16225 16226
        if (ret < 0)
            goto error;
        return ret;
    }

16227
    virReportUnsupportedError();
16228

16229
 error:
16230
    virDispatchError(stream->conn);
16231 16232 16233 16234 16235
    return -1;
}


/**
M
Matthias Bolte 已提交
16236
 * virStreamEventUpdateCallback:
16237 16238 16239 16240 16241 16242
 * @stream: pointer to the stream object
 * @events: set of events to monitor
 *
 * Changes the set of events to monitor for a stream. This allows
 * for event notification to be changed without having to
 * unregister & register the callback completely. This method
E
Eric Blake 已提交
16243
 * is guaranteed to succeed if a callback is already registered
16244 16245 16246
 *
 * Returns 0 on success, -1 if no callback is registered
 */
16247 16248 16249
int
virStreamEventUpdateCallback(virStreamPtr stream,
                             int events)
16250
{
16251
    VIR_DEBUG("stream=%p, events=%d", stream, events);
16252 16253 16254

    virResetLastError();

16255
    virCheckStreamReturn(stream, -1);
16256 16257

    if (stream->driver &&
16258
        stream->driver->streamEventUpdateCallback) {
16259
        int ret;
16260
        ret = (stream->driver->streamEventUpdateCallback)(stream, events);
16261 16262 16263 16264 16265
        if (ret < 0)
            goto error;
        return ret;
    }

16266
    virReportUnsupportedError();
16267

16268
 error:
16269
    virDispatchError(stream->conn);
16270 16271 16272
    return -1;
}

16273

16274
/**
M
Matthias Bolte 已提交
16275
 * virStreamEventRemoveCallback:
16276 16277
 * @stream: pointer to the stream object
 *
D
Dan Kenigsberg 已提交
16278
 * Remove an event callback from the stream
16279 16280 16281
 *
 * Returns 0 on success, -1 on error
 */
16282 16283
int
virStreamEventRemoveCallback(virStreamPtr stream)
16284
{
16285
    VIR_DEBUG("stream=%p", stream);
16286 16287 16288

    virResetLastError();

16289
    virCheckStreamReturn(stream, -1);
16290 16291

    if (stream->driver &&
16292
        stream->driver->streamEventRemoveCallback) {
16293
        int ret;
16294
        ret = (stream->driver->streamEventRemoveCallback)(stream);
16295 16296 16297 16298 16299
        if (ret < 0)
            goto error;
        return ret;
    }

16300
    virReportUnsupportedError();
16301

16302
 error:
16303
    virDispatchError(stream->conn);
16304 16305 16306
    return -1;
}

16307

16308 16309 16310 16311
/**
 * virStreamFinish:
 * @stream: pointer to the stream object
 *
16312
 * Indicate that there is no further data to be transmitted
16313 16314 16315 16316 16317 16318 16319 16320 16321 16322
 * on the stream. For output streams this should be called once
 * all data has been written. For input streams this should be
 * called once virStreamRecv returns end-of-file.
 *
 * This method is a synchronization point for all asynchronous
 * errors, so if this returns a success code the application can
 * be sure that all data has been successfully processed.
 *
 * Returns 0 on success, -1 upon error
 */
16323 16324
int
virStreamFinish(virStreamPtr stream)
16325
{
16326
    VIR_DEBUG("stream=%p", stream);
16327 16328 16329

    virResetLastError();

16330
    virCheckStreamReturn(stream, -1);
16331 16332 16333 16334 16335 16336 16337 16338 16339 16340

    if (stream->driver &&
        stream->driver->streamFinish) {
        int ret;
        ret = (stream->driver->streamFinish)(stream);
        if (ret < 0)
            goto error;
        return ret;
    }

16341
    virReportUnsupportedError();
16342

16343
 error:
16344
    virDispatchError(stream->conn);
16345 16346 16347
    return -1;
}

16348

16349 16350 16351 16352 16353 16354 16355 16356 16357 16358 16359 16360 16361
/**
 * virStreamAbort:
 * @stream: pointer to the stream object
 *
 * Request that the in progress data transfer be cancelled
 * abnormally before the end of the stream has been reached.
 * For output streams this can be used to inform the driver
 * that the stream is being terminated early. For input
 * streams this can be used to inform the driver that it
 * should stop sending data.
 *
 * Returns 0 on success, -1 upon error
 */
16362 16363
int
virStreamAbort(virStreamPtr stream)
16364
{
16365
    VIR_DEBUG("stream=%p", stream);
16366 16367 16368

    virResetLastError();

16369
    virCheckStreamReturn(stream, -1);
16370

16371 16372 16373 16374 16375 16376
    if (!stream->driver) {
        VIR_DEBUG("aborting unused stream");
        return 0;
    }

    if (stream->driver->streamAbort) {
16377 16378 16379 16380 16381 16382 16383
        int ret;
        ret = (stream->driver->streamAbort)(stream);
        if (ret < 0)
            goto error;
        return ret;
    }

16384
    virReportUnsupportedError();
16385

16386
 error:
16387
    virDispatchError(stream->conn);
16388 16389 16390
    return -1;
}

16391

16392 16393 16394 16395 16396 16397 16398
/**
 * virStreamFree:
 * @stream: pointer to the stream object
 *
 * Decrement the reference count on a stream, releasing
 * the stream object if the reference count has hit zero.
 *
D
Dan Kenigsberg 已提交
16399
 * There must not be an active data transfer in progress
16400 16401 16402 16403 16404 16405
 * when releasing the stream. If a stream needs to be
 * disposed of prior to end of stream being reached, then
 * the virStreamAbort function should be called first.
 *
 * Returns 0 upon success, or -1 on error
 */
16406 16407
int
virStreamFree(virStreamPtr stream)
16408
{
16409
    VIR_DEBUG("stream=%p", stream);
16410 16411 16412

    virResetLastError();

16413
    virCheckStreamReturn(stream, -1);
16414 16415 16416

    /* XXX Enforce shutdown before free'ing resources ? */

16417
    virObjectUnref(stream);
16418
    return 0;
16419
}
16420 16421 16422 16423 16424 16425 16426 16427 16428 16429


/**
 * virDomainIsActive:
 * @dom: pointer to the domain object
 *
 * Determine if the domain is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
16430 16431
int
virDomainIsActive(virDomainPtr dom)
16432
{
16433
    VIR_DEBUG("dom=%p", dom);
16434 16435 16436

    virResetLastError();

16437 16438
    virCheckDomainReturn(dom, -1);

16439 16440 16441 16442 16443 16444 16445 16446
    if (dom->conn->driver->domainIsActive) {
        int ret;
        ret = dom->conn->driver->domainIsActive(dom);
        if (ret < 0)
            goto error;
        return ret;
    }

16447
    virReportUnsupportedError();
16448
 error:
16449
    virDispatchError(dom->conn);
16450 16451 16452
    return -1;
}

16453

16454 16455 16456 16457 16458 16459 16460 16461 16462
/**
 * virDomainIsPersistent:
 * @dom: pointer to the domain object
 *
 * Determine if the domain has a persistent configuration
 * which means it will still exist after shutting down
 *
 * Returns 1 if persistent, 0 if transient, -1 on error
 */
16463 16464
int
virDomainIsPersistent(virDomainPtr dom)
16465
{
16466
    VIR_DOMAIN_DEBUG(dom);
16467 16468 16469

    virResetLastError();

16470 16471
    virCheckDomainReturn(dom, -1);

16472 16473 16474 16475 16476 16477 16478 16479
    if (dom->conn->driver->domainIsPersistent) {
        int ret;
        ret = dom->conn->driver->domainIsPersistent(dom);
        if (ret < 0)
            goto error;
        return ret;
    }

16480
    virReportUnsupportedError();
16481
 error:
16482
    virDispatchError(dom->conn);
16483 16484 16485
    return -1;
}

16486

16487 16488 16489 16490 16491 16492 16493 16494
/**
 * virDomainIsUpdated:
 * @dom: pointer to the domain object
 *
 * Determine if the domain has been updated.
 *
 * Returns 1 if updated, 0 if not, -1 on error
 */
16495 16496
int
virDomainIsUpdated(virDomainPtr dom)
16497
{
16498
    VIR_DOMAIN_DEBUG(dom);
16499 16500 16501

    virResetLastError();

16502 16503
    virCheckDomainReturn(dom, -1);

16504 16505 16506 16507 16508 16509 16510 16511
    if (dom->conn->driver->domainIsUpdated) {
        int ret;
        ret = dom->conn->driver->domainIsUpdated(dom);
        if (ret < 0)
            goto error;
        return ret;
    }

16512
    virReportUnsupportedError();
16513
 error:
16514 16515 16516 16517
    virDispatchError(dom->conn);
    return -1;
}

16518

16519 16520 16521 16522 16523 16524 16525 16526
/**
 * virNetworkIsActive:
 * @net: pointer to the network object
 *
 * Determine if the network is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
16527 16528
int
virNetworkIsActive(virNetworkPtr net)
16529
{
16530
    VIR_DEBUG("net=%p", net);
16531 16532 16533

    virResetLastError();

16534 16535
    virCheckNetworkReturn(net, -1);

16536 16537 16538 16539 16540 16541 16542 16543
    if (net->conn->networkDriver->networkIsActive) {
        int ret;
        ret = net->conn->networkDriver->networkIsActive(net);
        if (ret < 0)
            goto error;
        return ret;
    }

16544
    virReportUnsupportedError();
16545
 error:
16546
    virDispatchError(net->conn);
16547 16548 16549 16550 16551 16552 16553 16554 16555 16556 16557 16558 16559
    return -1;
}


/**
 * virNetworkIsPersistent:
 * @net: pointer to the network object
 *
 * Determine if the network has a persistent configuration
 * which means it will still exist after shutting down
 *
 * Returns 1 if persistent, 0 if transient, -1 on error
 */
16560 16561
int
virNetworkIsPersistent(virNetworkPtr net)
16562
{
16563
    VIR_DEBUG("net=%p", net);
16564 16565 16566

    virResetLastError();

16567 16568
    virCheckNetworkReturn(net, -1);

16569 16570 16571 16572 16573 16574 16575 16576
    if (net->conn->networkDriver->networkIsPersistent) {
        int ret;
        ret = net->conn->networkDriver->networkIsPersistent(net);
        if (ret < 0)
            goto error;
        return ret;
    }

16577
    virReportUnsupportedError();
16578
 error:
16579
    virDispatchError(net->conn);
16580 16581 16582 16583 16584 16585 16586 16587 16588 16589 16590 16591
    return -1;
}


/**
 * virStoragePoolIsActive:
 * @pool: pointer to the storage pool object
 *
 * Determine if the storage pool is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
16592 16593
int
virStoragePoolIsActive(virStoragePoolPtr pool)
16594
{
16595
    VIR_DEBUG("pool=%p", pool);
16596 16597 16598

    virResetLastError();

16599 16600
    virCheckStoragePoolReturn(pool, -1);

16601
    if (pool->conn->storageDriver->storagePoolIsActive) {
16602
        int ret;
16603
        ret = pool->conn->storageDriver->storagePoolIsActive(pool);
16604 16605 16606 16607 16608
        if (ret < 0)
            goto error;
        return ret;
    }

16609
    virReportUnsupportedError();
16610
 error:
16611
    virDispatchError(pool->conn);
16612 16613 16614 16615 16616 16617 16618 16619 16620 16621 16622 16623 16624
    return -1;
}


/**
 * virStoragePoolIsPersistent:
 * @pool: pointer to the storage pool object
 *
 * Determine if the storage pool has a persistent configuration
 * which means it will still exist after shutting down
 *
 * Returns 1 if persistent, 0 if transient, -1 on error
 */
16625 16626
int
virStoragePoolIsPersistent(virStoragePoolPtr pool)
16627
{
16628
    VIR_DEBUG("pool=%p", pool);
16629 16630 16631

    virResetLastError();

16632 16633
    virCheckStoragePoolReturn(pool, -1);

16634
    if (pool->conn->storageDriver->storagePoolIsPersistent) {
16635
        int ret;
16636
        ret = pool->conn->storageDriver->storagePoolIsPersistent(pool);
16637 16638 16639 16640 16641
        if (ret < 0)
            goto error;
        return ret;
    }

16642
    virReportUnsupportedError();
16643
 error:
16644
    virDispatchError(pool->conn);
16645 16646 16647 16648
    return -1;
}


S
Stefan Berger 已提交
16649 16650 16651 16652 16653 16654 16655 16656 16657 16658 16659
/**
 * virConnectNumOfNWFilters:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of nwfilters.
 *
 * Returns the number of nwfilters found or -1 in case of error
 */
int
virConnectNumOfNWFilters(virConnectPtr conn)
{
16660
    VIR_DEBUG("conn=%p", conn);
S
Stefan Berger 已提交
16661 16662 16663

    virResetLastError();

16664
    virCheckConnectReturn(conn, -1);
S
Stefan Berger 已提交
16665

16666
    if (conn->nwfilterDriver && conn->nwfilterDriver->connectNumOfNWFilters) {
S
Stefan Berger 已提交
16667
        int ret;
16668
        ret = conn->nwfilterDriver->connectNumOfNWFilters(conn);
S
Stefan Berger 已提交
16669 16670 16671 16672 16673
        if (ret < 0)
            goto error;
        return ret;
    }

16674
    virReportUnsupportedError();
S
Stefan Berger 已提交
16675

16676
 error:
S
Stefan Berger 已提交
16677 16678 16679 16680
    virDispatchError(conn);
    return -1;
}

16681

16682 16683 16684 16685 16686 16687 16688 16689 16690 16691 16692 16693 16694 16695 16696 16697 16698 16699 16700 16701 16702 16703 16704 16705 16706 16707 16708 16709 16710
/**
 * virConnectListAllNWFilters:
 * @conn: Pointer to the hypervisor connection.
 * @filters: Pointer to a variable to store the array containing the network
 *           filter objects or NULL if the list is not required (just returns
 *           number of network filters).
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Collect the list of network filters, and allocate an array to store those
 * objects.
 *
 * Returns the number of network filters found or -1 and sets @filters to  NULL
 * in case of error.  On success, the array stored into @filters is guaranteed to
 * have an extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virNWFilterFree() on each array element, then calling free() on @filters.
 */
int
virConnectListAllNWFilters(virConnectPtr conn,
                           virNWFilterPtr **filters,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, filters=%p, flags=%x", conn, filters, flags);

    virResetLastError();

    if (filters)
        *filters = NULL;

16711
    virCheckConnectReturn(conn, -1);
16712 16713

    if (conn->nwfilterDriver &&
16714
        conn->nwfilterDriver->connectListAllNWFilters) {
16715
        int ret;
16716
        ret = conn->nwfilterDriver->connectListAllNWFilters(conn, filters, flags);
16717 16718 16719 16720 16721
        if (ret < 0)
            goto error;
        return ret;
    }

16722
    virReportUnsupportedError();
16723

16724
 error:
16725 16726 16727
    virDispatchError(conn);
    return -1;
}
S
Stefan Berger 已提交
16728

16729

S
Stefan Berger 已提交
16730 16731 16732 16733 16734 16735 16736 16737 16738 16739 16740 16741 16742
/**
 * virConnectListNWFilters:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of network filters
 * @maxnames: size of @names
 *
 * Collect the list of network filters, and store their names in @names
 *
 * Returns the number of network filters found or -1 in case of error
 */
int
virConnectListNWFilters(virConnectPtr conn, char **const names, int maxnames)
{
16743
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
S
Stefan Berger 已提交
16744 16745 16746

    virResetLastError();

16747
    virCheckConnectReturn(conn, -1);
16748 16749
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
S
Stefan Berger 已提交
16750

16751
    if (conn->nwfilterDriver && conn->nwfilterDriver->connectListNWFilters) {
S
Stefan Berger 已提交
16752
        int ret;
16753
        ret = conn->nwfilterDriver->connectListNWFilters(conn, names, maxnames);
S
Stefan Berger 已提交
16754 16755 16756 16757 16758
        if (ret < 0)
            goto error;
        return ret;
    }

16759
    virReportUnsupportedError();
S
Stefan Berger 已提交
16760

16761
 error:
S
Stefan Berger 已提交
16762 16763 16764 16765 16766 16767 16768 16769 16770 16771 16772 16773 16774 16775 16776 16777 16778 16779
    virDispatchError(conn);
    return -1;
}


/**
 * virNWFilterLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the network filter
 *
 * Try to lookup a network filter on the given hypervisor based on its name.
 *
 * Returns a new nwfilter object or NULL in case of failure.  If the
 * network filter cannot be found, then VIR_ERR_NO_NWFILTER error is raised.
 */
virNWFilterPtr
virNWFilterLookupByName(virConnectPtr conn, const char *name)
{
16780
    VIR_DEBUG("conn=%p, name=%s", conn, name);
S
Stefan Berger 已提交
16781 16782 16783

    virResetLastError();

16784
    virCheckConnectReturn(conn, NULL);
16785
    virCheckNonNullArgGoto(name, error);
S
Stefan Berger 已提交
16786 16787 16788

    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterLookupByName) {
        virNWFilterPtr ret;
16789
        ret = conn->nwfilterDriver->nwfilterLookupByName(conn, name);
S
Stefan Berger 已提交
16790 16791 16792 16793 16794
        if (!ret)
            goto error;
        return ret;
    }

16795
    virReportUnsupportedError();
S
Stefan Berger 已提交
16796

16797
 error:
S
Stefan Berger 已提交
16798 16799 16800 16801
    virDispatchError(conn);
    return NULL;
}

16802

S
Stefan Berger 已提交
16803 16804 16805 16806 16807 16808 16809 16810 16811 16812 16813 16814 16815
/**
 * virNWFilterLookupByUUID:
 * @conn: pointer to the hypervisor connection
 * @uuid: the raw UUID for the network filter
 *
 * Try to lookup a network filter on the given hypervisor based on its UUID.
 *
 * Returns a new nwfilter object or NULL in case of failure.  If the
 * nwfdilter cannot be found, then VIR_ERR_NO_NWFILTER error is raised.
 */
virNWFilterPtr
virNWFilterLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
{
16816
    VIR_UUID_DEBUG(conn, uuid);
S
Stefan Berger 已提交
16817 16818 16819

    virResetLastError();

16820
    virCheckConnectReturn(conn, NULL);
16821
    virCheckNonNullArgGoto(uuid, error);
S
Stefan Berger 已提交
16822 16823 16824

    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterLookupByUUID){
        virNWFilterPtr ret;
16825
        ret = conn->nwfilterDriver->nwfilterLookupByUUID(conn, uuid);
S
Stefan Berger 已提交
16826 16827 16828 16829 16830
        if (!ret)
            goto error;
        return ret;
    }

16831
    virReportUnsupportedError();
S
Stefan Berger 已提交
16832

16833
 error:
S
Stefan Berger 已提交
16834 16835 16836 16837
    virDispatchError(conn);
    return NULL;
}

16838

S
Stefan Berger 已提交
16839
/**
16840
 * virNWFilterLookupByUUIDString:
S
Stefan Berger 已提交
16841 16842 16843 16844 16845 16846 16847 16848 16849 16850 16851 16852
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the nwfilter
 *
 * Try to lookup an nwfilter on the given hypervisor based on its UUID.
 *
 * Returns a new nwfilter object or NULL in case of failure.  If the
 * nwfilter cannot be found, then VIR_ERR_NO_NWFILTER error is raised.
 */
virNWFilterPtr
virNWFilterLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
    unsigned char uuid[VIR_UUID_BUFLEN];
16853
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
S
Stefan Berger 已提交
16854 16855 16856

    virResetLastError();

16857
    virCheckConnectReturn(conn, NULL);
16858
    virCheckNonNullArgGoto(uuidstr, error);
S
Stefan Berger 已提交
16859 16860

    if (virUUIDParse(uuidstr, uuid) < 0) {
16861 16862 16863
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
S
Stefan Berger 已提交
16864 16865 16866 16867 16868
        goto error;
    }

    return virNWFilterLookupByUUID(conn, &uuid[0]);

16869
 error:
S
Stefan Berger 已提交
16870 16871 16872 16873
    virDispatchError(conn);
    return NULL;
}

16874

S
Stefan Berger 已提交
16875 16876 16877 16878 16879 16880 16881 16882 16883 16884 16885 16886
/**
 * virNWFilterFree:
 * @nwfilter: a nwfilter object
 *
 * Free the nwfilter object. The running instance is kept alive.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNWFilterFree(virNWFilterPtr nwfilter)
{
16887
    VIR_DEBUG("nwfilter=%p", nwfilter);
S
Stefan Berger 已提交
16888 16889 16890

    virResetLastError();

16891
    virCheckNWFilterReturn(nwfilter, -1);
16892 16893

    virObjectUnref(nwfilter);
S
Stefan Berger 已提交
16894 16895 16896
    return 0;
}

16897

S
Stefan Berger 已提交
16898 16899 16900 16901 16902 16903 16904 16905 16906 16907 16908 16909
/**
 * virNWFilterGetName:
 * @nwfilter: a nwfilter object
 *
 * Get the public name for the network filter
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the nwfilter object.
 */
const char *
virNWFilterGetName(virNWFilterPtr nwfilter)
{
16910
    VIR_DEBUG("nwfilter=%p", nwfilter);
S
Stefan Berger 已提交
16911 16912 16913

    virResetLastError();

16914 16915
    virCheckNWFilterReturn(nwfilter, NULL);

16916
    return nwfilter->name;
S
Stefan Berger 已提交
16917 16918
}

16919

S
Stefan Berger 已提交
16920 16921 16922 16923 16924 16925 16926 16927 16928 16929 16930 16931
/**
 * virNWFilterGetUUID:
 * @nwfilter: a nwfilter object
 * @uuid: pointer to a VIR_UUID_BUFLEN bytes array
 *
 * Get the UUID for a network filter
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNWFilterGetUUID(virNWFilterPtr nwfilter, unsigned char *uuid)
{
16932
    VIR_DEBUG("nwfilter=%p, uuid=%p", nwfilter, uuid);
S
Stefan Berger 已提交
16933 16934 16935

    virResetLastError();

16936
    virCheckNWFilterReturn(nwfilter, -1);
16937
    virCheckNonNullArgGoto(uuid, error);
S
Stefan Berger 已提交
16938 16939 16940 16941 16942

    memcpy(uuid, &nwfilter->uuid[0], VIR_UUID_BUFLEN);

    return 0;

16943
 error:
S
Stefan Berger 已提交
16944 16945 16946 16947
    virDispatchError(nwfilter->conn);
    return -1;
}

16948

S
Stefan Berger 已提交
16949 16950 16951 16952 16953 16954 16955 16956 16957 16958 16959 16960 16961
/**
 * virNWFilterGetUUIDString:
 * @nwfilter: a nwfilter object
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
 *
 * Get the UUID for a network filter as string. For more information about
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNWFilterGetUUIDString(virNWFilterPtr nwfilter, char *buf)
{
16962
    VIR_DEBUG("nwfilter=%p, buf=%p", nwfilter, buf);
S
Stefan Berger 已提交
16963 16964 16965

    virResetLastError();

16966
    virCheckNWFilterReturn(nwfilter, -1);
16967
    virCheckNonNullArgGoto(buf, error);
S
Stefan Berger 已提交
16968

E
Eric Blake 已提交
16969
    virUUIDFormat(nwfilter->uuid, buf);
S
Stefan Berger 已提交
16970 16971
    return 0;

16972
 error:
S
Stefan Berger 已提交
16973 16974 16975 16976 16977 16978 16979 16980 16981 16982 16983 16984 16985 16986 16987 16988 16989 16990
    virDispatchError(nwfilter->conn);
    return -1;
}


/**
 * virNWFilterDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: an XML description of the nwfilter
 *
 * Define a new network filter, based on an XML description
 * similar to the one returned by virNWFilterGetXMLDesc()
 *
 * Returns a new nwfilter object or NULL in case of failure
 */
virNWFilterPtr
virNWFilterDefineXML(virConnectPtr conn, const char *xmlDesc)
{
16991
    VIR_DEBUG("conn=%p, xmlDesc=%s", conn, xmlDesc);
S
Stefan Berger 已提交
16992 16993 16994

    virResetLastError();

16995
    virCheckConnectReturn(conn, NULL);
16996
    virCheckNonNullArgGoto(xmlDesc, error);
16997
    virCheckReadOnlyGoto(conn->flags, error);
S
Stefan Berger 已提交
16998

16999
    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterDefineXML) {
S
Stefan Berger 已提交
17000
        virNWFilterPtr ret;
17001
        ret = conn->nwfilterDriver->nwfilterDefineXML(conn, xmlDesc);
S
Stefan Berger 已提交
17002 17003 17004 17005 17006
        if (!ret)
            goto error;
        return ret;
    }

17007
    virReportUnsupportedError();
S
Stefan Berger 已提交
17008

17009
 error:
S
Stefan Berger 已提交
17010 17011 17012 17013 17014 17015 17016 17017 17018 17019 17020 17021 17022 17023 17024 17025 17026 17027 17028
    virDispatchError(conn);
    return NULL;
}


/**
 * virNWFilterUndefine:
 * @nwfilter: a nwfilter object
 *
 * Undefine the nwfilter object. This call will not succeed if
 * a running VM is referencing the filter. This does not free the
 * associated virNWFilterPtr object.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNWFilterUndefine(virNWFilterPtr nwfilter)
{
    virConnectPtr conn;
17029
    VIR_DEBUG("nwfilter=%p", nwfilter);
S
Stefan Berger 已提交
17030 17031 17032

    virResetLastError();

17033
    virCheckNWFilterReturn(nwfilter, -1);
S
Stefan Berger 已提交
17034
    conn = nwfilter->conn;
17035

17036
    virCheckReadOnlyGoto(conn->flags, error);
S
Stefan Berger 已提交
17037

17038
    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterUndefine) {
S
Stefan Berger 已提交
17039
        int ret;
17040
        ret = conn->nwfilterDriver->nwfilterUndefine(nwfilter);
S
Stefan Berger 已提交
17041 17042 17043 17044 17045
        if (ret < 0)
            goto error;
        return ret;
    }

17046
    virReportUnsupportedError();
S
Stefan Berger 已提交
17047

17048
 error:
S
Stefan Berger 已提交
17049 17050 17051 17052 17053 17054 17055 17056
    virDispatchError(nwfilter->conn);
    return -1;
}


/**
 * virNWFilterGetXMLDesc:
 * @nwfilter: a nwfilter object
17057
 * @flags: extra flags; not used yet, so callers should always pass 0
S
Stefan Berger 已提交
17058 17059 17060 17061 17062 17063 17064 17065
 *
 * Provide an XML description of the network filter. The description may be
 * reused later to redefine the network filter with virNWFilterCreateXML().
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
17066
virNWFilterGetXMLDesc(virNWFilterPtr nwfilter, unsigned int flags)
S
Stefan Berger 已提交
17067 17068
{
    virConnectPtr conn;
17069
    VIR_DEBUG("nwfilter=%p, flags=%x", nwfilter, flags);
S
Stefan Berger 已提交
17070 17071 17072

    virResetLastError();

17073
    virCheckNWFilterReturn(nwfilter, NULL);
S
Stefan Berger 已提交
17074 17075
    conn = nwfilter->conn;

17076
    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterGetXMLDesc) {
S
Stefan Berger 已提交
17077
        char *ret;
17078
        ret = conn->nwfilterDriver->nwfilterGetXMLDesc(nwfilter, flags);
S
Stefan Berger 已提交
17079 17080 17081 17082 17083
        if (!ret)
            goto error;
        return ret;
    }

17084
    virReportUnsupportedError();
S
Stefan Berger 已提交
17085

17086
 error:
S
Stefan Berger 已提交
17087 17088 17089 17090 17091 17092 17093 17094 17095 17096 17097 17098 17099 17100 17101 17102 17103 17104 17105 17106 17107 17108 17109 17110 17111
    virDispatchError(nwfilter->conn);
    return NULL;
}


/**
 * virNWFilterRef:
 * @nwfilter: the nwfilter to hold a reference on
 *
 * Increment the reference count on the nwfilter. For each
 * additional call to this method, there shall be a corresponding
 * call to virNWFilterFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using an nwfilter would increment
 * the reference count.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virNWFilterRef(virNWFilterPtr nwfilter)
{
17112 17113 17114
    VIR_DEBUG("nwfilter=%p refs=%d", nwfilter,
              nwfilter ? nwfilter->object.u.s.refs : 0);

17115 17116
    virResetLastError();

17117 17118
    virCheckNWFilterReturn(nwfilter, -1);

17119
    virObjectRef(nwfilter);
S
Stefan Berger 已提交
17120 17121 17122 17123
    return 0;
}


17124 17125 17126 17127 17128 17129 17130 17131
/**
 * virInterfaceIsActive:
 * @iface: pointer to the interface object
 *
 * Determine if the interface is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
17132 17133
int
virInterfaceIsActive(virInterfacePtr iface)
17134
{
17135
    VIR_DEBUG("iface=%p", iface);
17136 17137 17138

    virResetLastError();

17139 17140
    virCheckInterfaceReturn(iface, -1);

17141 17142 17143 17144 17145 17146 17147 17148
    if (iface->conn->interfaceDriver->interfaceIsActive) {
        int ret;
        ret = iface->conn->interfaceDriver->interfaceIsActive(iface);
        if (ret < 0)
            goto error;
        return ret;
    }

17149
    virReportUnsupportedError();
17150
 error:
17151
    virDispatchError(iface->conn);
17152 17153 17154 17155 17156 17157 17158 17159 17160 17161 17162 17163
    return -1;
}


/**
 * virConnectIsEncrypted:
 * @conn: pointer to the connection object
 *
 * Determine if the connection to the hypervisor is encrypted
 *
 * Returns 1 if encrypted, 0 if not encrypted, -1 on error
 */
17164 17165
int
virConnectIsEncrypted(virConnectPtr conn)
17166
{
17167
    VIR_DEBUG("conn=%p", conn);
17168 17169 17170

    virResetLastError();

17171
    virCheckConnectReturn(conn, -1);
17172
    if (conn->driver->connectIsEncrypted) {
17173
        int ret;
17174
        ret = conn->driver->connectIsEncrypted(conn);
17175 17176 17177 17178 17179
        if (ret < 0)
            goto error;
        return ret;
    }

17180
    virReportUnsupportedError();
17181
 error:
17182
    virDispatchError(conn);
17183 17184 17185
    return -1;
}

17186

17187 17188 17189 17190 17191 17192 17193 17194 17195 17196
/**
 * virConnectIsSecure:
 * @conn: pointer to the connection object
 *
 * Determine if the connection to the hypervisor is secure
 *
 * A connection will be classed as secure if it is either
 * encrypted, or running over a channel which is not exposed
 * to eavesdropping (eg a UNIX domain socket, or pipe)
 *
C
Claudio Bley 已提交
17197
 * Returns 1 if secure, 0 if not secure, -1 on error
17198
 */
17199 17200
int
virConnectIsSecure(virConnectPtr conn)
17201
{
17202
    VIR_DEBUG("conn=%p", conn);
17203 17204 17205

    virResetLastError();

17206
    virCheckConnectReturn(conn, -1);
17207
    if (conn->driver->connectIsSecure) {
17208
        int ret;
17209
        ret = conn->driver->connectIsSecure(conn);
17210 17211 17212 17213 17214
        if (ret < 0)
            goto error;
        return ret;
    }

17215
    virReportUnsupportedError();
17216
 error:
17217
    virDispatchError(conn);
17218 17219
    return -1;
}
J
Jiri Denemark 已提交
17220 17221 17222 17223 17224


/**
 * virConnectCompareCPU:
 * @conn: virConnect connection
17225
 * @xmlDesc: XML describing the CPU to compare with host CPU
17226
 * @flags: extra flags; not used yet, so callers should always pass 0
17227 17228
 *
 * Compares the given CPU description with the host CPU
J
Jiri Denemark 已提交
17229 17230 17231 17232 17233 17234 17235 17236
 *
 * Returns comparison result according to enum virCPUCompareResult
 */
int
virConnectCompareCPU(virConnectPtr conn,
                     const char *xmlDesc,
                     unsigned int flags)
{
17237
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
J
Jiri Denemark 已提交
17238 17239 17240

    virResetLastError();

17241
    virCheckConnectReturn(conn, VIR_CPU_COMPARE_ERROR);
17242
    virCheckNonNullArgGoto(xmlDesc, error);
J
Jiri Denemark 已提交
17243

17244
    if (conn->driver->connectCompareCPU) {
J
Jiri Denemark 已提交
17245 17246
        int ret;

17247
        ret = conn->driver->connectCompareCPU(conn, xmlDesc, flags);
J
Jiri Denemark 已提交
17248 17249 17250 17251 17252
        if (ret == VIR_CPU_COMPARE_ERROR)
            goto error;
        return ret;
    }

17253
    virReportUnsupportedError();
J
Jiri Denemark 已提交
17254

17255
 error:
17256
    virDispatchError(conn);
J
Jiri Denemark 已提交
17257 17258
    return VIR_CPU_COMPARE_ERROR;
}
17259 17260


17261 17262 17263 17264 17265 17266 17267 17268 17269 17270 17271 17272 17273 17274 17275 17276 17277 17278 17279 17280 17281 17282 17283 17284 17285 17286
/**
 * virConnectGetCPUModelNames:
 *
 * @conn: virConnect connection
 * @arch: Architecture
 * @models: Pointer to a variable to store the NULL-terminated array of the
 *          CPU models supported for the specified architecture.  Each element
 *          and the array itself must be freed by the caller with free.  Pass
 *          NULL if only the list length is needed.
 * @flags: extra flags; not used yet, so callers should always pass 0.
 *
 * Get the list of supported CPU models for a specific architecture.
 *
 * Returns -1 on error, number of elements in @models on success.
 */
int
virConnectGetCPUModelNames(virConnectPtr conn, const char *arch, char ***models,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, arch=%s, models=%p, flags=%x",
              conn, arch, models, flags);
    virResetLastError();

    if (models)
        *models = NULL;

17287
    virCheckConnectReturn(conn, -1);
17288
    virCheckNonNullArgGoto(arch, error);
17289 17290 17291 17292 17293 17294 17295 17296 17297 17298 17299

    if (conn->driver->connectGetCPUModelNames) {
        int ret;

        ret = conn->driver->connectGetCPUModelNames(conn, arch, models, flags);
        if (ret < 0)
            goto error;

        return ret;
    }

17300
    virReportUnsupportedError();
17301

17302
 error:
17303 17304 17305 17306 17307
    virDispatchError(conn);
    return -1;
}


17308 17309 17310 17311 17312 17313
/**
 * virConnectBaselineCPU:
 *
 * @conn: virConnect connection
 * @xmlCPUs: array of XML descriptions of host CPUs
 * @ncpus: number of CPUs in xmlCPUs
17314
 * @flags: bitwise-OR of virConnectBaselineCPUFlags
17315 17316 17317 17318
 *
 * Computes the most feature-rich CPU which is compatible with all given
 * host CPUs.
 *
17319 17320 17321 17322 17323
 * If @flags includes VIR_CONNECT_BASELINE_CPU_EXPAND_FEATURES then libvirt
 * will explicitly list all CPU features that are part of the host CPU,
 * without this flag features that are part of the CPU model will not be
 * listed.
 *
17324 17325 17326 17327 17328 17329 17330 17331
 * Returns XML description of the computed CPU or NULL on error.
 */
char *
virConnectBaselineCPU(virConnectPtr conn,
                      const char **xmlCPUs,
                      unsigned int ncpus,
                      unsigned int flags)
{
17332
    size_t i;
17333

17334
    VIR_DEBUG("conn=%p, xmlCPUs=%p, ncpus=%u, flags=%x",
17335 17336 17337
              conn, xmlCPUs, ncpus, flags);
    if (xmlCPUs) {
        for (i = 0; i < ncpus; i++)
17338
            VIR_DEBUG("xmlCPUs[%zu]=%s", i, NULLSTR(xmlCPUs[i]));
17339 17340 17341 17342
    }

    virResetLastError();

17343
    virCheckConnectReturn(conn, NULL);
17344
    virCheckNonNullArgGoto(xmlCPUs, error);
17345

17346
    if (conn->driver->connectBaselineCPU) {
17347 17348
        char *cpu;

17349
        cpu = conn->driver->connectBaselineCPU(conn, xmlCPUs, ncpus, flags);
17350 17351 17352 17353 17354
        if (!cpu)
            goto error;
        return cpu;
    }

17355
    virReportUnsupportedError();
17356

17357
 error:
17358 17359 17360
    virDispatchError(conn);
    return NULL;
}
17361 17362 17363 17364 17365 17366 17367 17368 17369 17370


/**
 * virDomainGetJobInfo:
 * @domain: a domain object
 * @info: pointer to a virDomainJobInfo structure allocated by the user
 *
 * Extract information about progress of a background job on a domain.
 * Will return an error if the domain is not active.
 *
E
Eric Blake 已提交
17371 17372 17373
 * This function returns a limited amount of information in comparison
 * to virDomainGetJobStats().
 *
17374 17375 17376 17377 17378 17379
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetJobInfo(virDomainPtr domain, virDomainJobInfoPtr info)
{
    virConnectPtr conn;
17380 17381

    VIR_DOMAIN_DEBUG(domain, "info=%p", info);
17382 17383 17384

    virResetLastError();

17385 17386 17387
    if (info)
        memset(info, 0, sizeof(*info));

17388
    virCheckDomainReturn(domain, -1);
17389
    virCheckNonNullArgGoto(info, error);
17390 17391 17392 17393 17394

    conn = domain->conn;

    if (conn->driver->domainGetJobInfo) {
        int ret;
17395
        ret = conn->driver->domainGetJobInfo(domain, info);
17396 17397 17398 17399 17400
        if (ret < 0)
            goto error;
        return ret;
    }

17401
    virReportUnsupportedError();
17402

17403
 error:
17404 17405
    virDispatchError(domain->conn);
    return -1;
17406 17407 17408 17409 17410 17411 17412 17413 17414 17415 17416 17417 17418 17419 17420 17421 17422 17423 17424 17425 17426 17427 17428 17429 17430 17431 17432 17433 17434 17435 17436 17437 17438 17439 17440
}


/**
 * virDomainGetJobStats:
 * @domain: a domain object
 * @type: where to store the job type (one of virDomainJobType)
 * @params: where to store job statistics
 * @nparams: number of items in @params
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Extract information about progress of a background job on a domain.
 * Will return an error if the domain is not active. The function returns
 * a superset of progress information provided by virDomainGetJobInfo.
 * Possible fields returned in @params are defined by VIR_DOMAIN_JOB_*
 * macros and new fields will likely be introduced in the future so callers
 * may receive fields that they do not understand in case they talk to a
 * newer server.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetJobStats(virDomainPtr domain,
                     int *type,
                     virTypedParameterPtr *params,
                     int *nparams,
                     unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "type=%p, params=%p, nparams=%p, flags=%x",
                     type, params, nparams, flags);

    virResetLastError();

17441
    virCheckDomainReturn(domain, -1);
17442 17443 17444 17445 17446 17447 17448 17449 17450 17451 17452 17453 17454 17455 17456
    virCheckNonNullArgGoto(type, error);
    virCheckNonNullArgGoto(params, error);
    virCheckNonNullArgGoto(nparams, error);

    conn = domain->conn;

    if (conn->driver->domainGetJobStats) {
        int ret;
        ret = conn->driver->domainGetJobStats(domain, type, params,
                                              nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

17457
    virReportUnsupportedError();
17458

17459
 error:
17460 17461
    virDispatchError(domain->conn);
    return -1;
17462
}
17463 17464 17465 17466 17467 17468 17469


/**
 * virDomainAbortJob:
 * @domain: a domain object
 *
 * Requests that the current background job be aborted at the
M
Michal Privoznik 已提交
17470
 * soonest opportunity.
17471 17472 17473 17474 17475 17476 17477 17478
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainAbortJob(virDomainPtr domain)
{
    virConnectPtr conn;

17479
    VIR_DOMAIN_DEBUG(domain);
17480 17481 17482

    virResetLastError();

17483
    virCheckDomainReturn(domain, -1);
17484
    conn = domain->conn;
17485

17486
    virCheckReadOnlyGoto(conn->flags, error);
17487 17488 17489 17490 17491 17492 17493 17494 17495

    if (conn->driver->domainAbortJob) {
        int ret;
        ret = conn->driver->domainAbortJob(domain);
        if (ret < 0)
            goto error;
        return ret;
    }

17496
    virReportUnsupportedError();
17497

17498
 error:
17499 17500 17501
    virDispatchError(conn);
    return -1;
}
17502 17503 17504 17505 17506 17507


/**
 * virDomainMigrateSetMaxDowntime:
 * @domain: a domain object
 * @downtime: maximum tolerable downtime for live migration, in milliseconds
17508
 * @flags: extra flags; not used yet, so callers should always pass 0
17509 17510 17511 17512 17513 17514 17515 17516 17517 17518 17519 17520 17521 17522
 *
 * Sets maximum tolerable time for which the domain is allowed to be paused
 * at the end of live migration. It's supposed to be called while the domain is
 * being live-migrated as a reaction to migration progress.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateSetMaxDowntime(virDomainPtr domain,
                               unsigned long long downtime,
                               unsigned int flags)
{
    virConnectPtr conn;

17523
    VIR_DOMAIN_DEBUG(domain, "downtime=%llu, flags=%x", downtime, flags);
17524 17525 17526

    virResetLastError();

17527
    virCheckDomainReturn(domain, -1);
17528
    conn = domain->conn;
17529

17530
    virCheckReadOnlyGoto(conn->flags, error);
17531 17532 17533 17534 17535 17536 17537

    if (conn->driver->domainMigrateSetMaxDowntime) {
        if (conn->driver->domainMigrateSetMaxDowntime(domain, downtime, flags) < 0)
            goto error;
        return 0;
    }

17538
    virReportUnsupportedError();
17539
 error:
17540 17541 17542 17543
    virDispatchError(conn);
    return -1;
}

17544

17545 17546 17547 17548 17549 17550 17551 17552 17553 17554 17555 17556 17557 17558 17559 17560 17561 17562 17563 17564 17565 17566
/**
 * virDomainMigrateGetCompressionCache:
 * @domain: a domain object
 * @cacheSize: return value of current size of the cache (in bytes)
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Gets current size of the cache (in bytes) used for compressing repeatedly
 * transferred memory pages during live migration.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateGetCompressionCache(virDomainPtr domain,
                                    unsigned long long *cacheSize,
                                    unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cacheSize=%p, flags=%x", cacheSize, flags);

    virResetLastError();

17567
    virCheckDomainReturn(domain, -1);
17568 17569 17570 17571 17572 17573 17574 17575 17576 17577 17578
    conn = domain->conn;

    virCheckNonNullArgGoto(cacheSize, error);

    if (conn->driver->domainMigrateGetCompressionCache) {
        if (conn->driver->domainMigrateGetCompressionCache(domain, cacheSize,
                                                           flags) < 0)
            goto error;
        return 0;
    }

17579
    virReportUnsupportedError();
17580
 error:
17581 17582 17583 17584
    virDispatchError(conn);
    return -1;
}

17585

17586 17587 17588 17589 17590 17591 17592 17593 17594 17595 17596 17597 17598 17599 17600 17601 17602 17603 17604 17605 17606 17607 17608 17609 17610
/**
 * virDomainMigrateSetCompressionCache:
 * @domain: a domain object
 * @cacheSize: size of the cache (in bytes) used for compression
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Sets size of the cache (in bytes) used for compressing repeatedly
 * transferred memory pages during live migration. It's supposed to be called
 * while the domain is being live-migrated as a reaction to migration progress
 * and increasing number of compression cache misses obtained from
 * virDomainGetJobStats.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateSetCompressionCache(virDomainPtr domain,
                                    unsigned long long cacheSize,
                                    unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cacheSize=%llu, flags=%x", cacheSize, flags);

    virResetLastError();

17611
    virCheckDomainReturn(domain, -1);
17612
    conn = domain->conn;
17613

17614
    virCheckReadOnlyGoto(conn->flags, error);
17615 17616 17617 17618 17619 17620 17621 17622

    if (conn->driver->domainMigrateSetCompressionCache) {
        if (conn->driver->domainMigrateSetCompressionCache(domain, cacheSize,
                                                           flags) < 0)
            goto error;
        return 0;
    }

17623
    virReportUnsupportedError();
17624
 error:
17625 17626 17627 17628
    virDispatchError(conn);
    return -1;
}

17629

17630 17631 17632
/**
 * virDomainMigrateSetMaxSpeed:
 * @domain: a domain object
17633
 * @bandwidth: migration bandwidth limit in MiB/s
17634
 * @flags: extra flags; not used yet, so callers should always pass 0
17635
 *
17636
 * The maximum bandwidth (in MiB/s) that will be used to do migration
17637 17638 17639 17640 17641 17642 17643 17644 17645 17646 17647 17648
 * can be specified with the bandwidth parameter. Not all hypervisors
 * will support a bandwidth cap
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateSetMaxSpeed(virDomainPtr domain,
                            unsigned long bandwidth,
                            unsigned int flags)
{
    virConnectPtr conn;

17649
    VIR_DOMAIN_DEBUG(domain, "bandwidth=%lu, flags=%x", bandwidth, flags);
17650 17651 17652

    virResetLastError();

17653
    virCheckDomainReturn(domain, -1);
17654
    conn = domain->conn;
17655

17656
    virCheckReadOnlyGoto(conn->flags, error);
17657 17658 17659 17660 17661 17662 17663

    if (conn->driver->domainMigrateSetMaxSpeed) {
        if (conn->driver->domainMigrateSetMaxSpeed(domain, bandwidth, flags) < 0)
            goto error;
        return 0;
    }

17664
    virReportUnsupportedError();
17665
 error:
17666 17667 17668 17669
    virDispatchError(conn);
    return -1;
}

17670

17671 17672 17673
/**
 * virDomainMigrateGetMaxSpeed:
 * @domain: a domain object
17674
 * @bandwidth: return value of current migration bandwidth limit in MiB/s
17675
 * @flags: extra flags; not used yet, so callers should always pass 0
17676
 *
17677
 * Get the current maximum bandwidth (in MiB/s) that will be used if the
17678 17679 17680 17681 17682 17683 17684 17685 17686 17687 17688 17689 17690 17691 17692
 * domain is migrated.  Not all hypervisors will support a bandwidth limit.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateGetMaxSpeed(virDomainPtr domain,
                            unsigned long *bandwidth,
                            unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "bandwidth = %p, flags=%x", bandwidth, flags);

    virResetLastError();

17693
    virCheckDomainReturn(domain, -1);
17694 17695
    conn = domain->conn;

17696
    virCheckNonNullArgGoto(bandwidth, error);
17697
    virCheckReadOnlyGoto(conn->flags, error);
17698 17699 17700 17701 17702 17703 17704

    if (conn->driver->domainMigrateGetMaxSpeed) {
        if (conn->driver->domainMigrateGetMaxSpeed(domain, bandwidth, flags) < 0)
            goto error;
        return 0;
    }

17705
    virReportUnsupportedError();
17706
 error:
17707 17708 17709 17710
    virDispatchError(conn);
    return -1;
}

17711

17712 17713 17714 17715 17716 17717 17718 17719 17720 17721
/**
 * virConnectDomainEventRegisterAny:
 * @conn: pointer to the connection
 * @dom: pointer to the domain
 * @eventID: the event type to receive
 * @cb: callback to the function handling domain events
 * @opaque: opaque data to pass on to the callback
 * @freecb: optional function to deallocate opaque when not used anymore
 *
 * Adds a callback to receive notifications of arbitrary domain events
E
Eric Blake 已提交
17722 17723 17724
 * occurring on a domain.  This function requires that an event loop
 * has been previously registered with virEventRegisterImpl() or
 * virEventRegisterDefaultImpl().
17725
 *
17726
 * If @dom is NULL, then events will be monitored for any domain. If @dom
E
Eric Blake 已提交
17727
 * is non-NULL, then only the specific domain will be monitored.
17728 17729
 *
 * Most types of event have a callback providing a custom set of parameters
17730
 * for the event. When registering an event, it is thus necessary to use
17731 17732 17733 17734 17735
 * the VIR_DOMAIN_EVENT_CALLBACK() macro to cast the supplied function pointer
 * to match the signature of this method.
 *
 * The virDomainPtr object handle passed into the callback upon delivery
 * of an event is only valid for the duration of execution of the callback.
17736
 * If the callback wishes to keep the domain object after the callback returns,
17737
 * it shall take a reference to it, by calling virDomainRef().
17738
 * The reference can be released once the object is no longer required
17739
 * by calling virDomainFree().
17740 17741 17742
 *
 * The return value from this method is a positive integer identifier
 * for the callback. To unregister a callback, this callback ID should
17743
 * be passed to the virConnectDomainEventDeregisterAny() method.
17744
 *
E
Eric Blake 已提交
17745
 * Returns a callback identifier on success, -1 on failure.
17746 17747 17748 17749 17750 17751 17752 17753 17754
 */
int
virConnectDomainEventRegisterAny(virConnectPtr conn,
                                 virDomainPtr dom,
                                 int eventID,
                                 virConnectDomainEventGenericCallback cb,
                                 void *opaque,
                                 virFreeCallback freecb)
{
17755 17756 17757
    VIR_DOMAIN_DEBUG(dom, "conn=%p, eventID=%d, cb=%p, opaque=%p, freecb=%p",
                     conn, eventID, cb, opaque, freecb);

17758 17759
    virResetLastError();

17760
    virCheckConnectReturn(conn, -1);
17761 17762 17763 17764 17765 17766 17767 17768
    if (dom) {
        virCheckDomainGoto(dom, error);
        if (dom->conn != conn) {
            virReportInvalidArg(dom,
                                _("domain '%s' in %s must match connection"),
                                dom->name, __FUNCTION__);
            goto error;
        }
17769
    }
17770 17771 17772 17773 17774 17775
    virCheckNonNullArgGoto(cb, error);
    virCheckNonNegativeArgGoto(eventID, error);
    if (eventID >= VIR_DOMAIN_EVENT_ID_LAST) {
        virReportInvalidArg(eventID,
                            _("eventID in %s must be less than %d"),
                            __FUNCTION__, VIR_DOMAIN_EVENT_ID_LAST);
17776 17777 17778
        goto error;
    }

17779
    if (conn->driver && conn->driver->connectDomainEventRegisterAny) {
17780
        int ret;
17781
        ret = conn->driver->connectDomainEventRegisterAny(conn, dom, eventID, cb, opaque, freecb);
17782 17783 17784 17785 17786
        if (ret < 0)
            goto error;
        return ret;
    }

17787
    virReportUnsupportedError();
17788
 error:
17789 17790 17791
    virDispatchError(conn);
    return -1;
}
17792

17793

17794 17795 17796 17797 17798 17799
/**
 * virConnectDomainEventDeregisterAny:
 * @conn: pointer to the connection
 * @callbackID: the callback identifier
 *
 * Removes an event callback. The callbackID parameter should be the
17800
 * value obtained from a previous virConnectDomainEventRegisterAny() method.
17801
 *
17802 17803 17804
 * Returns 0 on success, -1 on failure.  Older versions of some hypervisors
 * sometimes returned a positive number on success, but without any reliable
 * semantics on what that number represents. */
17805 17806 17807 17808
int
virConnectDomainEventDeregisterAny(virConnectPtr conn,
                                   int callbackID)
{
17809
    VIR_DEBUG("conn=%p, callbackID=%d", conn, callbackID);
17810 17811 17812

    virResetLastError();

17813
    virCheckConnectReturn(conn, -1);
17814 17815
    virCheckNonNegativeArgGoto(callbackID, error);

17816
    if (conn->driver && conn->driver->connectDomainEventDeregisterAny) {
17817
        int ret;
17818
        ret = conn->driver->connectDomainEventDeregisterAny(conn, callbackID);
17819 17820 17821 17822 17823
        if (ret < 0)
            goto error;
        return ret;
    }

17824
    virReportUnsupportedError();
17825
 error:
17826 17827 17828
    virDispatchError(conn);
    return -1;
}
17829

17830

17831 17832 17833 17834 17835 17836 17837 17838 17839 17840
/**
 * virConnectNetworkEventRegisterAny:
 * @conn: pointer to the connection
 * @net: pointer to the network
 * @eventID: the event type to receive
 * @cb: callback to the function handling network events
 * @opaque: opaque data to pass on to the callback
 * @freecb: optional function to deallocate opaque when not used anymore
 *
 * Adds a callback to receive notifications of arbitrary network events
E
Eric Blake 已提交
17841 17842 17843
 * occurring on a network.  This function requires that an event loop
 * has been previously registered with virEventRegisterImpl() or
 * virEventRegisterDefaultImpl().
17844
 *
17845
 * If @net is NULL, then events will be monitored for any network. If @net
E
Eric Blake 已提交
17846
 * is non-NULL, then only the specific network will be monitored.
17847 17848 17849 17850 17851 17852 17853 17854 17855
 *
 * Most types of event have a callback providing a custom set of parameters
 * for the event. When registering an event, it is thus necessary to use
 * the VIR_NETWORK_EVENT_CALLBACK() macro to cast the supplied function pointer
 * to match the signature of this method.
 *
 * The virNetworkPtr object handle passed into the callback upon delivery
 * of an event is only valid for the duration of execution of the callback.
 * If the callback wishes to keep the network object after the callback
17856
 * returns, it shall take a reference to it, by calling virNetworkRef().
17857
 * The reference can be released once the object is no longer required
17858
 * by calling virNetworkFree().
17859 17860 17861
 *
 * The return value from this method is a positive integer identifier
 * for the callback. To unregister a callback, this callback ID should
17862
 * be passed to the virConnectNetworkEventDeregisterAny() method.
17863
 *
E
Eric Blake 已提交
17864
 * Returns a callback identifier on success, -1 on failure.
17865 17866 17867 17868 17869 17870 17871 17872 17873 17874 17875 17876 17877 17878
 */
int
virConnectNetworkEventRegisterAny(virConnectPtr conn,
                                  virNetworkPtr net,
                                  int eventID,
                                  virConnectNetworkEventGenericCallback cb,
                                  void *opaque,
                                  virFreeCallback freecb)
{
    VIR_DEBUG("conn=%p, eventID=%d, cb=%p, opaque=%p, freecb=%p",
              conn, eventID, cb, opaque, freecb);

    virResetLastError();

17879
    virCheckConnectReturn(conn, -1);
17880 17881 17882 17883 17884 17885 17886 17887
    if (net) {
        virCheckNetworkGoto(net, error);
        if (net->conn != conn) {
            virReportInvalidArg(net,
                                _("network '%s' in %s must match connection"),
                                net->name, __FUNCTION__);
            goto error;
        }
17888 17889 17890 17891 17892 17893 17894 17895 17896 17897 17898
    }
    virCheckNonNullArgGoto(cb, error);
    virCheckNonNegativeArgGoto(eventID, error);

    if (eventID >= VIR_NETWORK_EVENT_ID_LAST) {
        virReportInvalidArg(eventID,
                            _("eventID in %s must be less than %d"),
                            __FUNCTION__, VIR_NETWORK_EVENT_ID_LAST);
        goto error;
    }

17899
    if (conn->networkDriver && conn->networkDriver->connectNetworkEventRegisterAny) {
17900 17901 17902 17903 17904 17905 17906 17907 17908 17909
        int ret;
        ret = conn->networkDriver->connectNetworkEventRegisterAny(conn, net,
                                                                  eventID,
                                                                  cb, opaque,
                                                                  freecb);
        if (ret < 0)
            goto error;
        return ret;
    }

17910
    virReportUnsupportedError();
17911
 error:
17912 17913 17914 17915
    virDispatchError(conn);
    return -1;
}

17916

17917 17918 17919 17920 17921 17922
/**
 * virConnectNetworkEventDeregisterAny:
 * @conn: pointer to the connection
 * @callbackID: the callback identifier
 *
 * Removes an event callback. The callbackID parameter should be the
17923
 * value obtained from a previous virConnectNetworkEventRegisterAny() method.
17924 17925 17926 17927 17928 17929 17930 17931 17932 17933 17934
 *
 * Returns 0 on success, -1 on failure
 */
int
virConnectNetworkEventDeregisterAny(virConnectPtr conn,
                                    int callbackID)
{
    VIR_DEBUG("conn=%p, callbackID=%d", conn, callbackID);

    virResetLastError();

17935
    virCheckConnectReturn(conn, -1);
17936 17937
    virCheckNonNegativeArgGoto(callbackID, error);

17938 17939
    if (conn->networkDriver &&
        conn->networkDriver->connectNetworkEventDeregisterAny) {
17940 17941 17942 17943 17944 17945 17946 17947
        int ret;
        ret = conn->networkDriver->connectNetworkEventDeregisterAny(conn,
                                                                    callbackID);
        if (ret < 0)
            goto error;
        return ret;
    }

17948
    virReportUnsupportedError();
17949
 error:
17950 17951 17952 17953
    virDispatchError(conn);
    return -1;
}

17954

17955 17956 17957
/**
 * virDomainManagedSave:
 * @dom: pointer to the domain
17958
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
17959 17960 17961 17962 17963 17964 17965 17966
 *
 * This method will suspend a domain and save its memory contents to
 * a file on disk. After the call, if successful, the domain is not
 * listed as running anymore.
 * The difference from virDomainSave() is that libvirt is keeping track of
 * the saved state itself, and will reuse it once the domain is being
 * restarted (automatically or via an explicit libvirt call).
 * As a result any running domain is sure to not have a managed saved image.
17967 17968 17969
 * This also implies that managed save only works on persistent domains,
 * since the domain must still exist in order to use virDomainCreate() to
 * restart it.
17970
 *
17971 17972 17973 17974 17975
 * If @flags includes VIR_DOMAIN_SAVE_BYPASS_CACHE, then libvirt will
 * attempt to bypass the file system cache while creating the file, or
 * fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
17976 17977 17978 17979 17980 17981
 * Normally, the managed saved state will remember whether the domain
 * was running or paused, and start will resume to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override the default saved into the file.  These two
 * flags are mutually exclusive.
 *
17982 17983
 * Returns 0 in case of success or -1 in case of failure
 */
17984 17985
int
virDomainManagedSave(virDomainPtr dom, unsigned int flags)
17986 17987 17988
{
    virConnectPtr conn;

17989
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);
17990 17991 17992

    virResetLastError();

17993
    virCheckDomainReturn(dom, -1);
17994
    conn = dom->conn;
17995

17996
    virCheckReadOnlyGoto(conn->flags, error);
17997

17998
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
17999
        virReportInvalidArg(flags,
18000 18001
                            _("running and paused flags in %s are mutually "
                              "exclusive"),
18002
                            __FUNCTION__);
18003 18004 18005
        goto error;
    }

18006 18007 18008 18009 18010 18011 18012 18013 18014
    if (conn->driver->domainManagedSave) {
        int ret;

        ret = conn->driver->domainManagedSave(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18015
    virReportUnsupportedError();
18016

18017
 error:
18018 18019 18020 18021
    virDispatchError(conn);
    return -1;
}

18022

18023 18024 18025
/**
 * virDomainHasManagedSaveImage:
 * @dom: pointer to the domain
18026
 * @flags: extra flags; not used yet, so callers should always pass 0
18027 18028 18029 18030 18031 18032 18033 18034
 *
 * Check if a domain has a managed save image as created by
 * virDomainManagedSave(). Note that any running domain should not have
 * such an image, as it should have been removed on restart.
 *
 * Returns 0 if no image is present, 1 if an image is present, and
 *         -1 in case of error
 */
18035 18036
int
virDomainHasManagedSaveImage(virDomainPtr dom, unsigned int flags)
18037 18038 18039
{
    virConnectPtr conn;

18040
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);
18041 18042 18043

    virResetLastError();

18044
    virCheckDomainReturn(dom, -1);
18045 18046 18047 18048 18049 18050 18051 18052 18053 18054 18055
    conn = dom->conn;

    if (conn->driver->domainHasManagedSaveImage) {
        int ret;

        ret = conn->driver->domainHasManagedSaveImage(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18056
    virReportUnsupportedError();
18057

18058
 error:
18059 18060 18061 18062
    virDispatchError(conn);
    return -1;
}

18063

18064 18065 18066
/**
 * virDomainManagedSaveRemove:
 * @dom: pointer to the domain
18067
 * @flags: extra flags; not used yet, so callers should always pass 0
18068
 *
D
Daniel Veillard 已提交
18069
 * Remove any managed save image for this domain.
18070 18071 18072
 *
 * Returns 0 in case of success, and -1 in case of error
 */
18073 18074
int
virDomainManagedSaveRemove(virDomainPtr dom, unsigned int flags)
18075 18076 18077
{
    virConnectPtr conn;

18078
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);
18079 18080 18081

    virResetLastError();

18082
    virCheckDomainReturn(dom, -1);
18083
    conn = dom->conn;
18084

18085
    virCheckReadOnlyGoto(conn->flags, error);
18086 18087 18088 18089 18090 18091 18092 18093 18094 18095

    if (conn->driver->domainManagedSaveRemove) {
        int ret;

        ret = conn->driver->domainManagedSaveRemove(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18096
    virReportUnsupportedError();
18097

18098
 error:
18099 18100 18101
    virDispatchError(conn);
    return -1;
}
C
Chris Lalancette 已提交
18102

18103

18104 18105 18106 18107 18108 18109 18110 18111 18112 18113 18114 18115 18116 18117 18118 18119
/**
 * virDomainSnapshotGetName:
 * @snapshot: a snapshot object
 *
 * Get the public name for that snapshot
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * as its lifetime will be the same as the snapshot object.
 */
const char *
virDomainSnapshotGetName(virDomainSnapshotPtr snapshot)
{
    VIR_DEBUG("snapshot=%p", snapshot);

    virResetLastError();

18120 18121
    virCheckDomainSnapshotReturn(snapshot, NULL);

18122 18123 18124
    return snapshot->name;
}

18125

18126 18127 18128 18129
/**
 * virDomainSnapshotGetDomain:
 * @snapshot: a snapshot object
 *
18130 18131 18132 18133 18134 18135
 * Provides the domain pointer associated with a snapshot.  The
 * reference counter on the domain is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do not use this
 * function.  Instead, store the domain and the snapshot object together.
18136 18137 18138 18139 18140 18141 18142 18143 18144 18145
 *
 * Returns the domain or NULL.
 */
virDomainPtr
virDomainSnapshotGetDomain(virDomainSnapshotPtr snapshot)
{
    VIR_DEBUG("snapshot=%p", snapshot);

    virResetLastError();

18146 18147
    virCheckDomainSnapshotReturn(snapshot, NULL);

18148 18149 18150
    return snapshot->domain;
}

18151

18152 18153 18154 18155
/**
 * virDomainSnapshotGetConnect:
 * @snapshot: a snapshot object
 *
18156 18157 18158 18159 18160 18161
 * Provides the connection pointer associated with a snapshot.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do not use this
 * function.  Instead, store the connection and the snapshot object together.
18162 18163 18164 18165 18166 18167 18168 18169 18170 18171
 *
 * Returns the connection or NULL.
 */
virConnectPtr
virDomainSnapshotGetConnect(virDomainSnapshotPtr snapshot)
{
    VIR_DEBUG("snapshot=%p", snapshot);

    virResetLastError();

18172 18173
    virCheckDomainSnapshotReturn(snapshot, NULL);

18174 18175 18176
    return snapshot->domain->conn;
}

18177

C
Chris Lalancette 已提交
18178 18179 18180 18181
/**
 * virDomainSnapshotCreateXML:
 * @domain: a domain object
 * @xmlDesc: string containing an XML description of the domain
18182
 * @flags: bitwise-OR of virDomainSnapshotCreateFlags
C
Chris Lalancette 已提交
18183 18184 18185 18186
 *
 * Creates a new snapshot of a domain based on the snapshot xml
 * contained in xmlDesc.
 *
18187 18188 18189 18190 18191 18192 18193 18194 18195 18196 18197 18198 18199 18200 18201 18202 18203 18204 18205 18206 18207 18208 18209 18210 18211 18212 18213 18214 18215 18216 18217 18218 18219 18220 18221
 * If @flags is 0, the domain can be active, in which case the
 * snapshot will be a system checkpoint (both disk state and runtime
 * VM state such as RAM contents), where reverting to the snapshot is
 * the same as resuming from hibernation (TCP connections may have
 * timed out, but everything else picks up where it left off); or
 * the domain can be inactive, in which case the snapshot includes
 * just the disk state prior to booting.  The newly created snapshot
 * becomes current (see virDomainSnapshotCurrent()), and is a child
 * of any previous current snapshot.
 *
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE, then this
 * is a request to reinstate snapshot metadata that was previously
 * discarded, rather than creating a new snapshot.  This can be used
 * to recreate a snapshot hierarchy on a destination, then remove it
 * on the source, in order to allow migration (since migration
 * normally fails if snapshot metadata still remains on the source
 * machine).  When redefining snapshot metadata, the current snapshot
 * will not be altered unless the VIR_DOMAIN_SNAPSHOT_CREATE_CURRENT
 * flag is also present.  It is an error to request the
 * VIR_DOMAIN_SNAPSHOT_CREATE_CURRENT flag without
 * VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE.  On some hypervisors,
 * redefining an existing snapshot can be used to alter host-specific
 * portions of the domain XML to be used during revert (such as
 * backing filenames associated with disk devices), but must not alter
 * guest-visible layout.  When redefining a snapshot name that does
 * not exist, the hypervisor may validate that reverting to the
 * snapshot appears to be possible (for example, disk images have
 * snapshot contents by the requested name).  Not all hypervisors
 * support these flags.
 *
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_NO_METADATA, then the
 * domain's disk images are modified according to @xmlDesc, but then
 * the just-created snapshot has its metadata deleted.  This flag is
 * incompatible with VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE.
 *
18222 18223 18224 18225 18226 18227
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_HALT, then the domain
 * will be inactive after the snapshot completes, regardless of whether
 * it was active before; otherwise, a running domain will still be
 * running after the snapshot.  This flag is invalid on transient domains,
 * and is incompatible with VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE.
 *
18228 18229 18230 18231 18232 18233
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_LIVE, then the domain
 * is not paused while creating the snapshot. This increases the size
 * of the memory dump file, but reduces downtime of the guest while
 * taking the snapshot. Some hypervisors only support this flag during
 * external checkpoints.
 *
18234 18235 18236 18237 18238 18239
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_DISK_ONLY, then the
 * snapshot will be limited to the disks described in @xmlDesc, and no
 * VM state will be saved.  For an active guest, the disk image may be
 * inconsistent (as if power had been pulled), and specifying this
 * with the VIR_DOMAIN_SNAPSHOT_CREATE_HALT flag risks data loss.
 *
18240 18241 18242 18243 18244 18245
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_QUIESCE, then the
 * libvirt will attempt to use guest agent to freeze and thaw all
 * file systems in use within domain OS. However, if the guest agent
 * is not present, an error is thrown. Moreover, this flag requires
 * VIR_DOMAIN_SNAPSHOT_CREATE_DISK_ONLY to be passed as well.
 *
18246
 * By default, if the snapshot involves external files, and any of the
18247 18248 18249 18250 18251 18252 18253
 * destination files already exist as a non-empty regular file, the
 * snapshot is rejected to avoid losing contents of those files.
 * However, if @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_REUSE_EXT,
 * then the destination files must already exist and contain content
 * identical to the source files (this allows a management app to
 * pre-create files with relative backing file names, rather than the
 * default of creating with absolute backing file names).
18254 18255
 *
 * Be aware that although libvirt prefers to report errors up front with
E
Eric Blake 已提交
18256 18257 18258 18259 18260 18261 18262 18263 18264 18265 18266 18267 18268
 * no other effect, some hypervisors have certain types of failures where
 * the overall command can easily fail even though the guest configuration
 * was partially altered (for example, if a disk snapshot request for two
 * disks fails on the second disk, but the first disk alteration cannot be
 * rolled back).  If this API call fails, it is therefore normally
 * necessary to follow up with virDomainGetXMLDesc() and check each disk
 * to determine if any partial changes occurred.  However, if @flags
 * contains VIR_DOMAIN_SNAPSHOT_CREATE_ATOMIC, then libvirt guarantees
 * that this command will not alter any disks unless the entire set of
 * changes can be done atomically, making failure recovery simpler (note
 * that it is still possible to fail after disks have changed, but only
 * in the much rarer cases of running out of memory or disk space).
 *
E
Eric Blake 已提交
18269 18270 18271 18272
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation; in that case, use virDomainBlockJobAbort()
 * to stop the block copy first.
 *
E
Eric Blake 已提交
18273
 * Returns an (opaque) virDomainSnapshotPtr on success, NULL on failure.
C
Chris Lalancette 已提交
18274 18275 18276 18277 18278 18279 18280 18281
 */
virDomainSnapshotPtr
virDomainSnapshotCreateXML(virDomainPtr domain,
                           const char *xmlDesc,
                           unsigned int flags)
{
    virConnectPtr conn;

18282
    VIR_DOMAIN_DEBUG(domain, "xmlDesc=%s, flags=%x", xmlDesc, flags);
C
Chris Lalancette 已提交
18283 18284 18285

    virResetLastError();

18286
    virCheckDomainReturn(domain, NULL);
C
Chris Lalancette 已提交
18287
    conn = domain->conn;
18288

18289
    virCheckNonNullArgGoto(xmlDesc, error);
18290
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
18291

18292 18293
    if ((flags & VIR_DOMAIN_SNAPSHOT_CREATE_CURRENT) &&
        !(flags & VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE)) {
18294
        virReportInvalidArg(flags,
18295 18296
                            _("use of 'current' flag in %s requires "
                              "'redefine' flag"),
18297
                            __FUNCTION__);
18298 18299 18300 18301
        goto error;
    }
    if ((flags & VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE) &&
        (flags & VIR_DOMAIN_SNAPSHOT_CREATE_NO_METADATA)) {
18302
        virReportInvalidArg(flags,
18303 18304
                            _("'redefine' and 'no metadata' flags in %s are "
                              "mutually exclusive"),
18305
                            __FUNCTION__);
18306 18307
        goto error;
    }
18308 18309
    if ((flags & VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE) &&
        (flags & VIR_DOMAIN_SNAPSHOT_CREATE_HALT)) {
18310
        virReportInvalidArg(flags,
18311 18312
                            _("'redefine' and 'halt' flags in %s are mutually "
                              "exclusive"),
18313
                            __FUNCTION__);
18314 18315
        goto error;
    }
18316

C
Chris Lalancette 已提交
18317 18318 18319 18320 18321 18322 18323 18324
    if (conn->driver->domainSnapshotCreateXML) {
        virDomainSnapshotPtr ret;
        ret = conn->driver->domainSnapshotCreateXML(domain, xmlDesc, flags);
        if (!ret)
            goto error;
        return ret;
    }

18325
    virReportUnsupportedError();
18326
 error:
C
Chris Lalancette 已提交
18327 18328 18329 18330
    virDispatchError(conn);
    return NULL;
}

18331

C
Chris Lalancette 已提交
18332 18333 18334
/**
 * virDomainSnapshotGetXMLDesc:
 * @snapshot: a domain snapshot object
18335
 * @flags: bitwise-OR of subset of virDomainXMLFlags
C
Chris Lalancette 已提交
18336 18337 18338
 *
 * Provide an XML description of the domain snapshot.
 *
18339 18340 18341 18342 18343
 * No security-sensitive data will be included unless @flags contains
 * VIR_DOMAIN_XML_SECURE; this flag is rejected on read-only
 * connections.  For this API, @flags should not contain either
 * VIR_DOMAIN_XML_INACTIVE or VIR_DOMAIN_XML_UPDATE_CPU.
 *
C
Chris Lalancette 已提交
18344 18345 18346 18347 18348 18349 18350 18351
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
virDomainSnapshotGetXMLDesc(virDomainSnapshotPtr snapshot,
                            unsigned int flags)
{
    virConnectPtr conn;
18352
    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);
C
Chris Lalancette 已提交
18353 18354 18355

    virResetLastError();

18356
    virCheckDomainSnapshotReturn(snapshot, NULL);
C
Chris Lalancette 已提交
18357 18358 18359
    conn = snapshot->domain->conn;

    if ((conn->flags & VIR_CONNECT_RO) && (flags & VIR_DOMAIN_XML_SECURE)) {
18360 18361
        virReportError(VIR_ERR_OPERATION_DENIED, "%s",
                       _("virDomainSnapshotGetXMLDesc with secure flag"));
C
Chris Lalancette 已提交
18362 18363 18364
        goto error;
    }

18365
    if (conn->driver->domainSnapshotGetXMLDesc) {
C
Chris Lalancette 已提交
18366
        char *ret;
18367
        ret = conn->driver->domainSnapshotGetXMLDesc(snapshot, flags);
C
Chris Lalancette 已提交
18368 18369 18370 18371 18372
        if (!ret)
            goto error;
        return ret;
    }

18373
    virReportUnsupportedError();
18374
 error:
C
Chris Lalancette 已提交
18375 18376 18377 18378
    virDispatchError(conn);
    return NULL;
}

18379

C
Chris Lalancette 已提交
18380 18381 18382
/**
 * virDomainSnapshotNum:
 * @domain: a domain object
18383
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
18384 18385
 *
 * Provides the number of domain snapshots for this domain.
C
Chris Lalancette 已提交
18386
 *
18387 18388 18389 18390 18391 18392 18393 18394 18395 18396 18397 18398 18399 18400 18401 18402
 * By default, this command covers all snapshots; it is also possible to
 * limit things to just snapshots with no parents, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_ROOTS.  Additional filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
C
Chris Lalancette 已提交
18403
 *
18404 18405 18406 18407
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
18408
 *
18409 18410 18411 18412 18413 18414 18415 18416 18417 18418
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18419
 * Returns the number of domain snapshots found or -1 in case of error.
C
Chris Lalancette 已提交
18420 18421 18422 18423 18424
 */
int
virDomainSnapshotNum(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;
18425

E
Eric Blake 已提交
18426
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
C
Chris Lalancette 已提交
18427 18428 18429

    virResetLastError();

18430
    virCheckDomainReturn(domain, -1);
C
Chris Lalancette 已提交
18431 18432 18433 18434 18435 18436 18437 18438 18439

    conn = domain->conn;
    if (conn->driver->domainSnapshotNum) {
        int ret = conn->driver->domainSnapshotNum(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18440
    virReportUnsupportedError();
18441
 error:
C
Chris Lalancette 已提交
18442 18443 18444 18445
    virDispatchError(conn);
    return -1;
}

18446

C
Chris Lalancette 已提交
18447 18448 18449 18450 18451
/**
 * virDomainSnapshotListNames:
 * @domain: a domain object
 * @names: array to collect the list of names of snapshots
 * @nameslen: size of @names
18452
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
C
Chris Lalancette 已提交
18453 18454
 *
 * Collect the list of domain snapshots for the given domain, and store
18455 18456
 * their names in @names.  The value to use for @nameslen can be determined
 * by virDomainSnapshotNum() with the same @flags.
18457
 *
18458 18459 18460 18461 18462 18463 18464 18465 18466 18467 18468 18469 18470 18471 18472 18473
 * By default, this command covers all snapshots; it is also possible to
 * limit things to just snapshots with no parents, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_ROOTS.  Additional filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
18474
 *
18475 18476 18477 18478
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
C
Chris Lalancette 已提交
18479
 *
18480 18481 18482 18483 18484 18485 18486 18487 18488 18489
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18490 18491 18492 18493 18494 18495
 * Note that this command is inherently racy: another connection can
 * define a new snapshot between a call to virDomainSnapshotNum() and
 * this call.  You are only guaranteed that all currently defined
 * snapshots were listed if the return is less than @nameslen.  Likewise,
 * you should be prepared for virDomainSnapshotLookupByName() to fail when
 * converting a name from this call into a snapshot object, if another
18496 18497 18498 18499
 * connection deletes the snapshot in the meantime.  For more control over
 * the results, see virDomainListAllSnapshots().
 *
 * Returns the number of domain snapshots found or -1 in case of error.
J
John Ferlan 已提交
18500
 * The caller is responsible to call free() for each member of the array.
C
Chris Lalancette 已提交
18501 18502 18503 18504 18505 18506 18507
 */
int
virDomainSnapshotListNames(virDomainPtr domain, char **names, int nameslen,
                           unsigned int flags)
{
    virConnectPtr conn;

18508
    VIR_DOMAIN_DEBUG(domain, "names=%p, nameslen=%d, flags=%x",
18509
                     names, nameslen, flags);
C
Chris Lalancette 已提交
18510 18511 18512

    virResetLastError();

18513
    virCheckDomainReturn(domain, -1);
C
Chris Lalancette 已提交
18514 18515
    conn = domain->conn;

18516 18517
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(nameslen, error);
C
Chris Lalancette 已提交
18518 18519 18520 18521 18522 18523 18524 18525 18526

    if (conn->driver->domainSnapshotListNames) {
        int ret = conn->driver->domainSnapshotListNames(domain, names,
                                                        nameslen, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18527
    virReportUnsupportedError();
18528
 error:
C
Chris Lalancette 已提交
18529 18530 18531 18532
    virDispatchError(conn);
    return -1;
}

18533

18534 18535 18536 18537 18538 18539 18540 18541 18542 18543 18544 18545 18546 18547 18548 18549 18550 18551 18552 18553 18554 18555 18556 18557 18558 18559 18560 18561 18562 18563 18564 18565 18566 18567
/**
 * virDomainListAllSnapshots:
 * @domain: a domain object
 * @snaps: pointer to variable to store the array containing snapshot objects,
 *         or NULL if the list is not required (just returns number of
 *         snapshots)
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
 *
 * Collect the list of domain snapshots for the given domain, and allocate
 * an array to store those objects.  This API solves the race inherent in
 * virDomainSnapshotListNames().
 *
 * By default, this command covers all snapshots; it is also possible to
 * limit things to just snapshots with no parents, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_ROOTS.  Additional filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
 *
18568 18569 18570 18571 18572 18573 18574 18575 18576 18577
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18578 18579 18580 18581 18582 18583 18584 18585 18586 18587 18588 18589 18590 18591 18592 18593 18594 18595 18596 18597
 * Returns the number of domain snapshots found or -1 and sets @snaps to
 * NULL in case of error.  On success, the array stored into @snaps is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virDomainSnapshotFree() on each array element, then calling
 * free() on @snaps.
 */
int
virDomainListAllSnapshots(virDomainPtr domain, virDomainSnapshotPtr **snaps,
                          unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "snaps=%p, flags=%x", snaps, flags);

    virResetLastError();

    if (snaps)
        *snaps = NULL;

18598
    virCheckDomainReturn(domain, -1);
18599 18600 18601 18602 18603 18604 18605 18606 18607
    conn = domain->conn;

    if (conn->driver->domainListAllSnapshots) {
        int ret = conn->driver->domainListAllSnapshots(domain, snaps, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18608
    virReportUnsupportedError();
18609
 error:
18610 18611 18612 18613
    virDispatchError(conn);
    return -1;
}

18614

18615 18616 18617
/**
 * virDomainSnapshotNumChildren:
 * @snapshot: a domain snapshot object
18618
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
18619 18620 18621
 *
 * Provides the number of child snapshots for this domain snapshot.
 *
18622 18623 18624 18625 18626 18627 18628 18629 18630 18631 18632 18633
 * By default, this command covers only direct children; it is also possible
 * to expand things to cover all descendants, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_DESCENDANTS.  Also, some filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
18634
 *
18635 18636 18637
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
18638
 *
18639 18640 18641 18642
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
18643
 *
18644 18645 18646 18647 18648 18649 18650 18651 18652 18653
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18654 18655 18656 18657 18658 18659 18660 18661 18662 18663 18664
 * Returns the number of domain snapshots found or -1 in case of error.
 */
int
virDomainSnapshotNumChildren(virDomainSnapshotPtr snapshot, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

18665
    virCheckDomainSnapshotReturn(snapshot, -1);
18666
    conn = snapshot->domain->conn;
18667

18668 18669 18670 18671 18672 18673 18674
    if (conn->driver->domainSnapshotNumChildren) {
        int ret = conn->driver->domainSnapshotNumChildren(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18675
    virReportUnsupportedError();
18676
 error:
18677 18678 18679 18680
    virDispatchError(conn);
    return -1;
}

18681

18682 18683 18684 18685 18686
/**
 * virDomainSnapshotListChildrenNames:
 * @snapshot: a domain snapshot object
 * @names: array to collect the list of names of snapshots
 * @nameslen: size of @names
18687
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
18688 18689
 *
 * Collect the list of domain snapshots that are children of the given
18690 18691 18692
 * snapshot, and store their names in @names.  The value to use for
 * @nameslen can be determined by virDomainSnapshotNumChildren() with
 * the same @flags.
18693
 *
18694 18695 18696 18697 18698 18699 18700 18701 18702 18703 18704 18705
 * By default, this command covers only direct children; it is also possible
 * to expand things to cover all descendants, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_DESCENDANTS.  Also, some filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
18706
 *
18707 18708 18709
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
18710
 *
18711 18712 18713 18714
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
18715
 *
18716 18717 18718 18719 18720 18721 18722 18723 18724 18725
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18726
 * Returns the number of domain snapshots found or -1 in case of error.
18727 18728 18729 18730 18731 18732
 * Note that this command is inherently racy: another connection can
 * define a new snapshot between a call to virDomainSnapshotNumChildren()
 * and this call.  You are only guaranteed that all currently defined
 * snapshots were listed if the return is less than @nameslen.  Likewise,
 * you should be prepared for virDomainSnapshotLookupByName() to fail when
 * converting a name from this call into a snapshot object, if another
18733 18734 18735 18736
 * connection deletes the snapshot in the meantime.  For more control over
 * the results, see virDomainSnapshotListAllChildren().
 *
 * Returns the number of domain snapshots found or -1 in case of error.
J
John Ferlan 已提交
18737
 * The caller is responsible to call free() for each member of the array.
18738 18739 18740 18741 18742 18743 18744 18745 18746 18747 18748 18749 18750
 */
int
virDomainSnapshotListChildrenNames(virDomainSnapshotPtr snapshot,
                                   char **names, int nameslen,
                                   unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, names=%p, nameslen=%d, flags=%x",
              snapshot, names, nameslen, flags);

    virResetLastError();

18751
    virCheckDomainSnapshotReturn(snapshot, -1);
18752 18753
    conn = snapshot->domain->conn;

18754 18755
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(nameslen, error);
18756 18757 18758 18759 18760 18761

    if (conn->driver->domainSnapshotListChildrenNames) {
        int ret = conn->driver->domainSnapshotListChildrenNames(snapshot,
                                                                names,
                                                                nameslen,
                                                                flags);
18762 18763 18764 18765 18766
        if (ret < 0)
            goto error;
        return ret;
    }

18767
    virReportUnsupportedError();
18768
 error:
18769 18770 18771 18772
    virDispatchError(conn);
    return -1;
}

18773

18774 18775 18776 18777 18778 18779 18780 18781 18782 18783 18784 18785 18786 18787 18788 18789 18790 18791 18792 18793 18794 18795 18796 18797 18798 18799 18800 18801 18802 18803 18804 18805 18806 18807
/**
 * virDomainSnapshotListAllChildren:
 * @snapshot: a domain snapshot object
 * @snaps: pointer to variable to store the array containing snapshot objects,
 *         or NULL if the list is not required (just returns number of
 *         snapshots)
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
 *
 * Collect the list of domain snapshots that are children of the given
 * snapshot, and allocate an array to store those objects.  This API solves
 * the race inherent in virDomainSnapshotListChildrenNames().
 *
 * By default, this command covers only direct children; it is also possible
 * to expand things to cover all descendants, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_DESCENDANTS.  Also, some filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
 *
18808 18809 18810 18811 18812 18813 18814 18815 18816 18817
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18818 18819 18820 18821 18822 18823 18824 18825 18826 18827 18828 18829 18830 18831 18832 18833 18834 18835 18836 18837 18838
 * Returns the number of domain snapshots found or -1 and sets @snaps to
 * NULL in case of error.  On success, the array stored into @snaps is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virDomainSnapshotFree() on each array element, then calling
 * free() on @snaps.
 */
int
virDomainSnapshotListAllChildren(virDomainSnapshotPtr snapshot,
                                 virDomainSnapshotPtr **snaps,
                                 unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, snaps=%p, flags=%x", snapshot, snaps, flags);

    virResetLastError();

    if (snaps)
        *snaps = NULL;

18839
    virCheckDomainSnapshotReturn(snapshot, -1);
18840 18841 18842 18843 18844
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotListAllChildren) {
        int ret = conn->driver->domainSnapshotListAllChildren(snapshot, snaps,
                                                              flags);
18845 18846 18847 18848 18849
        if (ret < 0)
            goto error;
        return ret;
    }

18850
    virReportUnsupportedError();
18851
 error:
18852 18853 18854 18855
    virDispatchError(conn);
    return -1;
}

18856

C
Chris Lalancette 已提交
18857 18858 18859 18860
/**
 * virDomainSnapshotLookupByName:
 * @domain: a domain object
 * @name: name for the domain snapshot
18861
 * @flags: extra flags; not used yet, so callers should always pass 0
C
Chris Lalancette 已提交
18862 18863 18864 18865 18866 18867 18868 18869 18870 18871 18872 18873 18874
 *
 * Try to lookup a domain snapshot based on its name.
 *
 * Returns a domain snapshot object or NULL in case of failure.  If the
 * domain snapshot cannot be found, then the VIR_ERR_NO_DOMAIN_SNAPSHOT
 * error is raised.
 */
virDomainSnapshotPtr
virDomainSnapshotLookupByName(virDomainPtr domain,
                              const char *name,
                              unsigned int flags)
{
    virConnectPtr conn;
18875

18876
    VIR_DOMAIN_DEBUG(domain, "name=%s, flags=%x", name, flags);
C
Chris Lalancette 已提交
18877 18878 18879

    virResetLastError();

18880
    virCheckDomainReturn(domain, NULL);
C
Chris Lalancette 已提交
18881 18882
    conn = domain->conn;

18883
    virCheckNonNullArgGoto(name, error);
C
Chris Lalancette 已提交
18884 18885 18886 18887 18888 18889 18890 18891 18892

    if (conn->driver->domainSnapshotLookupByName) {
        virDomainSnapshotPtr dom;
        dom = conn->driver->domainSnapshotLookupByName(domain, name, flags);
        if (!dom)
            goto error;
        return dom;
    }

18893
    virReportUnsupportedError();
18894
 error:
C
Chris Lalancette 已提交
18895 18896 18897 18898
    virDispatchError(conn);
    return NULL;
}

18899

C
Chris Lalancette 已提交
18900 18901 18902
/**
 * virDomainHasCurrentSnapshot:
 * @domain: pointer to the domain object
18903
 * @flags: extra flags; not used yet, so callers should always pass 0
C
Chris Lalancette 已提交
18904 18905 18906 18907 18908 18909 18910 18911 18912
 *
 * Determine if the domain has a current snapshot.
 *
 * Returns 1 if such snapshot exists, 0 if it doesn't, -1 on error.
 */
int
virDomainHasCurrentSnapshot(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;
18913

18914
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
C
Chris Lalancette 已提交
18915 18916 18917

    virResetLastError();

18918
    virCheckDomainReturn(domain, -1);
C
Chris Lalancette 已提交
18919 18920 18921 18922 18923 18924 18925 18926 18927
    conn = domain->conn;

    if (conn->driver->domainHasCurrentSnapshot) {
        int ret = conn->driver->domainHasCurrentSnapshot(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18928
    virReportUnsupportedError();
18929
 error:
C
Chris Lalancette 已提交
18930 18931 18932 18933
    virDispatchError(conn);
    return -1;
}

18934

C
Chris Lalancette 已提交
18935 18936 18937
/**
 * virDomainSnapshotCurrent:
 * @domain: a domain object
18938
 * @flags: extra flags; not used yet, so callers should always pass 0
C
Chris Lalancette 已提交
18939 18940 18941 18942 18943 18944 18945 18946 18947 18948 18949 18950
 *
 * Get the current snapshot for a domain, if any.
 *
 * Returns a domain snapshot object or NULL in case of failure.  If the
 * current domain snapshot cannot be found, then the VIR_ERR_NO_DOMAIN_SNAPSHOT
 * error is raised.
 */
virDomainSnapshotPtr
virDomainSnapshotCurrent(virDomainPtr domain,
                         unsigned int flags)
{
    virConnectPtr conn;
18951

18952
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
C
Chris Lalancette 已提交
18953 18954 18955

    virResetLastError();

18956
    virCheckDomainReturn(domain, NULL);
C
Chris Lalancette 已提交
18957 18958 18959 18960 18961 18962 18963 18964 18965 18966
    conn = domain->conn;

    if (conn->driver->domainSnapshotCurrent) {
        virDomainSnapshotPtr snap;
        snap = conn->driver->domainSnapshotCurrent(domain, flags);
        if (!snap)
            goto error;
        return snap;
    }

18967
    virReportUnsupportedError();
18968
 error:
C
Chris Lalancette 已提交
18969 18970 18971 18972
    virDispatchError(conn);
    return NULL;
}

18973

18974 18975 18976
/**
 * virDomainSnapshotGetParent:
 * @snapshot: a snapshot object
18977
 * @flags: extra flags; not used yet, so callers should always pass 0
18978 18979 18980 18981 18982 18983 18984 18985 18986 18987 18988 18989 18990 18991 18992 18993 18994
 *
 * Get the parent snapshot for @snapshot, if any.
 *
 * Returns a domain snapshot object or NULL in case of failure.  If the
 * given snapshot is a root (no parent), then the VIR_ERR_NO_DOMAIN_SNAPSHOT
 * error is raised.
 */
virDomainSnapshotPtr
virDomainSnapshotGetParent(virDomainSnapshotPtr snapshot,
                           unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

18995
    virCheckDomainSnapshotReturn(snapshot, NULL);
18996 18997 18998 18999 19000 19001 19002 19003 19004 19005
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotGetParent) {
        virDomainSnapshotPtr snap;
        snap = conn->driver->domainSnapshotGetParent(snapshot, flags);
        if (!snap)
            goto error;
        return snap;
    }

19006
    virReportUnsupportedError();
19007
 error:
19008 19009 19010 19011
    virDispatchError(conn);
    return NULL;
}

19012

E
Eric Blake 已提交
19013 19014 19015 19016 19017 19018 19019 19020 19021 19022
/**
 * virDomainSnapshotIsCurrent:
 * @snapshot: a snapshot object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Determine if the given snapshot is the domain's current snapshot.  See
 * also virDomainHasCurrentSnapshot().
 *
 * Returns 1 if current, 0 if not current, or -1 on error.
 */
19023 19024 19025
int
virDomainSnapshotIsCurrent(virDomainSnapshotPtr snapshot,
                           unsigned int flags)
E
Eric Blake 已提交
19026 19027 19028 19029 19030 19031 19032
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

19033
    virCheckDomainSnapshotReturn(snapshot, -1);
E
Eric Blake 已提交
19034 19035 19036 19037 19038 19039 19040 19041 19042 19043
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotIsCurrent) {
        int ret;
        ret = conn->driver->domainSnapshotIsCurrent(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19044
    virReportUnsupportedError();
19045
 error:
E
Eric Blake 已提交
19046 19047 19048 19049
    virDispatchError(conn);
    return -1;
}

19050

E
Eric Blake 已提交
19051 19052 19053 19054 19055 19056 19057 19058 19059 19060 19061
/**
 * virDomainSnapshotHasMetadata:
 * @snapshot: a snapshot object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Determine if the given snapshot is associated with libvirt metadata
 * that would prevent the deletion of the domain.
 *
 * Returns 1 if the snapshot has metadata, 0 if the snapshot exists without
 * help from libvirt, or -1 on error.
 */
19062 19063 19064
int
virDomainSnapshotHasMetadata(virDomainSnapshotPtr snapshot,
                             unsigned int flags)
E
Eric Blake 已提交
19065 19066 19067 19068 19069 19070 19071
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

19072
    virCheckDomainSnapshotReturn(snapshot, -1);
E
Eric Blake 已提交
19073 19074 19075 19076 19077 19078 19079 19080 19081 19082
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotHasMetadata) {
        int ret;
        ret = conn->driver->domainSnapshotHasMetadata(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19083
    virReportUnsupportedError();
19084
 error:
E
Eric Blake 已提交
19085 19086 19087 19088
    virDispatchError(conn);
    return -1;
}

19089

C
Chris Lalancette 已提交
19090
/**
19091
 * virDomainRevertToSnapshot:
C
Chris Lalancette 已提交
19092
 * @snapshot: a domain snapshot object
19093
 * @flags: bitwise-OR of virDomainSnapshotRevertFlags
C
Chris Lalancette 已提交
19094 19095 19096
 *
 * Revert the domain to a given snapshot.
 *
19097 19098 19099 19100 19101 19102 19103 19104 19105 19106 19107 19108
 * Normally, the domain will revert to the same state the domain was
 * in while the snapshot was taken (whether inactive, running, or
 * paused), except that disk snapshots default to reverting to
 * inactive state.  Including VIR_DOMAIN_SNAPSHOT_REVERT_RUNNING in
 * @flags overrides the snapshot state to guarantee a running domain
 * after the revert; or including VIR_DOMAIN_SNAPSHOT_REVERT_PAUSED in
 * @flags guarantees a paused domain after the revert.  These two
 * flags are mutually exclusive.  While a persistent domain does not
 * need either flag, it is not possible to revert a transient domain
 * into an inactive state, so transient domains require the use of one
 * of these two flags.
 *
E
Eric Blake 已提交
19109 19110 19111 19112 19113 19114 19115 19116 19117 19118 19119 19120 19121 19122 19123 19124 19125 19126 19127 19128 19129 19130
 * Reverting to any snapshot discards all configuration changes made since
 * the last snapshot.  Additionally, reverting to a snapshot from a running
 * domain is a form of data loss, since it discards whatever is in the
 * guest's RAM at the time.  Since the very nature of keeping snapshots
 * implies the intent to roll back state, no additional confirmation is
 * normally required for these lossy effects.
 *
 * However, there are two particular situations where reverting will
 * be refused by default, and where @flags must include
 * VIR_DOMAIN_SNAPSHOT_REVERT_FORCE to acknowledge the risks.  1) Any
 * attempt to revert to a snapshot that lacks the metadata to perform
 * ABI compatibility checks (generally the case for snapshots that
 * lack a full <domain> when listed by virDomainSnapshotGetXMLDesc(),
 * such as those created prior to libvirt 0.9.5).  2) Any attempt to
 * revert a running domain to an active state that requires starting a
 * new hypervisor instance rather than reusing the existing hypervisor
 * (since this would terminate all connections to the domain, such as
 * such as VNC or Spice graphics) - this condition arises from active
 * snapshots that are provably ABI incomaptible, as well as from
 * inactive snapshots with a @flags request to start the domain after
 * the revert.
 *
C
Chris Lalancette 已提交
19131 19132 19133 19134 19135 19136 19137 19138
 * Returns 0 if the creation is successful, -1 on error.
 */
int
virDomainRevertToSnapshot(virDomainSnapshotPtr snapshot,
                          unsigned int flags)
{
    virConnectPtr conn;

19139
    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);
C
Chris Lalancette 已提交
19140 19141 19142

    virResetLastError();

19143
    virCheckDomainSnapshotReturn(snapshot, -1);
C
Chris Lalancette 已提交
19144
    conn = snapshot->domain->conn;
19145

19146
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
19147

19148 19149
    if ((flags & VIR_DOMAIN_SNAPSHOT_REVERT_RUNNING) &&
        (flags & VIR_DOMAIN_SNAPSHOT_REVERT_PAUSED)) {
19150
        virReportInvalidArg(flags,
19151 19152
                            _("running and paused flags in %s are mutually "
                              "exclusive"),
19153
                            __FUNCTION__);
19154 19155 19156
        goto error;
    }

C
Chris Lalancette 已提交
19157 19158 19159 19160 19161 19162 19163
    if (conn->driver->domainRevertToSnapshot) {
        int ret = conn->driver->domainRevertToSnapshot(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19164
    virReportUnsupportedError();
19165
 error:
C
Chris Lalancette 已提交
19166 19167 19168 19169
    virDispatchError(conn);
    return -1;
}

19170

C
Chris Lalancette 已提交
19171
/**
19172
 * virDomainSnapshotDelete:
C
Chris Lalancette 已提交
19173
 * @snapshot: a domain snapshot object
19174
 * @flags: bitwise-OR of supported virDomainSnapshotDeleteFlags
C
Chris Lalancette 已提交
19175 19176 19177
 *
 * Delete the snapshot.
 *
19178 19179 19180 19181 19182 19183 19184 19185 19186 19187 19188 19189 19190
 * If @flags is 0, then just this snapshot is deleted, and changes
 * from this snapshot are automatically merged into children
 * snapshots.  If @flags includes VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN,
 * then this snapshot and any descendant snapshots are deleted.  If
 * @flags includes VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN_ONLY, then any
 * descendant snapshots are deleted, but this snapshot remains.  These
 * two flags are mutually exclusive.
 *
 * If @flags includes VIR_DOMAIN_SNAPSHOT_DELETE_METADATA_ONLY, then
 * any snapshot metadata tracked by libvirt is removed while keeping
 * the snapshot contents intact; if a hypervisor does not require any
 * libvirt metadata to track snapshots, then this flag is silently
 * ignored.
C
Chris Lalancette 已提交
19191
 *
19192 19193
 * Returns 0 if the selected snapshot(s) were successfully deleted,
 * -1 on error.
C
Chris Lalancette 已提交
19194 19195 19196 19197 19198 19199 19200
 */
int
virDomainSnapshotDelete(virDomainSnapshotPtr snapshot,
                        unsigned int flags)
{
    virConnectPtr conn;

19201
    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);
C
Chris Lalancette 已提交
19202 19203 19204

    virResetLastError();

19205
    virCheckDomainSnapshotReturn(snapshot, -1);
C
Chris Lalancette 已提交
19206
    conn = snapshot->domain->conn;
19207

19208
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
19209

19210 19211
    if ((flags & VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN) &&
        (flags & VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN_ONLY)) {
19212 19213 19214 19215
        virReportInvalidArg(flags,
                            _("children and children_only flags in %s are "
                              "mutually exclusive"),
                            __FUNCTION__);
19216 19217 19218
        goto error;
    }

C
Chris Lalancette 已提交
19219 19220 19221 19222 19223 19224 19225
    if (conn->driver->domainSnapshotDelete) {
        int ret = conn->driver->domainSnapshotDelete(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19226
    virReportUnsupportedError();
19227
 error:
C
Chris Lalancette 已提交
19228 19229 19230 19231
    virDispatchError(conn);
    return -1;
}

19232

19233 19234 19235 19236 19237 19238 19239 19240 19241 19242 19243 19244 19245 19246 19247 19248 19249 19250 19251 19252
/**
 * virDomainSnapshotRef:
 * @snapshot: the snapshot to hold a reference on
 *
 * Increment the reference count on the snapshot. For each
 * additional call to this method, there shall be a corresponding
 * call to virDomainSnapshotFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection and domain remain open until all threads have finished
 * using the snapshot. ie, each new thread using a snapshot would
 * increment the reference count.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSnapshotRef(virDomainSnapshotPtr snapshot)
{
19253 19254 19255
    VIR_DEBUG("snapshot=%p, refs=%d", snapshot,
              snapshot ? snapshot->object.u.s.refs : 0);

19256 19257
    virResetLastError();

19258 19259
    virCheckDomainSnapshotReturn(snapshot, -1);

19260
    virObjectRef(snapshot);
19261 19262 19263
    return 0;
}

19264

C
Chris Lalancette 已提交
19265 19266 19267 19268 19269 19270 19271 19272 19273 19274 19275 19276
/**
 * virDomainSnapshotFree:
 * @snapshot: a domain snapshot object
 *
 * Free the domain snapshot object.  The snapshot itself is not modified.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSnapshotFree(virDomainSnapshotPtr snapshot)
{
19277
    VIR_DEBUG("snapshot=%p", snapshot);
C
Chris Lalancette 已提交
19278 19279 19280

    virResetLastError();

19281 19282
    virCheckDomainSnapshotReturn(snapshot, -1);

19283
    virObjectUnref(snapshot);
C
Chris Lalancette 已提交
19284 19285
    return 0;
}
19286

19287

19288 19289 19290
/**
 * virDomainOpenConsole:
 * @dom: a domain object
19291
 * @dev_name: the console, serial or parallel port device alias, or NULL
19292
 * @st: a stream to associate with the console
19293
 * @flags: bitwise-OR of virDomainConsoleFlags
19294 19295 19296
 *
 * This opens the backend associated with a console, serial or
 * parallel port device on a guest, if the backend is supported.
19297
 * If the @dev_name is omitted, then the first console or serial
19298 19299 19300 19301
 * device is opened. The console is associated with the passed
 * in @st stream, which should have been opened in non-blocking
 * mode for bi-directional I/O.
 *
19302 19303 19304 19305 19306 19307 19308 19309 19310 19311 19312 19313 19314 19315 19316
 * By default, when @flags is 0, the open will fail if libvirt
 * detects that the console is already in use by another client;
 * passing VIR_DOMAIN_CONSOLE_FORCE will cause libvirt to forcefully
 * remove the other client prior to opening this console.
 *
 * If flag VIR_DOMAIN_CONSOLE_SAFE the console is opened only in the
 * case where the hypervisor driver supports safe (mutually exclusive)
 * console handling.
 *
 * Older servers did not support either flag, and also did not forbid
 * simultaneous clients on a console, with potentially confusing results.
 * When passing @flags of 0 in order to support a wider range of server
 * versions, it is up to the client to ensure mutual exclusion.
 *
 * Returns 0 if the console was opened, -1 on error
19317
 */
19318 19319 19320 19321 19322
int
virDomainOpenConsole(virDomainPtr dom,
                     const char *dev_name,
                     virStreamPtr st,
                     unsigned int flags)
19323 19324
{
    virConnectPtr conn;
19325

19326 19327
    VIR_DOMAIN_DEBUG(dom, "dev_name=%s, st=%p, flags=%x",
                     NULLSTR(dev_name), st, flags);
19328 19329 19330

    virResetLastError();

19331
    virCheckDomainReturn(dom, -1);
19332
    conn = dom->conn;
19333

19334
    virCheckStreamGoto(st, error);
19335
    virCheckReadOnlyGoto(conn->flags, error);
19336

19337 19338 19339 19340 19341 19342 19343
    if (conn != st->conn) {
        virReportInvalidArg(st,
                            _("stream in %s must match connection of domain '%s'"),
                            __FUNCTION__, dom->name);
        goto error;
    }

19344 19345
    if (conn->driver->domainOpenConsole) {
        int ret;
19346
        ret = conn->driver->domainOpenConsole(dom, dev_name, st, flags);
19347 19348 19349 19350 19351
        if (ret < 0)
            goto error;
        return ret;
    }

19352
    virReportUnsupportedError();
19353

19354
 error:
19355 19356 19357
    virDispatchError(conn);
    return -1;
}
19358

19359

19360 19361 19362 19363 19364 19365 19366 19367 19368 19369 19370 19371 19372 19373 19374 19375 19376 19377 19378 19379 19380 19381
/**
 * virDomainOpenChannel:
 * @dom: a domain object
 * @name: the channel name, or NULL
 * @st: a stream to associate with the channel
 * @flags: bitwise-OR of virDomainChannelFlags
 *
 * This opens the host interface associated with a channel device on a
 * guest, if the host interface is supported.  If @name is given, it
 * can match either the device alias (e.g. "channel0"), or the virtio
 * target name (e.g. "org.qemu.guest_agent.0").  If @name is omitted,
 * then the first channel is opened. The channel is associated with
 * the passed in @st stream, which should have been opened in
 * non-blocking mode for bi-directional I/O.
 *
 * By default, when @flags is 0, the open will fail if libvirt detects
 * that the channel is already in use by another client; passing
 * VIR_DOMAIN_CHANNEL_FORCE will cause libvirt to forcefully remove the
 * other client prior to opening this channel.
 *
 * Returns 0 if the channel was opened, -1 on error
 */
19382 19383 19384 19385 19386
int
virDomainOpenChannel(virDomainPtr dom,
                     const char *name,
                     virStreamPtr st,
                     unsigned int flags)
19387 19388 19389 19390 19391 19392 19393 19394
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "name=%s, st=%p, flags=%x",
                     NULLSTR(name), st, flags);

    virResetLastError();

19395
    virCheckDomainReturn(dom, -1);
19396
    conn = dom->conn;
19397

19398
    virCheckStreamGoto(st, error);
19399
    virCheckReadOnlyGoto(conn->flags, error);
19400

19401 19402 19403 19404 19405 19406 19407
    if (conn != st->conn) {
        virReportInvalidArg(st,
                            _("stream in %s must match connection of domain '%s'"),
                            __FUNCTION__, dom->name);
        goto error;
    }

19408 19409 19410 19411 19412 19413 19414 19415
    if (conn->driver->domainOpenChannel) {
        int ret;
        ret = conn->driver->domainOpenChannel(dom, name, st, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19416
    virReportUnsupportedError();
19417

19418
 error:
19419 19420 19421 19422
    virDispatchError(conn);
    return -1;
}

19423

19424 19425 19426
/**
 * virDomainBlockJobAbort:
 * @dom: pointer to domain object
19427
 * @disk: path to the block device, or device shorthand
19428
 * @flags: bitwise-OR of virDomainBlockJobAbortFlags
19429 19430 19431
 *
 * Cancel the active block job on the given disk.
 *
19432
 * The @disk parameter is either an unambiguous source name of the
19433 19434 19435 19436 19437 19438
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
E
Eric Blake 已提交
19439 19440
 * If the current block job for @disk is VIR_DOMAIN_BLOCK_JOB_TYPE_PULL, then
 * by default, this function performs a synchronous operation and the caller
19441 19442 19443 19444 19445 19446 19447 19448
 * may assume that the operation has completed when 0 is returned.  However,
 * BlockJob operations may take a long time to cancel, and during this time
 * further domain interactions may be unresponsive.  To avoid this problem,
 * pass VIR_DOMAIN_BLOCK_JOB_ABORT_ASYNC in the @flags argument to enable
 * asynchronous behavior, returning as soon as possible.  When the job has
 * been canceled, a BlockJob event will be emitted, with status
 * VIR_DOMAIN_BLOCK_JOB_CANCELED (even if the ABORT_ASYNC flag was not
 * used); it is also possible to poll virDomainBlockJobInfo() to see if
E
Eric Blake 已提交
19449 19450 19451 19452 19453 19454 19455 19456 19457 19458 19459 19460
 * the job cancellation is still pending.  This type of job can be restarted
 * to pick up from where it left off.
 *
 * If the current block job for @disk is VIR_DOMAIN_BLOCK_JOB_TYPE_COPY, then
 * the default is to abort the mirroring and revert to the source disk;
 * adding @flags of VIR_DOMAIN_BLOCK_JOB_ABORT_PIVOT causes this call to
 * fail with VIR_ERR_BLOCK_COPY_ACTIVE if the copy is not fully populated,
 * otherwise it will swap the disk over to the copy to end the mirroring.  An
 * event will be issued when the job is ended, and it is possible to use
 * VIR_DOMAIN_BLOCK_JOB_ABORT_ASYNC to control whether this command waits
 * for the completion of the job.  Restarting this job requires starting
 * over from the beginning of the first phase.
19461
 *
19462 19463
 * Returns -1 in case of failure, 0 when successful.
 */
19464 19465 19466
int
virDomainBlockJobAbort(virDomainPtr dom, const char *disk,
                       unsigned int flags)
19467 19468 19469
{
    virConnectPtr conn;

19470
    VIR_DOMAIN_DEBUG(dom, "disk=%s, flags=%x", disk, flags);
19471 19472 19473

    virResetLastError();

19474
    virCheckDomainReturn(dom, -1);
19475 19476
    conn = dom->conn;

19477
    virCheckReadOnlyGoto(conn->flags, error);
19478
    virCheckNonNullArgGoto(disk, error);
19479 19480 19481

    if (conn->driver->domainBlockJobAbort) {
        int ret;
19482
        ret = conn->driver->domainBlockJobAbort(dom, disk, flags);
19483 19484 19485 19486 19487
        if (ret < 0)
            goto error;
        return ret;
    }

19488
    virReportUnsupportedError();
19489

19490
 error:
19491 19492 19493 19494
    virDispatchError(dom->conn);
    return -1;
}

19495

19496 19497 19498
/**
 * virDomainGetBlockJobInfo:
 * @dom: pointer to domain object
19499
 * @disk: path to the block device, or device shorthand
19500
 * @info: pointer to a virDomainBlockJobInfo structure
19501
 * @flags: extra flags; not used yet, so callers should always pass 0
19502 19503 19504 19505
 *
 * Request block job information for the given disk.  If an operation is active
 * @info will be updated with the current progress.
 *
19506
 * The @disk parameter is either an unambiguous source name of the
19507 19508 19509 19510 19511 19512
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19513 19514
 * Returns -1 in case of failure, 0 when nothing found, 1 when info was found.
 */
19515 19516 19517
int
virDomainGetBlockJobInfo(virDomainPtr dom, const char *disk,
                         virDomainBlockJobInfoPtr info, unsigned int flags)
19518 19519 19520
{
    virConnectPtr conn;

19521
    VIR_DOMAIN_DEBUG(dom, "disk=%s, info=%p, flags=%x", disk, info, flags);
19522 19523 19524

    virResetLastError();

19525 19526 19527
    if (info)
        memset(info, 0, sizeof(*info));

19528
    virCheckDomainReturn(dom, -1);
19529 19530
    conn = dom->conn;

19531 19532
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(info, error);
19533 19534 19535

    if (conn->driver->domainGetBlockJobInfo) {
        int ret;
19536
        ret = conn->driver->domainGetBlockJobInfo(dom, disk, info, flags);
19537 19538 19539 19540 19541
        if (ret < 0)
            goto error;
        return ret;
    }

19542
    virReportUnsupportedError();
19543

19544
 error:
19545 19546 19547 19548
    virDispatchError(dom->conn);
    return -1;
}

19549

19550 19551 19552
/**
 * virDomainBlockJobSetSpeed:
 * @dom: pointer to domain object
19553
 * @disk: path to the block device, or device shorthand
19554
 * @bandwidth: specify bandwidth limit in MiB/s
19555
 * @flags: extra flags; not used yet, so callers should always pass 0
19556 19557 19558 19559
 *
 * Set the maximimum allowable bandwidth that a block job may consume.  If
 * bandwidth is 0, the limit will revert to the hypervisor default.
 *
19560
 * The @disk parameter is either an unambiguous source name of the
19561 19562 19563 19564 19565 19566
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19567 19568
 * Returns -1 in case of failure, 0 when successful.
 */
19569 19570 19571
int
virDomainBlockJobSetSpeed(virDomainPtr dom, const char *disk,
                          unsigned long bandwidth, unsigned int flags)
19572 19573 19574
{
    virConnectPtr conn;

19575
    VIR_DOMAIN_DEBUG(dom, "disk=%s, bandwidth=%lu, flags=%x",
19576
                     disk, bandwidth, flags);
19577 19578 19579

    virResetLastError();

19580
    virCheckDomainReturn(dom, -1);
19581 19582
    conn = dom->conn;

19583
    virCheckReadOnlyGoto(conn->flags, error);
19584
    virCheckNonNullArgGoto(disk, error);
19585 19586 19587

    if (conn->driver->domainBlockJobSetSpeed) {
        int ret;
19588
        ret = conn->driver->domainBlockJobSetSpeed(dom, disk, bandwidth, flags);
19589 19590 19591 19592 19593
        if (ret < 0)
            goto error;
        return ret;
    }

19594
    virReportUnsupportedError();
19595

19596
 error:
19597 19598 19599 19600
    virDispatchError(dom->conn);
    return -1;
}

19601

19602 19603 19604
/**
 * virDomainBlockPull:
 * @dom: pointer to domain object
19605
 * @disk: path to the block device, or device shorthand
19606
 * @bandwidth: (optional) specify copy bandwidth limit in MiB/s
19607
 * @flags: extra flags; not used yet, so callers should always pass 0
19608 19609 19610 19611 19612 19613
 *
 * Populate a disk image with data from its backing image.  Once all data from
 * its backing image has been pulled, the disk no longer depends on a backing
 * image.  This function pulls data for the entire device in the background.
 * Progress of the operation can be checked with virDomainGetBlockJobInfo() and
 * the operation can be aborted with virDomainBlockJobAbort().  When finished,
E
Eric Blake 已提交
19614 19615
 * an asynchronous event is raised to indicate the final status.  To move
 * data in the opposite direction, see virDomainBlockCommit().
19616
 *
19617
 * The @disk parameter is either an unambiguous source name of the
19618 19619 19620 19621 19622 19623
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19624
 * The maximum bandwidth (in MiB/s) that will be used to do the copy can be
19625 19626
 * specified with the bandwidth parameter.  If set to 0, libvirt will choose a
 * suitable default.  Some hypervisors do not support this feature and will
19627 19628 19629
 * return an error if bandwidth is not 0; in this case, it might still be
 * possible for a later call to virDomainBlockJobSetSpeed() to succeed.
 * The actual speed can be determined with virDomainGetBlockJobInfo().
19630
 *
19631 19632
 * This is shorthand for virDomainBlockRebase() with a NULL base.
 *
19633 19634
 * Returns 0 if the operation has started, -1 on failure.
 */
19635 19636 19637
int
virDomainBlockPull(virDomainPtr dom, const char *disk,
                   unsigned long bandwidth, unsigned int flags)
19638 19639 19640
{
    virConnectPtr conn;

19641
    VIR_DOMAIN_DEBUG(dom, "disk=%s, bandwidth=%lu, flags=%x",
19642
                     disk, bandwidth, flags);
19643 19644 19645

    virResetLastError();

19646
    virCheckDomainReturn(dom, -1);
19647 19648
    conn = dom->conn;

19649
    virCheckReadOnlyGoto(conn->flags, error);
19650
    virCheckNonNullArgGoto(disk, error);
19651 19652 19653

    if (conn->driver->domainBlockPull) {
        int ret;
19654
        ret = conn->driver->domainBlockPull(dom, disk, bandwidth, flags);
19655 19656 19657 19658 19659
        if (ret < 0)
            goto error;
        return ret;
    }

19660
    virReportUnsupportedError();
19661

19662
 error:
19663 19664 19665
    virDispatchError(dom->conn);
    return -1;
}
19666 19667


19668 19669 19670 19671
/**
 * virDomainBlockRebase:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
19672 19673
 * @base: path to backing file to keep, or device shorthand,
 *        or NULL for no backing file
19674
 * @bandwidth: (optional) specify copy bandwidth limit in MiB/s
E
Eric Blake 已提交
19675
 * @flags: bitwise-OR of virDomainBlockRebaseFlags
19676 19677
 *
 * Populate a disk image with data from its backing image chain, and
E
Eric Blake 已提交
19678 19679 19680 19681
 * setting the backing image to @base, or alternatively copy an entire
 * backing chain to a new file @base.
 *
 * When @flags is 0, this starts a pull, where @base must be the absolute
19682 19683 19684 19685 19686
 * path of one of the backing images further up the chain, or NULL to
 * convert the disk image so that it has no backing image.  Once all
 * data from its backing image chain has been pulled, the disk no
 * longer depends on those intermediate backing images.  This function
 * pulls data for the entire device in the background.  Progress of
E
Eric Blake 已提交
19687 19688 19689 19690 19691 19692 19693 19694 19695 19696 19697 19698 19699 19700 19701 19702 19703 19704 19705 19706 19707 19708 19709 19710 19711 19712 19713 19714 19715 19716 19717 19718
 * the operation can be checked with virDomainGetBlockJobInfo() with a
 * job type of VIR_DOMAIN_BLOCK_JOB_TYPE_PULL, and the operation can be
 * aborted with virDomainBlockJobAbort().  When finished, an asynchronous
 * event is raised to indicate the final status, and the job no longer
 * exists.  If the job is aborted, a new one can be started later to
 * resume from the same point.
 *
 * When @flags includes VIR_DOMAIN_BLOCK_REBASE_COPY, this starts a copy,
 * where @base must be the name of a new file to copy the chain to.  By
 * default, the copy will pull the entire source chain into the destination
 * file, but if @flags also contains VIR_DOMAIN_BLOCK_REBASE_SHALLOW, then
 * only the top of the source chain will be copied (the source and
 * destination have a common backing file).  By default, @base will be
 * created with the same file format as the source, but this can be altered
 * by adding VIR_DOMAIN_BLOCK_REBASE_COPY_RAW to force the copy to be raw
 * (does not make sense with the shallow flag unless the source is also raw),
 * or by using VIR_DOMAIN_BLOCK_REBASE_REUSE_EXT to reuse an existing file
 * with initial contents identical to the backing file of the source (this
 * allows a management app to pre-create files with relative backing file
 * names, rather than the default of absolute backing file names; as a
 * security precaution, you should generally only use reuse_ext with the
 * shallow flag and a non-raw destination file).
 *
 * A copy job has two parts; in the first phase, the @bandwidth parameter
 * affects how fast the source is pulled into the destination, and the job
 * can only be canceled by reverting to the source file; progress in this
 * phase can be tracked via the virDomainBlockJobInfo() command, with a
 * job type of VIR_DOMAIN_BLOCK_JOB_TYPE_COPY.  The job transitions to the
 * second phase when the job info states cur == end, and remains alive to
 * mirror all further changes to both source and destination.  The user
 * must call virDomainBlockJobAbort() to end the mirroring while choosing
 * whether to revert to source or pivot to the destination.  An event is
19719 19720 19721 19722
 * issued when the job ends, and depending on the hypervisor, an event may
 * also be issued when the job transitions from pulling to mirroring.  If
 * the job is aborted, a new job will have to start over from the beginning
 * of the first phase.
E
Eric Blake 已提交
19723 19724 19725 19726
 *
 * Some hypervisors will restrict certain actions, such as virDomainSave()
 * or virDomainDetachDevice(), while a copy job is active; they may
 * also restrict a copy job to transient domains.
19727 19728 19729 19730 19731 19732 19733 19734
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the
 * <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19735 19736 19737 19738 19739 19740 19741 19742
 * The @base parameter can be either a path to a file within the backing
 * chain, or the device target shorthand (the <target dev='...'/>
 * sub-element, such as "vda") followed by an index to the backing chain
 * enclosed in square brackets. Backing chain indexes can be found by
 * inspecting //disk//backingStore/@index in the domain XML. Thus, for
 * example, "vda[3]" refers to the backing store with index equal to "3"
 * in the chain of disk "vda".
 *
19743
 * The maximum bandwidth (in MiB/s) that will be used to do the copy can be
19744 19745
 * specified with the bandwidth parameter.  If set to 0, libvirt will choose a
 * suitable default.  Some hypervisors do not support this feature and will
19746 19747 19748
 * return an error if bandwidth is not 0; in this case, it might still be
 * possible for a later call to virDomainBlockJobSetSpeed() to succeed.
 * The actual speed can be determined with virDomainGetBlockJobInfo().
19749
 *
E
Eric Blake 已提交
19750 19751
 * When @base is NULL and @flags is 0, this is identical to
 * virDomainBlockPull().
19752 19753 19754
 *
 * Returns 0 if the operation has started, -1 on failure.
 */
19755 19756 19757 19758
int
virDomainBlockRebase(virDomainPtr dom, const char *disk,
                     const char *base, unsigned long bandwidth,
                     unsigned int flags)
19759 19760 19761
{
    virConnectPtr conn;

E
Eric Blake 已提交
19762
    VIR_DOMAIN_DEBUG(dom, "disk=%s, base=%s, bandwidth=%lu, flags=%x",
19763 19764 19765 19766
                     disk, NULLSTR(base), bandwidth, flags);

    virResetLastError();

19767
    virCheckDomainReturn(dom, -1);
19768 19769
    conn = dom->conn;

19770
    virCheckReadOnlyGoto(conn->flags, error);
19771
    virCheckNonNullArgGoto(disk, error);
19772

E
Eric Blake 已提交
19773
    if (flags & VIR_DOMAIN_BLOCK_REBASE_COPY) {
19774
        virCheckNonNullArgGoto(base, error);
E
Eric Blake 已提交
19775 19776 19777
    } else if (flags & (VIR_DOMAIN_BLOCK_REBASE_SHALLOW |
                        VIR_DOMAIN_BLOCK_REBASE_REUSE_EXT |
                        VIR_DOMAIN_BLOCK_REBASE_COPY_RAW)) {
19778 19779 19780
        virReportInvalidArg(flags,
                            _("use of flags in %s requires a copy job"),
                            __FUNCTION__);
E
Eric Blake 已提交
19781 19782 19783
        goto error;
    }

19784 19785 19786 19787 19788 19789 19790 19791 19792
    if (conn->driver->domainBlockRebase) {
        int ret;
        ret = conn->driver->domainBlockRebase(dom, disk, base, bandwidth,
                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19793
    virReportUnsupportedError();
19794

19795
 error:
19796 19797 19798 19799 19800
    virDispatchError(dom->conn);
    return -1;
}


E
Eric Blake 已提交
19801 19802 19803 19804
/**
 * virDomainBlockCommit:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
19805 19806
 * @base: path to backing file to merge into, or device shorthand,
 *        or NULL for default
E
Eric Blake 已提交
19807
 * @top: path to file within backing chain that contains data to be merged,
19808
 *       or device shorthand, or NULL to merge all possible data
E
Eric Blake 已提交
19809 19810 19811 19812 19813 19814 19815 19816 19817 19818 19819 19820 19821 19822 19823 19824 19825 19826 19827 19828 19829 19830 19831 19832 19833 19834 19835 19836 19837 19838 19839 19840 19841 19842 19843 19844 19845 19846 19847 19848 19849 19850 19851 19852 19853 19854 19855 19856 19857
 * @bandwidth: (optional) specify commit bandwidth limit in MiB/s
 * @flags: bitwise-OR of virDomainBlockCommitFlags
 *
 * Commit changes that were made to temporary top-level files within a disk
 * image backing file chain into a lower-level base file.  In other words,
 * take all the difference between @base and @top, and update @base to contain
 * that difference; after the commit, any portion of the chain that previously
 * depended on @top will now depend on @base, and all files after @base up
 * to and including @top will now be invalidated.  A typical use of this
 * command is to reduce the length of a backing file chain after taking an
 * external disk snapshot.  To move data in the opposite direction, see
 * virDomainBlockPull().
 *
 * This command starts a long-running commit block job, whose status may
 * be tracked by virDomainBlockJobInfo() with a job type of
 * VIR_DOMAIN_BLOCK_JOB_TYPE_COMMIT, and the operation can be aborted with
 * virDomainBlockJobAbort().  When finished, an asynchronous event is
 * raised to indicate the final status, and the job no longer exists.  If
 * the job is aborted, it is up to the hypervisor whether starting a new
 * job will resume from the same point, or start over.
 *
 * Be aware that this command may invalidate files even if it is aborted;
 * the user is cautioned against relying on the contents of invalidated
 * intermediate files such as @top without manually rebasing those files
 * to use a backing file of a read-only copy of @base prior to the point
 * where the commit operation was started (although such a rebase cannot
 * be safely done until the commit has successfully completed).  However,
 * the domain itself will not have any issues; the active layer remains
 * valid throughout the entire commit operation.  As a convenience,
 * if @flags contains VIR_DOMAIN_BLOCK_COMMIT_DELETE, this command will
 * unlink all files that were invalidated, after the commit successfully
 * completes.
 *
 * By default, if @base is NULL, the commit target will be the bottom of
 * the backing chain; if @flags contains VIR_DOMAIN_BLOCK_COMMIT_SHALLOW,
 * then the immediate backing file of @top will be used instead.  If @top
 * is NULL, the active image at the top of the chain will be used.  Some
 * hypervisors place restrictions on how much can be committed, and might
 * fail if @base is not the immediate backing file of @top, or if @top is
 * the active layer in use by a running domain, or if @top is not the
 * top-most file; restrictions may differ for online vs. offline domains.
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the
 * <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19858 19859 19860 19861 19862 19863 19864 19865
 * The @base and @top parameters can be either paths to files within the
 * backing chain, or the device target shorthand (the <target dev='...'/>
 * sub-element, such as "vda") followed by an index to the backing chain
 * enclosed in square brackets. Backing chain indexes can be found by
 * inspecting //disk//backingStore/@index in the domain XML. Thus, for
 * example, "vda[3]" refers to the backing store with index equal to "3"
 * in the chain of disk "vda".
 *
E
Eric Blake 已提交
19866 19867 19868 19869 19870 19871 19872 19873 19874
 * The maximum bandwidth (in MiB/s) that will be used to do the commit can be
 * specified with the bandwidth parameter.  If set to 0, libvirt will choose a
 * suitable default.  Some hypervisors do not support this feature and will
 * return an error if bandwidth is not 0; in this case, it might still be
 * possible for a later call to virDomainBlockJobSetSpeed() to succeed.
 * The actual speed can be determined with virDomainGetBlockJobInfo().
 *
 * Returns 0 if the operation has started, -1 on failure.
 */
19875 19876 19877 19878
int
virDomainBlockCommit(virDomainPtr dom, const char *disk,
                     const char *base, const char *top,
                     unsigned long bandwidth, unsigned int flags)
E
Eric Blake 已提交
19879 19880 19881 19882 19883 19884 19885 19886
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "disk=%s, base=%s, top=%s, bandwidth=%lu, flags=%x",
                     disk, NULLSTR(base), NULLSTR(top), bandwidth, flags);

    virResetLastError();

19887
    virCheckDomainReturn(dom, -1);
E
Eric Blake 已提交
19888 19889
    conn = dom->conn;

19890
    virCheckReadOnlyGoto(conn->flags, error);
E
Eric Blake 已提交
19891 19892 19893 19894 19895 19896 19897 19898 19899 19900 19901
    virCheckNonNullArgGoto(disk, error);

    if (conn->driver->domainBlockCommit) {
        int ret;
        ret = conn->driver->domainBlockCommit(dom, disk, base, top, bandwidth,
                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19902
    virReportUnsupportedError();
E
Eric Blake 已提交
19903

19904
 error:
E
Eric Blake 已提交
19905 19906 19907 19908 19909
    virDispatchError(dom->conn);
    return -1;
}


19910 19911 19912 19913 19914
/**
 * virDomainOpenGraphics:
 * @dom: pointer to domain object
 * @idx: index of graphics config to open
 * @fd: file descriptor to attach graphics to
19915
 * @flags: bitwise-OR of virDomainOpenGraphicsFlags
19916 19917 19918 19919 19920 19921 19922 19923 19924 19925 19926 19927 19928 19929 19930 19931 19932 19933
 *
 * This will attempt to connect the file descriptor @fd, to
 * the graphics backend of @dom. If @dom has multiple graphics
 * backends configured, then @idx will determine which one is
 * opened, starting from @idx 0.
 *
 * To disable any authentication, pass the VIR_DOMAIN_OPEN_GRAPHICS_SKIPAUTH
 * constant for @flags.
 *
 * The caller should use an anonymous socketpair to open
 * @fd before invocation.
 *
 * This method can only be used when connected to a local
 * libvirt hypervisor, over a UNIX domain socket. Attempts
 * to use this method over a TCP connection will always fail
 *
 * Returns 0 on success, -1 on failure
 */
19934 19935 19936 19937 19938
int
virDomainOpenGraphics(virDomainPtr dom,
                      unsigned int idx,
                      int fd,
                      unsigned int flags)
19939 19940 19941 19942 19943 19944 19945
{
    struct stat sb;
    VIR_DOMAIN_DEBUG(dom, "idx=%u, fd=%d, flags=%x",
                     idx, fd, flags);

    virResetLastError();

19946
    virCheckDomainReturn(dom, -1);
19947
    virCheckNonNegativeArgGoto(fd, error);
19948 19949 19950 19951 19952 19953 19954 19955

    if (fstat(fd, &sb) < 0) {
        virReportSystemError(errno,
                             _("Unable to access file descriptor %d"), fd);
        goto error;
    }

    if (!S_ISSOCK(sb.st_mode)) {
19956 19957 19958
        virReportInvalidArg(fd,
                          _("fd %d in %s must be a socket"),
                            fd, __FUNCTION__);
19959 19960 19961
        goto error;
    }

19962
    virCheckReadOnlyGoto(dom->conn->flags, error);
19963 19964 19965

    if (!VIR_DRV_SUPPORTS_FEATURE(dom->conn->driver, dom->conn,
                                  VIR_DRV_FEATURE_FD_PASSING)) {
19966 19967
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("fd passing is not supported by this connection"));
19968 19969 19970 19971 19972 19973 19974 19975 19976 19977 19978
        goto error;
    }

    if (dom->conn->driver->domainOpenGraphics) {
        int ret;
        ret = dom->conn->driver->domainOpenGraphics(dom, idx, fd, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19979
    virReportUnsupportedError();
19980

19981
 error:
19982 19983 19984
    virDispatchError(dom->conn);
    return -1;
}
J
Jiri Denemark 已提交
19985 19986 19987 19988 19989 19990 19991 19992


/**
 * virConnectSetKeepAlive:
 * @conn: pointer to a hypervisor connection
 * @interval: number of seconds of inactivity before a keepalive message is sent
 * @count: number of messages that can be sent in a row
 *
E
Eric Blake 已提交
19993
 * Start sending keepalive messages after @interval seconds of inactivity and
J
Jiri Denemark 已提交
19994
 * consider the connection to be broken when no response is received after
E
Eric Blake 已提交
19995 19996 19997 19998 19999 20000 20001 20002 20003 20004
 * @count keepalive messages sent in a row.  In other words, sending count + 1
 * keepalive message results in closing the connection.  When @interval is
 * <= 0, no keepalive messages will be sent.  When @count is 0, the connection
 * will be automatically closed after @interval seconds of inactivity without
 * sending any keepalive messages.
 *
 * Note: The client has to implement and run an event loop with
 * virEventRegisterImpl() or virEventRegisterDefaultImpl() to be able to
 * use keepalive messages.  Failure to do so may result in connections
 * being closed unexpectedly.
J
Jiri Denemark 已提交
20005
 *
20006 20007 20008 20009
 * Note: This API function controls only keepalive messages sent by the client.
 * If the server is configured to use keepalive you still need to run the event
 * loop to respond to them, even if you disable keepalives by this function.
 *
J
Jiri Denemark 已提交
20010 20011 20012
 * Returns -1 on error, 0 on success, 1 when remote party doesn't support
 * keepalive messages.
 */
20013 20014 20015 20016
int
virConnectSetKeepAlive(virConnectPtr conn,
                       int interval,
                       unsigned int count)
J
Jiri Denemark 已提交
20017 20018 20019 20020 20021 20022 20023
{
    int ret = -1;

    VIR_DEBUG("conn=%p, interval=%d, count=%u", conn, interval, count);

    virResetLastError();

20024
    virCheckConnectReturn(conn, -1);
J
Jiri Denemark 已提交
20025

20026 20027
    if (conn->driver->connectSetKeepAlive) {
        ret = conn->driver->connectSetKeepAlive(conn, interval, count);
J
Jiri Denemark 已提交
20028 20029 20030 20031 20032
        if (ret < 0)
            goto error;
        return ret;
    }

20033
    virReportUnsupportedError();
J
Jiri Denemark 已提交
20034

20035
 error:
J
Jiri Denemark 已提交
20036 20037 20038
    virDispatchError(conn);
    return -1;
}
J
Jiri Denemark 已提交
20039

20040

J
Jiri Denemark 已提交
20041 20042 20043 20044 20045 20046 20047 20048 20049 20050 20051
/**
 * virConnectIsAlive:
 * @conn: pointer to the connection object
 *
 * Determine if the connection to the hypervisor is still alive
 *
 * A connection will be classed as alive if it is either local, or running
 * over a channel (TCP or UNIX socket) which is not closed.
 *
 * Returns 1 if alive, 0 if dead, -1 on error
 */
20052 20053
int
virConnectIsAlive(virConnectPtr conn)
J
Jiri Denemark 已提交
20054 20055 20056 20057 20058
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

20059
    virCheckConnectReturn(conn, -1);
20060
    if (conn->driver->connectIsAlive) {
J
Jiri Denemark 已提交
20061
        int ret;
20062
        ret = conn->driver->connectIsAlive(conn);
J
Jiri Denemark 已提交
20063 20064 20065 20066 20067
        if (ret < 0)
            goto error;
        return ret;
    }

20068
    virReportUnsupportedError();
20069
 error:
J
Jiri Denemark 已提交
20070 20071 20072
    virDispatchError(conn);
    return -1;
}
20073 20074


20075 20076 20077 20078 20079 20080 20081 20082 20083 20084 20085 20086 20087 20088 20089 20090 20091 20092 20093 20094 20095 20096 20097
/**
 * virConnectRegisterCloseCallback:
 * @conn: pointer to connection object
 * @cb: callback to invoke upon close
 * @opaque: user data to pass to @cb
 * @freecb: callback to free @opaque
 *
 * Registers a callback to be invoked when the connection
 * is closed. This callback is invoked when there is any
 * condition that causes the socket connection to the
 * hypervisor to be closed.
 *
 * This function is only applicable to hypervisor drivers
 * which maintain a persistent open connection. Drivers
 * which open a new connection for every operation will
 * not invoke this.
 *
 * The @freecb must not invoke any other libvirt public
 * APIs, since it is not called from a re-entrant safe
 * context.
 *
 * Returns 0 on success, -1 on error
 */
20098 20099 20100 20101 20102
int
virConnectRegisterCloseCallback(virConnectPtr conn,
                                virConnectCloseFunc cb,
                                void *opaque,
                                virFreeCallback freecb)
20103 20104 20105 20106 20107
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

20108
    virCheckConnectReturn(conn, -1);
20109

20110 20111
    virObjectRef(conn);

20112
    virMutexLock(&conn->lock);
20113
    virObjectLock(conn->closeCallback);
20114 20115 20116

    virCheckNonNullArgGoto(cb, error);

20117
    if (conn->closeCallback->callback) {
20118 20119
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("A close callback is already registered"));
20120 20121 20122
        goto error;
    }

20123
    conn->closeCallback->conn = conn;
20124 20125 20126
    conn->closeCallback->callback = cb;
    conn->closeCallback->opaque = opaque;
    conn->closeCallback->freeCallback = freecb;
20127

20128
    virObjectUnlock(conn->closeCallback);
20129 20130 20131 20132
    virMutexUnlock(&conn->lock);

    return 0;

20133
 error:
20134
    virObjectUnlock(conn->closeCallback);
20135
    virMutexUnlock(&conn->lock);
20136
    virDispatchError(conn);
20137
    virObjectUnref(conn);
20138 20139 20140
    return -1;
}

20141

20142 20143 20144 20145 20146 20147 20148 20149 20150 20151 20152 20153 20154
/**
 * virConnectUnregisterCloseCallback:
 * @conn: pointer to connection object
 * @cb: pointer to the current registered callback
 *
 * Unregisters the callback previously set with the
 * virConnectRegisterCloseCallback method. The callback
 * will no longer receive notifications when the connection
 * closes. If a virFreeCallback was provided at time of
 * registration, it will be invoked
 *
 * Returns 0 on success, -1 on error
 */
20155 20156 20157
int
virConnectUnregisterCloseCallback(virConnectPtr conn,
                                  virConnectCloseFunc cb)
20158 20159 20160 20161 20162
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

20163
    virCheckConnectReturn(conn, -1);
20164 20165

    virMutexLock(&conn->lock);
20166
    virObjectLock(conn->closeCallback);
20167 20168 20169

    virCheckNonNullArgGoto(cb, error);

20170
    if (conn->closeCallback->callback != cb) {
20171 20172
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("A different callback was requested"));
20173 20174 20175
        goto error;
    }

20176 20177 20178 20179
    conn->closeCallback->callback = NULL;
    if (conn->closeCallback->freeCallback)
        conn->closeCallback->freeCallback(conn->closeCallback->opaque);
    conn->closeCallback->freeCallback = NULL;
20180

20181
    virObjectUnref(conn);
20182 20183
    virObjectUnlock(conn->closeCallback);
    virMutexUnlock(&conn->lock);
20184

20185 20186
    return 0;

20187
 error:
20188
    virObjectUnlock(conn->closeCallback);
20189
    virMutexUnlock(&conn->lock);
20190
    virDispatchError(conn);
20191 20192 20193
    return -1;
}

20194

20195 20196 20197 20198 20199 20200 20201
/**
 * virDomainSetBlockIoTune:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
 * @params: Pointer to blkio parameter objects
 * @nparams: Number of blkio parameters (this value can be the same or
 *           less than the number of parameters supported)
20202
 * @flags: bitwise-OR of virDomainModificationImpact
20203 20204 20205 20206 20207 20208 20209 20210 20211 20212 20213 20214
 *
 * Change all or a subset of the per-device block IO tunables.
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the <target
 * dev='...'/> sub-element, such as "xvda").  Valid names can be found
 * by calling virDomainGetXMLDesc() and inspecting elements
 * within //domain/devices/disk.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
20215 20216 20217 20218 20219 20220
int
virDomainSetBlockIoTune(virDomainPtr dom,
                        const char *disk,
                        virTypedParameterPtr params,
                        int nparams,
                        unsigned int flags)
20221 20222 20223
{
    virConnectPtr conn;

20224
    VIR_DOMAIN_DEBUG(dom, "disk=%s, params=%p, nparams=%d, flags=%x",
20225
                     disk, params, nparams, flags);
20226
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
20227 20228 20229

    virResetLastError();

20230 20231
    virCheckDomainReturn(dom, -1);
    conn = dom->conn;
20232

20233
    virCheckReadOnlyGoto(conn->flags, error);
20234 20235 20236
    virCheckNonNullArgGoto(disk, error);
    virCheckPositiveArgGoto(nparams, error);
    virCheckNonNullArgGoto(params, error);
20237

20238
    if (virTypedParameterValidateSet(dom->conn, params, nparams) < 0)
20239
        goto error;
20240 20241 20242 20243 20244 20245 20246 20247 20248

    if (conn->driver->domainSetBlockIoTune) {
        int ret;
        ret = conn->driver->domainSetBlockIoTune(dom, disk, params, nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20249
    virReportUnsupportedError();
20250

20251
 error:
20252 20253 20254 20255
    virDispatchError(dom->conn);
    return -1;
}

20256

20257 20258 20259 20260 20261 20262 20263
/**
 * virDomainGetBlockIoTune:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
 * @params: Pointer to blkio parameter object
 *          (return value, allocated by the caller)
 * @nparams: Pointer to number of blkio parameters
20264
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
20265 20266 20267 20268 20269 20270 20271 20272 20273 20274 20275 20276 20277 20278 20279 20280 20281 20282 20283 20284 20285 20286 20287 20288 20289
 *
 * Get all block IO tunable parameters for a given device.  On input,
 * @nparams gives the size of the @params array; on output, @nparams
 * gives how many slots were filled with parameter information, which
 * might be less but will not exceed the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0
 * on input will cause @nparams on output to contain the number of
 * parameters supported by the hypervisor, either for the given @disk
 * (note that block devices of different types might support different
 * parameters), or if @disk is NULL, for all possible disks. The
 * caller should then allocate @params array,
 * i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.  See virDomainGetMemoryParameters() for more details.
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the <target
 * dev='...'/> sub-element, such as "xvda").  Valid names can be found
 * by calling virDomainGetXMLDesc() and inspecting elements
 * within //domain/devices/disk.  This parameter cannot be NULL
 * unless @nparams is 0 on input.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
20290 20291 20292 20293 20294 20295
int
virDomainGetBlockIoTune(virDomainPtr dom,
                        const char *disk,
                        virTypedParameterPtr params,
                        int *nparams,
                        unsigned int flags)
20296 20297 20298
{
    virConnectPtr conn;

20299
    VIR_DOMAIN_DEBUG(dom, "disk=%s, params=%p, nparams=%d, flags=%x",
20300 20301 20302 20303
                     NULLSTR(disk), params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

20304
    virCheckDomainReturn(dom, -1);
20305

20306 20307 20308 20309 20310
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0) {
        virCheckNonNullArgGoto(params, error);
        virCheckNonNullArgGoto(disk, error);
20311 20312 20313 20314 20315 20316 20317 20318 20319
    }

    if (VIR_DRV_SUPPORTS_FEATURE(dom->conn->driver, dom->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
20320
        virReportInvalidArg(flags,
20321 20322
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
20323
                            __FUNCTION__);
20324 20325 20326 20327 20328 20329 20330 20331 20332 20333 20334 20335
        goto error;
    }
    conn = dom->conn;

    if (conn->driver->domainGetBlockIoTune) {
        int ret;
        ret = conn->driver->domainGetBlockIoTune(dom, disk, params, nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20336
    virReportUnsupportedError();
20337

20338
 error:
20339 20340 20341
    virDispatchError(dom->conn);
    return -1;
}
20342

20343

20344 20345 20346 20347 20348 20349 20350
/**
 * virDomainGetCPUStats:
 * @domain: domain to query
 * @params: array to populate on output
 * @nparams: number of parameters per cpu
 * @start_cpu: which cpu to start with, or -1 for summary
 * @ncpus: how many cpus to query
20351
 * @flags: bitwise-OR of virTypedParameterFlags
20352 20353 20354 20355 20356 20357 20358 20359 20360 20361 20362 20363 20364 20365
 *
 * Get statistics relating to CPU usage attributable to a single
 * domain (in contrast to the statistics returned by
 * virNodeGetCPUStats() for all processes on the host).  @dom
 * must be running (an inactive domain has no attributable cpu
 * usage).  On input, @params must contain at least @nparams * @ncpus
 * entries, allocated by the caller.
 *
 * If @start_cpu is -1, then @ncpus must be 1, and the returned
 * results reflect the statistics attributable to the entire
 * domain (such as user and system time for the process as a
 * whole).  Otherwise, @start_cpu represents which cpu to start
 * with, and @ncpus represents how many consecutive processors to
 * query, with statistics attributable per processor (such as
20366 20367 20368
 * per-cpu usage).  If @ncpus is larger than the number of cpus
 * available to query, then the trailing part of the array will
 * be unpopulated.
20369 20370 20371 20372 20373 20374 20375 20376 20377 20378 20379 20380 20381 20382 20383 20384 20385 20386 20387 20388 20389 20390 20391 20392 20393 20394 20395 20396 20397 20398
 *
 * The remote driver imposes a limit of 128 @ncpus and 16 @nparams;
 * the number of parameters per cpu should not exceed 16, but if you
 * have a host with more than 128 CPUs, your program should split
 * the request into multiple calls.
 *
 * As special cases, if @params is NULL and @nparams is 0 and
 * @ncpus is 1, and the return value will be how many
 * statistics are available for the given @start_cpu.  This number
 * may be different for @start_cpu of -1 than for any non-negative
 * value, but will be the same for all non-negative @start_cpu.
 * Likewise, if @params is NULL and @nparams is 0 and @ncpus is 0,
 * the number of cpus available to query is returned.  From the
 * host perspective, this would typically match the cpus member
 * of virNodeGetInfo(), but might be less due to host cpu hotplug.
 *
 * For now, @flags is unused, and the statistics all relate to the
 * usage from the host perspective.  It is possible that a future
 * version will support a flag that queries the cpu usage from the
 * guest's perspective, where the maximum cpu to query would be
 * related to virDomainGetVcpusFlags() rather than virNodeGetInfo().
 * An individual guest vcpu cannot be reliably mapped back to a
 * specific host cpu unless a single-processor vcpu pinning was used,
 * but when @start_cpu is -1, any difference in usage between a host
 * and guest perspective would serve as a measure of hypervisor overhead.
 *
 * Typical use sequence is below.
 *
 * getting total stats: set start_cpu as -1, ncpus 1
 * virDomainGetCPUStats(dom, NULL, 0, -1, 1, 0) => nparams
20399
 * params = calloc(nparams, sizeof(virTypedParameter))
20400 20401 20402 20403 20404
 * virDomainGetCPUStats(dom, params, nparams, -1, 1, 0) => total stats.
 *
 * getting per-cpu stats:
 * virDomainGetCPUStats(dom, NULL, 0, 0, 0, 0) => ncpus
 * virDomainGetCPUStats(dom, NULL, 0, 0, 1, 0) => nparams
20405
 * params = calloc(ncpus * nparams, sizeof(virTypedParameter))
20406 20407 20408 20409 20410 20411 20412
 * virDomainGetCPUStats(dom, params, nparams, 0, ncpus, 0) => per-cpu stats
 *
 * Returns -1 on failure, or the number of statistics that were
 * populated per cpu on success (this will be less than the total
 * number of populated @params, unless @ncpus was 1; and may be
 * less than @nparams).  The populated parameters start at each
 * stride of @nparams, which means the results may be discontiguous;
20413 20414 20415 20416
 * any unpopulated parameters will be zeroed on success (this includes
 * skipped elements if @nparams is too large, and tail elements if
 * @ncpus is too large).  The caller is responsible for freeing any
 * returned string parameters.
20417
 */
20418 20419 20420 20421 20422 20423 20424
int
virDomainGetCPUStats(virDomainPtr domain,
                     virTypedParameterPtr params,
                     unsigned int nparams,
                     int start_cpu,
                     unsigned int ncpus,
                     unsigned int flags)
20425 20426 20427 20428 20429 20430 20431 20432
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain,
                     "params=%p, nparams=%d, start_cpu=%d, ncpus=%u, flags=%x",
                     params, nparams, start_cpu, ncpus, flags);
    virResetLastError();

20433
    virCheckDomainReturn(domain, -1);
20434
    conn = domain->conn;
20435

20436 20437 20438 20439 20440
    /* Special cases:
     * start_cpu must be non-negative, or else -1
     * if start_cpu is -1, ncpus must be 1
     * params == NULL must match nparams == 0
     * ncpus must be non-zero unless params == NULL
20441
     * nparams * ncpus must not overflow (RPC may restrict it even more)
20442
     */
20443 20444 20445 20446 20447 20448 20449 20450 20451
    if (start_cpu == -1) {
        if (ncpus != 1) {
            virReportInvalidArg(start_cpu,
                                _("ncpus in %s must be 1 when start_cpu is -1"),
                                __FUNCTION__);
            goto error;
        }
    } else {
        virCheckNonNegativeArgGoto(start_cpu, error);
20452
    }
20453 20454 20455 20456 20457 20458 20459
    if (nparams)
        virCheckNonNullArgGoto(params, error);
    else
        virCheckNullArgGoto(params, error);
    if (ncpus == 0)
        virCheckNullArgGoto(params, error);

E
Eric Blake 已提交
20460
    if (nparams && ncpus > UINT_MAX / nparams) {
20461 20462
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u * %u"),
                       nparams, ncpus);
E
Eric Blake 已提交
20463 20464
        goto error;
    }
20465 20466 20467
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
20468 20469 20470 20471 20472 20473 20474 20475 20476 20477 20478

    if (conn->driver->domainGetCPUStats) {
        int ret;

        ret = conn->driver->domainGetCPUStats(domain, params, nparams,
                                              start_cpu, ncpus, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20479
    virReportUnsupportedError();
20480

20481
 error:
20482 20483 20484
    virDispatchError(domain->conn);
    return -1;
}
20485

20486

20487 20488 20489 20490 20491 20492 20493 20494 20495 20496 20497 20498 20499 20500 20501 20502 20503 20504 20505 20506 20507 20508 20509 20510 20511 20512 20513 20514 20515 20516 20517 20518 20519 20520 20521 20522 20523 20524 20525
/**
 * virDomainGetDiskErrors:
 * @dom: a domain object
 * @errors: array to populate on output
 * @maxerrors: size of @errors array
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * The function populates @errors array with all disks that encountered an
 * I/O error.  Disks with no error will not be returned in the @errors array.
 * Each disk is identified by its target (the dev attribute of target
 * subelement in domain XML), such as "vda", and accompanied with the error
 * that was seen on it.  The caller is also responsible for calling free()
 * on each disk name returned.
 *
 * In a special case when @errors is NULL and @maxerrors is 0, the function
 * returns preferred size of @errors that the caller should use to get all
 * disk errors.
 *
 * Since calling virDomainGetDiskErrors(dom, NULL, 0, 0) to get preferred size
 * of @errors array and getting the errors are two separate operations, new
 * disks may be hotplugged to the domain and new errors may be encountered
 * between the two calls.  Thus, this function may not return all disk errors
 * because the supplied array is not large enough.  Such errors may, however,
 * be detected by listening to domain events.
 *
 * Returns number of disks with errors filled in the @errors array or -1 on
 * error.
 */
int
virDomainGetDiskErrors(virDomainPtr dom,
                       virDomainDiskErrorPtr errors,
                       unsigned int maxerrors,
                       unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "errors=%p, maxerrors=%u, flags=%x",
                     errors, maxerrors, flags);

    virResetLastError();

20526
    virCheckDomainReturn(dom, -1);
20527

20528 20529 20530 20531
    if (maxerrors)
        virCheckNonNullArgGoto(errors, error);
    else
        virCheckNullArgGoto(errors, error);
20532 20533 20534 20535 20536 20537 20538 20539 20540

    if (dom->conn->driver->domainGetDiskErrors) {
        int ret = dom->conn->driver->domainGetDiskErrors(dom, errors,
                                                         maxerrors, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20541
    virReportUnsupportedError();
20542

20543
 error:
20544 20545 20546
    virDispatchError(dom->conn);
    return -1;
}
G
Guido Günther 已提交
20547

20548

G
Guido Günther 已提交
20549 20550 20551 20552 20553 20554 20555 20556 20557 20558 20559 20560 20561 20562 20563 20564 20565 20566
/**
 * virDomainGetHostname:
 * @domain: a domain object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Get the hostname for that domain.
 *
 * Dependent on hypervisor used, this may require a guest agent to be
 * available.
 *
 * Returns the hostname which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
virDomainGetHostname(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;

20567
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
G
Guido Günther 已提交
20568 20569 20570

    virResetLastError();

20571
    virCheckDomainReturn(domain, NULL);
G
Guido Günther 已提交
20572 20573 20574 20575
    conn = domain->conn;

    if (conn->driver->domainGetHostname) {
        char *ret;
20576
        ret = conn->driver->domainGetHostname(domain, flags);
G
Guido Günther 已提交
20577 20578 20579 20580 20581
        if (!ret)
            goto error;
        return ret;
    }

20582
    virReportUnsupportedError();
G
Guido Günther 已提交
20583

20584
 error:
G
Guido Günther 已提交
20585 20586 20587
    virDispatchError(domain->conn);
    return NULL;
}
20588

20589

20590 20591 20592 20593 20594 20595 20596 20597 20598 20599 20600 20601 20602 20603 20604 20605 20606 20607 20608 20609 20610 20611 20612 20613 20614 20615 20616 20617 20618 20619 20620
/**
 * virNodeGetCPUMap:
 * @conn: pointer to the hypervisor connection
 * @cpumap: optional pointer to a bit map of real CPUs on the host node
 *      (in 8-bit bytes) (OUT)
 *      In case of success each bit set to 1 means that corresponding
 *      CPU is online.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
 *      The bit map is allocated by virNodeGetCPUMap and needs
 *      to be released using free() by the caller.
 * @online: optional number of online CPUs in cpumap (OUT)
 *      Contains the number of online CPUs if the call was successful.
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Get CPU map of host node CPUs.
 *
 * Returns number of CPUs present on the host node,
 * or -1 if there was an error.
 */
int
virNodeGetCPUMap(virConnectPtr conn,
                 unsigned char **cpumap,
                 unsigned int *online,
                 unsigned int flags)
{
    VIR_DEBUG("conn=%p, cpumap=%p, online=%p, flags=%x",
              conn, cpumap, online, flags);

    virResetLastError();

20621
    virCheckConnectReturn(conn, -1);
20622 20623 20624 20625 20626 20627 20628 20629

    if (conn->driver->nodeGetCPUMap) {
        int ret = conn->driver->nodeGetCPUMap(conn, cpumap, online, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20630
    virReportUnsupportedError();
20631

20632
 error:
20633 20634 20635
    virDispatchError(conn);
    return -1;
}
20636

20637

20638 20639 20640
/**
 * virDomainFSTrim:
 * @dom: a domain object
20641
 * @mountPoint: which mount point to trim
20642 20643 20644 20645 20646 20647
 * @minimum: Minimum contiguous free range to discard in bytes
 * @flags: extra flags, not used yet, so callers should always pass 0
 *
 * Calls FITRIM within the guest (hence guest agent may be
 * required depending on hypervisor used). Either call it on each
 * mounted filesystem (@mountPoint is NULL) or just on specified
20648
 * @mountPoint. @minimum hints that free ranges smaller than this
20649 20650 20651 20652
 * may be ignored (this is a hint and the guest may not respect
 * it).  By increasing this value, the fstrim operation will
 * complete more quickly for filesystems with badly fragmented
 * free space, although not all blocks will be discarded.
20653
 * If @minimum is not zero, the command may fail.
20654 20655 20656 20657 20658 20659 20660 20661 20662 20663 20664 20665 20666 20667
 *
 * Returns 0 on success, -1 otherwise.
 */
int
virDomainFSTrim(virDomainPtr dom,
                const char *mountPoint,
                unsigned long long minimum,
                unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "mountPoint=%s, minimum=%llu, flags=%x",
                     mountPoint, minimum, flags);

    virResetLastError();

20668
    virCheckDomainReturn(dom, -1);
20669
    virCheckReadOnlyGoto(dom->conn->flags, error);
20670 20671 20672 20673 20674 20675 20676 20677 20678

    if (dom->conn->driver->domainFSTrim) {
        int ret = dom->conn->driver->domainFSTrim(dom, mountPoint,
                                                  minimum, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20679
    virReportUnsupportedError();
20680

20681
 error:
20682 20683 20684
    virDispatchError(dom->conn);
    return -1;
}