qemu_command.c 362.3 KB
Newer Older
1 2 3
/*
 * qemu_command.c: QEMU command generation
 *
4
 * Copyright (C) 2006-2016 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
20 21 22 23 24
 */

#include <config.h>

#include "qemu_command.h"
25
#include "qemu_hostdev.h"
26
#include "qemu_capabilities.h"
27
#include "qemu_interface.h"
28
#include "qemu_alias.h"
29
#include "qemu_security.h"
M
Marc-André Lureau 已提交
30
#include "qemu_dbus.h"
31
#include "qemu_slirp.h"
32
#include "qemu_block.h"
33
#include "cpu/cpu.h"
34
#include "dirname.h"
35
#include "viralloc.h"
36
#include "virlog.h"
37
#include "virarch.h"
38
#include "virerror.h"
E
Eric Blake 已提交
39
#include "virfile.h"
40
#include "virnetdev.h"
41
#include "virnetdevbridge.h"
42
#include "virqemu.h"
43
#include "virstring.h"
44
#include "virtime.h"
45
#include "viruuid.h"
46
#include "domain_nwfilter.h"
47
#include "domain_addr.h"
48
#include "domain_audit.h"
M
Michal Novotny 已提交
49
#include "domain_conf.h"
50
#include "netdev_bandwidth_conf.h"
51
#include "snapshot_conf.h"
52
#include "storage_conf.h"
53
#include "secret_conf.h"
54
#include "virnetdevtap.h"
55
#include "virnetdevopenvswitch.h"
56
#include "device_conf.h"
57
#include "virstoragefile.h"
58
#include "virtpm.h"
59
#include "virscsi.h"
60
#include "virnuma.h"
61
#include "virgic.h"
62
#include "virmdev.h"
63
#include "virdomainsnapshotobjlist.h"
64 65 66
#if defined(__linux__)
# include <linux/capability.h>
#endif
67
#include "logging/log_manager.h"
68 69 70 71 72 73

#include <sys/stat.h>
#include <fcntl.h>

#define VIR_FROM_THIS VIR_FROM_QEMU

74 75
VIR_LOG_INIT("qemu.qemu_command");

76
VIR_ENUM_DECL(virDomainDiskQEMUBus);
77 78
VIR_ENUM_IMPL(virDomainDiskQEMUBus,
              VIR_DOMAIN_DISK_BUS_LAST,
79 80 81 82 83 84 85
              "ide",
              "floppy",
              "scsi",
              "virtio",
              "xen",
              "usb",
              "uml",
86
              "sata",
87 88
              "sd",
);
89 90


91
VIR_ENUM_DECL(qemuDiskCacheV2);
92

93 94
VIR_ENUM_IMPL(qemuDiskCacheV2,
              VIR_DOMAIN_DISK_CACHE_LAST,
95 96 97
              "default",
              "none",
              "writethrough",
98
              "writeback",
99
              "directsync",
100 101
              "unsafe",
);
102

103 104
VIR_ENUM_IMPL(qemuVideo,
              VIR_DOMAIN_VIDEO_TYPE_LAST,
105
              "", /* default value, we shouldn't see this */
106 107 108
              "std",
              "cirrus",
              "vmware",
109
              "", /* don't support xen */
110
              "", /* don't support vbox */
111
              "qxl",
M
Marc-André Lureau 已提交
112
              "", /* don't support parallels */
F
Fabian Freyer 已提交
113
              "", /* no need for virtio */
114
              "" /* don't support gop */,
115
              "" /* 'none' doesn't make sense here */,
116
              "bochs-display",
117
);
118

119
VIR_ENUM_DECL(qemuDeviceVideo);
120

121 122
VIR_ENUM_IMPL(qemuDeviceVideo,
              VIR_DOMAIN_VIDEO_TYPE_LAST,
123
              "", /* default value, we shouldn't see this */
124 125 126
              "VGA",
              "cirrus-vga",
              "vmware-svga",
127
              "", /* don't support xen */
128
              "", /* don't support vbox */
129
              "qxl-vga",
M
Marc-André Lureau 已提交
130
              "", /* don't support parallels */
F
Fabian Freyer 已提交
131
              "virtio-vga",
132
              "" /* don't support gop */,
133
              "" /* 'none' doesn't make sense here */,
134
              "bochs-display",
135
);
136

137
VIR_ENUM_DECL(qemuDeviceVideoSecondary);
138

139 140
VIR_ENUM_IMPL(qemuDeviceVideoSecondary,
              VIR_DOMAIN_VIDEO_TYPE_LAST,
141
              "", /* default value, we shouldn't see this */
142 143 144 145 146 147 148
              "", /* no secondary device for VGA */
              "", /* no secondary device for cirrus-vga */
              "", /* no secondary device for vmware-svga */
              "", /* don't support xen */
              "", /* don't support vbox */
              "qxl",
              "", /* don't support parallels */
149
              "virtio-gpu",
150
              "" /* don't support gop */,
151
              "" /* 'none' doesn't make sense here */,
152
              "" /* no secondary device for bochs */,
153
);
154

155
VIR_ENUM_DECL(qemuSoundCodec);
156

157 158
VIR_ENUM_IMPL(qemuSoundCodec,
              VIR_DOMAIN_SOUND_CODEC_TYPE_LAST,
159
              "hda-duplex",
F
Filip Alac 已提交
160
              "hda-micro",
161 162
              "hda-output",
);
163

164
VIR_ENUM_DECL(qemuControllerModelUSB);
165

166 167
VIR_ENUM_IMPL(qemuControllerModelUSB,
              VIR_DOMAIN_CONTROLLER_MODEL_USB_LAST,
168 169 170 171 172 173 174 175
              "piix3-usb-uhci",
              "piix4-usb-uhci",
              "usb-ehci",
              "ich9-usb-ehci1",
              "ich9-usb-uhci1",
              "ich9-usb-uhci2",
              "ich9-usb-uhci3",
              "vt82c686b-usb-uhci",
G
Gerd Hoffmann 已提交
176
              "pci-ohci",
177
              "nec-usb-xhci",
178 179
              "qusb1",
              "qusb2",
180
              "qemu-xhci",
181 182
              "none",
);
183

184
VIR_ENUM_DECL(qemuNumaPolicy);
185 186
VIR_ENUM_IMPL(qemuNumaPolicy,
              VIR_DOMAIN_NUMATUNE_MEM_LAST,
187 188
              "bind",
              "preferred",
189 190
              "interleave",
);
191

192

193 194 195 196 197 198 199 200 201 202 203 204
/**
 * qemuBuildMasterKeyCommandLine:
 * @cmd: the command to modify
 * @qemuCaps qemu capabilities object
 * @domainLibDir: location to find the master key

 * Formats the command line for a master key if available
 *
 * Returns 0 on success, -1 w/ error message on failure
 */
static int
qemuBuildMasterKeyCommandLine(virCommandPtr cmd,
205
                              qemuDomainObjPrivatePtr priv)
206
{
207 208
    VIR_AUTOFREE(char *) alias = NULL;
    VIR_AUTOFREE(char *) path = NULL;
209
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
210 211 212 213 214

    /* If the -object secret does not exist, then just return. This just
     * means the domain won't be able to use a secret master key and is
     * not a failure.
     */
215
    if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_SECRET)) {
216 217 218 219 220 221 222 223 224 225 226 227
        VIR_INFO("secret object is not supported by this QEMU binary");
        return 0;
    }

    if (!(alias = qemuDomainGetMasterKeyAlias()))
        return -1;

    /* Get the path. NB, the mocked test will not have the created
     * file so we cannot check for existence, which is no different
     * than other command line options which do not check for the
     * existence of socket files before using.
     */
228
    if (!(path = qemuDomainGetMasterKeyFilePath(priv->libDir)))
229
        return -1;
230 231

    virCommandAddArg(cmd, "-object");
232
    virBufferAsprintf(&buf, "secret,id=%s,format=raw,file=", alias);
233
    virQEMUBuildBufferEscapeComma(&buf, path);
234
    virCommandAddArgBuffer(cmd, &buf);
235

236
    return 0;
237 238 239
}


240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292
/**
 * qemuVirCommandGetFDSet:
 * @cmd: the command to modify
 * @fd: fd to reassign to the child
 *
 * Get the parameters for the QEMU -add-fd command line option
 * for the given file descriptor. The file descriptor must previously
 * have been 'transferred' in a virCommandPassFD() call.
 * This function for example returns "set=10,fd=20".
 */
static char *
qemuVirCommandGetFDSet(virCommandPtr cmd, int fd)
{
    char *result = NULL;
    int idx = virCommandPassFDGetFDIndex(cmd, fd);

    if (idx >= 0) {
        ignore_value(virAsprintf(&result, "set=%d,fd=%d", idx, fd));
    } else {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("file descriptor %d has not been transferred"), fd);
    }

    return result;
}


/**
 * qemuVirCommandGetDevSet:
 * @cmd: the command to modify
 * @fd: fd to reassign to the child
 *
 * Get the parameters for the QEMU path= parameter where a file
 * descriptor is accessed via a file descriptor set, for example
 * /dev/fdset/10. The file descriptor must previously have been
 * 'transferred' in a virCommandPassFD() call.
 */
static char *
qemuVirCommandGetDevSet(virCommandPtr cmd, int fd)
{
    char *result = NULL;
    int idx = virCommandPassFDGetFDIndex(cmd, fd);

    if (idx >= 0) {
        ignore_value(virAsprintf(&result, "/dev/fdset/%d", idx));
    } else {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("file descriptor %d has not been transferred"), fd);
    }
    return result;
}


293 294
static int
qemuBuildDeviceAddressStr(virBufferPtr buf,
295
                          const virDomainDef *domainDef,
296
                          virDomainDeviceInfoPtr info,
297
                          virQEMUCapsPtr qemuCaps)
298
{
299
    VIR_AUTOFREE(char *) devStr = NULL;
300
    const char *contAlias = NULL;
301 302
    bool contIsPHB = false;
    int contTargetIndex = 0;
303

304
    if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
305 306
        size_t i;

307
        if (!(devStr = virPCIDeviceAddressAsString(&info->addr.pci)))
308
            return -1;
309 310 311 312 313
        for (i = 0; i < domainDef->ncontrollers; i++) {
            virDomainControllerDefPtr cont = domainDef->controllers[i];

            if (cont->type == VIR_DOMAIN_CONTROLLER_TYPE_PCI &&
                cont->idx == info->addr.pci.bus) {
314
                contAlias = cont->info.alias;
315
                contIsPHB = virDomainControllerIsPSeriesPHB(cont);
316
                contTargetIndex = cont->opts.pciopts.targetIndex;
317

318 319 320 321 322 323
                if (!contAlias) {
                    virReportError(VIR_ERR_INTERNAL_ERROR,
                                   _("Device alias was not set for PCI "
                                     "controller with index %u required "
                                     "for device at address %s"),
                                   info->addr.pci.bus, devStr);
324
                    return -1;
325 326 327 328 329 330 331 332 333 334 335 336 337 338
                }

                if (virDomainDeviceAliasIsUserAlias(contAlias)) {
                    /* When domain has builtin pci-root controller we don't put it
                     * onto cmd line. Therefore we can't set its alias. In that
                     * case, use the default one. */
                    if (!qemuDomainIsPSeries(domainDef) &&
                        cont->model == VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT) {
                        if (virQEMUCapsHasPCIMultiBus(qemuCaps, domainDef))
                            contAlias = "pci.0";
                        else
                            contAlias = "pci";
                    } else if (cont->model == VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT) {
                        contAlias = "pcie.0";
339
                    }
340 341 342 343 344 345 346 347 348 349
                }
                break;
            }
        }
        if (!contAlias) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Could not find PCI "
                             "controller with index %u required "
                             "for device at address %s"),
                           info->addr.pci.bus, devStr);
350
            return -1;
351 352
        }

353 354 355 356 357 358 359 360 361 362 363
        if (contIsPHB && contTargetIndex > 0) {
            /* The PCI bus created by a spapr-pci-host-bridge device with
             * alias 'x' will be called 'x.0' rather than 'x'; however,
             * this does not apply to the implicit PHB in a pSeries guest,
             * which always has the hardcoded name 'pci.0' */
            virBufferAsprintf(buf, ",bus=%s.0", contAlias);
        } else {
            /* For all other controllers, the bus name matches the alias
             * of the corresponding controller */
            virBufferAsprintf(buf, ",bus=%s", contAlias);
        }
364

J
Ján Tomko 已提交
365
        if (info->addr.pci.multi == VIR_TRISTATE_SWITCH_ON)
366
            virBufferAddLit(buf, ",multifunction=on");
J
Ján Tomko 已提交
367
        else if (info->addr.pci.multi == VIR_TRISTATE_SWITCH_OFF)
368 369 370 371
            virBufferAddLit(buf, ",multifunction=off");
        virBufferAsprintf(buf, ",addr=0x%x", info->addr.pci.slot);
        if (info->addr.pci.function != 0)
           virBufferAsprintf(buf, ".0x%x", info->addr.pci.function);
372
    } else if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_USB) {
373 374 375
        if (!(contAlias = virDomainControllerAliasFind(domainDef,
                                                       VIR_DOMAIN_CONTROLLER_TYPE_USB,
                                                       info->addr.usb.bus)))
376
            return -1;
J
Ján Tomko 已提交
377
        virBufferAsprintf(buf, ",bus=%s.0", contAlias);
378 379 380 381
        if (virDomainUSBAddressPortIsValid(info->addr.usb.port)) {
            virBufferAddLit(buf, ",port=");
            virDomainUSBAddressPortFormatBuf(buf, info->addr.usb.port);
        }
382 383
    } else if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_SPAPRVIO) {
        if (info->addr.spaprvio.has_reg)
384
            virBufferAsprintf(buf, ",reg=0x%08llx", info->addr.spaprvio.reg);
385 386 387 388 389 390
    } else if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW) {
        if (info->addr.ccw.assigned)
            virBufferAsprintf(buf, ",devno=%x.%x.%04x",
                              info->addr.ccw.cssid,
                              info->addr.ccw.ssid,
                              info->addr.ccw.devno);
391 392 393 394
    } else if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_ISA) {
        virBufferAsprintf(buf, ",iobase=0x%x,irq=0x%x",
                          info->addr.isa.iobase,
                          info->addr.isa.irq);
395
    }
396

397
    return 0;
398 399
}

400

401 402 403 404
/**
 * qemuBuildVirtioDevStr
 * @buf: virBufferPtr to append the built string
 * @baseName: qemu virtio device basename string. Ex: virtio-rng for <rng>
405
 * @qemuCaps: virQEMUCapPtr
406 407 408 409 410 411 412 413 414 415
 * @devtype: virDomainDeviceType of the device. Ex: VIR_DOMAIN_DEVICE_TYPE_RNG
 * @devdata: *DefPtr of the device definition
 *
 * Build the qemu virtio -device name from the passed parameters. Currently
 * this is mostly about attaching the correct string prefix to @baseName for
 * the passed @type. So for @baseName "virtio-rng" and devdata->info.type
 * VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI, generate "virtio-rng-pci"
 *
 * Returns: -1 on failure, 0 on success
 */
416 417 418
static int
qemuBuildVirtioDevStr(virBufferPtr buf,
                      const char *baseName,
419
                      virQEMUCapsPtr qemuCaps,
420 421
                      virDomainDeviceType devtype,
                      void *devdata)
422 423
{
    const char *implName = NULL;
424 425
    virDomainDeviceDef device = { .type = devtype };
    virDomainDeviceInfoPtr info;
426
    bool has_tmodel, has_ntmodel;
427

428 429 430 431
    virDomainDeviceSetData(&device, devdata);
    info = virDomainDeviceGetInfo(&device);

    switch ((virDomainDeviceAddressType) info->type) {
432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI:
        implName = "pci";
        break;

    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_MMIO:
        implName = "device";
        break;

    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW:
        implName = "ccw";
        break;

    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_S390:
        implName = "s390";
        break;

    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_SERIAL:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCID:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_USB:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_SPAPRVIO:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_ISA:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DIMM:
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Unexpected address type for '%s'"), baseName);
        return -1;

    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE:
    case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_LAST:
    default:
462
        virReportEnumRangeError(virDomainDeviceAddressType, info->type);
463 464 465 466 467
        return -1;
    }

    virBufferAsprintf(buf, "%s-%s", baseName, implName);

468 469 470 471 472 473 474
    switch (devtype) {
        case VIR_DOMAIN_DEVICE_DISK:
            has_tmodel = device.data.disk->model == VIR_DOMAIN_DISK_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.disk->model == VIR_DOMAIN_DISK_MODEL_VIRTIO_NON_TRANSITIONAL;
            break;

        case VIR_DOMAIN_DEVICE_NET:
475 476
            has_tmodel = device.data.net->model == VIR_DOMAIN_NET_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.net->model == VIR_DOMAIN_NET_MODEL_VIRTIO_NON_TRANSITIONAL;
477 478
            break;

479 480 481 482 483 484 485
        case VIR_DOMAIN_DEVICE_HOSTDEV:
            if (device.data.hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI_HOST)
                return 0;
            has_tmodel = device.data.hostdev->source.subsys.u.scsi_host.model == VIR_DOMAIN_HOSTDEV_SUBSYS_SCSI_VHOST_MODEL_TYPE_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.hostdev->source.subsys.u.scsi_host.model == VIR_DOMAIN_HOSTDEV_SUBSYS_SCSI_VHOST_MODEL_TYPE_VIRTIO_NON_TRANSITIONAL;
            break;

486 487 488 489 490
        case VIR_DOMAIN_DEVICE_RNG:
            has_tmodel = device.data.rng->model == VIR_DOMAIN_RNG_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.rng->model == VIR_DOMAIN_RNG_MODEL_VIRTIO_NON_TRANSITIONAL;
            break;

491
        case VIR_DOMAIN_DEVICE_FS:
492 493 494 495
            has_tmodel = device.data.fs->model == VIR_DOMAIN_FS_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.fs->model == VIR_DOMAIN_FS_MODEL_VIRTIO_NON_TRANSITIONAL;
            break;

496 497 498 499 500
        case VIR_DOMAIN_DEVICE_MEMBALLOON:
            has_tmodel = device.data.memballoon->model == VIR_DOMAIN_MEMBALLOON_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.memballoon->model == VIR_DOMAIN_MEMBALLOON_MODEL_VIRTIO_NON_TRANSITIONAL;
            break;

501 502 503 504 505
        case VIR_DOMAIN_DEVICE_VSOCK:
            has_tmodel = device.data.vsock->model == VIR_DOMAIN_VSOCK_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.vsock->model == VIR_DOMAIN_VSOCK_MODEL_VIRTIO_NON_TRANSITIONAL;
            break;

506
        case VIR_DOMAIN_DEVICE_INPUT:
507 508 509 510 511 512
            if (device.data.input->type != VIR_DOMAIN_INPUT_TYPE_PASSTHROUGH)
                return 0;
            has_tmodel = device.data.input->model == VIR_DOMAIN_INPUT_MODEL_VIRTIO_TRANSITIONAL;
            has_ntmodel = device.data.input->model == VIR_DOMAIN_INPUT_MODEL_VIRTIO_NON_TRANSITIONAL;
            break;

513 514 515 516
        case VIR_DOMAIN_DEVICE_CONTROLLER:
            if (device.data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_VIRTIO_SERIAL) {
                has_tmodel = device.data.controller->model == VIR_DOMAIN_CONTROLLER_MODEL_VIRTIO_SERIAL_VIRTIO_TRANSITIONAL;
                has_ntmodel = device.data.controller->model == VIR_DOMAIN_CONTROLLER_MODEL_VIRTIO_SERIAL_VIRTIO_NON_TRANSITIONAL;
517 518 519
            } else if (device.data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_SCSI) {
                has_tmodel = device.data.controller->model == VIR_DOMAIN_CONTROLLER_MODEL_SCSI_VIRTIO_TRANSITIONAL;
                has_ntmodel = device.data.controller->model == VIR_DOMAIN_CONTROLLER_MODEL_SCSI_VIRTIO_NON_TRANSITIONAL;
520 521 522 523 524
            } else {
                return 0;
            }
            break;

525
        case VIR_DOMAIN_DEVICE_LEASE:
526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582
        case VIR_DOMAIN_DEVICE_SOUND:
        case VIR_DOMAIN_DEVICE_VIDEO:
        case VIR_DOMAIN_DEVICE_WATCHDOG:
        case VIR_DOMAIN_DEVICE_GRAPHICS:
        case VIR_DOMAIN_DEVICE_HUB:
        case VIR_DOMAIN_DEVICE_REDIRDEV:
        case VIR_DOMAIN_DEVICE_NONE:
        case VIR_DOMAIN_DEVICE_SMARTCARD:
        case VIR_DOMAIN_DEVICE_CHR:
        case VIR_DOMAIN_DEVICE_NVRAM:
        case VIR_DOMAIN_DEVICE_SHMEM:
        case VIR_DOMAIN_DEVICE_TPM:
        case VIR_DOMAIN_DEVICE_PANIC:
        case VIR_DOMAIN_DEVICE_MEMORY:
        case VIR_DOMAIN_DEVICE_IOMMU:
        case VIR_DOMAIN_DEVICE_LAST:
        default:
            return 0;
    }

    if (info->type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI &&
        (has_tmodel || has_ntmodel)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("virtio (non-)transitional models are not "
                         "supported for address type=%s"),
                       virDomainDeviceAddressTypeToString(info->type));
        return -1;
    }

    if (has_tmodel) {
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_PCI_TRANSITIONAL)) {
            virBufferAddLit(buf, "-transitional");
        } else if (virQEMUCapsGet(qemuCaps,
                                  QEMU_CAPS_VIRTIO_PCI_DISABLE_LEGACY)) {
            virBufferAddLit(buf, ",disable-legacy=off,disable-modern=off");
        }
        /* No error if -transitional is not supported: our address
         * allocation will force the device into plain PCI bus, which
         * is functionally identical to standard 'virtio-XXX' behavior
         */
    } else if (has_ntmodel) {
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_PCI_TRANSITIONAL)) {
            virBufferAddLit(buf, "-non-transitional");
        } else if (virQEMUCapsGet(qemuCaps,
                                  QEMU_CAPS_VIRTIO_PCI_DISABLE_LEGACY)) {
            /* Even if the QEMU binary doesn't support the non-transitional
             * device, we can still make it work by manually disabling legacy
             * VirtIO and enabling modern VirtIO */
            virBufferAddLit(buf, ",disable-legacy=on,disable-modern=off");
        } else {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("virtio non-transitional model not supported "
                             "for this qemu"));
            return -1;
        }
    }

583 584 585
    return 0;
}

586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617
static int
qemuBuildVirtioOptionsStr(virBufferPtr buf,
                          virDomainVirtioOptionsPtr virtio,
                          virQEMUCapsPtr qemuCaps)
{
    if (!virtio)
        return 0;

    if (virtio->iommu != VIR_TRISTATE_SWITCH_ABSENT) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_PCI_IOMMU_PLATFORM)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("the iommu setting is not supported "
                             "with this QEMU binary"));
            return -1;
        }
        virBufferAsprintf(buf, ",iommu_platform=%s",
                          virTristateSwitchTypeToString(virtio->iommu));
    }
    if (virtio->ats != VIR_TRISTATE_SWITCH_ABSENT) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_PCI_ATS)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("the ats setting is not supported with this "
                             "QEMU binary"));
            return -1;
        }
        virBufferAsprintf(buf, ",ats=%s",
                          virTristateSwitchTypeToString(virtio->ats));
    }

    return 0;
}

618 619
static int
qemuBuildRomStr(virBufferPtr buf,
620
                virDomainDeviceInfoPtr info)
621
{
622
    if (info->romenabled || info->rombar || info->romfile) {
623
        if (info->type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
624
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
625
                           "%s", _("ROM tuning is only supported for PCI devices"));
626 627 628
            return -1;
        }

629 630 631 632 633 634 635
        /* Passing an empty romfile= tells QEMU to disable ROM entirely for
         * this device, and makes other settings irrelevant */
        if (info->romenabled == VIR_TRISTATE_BOOL_NO) {
            virBufferAddLit(buf, ",romfile=");
            return 0;
        }

636
        switch (info->rombar) {
J
Ján Tomko 已提交
637
        case VIR_TRISTATE_SWITCH_OFF:
638 639
            virBufferAddLit(buf, ",rombar=0");
            break;
J
Ján Tomko 已提交
640
        case VIR_TRISTATE_SWITCH_ON:
641 642 643 644 645
            virBufferAddLit(buf, ",rombar=1");
            break;
        default:
            break;
        }
646 647 648 649
        if (info->romfile) {
           virBufferAddLit(buf, ",romfile=");
           virQEMUBuildBufferEscapeComma(buf, info->romfile);
        }
650
    }
651

652 653 654
    return 0;
}

655 656
static int
qemuBuildIoEventFdStr(virBufferPtr buf,
J
Ján Tomko 已提交
657
                      virTristateSwitch use,
658
                      virQEMUCapsPtr qemuCaps)
659
{
660
    if (use && virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_IOEVENTFD))
661
        virBufferAsprintf(buf, ",ioeventfd=%s",
J
Ján Tomko 已提交
662
                          virTristateSwitchTypeToString(use));
663 664
    return 0;
}
665 666

#define QEMU_SERIAL_PARAM_ACCEPTED_CHARS \
667
  "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789-_ .+"
668 669 670 671

static int
qemuSafeSerialParamValue(const char *value)
{
672
    if (strspn(value, QEMU_SERIAL_PARAM_ACCEPTED_CHARS) != strlen(value)) {
673 674 675
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("driver serial '%s' contains unsafe characters"),
                       value);
676 677 678 679 680 681
        return -1;
    }

    return 0;
}

682

683 684 685 686 687 688 689 690 691 692
/**
 * qemuBuildSecretInfoProps:
 * @secinfo: pointer to the secret info object
 * @props: json properties to return
 *
 * Build the JSON properties for the secret info type.
 *
 * Returns 0 on success with the filled in JSON property; otherwise,
 * returns -1 on failure error message set.
 */
693
int
694 695 696 697
qemuBuildSecretInfoProps(qemuDomainSecretInfoPtr secinfo,
                         virJSONValuePtr *propsret)
{
    int ret = -1;
698
    VIR_AUTOFREE(char *) keyid = NULL;
699 700 701 702

    if (!(keyid = qemuDomainGetMasterKeyAlias()))
        return -1;

703 704 705 706 707 708
    ret = qemuMonitorCreateObjectProps(propsret,
                                       "secret", secinfo->s.aes.alias,
                                       "s:data", secinfo->s.aes.ciphertext,
                                       "s:keyid", keyid,
                                       "s:iv", secinfo->s.aes.iv,
                                       "s:format", "base64", NULL);
709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729

    return ret;
}


/**
 * qemuBuildObjectSecretCommandLine:
 * @cmd: the command to modify
 * @secinfo: pointer to the secret info object
 *
 * If the secinfo is available and associated with an AES secret,
 * then format the command line for the secret object. This object
 * will be referenced by the device that needs/uses it, so it needs
 * to be in place first.
 *
 * Returns 0 on success, -1 w/ error message on failure
 */
static int
qemuBuildObjectSecretCommandLine(virCommandPtr cmd,
                                 qemuDomainSecretInfoPtr secinfo)
{
730
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
731
    VIR_AUTOPTR(virJSONValue) props = NULL;
732

733
    if (qemuBuildSecretInfoProps(secinfo, &props) < 0)
734 735
        return -1;

736
    if (virQEMUBuildObjectCommandlineFromJSON(&buf, props) < 0)
737
        return -1;
738

739 740 741
    virCommandAddArg(cmd, "-object");
    virCommandAddArgBuffer(cmd, &buf);

742
    return 0;
743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766
}


/* qemuBuildDiskSecinfoCommandLine:
 * @cmd: Pointer to the command string
 * @secinfo: Pointer to a possible secinfo
 *
 * Add the secret object for the disks that will be using it to perform
 * their authentication.
 *
 * Returns 0 on success, -1 w/ error on some sort of failure.
 */
static int
qemuBuildDiskSecinfoCommandLine(virCommandPtr cmd,
                                qemuDomainSecretInfoPtr secinfo)
{
    /* Not necessary for non AES secrets */
    if (!secinfo || secinfo->type != VIR_DOMAIN_SECRET_INFO_TYPE_AES)
        return 0;

    return qemuBuildObjectSecretCommandLine(cmd, secinfo);
}


767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784
/* qemuBuildGeneralSecinfoURI:
 * @uri: Pointer to the URI structure to add to
 * @secinfo: Pointer to the secret info data (if present)
 *
 * If we have a secinfo, then build the command line options for
 * the secret info for the "general" case (somewhat a misnomer since
 * an iscsi disk is the only one with a secinfo).
 *
 * Returns 0 on success or if no secinfo,
 * -1 and error message if fail to add secret information
 */
static int
qemuBuildGeneralSecinfoURI(virURIPtr uri,
                           qemuDomainSecretInfoPtr secinfo)
{
    if (!secinfo)
        return 0;

J
John Ferlan 已提交
785 786 787
    switch ((qemuDomainSecretInfoType) secinfo->type) {
    case VIR_DOMAIN_SECRET_INFO_TYPE_PLAIN:
        if (secinfo->s.plain.secret) {
788 789 790 791 792 793
            if (!virStringBufferIsPrintable(secinfo->s.plain.secret,
                                            secinfo->s.plain.secretlen)) {
                virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                               _("found non printable characters in secret"));
                return -1;
            }
J
John Ferlan 已提交
794 795 796 797 798 799 800 801 802 803
            if (virAsprintf(&uri->user, "%s:%s",
                            secinfo->s.plain.username,
                            secinfo->s.plain.secret) < 0)
                return -1;
        } else {
            if (VIR_STRDUP(uri->user, secinfo->s.plain.username) < 0)
                return -1;
        }
        break;

804
    case VIR_DOMAIN_SECRET_INFO_TYPE_AES:
J
John Ferlan 已提交
805 806
    case VIR_DOMAIN_SECRET_INFO_TYPE_LAST:
        return -1;
807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827
    }

    return 0;
}


/* qemuBuildRBDSecinfoURI:
 * @uri: Pointer to the URI structure to add to
 * @secinfo: Pointer to the secret info data (if present)
 *
 * If we have a secinfo, then build the command line options for
 * the secret info for the RBD network storage. Assumption for this
 * is both username and secret exist for plaintext
 *
 * Returns 0 on success or if no secinfo,
 * -1 and error message if fail to add secret information
 */
static int
qemuBuildRBDSecinfoURI(virBufferPtr buf,
                       qemuDomainSecretInfoPtr secinfo)
{
828
    VIR_AUTODISPOSE_STR base64secret = NULL;
829

830 831 832 833 834
    if (!secinfo) {
        virBufferAddLit(buf, ":auth_supported=none");
        return 0;
    }

J
John Ferlan 已提交
835 836
    switch ((qemuDomainSecretInfoType) secinfo->type) {
    case VIR_DOMAIN_SECRET_INFO_TYPE_PLAIN:
837 838 839 840
        if (!(base64secret = virStringEncodeBase64(secinfo->s.plain.secret,
                                                   secinfo->s.plain.secretlen)))
            return -1;
        virBufferEscape(buf, '\\', ":", ":id=%s", secinfo->s.plain.username);
J
John Ferlan 已提交
841 842
        virBufferEscape(buf, '\\', ":",
                        ":key=%s:auth_supported=cephx\\;none",
843
                        base64secret);
J
John Ferlan 已提交
844 845
        break;

846
    case VIR_DOMAIN_SECRET_INFO_TYPE_AES:
847 848 849 850
        virBufferEscape(buf, '\\', ":", ":id=%s:auth_supported=cephx\\;none",
                        secinfo->s.aes.username);
        break;

J
John Ferlan 已提交
851 852 853
    case VIR_DOMAIN_SECRET_INFO_TYPE_LAST:
        return -1;
    }
854 855 856 857 858

    return 0;
}


859 860 861 862
/* qemuBuildTLSx509BackendProps:
 * @tlspath: path to the TLS credentials
 * @listen: boolen listen for client or server setting
 * @verifypeer: boolean to enable peer verification (form of authorization)
863
 * @alias: alias for the TLS credentials object
864
 * @secalias: if one exists, the alias of the security object for passwordid
865 866 867 868 869 870 871
 * @qemuCaps: capabilities
 * @propsret: json properties to return
 *
 * Create a backend string for the tls-creds-x509 object.
 *
 * Returns 0 on success, -1 on failure with error set.
 */
872
int
873
qemuBuildTLSx509BackendProps(const char *tlspath,
874
                             bool isListen,
875
                             bool verifypeer,
876
                             const char *alias,
877
                             const char *secalias,
878 879 880 881 882 883 884 885 886
                             virQEMUCapsPtr qemuCaps,
                             virJSONValuePtr *propsret)
{
    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_TLS_CREDS_X509)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("tls-creds-x509 not supported in this QEMU binary"));
        return -1;
    }

887 888 889 890 891 892
    if (qemuMonitorCreateObjectProps(propsret, "tls-creds-x509", alias,
                                     "s:dir", tlspath,
                                     "s:endpoint", (isListen ? "server": "client"),
                                     "b:verify-peer", (isListen ? verifypeer : true),
                                     "S:passwordid", secalias,
                                     NULL) < 0)
893
        return -1;
894

895
    return 0;
896 897 898 899 900 901 902 903
}


/* qemuBuildTLSx509CommandLine:
 * @cmd: Pointer to command
 * @tlspath: path to the TLS credentials
 * @listen: boolen listen for client or server setting
 * @verifypeer: boolean to enable peer verification (form of authorization)
904 905
 * @certEncSecretAlias: alias of a 'secret' object for decrypting TLS private key
 *                      (optional)
906
 * @alias: TLS object alias
907 908 909 910 911 912 913 914 915
 * @qemuCaps: capabilities
 *
 * Create the command line for a TLS object
 *
 * Returns 0 on success, -1 on failure with error set.
 */
static int
qemuBuildTLSx509CommandLine(virCommandPtr cmd,
                            const char *tlspath,
916
                            bool isListen,
917
                            bool verifypeer,
918
                            const char *certEncSecretAlias,
919
                            const char *alias,
920 921
                            virQEMUCapsPtr qemuCaps)
{
922
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
923
    VIR_AUTOPTR(virJSONValue) props = NULL;
924

925 926
    if (qemuBuildTLSx509BackendProps(tlspath, isListen, verifypeer, alias,
                                     certEncSecretAlias, qemuCaps, &props) < 0)
927
        return -1;
928

929
    if (virQEMUBuildObjectCommandlineFromJSON(&buf, props) < 0)
930
        return -1;
931

932 933
    virCommandAddArg(cmd, "-object");
    virCommandAddArgBuffer(cmd, &buf);
934

935
    return 0;
936 937 938
}


939 940 941 942
static char *
qemuBuildNetworkDriveURI(virStorageSourcePtr src,
                         qemuDomainSecretInfoPtr secinfo)
{
943
    VIR_AUTOPTR(virURI) uri = NULL;
944

945
    if (!(uri = qemuBlockStorageSourceGetURI(src)))
946
        return NULL;
947 948 949

    if (src->hosts->socket &&
        virAsprintf(&uri->query, "socket=%s", src->hosts->socket) < 0)
950
        return NULL;
951 952

    if (qemuBuildGeneralSecinfoURI(uri, secinfo) < 0)
953
        return NULL;
954

955
    return virURIFormat(uri);
956 957 958
}


959
static char *
960
qemuBuildNetworkDriveStr(virStorageSourcePtr src,
961
                         qemuDomainSecretInfoPtr secinfo)
962
{
963
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
964
    size_t i;
965
    char *ret = NULL;
966

967
    switch ((virStorageNetProtocol) src->protocol) {
968
        case VIR_STORAGE_NET_PROTOCOL_NBD:
969
            if (src->nhosts != 1) {
970 971
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               _("protocol '%s' accepts only one host"),
972
                               virStorageNetProtocolTypeToString(src->protocol));
973
                return NULL;
974 975
            }

976 977 978 979 980 981
            if (!((src->hosts->name && strchr(src->hosts->name, ':')) ||
                  (src->hosts->transport == VIR_STORAGE_NET_HOST_TRANS_TCP &&
                   !src->hosts->name) ||
                  (src->hosts->transport == VIR_STORAGE_NET_HOST_TRANS_UNIX &&
                   src->hosts->socket &&
                   src->hosts->socket[0] != '/'))) {
982 983 984

                virBufferAddLit(&buf, "nbd:");

985
                switch (src->hosts->transport) {
986
                case VIR_STORAGE_NET_HOST_TRANS_TCP:
987 988
                    virBufferAsprintf(&buf, "%s:%u",
                                      src->hosts->name, src->hosts->port);
989 990
                    break;

991
                case VIR_STORAGE_NET_HOST_TRANS_UNIX:
992
                    if (!src->hosts->socket) {
993 994 995
                        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                                       _("socket attribute required for "
                                         "unix transport"));
996
                        return NULL;
997 998
                    }

999
                    virBufferAsprintf(&buf, "unix:%s", src->hosts->socket);
1000 1001 1002 1003 1004
                    break;

                default:
                    virReportError(VIR_ERR_INTERNAL_ERROR,
                                   _("nbd does not support transport '%s'"),
1005
                                   virStorageNetHostTransportTypeToString(src->hosts->transport));
1006
                    return NULL;
1007 1008
                }

1009 1010
                if (src->path)
                    virBufferAsprintf(&buf, ":exportname=%s", src->path);
1011

1012
                if (virBufferCheckError(&buf) < 0)
1013
                    return NULL;
1014

1015
                return virBufferContentAndReset(&buf);
1016
            }
1017 1018 1019
            /* NBD code uses URI formatting scheme as others in some cases */
            ret = qemuBuildNetworkDriveURI(src, secinfo);
            break;
1020

1021 1022 1023 1024 1025 1026 1027
        case VIR_STORAGE_NET_PROTOCOL_HTTP:
        case VIR_STORAGE_NET_PROTOCOL_HTTPS:
        case VIR_STORAGE_NET_PROTOCOL_FTP:
        case VIR_STORAGE_NET_PROTOCOL_FTPS:
        case VIR_STORAGE_NET_PROTOCOL_TFTP:
        case VIR_STORAGE_NET_PROTOCOL_ISCSI:
        case VIR_STORAGE_NET_PROTOCOL_GLUSTER:
1028
            ret = qemuBuildNetworkDriveURI(src, secinfo);
1029 1030
            break;

1031
        case VIR_STORAGE_NET_PROTOCOL_SHEEPDOG:
1032
            if (!src->path) {
1033 1034
                virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                               _("missing disk source for 'sheepdog' protocol"));
1035
                return NULL;
1036 1037
            }

1038 1039
            if (src->nhosts == 0) {
                if (virAsprintf(&ret, "sheepdog:%s", src->path) < 0)
1040
                    return NULL;
1041
            } else if (src->nhosts == 1) {
1042
                if (virAsprintf(&ret, "sheepdog:%s:%u:%s",
1043
                                src->hosts->name, src->hosts->port,
1044
                                src->path) < 0)
1045
                    return NULL;
1046 1047 1048
            } else {
                virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                               _("protocol 'sheepdog' accepts up to one host"));
1049
                return NULL;
1050 1051 1052 1053
            }

            break;

1054
        case VIR_STORAGE_NET_PROTOCOL_RBD:
1055
            if (strchr(src->path, ':')) {
1056 1057
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("':' not allowed in RBD source volume name '%s'"),
1058
                               src->path);
1059
                return NULL;
1060 1061
            }

1062
            virBufferStrcat(&buf, "rbd:", src->volume, "/", src->path, NULL);
1063

1064 1065 1066
            if (src->snapshot)
                virBufferEscape(&buf, '\\', ":", "@%s", src->snapshot);

1067
            if (qemuBuildRBDSecinfoURI(&buf, secinfo) < 0)
1068
                return NULL;
1069

1070
            if (src->nhosts > 0) {
1071
                virBufferAddLit(&buf, ":mon_host=");
1072
                for (i = 0; i < src->nhosts; i++) {
1073 1074 1075 1076
                    if (i)
                        virBufferAddLit(&buf, "\\;");

                    /* assume host containing : is ipv6 */
1077 1078 1079
                    if (strchr(src->hosts[i].name, ':'))
                        virBufferEscape(&buf, '\\', ":", "[%s]",
                                        src->hosts[i].name);
1080
                    else
1081
                        virBufferAsprintf(&buf, "%s", src->hosts[i].name);
1082

1083
                    if (src->hosts[i].port)
1084
                        virBufferAsprintf(&buf, "\\:%u", src->hosts[i].port);
1085 1086 1087
                }
            }

1088 1089 1090
            if (src->configFile)
                virBufferEscape(&buf, '\\', ":", ":conf=%s", src->configFile);

1091
            if (virBufferCheckError(&buf) < 0)
1092
                return NULL;
1093 1094 1095 1096

            ret = virBufferContentAndReset(&buf);
            break;

1097 1098 1099
        case VIR_STORAGE_NET_PROTOCOL_VXHS:
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("VxHS protocol does not support URI syntax"));
1100
            return NULL;
1101

1102 1103 1104
        case VIR_STORAGE_NET_PROTOCOL_SSH:
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("'ssh' protocol is not yet supported"));
1105
            return NULL;
1106

1107
        case VIR_STORAGE_NET_PROTOCOL_LAST:
1108
        case VIR_STORAGE_NET_PROTOCOL_NONE:
1109 1110 1111
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unexpected network protocol '%s'"),
                           virStorageNetProtocolTypeToString(src->protocol));
1112
            return NULL;
1113
    }
1114 1115 1116 1117 1118

    return ret;
}


1119
int
1120
qemuGetDriveSourceString(virStorageSourcePtr src,
1121
                         qemuDomainSecretInfoPtr secinfo,
1122
                         char **source)
1123
{
1124 1125 1126 1127
    int actualType = virStorageSourceGetActualType(src);

    *source = NULL;

1128 1129 1130 1131
    /* return 1 for empty sources */
    if (virStorageSourceIsEmpty(src))
        return 1;

1132
    switch ((virStorageType)actualType) {
E
Eric Blake 已提交
1133 1134 1135
    case VIR_STORAGE_TYPE_BLOCK:
    case VIR_STORAGE_TYPE_FILE:
    case VIR_STORAGE_TYPE_DIR:
1136
        if (VIR_STRDUP(*source, src->path) < 0)
1137
            return -1;
1138 1139 1140

        break;

E
Eric Blake 已提交
1141
    case VIR_STORAGE_TYPE_NETWORK:
1142
        if (!(*source = qemuBuildNetworkDriveStr(src, secinfo)))
1143
            return -1;
1144 1145
        break;

E
Eric Blake 已提交
1146
    case VIR_STORAGE_TYPE_VOLUME:
1147
    case VIR_STORAGE_TYPE_NONE:
E
Eric Blake 已提交
1148
    case VIR_STORAGE_TYPE_LAST:
1149 1150 1151
        break;
    }

1152
    return 0;
1153 1154
}

P
Paolo Bonzini 已提交
1155

1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192
static bool
qemuDiskConfigBlkdeviotuneHasBasic(virDomainDiskDefPtr disk)
{
    return disk->blkdeviotune.total_bytes_sec ||
           disk->blkdeviotune.read_bytes_sec ||
           disk->blkdeviotune.write_bytes_sec ||
           disk->blkdeviotune.total_iops_sec ||
           disk->blkdeviotune.read_iops_sec ||
           disk->blkdeviotune.write_iops_sec;
}


static bool
qemuDiskConfigBlkdeviotuneHasMax(virDomainDiskDefPtr disk)
{
    return disk->blkdeviotune.total_bytes_sec_max ||
           disk->blkdeviotune.read_bytes_sec_max ||
           disk->blkdeviotune.write_bytes_sec_max ||
           disk->blkdeviotune.total_iops_sec_max ||
           disk->blkdeviotune.read_iops_sec_max ||
           disk->blkdeviotune.write_iops_sec_max ||
           disk->blkdeviotune.size_iops_sec;
}


static bool
qemuDiskConfigBlkdeviotuneHasMaxLength(virDomainDiskDefPtr disk)
{
    return disk->blkdeviotune.total_bytes_sec_max_length ||
           disk->blkdeviotune.read_bytes_sec_max_length ||
           disk->blkdeviotune.write_bytes_sec_max_length ||
           disk->blkdeviotune.total_iops_sec_max_length ||
           disk->blkdeviotune.read_iops_sec_max_length ||
           disk->blkdeviotune.write_iops_sec_max_length;
}


1193 1194 1195 1196 1197 1198 1199 1200 1201 1202
bool
qemuDiskConfigBlkdeviotuneEnabled(virDomainDiskDefPtr disk)
{
    return !!disk->blkdeviotune.group_name ||
           qemuDiskConfigBlkdeviotuneHasBasic(disk) ||
           qemuDiskConfigBlkdeviotuneHasMax(disk) ||
           qemuDiskConfigBlkdeviotuneHasMaxLength(disk);
}


1203 1204 1205 1206 1207 1208 1209 1210
/**
 * qemuCheckDiskConfigBlkdeviotune:
 * @disk: disk configuration
 * @qemuCaps: qemu capabilities, NULL if checking cold-configuration
 *
 * Checks whether block io tuning settings make sense. Returns -1 on error and
 * reports a proper libvirt error.
 */
1211 1212 1213 1214
static int
qemuCheckDiskConfigBlkdeviotune(virDomainDiskDefPtr disk,
                                virQEMUCapsPtr qemuCaps)
{
1215 1216 1217 1218 1219
    /* group_name by itself is ignored by qemu */
    if (disk->blkdeviotune.group_name &&
        !qemuDiskConfigBlkdeviotuneHasBasic(disk) &&
        !qemuDiskConfigBlkdeviotuneHasMax(disk) &&
        !qemuDiskConfigBlkdeviotuneHasMaxLength(disk)) {
1220
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
1221 1222
                       _("group_name can be configured only together with "
                         "settings"));
1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244
        return -1;
    }

    if (disk->blkdeviotune.total_bytes_sec > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.read_bytes_sec > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.write_bytes_sec > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.total_iops_sec > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.read_iops_sec > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.write_iops_sec > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.total_bytes_sec_max > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.read_bytes_sec_max > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.write_bytes_sec_max > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.total_iops_sec_max > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.read_iops_sec_max > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.write_iops_sec_max > QEMU_BLOCK_IOTUNE_MAX ||
        disk->blkdeviotune.size_iops_sec > QEMU_BLOCK_IOTUNE_MAX) {
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED,
                      _("block I/O throttle limit must "
                        "be no more than %llu using QEMU"), QEMU_BLOCK_IOTUNE_MAX);
        return -1;
    }

1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273
    if (qemuCaps) {
        /* block I/O throttling 1.7 */
        if (qemuDiskConfigBlkdeviotuneHasMax(disk) &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DRIVE_IOTUNE_MAX)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("there are some block I/O throttling parameters "
                             "that are not supported with this QEMU binary"));
            return -1;
        }

        /* block I/O group 2.4 */
        if (disk->blkdeviotune.group_name &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DRIVE_IOTUNE_GROUP)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("the block I/O throttling group parameter is "
                             "not supported with this QEMU binary"));
            return -1;
        }

        /* block I/O throttling length 2.6 */
        if (qemuDiskConfigBlkdeviotuneHasMaxLength(disk) &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DRIVE_IOTUNE_MAX_LENGTH)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("there are some block I/O throttling length parameters "
                             "that are not supported with this QEMU binary"));
            return -1;
        }
    }

1274 1275 1276 1277
    return 0;
}


1278 1279 1280 1281 1282 1283 1284 1285
/**
 * qemuCheckDiskConfig:
 * @disk: disk definition
 * @qemuCaps: qemu capabilities, may be NULL for cold-plug check
 *
 * Perform disk definition config validity checks. Returns -1 on error with
 * error reported.
 */
1286
int
1287 1288
qemuCheckDiskConfig(virDomainDiskDefPtr disk,
                    virQEMUCapsPtr qemuCaps)
1289
{
1290 1291 1292
    if (qemuCheckDiskConfigBlkdeviotune(disk, qemuCaps) < 0)
        return -1;

1293 1294 1295 1296 1297
    if (disk->wwn) {
        if ((disk->bus != VIR_DOMAIN_DISK_BUS_IDE) &&
            (disk->bus != VIR_DOMAIN_DISK_BUS_SCSI)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Only ide and scsi disk support wwn"));
1298
            return -1;
1299 1300 1301 1302 1303 1304 1305
        }
    }

    if ((disk->vendor || disk->product) &&
        disk->bus != VIR_DOMAIN_DISK_BUS_SCSI) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Only scsi disk supports vendor and product"));
1306
            return -1;
1307 1308 1309 1310 1311 1312 1313 1314 1315
    }

    if (disk->device == VIR_DOMAIN_DISK_DEVICE_LUN) {
        /* make sure that both the bus supports type='lun' (SG_IO). */
        if (disk->bus != VIR_DOMAIN_DISK_BUS_VIRTIO &&
            disk->bus != VIR_DOMAIN_DISK_BUS_SCSI) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("disk device='lun' is not supported for bus='%s'"),
                           virDomainDiskQEMUBusTypeToString(disk->bus));
1316
            return -1;
1317
        }
1318

1319 1320 1321 1322 1323 1324 1325 1326
        if (disk->bus == VIR_DOMAIN_DISK_BUS_SCSI &&
            disk->src->format != VIR_STORAGE_FILE_RAW) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("disk device 'lun' using target 'scsi' must use "
                             "'raw' format"));
            return -1;
        }

1327
        if (qemuDomainDefValidateDiskLunSource(disk->src) < 0)
1328
            return -1;
1329

1330 1331 1332
        if (disk->wwn) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Setting wwn is not supported for lun device"));
1333
            return -1;
1334 1335 1336 1337 1338
        }
        if (disk->vendor || disk->product) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Setting vendor or product is not supported "
                             "for lun device"));
1339
            return -1;
1340 1341
        }
    }
1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438

    switch (disk->bus) {
    case VIR_DOMAIN_DISK_BUS_SCSI:
        if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("unexpected address type for scsi disk"));
            return -1;
        }

        /* Setting bus= attr for SCSI drives, causes a controller
         * to be created. Yes this is slightly odd. It is not possible
         * to have > 1 bus on a SCSI controller (yet). */
        if (disk->info.addr.drive.bus != 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("SCSI controller only supports 1 bus"));
            return -1;
        }
        break;

    case VIR_DOMAIN_DISK_BUS_IDE:
        if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("unexpected address type for ide disk"));
            return -1;
        }
        /* We can only have 1 IDE controller (currently) */
        if (disk->info.addr.drive.controller != 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Only 1 IDE controller is supported"));
            return -1;
        }
        break;

    case VIR_DOMAIN_DISK_BUS_FDC:
        if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("unexpected address type for fdc disk"));
            return -1;
        }
        /* We can only have 1 FDC controller (currently) */
        if (disk->info.addr.drive.controller != 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Only 1 fdc controller is supported"));
            return -1;
        }
        /* We can only have 1 FDC bus (currently) */
        if (disk->info.addr.drive.bus != 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Only 1 fdc bus is supported"));
            return -1;
        }
        if (disk->info.addr.drive.target != 0) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("target must be 0 for controller fdc"));
            return -1;
        }
        break;

    case VIR_DOMAIN_DISK_BUS_VIRTIO:
    case VIR_DOMAIN_DISK_BUS_XEN:
    case VIR_DOMAIN_DISK_BUS_SD:
        break;
    }

    if (disk->src->readonly &&
        disk->device == VIR_DOMAIN_DISK_DEVICE_DISK) {
        if (disk->bus == VIR_DOMAIN_DISK_BUS_IDE) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("readonly ide disks are not supported"));
            return -1;
        }

        if (disk->bus == VIR_DOMAIN_DISK_BUS_SATA) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("readonly sata disks are not supported"));
            return -1;
        }
    }

    if (disk->transient) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("transient disks not supported yet"));
        return -1;
    }

    if (disk->iomode == VIR_DOMAIN_DISK_IO_NATIVE &&
        disk->cachemode != VIR_DOMAIN_DISK_CACHE_DIRECTSYNC &&
        disk->cachemode != VIR_DOMAIN_DISK_CACHE_DISABLE) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("native I/O needs either no disk cache "
                         "or directsync cache mode, QEMU will fallback "
                         "to aio=threads"));
        return -1;
    }

    if (qemuCaps) {
        if (disk->serial &&
1439 1440 1441 1442 1443 1444
            disk->bus == VIR_DOMAIN_DISK_BUS_SCSI &&
            disk->device == VIR_DOMAIN_DISK_DEVICE_LUN) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("scsi-block 'lun' devices do not support the "
                             "serial property"));
            return -1;
1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461
        }

        if (disk->discard &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DRIVE_DISCARD)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("discard is not supported by this QEMU binary"));
            return -1;
        }

        if (disk->detect_zeroes &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DRIVE_DETECT_ZEROES)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("detect_zeroes is not supported by this QEMU binary"));
            return -1;
        }
    }

1462 1463 1464 1465
    if (disk->serial &&
        qemuSafeSerialParamValue(disk->serial) < 0)
        return -1;

1466 1467 1468 1469
    return 0;
}


P
Philipp Hahn 已提交
1470
/* QEMU 1.2 and later have a binary flag -enable-fips that must be
1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483
 * used for VNC auth to obey FIPS settings; but the flag only
 * exists on Linux, and with no way to probe for it via QMP.  Our
 * solution: if FIPS mode is required, then unconditionally use
 * the flag, regardless of qemu version, for the following matrix:
 *
 *                          old QEMU            new QEMU
 * FIPS enabled             doesn't start       VNC auth disabled
 * FIPS disabled/missing    VNC auth enabled    VNC auth enabled
 */
bool
qemuCheckFips(void)
{
    if (virFileExists("/proc/sys/crypto/fips_enabled")) {
1484
        VIR_AUTOFREE(char *) buf = NULL;
1485 1486

        if (virFileReadAll("/proc/sys/crypto/fips_enabled", 10, &buf) < 0)
1487
            return false;
1488
        if (STREQ(buf, "1\n"))
1489
            return true;
1490 1491
    }

1492
    return false;
1493 1494 1495
}


1496 1497 1498 1499 1500 1501 1502 1503 1504 1505
/**
 * qemuDiskBusNeedsDriveArg:
 * @bus: disk bus
 *
 * Unfortunately it is not possible to use -device for SD devices.
 * Fortunately, those don't need static PCI addresses, so we can use -drive
 * without -device.
 */
bool
qemuDiskBusNeedsDriveArg(int bus)
J
Ján Tomko 已提交
1506
{
1507
    return bus == VIR_DOMAIN_DISK_BUS_SD;
J
Ján Tomko 已提交
1508 1509 1510
}


1511 1512 1513 1514 1515 1516 1517 1518 1519
/**
 * qemuDiskSourceNeedsProps:
 * @src: disk source
 *
 * Returns true, if the disk source needs to be generated from the JSON
 * representation. Otherwise, the disk source should be represented using
 * the legacy representation.
 */
static bool
1520 1521
qemuDiskSourceNeedsProps(virStorageSourcePtr src,
                         virQEMUCapsPtr qemuCaps)
1522 1523 1524 1525 1526 1527 1528 1529
{
    int actualType = virStorageSourceGetActualType(src);

    if (actualType == VIR_STORAGE_TYPE_NETWORK &&
        src->protocol == VIR_STORAGE_NET_PROTOCOL_GLUSTER &&
        src->nhosts > 1)
        return true;

1530 1531 1532 1533
    if (actualType == VIR_STORAGE_TYPE_NETWORK &&
        src->protocol == VIR_STORAGE_NET_PROTOCOL_VXHS)
        return true;

1534 1535 1536 1537 1538
    if (actualType == VIR_STORAGE_TYPE_NETWORK &&
        src->protocol == VIR_STORAGE_NET_PROTOCOL_ISCSI &&
        virQEMUCapsGet(qemuCaps, QEMU_CAPS_ISCSI_PASSWORD_SECRET))
        return true;

1539 1540 1541 1542 1543
    if (actualType == VIR_STORAGE_TYPE_NETWORK &&
        src->protocol == VIR_STORAGE_NET_PROTOCOL_NBD &&
        src->haveTLS == VIR_TRISTATE_BOOL_YES)
        return true;

1544 1545 1546 1547
    return false;
}


1548 1549 1550 1551 1552 1553 1554 1555 1556 1557
/**
 * qemuDiskSourceGetProps:
 * @src: disk source struct
 *
 * Returns the disk source struct wrapped so that it can be used as disk source
 * directly by converting it from json.
 */
static virJSONValuePtr
qemuDiskSourceGetProps(virStorageSourcePtr src)
{
1558
    VIR_AUTOPTR(virJSONValue) props = NULL;
1559 1560
    virJSONValuePtr ret;

1561
    if (!(props = qemuBlockStorageSourceGetBackendProps(src, true, false, false)))
1562 1563
        return NULL;

1564
    if (virJSONValueObjectCreate(&ret, "a:file", &props, NULL) < 0)
1565 1566 1567 1568 1569 1570
        return NULL;

    return ret;
}


1571 1572 1573 1574
static int
qemuBuildDriveSourcePR(virBufferPtr buf,
                       virDomainDiskDefPtr disk)
{
1575
    VIR_AUTOFREE(char *) alias = NULL;
1576 1577
    const char *defaultAlias = NULL;

1578
    if (!disk->src->pr)
1579 1580 1581 1582
        return 0;

    if (virStoragePRDefIsManaged(disk->src->pr))
        defaultAlias = qemuDomainGetManagedPRAlias();
1583
    else if (!(alias = qemuDomainGetUnmanagedPRAlias(disk->info.alias)))
1584 1585 1586 1587 1588 1589 1590 1591
        return -1;


    virBufferAsprintf(buf, ",file.pr-manager=%s", alias ? alias : defaultAlias);
    return 0;
}


1592 1593
static int
qemuBuildDriveSourceStr(virDomainDiskDefPtr disk,
1594
                        virQEMUCapsPtr qemuCaps,
1595
                        virBufferPtr buf)
1596 1597
{
    int actualType = virStorageSourceGetActualType(disk->src);
1598
    qemuDomainStorageSourcePrivatePtr srcpriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(disk->src);
1599 1600
    qemuDomainSecretInfoPtr secinfo = NULL;
    qemuDomainSecretInfoPtr encinfo = NULL;
1601
    VIR_AUTOPTR(virJSONValue) srcprops = NULL;
1602
    VIR_AUTOFREE(char *) source = NULL;
1603
    bool rawluks = false;
1604

1605 1606 1607 1608 1609
    if (srcpriv) {
        secinfo = srcpriv->secinfo;
        encinfo = srcpriv->encinfo;
    }

1610
    if (qemuDiskSourceNeedsProps(disk->src, qemuCaps) &&
1611
        !(srcprops = qemuDiskSourceGetProps(disk->src)))
1612
        return -1;
1613 1614 1615

    if (!srcprops &&
        qemuGetDriveSourceString(disk->src, secinfo, &source) < 0)
1616
        return -1;
1617

1618
    /* nothing to format if the drive is empty */
1619
    if (!(source || srcprops) ||
1620 1621 1622
        ((disk->device == VIR_DOMAIN_DISK_DEVICE_FLOPPY ||
          disk->device == VIR_DOMAIN_DISK_DEVICE_CDROM) &&
         disk->tray_status == VIR_DOMAIN_DISK_TRAY_OPEN)) {
1623
        return 0;
1624
    }
1625

1626 1627 1628 1629 1630 1631
    if (actualType == VIR_STORAGE_TYPE_BLOCK &&
        disk->tray_status == VIR_DOMAIN_DISK_TRAY_OPEN) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       disk->src->type == VIR_STORAGE_TYPE_VOLUME ?
                       _("tray status 'open' is invalid for block type volume") :
                       _("tray status 'open' is invalid for block type disk"));
1632
        return -1;
1633
    }
1634

1635 1636
    if (source) {
        virBufferAddLit(buf, "file=");
1637

1638 1639 1640 1641 1642 1643
        /* for now the DIR based storage is handled by the magic FAT format */
        if (actualType == VIR_STORAGE_TYPE_DIR) {
            virBufferAddLit(buf, "fat:");

            if (disk->device == VIR_DOMAIN_DISK_DEVICE_FLOPPY)
                virBufferAddLit(buf, "floppy:");
1644 1645
        }

1646
        virQEMUBuildBufferEscapeComma(buf, source);
1647 1648 1649

        if (secinfo && secinfo->type == VIR_DOMAIN_SECRET_INFO_TYPE_AES)
            virBufferAsprintf(buf, ",file.password-secret=%s", secinfo->s.aes.alias);
1650 1651 1652

        if (disk->src->debug)
            virBufferAsprintf(buf, ",file.debug=%d", disk->src->debugLevel);
1653 1654

        if (qemuBuildDriveSourcePR(buf, disk) < 0)
1655
            return -1;
1656 1657
    } else {
        if (!(source = virQEMUBuildDriveCommandlineFromJSON(srcprops)))
1658
            return -1;
1659

1660
        virBufferAdd(buf, source, -1);
1661 1662
    }
    virBufferAddLit(buf, ",");
1663

1664 1665 1666 1667 1668 1669 1670 1671 1672 1673
    if (encinfo) {
        if (disk->src->format == VIR_STORAGE_FILE_RAW) {
            virBufferAsprintf(buf, "key-secret=%s,", encinfo->s.aes.alias);
            rawluks = true;
        } else if (disk->src->format == VIR_STORAGE_FILE_QCOW2 &&
                   disk->src->encryption->format == VIR_STORAGE_ENCRYPTION_FORMAT_LUKS) {
            virBufferAddLit(buf, "encrypt.format=luks,");
            virBufferAsprintf(buf, "encrypt.key-secret=%s,", encinfo->s.aes.alias);
        }
    }
1674 1675

    if (disk->src->format > 0 &&
1676
        actualType != VIR_STORAGE_TYPE_DIR) {
1677
        const char *qemuformat = virStorageFileFormatTypeToString(disk->src->format);
1678
        if (rawluks)
1679 1680 1681
            qemuformat = "luks";
        virBufferAsprintf(buf, "format=%s,", qemuformat);
    }
1682

1683
    return 0;
1684 1685 1686
}


1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712
static void
qemuBuildDiskThrottling(virDomainDiskDefPtr disk,
                        virBufferPtr buf)
{
#define IOTUNE_ADD(_field, _label) \
    if (disk->blkdeviotune._field) { \
        virBufferAsprintf(buf, ",throttling." _label "=%llu", \
                          disk->blkdeviotune._field); \
    }

    IOTUNE_ADD(total_bytes_sec, "bps-total");
    IOTUNE_ADD(read_bytes_sec, "bps-read");
    IOTUNE_ADD(write_bytes_sec, "bps-write");
    IOTUNE_ADD(total_iops_sec, "iops-total");
    IOTUNE_ADD(read_iops_sec, "iops-read");
    IOTUNE_ADD(write_iops_sec, "iops-write");

    IOTUNE_ADD(total_bytes_sec_max, "bps-total-max");
    IOTUNE_ADD(read_bytes_sec_max, "bps-read-max");
    IOTUNE_ADD(write_bytes_sec_max, "bps-write-max");
    IOTUNE_ADD(total_iops_sec_max, "iops-total-max");
    IOTUNE_ADD(read_iops_sec_max, "iops-read-max");
    IOTUNE_ADD(write_iops_sec_max, "iops-write-max");

    IOTUNE_ADD(size_iops_sec, "iops-size");
    if (disk->blkdeviotune.group_name) {
1713 1714
        virBufferAddLit(buf, ",throttling.group=");
        virQEMUBuildBufferEscapeComma(buf, disk->blkdeviotune.group_name);
1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726
    }

    IOTUNE_ADD(total_bytes_sec_max_length, "bps-total-max-length");
    IOTUNE_ADD(read_bytes_sec_max_length, "bps-read-max-length");
    IOTUNE_ADD(write_bytes_sec_max_length, "bps-write-max-length");
    IOTUNE_ADD(total_iops_sec_max_length, "iops-total-max-length");
    IOTUNE_ADD(read_iops_sec_max_length, "iops-read-max-length");
    IOTUNE_ADD(write_iops_sec_max_length, "iops-write-max-length");
#undef IOTUNE_ADD
}


1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757
static void
qemuBuildDiskFrontendAttributeErrorPolicy(virDomainDiskDefPtr disk,
                                          virBufferPtr buf)
{
    const char *wpolicy = NULL;
    const char *rpolicy = NULL;

    if (disk->error_policy)
        wpolicy = virDomainDiskErrorPolicyTypeToString(disk->error_policy);

    if (disk->rerror_policy)
        rpolicy = virDomainDiskErrorPolicyTypeToString(disk->rerror_policy);

    if (disk->error_policy == VIR_DOMAIN_DISK_ERROR_POLICY_ENOSPACE) {
        /* in the case of enospace, the option is spelled
         * differently in qemu, and it's only valid for werror,
         * not for rerror, so leave rerror NULL.
         */
        wpolicy = "enospc";
    } else if (!rpolicy) {
        /* for other policies, rpolicy can match wpolicy */
        rpolicy = wpolicy;
    }

    if (wpolicy)
        virBufferAsprintf(buf, ",werror=%s", wpolicy);
    if (rpolicy)
        virBufferAsprintf(buf, ",rerror=%s", rpolicy);
}


1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771
static void
qemuBuildDiskFrontendAttributes(virDomainDiskDefPtr disk,
                                virBufferPtr buf)
{
    /* generate geometry command string */
    if (disk->geometry.cylinders > 0 &&
        disk->geometry.heads > 0 &&
        disk->geometry.sectors > 0) {
        virBufferAsprintf(buf, ",cyls=%u,heads=%u,secs=%u",
                          disk->geometry.cylinders,
                          disk->geometry.heads,
                          disk->geometry.sectors);

        if (disk->geometry.trans != VIR_DOMAIN_DISK_TRANS_DEFAULT)
1772
            virBufferAsprintf(buf, ",bios-chs-trans=%s",
1773 1774
                              virDomainDiskGeometryTransTypeToString(disk->geometry.trans));
    }
1775

1776
    if (disk->serial) {
1777 1778 1779
        virBufferAddLit(buf, ",serial=");
        virBufferEscape(buf, '\\', " ", "%s", disk->serial);
    }
1780 1781 1782
}


1783
static char *
1784 1785 1786
qemuBuildDriveStr(virDomainDiskDefPtr disk,
                  virQEMUCapsPtr qemuCaps)
{
1787
    VIR_AUTOCLEAN(virBuffer) opt = VIR_BUFFER_INITIALIZER;
1788 1789
    int detect_zeroes = virDomainDiskGetDetectZeroesMode(disk->discard,
                                                         disk->detect_zeroes);
1790

1791
    if (qemuBuildDriveSourceStr(disk, qemuCaps, &opt) < 0)
1792 1793
        goto error;

1794
    if (!qemuDiskBusNeedsDriveArg(disk->bus)) {
1795
        VIR_AUTOFREE(char *) drivealias = qemuAliasDiskDriveFromDisk(disk);
1796 1797
        if (!drivealias)
            goto error;
1798 1799

        virBufferAddLit(&opt, "if=none");
1800
        virBufferAsprintf(&opt, ",id=%s", drivealias);
1801
    } else {
1802 1803 1804 1805 1806 1807 1808
        int idx = virDiskNameToIndex(disk->dst);

        if (idx < 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("unsupported disk type '%s'"), disk->dst);
            goto error;
        }
1809 1810 1811 1812 1813 1814 1815

        /* if we are using -device this will be checked elsewhere */
        if (qemuCheckDiskConfig(disk, qemuCaps) < 0)
            goto error;

        virBufferAsprintf(&opt, "if=%s",
                          virDomainDiskQEMUBusTypeToString(disk->bus));
1816
        virBufferAsprintf(&opt, ",index=%d", idx);
1817
    }
1818

1819 1820
    /* werror/rerror are really frontend attributes, but older
     * qemu requires them on -drive instead of -device */
1821 1822
    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_USB_STORAGE_WERROR))
        qemuBuildDiskFrontendAttributeErrorPolicy(disk, &opt);
1823

1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834
    if (disk->src->readonly)
        virBufferAddLit(&opt, ",readonly=on");

    /* qemu rejects some parameters for an empty -drive, so we need to skip
     * them in that case:
     * cache: modifies properties of the format driver which is not present
     * copy_on_read: really only works for floppies
     * discard: modifies properties of format driver
     * detect_zeroes: works but really depends on discard so it's useless
     * iomode: setting it to 'native' requires a specific cache mode
     */
1835 1836 1837 1838 1839
    if (!virStorageSourceIsEmpty(disk->src)) {
        if (disk->cachemode) {
            virBufferAsprintf(&opt, ",cache=%s",
                              qemuDiskCacheV2TypeToString(disk->cachemode));
        }
1840

1841 1842 1843 1844
        if (disk->copy_on_read) {
            virBufferAsprintf(&opt, ",copy-on-read=%s",
                              virTristateSwitchTypeToString(disk->copy_on_read));
        }
1845

1846 1847 1848 1849
        if (disk->discard) {
            virBufferAsprintf(&opt, ",discard=%s",
                              virDomainDiskDiscardTypeToString(disk->discard));
        }
O
Osier Yang 已提交
1850

1851 1852 1853 1854
        if (detect_zeroes) {
            virBufferAsprintf(&opt, ",detect-zeroes=%s",
                              virDomainDiskDetectZeroesTypeToString(detect_zeroes));
        }
O
Osier Yang 已提交
1855

1856 1857 1858 1859
        if (disk->iomode) {
            virBufferAsprintf(&opt, ",aio=%s",
                              virDomainDiskIoTypeToString(disk->iomode));
        }
E
Eric Blake 已提交
1860 1861
    }

1862 1863
    qemuBuildDiskThrottling(disk, &opt);

1864
    if (virBufferCheckError(&opt) < 0)
1865 1866 1867 1868
        goto error;

    return virBufferContentAndReset(&opt);

1869
 error:
1870 1871 1872
    return NULL;
}

1873

1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916
static bool
qemuCheckIOThreads(const virDomainDef *def,
                   virDomainDiskDefPtr disk)
{
    /* Right "type" of disk" */
    switch ((virDomainDiskBus)disk->bus) {
    case VIR_DOMAIN_DISK_BUS_VIRTIO:
        if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI &&
            disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                            _("IOThreads only available for virtio pci and "
                              "virtio ccw disk"));
            return false;
        }
        break;

    case VIR_DOMAIN_DISK_BUS_IDE:
    case VIR_DOMAIN_DISK_BUS_FDC:
    case VIR_DOMAIN_DISK_BUS_SCSI:
    case VIR_DOMAIN_DISK_BUS_XEN:
    case VIR_DOMAIN_DISK_BUS_USB:
    case VIR_DOMAIN_DISK_BUS_UML:
    case VIR_DOMAIN_DISK_BUS_SATA:
    case VIR_DOMAIN_DISK_BUS_SD:
    case VIR_DOMAIN_DISK_BUS_LAST:
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("IOThreads not available for bus %s target %s"),
                       virDomainDiskBusTypeToString(disk->bus), disk->dst);
        return false;
    }

    /* Can we find the disk iothread in the iothreadid list? */
    if (!virDomainIOThreadIDFind(def, disk->iothread)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Disk iothread '%u' not defined in iothreadid"),
                       disk->iothread);
        return false;
    }

    return true;
}


1917 1918 1919 1920 1921 1922 1923 1924 1925 1926
static int
qemuBuildDriveDevCacheStr(virDomainDiskDefPtr disk,
                          virBufferPtr buf,
                          virQEMUCapsPtr qemuCaps)
{
    bool wb;

    if (disk->cachemode == VIR_DOMAIN_DISK_CACHE_DEFAULT)
        return 0;

1927 1928 1929 1930 1931
    /* VIR_DOMAIN_DISK_DEVICE_LUN translates into 'scsi-block'
     * where any caching setting makes no sense. */
    if (disk->device == VIR_DOMAIN_DISK_DEVICE_LUN)
        return 0;

1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945
    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DISK_WRITE_CACHE))
        return 0;

    if (qemuDomainDiskCachemodeFlags(disk->cachemode, &wb, NULL, NULL) < 0)
        return -1;

    virBufferStrcat(buf, ",write-cache=",
                    virTristateSwitchTypeToString(virTristateSwitchFromBool(wb)),
                    NULL);

    return 0;
}


1946
char *
1947 1948 1949 1950
qemuBuildDiskDeviceStr(const virDomainDef *def,
                       virDomainDiskDefPtr disk,
                       unsigned int bootindex,
                       virQEMUCapsPtr qemuCaps)
1951
{
1952
    VIR_AUTOCLEAN(virBuffer) opt = VIR_BUFFER_INITIALIZER;
1953
    const char *bus = virDomainDiskQEMUBusTypeToString(disk->bus);
1954
    const char *contAlias;
1955
    VIR_AUTOFREE(char *) backendAlias = NULL;
1956
    VIR_AUTOFREE(char *) scsiVPDDeviceId = NULL;
1957
    int controllerModel;
1958

1959
    if (qemuCheckDiskConfig(disk, qemuCaps) < 0)
1960
        goto error;
1961

1962
    if (!qemuDomainCheckCCWS390AddressSupport(def, &disk->info, qemuCaps, disk->dst))
1963 1964
        goto error;

1965 1966 1967
    if (disk->iothread && !qemuCheckIOThreads(def, disk))
        goto error;

1968
    switch ((virDomainDiskBus) disk->bus) {
1969
    case VIR_DOMAIN_DISK_BUS_IDE:
1970
        if (disk->info.addr.drive.target != 0) {
1971 1972
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("target must be 0 for ide controller"));
1973 1974
            goto error;
        }
1975

1976
        if (disk->wwn &&
1977
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_IDE_DRIVE_WWN)) {
1978 1979 1980 1981 1982 1983
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Setting wwn for ide disk is not supported "
                             "by this QEMU"));
            goto error;
        }

1984 1985 1986 1987
        if (disk->device == VIR_DOMAIN_DISK_DEVICE_CDROM)
            virBufferAddLit(&opt, "ide-cd");
        else
            virBufferAddLit(&opt, "ide-hd");
1988

1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999
        /* When domain has builtin IDE controller we don't put it onto cmd
         * line. Therefore we can't set its alias. In that case, use the
         * default one. */
        if (qemuDomainHasBuiltinIDE(def)) {
            contAlias = "ide";
        } else {
            if (!(contAlias = virDomainControllerAliasFind(def,
                                                           VIR_DOMAIN_CONTROLLER_TYPE_IDE,
                                                           disk->info.addr.drive.controller)))
                goto error;
        }
2000 2001
        virBufferAsprintf(&opt, ",bus=%s.%d,unit=%d",
                          contAlias,
2002 2003 2004
                          disk->info.addr.drive.bus,
                          disk->info.addr.drive.unit);
        break;
2005

2006
    case VIR_DOMAIN_DISK_BUS_SCSI:
2007
        if (disk->device == VIR_DOMAIN_DISK_DEVICE_LUN) {
2008
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SCSI_BLOCK)) {
2009 2010 2011
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("This QEMU doesn't support scsi-block for "
                                 "lun passthrough"));
2012 2013 2014 2015
                goto error;
            }
        }

2016
        if (disk->wwn &&
2017
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_SCSI_DISK_WWN)) {
2018 2019 2020 2021 2022 2023
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Setting wwn for scsi disk is not supported "
                             "by this QEMU"));
            goto error;
        }

2024 2025 2026 2027
        /* Properties wwn, vendor and product were introduced in the
         * same QEMU release (1.2.0).
         */
        if ((disk->vendor || disk->product) &&
2028
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_SCSI_DISK_WWN)) {
2029 2030 2031 2032 2033 2034
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Setting vendor or product for scsi disk is not "
                             "supported by this QEMU"));
            goto error;
        }

2035
        controllerModel = qemuDomainFindSCSIControllerModel(def, &disk->info);
2036
        if (controllerModel < 0)
2037
            goto error;
2038

2039 2040 2041
        if (disk->device == VIR_DOMAIN_DISK_DEVICE_LUN) {
            virBufferAddLit(&opt, "scsi-block");
        } else {
2042 2043 2044 2045
            if (disk->device == VIR_DOMAIN_DISK_DEVICE_CDROM)
                virBufferAddLit(&opt, "scsi-cd");
            else
                virBufferAddLit(&opt, "scsi-hd");
2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060

            /* qemu historically used the name of -drive as one of the device
             * ids in the Vital Product Data Device Identification page if
             * disk serial was not set and the disk serial otherwise.
             * To avoid a guest-visible regression we need to provide it
             * ourselves especially for cases when -blockdev will be used */
            if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_SCSI_DISK_DEVICE_ID)) {
                if (disk->serial) {
                    if (VIR_STRDUP(scsiVPDDeviceId, disk->serial) < 0)
                        goto error;
                } else {
                    if (!(scsiVPDDeviceId = qemuAliasDiskDriveFromDisk(disk)))
                        goto error;
                }
            }
2061 2062
        }

2063 2064 2065 2066
        if (!(contAlias = virDomainControllerAliasFind(def, VIR_DOMAIN_CONTROLLER_TYPE_SCSI,
                                                       disk->info.addr.drive.controller)))
           goto error;

2067 2068
        if (controllerModel == VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LSILOGIC) {
            if (disk->info.addr.drive.target != 0) {
2069 2070 2071
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("target must be 0 for controller "
                                 "model 'lsilogic'"));
2072 2073 2074
                goto error;
            }

2075 2076
            virBufferAsprintf(&opt, ",bus=%s.%d,scsi-id=%d",
                              contAlias,
2077 2078 2079
                              disk->info.addr.drive.bus,
                              disk->info.addr.drive.unit);
        } else {
2080
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SCSI_DISK_CHANNEL)) {
2081
                if (disk->info.addr.drive.target > 7) {
2082 2083 2084
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("This QEMU doesn't support target "
                                     "greater than 7"));
2085 2086 2087
                    goto error;
                }

2088 2089
                if (disk->info.addr.drive.bus != 0 &&
                    disk->info.addr.drive.unit != 0) {
2090 2091 2092
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("This QEMU only supports both bus and "
                                     "unit equal to 0"));
2093 2094 2095 2096
                    goto error;
                }
            }

2097 2098
            virBufferAsprintf(&opt, ",bus=%s.0,channel=%d,scsi-id=%d,lun=%d",
                              contAlias,
2099 2100 2101 2102
                              disk->info.addr.drive.bus,
                              disk->info.addr.drive.target,
                              disk->info.addr.drive.unit);
        }
2103 2104 2105 2106

        if (scsiVPDDeviceId)
            virBufferStrcat(&opt, ",device_id=", scsiVPDDeviceId, NULL);

2107
        break;
2108

J
Jim Fehlig 已提交
2109
    case VIR_DOMAIN_DISK_BUS_SATA:
2110
        if (disk->info.addr.drive.bus != 0) {
2111 2112
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("bus must be 0 for ide controller"));
2113 2114 2115
            goto error;
        }
        if (disk->info.addr.drive.target != 0) {
2116 2117
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("target must be 0 for ide controller"));
2118 2119
            goto error;
        }
2120

2121 2122 2123 2124
        if (disk->device == VIR_DOMAIN_DISK_DEVICE_CDROM)
            virBufferAddLit(&opt, "ide-cd");
        else
            virBufferAddLit(&opt, "ide-hd");
2125

2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136 2137
        /* When domain has builtin SATA controller we don't put it onto cmd
         * line. Therefore we can't set its alias. In that case, use the
         * default one. */
        if (qemuDomainIsQ35(def) &&
            disk->info.addr.drive.controller == 0) {
            contAlias = "ide";
        } else {
            if (!(contAlias = virDomainControllerAliasFind(def,
                                                           VIR_DOMAIN_CONTROLLER_TYPE_SATA,
                                                           disk->info.addr.drive.controller)))
                goto error;
        }
2138 2139 2140
        virBufferAsprintf(&opt, ",bus=%s.%d",
                          contAlias,
                          disk->info.addr.drive.unit);
J
Jim Fehlig 已提交
2141
        break;
2142

2143
    case VIR_DOMAIN_DISK_BUS_VIRTIO:
2144
        if (qemuBuildVirtioDevStr(&opt, "virtio-blk", qemuCaps,
2145
                                  VIR_DOMAIN_DEVICE_DISK, disk) < 0) {
2146
            goto error;
2147
        }
2148

2149
        if (disk->iothread)
2150 2151
            virBufferAsprintf(&opt, ",iothread=iothread%u", disk->iothread);

2152
        qemuBuildIoEventFdStr(&opt, disk->ioeventfd, qemuCaps);
2153
        if (disk->event_idx &&
2154
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_BLK_EVENT_IDX)) {
2155
            virBufferAsprintf(&opt, ",event_idx=%s",
J
Ján Tomko 已提交
2156
                              virTristateSwitchTypeToString(disk->event_idx));
2157
        }
2158
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_BLK_SCSI)) {
2159 2160 2161 2162 2163 2164 2165
            /* if sg_io is true but the scsi option isn't supported,
             * that means it's just always on in this version of qemu.
             */
            virBufferAsprintf(&opt, ",scsi=%s",
                              (disk->device == VIR_DOMAIN_DISK_DEVICE_LUN)
                              ? "on" : "off");
        }
2166

L
Lin Ma 已提交
2167 2168 2169 2170 2171 2172 2173 2174 2175 2176 2177
        if (disk->queues) {
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_BLK_NUM_QUEUES)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("num-queues property isn't supported by this "
                                 "QEMU binary"));
                goto error;
            }

            virBufferAsprintf(&opt, ",num-queues=%u", disk->queues);
        }

2178 2179 2180
        if (qemuBuildVirtioOptionsStr(&opt, disk->virtio, qemuCaps) < 0)
            goto error;

2181
        if (qemuBuildDeviceAddressStr(&opt, def, &disk->info, qemuCaps) < 0)
A
Alex Jia 已提交
2182
            goto error;
2183
        break;
2184

2185
    case VIR_DOMAIN_DISK_BUS_USB:
2186 2187 2188 2189 2190 2191
        if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE &&
            disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_USB) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("unexpected address type for usb disk"));
            goto error;
        }
2192 2193 2194 2195 2196 2197 2198
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_USB_STORAGE)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("This QEMU doesn't support '-device "
                             "usb-storage'"));
            goto error;

        }
2199
        virBufferAddLit(&opt, "usb-storage");
2200

2201
        if (qemuBuildDeviceAddressStr(&opt, def, &disk->info, qemuCaps) < 0)
2202
            goto error;
2203
        break;
2204

2205 2206 2207 2208
    case VIR_DOMAIN_DISK_BUS_FDC:
        virBufferAsprintf(&opt, "floppy,unit=%d", disk->info.addr.drive.unit);
        break;

2209 2210 2211 2212
    case VIR_DOMAIN_DISK_BUS_XEN:
    case VIR_DOMAIN_DISK_BUS_UML:
    case VIR_DOMAIN_DISK_BUS_SD:
    case VIR_DOMAIN_DISK_BUS_LAST:
2213
    default:
2214 2215
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("unsupported disk bus '%s' with device setup"), bus);
2216 2217
        goto error;
    }
2218

2219 2220 2221 2222
    if (disk->src->shared &&
        virQEMUCapsGet(qemuCaps, QEMU_CAPS_DISK_SHARE_RW))
        virBufferAddLit(&opt, ",share-rw=on");

2223
    if (qemuDomainDiskGetBackendAlias(disk, qemuCaps, &backendAlias) < 0)
2224
        goto error;
2225 2226 2227 2228 2229

    if (backendAlias)
        virBufferAsprintf(&opt, ",drive=%s", backendAlias);

    virBufferAsprintf(&opt, ",id=%s", disk->info.alias);
2230
    if (bootindex)
2231
        virBufferAsprintf(&opt, ",bootindex=%u", bootindex);
2232
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_BLOCKIO)) {
V
Viktor Mihajlovski 已提交
2233
        if (disk->blockio.logical_block_size > 0)
2234
            virBufferAsprintf(&opt, ",logical_block_size=%u",
V
Viktor Mihajlovski 已提交
2235 2236
                              disk->blockio.logical_block_size);
        if (disk->blockio.physical_block_size > 0)
2237
            virBufferAsprintf(&opt, ",physical_block_size=%u",
V
Viktor Mihajlovski 已提交
2238
                              disk->blockio.physical_block_size);
2239
    }
2240

2241 2242 2243 2244 2245 2246
    if (disk->wwn) {
        if (STRPREFIX(disk->wwn, "0x"))
            virBufferAsprintf(&opt, ",wwn=%s", disk->wwn);
        else
            virBufferAsprintf(&opt, ",wwn=0x%s", disk->wwn);
    }
2247

2248 2249 2250 2251
    if (disk->vendor) {
        virBufferAddLit(&opt, ",vendor=");
        virQEMUBuildBufferEscapeComma(&opt, disk->vendor);
    }
2252

2253 2254 2255 2256
    if (disk->product) {
        virBufferAddLit(&opt, ",product=");
        virQEMUBuildBufferEscapeComma(&opt, disk->product);
    }
2257

2258 2259
    if (disk->bus == VIR_DOMAIN_DISK_BUS_USB) {
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_USB_STORAGE_REMOVABLE)) {
J
Ján Tomko 已提交
2260
            if (disk->removable == VIR_TRISTATE_SWITCH_ON)
2261 2262 2263 2264
                virBufferAddLit(&opt, ",removable=on");
            else
                virBufferAddLit(&opt, ",removable=off");
        } else {
J
Ján Tomko 已提交
2265
            if (disk->removable != VIR_TRISTATE_SWITCH_ABSENT) {
2266 2267 2268 2269 2270 2271 2272 2273
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("This QEMU doesn't support setting the "
                                 "removable flag of USB storage devices"));
                goto error;
            }
        }
    }

2274 2275 2276
    if (qemuBuildDriveDevCacheStr(disk, &opt, qemuCaps) < 0)
        goto error;

2277 2278
    qemuBuildDiskFrontendAttributes(disk, &opt);

2279 2280 2281
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_USB_STORAGE_WERROR))
        qemuBuildDiskFrontendAttributeErrorPolicy(disk, &opt);

2282
    if (virBufferCheckError(&opt) < 0)
2283 2284 2285 2286
        goto error;

    return virBufferContentAndReset(&opt);

2287
 error:
2288 2289 2290
    return NULL;
}

2291 2292 2293
char *
qemuBuildZPCIDevStr(virDomainDeviceInfoPtr dev)
{
2294
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
2295 2296 2297 2298 2299 2300 2301 2302

    virBufferAsprintf(&buf,
                      "zpci,uid=%u,fid=%u,target=%s,id=zpci%u",
                      dev->addr.pci.zpci.uid,
                      dev->addr.pci.zpci.fid,
                      dev->alias,
                      dev->addr.pci.zpci.uid);

2303
    if (virBufferCheckError(&buf) < 0)
2304 2305 2306 2307 2308 2309 2310 2311 2312
        return NULL;

    return virBufferContentAndReset(&buf);
}

static int
qemuCommandAddZPCIDevice(virCommandPtr cmd,
                         virDomainDeviceInfoPtr dev)
{
2313
    VIR_AUTOFREE(char *) devstr = NULL;
2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325 2326 2327 2328 2329 2330 2331 2332 2333 2334 2335 2336 2337 2338

    virCommandAddArg(cmd, "-device");

    if (!(devstr = qemuBuildZPCIDevStr(dev)))
        return -1;

    virCommandAddArg(cmd, devstr);

    return 0;
}

static int
qemuCommandAddExtDevice(virCommandPtr cmd,
                        virDomainDeviceInfoPtr dev)
{
    if (dev->type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI ||
        dev->addr.pci.extFlags == VIR_PCI_ADDRESS_EXTENSION_NONE) {
        return 0;
    }

    if (dev->addr.pci.extFlags & VIR_PCI_ADDRESS_EXTENSION_ZPCI)
        return qemuCommandAddZPCIDevice(cmd, dev);

    return 0;
}
2339

2340
static int
2341 2342 2343 2344
qemuBuildFloppyCommandLineControllerOptions(virCommandPtr cmd,
                                            const virDomainDef *def,
                                            virQEMUCapsPtr qemuCaps,
                                            unsigned int bootFloppy)
2345
{
2346
    VIR_AUTOCLEAN(virBuffer) fdc_opts = VIR_BUFFER_INITIALIZER;
2347 2348 2349
    bool explicitfdc = qemuDomainNeedsFDC(def);
    bool hasfloppy = false;
    unsigned int bootindex;
2350
    char driveLetter;
2351
    size_t i;
2352

2353
    virBufferAddLit(&fdc_opts, "isa-fdc,");
2354

2355
    for (i = 0; i < def->ndisks; i++) {
2356 2357 2358
        VIR_AUTOFREE(char *) backendAlias = NULL;
        VIR_AUTOFREE(char *) backendStr = NULL;
        VIR_AUTOFREE(char *) bootindexStr = NULL;
2359
        virDomainDiskDefPtr disk = def->disks[i];
2360

2361 2362
        if (disk->bus != VIR_DOMAIN_DISK_BUS_FDC)
            continue;
2363

2364
        hasfloppy = true;
2365

2366 2367 2368 2369 2370
        if (disk->info.bootIndex) {
            bootindex = disk->info.bootIndex;
        } else {
            bootindex = bootFloppy;
            bootFloppy = 0;
2371 2372
        }

2373 2374 2375 2376 2377 2378 2379
        if (disk->info.addr.drive.unit)
            driveLetter = 'B';
        else
            driveLetter = 'A';

        if (bootindex &&
            virAsprintf(&bootindexStr, "bootindex%c=%u", driveLetter, bootindex) < 0)
2380
            return -1;
2381

2382 2383 2384
        /* with -blockdev we setup the floppy device and it's backend with -device */
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_BLOCKDEV)) {
            if (qemuDomainDiskGetBackendAlias(disk, qemuCaps, &backendAlias) < 0)
2385
                return -1;
2386 2387 2388

            if (backendAlias &&
                virAsprintf(&backendStr, "drive%c=%s", driveLetter, backendAlias) < 0)
2389
                return -1;
2390 2391
        }

2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404
        if (!explicitfdc) {
            if (backendStr) {
                virCommandAddArg(cmd, "-global");
                virCommandAddArgFormat(cmd, "isa-fdc.%s", backendStr);
            }

            if (bootindexStr) {
                virCommandAddArg(cmd, "-global");
                virCommandAddArgFormat(cmd, "isa-fdc.%s", bootindexStr);
            }
        } else {
            virBufferStrcat(&fdc_opts, backendStr, ",", NULL);
            virBufferStrcat(&fdc_opts, bootindexStr, ",", NULL);
2405
        }
2406 2407 2408
    }

    if (explicitfdc && hasfloppy) {
2409 2410
        /* Newer Q35 machine types require an explicit FDC controller */
        virBufferTrim(&fdc_opts, ",", -1);
2411
        virCommandAddArg(cmd, "-device");
2412
        virCommandAddArgBuffer(cmd, &fdc_opts);
2413 2414
    }

2415
    return 0;
2416 2417 2418
}


2419
static int
2420 2421
qemuBuildObjectCommandline(virCommandPtr cmd,
                           virJSONValuePtr objProps)
2422
{
2423
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
2424

2425
    if (!objProps)
2426 2427
        return 0;

2428
    if (virQEMUBuildObjectCommandlineFromJSON(&buf, objProps) < 0)
2429 2430 2431 2432 2433
        return -1;

    virCommandAddArg(cmd, "-object");
    virCommandAddArgBuffer(cmd, &buf);

2434 2435 2436 2437 2438 2439 2440 2441
    return 0;
}


static int
qemuBuildBlockStorageSourceAttachDataCommandline(virCommandPtr cmd,
                                                 qemuBlockStorageSourceAttachDataPtr data)
{
2442 2443
    char *tmp;

2444 2445 2446 2447 2448 2449 2450 2451 2452
    if (qemuBuildObjectCommandline(cmd, data->prmgrProps) < 0 ||
        qemuBuildObjectCommandline(cmd, data->authsecretProps) < 0 ||
        qemuBuildObjectCommandline(cmd, data->encryptsecretProps) < 0 ||
        qemuBuildObjectCommandline(cmd, data->tlsProps) < 0)
        return -1;

    if (data->driveCmd)
        virCommandAddArgList(cmd, "-drive", data->driveCmd, NULL);

2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468
    if (data->storageProps) {
        if (!(tmp = virJSONValueToString(data->storageProps, false)))
            return -1;

        virCommandAddArgList(cmd, "-blockdev", tmp, NULL);
        VIR_FREE(tmp);
    }

    if (data->formatProps) {
        if (!(tmp = virJSONValueToString(data->formatProps, false)))
            return -1;

        virCommandAddArgList(cmd, "-blockdev", tmp, NULL);
        VIR_FREE(tmp);
    }

2469
    return 0;
2470 2471 2472
}


2473
static int
2474 2475
qemuBuildDiskSourceCommandLine(virCommandPtr cmd,
                               virDomainDiskDefPtr disk,
2476
                               virQEMUCapsPtr qemuCaps)
2477
{
2478
    VIR_AUTOPTR(qemuBlockStorageSourceChainData) data = NULL;
2479 2480
    VIR_AUTOPTR(virJSONValue) copyOnReadProps = NULL;
    VIR_AUTOFREE(char *) copyOnReadPropsStr = NULL;
2481
    size_t i;
2482

2483
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_BLOCKDEV)) {
2484 2485
        if (virStorageSourceIsEmpty(disk->src))
            return 0;
2486

2487 2488
        if (!(data = qemuBuildStorageSourceChainAttachPrepareBlockdev(disk->src,
                                                                      qemuCaps)))
2489
            return -1;
2490 2491 2492

        if (disk->copy_on_read == VIR_TRISTATE_SWITCH_ON &&
            !(copyOnReadProps = qemuBlockStorageGetCopyOnReadProps(disk)))
2493
            return -1;
2494
    } else {
2495
        if (!(data = qemuBuildStorageSourceChainAttachPrepareDrive(disk, qemuCaps)))
2496
            return -1;
2497 2498
    }

2499
    for (i = data->nsrcdata; i > 0; i--) {
2500
        if (qemuBuildBlockStorageSourceAttachDataCommandline(cmd,
2501
                                                             data->srcdata[i - 1]) < 0)
2502
            return -1;
2503 2504 2505
    }

    if (copyOnReadProps) {
2506
        if (!(copyOnReadPropsStr = virJSONValueToString(copyOnReadProps, false)))
2507
            return -1;
2508

2509
        virCommandAddArgList(cmd, "-blockdev", copyOnReadPropsStr, NULL);
2510
    }
2511

2512
    return 0;
2513 2514 2515 2516 2517 2518 2519 2520
}


static int
qemuBuildDiskCommandLine(virCommandPtr cmd,
                         const virDomainDef *def,
                         virDomainDiskDefPtr disk,
                         virQEMUCapsPtr qemuCaps,
2521
                         unsigned int bootindex)
2522
{
2523
    VIR_AUTOFREE(char *) optstr = NULL;
2524

2525
    if (qemuBuildDiskSourceCommandLine(cmd, disk, qemuCaps) < 0)
2526
        return -1;
2527

2528
    if (!qemuDiskBusNeedsDriveArg(disk->bus)) {
2529 2530
        if (disk->bus != VIR_DOMAIN_DISK_BUS_FDC ||
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_BLOCKDEV)) {
2531 2532 2533
            if (qemuCommandAddExtDevice(cmd, &disk->info) < 0)
                return -1;

2534 2535
            virCommandAddArg(cmd, "-device");

2536 2537
            if (!(optstr = qemuBuildDiskDeviceStr(def, disk, bootindex,
                                                  qemuCaps)))
2538 2539 2540 2541 2542 2543 2544 2545 2546
                return -1;
            virCommandAddArg(cmd, optstr);
        }
    }

    return 0;
}


2547
static int
2548 2549 2550
qemuBuildDisksCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
2551 2552
{
    size_t i;
2553 2554 2555
    unsigned int bootCD = 0;
    unsigned int bootFloppy = 0;
    unsigned int bootDisk = 0;
2556
    bool blockdev = virQEMUCapsGet(qemuCaps, QEMU_CAPS_BLOCKDEV);
2557

2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568
    for (i = 0; i < def->os.nBootDevs; i++) {
        switch (def->os.bootDevs[i]) {
        case VIR_DOMAIN_BOOT_CDROM:
            bootCD = i + 1;
            break;
        case VIR_DOMAIN_BOOT_FLOPPY:
            bootFloppy = i + 1;
            break;
        case VIR_DOMAIN_BOOT_DISK:
            bootDisk = i + 1;
            break;
2569 2570 2571
        }
    }

2572 2573 2574 2575 2576 2577
    /* If we want to express the floppy drives via -device, the controller needs
     * to be instantiated prior to that */
    if (blockdev &&
        qemuBuildFloppyCommandLineControllerOptions(cmd, def, qemuCaps, bootFloppy) < 0)
        return -1;

2578
    for (i = 0; i < def->ndisks; i++) {
2579
        virDomainDiskDefPtr disk = def->disks[i];
2580
        unsigned int bootindex = 0;
2581

2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595
        if (disk->info.bootIndex) {
            bootindex = disk->info.bootIndex;
        } else {
            switch (disk->device) {
            case VIR_DOMAIN_DISK_DEVICE_CDROM:
                bootindex = bootCD;
                bootCD = 0;
                break;
            case VIR_DOMAIN_DISK_DEVICE_DISK:
            case VIR_DOMAIN_DISK_DEVICE_LUN:
                bootindex = bootDisk;
                bootDisk = 0;
                break;
            }
2596 2597
        }

2598 2599 2600 2601 2602 2603
        /* The floppy device itself does not support the bootindex property
         * so we need to set it up for the controller */
        if (disk->device == VIR_DOMAIN_DISK_DEVICE_FLOPPY)
            bootindex = 0;

        if (qemuBuildDiskCommandLine(cmd, def, disk, qemuCaps, bootindex) < 0)
2604
            return -1;
2605
    }
2606

2607 2608
    if (!blockdev &&
        qemuBuildFloppyCommandLineControllerOptions(cmd, def, qemuCaps, bootFloppy) < 0)
2609 2610
        return -1;

2611 2612 2613 2614
    return 0;
}


2615
static char *
2616
qemuBuildFSStr(virDomainFSDefPtr fs)
2617
{
2618
    VIR_AUTOCLEAN(virBuffer) opt = VIR_BUFFER_INITIALIZER;
2619
    const char *wrpolicy = virDomainFSWrpolicyTypeToString(fs->wrpolicy);
2620

2621 2622
    if (fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_PATH ||
        fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_DEFAULT) {
2623
        virBufferAddLit(&opt, "local");
2624 2625
        if (fs->accessmode == VIR_DOMAIN_FS_ACCESSMODE_MAPPED) {
            virBufferAddLit(&opt, ",security_model=mapped");
2626
        } else if (fs->accessmode == VIR_DOMAIN_FS_ACCESSMODE_PASSTHROUGH) {
2627
            virBufferAddLit(&opt, ",security_model=passthrough");
2628
        } else if (fs->accessmode == VIR_DOMAIN_FS_ACCESSMODE_SQUASH) {
2629 2630
            virBufferAddLit(&opt, ",security_model=none");
        }
2631 2632 2633
    } else if (fs->fsdriver == VIR_DOMAIN_FS_DRIVER_TYPE_HANDLE) {
        /* removed since qemu 4.0.0 see v3.1.0-29-g93aee84f57 */
        virBufferAddLit(&opt, "handle");
2634
    }
2635

2636 2637
    if (fs->wrpolicy)
        virBufferAsprintf(&opt, ",writeout=%s", wrpolicy);
2638

2639
    virBufferAsprintf(&opt, ",id=%s%s", QEMU_FSDEV_HOST_PREFIX, fs->info.alias);
2640 2641
    virBufferAddLit(&opt, ",path=");
    virQEMUBuildBufferEscapeComma(&opt, fs->src->path);
2642

2643 2644
    if (fs->readonly)
        virBufferAddLit(&opt, ",readonly");
2645

2646
    if (virBufferCheckError(&opt) < 0)
2647
        return NULL;
2648 2649 2650 2651 2652

    return virBufferContentAndReset(&opt);
}


2653 2654
static char *
qemuBuildFSDevStr(const virDomainDef *def,
2655
                  virDomainFSDefPtr fs,
2656
                  virQEMUCapsPtr qemuCaps)
2657
{
2658
    VIR_AUTOCLEAN(virBuffer) opt = VIR_BUFFER_INITIALIZER;
2659

2660
    if (qemuBuildVirtioDevStr(&opt, "virtio-9p", qemuCaps,
2661 2662
                              VIR_DOMAIN_DEVICE_FS, fs) < 0)
        return NULL;
2663

2664
    virBufferAsprintf(&opt, ",id=%s", fs->info.alias);
2665 2666
    virBufferAsprintf(&opt, ",fsdev=%s%s",
                      QEMU_FSDEV_HOST_PREFIX, fs->info.alias);
2667 2668
    virBufferAddLit(&opt, ",mount_tag=");
    virQEMUBuildBufferEscapeComma(&opt, fs->dst);
A
Alex Jia 已提交
2669

2670
    if (qemuBuildVirtioOptionsStr(&opt, fs->virtio, qemuCaps) < 0)
2671
        return NULL;
2672

2673
    if (qemuBuildDeviceAddressStr(&opt, def, &fs->info, qemuCaps) < 0)
2674
        return NULL;
2675

2676
    if (virBufferCheckError(&opt) < 0)
2677
        return NULL;
2678 2679 2680 2681 2682

    return virBufferContentAndReset(&opt);
}


2683 2684 2685 2686 2687 2688
static int
qemuBuildFSDevCommandLine(virCommandPtr cmd,
                          virDomainFSDefPtr fs,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
2689 2690
    VIR_AUTOFREE(char *) fsdevstr = NULL;
    VIR_AUTOFREE(char *) devicestr = NULL;
2691 2692

    virCommandAddArg(cmd, "-fsdev");
2693
    if (!(fsdevstr = qemuBuildFSStr(fs)))
2694
        return -1;
2695
    virCommandAddArg(cmd, fsdevstr);
2696 2697 2698 2699 2700

    if (qemuCommandAddExtDevice(cmd, &fs->info) < 0)
        return -1;

    virCommandAddArg(cmd, "-device");
2701
    if (!(devicestr = qemuBuildFSDevStr(def, fs, qemuCaps)))
2702
        return -1;
2703
    virCommandAddArg(cmd, devicestr);
2704 2705 2706 2707 2708

    return 0;
}


2709
static int
2710 2711 2712
qemuBuildFilesystemCommandLine(virCommandPtr cmd,
                               const virDomainDef *def,
                               virQEMUCapsPtr qemuCaps)
2713 2714 2715 2716
{
    size_t i;

    for (i = 0; i < def->nfss; i++) {
2717
        if (qemuBuildFSDevCommandLine(cmd, def->fss[i], def, qemuCaps) < 0)
2718 2719 2720 2721 2722 2723 2724
            return -1;
    }

    return 0;
}


2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741 2742 2743
static int
qemuControllerModelUSBToCaps(int model)
{
    switch (model) {
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_PIIX3_UHCI:
        return QEMU_CAPS_PIIX3_USB_UHCI;
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_PIIX4_UHCI:
        return QEMU_CAPS_PIIX4_USB_UHCI;
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_EHCI:
        return QEMU_CAPS_USB_EHCI;
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_ICH9_EHCI1:
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_ICH9_UHCI1:
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_ICH9_UHCI2:
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_ICH9_UHCI3:
        return QEMU_CAPS_ICH9_USB_EHCI1;
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_VT82C686B_UHCI:
        return QEMU_CAPS_VT82C686B_USB_UHCI;
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_PCI_OHCI:
        return QEMU_CAPS_PCI_OHCI;
G
Gerd Hoffmann 已提交
2744 2745
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_NEC_XHCI:
        return QEMU_CAPS_NEC_USB_XHCI;
2746 2747
    case VIR_DOMAIN_CONTROLLER_MODEL_USB_QEMU_XHCI:
        return QEMU_CAPS_DEVICE_QEMU_XHCI;
2748 2749 2750 2751 2752 2753
    default:
        return -1;
    }
}


2754 2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776 2777 2778
static const char *
qemuBuildUSBControllerFindMasterAlias(const virDomainDef *domainDef,
                                      const virDomainControllerDef *def)
{
    size_t i;

    for (i = 0; i < domainDef->ncontrollers; i++) {
        const virDomainControllerDef *tmp = domainDef->controllers[i];

        if (tmp->type != VIR_DOMAIN_CONTROLLER_TYPE_USB)
            continue;

        if (tmp->idx != def->idx)
            continue;

        if (tmp->info.mastertype == VIR_DOMAIN_CONTROLLER_MASTER_USB)
            continue;

        return tmp->info.alias;
    }

    return NULL;
}


2779
static int
2780 2781
qemuBuildUSBControllerDevStr(const virDomainDef *domainDef,
                             virDomainControllerDefPtr def,
2782
                             virQEMUCapsPtr qemuCaps,
2783 2784 2785
                             virBuffer *buf)
{
    const char *smodel;
2786
    int model, flags;
2787 2788

    model = def->model;
2789

2790
    if (model == VIR_DOMAIN_CONTROLLER_MODEL_USB_DEFAULT) {
2791 2792 2793
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       "%s", _("no model provided for USB controller"));
        return -1;
2794
    }
2795 2796

    smodel = qemuControllerModelUSBTypeToString(model);
2797
    flags = qemuControllerModelUSBToCaps(model);
2798

2799
    if (flags == -1 || !virQEMUCapsGet(qemuCaps, flags)) {
2800 2801
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("%s not supported in this QEMU binary"), smodel);
2802 2803 2804
        return -1;
    }

2805 2806
    virBufferAsprintf(buf, "%s", smodel);

2807
    if (def->opts.usbopts.ports != -1) {
2808 2809 2810
        if ((model != VIR_DOMAIN_CONTROLLER_MODEL_USB_NEC_XHCI ||
             !virQEMUCapsGet(qemuCaps, QEMU_CAPS_NEC_USB_XHCI_PORTS)) &&
            model != VIR_DOMAIN_CONTROLLER_MODEL_USB_QEMU_XHCI) {
2811 2812 2813 2814 2815 2816 2817 2818 2819 2820
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("usb controller type %s doesn't support 'ports' "
                             "with this QEMU binary"), smodel);
            return -1;
        }

        virBufferAsprintf(buf, ",p2=%d,p3=%d",
                          def->opts.usbopts.ports, def->opts.usbopts.ports);
    }

2821 2822 2823 2824 2825 2826 2827 2828
    if (def->info.mastertype == VIR_DOMAIN_CONTROLLER_MASTER_USB) {
        const char *masterbus;

        if (!(masterbus = qemuBuildUSBControllerFindMasterAlias(domainDef, def))) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("masterbus not found"));
            return -1;
        }
2829
        virBufferAsprintf(buf, ",masterbus=%s.0,firstport=%d",
2830 2831
                          masterbus, def->info.master.usb.startport);
    } else {
2832
        virBufferAsprintf(buf, ",id=%s", def->info.alias);
2833
    }
2834

2835 2836 2837
    return 0;
}

2838

2839 2840 2841 2842 2843 2844 2845 2846 2847 2848 2849 2850 2851 2852 2853 2854 2855 2856 2857 2858 2859
/**
 * qemuBuildControllerDevStr:
 * @domainDef: domain definition
 * @def: controller definition
 * @qemuCaps: QEMU binary capabilities
 * @devstr: device string
 * @nusbcontroller: number of USB controllers
 *
 * Turn @def into a description of the controller that QEMU will understand,
 * to be used either on the command line or through the monitor.
 *
 * The description will be returned in @devstr and can be NULL, eg. when
 * passing in one of the built-in controllers. The returned string must be
 * freed by the caller.
 *
 * The number pointed to by @nusbcontroller will be increased by one every
 * time the description for a USB controller has been generated successfully.
 *
 * Returns: 0 on success, <0 on failure
 */
int
2860
qemuBuildControllerDevStr(const virDomainDef *domainDef,
2861
                          virDomainControllerDefPtr def,
2862
                          virQEMUCapsPtr qemuCaps,
2863
                          char **devstr)
2864
{
2865
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
2866

2867 2868
    *devstr = NULL;

2869
    switch ((virDomainControllerType)def->type) {
2870
    case VIR_DOMAIN_CONTROLLER_TYPE_SCSI:
2871
        switch ((virDomainControllerModelSCSI) def->model) {
2872
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_VIRTIO_SCSI:
2873 2874
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_VIRTIO_TRANSITIONAL:
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_VIRTIO_NON_TRANSITIONAL:
2875
            if (qemuBuildVirtioDevStr(&buf, "virtio-scsi", qemuCaps,
2876
                                      VIR_DOMAIN_DEVICE_CONTROLLER, def) < 0) {
2877
                return -1;
2878
            }
2879 2880 2881 2882 2883 2884

            if (def->iothread) {
                virBufferAsprintf(&buf, ",iothread=iothread%u",
                                  def->iothread);
            }

2885
            if (qemuBuildVirtioOptionsStr(&buf, def->virtio, qemuCaps) < 0)
2886
                return -1;
2887
            break;
2888
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LSILOGIC:
2889
            virBufferAddLit(&buf, "lsi");
2890 2891 2892 2893
            break;
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_IBMVSCSI:
            virBufferAddLit(&buf, "spapr-vscsi");
            break;
2894 2895 2896
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LSISAS1068:
            virBufferAddLit(&buf, "mptsas1068");
            break;
2897 2898 2899
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LSISAS1078:
            virBufferAddLit(&buf, "megasas");
            break;
2900 2901 2902
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_AUTO:
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_BUSLOGIC:
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_VMPVSCSI:
2903 2904 2905
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("Unsupported controller model: %s"),
                           virDomainControllerModelSCSITypeToString(def->model));
2906
            return -1;
2907 2908 2909 2910 2911
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_DEFAULT:
        case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LAST:
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unexpected SCSI controller model %d"),
                           def->model);
2912
            return -1;
2913
        }
2914
        virBufferAsprintf(&buf, ",id=%s", def->info.alias);
2915 2916 2917
        break;

    case VIR_DOMAIN_CONTROLLER_TYPE_VIRTIO_SERIAL:
2918
        if (qemuBuildVirtioDevStr(&buf, "virtio-serial", qemuCaps,
2919
                                  VIR_DOMAIN_DEVICE_CONTROLLER, def) < 0) {
2920
            return -1;
2921
        }
2922

2923
        virBufferAsprintf(&buf, ",id=%s", def->info.alias);
2924
        if (def->opts.vioserial.ports != -1) {
2925
            virBufferAsprintf(&buf, ",max_ports=%d",
2926 2927 2928
                              def->opts.vioserial.ports);
        }
        if (def->opts.vioserial.vectors != -1) {
2929
            virBufferAsprintf(&buf, ",vectors=%d",
2930 2931
                              def->opts.vioserial.vectors);
        }
2932
        if (qemuBuildVirtioOptionsStr(&buf, def->virtio, qemuCaps) < 0)
2933
            return -1;
2934 2935
        break;

E
Eric Blake 已提交
2936
    case VIR_DOMAIN_CONTROLLER_TYPE_CCID:
2937
        virBufferAsprintf(&buf, "usb-ccid,id=%s", def->info.alias);
E
Eric Blake 已提交
2938 2939
        break;

J
Jim Fehlig 已提交
2940
    case VIR_DOMAIN_CONTROLLER_TYPE_SATA:
2941
        virBufferAsprintf(&buf, "ahci,id=%s", def->info.alias);
J
Jim Fehlig 已提交
2942 2943
        break;

2944
    case VIR_DOMAIN_CONTROLLER_TYPE_USB:
2945
        if (qemuBuildUSBControllerDevStr(domainDef, def, qemuCaps, &buf) == -1)
2946
            return -1;
2947 2948 2949

        break;

2950 2951 2952
    case VIR_DOMAIN_CONTROLLER_TYPE_PCI: {
        const virDomainPCIControllerOpts *pciopts = &def->opts.pciopts;
        const char *modelName = virDomainControllerPCIModelNameTypeToString(pciopts->modelName);
2953

2954 2955 2956 2957
        /* Skip the implicit PHB for pSeries guests */
        if (def->model == VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT &&
            pciopts->modelName == VIR_DOMAIN_CONTROLLER_PCI_MODEL_NAME_SPAPR_PCI_HOST_BRIDGE &&
            pciopts->targetIndex == 0) {
2958
            return 0;
2959 2960
        }

2961 2962 2963 2964 2965 2966 2967
        if (!modelName) {
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unknown virDomainControllerPCIModelName value: %d"),
                           pciopts->modelName);
            return -1;
        }

2968
        switch ((virDomainControllerModelPCI) def->model) {
2969
        case VIR_DOMAIN_CONTROLLER_MODEL_PCI_BRIDGE:
2970
            virBufferAsprintf(&buf, "%s,chassis_nr=%d,id=%s",
2971
                              modelName, pciopts->chassisNr,
2972
                              def->info.alias);
2973
            break;
2974
        case VIR_DOMAIN_CONTROLLER_MODEL_PCI_EXPANDER_BUS:
2975
        case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_EXPANDER_BUS:
2976
            virBufferAsprintf(&buf, "%s,bus_nr=%d,id=%s",
2977
                              modelName, pciopts->busNr,
2978
                              def->info.alias);
2979 2980 2981 2982
            if (pciopts->numaNode != -1) {
                virBufferAsprintf(&buf, ",numa_node=%d",
                                  pciopts->numaNode);
            }
2983
            break;
2984
        case VIR_DOMAIN_CONTROLLER_MODEL_DMI_TO_PCI_BRIDGE:
2985
        case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_SWITCH_UPSTREAM_PORT:
2986
        case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_TO_PCI_BRIDGE:
2987 2988
            virBufferAsprintf(&buf, "%s,id=%s", modelName, def->info.alias);
            break;
2989
        case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT_PORT:
2990 2991
        case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_SWITCH_DOWNSTREAM_PORT:
            virBufferAsprintf(&buf, "%s,port=0x%x,chassis=%d,id=%s",
2992 2993
                              modelName, pciopts->port,
                              pciopts->chassis, def->info.alias);
2994
            break;
2995
        case VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT:
2996
            virBufferAsprintf(&buf, "%s,index=%d,id=%s",
2997
                              modelName, pciopts->targetIndex,
2998
                              def->info.alias);
2999

3000
            if (pciopts->numaNode != -1)
3001
                virBufferAsprintf(&buf, ",numa_node=%d", pciopts->numaNode);
3002
            break;
3003
        case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT:
3004 3005
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Unsupported PCI Express root controller"));
3006
            return -1;
3007
        case VIR_DOMAIN_CONTROLLER_MODEL_PCI_DEFAULT:
3008
        case VIR_DOMAIN_CONTROLLER_MODEL_PCI_LAST:
3009 3010 3011
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("Unexpected PCI controller model %d"),
                           def->model);
3012
            return -1;
3013
        }
3014
        break;
3015
    }
3016

3017
    case VIR_DOMAIN_CONTROLLER_TYPE_IDE:
3018
    case VIR_DOMAIN_CONTROLLER_TYPE_FDC:
3019
    case VIR_DOMAIN_CONTROLLER_TYPE_XENBUS:
3020
    case VIR_DOMAIN_CONTROLLER_TYPE_LAST:
3021
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
3022
                       _("Unsupported controller type: %s"),
3023
                       virDomainControllerTypeToString(def->type));
3024
        return -1;
3025 3026
    }

3027 3028
    if (def->queues)
        virBufferAsprintf(&buf, ",num_queues=%u", def->queues);
3029

3030 3031 3032 3033 3034 3035
    if (def->cmd_per_lun)
        virBufferAsprintf(&buf, ",cmd_per_lun=%u", def->cmd_per_lun);

    if (def->max_sectors)
        virBufferAsprintf(&buf, ",max_sectors=%u", def->max_sectors);

3036 3037
    qemuBuildIoEventFdStr(&buf, def->ioeventfd, qemuCaps);

3038
    if (qemuBuildDeviceAddressStr(&buf, domainDef, &def->info, qemuCaps) < 0)
3039
        return -1;
3040

3041
    if (virBufferCheckError(&buf) < 0)
3042
        return -1;
3043

3044 3045
    *devstr = virBufferContentAndReset(&buf);
    return 0;
3046 3047 3048
}


3049 3050 3051 3052 3053 3054 3055 3056 3057 3058 3059 3060
static bool
qemuBuildDomainForbidLegacyUSBController(const virDomainDef *def)
{
    if (qemuDomainIsQ35(def) ||
        qemuDomainIsARMVirt(def) ||
        qemuDomainIsRISCVVirt(def))
        return true;

    return false;
}


3061 3062
static int
qemuBuildLegacyUSBControllerCommandLine(virCommandPtr cmd,
3063
                                        const virDomainDef *def)
3064
{
3065
    size_t i;
3066
    size_t nlegacy = 0;
3067
    size_t nusb = 0;
3068 3069 3070 3071 3072 3073 3074 3075 3076 3077

    for (i = 0; i < def->ncontrollers; i++) {
        virDomainControllerDefPtr cont = def->controllers[i];

        if (cont->type != VIR_DOMAIN_CONTROLLER_TYPE_USB)
            continue;

        /* If we have mode='none', there are no other USB controllers */
        if (cont->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_NONE)
            return 0;
3078 3079 3080

        if (cont->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_DEFAULT)
            nlegacy++;
3081 3082
        else
            nusb++;
3083 3084 3085 3086 3087 3088 3089
    }

    if (nlegacy > 1) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Multiple legacy USB controllers are "
                         "not supported"));
        return -1;
3090 3091
    }

3092
    if (nusb == 0 &&
3093
        !qemuBuildDomainForbidLegacyUSBController(def) &&
3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104
        !ARCH_IS_S390(def->os.arch)) {
        /* We haven't added any USB controller yet, but we haven't been asked
         * not to add one either. Add a legacy USB controller, unless we're
         * creating a kind of guest we want to keep legacy-free */
        virCommandAddArg(cmd, "-usb");
    }

    return 0;
}


3105 3106 3107 3108 3109 3110 3111 3112 3113 3114 3115 3116 3117 3118 3119 3120 3121 3122 3123 3124 3125 3126 3127 3128 3129 3130 3131 3132 3133 3134 3135 3136 3137 3138 3139 3140 3141 3142
/**
 * qemuBuildSkipController:
 * @controller: Controller to check
 * @def: Domain definition
 *
 * Returns true if this controller can be skipped for command line
 * generation or device validation.
 */
static bool
qemuBuildSkipController(const virDomainControllerDef *controller,
                        const virDomainDef *def)
{
    /* skip pcie-root */
    if (controller->type == VIR_DOMAIN_CONTROLLER_TYPE_PCI &&
        controller->model == VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT)
        return true;

    /* Skip pci-root, except for pSeries guests (which actually
     * support more than one PCI Host Bridge per guest) */
    if (!qemuDomainIsPSeries(def) &&
        controller->type == VIR_DOMAIN_CONTROLLER_TYPE_PCI &&
        controller->model == VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT)
        return true;

    /* first SATA controller on Q35 machines is implicit */
    if (controller->type == VIR_DOMAIN_CONTROLLER_TYPE_SATA &&
        controller->idx == 0 && qemuDomainIsQ35(def))
        return true;

    /* first IDE controller is implicit on various machines */
    if (controller->type == VIR_DOMAIN_CONTROLLER_TYPE_IDE &&
        controller->idx == 0 && qemuDomainHasBuiltinIDE(def))
        return true;

    return false;
}


3143 3144 3145 3146 3147 3148 3149 3150 3151 3152
static int
qemuBuildControllersByTypeCommandLine(virCommandPtr cmd,
                                      const virDomainDef *def,
                                      virQEMUCapsPtr qemuCaps,
                                      virDomainControllerType type)
{
    size_t i;

    for (i = 0; i < def->ncontrollers; i++) {
        virDomainControllerDefPtr cont = def->controllers[i];
3153
        VIR_AUTOFREE(char *) devstr = NULL;
3154 3155 3156 3157 3158 3159 3160 3161 3162 3163 3164 3165 3166 3167 3168 3169 3170 3171 3172 3173 3174 3175 3176 3177 3178 3179 3180 3181 3182 3183 3184 3185 3186

        if (cont->type != type)
            continue;

        if (qemuBuildSkipController(cont, def))
            continue;

        /* skip USB controllers with type none.*/
        if (cont->type == VIR_DOMAIN_CONTROLLER_TYPE_USB &&
            cont->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_NONE) {
            continue;
        }

        if (cont->type == VIR_DOMAIN_CONTROLLER_TYPE_USB &&
            cont->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_DEFAULT &&
            !qemuBuildDomainForbidLegacyUSBController(def)) {

            /* An appropriate default USB controller model should already
             * have been selected in qemuDomainDeviceDefPostParse(); if
             * we still have no model by now, we have to fall back to the
             * legacy USB controller.
             *
             * Note that we *don't* want to end up with the legacy USB
             * controller for q35 and virt machines, so we go ahead and
             * fail in qemuBuildControllerDevStr(); on the other hand,
             * for s390 machines we want to ignore any USB controller
             * (see 548ba43028 for the full story), so we skip
             * qemuBuildControllerDevStr() but we don't ultimately end
             * up adding the legacy USB controller */
            continue;
        }

        if (qemuBuildControllerDevStr(def, cont, qemuCaps, &devstr) < 0)
3187
            return -1;
3188 3189

        if (devstr) {
3190
            if (qemuCommandAddExtDevice(cmd, &cont->info) < 0)
3191
                return -1;
3192 3193 3194 3195 3196 3197

            virCommandAddArg(cmd, "-device");
            virCommandAddArg(cmd, devstr);
        }
    }

3198
    return 0;
3199 3200 3201
}


3202
static int
3203 3204 3205
qemuBuildControllersCommandLine(virCommandPtr cmd,
                                const virDomainDef *def,
                                virQEMUCapsPtr qemuCaps)
3206
{
3207
    size_t i;
3208 3209 3210 3211 3212 3213 3214 3215 3216 3217 3218 3219 3220 3221 3222
    int contOrder[] = {
        /*
         * List of controller types that we add commandline args for,
         * *in the order we want to add them*.
         *
         * The floppy controller is implicit on PIIX4 and older Q35
         * machines. For newer Q35 machines it is added out of the
         * controllers loop, after the floppy drives.
         *
         * We don't add PCI/PCIe root controller either, because it's
         * implicit, but we do add PCI bridges and other PCI
         * controllers, so we leave that in to check each
         * one. Likewise, we don't do anything for the primary IDE
         * controller on an i440fx machine or primary SATA on q35, but
         * we do add those beyond these two exceptions.
3223 3224 3225
         *
         * CCID controllers are formatted separately after USB hubs,
         * because they go on the USB bus.
3226 3227 3228 3229 3230 3231 3232 3233 3234
         */
        VIR_DOMAIN_CONTROLLER_TYPE_PCI,
        VIR_DOMAIN_CONTROLLER_TYPE_USB,
        VIR_DOMAIN_CONTROLLER_TYPE_SCSI,
        VIR_DOMAIN_CONTROLLER_TYPE_IDE,
        VIR_DOMAIN_CONTROLLER_TYPE_SATA,
        VIR_DOMAIN_CONTROLLER_TYPE_VIRTIO_SERIAL,
    };

3235 3236
    for (i = 0; i < ARRAY_CARDINALITY(contOrder); i++) {
        if (qemuBuildControllersByTypeCommandLine(cmd, def, qemuCaps, contOrder[i]) < 0)
3237
            return -1;
3238 3239
    }

3240
    if (qemuBuildLegacyUSBControllerCommandLine(cmd, def) < 0)
3241
        return -1;
3242

3243
    return 0;
3244 3245 3246
}


M
Marc-André Lureau 已提交
3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266
static int
qemuBuildMemoryBackendPropsShare(virJSONValuePtr props,
                                 virDomainMemoryAccess memAccess)
{
    switch (memAccess) {
    case VIR_DOMAIN_MEMORY_ACCESS_SHARED:
        return virJSONValueObjectAdd(props, "b:share", true, NULL);

    case VIR_DOMAIN_MEMORY_ACCESS_PRIVATE:
        return virJSONValueObjectAdd(props, "b:share", false, NULL);

    case VIR_DOMAIN_MEMORY_ACCESS_DEFAULT:
    case VIR_DOMAIN_MEMORY_ACCESS_LAST:
        break;
    }

    return 0;
}


3267
static int
3268 3269
qemuBuildMemoryGetDefaultPagesize(virQEMUDriverConfigPtr cfg,
                                  unsigned long long *pagesize)
3270 3271 3272 3273 3274 3275 3276 3277 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287
{
    virHugeTLBFSPtr p;

    if (!cfg->nhugetlbfs) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("hugetlbfs filesystem is not mounted "
                               "or disabled by administrator config"));
        return -1;
    }

    if (!(p = virFileGetDefaultHugepage(cfg->hugetlbfs, cfg->nhugetlbfs)))
        p = &cfg->hugetlbfs[0];

    *pagesize = p->size;
    return 0;
}


3288
/**
3289
 * qemuBuildMemoryBackendProps:
3290
 * @backendProps: [out] constructed object
3291
 * @alias: alias of the device
3292
 * @cfg: qemu driver config object
3293
 * @priv: pointer to domain private object
3294 3295 3296 3297 3298
 * @def: domain definition object
 * @mem: memory definition object
 * @force: forcibly use one of the backends
 *
 * Creates a configuration object that represents memory backend of given guest
3299
 * NUMA node (domain @def and @mem). Use @priv->autoNodeset to fine tune the
3300 3301 3302 3303 3304
 * placement of the memory on the host NUMA nodes.
 *
 * By default, if no memory-backend-* object is necessary to fulfil the guest
 * configuration value of 1 is returned. This behaviour can be suppressed by
 * setting @force to true in which case 0 would be returned.
3305
 *
3306 3307
 * Then, if one of the three memory-backend-* should be used, the @priv->qemuCaps
 * is consulted to check if qemu does support it.
3308
 *
3309 3310 3311
 * Returns: 0 on success,
 *          1 on success and if there's no need to use memory-backend-*
 *         -1 on error.
3312
 */
3313
int
3314
qemuBuildMemoryBackendProps(virJSONValuePtr *backendProps,
3315
                            const char *alias,
3316
                            virQEMUDriverConfigPtr cfg,
3317
                            qemuDomainObjPrivatePtr priv,
3318 3319 3320
                            virDomainDefPtr def,
                            virDomainMemoryDefPtr mem,
                            bool force)
3321
{
3322
    const char *backendType = "memory-backend-file";
3323
    virDomainNumatuneMemMode mode;
3324
    const long system_page_size = virGetSystemPageSizeKB();
3325
    virDomainMemoryAccess memAccess = mem->access;
3326
    size_t i;
3327
    VIR_AUTOFREE(char *) memPath = NULL;
M
Michal Privoznik 已提交
3328
    bool prealloc = false;
3329
    virBitmapPtr nodemask = NULL;
3330
    int rc;
3331
    VIR_AUTOPTR(virJSONValue) props = NULL;
3332 3333
    bool nodeSpecified = virDomainNumatuneNodeSpecified(def->numa, mem->targetNode);
    unsigned long long pagesize = mem->pagesize;
3334
    bool needHugepage = !!pagesize;
3335
    bool useHugepage = !!pagesize;
3336
    int discard = mem->discard;
3337 3338 3339 3340 3341 3342

    /* The difference between @needHugepage and @useHugepage is that the latter
     * is true whenever huge page is defined for the current memory cell.
     * Either directly, or transitively via global domain huge pages. The
     * former is true whenever "memory-backend-file" must be used to satisfy
     * @useHugepage. */
3343

3344 3345
    *backendProps = NULL;

3346
    if (mem->targetNode >= 0) {
3347
        /* memory devices could provide a invalid guest node */
3348
        if (mem->targetNode >= virDomainNumaGetNodeCount(def->numa)) {
3349 3350 3351
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("can't add memory backend for guest node '%d' as "
                             "the guest has only '%zu' NUMA nodes configured"),
3352
                           mem->targetNode, virDomainNumaGetNodeCount(def->numa));
3353 3354
            return -1;
        }
3355

3356 3357 3358 3359 3360
        if (memAccess == VIR_DOMAIN_MEMORY_ACCESS_DEFAULT)
            memAccess = virDomainNumaGetNodeMemoryAccessMode(def->numa, mem->targetNode);

        if (discard == VIR_TRISTATE_BOOL_ABSENT)
            discard = virDomainNumaGetNodeDiscard(def->numa, mem->targetNode);
3361
    }
3362

3363 3364 3365
    if (memAccess == VIR_DOMAIN_MEMORY_ACCESS_DEFAULT)
        memAccess = def->mem.access;

3366 3367 3368
    if (discard == VIR_TRISTATE_BOOL_ABSENT)
        discard = def->mem.discard;

3369
    if (virDomainNumatuneGetMode(def->numa, mem->targetNode, &mode) < 0 &&
3370 3371
        virDomainNumatuneGetMode(def->numa, -1, &mode) < 0)
        mode = VIR_DOMAIN_NUMATUNE_MEM_STRICT;
3372

3373
    if (pagesize == 0) {
3374 3375
        virDomainHugePagePtr master_hugepage = NULL;
        virDomainHugePagePtr hugepage = NULL;
3376 3377
        bool thisHugepage = false;

3378 3379 3380 3381 3382 3383 3384 3385 3386
        /* Find the huge page size we want to use */
        for (i = 0; i < def->mem.nhugepages; i++) {
            hugepage = &def->mem.hugepages[i];

            if (!hugepage->nodemask) {
                master_hugepage = hugepage;
                continue;
            }

3387
            /* just find the master hugepage in case we don't use NUMA */
3388
            if (mem->targetNode < 0)
3389 3390
                continue;

3391
            if (virBitmapGetBit(hugepage->nodemask, mem->targetNode,
3392 3393 3394 3395 3396 3397 3398 3399 3400
                                &thisHugepage) < 0) {
                /* Ignore this error. It's not an error after all. Well,
                 * the nodemask for this <page/> can contain lower NUMA
                 * nodes than we are querying in here. */
                continue;
            }

            if (thisHugepage) {
                /* Hooray, we've found the page size */
3401
                needHugepage = true;
3402 3403 3404 3405 3406 3407 3408 3409 3410 3411 3412
                break;
            }
        }

        if (i == def->mem.nhugepages) {
            /* We have not found specific huge page to be used with this
             * NUMA node. Use the generic setting then (<page/> without any
             * @nodemask) if possible. */
            hugepage = master_hugepage;
        }

3413
        if (hugepage) {
3414
            pagesize = hugepage->size;
3415 3416
            useHugepage = true;
        }
3417
    }
3418

3419 3420 3421 3422 3423
    if (pagesize == system_page_size) {
        /* However, if user specified to use "huge" page
         * of regular system page size, it's as if they
         * hasn't specified any huge pages at all. */
        pagesize = 0;
3424 3425
        needHugepage = false;
        useHugepage = false;
3426
    } else if (useHugepage && pagesize == 0) {
3427
        if (qemuBuildMemoryGetDefaultPagesize(cfg, &pagesize) < 0)
3428
            return -1;
3429 3430
    }

3431 3432 3433
    if (!(props = virJSONValueNewObject()))
        return -1;

M
Marc-André Lureau 已提交
3434 3435 3436 3437 3438 3439
    if (def->mem.source == VIR_DOMAIN_MEMORY_SOURCE_MEMFD) {
        backendType = "memory-backend-memfd";

        if (useHugepage &&
            (virJSONValueObjectAdd(props, "b:hugetlb", useHugepage, NULL) < 0 ||
             virJSONValueObjectAdd(props, "U:hugetlbsize", pagesize << 10, NULL) < 0)) {
3440
            return -1;
M
Marc-André Lureau 已提交
3441 3442 3443
        }

        if (qemuBuildMemoryBackendPropsShare(props, memAccess) < 0)
3444
            return -1;
M
Marc-André Lureau 已提交
3445 3446

    } else if (useHugepage || mem->nvdimmPath || memAccess ||
M
Michal Privoznik 已提交
3447
        def->mem.source == VIR_DOMAIN_MEMORY_SOURCE_FILE) {
3448

3449 3450
        if (mem->nvdimmPath) {
            if (VIR_STRDUP(memPath, mem->nvdimmPath) < 0)
3451
                return -1;
3452 3453
            if (!priv->memPrealloc)
                prealloc = true;
3454 3455
        } else if (useHugepage) {
            if (qemuGetDomainHupageMemPath(def, cfg, pagesize, &memPath) < 0)
3456
                return -1;
3457 3458
            if (!priv->memPrealloc)
                prealloc = true;
3459
        } else {
3460 3461
            /* We can have both pagesize and mem source. If that's the case,
             * prefer hugepages as those are more specific. */
3462
            if (qemuGetMemoryBackingPath(def, cfg, mem->info.alias, &memPath) < 0)
3463
                return -1;
3464
        }
3465

M
Michal Privoznik 已提交
3466 3467 3468 3469
        if (virJSONValueObjectAdd(props,
                                  "B:prealloc", prealloc,
                                  "s:mem-path", memPath,
                                  NULL) < 0)
3470
            return -1;
M
Michal Privoznik 已提交
3471

3472 3473
        if (!mem->nvdimmPath &&
            discard == VIR_TRISTATE_BOOL_YES) {
3474
            if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE_DISCARD)) {
3475 3476
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("this QEMU doesn't support memory discard"));
3477
                return -1;
3478 3479 3480 3481 3482
            }

            if (virJSONValueObjectAdd(props,
                                      "B:discard-data", true,
                                      NULL) < 0)
3483
                return -1;
3484 3485
        }

M
Marc-André Lureau 已提交
3486
        if (qemuBuildMemoryBackendPropsShare(props, memAccess) < 0)
3487
            return -1;
3488
    } else {
3489
        backendType = "memory-backend-ram";
3490 3491
    }

3492
    if (virJSONValueObjectAdd(props, "U:size", mem->size * 1024, NULL) < 0)
3493
        return -1;
3494

3495 3496 3497 3498 3499
    if (mem->alignsize) {
        if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE_ALIGN)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("nvdimm align property is not available "
                             "with this QEMU binary"));
3500
            return -1;
3501 3502
        }
        if (virJSONValueObjectAdd(props, "U:align", mem->alignsize * 1024, NULL) < 0)
3503
            return -1;
3504 3505
    }

3506 3507 3508 3509 3510
    if (mem->nvdimmPmem) {
        if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE_PMEM)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("nvdimm pmem property is not available "
                             "with this QEMU binary"));
3511
            return -1;
3512 3513
        }
        if (virJSONValueObjectAdd(props, "s:pmem", "on", NULL) < 0)
3514
            return -1;
3515 3516
    }

3517 3518
    if (mem->sourceNodes) {
        nodemask = mem->sourceNodes;
3519
    } else {
3520
        if (virDomainNumatuneMaybeGetNodeset(def->numa, priv->autoNodeset,
3521
                                             &nodemask, mem->targetNode) < 0)
3522
            return -1;
3523 3524 3525
    }

    if (nodemask) {
3526
        if (!virNumaNodesetIsAvailable(nodemask))
3527
            return -1;
3528 3529 3530 3531
        if (virJSONValueObjectAdd(props,
                                  "m:host-nodes", nodemask,
                                  "S:policy", qemuNumaPolicyTypeToString(mode),
                                  NULL) < 0)
3532
            return -1;
3533 3534
    }

3535
    /* If none of the following is requested... */
3536
    if (!needHugepage && !mem->sourceNodes && !nodeSpecified &&
M
Michal Privoznik 已提交
3537
        !mem->nvdimmPath &&
3538
        memAccess == VIR_DOMAIN_MEMORY_ACCESS_DEFAULT &&
M
Marc-André Lureau 已提交
3539 3540 3541
        def->mem.source != VIR_DOMAIN_MEMORY_SOURCE_FILE &&
        def->mem.source != VIR_DOMAIN_MEMORY_SOURCE_MEMFD &&
        !force) {
3542 3543
        /* report back that using the new backend is not necessary
         * to achieve the desired configuration */
3544
        rc = 1;
3545 3546
    } else {
        /* otherwise check the required capability */
3547
        if (STREQ(backendType, "memory-backend-file") &&
3548
            !virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE)) {
3549 3550 3551
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this qemu doesn't support the "
                             "memory-backend-file object"));
3552
            return -1;
3553
        } else if (STREQ(backendType, "memory-backend-ram") &&
3554
                   !virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_MEMORY_RAM)) {
3555 3556 3557
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this qemu doesn't support the "
                             "memory-backend-ram object"));
3558
            return -1;
M
Marc-André Lureau 已提交
3559
        } else if (STREQ(backendType, "memory-backend-memory") &&
3560
                   !virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_OBJECT_MEMORY_MEMFD)) {
M
Marc-André Lureau 已提交
3561 3562 3563
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this qemu doesn't support the "
                             "memory-backend-memfd object"));
3564
            return -1;
3565 3566
        }

3567
        rc = 0;
3568 3569
    }

3570 3571
    if (!(*backendProps = qemuMonitorCreateObjectPropsWrap(backendType, alias,
                                                           &props)))
3572
        return -1;
3573

3574
    return rc;
3575 3576 3577 3578 3579 3580 3581
}


static int
qemuBuildMemoryCellBackendStr(virDomainDefPtr def,
                              virQEMUDriverConfigPtr cfg,
                              size_t cell,
3582
                              qemuDomainObjPrivatePtr priv,
3583
                              virBufferPtr buf)
3584
{
3585
    VIR_AUTOPTR(virJSONValue) props = NULL;
3586
    VIR_AUTOFREE(char *) alias = NULL;
3587
    int rc;
3588
    virDomainMemoryDef mem = { 0 };
3589 3590
    unsigned long long memsize = virDomainNumaGetNodeMemorySize(def->numa,
                                                                cell);
3591

3592
    if (virAsprintf(&alias, "ram-node%zu", cell) < 0)
3593
        return -1;
3594

3595 3596
    mem.size = memsize;
    mem.targetNode = cell;
3597
    mem.info.alias = alias;
3598

3599 3600
    if ((rc = qemuBuildMemoryBackendProps(&props, alias, cfg,
                                          priv, def, &mem, false)) < 0)
3601
        return -1;
3602

3603
    if (virQEMUBuildObjectCommandlineFromJSON(buf, props) < 0)
3604
        return -1;
3605

3606
    return rc;
3607 3608 3609
}


3610 3611 3612
static int
qemuBuildMemoryDimmBackendStr(virBufferPtr buf,
                              virDomainMemoryDefPtr mem,
3613
                              virDomainDefPtr def,
3614
                              virQEMUDriverConfigPtr cfg,
3615
                              qemuDomainObjPrivatePtr priv)
3616
{
3617
    VIR_AUTOPTR(virJSONValue) props = NULL;
3618
    VIR_AUTOFREE(char *) alias = NULL;
3619 3620 3621 3622

    if (!mem->info.alias) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("memory device alias is not assigned"));
3623
        return -1;
3624 3625 3626
    }

    if (virAsprintf(&alias, "mem%s", mem->info.alias) < 0)
3627
        return -1;
3628

3629 3630
    if (qemuBuildMemoryBackendProps(&props, alias, cfg,
                                    priv, def, mem, true) < 0)
3631
        return -1;
3632

3633
    if (virQEMUBuildObjectCommandlineFromJSON(buf, props) < 0)
3634
        return -1;
3635

3636
    return 0;
3637 3638 3639
}


3640
char *
3641 3642
qemuBuildMemoryDeviceStr(virDomainMemoryDefPtr mem,
                         qemuDomainObjPrivatePtr priv)
3643
{
3644
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
M
Michal Privoznik 已提交
3645
    const char *device;
3646 3647 3648 3649 3650 3651 3652 3653

    if (!mem->info.alias) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("missing alias for memory device"));
        return NULL;
    }

    switch ((virDomainMemoryModel) mem->model) {
M
Michal Privoznik 已提交
3654
    case VIR_DOMAIN_MEMORY_MODEL_NVDIMM:
3655
    case VIR_DOMAIN_MEMORY_MODEL_DIMM:
M
Michal Privoznik 已提交
3656 3657 3658 3659 3660 3661 3662

        if (mem->model == VIR_DOMAIN_MEMORY_MODEL_DIMM)
            device = "pc-dimm";
        else
            device = "nvdimm";

        virBufferAsprintf(&buf, "%s,", device);
3663 3664 3665 3666

        if (mem->targetNode >= 0)
            virBufferAsprintf(&buf, "node=%d,", mem->targetNode);

3667 3668 3669
        if (mem->labelsize)
            virBufferAsprintf(&buf, "label-size=%llu,", mem->labelsize * 1024);

3670 3671 3672 3673 3674 3675 3676 3677 3678 3679
        if (mem->readonly) {
            if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_DEVICE_NVDIMM_UNARMED)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("nvdimm readonly property is not available "
                                 "with this QEMU binary"));
                return NULL;
            }
            virBufferAddLit(&buf, "unarmed=on,");
        }

3680 3681
        virBufferAsprintf(&buf, "memdev=mem%s,id=%s",
                          mem->info.alias, mem->info.alias);
3682 3683 3684

        if (mem->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DIMM) {
            virBufferAsprintf(&buf, ",slot=%d", mem->info.addr.dimm.slot);
3685 3686
            if (mem->info.addr.dimm.base)
                virBufferAsprintf(&buf, ",addr=%llu", mem->info.addr.dimm.base);
3687 3688 3689 3690 3691 3692 3693 3694 3695 3696 3697 3698 3699 3700 3701 3702 3703
        }

        break;

    case VIR_DOMAIN_MEMORY_MODEL_NONE:
    case VIR_DOMAIN_MEMORY_MODEL_LAST:
        break;

    }

    if (virBufferCheckError(&buf) < 0)
        return NULL;

    return virBufferContentAndReset(&buf);
}


3704
static char *
3705
qemuBuildLegacyNicStr(virDomainNetDefPtr net)
3706 3707
{
    char *str;
3708
    char macaddr[VIR_MAC_STRING_BUFLEN];
3709
    const char *netmodel = virDomainNetGetModelString(net);
3710

3711
    ignore_value(virAsprintf(&str,
3712
                             "nic,macaddr=%s,netdev=host%s%s%s%s%s",
3713
                             virMacAddrFormat(&net->mac, macaddr),
3714
                             net->info.alias,
3715 3716
                             netmodel ? ",model=" : "",
                             NULLSTR_EMPTY(netmodel),
3717
                             (net->info.alias ? ",id=" : ""),
J
Ján Tomko 已提交
3718
                             NULLSTR_EMPTY(net->info.alias)));
3719 3720 3721 3722 3723
    return str;
}


char *
3724
qemuBuildNicDevStr(virDomainDefPtr def,
3725
                   virDomainNetDefPtr net,
3726
                   unsigned int bootindex,
3727
                   size_t vhostfdSize,
3728
                   virQEMUCapsPtr qemuCaps)
3729
{
3730
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
3731
    bool usingVirtio = false;
3732
    char macaddr[VIR_MAC_STRING_BUFLEN];
3733

3734
    if (virDomainNetIsVirtioModel(net)) {
3735
        if (qemuBuildVirtioDevStr(&buf, "virtio-net", qemuCaps,
3736
                                  VIR_DOMAIN_DEVICE_NET, net) < 0) {
3737
            goto error;
3738
        }
3739

3740
        usingVirtio = true;
3741
    } else {
3742
        virBufferAddStr(&buf, virDomainNetGetModelString(net));
3743 3744
    }

3745
    if (usingVirtio && net->driver.virtio.txmode) {
3746
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_TX_ALG)) {
3747 3748 3749 3750 3751 3752 3753 3754 3755
            virBufferAddLit(&buf, ",tx=");
            switch (net->driver.virtio.txmode) {
                case VIR_DOMAIN_NET_VIRTIO_TX_MODE_IOTHREAD:
                    virBufferAddLit(&buf, "bh");
                    break;

                case VIR_DOMAIN_NET_VIRTIO_TX_MODE_TIMER:
                    virBufferAddLit(&buf, "timer");
                    break;
3756 3757 3758 3759 3760

                case VIR_DOMAIN_NET_VIRTIO_TX_MODE_DEFAULT:
                    break;

                case VIR_DOMAIN_NET_VIRTIO_TX_MODE_LAST:
3761 3762 3763 3764
                default:
                    /* this should never happen, if it does, we need
                     * to add another case to this switch.
                     */
3765 3766
                    virReportEnumRangeError(virDomainNetVirtioTxModeType,
                                            net->driver.virtio.txmode);
3767 3768 3769
                    goto error;
            }
        } else {
3770 3771
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("virtio-net-pci 'tx' option not supported in this QEMU binary"));
3772 3773 3774
            goto error;
        }
    }
3775
    if (usingVirtio) {
3776
        qemuBuildIoEventFdStr(&buf, net->driver.virtio.ioeventfd, qemuCaps);
3777
        if (net->driver.virtio.event_idx &&
3778
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_NET_EVENT_IDX)) {
3779
            virBufferAsprintf(&buf, ",event_idx=%s",
J
Ján Tomko 已提交
3780
                              virTristateSwitchTypeToString(net->driver.virtio.event_idx));
3781
        }
3782 3783 3784 3785 3786 3787 3788 3789 3790 3791 3792 3793 3794 3795 3796 3797 3798 3799 3800 3801 3802 3803 3804 3805
        if (net->driver.virtio.host.csum) {
            virBufferAsprintf(&buf, ",csum=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.csum));
        }
        if (net->driver.virtio.host.gso) {
            virBufferAsprintf(&buf, ",gso=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.gso));
        }
        if (net->driver.virtio.host.tso4) {
            virBufferAsprintf(&buf, ",host_tso4=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.tso4));
        }
        if (net->driver.virtio.host.tso6) {
            virBufferAsprintf(&buf, ",host_tso6=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.tso6));
        }
        if (net->driver.virtio.host.ecn) {
            virBufferAsprintf(&buf, ",host_ecn=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.ecn));
        }
        if (net->driver.virtio.host.ufo) {
            virBufferAsprintf(&buf, ",host_ufo=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.ufo));
        }
J
Ján Tomko 已提交
3806 3807 3808 3809
        if (net->driver.virtio.host.mrg_rxbuf) {
            virBufferAsprintf(&buf, ",mrg_rxbuf=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.host.mrg_rxbuf));
        }
3810 3811 3812 3813 3814 3815 3816 3817 3818 3819 3820 3821 3822 3823 3824 3825 3826 3827 3828 3829
        if (net->driver.virtio.guest.csum) {
            virBufferAsprintf(&buf, ",guest_csum=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.guest.csum));
        }
        if (net->driver.virtio.guest.tso4) {
            virBufferAsprintf(&buf, ",guest_tso4=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.guest.tso4));
        }
        if (net->driver.virtio.guest.tso6) {
            virBufferAsprintf(&buf, ",guest_tso6=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.guest.tso6));
        }
        if (net->driver.virtio.guest.ecn) {
            virBufferAsprintf(&buf, ",guest_ecn=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.guest.ecn));
        }
        if (net->driver.virtio.guest.ufo) {
            virBufferAsprintf(&buf, ",guest_ufo=%s",
                              virTristateSwitchTypeToString(net->driver.virtio.guest.ufo));
        }
3830
    }
3831
    if (usingVirtio && vhostfdSize > 1) {
3832 3833 3834 3835 3836 3837
        if (net->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW) {
            /* ccw provides a one to one relation of fds to queues and
             * does not support the vectors option
             */
            virBufferAddLit(&buf, ",mq=on");
        } else {
3838
            /* As advised at https://www.linux-kvm.org/page/Multiqueue
3839 3840 3841 3842
             * we should add vectors=2*N+2 where N is the vhostfdSize
             */
            virBufferAsprintf(&buf, ",mq=on,vectors=%zu", 2 * vhostfdSize + 2);
        }
3843
    }
3844 3845 3846 3847 3848
    if (usingVirtio && net->driver.virtio.rx_queue_size) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_NET_RX_QUEUE_SIZE)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("virtio rx_queue_size option is not supported with this QEMU binary"));
            goto error;
3849
        }
3850
        virBufferAsprintf(&buf, ",rx_queue_size=%u", net->driver.virtio.rx_queue_size);
3851
    }
3852 3853 3854 3855 3856
    if (usingVirtio && net->driver.virtio.tx_queue_size) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_NET_TX_QUEUE_SIZE)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("virtio tx_queue_size option is not supported with this QEMU binary"));
            goto error;
3857
        }
3858
        virBufferAsprintf(&buf, ",tx_queue_size=%u", net->driver.virtio.tx_queue_size);
3859
    }
3860

3861 3862 3863 3864 3865
    if (usingVirtio && net->mtu) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_NET_HOST_MTU)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("setting MTU is not supported with this QEMU binary"));
            goto error;
3866
        }
3867
        virBufferAsprintf(&buf, ",host_mtu=%u", net->mtu);
3868 3869
    }

3870
    virBufferAsprintf(&buf, ",netdev=host%s", net->info.alias);
3871
    virBufferAsprintf(&buf, ",id=%s", net->info.alias);
3872 3873
    virBufferAsprintf(&buf, ",mac=%s",
                      virMacAddrFormat(&net->mac, macaddr));
3874

3875
    if (qemuBuildDeviceAddressStr(&buf, def, &net->info, qemuCaps) < 0)
3876
        goto error;
3877
    if (qemuBuildRomStr(&buf, &net->info) < 0)
3878
        goto error;
3879
    if (bootindex)
3880
        virBufferAsprintf(&buf, ",bootindex=%u", bootindex);
3881 3882 3883
    if (usingVirtio &&
        qemuBuildVirtioOptionsStr(&buf, net->virtio, qemuCaps) < 0)
        goto error;
3884

3885
    if (virBufferCheckError(&buf) < 0)
3886 3887 3888 3889
        goto error;

    return virBufferContentAndReset(&buf);

3890
 error:
3891 3892 3893 3894 3895 3896
    return NULL;
}


char *
qemuBuildHostNetStr(virDomainNetDefPtr net,
3897
                    char **tapfd,
3898
                    size_t tapfdSize,
3899
                    char **vhostfd,
3900 3901
                    size_t vhostfdSize,
                    const char *slirpfd)
3902
{
3903
    bool is_tap = false;
3904
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
3905
    virDomainNetType netType = virDomainNetGetActualType(net);
3906
    size_t i;
3907

3908
    if (net->script && netType != VIR_DOMAIN_NET_TYPE_ETHERNET) {
3909 3910 3911
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("scripts are not supported on interfaces of type %s"),
                       virDomainNetTypeToString(netType));
3912
        return NULL;
3913 3914 3915
    }

    switch (netType) {
M
Michal Privoznik 已提交
3916 3917 3918 3919 3920
        /*
         * If type='bridge', and we're running as privileged user
         * or -netdev bridge is not supported then it will fall
         * through, -net tap,fd
         */
3921
    case VIR_DOMAIN_NET_TYPE_BRIDGE:
R
Richa Marwaha 已提交
3922
    case VIR_DOMAIN_NET_TYPE_NETWORK:
3923
    case VIR_DOMAIN_NET_TYPE_DIRECT:
3924
    case VIR_DOMAIN_NET_TYPE_ETHERNET:
3925
        virBufferAddLit(&buf, "tap,");
3926 3927 3928
        /* for one tapfd 'fd=' shall be used,
         * for more than one 'fds=' is the right choice */
        if (tapfdSize == 1) {
3929
            virBufferAsprintf(&buf, "fd=%s,", tapfd[0]);
3930 3931 3932 3933 3934 3935 3936
        } else {
            virBufferAddLit(&buf, "fds=");
            for (i = 0; i < tapfdSize; i++) {
                if (i)
                    virBufferAddChar(&buf, ':');
                virBufferAdd(&buf, tapfd[i], -1);
            }
3937
            virBufferAddChar(&buf, ',');
3938
        }
3939
        is_tap = true;
3940 3941 3942
        break;

    case VIR_DOMAIN_NET_TYPE_CLIENT:
3943
        virBufferAsprintf(&buf, "socket,connect=%s:%d,",
M
Michal Privoznik 已提交
3944 3945 3946
                          net->data.socket.address,
                          net->data.socket.port);
        break;
3947

3948
    case VIR_DOMAIN_NET_TYPE_SERVER:
3949
        virBufferAsprintf(&buf, "socket,listen=%s:%d,",
J
Ján Tomko 已提交
3950
                          NULLSTR_EMPTY(net->data.socket.address),
M
Michal Privoznik 已提交
3951 3952
                          net->data.socket.port);
        break;
3953

3954
    case VIR_DOMAIN_NET_TYPE_MCAST:
3955
        virBufferAsprintf(&buf, "socket,mcast=%s:%d,",
M
Michal Privoznik 已提交
3956 3957 3958
                          net->data.socket.address,
                          net->data.socket.port);
        break;
3959

3960
    case VIR_DOMAIN_NET_TYPE_UDP:
3961
        virBufferAsprintf(&buf, "socket,udp=%s:%d,localaddr=%s:%d,",
M
Michal Privoznik 已提交
3962 3963 3964 3965 3966
                          net->data.socket.address,
                          net->data.socket.port,
                          net->data.socket.localaddr,
                          net->data.socket.localport);
        break;
3967

3968
    case VIR_DOMAIN_NET_TYPE_USER:
3969 3970 3971 3972 3973 3974 3975 3976 3977 3978
        if (slirpfd) {
            virBufferAsprintf(&buf, "socket,fd=%s,", slirpfd);
        } else {
            virBufferAddLit(&buf, "user,");
            for (i = 0; i < net->guestIP.nips; i++) {
                const virNetDevIPAddr *ip = net->guestIP.ips[i];
                VIR_AUTOFREE(char *) addr = NULL;
                const char *prefix = "";

                if (!(addr = virSocketAddrFormat(&ip->address)))
3979
                    return NULL;
3980 3981 3982 3983 3984 3985 3986 3987 3988 3989 3990

                if (VIR_SOCKET_ADDR_IS_FAMILY(&ip->address, AF_INET))
                    prefix = "net=";
                if (VIR_SOCKET_ADDR_IS_FAMILY(&ip->address, AF_INET6))
                    prefix = "ipv6-net=";

                virBufferAsprintf(&buf, "%s%s", prefix, addr);
                if (ip->prefix)
                    virBufferAsprintf(&buf, "/%u", ip->prefix);
                virBufferAddChar(&buf, ',');
            }
3991 3992 3993
        }
        break;

3994
    case VIR_DOMAIN_NET_TYPE_INTERNAL:
3995
        virBufferAddLit(&buf, "user,");
3996
        break;
3997 3998

    case VIR_DOMAIN_NET_TYPE_VHOSTUSER:
3999
        virBufferAsprintf(&buf, "vhost-user,chardev=char%s,",
4000 4001
                          net->info.alias);
        if (net->driver.virtio.queues > 1)
4002
            virBufferAsprintf(&buf, "queues=%u,",
4003
                              net->driver.virtio.queues);
4004 4005
        break;

J
Ján Tomko 已提交
4006 4007
    case VIR_DOMAIN_NET_TYPE_HOSTDEV:
        /* Should have been handled earlier via PCI/USB hotplug code. */
4008 4009
    case VIR_DOMAIN_NET_TYPE_LAST:
        break;
4010 4011
    }

4012
    virBufferAsprintf(&buf, "id=host%s,", net->info.alias);
4013

4014
    if (is_tap) {
4015
        if (vhostfdSize) {
4016
            virBufferAddLit(&buf, "vhost=on,");
4017
            if (vhostfdSize == 1) {
4018
                virBufferAsprintf(&buf, "vhostfd=%s,", vhostfd[0]);
4019 4020 4021 4022 4023 4024 4025
            } else {
                virBufferAddLit(&buf, "vhostfds=");
                for (i = 0; i < vhostfdSize; i++) {
                    if (i)
                        virBufferAddChar(&buf, ':');
                    virBufferAdd(&buf, vhostfd[i], -1);
                }
4026
                virBufferAddChar(&buf, ',');
4027 4028
            }
        }
4029
        if (net->tune.sndbuf_specified)
4030
            virBufferAsprintf(&buf, "sndbuf=%lu,", net->tune.sndbuf);
4031 4032
    }

4033

4034
    virBufferTrim(&buf, ",", -1);
4035
    if (virBufferCheckError(&buf) < 0)
4036
        return NULL;
4037

4038
    return virBufferContentAndReset(&buf);
4039 4040 4041
}


M
Michal Privoznik 已提交
4042
char *
4043
qemuBuildWatchdogDevStr(const virDomainDef *def,
4044
                        virDomainWatchdogDefPtr dev,
4045
                        virQEMUCapsPtr qemuCaps)
4046
{
4047
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4048 4049 4050

    const char *model = virDomainWatchdogModelTypeToString(dev->model);
    if (!model) {
4051 4052
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("missing watchdog model"));
4053
        return NULL;
4054 4055
    }

4056
    virBufferAsprintf(&buf, "%s,id=%s", model, dev->info.alias);
4057
    if (qemuBuildDeviceAddressStr(&buf, def, &dev->info, qemuCaps) < 0)
4058
        return NULL;
4059

4060
    if (virBufferCheckError(&buf) < 0)
4061
        return NULL;
4062 4063 4064 4065 4066

    return virBufferContentAndReset(&buf);
}


4067 4068 4069 4070 4071 4072
static int
qemuBuildWatchdogCommandLine(virCommandPtr cmd,
                             const virDomainDef *def,
                             virQEMUCapsPtr qemuCaps)
{
    virDomainWatchdogDefPtr watchdog = def->watchdog;
4073
    VIR_AUTOFREE(char *) optstr = NULL;
4074
    const char *action;
4075
    int actualAction;
4076 4077 4078 4079

    if (!def->watchdog)
        return 0;

4080 4081 4082
    if (qemuCommandAddExtDevice(cmd, &def->watchdog->info) < 0)
        return -1;

4083
    virCommandAddArg(cmd, "-device");
4084

4085 4086 4087
    optstr = qemuBuildWatchdogDevStr(def, watchdog, qemuCaps);
    if (!optstr)
        return -1;
4088 4089 4090

    virCommandAddArg(cmd, optstr);

4091 4092 4093 4094
    /* qemu doesn't have a 'dump' action; we tell qemu to 'pause', then
       libvirt listens for the watchdog event, and we perform the dump
       ourselves. so convert 'dump' to 'pause' for the qemu cli */
    actualAction = watchdog->action;
4095
    if (watchdog->action == VIR_DOMAIN_WATCHDOG_ACTION_DUMP)
4096
        actualAction = VIR_DOMAIN_WATCHDOG_ACTION_PAUSE;
4097

4098
    action = virDomainWatchdogActionTypeToString(actualAction);
4099 4100 4101 4102 4103 4104 4105 4106 4107 4108 4109
    if (!action) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("invalid watchdog action"));
        return -1;
    }
    virCommandAddArgList(cmd, "-watchdog-action", action, NULL);

    return 0;
}


4110 4111 4112 4113
static int
qemuBuildMemballoonCommandLine(virCommandPtr cmd,
                               const virDomainDef *def,
                               virQEMUCapsPtr qemuCaps)
4114
{
4115
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4116

4117
    if (!virDomainDefHasMemballoon(def))
4118 4119
        return 0;

4120
    if (qemuBuildVirtioDevStr(&buf, "virtio-balloon", qemuCaps,
4121 4122
                              VIR_DOMAIN_DEVICE_MEMBALLOON,
                              def->memballoon) < 0) {
4123
        return -1;
4124 4125
    }

4126 4127
    virBufferAsprintf(&buf, ",id=%s", def->memballoon->info.alias);
    if (qemuBuildDeviceAddressStr(&buf, def, &def->memballoon->info, qemuCaps) < 0)
4128
        return -1;
4129

4130
    if (def->memballoon->autodeflate != VIR_TRISTATE_SWITCH_ABSENT) {
4131
        virBufferAsprintf(&buf, ",deflate-on-oom=%s",
4132
                          virTristateSwitchTypeToString(def->memballoon->autodeflate));
4133 4134
    }

4135
    if (qemuBuildVirtioOptionsStr(&buf, def->memballoon->virtio, qemuCaps) < 0)
4136
        return -1;
4137

4138
    if (qemuCommandAddExtDevice(cmd, &def->memballoon->info) < 0)
4139
        return -1;
4140

4141 4142 4143
    virCommandAddArg(cmd, "-device");
    virCommandAddArgBuffer(cmd, &buf);
    return 0;
4144 4145 4146
}


4147 4148 4149
static char *
qemuBuildNVRAMDevStr(virDomainNVRAMDefPtr dev)
{
4150
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4151 4152 4153 4154 4155 4156 4157 4158

    if (dev->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_SPAPRVIO &&
        dev->info.addr.spaprvio.has_reg) {
        virBufferAsprintf(&buf, "spapr-nvram.reg=0x%llx",
                          dev->info.addr.spaprvio.reg);
    } else {
        virReportError(VIR_ERR_XML_ERROR, "%s",
                       _("nvram address type must be spaprvio"));
4159
        return NULL;
4160 4161
    }

4162
    if (virBufferCheckError(&buf) < 0)
4163
        return NULL;
4164 4165 4166

    return virBufferContentAndReset(&buf);
}
4167

4168 4169 4170 4171 4172 4173 4174 4175 4176

static int
qemuBuildNVRAMCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
    if (!def->nvram)
        return 0;

4177
    if (qemuDomainIsPSeries(def)) {
4178 4179 4180 4181 4182 4183 4184
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_NVRAM)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("nvram device is not supported by "
                             "this QEMU binary"));
            return -1;
        }

4185
        VIR_AUTOFREE(char *) optstr = NULL;
4186 4187 4188 4189
        virCommandAddArg(cmd, "-global");
        optstr = qemuBuildNVRAMDevStr(def->nvram);
        if (!optstr)
            return -1;
4190
        virCommandAddArg(cmd, optstr);
4191 4192 4193 4194 4195 4196 4197 4198 4199 4200
    } else {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                      _("nvram device is only supported for PPC64"));
        return -1;
    }

    return 0;
}


4201
static char *
4202
qemuBuildVirtioInputDevStr(const virDomainDef *def,
4203 4204 4205
                           virDomainInputDefPtr dev,
                           virQEMUCapsPtr qemuCaps)
{
4206
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4207

4208
    switch ((virDomainInputType)dev->type) {
4209
    case VIR_DOMAIN_INPUT_TYPE_MOUSE:
4210
        if (qemuBuildVirtioDevStr(&buf, "virtio-mouse", qemuCaps,
4211
                                  VIR_DOMAIN_DEVICE_INPUT, dev) < 0) {
4212
            return NULL;
4213
        }
4214 4215
        break;
    case VIR_DOMAIN_INPUT_TYPE_TABLET:
4216
        if (qemuBuildVirtioDevStr(&buf, "virtio-tablet", qemuCaps,
4217
                                  VIR_DOMAIN_DEVICE_INPUT, dev) < 0) {
4218
            return NULL;
4219
        }
4220 4221
        break;
    case VIR_DOMAIN_INPUT_TYPE_KBD:
4222
        if (qemuBuildVirtioDevStr(&buf, "virtio-keyboard", qemuCaps,
4223
                                  VIR_DOMAIN_DEVICE_INPUT, dev) < 0) {
4224
            return NULL;
4225
        }
4226
        break;
4227
    case VIR_DOMAIN_INPUT_TYPE_PASSTHROUGH:
4228
        if (qemuBuildVirtioDevStr(&buf, "virtio-input-host", qemuCaps,
4229
                                  VIR_DOMAIN_DEVICE_INPUT, dev) < 0) {
4230
            return NULL;
4231
        }
4232
        break;
4233
    case VIR_DOMAIN_INPUT_TYPE_LAST:
4234 4235
    default:
        virReportEnumRangeError(virDomainInputType, dev->type);
4236
        return NULL;
4237 4238
    }

4239 4240 4241 4242 4243 4244 4245
    virBufferAsprintf(&buf, ",id=%s", dev->info.alias);

    if (dev->type == VIR_DOMAIN_INPUT_TYPE_PASSTHROUGH) {
        virBufferAddLit(&buf, ",evdev=");
        virQEMUBuildBufferEscapeComma(&buf, dev->source.evdev);
    }

4246
    if (qemuBuildDeviceAddressStr(&buf, def, &dev->info, qemuCaps) < 0)
4247
        return NULL;
4248

4249
    if (qemuBuildVirtioOptionsStr(&buf, dev->virtio, qemuCaps) < 0)
4250
        return NULL;
4251

4252
    if (virBufferCheckError(&buf) < 0)
4253
        return NULL;
4254 4255 4256 4257

    return virBufferContentAndReset(&buf);
}

4258 4259
static char *
qemuBuildUSBInputDevStr(const virDomainDef *def,
4260
                        virDomainInputDefPtr dev,
4261
                        virQEMUCapsPtr qemuCaps)
4262
{
4263
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4264

4265 4266 4267 4268 4269 4270 4271 4272
    switch (dev->type) {
    case VIR_DOMAIN_INPUT_TYPE_MOUSE:
        virBufferAsprintf(&buf, "usb-mouse,id=%s", dev->info.alias);
        break;
    case VIR_DOMAIN_INPUT_TYPE_TABLET:
        virBufferAsprintf(&buf, "usb-tablet,id=%s", dev->info.alias);
        break;
    case VIR_DOMAIN_INPUT_TYPE_KBD:
4273 4274 4275 4276
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_USB_KBD)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("usb keyboard is not supported by this "
                             "QEMU binary"));
4277
            return NULL;
4278
        }
4279 4280 4281
        virBufferAsprintf(&buf, "usb-kbd,id=%s", dev->info.alias);
        break;
    }
4282

4283
    if (qemuBuildDeviceAddressStr(&buf, def, &dev->info, qemuCaps) < 0)
4284
        return NULL;
4285

4286
    if (virBufferCheckError(&buf) < 0)
4287
        return NULL;
4288 4289 4290 4291 4292

    return virBufferContentAndReset(&buf);
}


J
Ján Tomko 已提交
4293 4294 4295 4296 4297 4298 4299 4300 4301 4302 4303 4304 4305 4306 4307 4308 4309 4310 4311 4312 4313
int
qemuBuildInputDevStr(char **devstr,
                     const virDomainDef *def,
                     virDomainInputDefPtr input,
                     virQEMUCapsPtr qemuCaps)
{
    switch (input->bus) {
    case VIR_DOMAIN_INPUT_BUS_USB:
        if (!(*devstr = qemuBuildUSBInputDevStr(def, input, qemuCaps)))
            return -1;
        break;

    case VIR_DOMAIN_INPUT_BUS_VIRTIO:
        if (!(*devstr = qemuBuildVirtioInputDevStr(def, input, qemuCaps)))
            return -1;
        break;
    }
    return 0;
}


4314 4315 4316 4317 4318 4319 4320 4321 4322
static int
qemuBuildInputCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
    size_t i;

    for (i = 0; i < def->ninputs; i++) {
        virDomainInputDefPtr input = def->inputs[i];
4323
        VIR_AUTOFREE(char *) devstr = NULL;
4324

4325 4326 4327
        if (qemuCommandAddExtDevice(cmd, &input->info) < 0)
            return -1;

J
Ján Tomko 已提交
4328 4329 4330 4331
        if (qemuBuildInputDevStr(&devstr, def, input, qemuCaps) < 0)
            return -1;

        if (devstr) {
4332
            virCommandAddArg(cmd, "-device");
J
Ján Tomko 已提交
4333
            virCommandAddArg(cmd, devstr);
4334 4335 4336 4337 4338 4339 4340
        }
    }

    return 0;
}


4341 4342
static char *
qemuBuildSoundDevStr(const virDomainDef *def,
4343
                     virDomainSoundDefPtr sound,
4344
                     virQEMUCapsPtr qemuCaps)
4345
{
4346
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4347
    const char *model = NULL;
4348

4349
    /* Hack for devices with different names in QEMU and libvirt */
4350
    switch ((virDomainSoundModel) sound->model) {
4351
    case VIR_DOMAIN_SOUND_MODEL_ES1370:
4352
        model = "ES1370";
4353 4354
        break;
    case VIR_DOMAIN_SOUND_MODEL_AC97:
4355
        model = "AC97";
4356 4357
        break;
    case VIR_DOMAIN_SOUND_MODEL_ICH6:
4358
        model = "intel-hda";
4359
        break;
4360 4361 4362 4363 4364 4365
    case VIR_DOMAIN_SOUND_MODEL_USB:
        model = "usb-audio";
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_USB_AUDIO)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("usb-audio controller is not supported "
                             "by this QEMU binary"));
4366
            return NULL;
4367 4368
        }
        break;
4369 4370 4371 4372 4373 4374
    case VIR_DOMAIN_SOUND_MODEL_ICH9:
        model = "ich9-intel-hda";
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_ICH9_INTEL_HDA)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("The ich9-intel-hda audio controller "
                             "is not supported in this QEMU binary"));
4375
            return NULL;
4376 4377
        }
        break;
4378 4379 4380 4381 4382 4383 4384 4385
    case VIR_DOMAIN_SOUND_MODEL_SB16:
        model = "sb16";
        break;
    case VIR_DOMAIN_SOUND_MODEL_PCSPK: /* pc-speaker is handled separately */
    case VIR_DOMAIN_SOUND_MODEL_LAST:
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("sound card model '%s' is not supported by qemu"),
                       virDomainSoundModelTypeToString(sound->model));
4386
        return NULL;
4387
    }
4388

4389
    virBufferAsprintf(&buf, "%s,id=%s", model, sound->info.alias);
4390
    if (qemuBuildDeviceAddressStr(&buf, def, &sound->info, qemuCaps) < 0)
4391
        return NULL;
4392

4393
    if (virBufferCheckError(&buf) < 0)
4394
        return NULL;
4395 4396 4397 4398

    return virBufferContentAndReset(&buf);
}

4399 4400 4401 4402 4403 4404 4405 4406 4407

static int
qemuSoundCodecTypeToCaps(int type)
{
    switch (type) {
    case VIR_DOMAIN_SOUND_CODEC_TYPE_DUPLEX:
        return QEMU_CAPS_HDA_DUPLEX;
    case VIR_DOMAIN_SOUND_CODEC_TYPE_MICRO:
        return QEMU_CAPS_HDA_MICRO;
4408 4409
    case VIR_DOMAIN_SOUND_CODEC_TYPE_OUTPUT:
        return QEMU_CAPS_HDA_OUTPUT;
4410 4411 4412 4413 4414 4415
    default:
        return -1;
    }
}


4416 4417
static char *
qemuBuildSoundCodecStr(virDomainSoundDefPtr sound,
4418
                       virDomainSoundCodecDefPtr codec,
4419
                       virQEMUCapsPtr qemuCaps)
4420
{
4421
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4422
    const char *stype;
4423
    int type, flags;
4424

4425 4426
    type = codec->type;
    stype = qemuSoundCodecTypeToString(type);
4427
    flags = qemuSoundCodecTypeToCaps(type);
4428

4429
    if (flags == -1 || !virQEMUCapsGet(qemuCaps, flags)) {
4430 4431
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("%s not supported in this QEMU binary"), stype);
4432
        return NULL;
4433 4434
    }

4435 4436 4437
    virBufferAsprintf(&buf, "%s,id=%s-codec%d,bus=%s.0,cad=%d",
                      stype, sound->info.alias, codec->cad, sound->info.alias, codec->cad);

4438 4439
    return virBufferContentAndReset(&buf);
}
4440

4441 4442 4443 4444 4445 4446 4447 4448

static int
qemuBuildSoundCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
    size_t i, j;

4449 4450
    for (i = 0; i < def->nsounds; i++) {
        virDomainSoundDefPtr sound = def->sounds[i];
4451
        VIR_AUTOFREE(char *) str = NULL;
4452

4453 4454 4455 4456 4457 4458
        /* Sadly pcspk device doesn't use -device syntax. Fortunately
         * we don't need to set any PCI address on it, so we don't
         * mind too much */
        if (sound->model == VIR_DOMAIN_SOUND_MODEL_PCSPK) {
            virCommandAddArgList(cmd, "-soundhw", "pcspk", NULL);
        } else {
4459 4460 4461
            if (qemuCommandAddExtDevice(cmd, &sound->info) < 0)
                return -1;

4462 4463 4464
            virCommandAddArg(cmd, "-device");
            if (!(str = qemuBuildSoundDevStr(def, sound, qemuCaps)))
                return -1;
4465

4466 4467 4468
            virCommandAddArg(cmd, str);
            if (sound->model == VIR_DOMAIN_SOUND_MODEL_ICH6 ||
                sound->model == VIR_DOMAIN_SOUND_MODEL_ICH9) {
4469

4470
                for (j = 0; j < sound->ncodecs; j++) {
4471
                    VIR_AUTOFREE(char *) codecstr = NULL;
4472 4473 4474 4475 4476
                    virCommandAddArg(cmd, "-device");
                    if (!(codecstr =
                          qemuBuildSoundCodecStr(sound, sound->codecs[j],
                                                 qemuCaps))) {
                        return -1;
4477 4478

                    }
4479 4480 4481
                    virCommandAddArg(cmd, codecstr);
                }
                if (j == 0) {
4482
                    VIR_AUTOFREE(char *) codecstr = NULL;
4483 4484 4485 4486 4487 4488 4489 4490 4491
                    virDomainSoundCodecDef codec = {
                        VIR_DOMAIN_SOUND_CODEC_TYPE_DUPLEX,
                        0
                    };
                    virCommandAddArg(cmd, "-device");
                    if (!(codecstr =
                          qemuBuildSoundCodecStr(sound, &codec,
                                                 qemuCaps))) {
                        return -1;
4492 4493

                    }
4494
                    virCommandAddArg(cmd, codecstr);
4495 4496 4497 4498 4499 4500 4501 4502 4503
                }
            }
        }
    }
    return 0;
}



4504
static char *
4505
qemuBuildDeviceVideoStr(const virDomainDef *def,
4506
                        virDomainVideoDefPtr video,
4507
                        virQEMUCapsPtr qemuCaps)
4508
{
4509
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4510
    const char *model = NULL;
4511

4512 4513 4514 4515
    /* We try to chose the best model for primary video device by preferring
     * model with VGA compatibility mode.  For some video devices on some
     * architectures there might not be such model so fallback to one
     * without VGA compatibility mode. */
4516 4517 4518 4519 4520 4521 4522 4523 4524 4525 4526
    if (video->backend == VIR_DOMAIN_VIDEO_BACKEND_TYPE_VHOSTUSER) {
        if (video->primary && qemuDomainSupportsVideoVga(video, qemuCaps))
            model = "vhost-user-vga";
        else
            model = "vhost-user-gpu";
    } else {
        if (video->primary && qemuDomainSupportsVideoVga(video, qemuCaps))
            model = qemuDeviceVideoTypeToString(video->type);
        else
            model = qemuDeviceVideoSecondaryTypeToString(video->type);
    }
4527 4528 4529 4530 4531

    if (!model || STREQ(model, "")) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("invalid model for video type '%s'"),
                       virDomainVideoTypeToString(video->type));
4532
        return NULL;
4533 4534
    }

4535 4536
    if (STREQ(model, "virtio-gpu") || STREQ(model, "vhost-user-gpu")) {
        if (qemuBuildVirtioDevStr(&buf, model, qemuCaps,
4537
                                  VIR_DOMAIN_DEVICE_VIDEO, video) < 0) {
4538
            return NULL;
4539
        }
4540 4541 4542 4543 4544
    } else {
        virBufferAsprintf(&buf, "%s", model);
    }

    virBufferAsprintf(&buf, ",id=%s", video->info.alias);
4545

4546 4547 4548 4549 4550 4551
    if (video->backend != VIR_DOMAIN_VIDEO_BACKEND_TYPE_VHOSTUSER &&
        video->type == VIR_DOMAIN_VIDEO_TYPE_VIRTIO) {
        if (video->accel && video->accel->accel3d == VIR_TRISTATE_SWITCH_ON) {
            virBufferAsprintf(&buf, ",virgl=%s",
                              virTristateSwitchTypeToString(video->accel->accel3d));
        }
4552 4553 4554
    }

    if (video->type == VIR_DOMAIN_VIDEO_TYPE_QXL) {
4555 4556 4557 4558
        if (video->ram) {
            /* QEMU accepts bytes for ram_size. */
            virBufferAsprintf(&buf, ",ram_size=%u", video->ram * 1024);
        }
4559

4560 4561 4562 4563
        if (video->vram) {
            /* QEMU accepts bytes for vram_size. */
            virBufferAsprintf(&buf, ",vram_size=%u", video->vram * 1024);
        }
4564

4565
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_QXL_VRAM64)) {
4566 4567 4568 4569
            /* QEMU accepts mebibytes for vram64_size_mb. */
            virBufferAsprintf(&buf, ",vram64_size_mb=%u", video->vram64 / 1024);
        }

4570
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_QXL_VGAMEM)) {
4571 4572 4573
            /* QEMU accepts mebibytes for vgamem_mb. */
            virBufferAsprintf(&buf, ",vgamem_mb=%u", video->vgamem / 1024);
        }
4574

4575
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_QXL_MAX_OUTPUTS)) {
4576 4577 4578
            if (video->heads)
                virBufferAsprintf(&buf, ",max_outputs=%u", video->heads);
        }
4579 4580 4581 4582
    } else if (video->backend == VIR_DOMAIN_VIDEO_BACKEND_TYPE_VHOSTUSER) {
        if (video->heads)
            virBufferAsprintf(&buf, ",max_outputs=%u", video->heads);
        virBufferAsprintf(&buf, ",chardev=chr-vu-%s", video->info.alias);
4583 4584 4585 4586 4587
    } else if (video->type == VIR_DOMAIN_VIDEO_TYPE_VIRTIO) {
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_GPU_MAX_OUTPUTS)) {
            if (video->heads)
                virBufferAsprintf(&buf, ",max_outputs=%u", video->heads);
        }
4588 4589 4590 4591 4592 4593
    } else if ((video->type == VIR_DOMAIN_VIDEO_TYPE_VGA &&
                virQEMUCapsGet(qemuCaps, QEMU_CAPS_VGA_VGAMEM)) ||
               (video->type == VIR_DOMAIN_VIDEO_TYPE_VMVGA &&
                virQEMUCapsGet(qemuCaps, QEMU_CAPS_VMWARE_SVGA_VGAMEM))) {
        if (video->vram)
            virBufferAsprintf(&buf, ",vgamem_mb=%u", video->vram / 1024);
4594 4595 4596
    } else if (video->type == VIR_DOMAIN_VIDEO_TYPE_BOCHS) {
        if (video->vram)
            virBufferAsprintf(&buf, ",vgamem=%uk", video->vram);
4597 4598
    }

4599
    if (qemuBuildDeviceAddressStr(&buf, def, &video->info, qemuCaps) < 0)
4600
        return NULL;
4601

4602
    if (qemuBuildVirtioOptionsStr(&buf, video->virtio, qemuCaps) < 0)
4603
        return NULL;
4604

4605
    if (virBufferCheckError(&buf) < 0)
4606
        return NULL;
4607 4608 4609 4610 4611

    return virBufferContentAndReset(&buf);
}


4612 4613
static int
qemuBuildVgaVideoCommand(virCommandPtr cmd,
4614
                         virDomainVideoDefPtr video,
4615 4616
                         virQEMUCapsPtr qemuCaps)
{
4617
    const char *vgastr = qemuVideoTypeToString(video->type);
4618 4619 4620
    if (!vgastr || STREQ(vgastr, "")) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("invalid model for video type '%s'"),
4621
                       virDomainVideoTypeToString(video->type));
4622 4623 4624 4625 4626 4627 4628 4629 4630 4631 4632 4633 4634 4635 4636 4637
        return -1;
    }

    virCommandAddArgList(cmd, "-vga", vgastr, NULL);

    /* If we cannot use --device option to specify the video device
     * in QEMU we will fallback to the old --vga option. To get the
     * correct device name for the --vga option the 'qemuVideo' is
     * used, but to set some device attributes we need to use the
     * --global option and for that we need to specify the device
     * name the same as for --device option and for that we need to
     * use 'qemuDeviceVideo'.
     *
     * See 'Graphics Devices' section in docs/qdev-device-use.txt in
     * QEMU repository.
     */
4638
    const char *dev = qemuDeviceVideoTypeToString(video->type);
4639

4640 4641 4642 4643 4644 4645
    if (video->type == VIR_DOMAIN_VIDEO_TYPE_QXL &&
        (video->vram || video->ram)) {
        unsigned int ram = video->ram;
        unsigned int vram = video->vram;
        unsigned int vram64 = video->vram64;
        unsigned int vgamem = video->vgamem;
4646
        unsigned int heads = video->heads;
4647 4648 4649 4650 4651 4652 4653 4654 4655 4656 4657 4658 4659 4660 4661 4662 4663 4664 4665 4666 4667 4668 4669

        if (ram) {
            virCommandAddArg(cmd, "-global");
            virCommandAddArgFormat(cmd, "%s.ram_size=%u",
                                   dev, ram * 1024);
        }
        if (vram) {
            virCommandAddArg(cmd, "-global");
            virCommandAddArgFormat(cmd, "%s.vram_size=%u",
                                   dev, vram * 1024);
        }
        if (vram64 &&
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_QXL_VRAM64)) {
            virCommandAddArg(cmd, "-global");
            virCommandAddArgFormat(cmd, "%s.vram64_size_mb=%u",
                                   dev, vram64 / 1024);
        }
        if (vgamem &&
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_QXL_VGAMEM)) {
            virCommandAddArg(cmd, "-global");
            virCommandAddArgFormat(cmd, "%s.vgamem_mb=%u",
                                   dev, vgamem / 1024);
        }
4670 4671 4672 4673 4674 4675
        if (heads &&
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_QXL_MAX_OUTPUTS)) {
            virCommandAddArg(cmd, "-global");
            virCommandAddArgFormat(cmd, "%s.max_outputs=%u",
                                   dev, heads);
        }
4676 4677
    }

4678 4679
    if (video->vram &&
        ((video->type == VIR_DOMAIN_VIDEO_TYPE_VGA &&
4680
          virQEMUCapsGet(qemuCaps, QEMU_CAPS_VGA_VGAMEM)) ||
4681
         (video->type == VIR_DOMAIN_VIDEO_TYPE_VMVGA &&
4682
          virQEMUCapsGet(qemuCaps, QEMU_CAPS_VMWARE_SVGA_VGAMEM)))) {
4683
        unsigned int vram = video->vram;
4684 4685 4686 4687 4688 4689 4690 4691 4692 4693

        virCommandAddArg(cmd, "-global");
        virCommandAddArgFormat(cmd, "%s.vgamem_mb=%u",
                               dev, vram / 1024);
    }

    return 0;
}


4694 4695 4696 4697 4698 4699 4700
static char *
qemuBuildVhostUserChardevStr(const char *alias,
                             int *fd,
                             virCommandPtr cmd)
{
    char *chardev = NULL;

4701 4702 4703 4704 4705 4706
    if (*fd == -1) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Attempt to pass closed vhostuser FD"));
        return NULL;
    }

4707 4708 4709 4710 4711 4712 4713 4714 4715 4716
    if (virAsprintf(&chardev, "socket,id=chr-vu-%s,fd=%d", alias, *fd) < 0)
        return NULL;

    virCommandPassFD(cmd, *fd, VIR_COMMAND_PASS_FD_CLOSE_PARENT);
    *fd = -1;

    return chardev;
}


4717 4718 4719 4720 4721 4722 4723
static int
qemuBuildVideoCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
    size_t i;

4724 4725 4726 4727 4728 4729 4730 4731 4732 4733 4734 4735 4736 4737
    for (i = 0; i < def->nvideos; i++) {
        VIR_AUTOFREE(char *) chardev = NULL;
        virDomainVideoDefPtr video = def->videos[i];

        if (video->backend == VIR_DOMAIN_VIDEO_BACKEND_TYPE_VHOSTUSER) {
            if (!(chardev = qemuBuildVhostUserChardevStr(video->info.alias,
                                &QEMU_DOMAIN_VIDEO_PRIVATE(video)->vhost_user_fd,
                                cmd)))
                return -1;

            virCommandAddArgList(cmd, "-chardev", chardev, NULL);
        }
    }

4738
    for (i = 0; i < def->nvideos; i++) {
4739
        VIR_AUTOFREE(char *) str = NULL;
4740
        virDomainVideoDefPtr video = def->videos[i];
4741

4742 4743 4744
        if (video->type == VIR_DOMAIN_VIDEO_TYPE_NONE)
            continue;

4745 4746
        if (video->primary) {
            if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VIDEO_PRIMARY)) {
4747

4748 4749 4750 4751
                if (qemuCommandAddExtDevice(cmd,
                                            &def->videos[i]->info) < 0)
                    return -1;

4752
                virCommandAddArg(cmd, "-device");
4753

4754 4755
                if (!(str = qemuBuildDeviceVideoStr(def, video, qemuCaps)))
                    return -1;
4756

4757 4758 4759 4760 4761 4762
                virCommandAddArg(cmd, str);
            } else {
                if (qemuBuildVgaVideoCommand(cmd, video, qemuCaps) < 0)
                    return -1;
            }
        } else {
4763 4764 4765
            if (qemuCommandAddExtDevice(cmd, &def->videos[i]->info) < 0)
                return -1;

4766
            virCommandAddArg(cmd, "-device");
4767

4768
            if (!(str = qemuBuildDeviceVideoStr(def, video, qemuCaps)))
4769
                return -1;
4770 4771

            virCommandAddArg(cmd, str);
4772 4773 4774 4775 4776 4777 4778
        }
    }

    return 0;
}


4779
char *
4780
qemuBuildPCIHostdevDevStr(const virDomainDef *def,
4781
                          virDomainHostdevDefPtr dev,
4782
                          unsigned int bootIndex, /* used iff dev->info->bootIndex == 0 */
4783
                          virQEMUCapsPtr qemuCaps)
4784
{
4785
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4786 4787
    virDomainHostdevSubsysPCIPtr pcisrc = &dev->source.subsys.u.pci;
    int backend = pcisrc->backend;
4788

4789
    /* caller has to assign proper passthrough backend type */
4790
    switch ((virDomainHostdevSubsysPCIBackendType)backend) {
4791 4792 4793 4794
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO:
        virBufferAddLit(&buf, "vfio-pci");
        break;

M
Michal Privoznik 已提交
4795
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_KVM:
4796 4797 4798
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_DEFAULT:
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_XEN:
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_TYPE_LAST:
4799 4800
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("invalid PCI passthrough type '%s'"),
4801
                       virDomainHostdevSubsysPCIBackendTypeToString(backend));
4802
        return NULL;
4803
    }
4804

4805
    virBufferAddLit(&buf, ",host=");
4806 4807
    virBufferAsprintf(&buf,
                      VIR_PCI_DEVICE_ADDRESS_FMT,
4808 4809 4810
                      pcisrc->addr.domain,
                      pcisrc->addr.bus,
                      pcisrc->addr.slot,
4811
                      pcisrc->addr.function);
4812 4813
    virBufferAsprintf(&buf, ",id=%s", dev->info->alias);
    if (dev->info->bootIndex)
4814 4815
        bootIndex = dev->info->bootIndex;
    if (bootIndex)
4816
        virBufferAsprintf(&buf, ",bootindex=%u", bootIndex);
4817
    if (qemuBuildDeviceAddressStr(&buf, def, dev->info, qemuCaps) < 0)
4818
        return NULL;
4819
    if (qemuBuildRomStr(&buf, dev->info) < 0)
4820
        return NULL;
4821

4822
    if (virBufferCheckError(&buf) < 0)
4823
        return NULL;
4824 4825 4826 4827 4828 4829

    return virBufferContentAndReset(&buf);
}


char *
4830
qemuBuildUSBHostdevDevStr(const virDomainDef *def,
4831
                          virDomainHostdevDefPtr dev,
4832
                          virQEMUCapsPtr qemuCaps)
4833
{
4834
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4835
    virDomainHostdevSubsysUSBPtr usbsrc = &dev->source.subsys.u.usb;
4836

4837
    if (!dev->missing && !usbsrc->bus && !usbsrc->device) {
4838 4839
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("USB host device is missing bus/device information"));
4840 4841 4842
        return NULL;
    }

4843 4844 4845
    virBufferAddLit(&buf, "usb-host");
    if (!dev->missing) {
        virBufferAsprintf(&buf, ",hostbus=%d,hostaddr=%d",
4846
                          usbsrc->bus, usbsrc->device);
4847 4848
    }
    virBufferAsprintf(&buf, ",id=%s", dev->info->alias);
4849
    if (dev->info->bootIndex)
4850
        virBufferAsprintf(&buf, ",bootindex=%u", dev->info->bootIndex);
4851

4852
    if (qemuBuildDeviceAddressStr(&buf, def, dev->info, qemuCaps) < 0)
4853
        return NULL;
4854

4855
    if (virBufferCheckError(&buf) < 0)
4856
        return NULL;
4857

4858
    return virBufferContentAndReset(&buf);
4859 4860 4861
}


4862 4863
static char *
qemuBuildHubDevStr(const virDomainDef *def,
4864
                   virDomainHubDefPtr dev,
4865
                   virQEMUCapsPtr qemuCaps)
M
Marc-André Lureau 已提交
4866
{
4867
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
M
Marc-André Lureau 已提交
4868 4869

    if (dev->type != VIR_DOMAIN_HUB_TYPE_USB) {
4870 4871 4872
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("hub type %s not supported"),
                       virDomainHubTypeToString(dev->type));
4873
        return NULL;
M
Marc-André Lureau 已提交
4874 4875
    }

4876
    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_USB_HUB)) {
4877
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
4878
                       _("usb-hub not supported by QEMU binary"));
4879
        return NULL;
M
Marc-André Lureau 已提交
4880 4881 4882 4883
    }

    virBufferAddLit(&buf, "usb-hub");
    virBufferAsprintf(&buf, ",id=%s", dev->info.alias);
4884
    if (qemuBuildDeviceAddressStr(&buf, def, &dev->info, qemuCaps) < 0)
4885
        return NULL;
M
Marc-André Lureau 已提交
4886

4887
    if (virBufferCheckError(&buf) < 0)
4888
        return NULL;
M
Marc-André Lureau 已提交
4889 4890 4891 4892 4893

    return virBufferContentAndReset(&buf);
}


4894 4895 4896 4897 4898 4899 4900 4901 4902
static int
qemuBuildHubCommandLine(virCommandPtr cmd,
                        const virDomainDef *def,
                        virQEMUCapsPtr qemuCaps)
{
    size_t i;

    for (i = 0; i < def->nhubs; i++) {
        virDomainHubDefPtr hub = def->hubs[i];
4903
        VIR_AUTOFREE(char *) optstr = NULL;
4904 4905 4906 4907 4908 4909 4910 4911 4912 4913 4914

        virCommandAddArg(cmd, "-device");
        if (!(optstr = qemuBuildHubDevStr(def, hub, qemuCaps)))
            return -1;
        virCommandAddArg(cmd, optstr);
    }

    return 0;
}


4915
static char *
J
Ján Tomko 已提交
4916
qemuBuildSCSIHostHostdevDrvStr(virDomainHostdevDefPtr dev)
4917
{
4918
    virDomainHostdevSubsysSCSIPtr scsisrc = &dev->source.subsys.u.scsi;
4919
    virDomainHostdevSubsysSCSIHostPtr scsihostsrc = &scsisrc->u.host;
J
Ján Tomko 已提交
4920 4921 4922 4923 4924 4925

    return virSCSIDeviceGetSgName(NULL,
                                  scsihostsrc->adapter,
                                  scsihostsrc->bus,
                                  scsihostsrc->target,
                                  scsihostsrc->unit);
4926 4927 4928
}

static char *
4929 4930
qemuBuildSCSIiSCSIHostdevDrvStr(virDomainHostdevDefPtr dev,
                                virQEMUCapsPtr qemuCaps)
4931
{
4932
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4933
    VIR_AUTOFREE(char *) netsource = NULL;
4934
    VIR_AUTOPTR(virJSONValue) srcprops = NULL;
4935 4936
    virDomainHostdevSubsysSCSIPtr scsisrc = &dev->source.subsys.u.scsi;
    virDomainHostdevSubsysSCSIiSCSIPtr iscsisrc = &scsisrc->u.iscsi;
4937 4938
    qemuDomainStorageSourcePrivatePtr srcPriv =
        QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(iscsisrc->src);
4939

4940 4941
    if (qemuDiskSourceNeedsProps(iscsisrc->src, qemuCaps)) {
        if (!(srcprops = qemuDiskSourceGetProps(iscsisrc->src)))
4942
            return NULL;
4943
        if (!(netsource = virQEMUBuildDriveCommandlineFromJSON(srcprops)))
4944
            return NULL;
4945
        virBufferAsprintf(&buf, "%s,if=none,format=raw", netsource);
4946 4947 4948 4949
    } else {
        /* Rather than pull what we think we want - use the network disk code */
        if (!(netsource = qemuBuildNetworkDriveStr(iscsisrc->src, srcPriv ?
                                                   srcPriv->secinfo : NULL)))
4950
            return NULL;
4951 4952 4953
        virBufferAddLit(&buf, "file=");
        virQEMUBuildBufferEscapeComma(&buf, netsource);
        virBufferAddLit(&buf, ",if=none,format=raw");
4954
    }
4955

4956
    if (virBufferCheckError(&buf) < 0)
4957
        return NULL;
4958

4959
    return virBufferContentAndReset(&buf);
4960 4961
}

4962 4963 4964 4965 4966 4967
char *
qemuBuildSCSIVHostHostdevDevStr(const virDomainDef *def,
                           virDomainHostdevDefPtr dev,
                           virQEMUCapsPtr qemuCaps,
                           char *vhostfdName)
{
4968
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
4969 4970 4971 4972 4973
    virDomainHostdevSubsysSCSIVHostPtr hostsrc = &dev->source.subsys.u.scsi_host;

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VHOST_SCSI)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("This QEMU doesn't support vhost-scsi devices"));
4974
        return NULL;
4975 4976
    }

4977
    if (qemuBuildVirtioDevStr(&buf, "vhost-scsi", qemuCaps,
4978
                              VIR_DOMAIN_DEVICE_HOSTDEV, dev) < 0) {
4979
        return NULL;
4980
    }
4981 4982 4983 4984 4985 4986 4987

    virBufferAsprintf(&buf, ",wwpn=%s,vhostfd=%s,id=%s",
                      hostsrc->wwpn,
                      vhostfdName,
                      dev->info->alias);

    if (qemuBuildDeviceAddressStr(&buf, def, dev->info, qemuCaps) < 0)
4988
        return NULL;
4989 4990

    if (virBufferCheckError(&buf) < 0)
4991
        return NULL;
4992 4993 4994 4995

    return virBufferContentAndReset(&buf);
}

4996
char *
4997 4998
qemuBuildSCSIHostdevDrvStr(virDomainHostdevDefPtr dev,
                           virQEMUCapsPtr qemuCaps)
4999
{
5000
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5001 5002
    VIR_AUTOFREE(char *) source = NULL;
    VIR_AUTOFREE(char *) drivealias = NULL;
5003 5004 5005
    virDomainHostdevSubsysSCSIPtr scsisrc = &dev->source.subsys.u.scsi;

    if (scsisrc->protocol == VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI) {
5006
        if (!(source = qemuBuildSCSIiSCSIHostdevDrvStr(dev, qemuCaps)))
5007
            return NULL;
5008
        virBufferAdd(&buf, source, -1);
5009
    } else {
J
Ján Tomko 已提交
5010
        if (!(source = qemuBuildSCSIHostHostdevDrvStr(dev)))
5011
            return NULL;
5012
        virBufferAsprintf(&buf, "file=/dev/%s,if=none,format=raw", source);
5013
    }
J
John Ferlan 已提交
5014 5015

    if (!(drivealias = qemuAliasFromHostdev(dev)))
5016
        return NULL;
J
John Ferlan 已提交
5017
    virBufferAsprintf(&buf, ",id=%s", drivealias);
5018

5019 5020
    if (dev->readonly)
        virBufferAddLit(&buf, ",readonly=on");
O
Osier Yang 已提交
5021

5022
    if (virBufferCheckError(&buf) < 0)
5023
        return NULL;
5024 5025 5026 5027 5028

    return virBufferContentAndReset(&buf);
}

char *
5029
qemuBuildSCSIHostdevDevStr(const virDomainDef *def,
5030
                           virDomainHostdevDefPtr dev)
5031
{
5032
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5033
    int model = -1;
5034
    VIR_AUTOFREE(char *) driveAlias = NULL;
5035
    const char *contAlias;
5036

5037
    model = qemuDomainFindSCSIControllerModel(def, dev->info);
5038
    if (model < 0)
5039
        return NULL;
5040 5041 5042 5043 5044 5045

    if (model == VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LSILOGIC) {
        if (dev->info->addr.drive.target != 0) {
           virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("target must be 0 for scsi host device "
                             "if its controller model is 'lsilogic'"));
5046
            return NULL;
5047 5048 5049 5050 5051 5052
        }

        if (dev->info->addr.drive.unit > 7) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("unit must be not more than 7 for scsi host "
                             "device if its controller model is 'lsilogic'"));
5053
            return NULL;
5054 5055 5056 5057 5058
        }
    }

    virBufferAddLit(&buf, "scsi-generic");

5059 5060
    if (!(contAlias = virDomainControllerAliasFind(def, VIR_DOMAIN_CONTROLLER_TYPE_SCSI,
                                                   dev->info->addr.drive.controller)))
5061
        return NULL;
5062

5063
    if (model == VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LSILOGIC) {
5064 5065
        virBufferAsprintf(&buf, ",bus=%s.%d,scsi-id=%d",
                          contAlias,
5066 5067 5068
                          dev->info->addr.drive.bus,
                          dev->info->addr.drive.unit);
    } else {
5069 5070
        virBufferAsprintf(&buf, ",bus=%s.0,channel=%d,scsi-id=%d,lun=%d",
                          contAlias,
5071 5072 5073 5074
                          dev->info->addr.drive.bus,
                          dev->info->addr.drive.target,
                          dev->info->addr.drive.unit);
    }
5075

J
John Ferlan 已提交
5076
    if (!(driveAlias = qemuAliasFromHostdev(dev)))
5077
        return NULL;
J
John Ferlan 已提交
5078
    virBufferAsprintf(&buf, ",drive=%s,id=%s", driveAlias, dev->info->alias);
5079

5080
    if (dev->info->bootIndex)
5081
        virBufferAsprintf(&buf, ",bootindex=%u", dev->info->bootIndex);
5082

5083
    if (virBufferCheckError(&buf) < 0)
5084
        return NULL;
5085 5086 5087

    return virBufferContentAndReset(&buf);
}
5088

5089 5090 5091
static int
qemuBuildChrChardevFileStr(virLogManagerPtr logManager,
                           virCommandPtr cmd,
5092
                           const virDomainDef *def,
5093 5094 5095 5096 5097
                           virBufferPtr buf,
                           const char *filearg, const char *fileval,
                           const char *appendarg, int appendval)
{
    if (logManager) {
5098 5099
        VIR_AUTOFREE(char *) fdset = NULL;
        VIR_AUTOFREE(char *) fdpath = NULL;
5100 5101 5102
        int flags = 0;
        int logfd;

5103 5104
        if (appendval == VIR_TRISTATE_SWITCH_ABSENT ||
            appendval == VIR_TRISTATE_SWITCH_OFF)
5105 5106 5107 5108 5109 5110 5111 5112 5113 5114 5115 5116 5117 5118 5119 5120 5121 5122 5123 5124 5125 5126 5127
            flags |= VIR_LOG_MANAGER_PROTOCOL_DOMAIN_OPEN_LOG_FILE_TRUNCATE;

        if ((logfd = virLogManagerDomainOpenLogFile(logManager,
                                                    "qemu",
                                                    def->uuid,
                                                    def->name,
                                                    fileval,
                                                    flags,
                                                    NULL, NULL)) < 0)
            return -1;

        virCommandPassFD(cmd, logfd, VIR_COMMAND_PASS_FD_CLOSE_PARENT);
        if (!(fdset = qemuVirCommandGetFDSet(cmd, logfd)))
            return -1;

        virCommandAddArg(cmd, "-add-fd");
        virCommandAddArg(cmd, fdset);

        if (!(fdpath = qemuVirCommandGetDevSet(cmd, logfd)))
            return -1;

        virBufferAsprintf(buf, ",%s=%s,%s=on", filearg, fdpath, appendarg);
    } else {
5128 5129
        virBufferAsprintf(buf, ",%s=", filearg);
        virQEMUBuildBufferEscapeComma(buf, fileval);
5130 5131 5132 5133 5134 5135 5136 5137 5138
        if (appendval != VIR_TRISTATE_SWITCH_ABSENT) {
            virBufferAsprintf(buf, ",%s=%s", appendarg,
                              virTristateSwitchTypeToString(appendval));
        }
    }

    return 0;
}

5139 5140 5141 5142 5143 5144 5145 5146 5147 5148 5149 5150 5151

static void
qemuBuildChrChardevReconnectStr(virBufferPtr buf,
                                const virDomainChrSourceReconnectDef *def)
{
    if (def->enabled == VIR_TRISTATE_BOOL_YES) {
        virBufferAsprintf(buf, ",reconnect=%u", def->timeout);
    } else if (def->enabled == VIR_TRISTATE_BOOL_NO) {
        virBufferAddLit(buf, ",reconnect=0");
    }
}


5152 5153 5154 5155 5156 5157 5158 5159 5160 5161 5162 5163 5164 5165 5166
int
qemuOpenChrChardevUNIXSocket(const virDomainChrSourceDef *dev)
{
    struct sockaddr_un addr;
    socklen_t addrlen = sizeof(addr);
    int fd;

    if ((fd = socket(AF_UNIX, SOCK_STREAM, 0)) < 0) {
        virReportSystemError(errno, "%s",
                             _("Unable to create UNIX socket"));
        goto error;
    }

    memset(&addr, 0, sizeof(addr));
    addr.sun_family = AF_UNIX;
5167
    if (virStrcpyStatic(addr.sun_path, dev->data.nix.path) < 0) {
5168 5169 5170 5171 5172 5173 5174 5175 5176 5177 5178 5179 5180 5181 5182 5183 5184 5185 5186 5187 5188 5189 5190 5191 5192 5193 5194
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("UNIX socket path '%s' too long"),
                       dev->data.nix.path);
        goto error;
    }

    if (unlink(dev->data.nix.path) < 0 && errno != ENOENT) {
        virReportSystemError(errno,
                             _("Unable to unlink %s"),
                             dev->data.nix.path);
        goto error;
    }

    if (bind(fd, (struct sockaddr *)&addr, addrlen) < 0) {
        virReportSystemError(errno,
                             _("Unable to bind to UNIX socket path '%s'"),
                             dev->data.nix.path);
        goto error;
    }

    if (listen(fd, 1) < 0) {
        virReportSystemError(errno,
                             _("Unable to listen to UNIX socket path '%s'"),
                             dev->data.nix.path);
        goto error;
    }

5195 5196 5197 5198 5199 5200
    /* We run QEMU with umask 0002. Compensate for the umask
     * libvirtd might be running under to get the same permission
     * QEMU would have. */
    if (virFileUpdatePerm(dev->data.nix.path, 0002, 0664) < 0)
        goto error;

5201 5202 5203 5204 5205 5206 5207
    return fd;

 error:
    VIR_FORCE_CLOSE(fd);
    return -1;
}

5208 5209 5210 5211

enum {
    QEMU_BUILD_CHARDEV_TCP_NOWAIT = (1 << 0),
    QEMU_BUILD_CHARDEV_FILE_LOGD  = (1 << 1),
5212
    QEMU_BUILD_CHARDEV_UNIX_FD_PASS = (1 << 2),
5213 5214
};

5215 5216
/* This function outputs a -chardev command line option which describes only the
 * host side of the character device */
5217
static char *
5218
qemuBuildChrChardevStr(virLogManagerPtr logManager,
5219
                       virSecurityManagerPtr secManager,
5220
                       virCommandPtr cmd,
5221
                       virQEMUDriverConfigPtr cfg,
5222
                       const virDomainDef *def,
5223
                       const virDomainChrSourceDef *dev,
5224
                       const char *alias,
5225
                       virQEMUCapsPtr qemuCaps,
5226
                       unsigned int flags)
5227
{
5228
    qemuDomainChrSourcePrivatePtr chrSourcePriv = QEMU_DOMAIN_CHR_SOURCE_PRIVATE(dev);
5229
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5230
    bool telnet;
5231
    VIR_AUTOFREE(char *) charAlias = NULL;
5232 5233

    if (!(charAlias = qemuAliasChardevFromDevAlias(alias)))
5234
        return NULL;
5235

5236
    switch (dev->type) {
5237
    case VIR_DOMAIN_CHR_TYPE_NULL:
5238
        virBufferAsprintf(&buf, "null,id=%s", charAlias);
5239 5240 5241
        break;

    case VIR_DOMAIN_CHR_TYPE_VC:
5242
        virBufferAsprintf(&buf, "vc,id=%s", charAlias);
5243 5244 5245
        break;

    case VIR_DOMAIN_CHR_TYPE_PTY:
5246
        virBufferAsprintf(&buf, "pty,id=%s", charAlias);
5247 5248 5249
        break;

    case VIR_DOMAIN_CHR_TYPE_DEV:
5250
        virBufferAsprintf(&buf, "%s,id=%s,path=",
5251
                          STRPREFIX(alias, "parallel") ? "parport" : "tty",
5252 5253
                          charAlias);
        virQEMUBuildBufferEscapeComma(&buf, dev->data.file.path);
5254 5255 5256
        break;

    case VIR_DOMAIN_CHR_TYPE_FILE:
5257
        virBufferAsprintf(&buf, "file,id=%s", charAlias);
5258

5259 5260 5261 5262
        if (dev->data.file.append != VIR_TRISTATE_SWITCH_ABSENT &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_CHARDEV_FILE_APPEND)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("append not supported in this QEMU binary"));
5263
            return NULL;
5264
        }
5265 5266
        if (qemuBuildChrChardevFileStr(flags & QEMU_BUILD_CHARDEV_FILE_LOGD ?
                                       logManager : NULL,
5267
                                       cmd, def, &buf,
5268 5269
                                       "path", dev->data.file.path,
                                       "append", dev->data.file.append) < 0)
5270
            return NULL;
5271 5272 5273
        break;

    case VIR_DOMAIN_CHR_TYPE_PIPE:
5274 5275
        virBufferAsprintf(&buf, "pipe,id=%s,path=", charAlias);
        virQEMUBuildBufferEscapeComma(&buf, dev->data.file.path);
5276 5277 5278
        break;

    case VIR_DOMAIN_CHR_TYPE_STDIO:
5279
        virBufferAsprintf(&buf, "stdio,id=%s", charAlias);
5280 5281
        break;

5282 5283 5284 5285 5286 5287 5288 5289 5290 5291 5292 5293
    case VIR_DOMAIN_CHR_TYPE_UDP: {
        const char *connectHost = dev->data.udp.connectHost;
        const char *bindHost = dev->data.udp.bindHost;
        const char *bindService = dev->data.udp.bindService;

        if (connectHost == NULL)
            connectHost = "";
        if (bindHost == NULL)
            bindHost = "";
        if (bindService == NULL)
            bindService = "0";

5294
        virBufferAsprintf(&buf,
5295
                          "udp,id=%s,host=%s,port=%s,localaddr=%s,"
5296
                          "localport=%s",
5297
                          charAlias,
5298
                          connectHost,
5299
                          dev->data.udp.connectService,
5300
                          bindHost, bindService);
5301
        break;
5302
    }
5303 5304
    case VIR_DOMAIN_CHR_TYPE_TCP:
        telnet = dev->data.tcp.protocol == VIR_DOMAIN_CHR_TCP_PROTOCOL_TELNET;
5305
        virBufferAsprintf(&buf,
5306 5307
                          "socket,id=%s,host=%s,port=%s%s",
                          charAlias,
5308 5309
                          dev->data.tcp.host,
                          dev->data.tcp.service,
5310 5311
                          telnet ? ",telnet" : "");

5312 5313 5314 5315 5316
        if (dev->data.tcp.listen) {
            virBufferAddLit(&buf, ",server");
            if (flags & QEMU_BUILD_CHARDEV_TCP_NOWAIT)
                virBufferAddLit(&buf, ",nowait");
        }
5317

5318 5319
        qemuBuildChrChardevReconnectStr(&buf, &dev->data.tcp.reconnect);

5320
        if (dev->data.tcp.haveTLS == VIR_TRISTATE_BOOL_YES) {
5321
            VIR_AUTOFREE(char *) objalias = NULL;
5322
            const char *tlsCertEncSecAlias = NULL;
5323

5324 5325 5326 5327
            /* Add the secret object first if necessary. The
             * secinfo is added only to a TCP serial device during
             * qemuDomainSecretChardevPrepare. Subsequently called
             * functions can just check the config fields */
5328 5329 5330
            if (chrSourcePriv && chrSourcePriv->secinfo) {
                if (qemuBuildObjectSecretCommandLine(cmd,
                                                     chrSourcePriv->secinfo) < 0)
5331
                    return NULL;
5332 5333 5334

                tlsCertEncSecAlias = chrSourcePriv->secinfo->s.aes.alias;
            }
5335

5336
            if (!(objalias = qemuAliasTLSObjFromSrcAlias(charAlias)))
5337
                return NULL;
5338

J
John Ferlan 已提交
5339 5340 5341
            if (qemuBuildTLSx509CommandLine(cmd, cfg->chardevTLSx509certdir,
                                            dev->data.tcp.listen,
                                            cfg->chardevTLSx509verify,
5342
                                            tlsCertEncSecAlias,
5343
                                            objalias, qemuCaps) < 0) {
5344
                return NULL;
5345
            }
5346

J
John Ferlan 已提交
5347 5348
            virBufferAsprintf(&buf, ",tls-creds=%s", objalias);
        }
5349 5350 5351
        break;

    case VIR_DOMAIN_CHR_TYPE_UNIX:
5352
        virBufferAsprintf(&buf, "socket,id=%s", charAlias);
5353 5354
        if (dev->data.nix.listen &&
            (flags & QEMU_BUILD_CHARDEV_UNIX_FD_PASS) &&
5355
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_CHARDEV_FD_PASS)) {
5356
            if (qemuSecuritySetSocketLabel(secManager, (virDomainDefPtr)def) < 0)
5357
                return NULL;
5358
            int fd = qemuOpenChrChardevUNIXSocket(dev);
5359 5360
            if (qemuSecurityClearSocketLabel(secManager, (virDomainDefPtr)def) < 0) {
                VIR_FORCE_CLOSE(fd);
5361
                return NULL;
5362
            }
5363
            if (fd < 0)
5364
                return NULL;
5365

5366
            virBufferAsprintf(&buf, ",fd=%d", fd);
5367 5368 5369

            virCommandPassFD(cmd, fd, VIR_COMMAND_PASS_FD_CLOSE_PARENT);
        } else {
5370
            virBufferAddLit(&buf, ",path=");
5371 5372
            virQEMUBuildBufferEscapeComma(&buf, dev->data.nix.path);
        }
5373 5374 5375 5376 5377
        if (dev->data.nix.listen) {
            virBufferAddLit(&buf, ",server");
            if (flags & QEMU_BUILD_CHARDEV_TCP_NOWAIT)
                virBufferAddLit(&buf, ",nowait");
        }
5378 5379

        qemuBuildChrChardevReconnectStr(&buf, &dev->data.nix.reconnect);
5380
        break;
5381 5382

    case VIR_DOMAIN_CHR_TYPE_SPICEVMC:
5383
        virBufferAsprintf(&buf, "spicevmc,id=%s,name=%s", charAlias,
E
Eric Blake 已提交
5384
                          virDomainChrSpicevmcTypeToString(dev->data.spicevmc));
5385 5386
        break;

5387
    case VIR_DOMAIN_CHR_TYPE_SPICEPORT:
5388
        virBufferAsprintf(&buf, "spiceport,id=%s,name=%s", charAlias,
5389 5390 5391
                          dev->data.spiceport.channel);
        break;

5392
    default:
5393 5394 5395
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("unsupported chardev '%s'"),
                       virDomainChrTypeToString(dev->type));
5396
        return NULL;
5397 5398
    }

5399 5400 5401 5402
    if (dev->logfile) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CHARDEV_LOGFILE)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("logfile not supported in this QEMU binary"));
5403
            return NULL;
5404
        }
5405 5406 5407
        if (qemuBuildChrChardevFileStr(logManager, cmd, def, &buf,
                                       "logfile", dev->logfile,
                                       "logappend", dev->logappend) < 0)
5408
            return NULL;
5409 5410
    }

5411
    if (virBufferCheckError(&buf) < 0)
5412
        return NULL;
5413

5414
    return virBufferContentAndReset(&buf);
5415 5416
}

5417

5418 5419 5420 5421 5422
char *
qemuBuildHostdevMediatedDevStr(const virDomainDef *def,
                               virDomainHostdevDefPtr dev,
                               virQEMUCapsPtr qemuCaps)
{
5423
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5424
    virDomainHostdevSubsysMediatedDevPtr mdevsrc = &dev->source.subsys.u.mdev;
5425
    VIR_AUTOFREE(char *) mdevPath = NULL;
5426
    const char *dev_str = NULL;
5427 5428

    if (!(mdevPath = virMediatedDeviceGetSysfsPath(mdevsrc->uuidstr)))
5429
        return NULL;
5430

5431 5432 5433
    dev_str = virMediatedDeviceModelTypeToString(mdevsrc->model);

    if (!dev_str)
5434
        return NULL;
5435 5436

    virBufferAdd(&buf, dev_str, -1);
5437
    virBufferAsprintf(&buf, ",id=%s,sysfsdev=%s", dev->info->alias, mdevPath);
5438

5439 5440 5441 5442
    if (mdevsrc->display != VIR_TRISTATE_SWITCH_ABSENT)
        virBufferAsprintf(&buf, ",display=%s",
                          virTristateSwitchTypeToString(mdevsrc->display));

5443
    if (qemuBuildDeviceAddressStr(&buf, def, dev->info, qemuCaps) < 0)
5444
        return NULL;
5445

5446 5447 5448
    if (dev->info->bootIndex)
        virBufferAsprintf(&buf, ",bootindex=%u", dev->info->bootIndex);

5449
    if (virBufferCheckError(&buf) < 0)
5450
        return NULL;
5451

5452
    return virBufferContentAndReset(&buf);
5453
}
5454

5455 5456 5457 5458
static int
qemuBuildHostdevCommandLine(virCommandPtr cmd,
                            const virDomainDef *def,
                            virQEMUCapsPtr qemuCaps,
5459
                            unsigned int *bootHostdevNet)
5460 5461 5462 5463 5464 5465
{
    size_t i;

    for (i = 0; i < def->nhostdevs; i++) {
        virDomainHostdevDefPtr hostdev = def->hostdevs[i];
        virDomainHostdevSubsysPtr subsys = &hostdev->source.subsys;
5466
        VIR_AUTOFREE(char *) devstr = NULL;
5467 5468 5469 5470 5471

        /* USB */
        if (hostdev->mode == VIR_DOMAIN_HOSTDEV_MODE_SUBSYS &&
            subsys->type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB) {

5472 5473 5474 5475 5476
            virCommandAddArg(cmd, "-device");
            if (!(devstr =
                  qemuBuildUSBHostdevDevStr(def, hostdev, qemuCaps)))
                return -1;
            virCommandAddArg(cmd, devstr);
5477 5478 5479 5480 5481 5482 5483 5484 5485 5486 5487 5488 5489 5490 5491 5492
        }

        /* PCI */
        if (hostdev->mode == VIR_DOMAIN_HOSTDEV_MODE_SUBSYS &&
            subsys->type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI) {
            int backend = subsys->u.pci.backend;

            if (backend == VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO) {
                if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VFIO_PCI)) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("VFIO PCI device assignment is not "
                                     "supported by this version of qemu"));
                    return -1;
                }
            }

5493
            unsigned int bootIndex = hostdev->info->bootIndex;
5494

5495 5496 5497
            /* bootNet will be non-0 if boot order was set and no other
             * net devices were encountered
             */
5498
            if (hostdev->parentnet && bootIndex == 0) {
5499 5500 5501
                bootIndex = *bootHostdevNet;
                *bootHostdevNet = 0;
            }
5502 5503 5504 5505

            if (qemuCommandAddExtDevice(cmd, hostdev->info) < 0)
                return -1;

5506
            virCommandAddArg(cmd, "-device");
M
Michal Privoznik 已提交
5507
            devstr = qemuBuildPCIHostdevDevStr(def, hostdev, bootIndex, qemuCaps);
5508 5509 5510
            if (!devstr)
                return -1;
            virCommandAddArg(cmd, devstr);
5511 5512 5513
        }

        /* SCSI */
5514
        if (virHostdevIsSCSIDevice(hostdev)) {
5515 5516
            virDomainHostdevSubsysSCSIPtr scsisrc =
                &hostdev->source.subsys.u.scsi;
5517
            VIR_AUTOFREE(char *) drvstr = NULL;
5518 5519 5520 5521 5522 5523 5524 5525 5526 5527

            if (scsisrc->protocol == VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI) {
                virDomainHostdevSubsysSCSIiSCSIPtr iscsisrc =
                    &scsisrc->u.iscsi;
                qemuDomainStorageSourcePrivatePtr srcPriv =
                    QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(iscsisrc->src);

                if (qemuBuildDiskSecinfoCommandLine(cmd, srcPriv ?
                                                    srcPriv->secinfo :
                                                    NULL) < 0)
5528
                    return -1;
5529
            }
5530

5531 5532
            virCommandAddArg(cmd, "-drive");
            if (!(drvstr = qemuBuildSCSIHostdevDrvStr(hostdev, qemuCaps)))
5533
                return -1;
5534 5535 5536 5537 5538 5539
            virCommandAddArg(cmd, drvstr);

            virCommandAddArg(cmd, "-device");
            if (!(devstr = qemuBuildSCSIHostdevDevStr(def, hostdev)))
                return -1;
            virCommandAddArg(cmd, devstr);
5540
        }
5541 5542 5543 5544 5545 5546

        /* SCSI_host */
        if (hostdev->mode == VIR_DOMAIN_HOSTDEV_MODE_SUBSYS &&
            subsys->type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI_HOST) {
            if (hostdev->source.subsys.u.scsi_host.protocol ==
                VIR_DOMAIN_HOSTDEV_SUBSYS_SCSI_HOST_PROTOCOL_TYPE_VHOST) {
5547
                VIR_AUTOFREE(char *) vhostfdName = NULL;
5548 5549 5550 5551 5552 5553 5554 5555 5556 5557 5558 5559 5560 5561 5562 5563 5564
                int vhostfd = -1;

                if (virSCSIVHostOpenVhostSCSI(&vhostfd) < 0)
                    return -1;

                if (virAsprintf(&vhostfdName, "%d", vhostfd) < 0) {
                    VIR_FORCE_CLOSE(vhostfd);
                    return -1;
                }

                virCommandPassFD(cmd, vhostfd,
                                 VIR_COMMAND_PASS_FD_CLOSE_PARENT);

                virCommandAddArg(cmd, "-device");
                if (!(devstr = qemuBuildSCSIVHostHostdevDevStr(def,
                                                               hostdev,
                                                               qemuCaps,
5565
                                                               vhostfdName)))
5566 5567
                    return -1;

5568
                virCommandAddArg(cmd, devstr);
5569 5570
            }
        }
5571 5572

        /* MDEV */
5573
        if (virHostdevIsMdevDevice(hostdev)) {
5574 5575 5576
            virDomainHostdevSubsysMediatedDevPtr mdevsrc = &subsys->u.mdev;

            switch ((virMediatedDeviceModelType) mdevsrc->model) {
5577 5578 5579 5580 5581 5582 5583
            case VIR_MDEV_MODEL_TYPE_VFIO_PCI:
                if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VFIO_PCI)) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("VFIO PCI device assignment is not "
                                     "supported by this version of QEMU"));
                    return -1;
                }
5584

5585 5586 5587 5588 5589 5590 5591 5592 5593
                break;
            case VIR_MDEV_MODEL_TYPE_VFIO_CCW:
                if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VFIO_CCW)) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("VFIO CCW device assignment is not "
                                     "supported by this version of QEMU"));
                    return -1;
                }
                break;
B
Boris Fiuczynski 已提交
5594 5595 5596 5597 5598 5599 5600 5601
            case VIR_MDEV_MODEL_TYPE_VFIO_AP:
                if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VFIO_AP)) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                                   _("VFIO AP device assignment is not "
                                     "supported by this version of QEMU"));
                    return -1;
                }
                break;
5602
            case VIR_MDEV_MODEL_TYPE_LAST:
5603 5604 5605
            default:
                virReportEnumRangeError(virMediatedDeviceModelType,
                                        subsys->u.mdev.model);
5606 5607 5608 5609 5610 5611 5612 5613 5614
                return -1;
            }

            virCommandAddArg(cmd, "-device");
            if (!(devstr =
                  qemuBuildHostdevMediatedDevStr(def, hostdev, qemuCaps)))
                return -1;
            virCommandAddArg(cmd, devstr);
        }
5615 5616 5617 5618 5619
    }

    return 0;
}

5620

5621
static int
5622
qemuBuildMonitorCommandLine(virLogManagerPtr logManager,
5623
                            virSecurityManagerPtr secManager,
5624
                            virCommandPtr cmd,
5625
                            virQEMUDriverConfigPtr cfg,
5626
                            virDomainDefPtr def,
5627
                            qemuDomainObjPrivatePtr priv)
5628
{
5629
    VIR_AUTOFREE(char *) chrdev = NULL;
5630 5631
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
5632 5633
    if (priv->chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
5634

5635
    if (!priv->monConfig)
5636 5637
        return 0;

5638 5639
    if (!(chrdev = qemuBuildChrChardevStr(logManager, secManager,
                                          cmd, cfg, def,
5640
                                          priv->monConfig, "monitor",
5641
                                          priv->qemuCaps, cdevflags)))
5642 5643 5644 5645 5646
        return -1;
    virCommandAddArg(cmd, "-chardev");
    virCommandAddArg(cmd, chrdev);

    virCommandAddArg(cmd, "-mon");
J
Ján Tomko 已提交
5647
    virCommandAddArg(cmd, "chardev=charmonitor,id=monitor,mode=control");
5648 5649 5650 5651 5652

    return 0;
}


5653
static char *
5654
qemuBuildVirtioSerialPortDevStr(const virDomainDef *def,
5655
                                virDomainChrDefPtr dev)
5656
{
5657
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5658 5659
    const char *contAlias;

5660 5661
    switch (dev->deviceType) {
    case VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE:
5662
        virBufferAddLit(&buf, "virtconsole");
5663 5664
        break;
    case VIR_DOMAIN_CHR_DEVICE_TYPE_CHANNEL:
5665
        virBufferAddLit(&buf, "virtserialport");
5666 5667
        break;
    default:
5668 5669
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Cannot use virtio serial for parallel/serial devices"));
5670 5671
        return NULL;
    }
5672

5673
    if (dev->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE &&
5674
        dev->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW &&
5675
        dev->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_S390) {
5676
        /* Check it's a virtio-serial address */
5677
        if (dev->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_SERIAL) {
5678 5679
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           "%s", _("virtio serial device has invalid address type"));
5680
            return NULL;
5681 5682
        }

5683 5684 5685
        contAlias = virDomainControllerAliasFind(def, VIR_DOMAIN_CONTROLLER_TYPE_VIRTIO_SERIAL,
                                                 dev->info.addr.vioserial.controller);
        if (!contAlias)
5686
            return NULL;
5687 5688 5689

        virBufferAsprintf(&buf, ",bus=%s.%d,nr=%d", contAlias,
                          dev->info.addr.vioserial.bus,
5690 5691 5692
                          dev->info.addr.vioserial.port);
    }

5693
    if (dev->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CHANNEL &&
5694
        dev->source->type == VIR_DOMAIN_CHR_TYPE_SPICEVMC &&
5695 5696
        dev->target.name &&
        STRNEQ(dev->target.name, "com.redhat.spice.0")) {
5697 5698 5699
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Unsupported spicevmc target name '%s'"),
                       dev->target.name);
5700
        return NULL;
5701
    }
5702

5703 5704 5705 5706 5707 5708 5709
    virBufferAsprintf(&buf, ",chardev=char%s,id=%s",
                      dev->info.alias, dev->info.alias);
    if (dev->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CHANNEL &&
        (dev->source->type == VIR_DOMAIN_CHR_TYPE_SPICEVMC ||
         dev->target.name)) {
        virBufferAsprintf(&buf, ",name=%s", dev->target.name
                          ? dev->target.name : "com.redhat.spice.0");
5710
    }
5711
    if (virBufferCheckError(&buf) < 0)
5712
        return NULL;
5713 5714 5715 5716

    return virBufferContentAndReset(&buf);
}

5717 5718 5719
static char *
qemuBuildSclpDevStr(virDomainChrDefPtr dev)
{
5720
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5721 5722 5723 5724 5725 5726 5727 5728 5729 5730 5731 5732
    if (dev->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE) {
        switch (dev->targetType) {
        case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SCLP:
            virBufferAddLit(&buf, "sclpconsole");
            break;
        case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SCLPLM:
            virBufferAddLit(&buf, "sclplmconsole");
            break;
        }
    } else {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Cannot use slcp with devices other than console"));
5733
        return NULL;
5734 5735 5736
    }
    virBufferAsprintf(&buf, ",chardev=char%s,id=%s",
                      dev->info.alias, dev->info.alias);
5737
    if (virBufferCheckError(&buf) < 0)
5738
        return NULL;
5739 5740 5741 5742

    return virBufferContentAndReset(&buf);
}

5743 5744

static int
5745
qemuBuildRNGBackendChrdevStr(virLogManagerPtr logManager,
5746
                             virSecurityManagerPtr secManager,
5747
                             virCommandPtr cmd,
5748
                             virQEMUDriverConfigPtr cfg,
5749
                             const virDomainDef *def,
5750
                             virDomainRNGDefPtr rng,
5751
                             virQEMUCapsPtr qemuCaps,
5752 5753
                             char **chr,
                             bool chardevStdioLogd)
5754
{
5755 5756
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
5757 5758 5759

    *chr = NULL;

5760 5761
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
5762 5763 5764 5765 5766 5767 5768 5769

    switch ((virDomainRNGBackend) rng->backend) {
    case VIR_DOMAIN_RNG_BACKEND_RANDOM:
    case VIR_DOMAIN_RNG_BACKEND_LAST:
        /* no chardev backend is needed */
        return 0;

    case VIR_DOMAIN_RNG_BACKEND_EGD:
5770 5771
        if (!(*chr = qemuBuildChrChardevStr(logManager, secManager,
                                            cmd, cfg, def,
5772
                                            rng->source.chardev,
5773 5774
                                            rng->info.alias, qemuCaps,
                                            cdevflags)))
5775 5776 5777 5778 5779 5780 5781
            return -1;
    }

    return 0;
}


5782
int
5783 5784 5785 5786
qemuBuildRNGBackendProps(virDomainRNGDefPtr rng,
                         virQEMUCapsPtr qemuCaps,
                         virJSONValuePtr *props)
{
5787 5788
    VIR_AUTOFREE(char *) objAlias = NULL;
    VIR_AUTOFREE(char *) charBackendAlias = NULL;
5789

5790
    if (virAsprintf(&objAlias, "obj%s", rng->info.alias) < 0)
5791
        return -1;
5792

5793
    switch ((virDomainRNGBackend) rng->backend) {
5794 5795 5796 5797
    case VIR_DOMAIN_RNG_BACKEND_RANDOM:
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_RNG_RANDOM)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this qemu doesn't support the rng-random "
5798
                             "backend"));
5799
            return -1;
5800 5801
        }

5802 5803 5804
        if (qemuMonitorCreateObjectProps(props, "rng-random", objAlias,
                                         "s:filename", rng->source.file,
                                         NULL) < 0)
5805
            return -1;
5806

5807 5808 5809
        break;

    case VIR_DOMAIN_RNG_BACKEND_EGD:
5810 5811 5812 5813
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_RNG_EGD)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this qemu doesn't support the rng-egd "
                             "backend"));
5814
            return -1;
5815 5816
        }

5817
        if (!(charBackendAlias = qemuAliasChardevFromDevAlias(rng->info.alias)))
5818
            return -1;
5819

5820 5821 5822
        if (qemuMonitorCreateObjectProps(props, "rng-egd", objAlias,
                                         "s:chardev", charBackendAlias,
                                         NULL) < 0)
5823
            return -1;
5824

5825 5826 5827
        break;

    case VIR_DOMAIN_RNG_BACKEND_LAST:
5828 5829
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("unknown rng-random backend"));
5830
        return -1;
5831 5832
    }

5833
    return 0;
5834 5835 5836
}


5837
char *
5838
qemuBuildRNGDevStr(const virDomainDef *def,
5839 5840
                   virDomainRNGDefPtr dev,
                   virQEMUCapsPtr qemuCaps)
5841
{
5842
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5843

5844
    if (!qemuDomainCheckCCWS390AddressSupport(def, &dev->info, qemuCaps,
5845
                                              dev->source.file))
5846
        return NULL;
5847

5848
    if (qemuBuildVirtioDevStr(&buf, "virtio-rng", qemuCaps,
5849
                              VIR_DOMAIN_DEVICE_RNG, dev) < 0) {
5850
        return NULL;
5851
    }
5852 5853 5854

    virBufferAsprintf(&buf, ",rng=obj%s,id=%s",
                      dev->info.alias, dev->info.alias);
5855

5856 5857 5858 5859 5860 5861 5862 5863
    if (dev->rate > 0) {
        virBufferAsprintf(&buf, ",max-bytes=%u", dev->rate);
        if (dev->period)
            virBufferAsprintf(&buf, ",period=%u", dev->period);
        else
            virBufferAddLit(&buf, ",period=1000");
    }

5864
    if (qemuBuildVirtioOptionsStr(&buf, dev->virtio, qemuCaps) < 0)
5865
        return NULL;
5866

5867
    if (qemuBuildDeviceAddressStr(&buf, def, &dev->info, qemuCaps) < 0)
5868
        return NULL;
5869
    if (virBufferCheckError(&buf) < 0)
5870
        return NULL;
5871

5872
    return virBufferContentAndReset(&buf);
5873 5874 5875
}


5876 5877
static int
qemuBuildRNGCommandLine(virLogManagerPtr logManager,
5878
                        virSecurityManagerPtr secManager,
5879
                        virCommandPtr cmd,
5880
                        virQEMUDriverConfigPtr cfg,
5881
                        const virDomainDef *def,
5882 5883
                        virQEMUCapsPtr qemuCaps,
                        bool chardevStdioLogd)
5884 5885 5886 5887
{
    size_t i;

    for (i = 0; i < def->nrngs; i++) {
5888
        VIR_AUTOPTR(virJSONValue) props = NULL;
5889
        virBuffer buf = VIR_BUFFER_INITIALIZER;
5890
        virDomainRNGDefPtr rng = def->rngs[i];
5891 5892
        VIR_AUTOFREE(char *) chardev = NULL;
        VIR_AUTOFREE(char *) devstr = NULL;
5893
        int rc;
5894 5895 5896 5897 5898 5899 5900 5901

        if (!rng->info.alias) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("RNG device is missing alias"));
            return -1;
        }

        /* possibly add character device for backend */
5902
        if (qemuBuildRNGBackendChrdevStr(logManager, secManager, cmd, cfg, def,
5903
                                         rng, qemuCaps, &chardev,
5904
                                         chardevStdioLogd) < 0)
5905 5906
            return -1;

5907 5908
        if (chardev)
            virCommandAddArgList(cmd, "-chardev", chardev, NULL);
5909

5910
        if (qemuBuildRNGBackendProps(rng, qemuCaps, &props) < 0)
5911 5912
            return -1;

5913 5914 5915 5916 5917 5918 5919
        rc = virQEMUBuildObjectCommandlineFromJSON(&buf, props);

        if (rc < 0)
            return -1;

        virCommandAddArg(cmd, "-object");
        virCommandAddArgBuffer(cmd, &buf);
5920 5921

        /* add the device */
5922 5923 5924
        if (qemuCommandAddExtDevice(cmd, &rng->info) < 0)
            return -1;

5925
        if (!(devstr = qemuBuildRNGDevStr(def, rng, qemuCaps)))
5926
            return -1;
5927
        virCommandAddArgList(cmd, "-device", devstr, NULL);
5928 5929 5930 5931 5932 5933
    }

    return 0;
}


5934 5935
static char *
qemuBuildSmbiosBiosStr(virSysinfoBIOSDefPtr def)
5936
{
5937
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5938

5939
    if (!def)
5940
        return NULL;
5941 5942 5943 5944

    virBufferAddLit(&buf, "type=0");

    /* 0:Vendor */
5945 5946 5947 5948
    if (def->vendor) {
        virBufferAddLit(&buf, ",vendor=");
        virQEMUBuildBufferEscapeComma(&buf, def->vendor);
    }
5949
    /* 0:BIOS Version */
5950 5951 5952 5953
    if (def->version) {
        virBufferAddLit(&buf, ",version=");
        virQEMUBuildBufferEscapeComma(&buf, def->version);
    }
5954
    /* 0:BIOS Release Date */
5955 5956 5957 5958
    if (def->date) {
        virBufferAddLit(&buf, ",date=");
        virQEMUBuildBufferEscapeComma(&buf, def->date);
    }
5959
    /* 0:System BIOS Major Release and 0:System BIOS Minor Release */
5960 5961 5962 5963
    if (def->release) {
        virBufferAddLit(&buf, ",release=");
        virQEMUBuildBufferEscapeComma(&buf, def->release);
    }
5964 5965 5966 5967

    return virBufferContentAndReset(&buf);
}

5968 5969 5970 5971

static char *
qemuBuildSmbiosSystemStr(virSysinfoSystemDefPtr def,
                         bool skip_uuid)
5972
{
5973
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
5974

5975 5976 5977 5978
    if (!def ||
        (!def->manufacturer && !def->product && !def->version &&
         !def->serial && (!def->uuid || skip_uuid) &&
         def->sku && !def->family))
5979 5980 5981 5982 5983
        return NULL;

    virBufferAddLit(&buf, "type=1");

    /* 1:Manufacturer */
5984 5985 5986 5987
    if (def->manufacturer) {
        virBufferAddLit(&buf, ",manufacturer=");
        virQEMUBuildBufferEscapeComma(&buf, def->manufacturer);
    }
5988
     /* 1:Product Name */
5989 5990 5991 5992
    if (def->product) {
        virBufferAddLit(&buf, ",product=");
        virQEMUBuildBufferEscapeComma(&buf, def->product);
    }
5993
    /* 1:Version */
5994 5995 5996 5997
    if (def->version) {
        virBufferAddLit(&buf, ",version=");
        virQEMUBuildBufferEscapeComma(&buf, def->version);
    }
5998
    /* 1:Serial Number */
5999 6000 6001 6002
    if (def->serial) {
        virBufferAddLit(&buf, ",serial=");
        virQEMUBuildBufferEscapeComma(&buf, def->serial);
    }
6003
    /* 1:UUID */
6004 6005 6006 6007
    if (def->uuid && !skip_uuid) {
        virBufferAddLit(&buf, ",uuid=");
        virQEMUBuildBufferEscapeComma(&buf, def->uuid);
    }
6008
    /* 1:SKU Number */
6009 6010 6011 6012
    if (def->sku) {
        virBufferAddLit(&buf, ",sku=");
        virQEMUBuildBufferEscapeComma(&buf, def->sku);
    }
6013
    /* 1:Family */
6014 6015 6016 6017
    if (def->family) {
        virBufferAddLit(&buf, ",family=");
        virQEMUBuildBufferEscapeComma(&buf, def->family);
    }
6018 6019 6020 6021

    return virBufferContentAndReset(&buf);
}

6022 6023 6024

static char *
qemuBuildSmbiosBaseBoardStr(virSysinfoBaseBoardDefPtr def)
6025
{
6026
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
6027 6028 6029 6030 6031 6032 6033

    if (!def)
        return NULL;

    virBufferAddLit(&buf, "type=2");

    /* 2:Manufacturer */
6034 6035
    virBufferAddLit(&buf, ",manufacturer=");
    virQEMUBuildBufferEscapeComma(&buf, def->manufacturer);
6036
    /* 2:Product Name */
6037 6038 6039 6040
    if (def->product) {
        virBufferAddLit(&buf, ",product=");
        virQEMUBuildBufferEscapeComma(&buf, def->product);
    }
6041
    /* 2:Version */
6042 6043 6044 6045
    if (def->version) {
        virBufferAddLit(&buf, ",version=");
        virQEMUBuildBufferEscapeComma(&buf, def->version);
    }
6046
    /* 2:Serial Number */
6047 6048 6049 6050
    if (def->serial) {
        virBufferAddLit(&buf, ",serial=");
        virQEMUBuildBufferEscapeComma(&buf, def->serial);
    }
6051
    /* 2:Asset Tag */
6052 6053 6054 6055
    if (def->asset) {
        virBufferAddLit(&buf, ",asset=");
        virQEMUBuildBufferEscapeComma(&buf, def->asset);
    }
6056
    /* 2:Location */
6057 6058 6059 6060
    if (def->location) {
        virBufferAddLit(&buf, ",location=");
        virQEMUBuildBufferEscapeComma(&buf, def->location);
    }
6061 6062

    if (virBufferCheckError(&buf) < 0)
6063
        return NULL;
6064 6065 6066 6067

    return virBufferContentAndReset(&buf);
}

6068

6069 6070 6071
static char *
qemuBuildSmbiosOEMStringsStr(virSysinfoOEMStringsDefPtr def)
{
6072
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
6073 6074 6075 6076 6077 6078 6079 6080 6081 6082 6083 6084 6085 6086 6087 6088
    size_t i;

    if (!def)
        return NULL;

    virBufferAddLit(&buf, "type=11");

    for (i = 0; i < def->nvalues; i++) {
        virBufferAddLit(&buf, ",value=");
        virQEMUBuildBufferEscapeComma(&buf, def->values[i]);
    }

    return virBufferContentAndReset(&buf);
}


6089 6090 6091
static char *
qemuBuildSmbiosChassisStr(virSysinfoChassisDefPtr def)
{
6092
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
6093 6094 6095 6096 6097 6098 6099 6100 6101 6102 6103 6104 6105 6106 6107 6108 6109 6110 6111 6112 6113 6114 6115 6116 6117 6118 6119 6120 6121 6122 6123

    if (!def)
        return NULL;

    virBufferAddLit(&buf, "type=3");

    /* 3:Manufacturer */
    virBufferAddLit(&buf, ",manufacturer=");
    virQEMUBuildBufferEscapeComma(&buf, def->manufacturer);
    /* 3:Version */
    if (def->version) {
        virBufferAddLit(&buf, ",version=");
        virQEMUBuildBufferEscapeComma(&buf, def->version);
    }
    /* 3:Serial Number */
    if (def->serial) {
        virBufferAddLit(&buf, ",serial=");
        virQEMUBuildBufferEscapeComma(&buf, def->serial);
    }
    /* 3:Asset Tag */
    if (def->asset) {
        virBufferAddLit(&buf, ",asset=");
        virQEMUBuildBufferEscapeComma(&buf, def->asset);
    }
    /* 3:Sku */
    if (def->sku) {
        virBufferAddLit(&buf, ",sku=");
        virQEMUBuildBufferEscapeComma(&buf, def->sku);
    }

    if (virBufferCheckError(&buf) < 0)
6124
        return NULL;
6125 6126 6127 6128 6129

    return virBufferContentAndReset(&buf);
}


6130 6131 6132
static int
qemuBuildSmbiosCommandLine(virCommandPtr cmd,
                           virQEMUDriverPtr driver,
6133
                           const virDomainDef *def)
6134 6135 6136 6137 6138 6139 6140 6141 6142 6143 6144 6145 6146 6147 6148 6149 6150 6151 6152 6153 6154 6155 6156 6157 6158 6159 6160 6161 6162 6163 6164 6165 6166 6167 6168 6169 6170 6171 6172 6173 6174 6175 6176 6177 6178 6179 6180 6181 6182 6183 6184 6185 6186 6187 6188 6189 6190 6191
{
    size_t i;
    virSysinfoDefPtr source = NULL;
    bool skip_uuid = false;

    if (def->os.smbios_mode == VIR_DOMAIN_SMBIOS_NONE ||
        def->os.smbios_mode == VIR_DOMAIN_SMBIOS_EMULATE)
        return 0;

    /* should we really error out or just warn in those cases ? */
    if (def->os.smbios_mode == VIR_DOMAIN_SMBIOS_HOST) {
        if (driver->hostsysinfo == NULL) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Host SMBIOS information is not available"));
            return -1;
        }
        source = driver->hostsysinfo;
        /* Host and guest uuid must differ, by definition of UUID. */
        skip_uuid = true;
    } else if (def->os.smbios_mode == VIR_DOMAIN_SMBIOS_SYSINFO) {
        if (def->sysinfo == NULL) {
            virReportError(VIR_ERR_XML_ERROR,
                           _("Domain '%s' sysinfo are not available"),
                           def->name);
            return -1;
        }
        source = def->sysinfo;
        /* domain_conf guaranteed that system_uuid matches guest uuid. */
    }
    if (source != NULL) {
        char *smbioscmd;

        smbioscmd = qemuBuildSmbiosBiosStr(source->bios);
        if (smbioscmd != NULL) {
            virCommandAddArgList(cmd, "-smbios", smbioscmd, NULL);
            VIR_FREE(smbioscmd);
        }
        smbioscmd = qemuBuildSmbiosSystemStr(source->system, skip_uuid);
        if (smbioscmd != NULL) {
            virCommandAddArgList(cmd, "-smbios", smbioscmd, NULL);
            VIR_FREE(smbioscmd);
        }

        if (source->nbaseBoard > 1) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("qemu does not support more than "
                             "one entry to Type 2 in SMBIOS table"));
            return -1;
        }

        for (i = 0; i < source->nbaseBoard; i++) {
            if (!(smbioscmd =
                  qemuBuildSmbiosBaseBoardStr(source->baseBoard + i)))
                return -1;

            virCommandAddArgList(cmd, "-smbios", smbioscmd, NULL);
            VIR_FREE(smbioscmd);
        }
6192

6193 6194 6195 6196 6197 6198
        smbioscmd = qemuBuildSmbiosChassisStr(source->chassis);
        if (smbioscmd != NULL) {
            virCommandAddArgList(cmd, "-smbios", smbioscmd, NULL);
            VIR_FREE(smbioscmd);
        }

6199 6200 6201 6202 6203 6204 6205
        if (source->oemStrings) {
            if (!(smbioscmd = qemuBuildSmbiosOEMStringsStr(source->oemStrings)))
                return -1;

            virCommandAddArgList(cmd, "-smbios", smbioscmd, NULL);
            VIR_FREE(smbioscmd);
        }
6206 6207 6208 6209 6210 6211
    }

    return 0;
}


6212 6213 6214 6215 6216
static int
qemuBuildVMGenIDCommandLine(virCommandPtr cmd,
                            const virDomainDef *def,
                            virQEMUCapsPtr qemuCaps)
{
6217
    VIR_AUTOCLEAN(virBuffer) opts = VIR_BUFFER_INITIALIZER;
6218 6219 6220 6221 6222 6223 6224 6225 6226 6227 6228 6229 6230 6231 6232 6233 6234 6235 6236 6237 6238
    char guid[VIR_UUID_STRING_BUFLEN];

    if (!def->genidRequested)
        return 0;

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VMGENID)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                      _("this QEMU does not support the 'genid' capability"));
        return -1;
    }

    virUUIDFormat(def->genid, guid);
    virBufferAsprintf(&opts, "vmgenid,guid=%s,id=vmgenid0", guid);

    virCommandAddArg(cmd, "-device");
    virCommandAddArgBuffer(cmd, &opts);

    return 0;
}


6239 6240 6241 6242 6243 6244 6245 6246 6247 6248 6249 6250 6251 6252 6253 6254 6255 6256 6257 6258 6259 6260 6261 6262
static int
qemuBuildSgaCommandLine(virCommandPtr cmd,
                        const virDomainDef *def,
                        virQEMUCapsPtr qemuCaps)
{
    /* Serial graphics adapter */
    if (def->os.bios.useserial == VIR_TRISTATE_BOOL_YES) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SGA)) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("qemu does not support SGA"));
            return -1;
        }
        if (!def->nserials) {
            virReportError(VIR_ERR_XML_ERROR, "%s",
                           _("need at least one serial port to use SGA"));
            return -1;
        }
        virCommandAddArgList(cmd, "-device", "sga", NULL);
    }

    return 0;
}


6263 6264 6265
static char *
qemuBuildClockArgStr(virDomainClockDefPtr def)
{
6266
    size_t i;
6267
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
6268 6269 6270 6271 6272 6273 6274 6275 6276 6277 6278 6279 6280 6281 6282

    switch (def->offset) {
    case VIR_DOMAIN_CLOCK_OFFSET_UTC:
        virBufferAddLit(&buf, "base=utc");
        break;

    case VIR_DOMAIN_CLOCK_OFFSET_LOCALTIME:
    case VIR_DOMAIN_CLOCK_OFFSET_TIMEZONE:
        virBufferAddLit(&buf, "base=localtime");
        break;

    case VIR_DOMAIN_CLOCK_OFFSET_VARIABLE: {
        time_t now = time(NULL);
        struct tm nowbits;

6283 6284 6285 6286 6287 6288 6289 6290 6291 6292 6293 6294 6295 6296 6297 6298
        if (def->data.variable.basis == VIR_DOMAIN_CLOCK_BASIS_LOCALTIME) {
            long localOffset;

            /* in the case of basis='localtime', rather than trying to
             * keep that basis (and associated offset from UTC) in the
             * status and deal with adding in the difference each time
             * there is an RTC_CHANGE event, it is simpler and less
             * error prone to just convert the adjustment an offset
             * from UTC right now (and change the status to
             * "basis='utc' to reflect this). This eliminates
             * potential errors in both RTC_CHANGE events and in
             * migration (in the case that the status of DST, or the
             * timezone of the destination host, changed relative to
             * startup).
             */
            if (virTimeLocalOffsetFromUTC(&localOffset) < 0)
6299
               return NULL;
6300 6301
            def->data.variable.adjustment += localOffset;
            def->data.variable.basis = VIR_DOMAIN_CLOCK_BASIS_UTC;
6302
        }
6303

6304 6305 6306
        now += def->data.variable.adjustment;
        gmtime_r(&now, &nowbits);

6307 6308 6309 6310 6311 6312 6313 6314
        /* when an RTC_CHANGE event is received from qemu, we need to
         * have the adjustment used at domain start time available to
         * compute the new offset from UTC. As this new value is
         * itself stored in def->data.variable.adjustment, we need to
         * save a copy of it now.
        */
        def->data.variable.adjustment0 = def->data.variable.adjustment;

6315
        virBufferAsprintf(&buf, "base=%d-%02d-%02dT%02d:%02d:%02d",
6316 6317 6318 6319 6320 6321 6322 6323 6324
                          nowbits.tm_year + 1900,
                          nowbits.tm_mon + 1,
                          nowbits.tm_mday,
                          nowbits.tm_hour,
                          nowbits.tm_min,
                          nowbits.tm_sec);
    }   break;

    default:
6325 6326 6327
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("unsupported clock offset '%s'"),
                       virDomainClockOffsetTypeToString(def->offset));
6328
        return NULL;
6329 6330
    }

6331 6332
    /* Look for an 'rtc' timer element, and add in appropriate
     * clock= and driftfix= */
6333 6334 6335 6336 6337 6338
    for (i = 0; i < def->ntimers; i++) {
        if (def->timers[i]->name == VIR_DOMAIN_TIMER_NAME_RTC) {
            switch (def->timers[i]->track) {
            case -1: /* unspecified - use hypervisor default */
                break;
            case VIR_DOMAIN_TIMER_TRACK_BOOT:
6339 6340 6341
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("unsupported rtc timer track '%s'"),
                               virDomainTimerTrackTypeToString(def->timers[i]->track));
6342
                return NULL;
6343 6344 6345 6346 6347 6348 6349 6350 6351 6352 6353 6354 6355 6356 6357 6358 6359 6360 6361 6362
            case VIR_DOMAIN_TIMER_TRACK_GUEST:
                virBufferAddLit(&buf, ",clock=vm");
                break;
            case VIR_DOMAIN_TIMER_TRACK_WALL:
                virBufferAddLit(&buf, ",clock=host");
                break;
            }

            switch (def->timers[i]->tickpolicy) {
            case -1:
            case VIR_DOMAIN_TIMER_TICKPOLICY_DELAY:
                /* This is the default - missed ticks delivered when
                   next scheduled, at normal rate */
                break;
            case VIR_DOMAIN_TIMER_TICKPOLICY_CATCHUP:
                /* deliver ticks at a faster rate until caught up */
                virBufferAddLit(&buf, ",driftfix=slew");
                break;
            case VIR_DOMAIN_TIMER_TICKPOLICY_MERGE:
            case VIR_DOMAIN_TIMER_TICKPOLICY_DISCARD:
6363 6364 6365
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("unsupported rtc timer tickpolicy '%s'"),
                               virDomainTimerTickpolicyTypeToString(def->timers[i]->tickpolicy));
6366
                return NULL;
6367 6368 6369 6370 6371
            }
            break; /* no need to check other timers - there is only one rtc */
        }
    }

6372
    if (virBufferCheckError(&buf) < 0)
6373
        return NULL;
6374 6375 6376 6377

    return virBufferContentAndReset(&buf);
}

6378 6379 6380 6381 6382 6383 6384 6385 6386 6387

/* NOTE: Building of commands can change def->clock->data.* values, so
 *       virDomainDef is not const here.
 */
static int
qemuBuildClockCommandLine(virCommandPtr cmd,
                          virDomainDefPtr def,
                          virQEMUCapsPtr qemuCaps)
{
    size_t i;
6388
    VIR_AUTOFREE(char *) rtcopt = NULL;
6389

J
Ján Tomko 已提交
6390 6391 6392 6393
    virCommandAddArg(cmd, "-rtc");
    if (!(rtcopt = qemuBuildClockArgStr(&def->clock)))
        return -1;
    virCommandAddArg(cmd, rtcopt);
6394 6395 6396 6397 6398 6399 6400

    if (def->clock.offset == VIR_DOMAIN_CLOCK_OFFSET_TIMEZONE &&
        def->clock.data.timezone) {
        virCommandAddEnvPair(cmd, "TZ", def->clock.data.timezone);
    }

    for (i = 0; i < def->clock.ntimers; i++) {
6401
        switch ((virDomainTimerNameType)def->clock.timers[i]->name) {
6402 6403 6404 6405 6406 6407
        case VIR_DOMAIN_TIMER_NAME_PLATFORM:
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("unsupported timer type (name) '%s'"),
                           virDomainTimerNameTypeToString(def->clock.timers[i]->name));
            return -1;

6408
        case VIR_DOMAIN_TIMER_NAME_TSC:
6409 6410 6411 6412 6413 6414 6415
        case VIR_DOMAIN_TIMER_NAME_KVMCLOCK:
        case VIR_DOMAIN_TIMER_NAME_HYPERVCLOCK:
            /* Timers above are handled when building -cpu.  */
        case VIR_DOMAIN_TIMER_NAME_LAST:
            break;

        case VIR_DOMAIN_TIMER_NAME_RTC:
6416
            /* Already handled in qemuBuildClockArgStr */
6417 6418 6419 6420 6421 6422 6423
            break;

        case VIR_DOMAIN_TIMER_NAME_PIT:
            switch (def->clock.timers[i]->tickpolicy) {
            case -1:
            case VIR_DOMAIN_TIMER_TICKPOLICY_DELAY:
                /* delay is the default if we don't have kernel
J
Ján Tomko 已提交
6424
                   (kvm-pit), otherwise, the default is catchup. */
6425 6426
                if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_KVM_PIT_TICK_POLICY))
                    virCommandAddArgList(cmd, "-global",
6427
                                         "kvm-pit.lost_tick_policy=delay", NULL);
6428 6429
                break;
            case VIR_DOMAIN_TIMER_TICKPOLICY_CATCHUP:
J
Ján Tomko 已提交
6430
                if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_KVM_PIT_TICK_POLICY)) {
6431 6432
                    /* do nothing - this is default for kvm-pit */
                } else {
J
Ján Tomko 已提交
6433
                    /* can't catchup if we don't have kvm-pit */
6434 6435 6436 6437 6438 6439 6440
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                                   _("unsupported pit tickpolicy '%s'"),
                                   virDomainTimerTickpolicyTypeToString(def->clock.timers[i]->tickpolicy));
                    return -1;
                }
                break;
            case VIR_DOMAIN_TIMER_TICKPOLICY_DISCARD:
6441 6442 6443 6444 6445 6446
                if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_KVM_PIT_TICK_POLICY))
                    virCommandAddArgList(cmd, "-global",
                                         "kvm-pit.lost_tick_policy=discard", NULL);
                break;
            case VIR_DOMAIN_TIMER_TICKPOLICY_MERGE:
                /* no way to support this mode for pit in qemu */
6447 6448 6449 6450 6451 6452 6453 6454 6455 6456 6457 6458 6459 6460 6461 6462 6463 6464 6465 6466 6467 6468 6469 6470 6471 6472 6473 6474 6475 6476 6477 6478 6479 6480 6481
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("unsupported pit tickpolicy '%s'"),
                               virDomainTimerTickpolicyTypeToString(def->clock.timers[i]->tickpolicy));
                return -1;
            }
            break;

        case VIR_DOMAIN_TIMER_NAME_HPET:
            /* the only meaningful attribute for hpet is "present". If
             * present is -1, that means it wasn't specified, and
             * should be left at the default for the
             * hypervisor. "default" when -no-hpet exists is "yes",
             * and when -no-hpet doesn't exist is "no". "confusing"?
             * "yes"! */

            if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_NO_HPET)) {
                if (def->clock.timers[i]->present == 0)
                    virCommandAddArg(cmd, "-no-hpet");
            } else {
                /* no hpet timer available. The only possible action
                   is to raise an error if present="yes" */
                if (def->clock.timers[i]->present == 1) {
                    virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                                   "%s", _("hpet timer is not supported"));
                    return -1;
                }
            }
            break;
        }
    }

    return 0;
}


6482 6483 6484
static int
qemuBuildPMCommandLine(virCommandPtr cmd,
                       const virDomainDef *def,
6485
                       qemuDomainObjPrivatePtr priv)
6486
{
6487
    virQEMUCapsPtr qemuCaps = priv->qemuCaps;
6488 6489

    /* Only add -no-reboot option if each event destroys domain */
6490
    if (priv->allowReboot == VIR_TRISTATE_BOOL_NO)
6491 6492
        virCommandAddArg(cmd, "-no-reboot");

J
John Ferlan 已提交
6493
    if (qemuDomainIsUsingNoShutdown(priv))
6494 6495 6496 6497 6498 6499 6500 6501 6502 6503 6504 6505 6506 6507
        virCommandAddArg(cmd, "-no-shutdown");

    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_NO_ACPI)) {
        if (def->features[VIR_DOMAIN_FEATURE_ACPI] != VIR_TRISTATE_SWITCH_ON)
            virCommandAddArg(cmd, "-no-acpi");
    }

    /* We fall back to PIIX4_PM even for q35, since it's what we did
       pre-q35-pm support. QEMU starts up fine (with a warning) if
       mixing PIIX PM and -M q35. Starting to reject things here
       could mean we refuse to start existing configs in the wild.*/
    if (def->pm.s3) {
        const char *pm_object = "PIIX4_PM";

6508
        if (qemuDomainIsQ35(def) &&
6509 6510 6511 6512 6513 6514 6515 6516 6517 6518 6519 6520 6521 6522 6523 6524
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_ICH9_DISABLE_S3)) {
            pm_object = "ICH9-LPC";
        } else if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_PIIX_DISABLE_S3)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           "%s", _("setting ACPI S3 not supported"));
            return -1;
        }

        virCommandAddArg(cmd, "-global");
        virCommandAddArgFormat(cmd, "%s.disable_s3=%d",
                               pm_object, def->pm.s3 == VIR_TRISTATE_BOOL_NO);
    }

    if (def->pm.s4) {
        const char *pm_object = "PIIX4_PM";

6525
        if (qemuDomainIsQ35(def) &&
6526 6527 6528 6529 6530 6531 6532 6533 6534 6535 6536 6537 6538 6539 6540 6541 6542
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_ICH9_DISABLE_S4)) {
            pm_object = "ICH9-LPC";
        } else if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_PIIX_DISABLE_S4)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           "%s", _("setting ACPI S4 not supported"));
            return -1;
        }

        virCommandAddArg(cmd, "-global");
        virCommandAddArgFormat(cmd, "%s.disable_s4=%d",
                               pm_object, def->pm.s4 == VIR_TRISTATE_BOOL_NO);
    }

    return 0;
}


6543 6544 6545
static int
qemuBuildBootCommandLine(virCommandPtr cmd,
                         const virDomainDef *def,
6546
                         virQEMUCapsPtr qemuCaps)
6547
{
6548
    VIR_AUTOCLEAN(virBuffer) boot_buf = VIR_BUFFER_INITIALIZER;
6549
    VIR_AUTOFREE(char *) boot_opts_str = NULL;
6550 6551

    if (def->os.bootmenu) {
J
Ján Tomko 已提交
6552 6553 6554 6555
        if (def->os.bootmenu == VIR_TRISTATE_BOOL_YES)
            virBufferAddLit(&boot_buf, "menu=on,");
        else
            virBufferAddLit(&boot_buf, "menu=off,");
6556 6557 6558 6559 6560 6561 6562
    }

    if (def->os.bios.rt_set) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_REBOOT_TIMEOUT)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("reboot timeout is not supported "
                             "by this QEMU binary"));
6563
            return -1;
6564 6565 6566 6567 6568 6569 6570 6571 6572 6573 6574 6575
        }

        virBufferAsprintf(&boot_buf,
                          "reboot-timeout=%d,",
                          def->os.bios.rt_delay);
    }

    if (def->os.bm_timeout_set) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SPLASH_TIMEOUT)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("splash timeout is not supported "
                             "by this QEMU binary"));
6576
            return -1;
6577 6578 6579 6580 6581 6582 6583 6584 6585 6586 6587
        }

        virBufferAsprintf(&boot_buf, "splash-time=%u,", def->os.bm_timeout);
    }

    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_BOOT_STRICT))
        virBufferAddLit(&boot_buf, "strict=on,");

    virBufferTrim(&boot_buf, ",", -1);

    if (virBufferCheckError(&boot_buf) < 0)
6588
        return -1;
6589 6590

    boot_opts_str = virBufferContentAndReset(&boot_buf);
6591
    if (boot_opts_str) {
6592
        virCommandAddArg(cmd, "-boot");
6593
        virCommandAddArg(cmd, boot_opts_str);
6594 6595 6596 6597 6598 6599 6600 6601
    }

    if (def->os.kernel)
        virCommandAddArgList(cmd, "-kernel", def->os.kernel, NULL);
    if (def->os.initrd)
        virCommandAddArgList(cmd, "-initrd", def->os.initrd, NULL);
    if (def->os.cmdline)
        virCommandAddArgList(cmd, "-append", def->os.cmdline, NULL);
J
Ján Tomko 已提交
6602 6603
    if (def->os.dtb)
        virCommandAddArgList(cmd, "-dtb", def->os.dtb, NULL);
6604 6605 6606 6607
    if (def->os.slic_table) {
        virBuffer buf = VIR_BUFFER_INITIALIZER;
        virCommandAddArg(cmd, "-acpitable");
        virBufferAddLit(&buf, "sig=SLIC,file=");
6608
        virQEMUBuildBufferEscapeComma(&buf, def->os.slic_table);
6609 6610
        virCommandAddArgBuffer(cmd, &buf);
    }
6611 6612 6613 6614 6615

    return 0;
}


6616 6617 6618 6619 6620
static int
qemuBuildIOMMUCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
6621 6622 6623
    const virDomainIOMMUDef *iommu = def->iommu;

    if (!iommu)
6624 6625
        return 0;

6626
    switch (iommu->model) {
6627 6628 6629
    case VIR_DOMAIN_IOMMU_MODEL_INTEL: {
        VIR_AUTOCLEAN(virBuffer) opts = VIR_BUFFER_INITIALIZER;

6630 6631 6632 6633 6634 6635 6636
        /* qemuDomainDeviceDefValidateIOMMU() already made sure we have
         * one of QEMU_CAPS_DEVICE_INTEL_IOMMU or QEMU_CAPS_MACHINE_IOMMU:
         * here we handle the former case, while the latter is taken care
         * of in qemuBuildMachineCommandLine() */
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_INTEL_IOMMU))
            return 0;

6637
        virBufferAddLit(&opts, "intel-iommu");
6638 6639 6640 6641
        if (iommu->intremap != VIR_TRISTATE_SWITCH_ABSENT) {
            virBufferAsprintf(&opts, ",intremap=%s",
                              virTristateSwitchTypeToString(iommu->intremap));
        }
6642 6643 6644 6645
        if (iommu->caching_mode != VIR_TRISTATE_SWITCH_ABSENT) {
            virBufferAsprintf(&opts, ",caching-mode=%s",
                              virTristateSwitchTypeToString(iommu->caching_mode));
        }
6646 6647 6648 6649
        if (iommu->eim != VIR_TRISTATE_SWITCH_ABSENT) {
            virBufferAsprintf(&opts, ",eim=%s",
                              virTristateSwitchTypeToString(iommu->eim));
        }
6650 6651 6652 6653
        if (iommu->iotlb != VIR_TRISTATE_SWITCH_ABSENT) {
            virBufferAsprintf(&opts, ",device-iotlb=%s",
                              virTristateSwitchTypeToString(iommu->iotlb));
        }
6654 6655 6656

        virCommandAddArg(cmd, "-device");
        virCommandAddArgBuffer(cmd, &opts);
6657
        break;
6658
    }
6659

6660
    case VIR_DOMAIN_IOMMU_MODEL_SMMUV3:
A
Andrea Bolognani 已提交
6661 6662
        /* There is no -device for SMMUv3, so nothing to be done here */
        return 0;
6663

6664 6665 6666 6667
    case VIR_DOMAIN_IOMMU_MODEL_LAST:
    default:
        virReportEnumRangeError(virDomainIOMMUModel, iommu->model);
        return -1;
6668
    }
6669

6670
    return 0;
6671 6672 6673
}


6674 6675 6676 6677 6678 6679 6680 6681 6682 6683 6684 6685 6686 6687 6688
static int
qemuBuildGlobalControllerCommandLine(virCommandPtr cmd,
                                     const virDomainDef *def,
                                     virQEMUCapsPtr qemuCaps)
{
    size_t i;

    for (i = 0; i < def->ncontrollers; i++) {
        virDomainControllerDefPtr cont = def->controllers[i];
        if (cont->type == VIR_DOMAIN_CONTROLLER_TYPE_PCI &&
            cont->opts.pciopts.pcihole64) {
            const char *hoststr = NULL;
            bool cap = false;
            bool machine = false;

6689
            switch (cont->model) {
6690 6691 6692
            case VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT:
                hoststr = "i440FX-pcihost";
                cap = virQEMUCapsGet(qemuCaps, QEMU_CAPS_I440FX_PCI_HOLE64_SIZE);
6693
                machine = qemuDomainIsI440FX(def);
6694 6695 6696 6697 6698
                break;

            case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT:
                hoststr = "q35-pcihost";
                cap = virQEMUCapsGet(qemuCaps, QEMU_CAPS_Q35_PCI_HOLE64_SIZE);
6699
                machine = qemuDomainIsQ35(def);
6700 6701 6702 6703 6704 6705 6706 6707 6708 6709 6710 6711 6712 6713 6714 6715 6716 6717 6718 6719 6720 6721 6722 6723 6724 6725 6726 6727 6728 6729 6730 6731
                break;

            default:
                virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                               _("64-bit PCI hole setting is only for root"
                                 " PCI controllers"));
                return -1;
            }

            if (!machine) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                             _("Setting the 64-bit PCI hole size is not "
                             "supported for machine '%s'"), def->os.machine);
                return -1;
            }
            if (!cap) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("64-bit PCI hole size setting is not supported "
                                 "with this QEMU binary"));
                return -1;
            }

            virCommandAddArg(cmd, "-global");
            virCommandAddArgFormat(cmd, "%s.pci-hole64-size=%luK", hoststr,
                                   cont->opts.pciopts.pcihole64size);
        }
    }

    return 0;
}


6732 6733 6734 6735 6736 6737
static void
qemuBuildCpuFeature(virQEMUCapsPtr qemuCaps,
                    virBufferPtr buf,
                    const char *name,
                    bool state)
{
6738 6739
    name = virQEMUCapsCPUFeatureToQEMU(qemuCaps, name);

6740 6741 6742 6743 6744 6745 6746
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_QUERY_CPU_MODEL_EXPANSION))
        virBufferAsprintf(buf, ",%s=%s", name, state ? "on" : "off");
    else
        virBufferAsprintf(buf, ",%c%s", state ? '+' : '-', name);
}


6747
static int
6748 6749 6750
qemuBuildCpuModelArgStr(virQEMUDriverPtr driver,
                        const virDomainDef *def,
                        virBufferPtr buf,
6751
                        virQEMUCapsPtr qemuCaps)
6752
{
6753
    size_t i;
J
Ján Tomko 已提交
6754
    VIR_AUTOUNREF(virCapsPtr) caps = NULL;
6755
    virCPUDefPtr cpu = def->cpu;
6756

6757
    if (!(caps = virQEMUDriverGetCapabilities(driver, false)))
6758
        return -1;
6759

6760 6761
    switch ((virCPUMode) cpu->mode) {
    case VIR_CPU_MODE_HOST_PASSTHROUGH:
6762
        virBufferAddLit(buf, "host");
6763

6764
        if (def->os.arch == VIR_ARCH_ARMV7L &&
6765
            caps->host.arch == VIR_ARCH_AARCH64) {
6766 6767 6768 6769 6770
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CPU_AARCH64_OFF)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("QEMU binary does not support CPU "
                                 "host-passthrough for armv7l on "
                                 "aarch64 host"));
6771
                return -1;
6772 6773 6774
            }
            virBufferAddLit(buf, ",aarch64=off");
        }
6775
        break;
6776

6777 6778 6779
    case VIR_CPU_MODE_HOST_MODEL:
        if (ARCH_IS_PPC64(def->os.arch)) {
            virBufferAddLit(buf, "host");
6780 6781 6782
            if (cpu->model &&
                !(qemuDomainIsPSeries(def) &&
                  virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_PSERIES_MAX_CPU_COMPAT))) {
6783
                virBufferAsprintf(buf, ",compat=%s", cpu->model);
6784
            }
6785
        } else {
6786 6787 6788
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("unexpected host-model CPU for %s architecture"),
                           virArchToString(def->os.arch));
6789
            return -1;
6790 6791
        }
        break;
6792

6793 6794 6795
    case VIR_CPU_MODE_CUSTOM:
        virBufferAdd(buf, cpu->model, -1);
        break;
6796

6797 6798 6799
    case VIR_CPU_MODE_LAST:
        break;
    }
6800

6801 6802 6803 6804 6805
    if (ARCH_IS_S390(def->os.arch) && cpu->features &&
        !virQEMUCapsGet(qemuCaps, QEMU_CAPS_QUERY_CPU_MODEL_EXPANSION)) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("CPU features not supported by hypervisor for %s "
                         "architecture"), virArchToString(def->os.arch));
6806
        return -1;
6807 6808
    }

6809 6810
    if (cpu->vendor_id)
        virBufferAsprintf(buf, ",vendor=%s", cpu->vendor_id);
6811

6812 6813 6814 6815
    for (i = 0; i < cpu->nfeatures; i++) {
        switch ((virCPUFeaturePolicy) cpu->features[i].policy) {
        case VIR_CPU_FEATURE_FORCE:
        case VIR_CPU_FEATURE_REQUIRE:
6816
            qemuBuildCpuFeature(qemuCaps, buf, cpu->features[i].name, true);
6817
            break;
6818

6819 6820
        case VIR_CPU_FEATURE_DISABLE:
        case VIR_CPU_FEATURE_FORBID:
6821
            qemuBuildCpuFeature(qemuCaps, buf, cpu->features[i].name, false);
6822
            break;
6823

6824 6825 6826
        case VIR_CPU_FEATURE_OPTIONAL:
        case VIR_CPU_FEATURE_LAST:
            break;
6827
        }
6828
    }
6829

6830
    return 0;
6831
}
6832

6833
static int
6834 6835 6836
qemuBuildCpuCommandLine(virCommandPtr cmd,
                        virQEMUDriverPtr driver,
                        const virDomainDef *def,
6837
                        virQEMUCapsPtr qemuCaps)
6838
{
6839
    virArch hostarch = virArchFromHost();
6840 6841
    VIR_AUTOFREE(char *) cpu = NULL;
    VIR_AUTOFREE(char *) cpu_flags = NULL;
6842 6843
    VIR_AUTOCLEAN(virBuffer) cpu_buf = VIR_BUFFER_INITIALIZER;
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
6844
    size_t i;
6845

6846 6847
    if (def->cpu &&
        (def->cpu->mode != VIR_CPU_MODE_CUSTOM || def->cpu->model)) {
6848
        if (qemuBuildCpuModelArgStr(driver, def, &cpu_buf, qemuCaps) < 0)
6849
            return -1;
6850
    } else {
6851 6852 6853 6854 6855 6856 6857 6858 6859 6860 6861 6862
        /*
         * Need to force a 32-bit guest CPU type if
         *
         *  1. guest OS is i686
         *  2. host OS is x86_64
         *  3. emulator is qemu-kvm or kvm
         *
         * Or
         *
         *  1. guest OS is i686
         *  2. emulator is qemu-system-x86_64
         */
6863
        if (def->os.arch == VIR_ARCH_I686 &&
6864
            ((hostarch == VIR_ARCH_X86_64 &&
J
John Ferlan 已提交
6865 6866
              strstr(def->emulator, "kvm")) ||
             strstr(def->emulator, "x86_64"))) {
6867
            virBufferAddLit(&cpu_buf, "qemu32");
6868 6869 6870
        }
    }

6871
    /* Handle paravirtual timers  */
6872
    for (i = 0; i < def->clock.ntimers; i++) {
6873 6874
        virDomainTimerDefPtr timer = def->clock.timers[i];

6875 6876
        if (timer->name == VIR_DOMAIN_TIMER_NAME_KVMCLOCK &&
            timer->present != -1) {
6877 6878
            qemuBuildCpuFeature(qemuCaps, &buf, "kvmclock",
                                !!timer->present);
6879
        } else if (timer->name == VIR_DOMAIN_TIMER_NAME_HYPERVCLOCK &&
6880
                   timer->present == 1) {
6881
            virBufferAddLit(&buf, ",hv-time");
6882 6883
        } else if (timer->name == VIR_DOMAIN_TIMER_NAME_TSC &&
                   timer->frequency > 0) {
6884
            virBufferAsprintf(&buf, ",tsc-frequency=%lu", timer->frequency);
6885
        }
6886 6887
    }

6888
    if (def->apic_eoi) {
6889 6890
        qemuBuildCpuFeature(qemuCaps, &buf, "kvm_pv_eoi",
                            def->apic_eoi == VIR_TRISTATE_SWITCH_ON);
6891 6892
    }

6893
    if (def->features[VIR_DOMAIN_FEATURE_PVSPINLOCK]) {
6894
        qemuBuildCpuFeature(qemuCaps, &buf, VIR_CPU_x86_KVM_PV_UNHALT,
6895
                            def->features[VIR_DOMAIN_FEATURE_PVSPINLOCK] == VIR_TRISTATE_SWITCH_ON);
6896 6897
    }

J
Ján Tomko 已提交
6898
    if (def->features[VIR_DOMAIN_FEATURE_HYPERV] == VIR_TRISTATE_SWITCH_ON) {
6899 6900 6901 6902 6903
        const char *hvPrefix = "hv-";

        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CANONICAL_CPU_FEATURES))
            hvPrefix = "hv_";

6904
        for (i = 0; i < VIR_DOMAIN_HYPERV_LAST; i++) {
6905
            switch ((virDomainHyperv) i) {
6906
            case VIR_DOMAIN_HYPERV_RELAXED:
6907
            case VIR_DOMAIN_HYPERV_VAPIC:
6908 6909 6910 6911 6912
            case VIR_DOMAIN_HYPERV_VPINDEX:
            case VIR_DOMAIN_HYPERV_RUNTIME:
            case VIR_DOMAIN_HYPERV_SYNIC:
            case VIR_DOMAIN_HYPERV_STIMER:
            case VIR_DOMAIN_HYPERV_RESET:
6913
            case VIR_DOMAIN_HYPERV_FREQUENCIES:
6914
            case VIR_DOMAIN_HYPERV_REENLIGHTENMENT:
6915
            case VIR_DOMAIN_HYPERV_TLBFLUSH:
6916
            case VIR_DOMAIN_HYPERV_IPI:
6917
            case VIR_DOMAIN_HYPERV_EVMCS:
J
Ján Tomko 已提交
6918
                if (def->hyperv_features[i] == VIR_TRISTATE_SWITCH_ON)
6919 6920
                    virBufferAsprintf(&buf, ",%s%s",
                                      hvPrefix,
6921
                                      virDomainHypervTypeToString(i));
6922 6923 6924
                if ((i == VIR_DOMAIN_HYPERV_STIMER) &&
                    (def->hyperv_stimer_direct == VIR_TRISTATE_SWITCH_ON))
                    virBufferAsprintf(&buf, ",%s", VIR_CPU_x86_HV_STIMER_DIRECT);
6925 6926
                break;

6927
            case VIR_DOMAIN_HYPERV_SPINLOCKS:
J
Ján Tomko 已提交
6928
                if (def->hyperv_features[i] == VIR_TRISTATE_SWITCH_ON)
6929
                    virBufferAsprintf(&buf, ",%s=0x%x",
6930
                                      VIR_CPU_x86_HV_SPINLOCKS,
6931
                                      def->hyperv_spinlocks);
6932 6933
                break;

6934 6935
            case VIR_DOMAIN_HYPERV_VENDOR_ID:
                if (def->hyperv_features[i] == VIR_TRISTATE_SWITCH_ON)
6936
                    virBufferAsprintf(&buf, ",hv-vendor-id=%s",
6937 6938 6939
                                      def->hyperv_vendor_id);
                break;

6940
            /* coverity[dead_error_begin] */
6941 6942 6943 6944 6945 6946
            case VIR_DOMAIN_HYPERV_LAST:
                break;
            }
        }
    }

D
Dmitry Andreev 已提交
6947 6948
    for (i = 0; i < def->npanics; i++) {
        if (def->panics[i]->model == VIR_DOMAIN_PANIC_MODEL_HYPERV) {
6949
            virBufferAddLit(&buf, ",hv-crash");
D
Dmitry Andreev 已提交
6950 6951
            break;
        }
6952 6953
    }

6954 6955 6956 6957 6958 6959 6960 6961
    if (def->features[VIR_DOMAIN_FEATURE_KVM] == VIR_TRISTATE_SWITCH_ON) {
        for (i = 0; i < VIR_DOMAIN_KVM_LAST; i++) {
            switch ((virDomainKVM) i) {
            case VIR_DOMAIN_KVM_HIDDEN:
                if (def->kvm_features[i] == VIR_TRISTATE_SWITCH_ON)
                    virBufferAddLit(&buf, ",kvm=off");
                break;

6962 6963 6964 6965 6966
            case VIR_DOMAIN_KVM_DEDICATED:
                if (def->kvm_features[i] == VIR_TRISTATE_SWITCH_ON)
                    virBufferAddLit(&buf, ",kvm-hint-dedicated=on");
                break;

J
John Ferlan 已提交
6967
            /* coverity[dead_error_begin] */
6968 6969 6970 6971 6972 6973
            case VIR_DOMAIN_KVM_LAST:
                break;
            }
        }
    }

6974 6975 6976 6977 6978 6979
    if (def->features[VIR_DOMAIN_FEATURE_PMU]) {
        virTristateSwitch pmu = def->features[VIR_DOMAIN_FEATURE_PMU];
        virBufferAsprintf(&buf, ",pmu=%s",
                          virTristateSwitchTypeToString(pmu));
    }

6980 6981 6982 6983 6984 6985 6986 6987 6988 6989 6990 6991 6992 6993 6994 6995 6996 6997 6998 6999 7000 7001 7002 7003 7004 7005 7006 7007 7008 7009 7010 7011 7012 7013
    if (def->cpu && def->cpu->cache) {
        virCPUCacheDefPtr cache = def->cpu->cache;
        bool hostOff = false;
        bool l3Off = false;

        switch (cache->mode) {
        case VIR_CPU_CACHE_MODE_EMULATE:
            virBufferAddLit(&buf, ",l3-cache=on");
            hostOff = true;
            break;

        case VIR_CPU_CACHE_MODE_PASSTHROUGH:
            virBufferAddLit(&buf, ",host-cache-info=on");
            l3Off = true;
            break;

        case VIR_CPU_CACHE_MODE_DISABLE:
            hostOff = l3Off = true;
            break;

        case VIR_CPU_CACHE_MODE_LAST:
            break;
        }

        if (hostOff &&
            def->cpu->mode == VIR_CPU_MODE_HOST_PASSTHROUGH &&
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_CPU_CACHE))
            virBufferAddLit(&buf, ",host-cache-info=off");

        if (l3Off &&
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_CPU_CACHE))
            virBufferAddLit(&buf, ",l3-cache=off");
    }

7014
    if (virBufferCheckError(&cpu_buf) < 0)
7015
        return -1;
7016
    if (virBufferCheckError(&buf) < 0)
7017
        return -1;
7018

7019 7020 7021 7022
    cpu = virBufferContentAndReset(&cpu_buf);
    cpu_flags = virBufferContentAndReset(&buf);

    if (cpu_flags && !cpu) {
7023 7024
        const char *default_model;

7025
        switch ((int)def->os.arch) {
7026 7027 7028 7029 7030 7031 7032 7033 7034 7035 7036
        case VIR_ARCH_I686:
            default_model = "qemu32";
            break;
        case VIR_ARCH_X86_64:
            default_model = "qemu64";
            break;
        default:
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("CPU flags requested but can't determine "
                             "default CPU for arch %s"),
                           virArchToString(def->os.arch));
7037
            return -1;
7038 7039
        }

7040
        if (VIR_STRDUP(cpu, default_model) < 0)
7041
            return -1;
7042
    }
7043 7044

    if (cpu) {
7045
        virCommandAddArg(cmd, "-cpu");
J
Ján Tomko 已提交
7046
        virCommandAddArgFormat(cmd, "%s%s", cpu, NULLSTR_EMPTY(cpu_flags));
7047
    }
7048

7049
    return 0;
7050 7051
}

7052

7053 7054 7055 7056 7057 7058 7059 7060 7061 7062 7063 7064 7065 7066 7067 7068 7069 7070 7071 7072 7073 7074 7075 7076 7077 7078 7079 7080 7081 7082 7083 7084 7085
static bool
qemuAppendKeyWrapMachineParm(virBuffer *buf, virQEMUCapsPtr qemuCaps,
                             int flag, const char *pname, int pstate)
{
    if (pstate != VIR_TRISTATE_SWITCH_ABSENT) {
        if (!virQEMUCapsGet(qemuCaps, flag)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("%s is not available with this QEMU binary"), pname);
            return false;
        }

        virBufferAsprintf(buf, ",%s=%s", pname,
                          virTristateSwitchTypeToString(pstate));
    }

    return true;
}

static bool
qemuAppendKeyWrapMachineParms(virBuffer *buf, virQEMUCapsPtr qemuCaps,
                              const virDomainKeyWrapDef *keywrap)
{
    if (!qemuAppendKeyWrapMachineParm(buf, qemuCaps, QEMU_CAPS_AES_KEY_WRAP,
                                      "aes-key-wrap", keywrap->aes))
        return false;

    if (!qemuAppendKeyWrapMachineParm(buf, qemuCaps, QEMU_CAPS_DEA_KEY_WRAP,
                                      "dea-key-wrap", keywrap->dea))
        return false;

    return true;
}

7086 7087 7088 7089 7090 7091 7092 7093 7094 7095 7096 7097 7098 7099 7100 7101 7102 7103 7104 7105 7106 7107 7108 7109 7110 7111 7112 7113

static void
qemuAppendLoadparmMachineParm(virBuffer *buf,
                              const virDomainDef *def)
{
    size_t i = 0;

    for (i = 0; i < def->ndisks; i++) {
        virDomainDiskDefPtr disk = def->disks[i];

        if (disk->info.bootIndex == 1 && disk->info.loadparm) {
            virBufferAsprintf(buf, ",loadparm=%s", disk->info.loadparm);
            return;
        }
    }

    /* Network boot device */
    for (i = 0; i < def->nnets; i++) {
        virDomainNetDefPtr net = def->nets[i];

        if (net->info.bootIndex == 1 && net->info.loadparm) {
            virBufferAsprintf(buf, ",loadparm=%s", net->info.loadparm);
            return;
        }
    }
}


M
Marc-André Lureau 已提交
7114 7115 7116 7117 7118 7119
static int
qemuBuildNameCommandLine(virCommandPtr cmd,
                         virQEMUDriverConfigPtr cfg,
                         const virDomainDef *def,
                         virQEMUCapsPtr qemuCaps)
{
7120
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
M
Marc-André Lureau 已提交
7121 7122 7123

    virCommandAddArg(cmd, "-name");

7124 7125 7126 7127
    /* The 'guest' option let's us handle a name with '=' embedded in it */
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_NAME_GUEST))
        virBufferAddLit(&buf, "guest=");

7128
    virQEMUBuildBufferEscapeComma(&buf, def->name);
M
Marc-André Lureau 已提交
7129

7130
    if (cfg->setProcessName)
M
Marc-André Lureau 已提交
7131 7132 7133 7134 7135 7136 7137 7138 7139 7140
        virBufferAsprintf(&buf, ",process=qemu:%s", def->name);

    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_NAME_DEBUG_THREADS))
        virBufferAddLit(&buf, ",debug-threads=on");

    virCommandAddArgBuffer(cmd, &buf);

    return 0;
}

7141
static int
7142
qemuBuildMachineCommandLine(virCommandPtr cmd,
7143
                            virQEMUDriverConfigPtr cfg,
7144 7145
                            const virDomainDef *def,
                            virQEMUCapsPtr qemuCaps)
7146
{
7147 7148 7149
    virTristateSwitch vmport = def->features[VIR_DOMAIN_FEATURE_VMPORT];
    virTristateSwitch smm = def->features[VIR_DOMAIN_FEATURE_SMM];
    virCPUDefPtr cpu = def->cpu;
7150
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
M
Michal Privoznik 已提交
7151
    size_t i;
7152

7153 7154 7155 7156 7157 7158 7159
    /* This should *never* be NULL, since we always provide
     * a machine in the capabilities data for QEMU. So this
     * check is just here as a safety in case the unexpected
     * happens */
    if (!def->os.machine)
        return 0;

7160 7161 7162
    virCommandAddArg(cmd, "-machine");
    virBufferAdd(&buf, def->os.machine, -1);

7163
    switch ((virDomainVirtType)def->virtType) {
7164
    case VIR_DOMAIN_VIRT_QEMU:
7165
        virBufferAddLit(&buf, ",accel=tcg");
7166 7167 7168
        break;

    case VIR_DOMAIN_VIRT_KVM:
7169
        virBufferAddLit(&buf, ",accel=kvm");
7170 7171 7172 7173 7174 7175 7176 7177 7178 7179 7180 7181 7182 7183 7184 7185
        break;

    case VIR_DOMAIN_VIRT_KQEMU:
    case VIR_DOMAIN_VIRT_XEN:
    case VIR_DOMAIN_VIRT_LXC:
    case VIR_DOMAIN_VIRT_UML:
    case VIR_DOMAIN_VIRT_OPENVZ:
    case VIR_DOMAIN_VIRT_TEST:
    case VIR_DOMAIN_VIRT_VMWARE:
    case VIR_DOMAIN_VIRT_HYPERV:
    case VIR_DOMAIN_VIRT_VBOX:
    case VIR_DOMAIN_VIRT_PHYP:
    case VIR_DOMAIN_VIRT_PARALLELS:
    case VIR_DOMAIN_VIRT_BHYVE:
    case VIR_DOMAIN_VIRT_VZ:
    case VIR_DOMAIN_VIRT_NONE:
7186 7187 7188 7189
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("the QEMU binary does not support %s"),
                       virDomainVirtTypeToString(def->virtType));
        return -1;
7190 7191 7192 7193 7194

    case VIR_DOMAIN_VIRT_LAST:
    default:
        virReportEnumRangeError(virDomainVirtType, def->virtType);
        return -1;
7195
    }
7196 7197 7198 7199

    /* To avoid the collision of creating USB controllers when calling
     * machine->init in QEMU, it needs to set usb=off
     */
7200
    virBufferAddLit(&buf, ",usb=off");
7201 7202 7203

    if (vmport) {
        if (!virQEMUCapsSupportsVmport(qemuCaps, def)) {
7204
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
7205
                           _("vmport is not available "
7206
                             "with this QEMU binary"));
7207
            return -1;
7208
        }
7209

7210 7211 7212 7213
        virBufferAsprintf(&buf, ",vmport=%s",
                          virTristateSwitchTypeToString(vmport));
    }

7214 7215
    if (smm)
        virBufferAsprintf(&buf, ",smm=%s", virTristateSwitchTypeToString(smm));
7216

7217 7218 7219
    if (def->mem.dump_core) {
        virBufferAsprintf(&buf, ",dump-guest-core=%s",
                          virTristateSwitchTypeToString(def->mem.dump_core));
7220
    } else {
7221 7222
        virBufferAsprintf(&buf, ",dump-guest-core=%s",
                          cfg->dumpGuestCore ? "on" : "off");
7223
    }
M
Michal Privoznik 已提交
7224

7225 7226 7227 7228 7229
    if (def->mem.nosharepages) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MEM_MERGE)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("disable shared memory is not available "
                             "with this QEMU binary"));
7230
            return -1;
M
Michal Privoznik 已提交
7231
        }
7232

7233 7234
        virBufferAddLit(&buf, ",mem-merge=off");
    }
7235

7236 7237
    if (def->keywrap &&
        !qemuAppendKeyWrapMachineParms(&buf, qemuCaps, def->keywrap))
7238
        return -1;
7239

7240 7241 7242 7243 7244 7245 7246 7247 7248 7249 7250 7251 7252 7253 7254 7255
    if (def->features[VIR_DOMAIN_FEATURE_GIC] == VIR_TRISTATE_SWITCH_ON) {
        bool hasGICVersionOption = virQEMUCapsGet(qemuCaps,
                                                  QEMU_CAPS_MACH_VIRT_GIC_VERSION);

        switch ((virGICVersion) def->gic_version) {
        case VIR_GIC_VERSION_2:
            if (!hasGICVersionOption) {
                /* If the gic-version option is not available, we can't
                 * configure the GIC; however, we know that before the
                 * option was introduced the guests would always get a
                 * GICv2, so in order to maintain compatibility with
                 * those old QEMU versions all we need to do is stop
                 * early instead of erroring out */
                break;
            }
            ATTRIBUTE_FALLTHROUGH;
L
Li Zhang 已提交
7256

7257 7258 7259
        case VIR_GIC_VERSION_3:
        case VIR_GIC_VERSION_HOST:
            if (!hasGICVersionOption) {
7260
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
7261
                               _("gic-version option is not available "
7262
                                 "with this QEMU binary"));
7263
                return -1;
7264 7265
            }

7266 7267 7268
            virBufferAsprintf(&buf, ",gic-version=%s",
                              virGICVersionTypeToString(def->gic_version));
            break;
M
Michal Privoznik 已提交
7269

7270 7271 7272 7273
        case VIR_GIC_VERSION_NONE:
        case VIR_GIC_VERSION_LAST:
        default:
            break;
M
Michal Privoznik 已提交
7274
        }
7275
    }
M
Michal Privoznik 已提交
7276

7277
    if (def->iommu) {
7278 7279
        switch (def->iommu->model) {
        case VIR_DOMAIN_IOMMU_MODEL_INTEL:
7280 7281 7282 7283 7284 7285
            /* qemuDomainDeviceDefValidateIOMMU() already made sure we have
             * one of QEMU_CAPS_DEVICE_INTEL_IOMMU or QEMU_CAPS_MACHINE_IOMMU:
             * here we handle the latter case, while the former is taken care
             * of in qemuBuildIOMMUCommandLine() */
            if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_IOMMU))
                virBufferAddLit(&buf, ",iommu=on");
7286
            break;
7287 7288

        case VIR_DOMAIN_IOMMU_MODEL_SMMUV3:
A
Andrea Bolognani 已提交
7289
            virBufferAddLit(&buf, ",iommu=smmuv3");
7290 7291
            break;

7292
        case VIR_DOMAIN_IOMMU_MODEL_LAST:
7293 7294 7295
        default:
            virReportEnumRangeError(virDomainIOMMUModel, def->iommu->model);
            return -1;
7296
        }
7297
    }
7298

7299 7300 7301
    for (i = 0; i < def->nmems; i++) {
        if (def->mems[i]->model == VIR_DOMAIN_MEMORY_MODEL_NVDIMM) {
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_NVDIMM)) {
7302
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
7303
                               _("nvdimm isn't supported by this QEMU binary"));
7304
                return -1;
7305
            }
7306 7307
            virBufferAddLit(&buf, ",nvdimm=on");
            break;
7308
        }
7309
    }
7310

7311 7312 7313 7314 7315
    if (def->features[VIR_DOMAIN_FEATURE_IOAPIC] != VIR_DOMAIN_IOAPIC_NONE) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_KERNEL_IRQCHIP)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("I/O APIC tuning is not supported by this "
                             "QEMU binary"));
7316
            return -1;
M
Michal Privoznik 已提交
7317
        }
7318 7319 7320
        switch ((virDomainIOAPIC) def->features[VIR_DOMAIN_FEATURE_IOAPIC]) {
        case VIR_DOMAIN_IOAPIC_QEMU:
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_KERNEL_IRQCHIP_SPLIT)) {
7321
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
7322
                               _("split I/O APIC is not supported by this "
7323
                                 "QEMU binary"));
7324
                return -1;
7325
            }
7326 7327 7328 7329 7330 7331 7332 7333
            virBufferAddLit(&buf, ",kernel_irqchip=split");
            break;
        case VIR_DOMAIN_IOAPIC_KVM:
            virBufferAddLit(&buf, ",kernel_irqchip=on");
            break;
        case VIR_DOMAIN_IOAPIC_NONE:
        case VIR_DOMAIN_IOAPIC_LAST:
            break;
7334
        }
7335
    }
7336

7337
    if (def->features[VIR_DOMAIN_FEATURE_HPT] == VIR_TRISTATE_SWITCH_ON) {
7338

7339 7340
        if (def->hpt_resizing != VIR_DOMAIN_HPT_RESIZING_NONE) {
            const char *str;
7341

7342 7343 7344 7345
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_PSERIES_RESIZE_HPT)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("HTP resizing is not supported by this "
                                 "QEMU binary"));
7346
                return -1;
7347 7348 7349 7350 7351 7352
            }

            str = virDomainHPTResizingTypeToString(def->hpt_resizing);
            if (!str) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("Invalid setting for HPT resizing"));
7353
                return -1;
7354
            }
7355

7356 7357
            virBufferAsprintf(&buf, ",resize-hpt=%s", str);
        }
7358 7359 7360 7361 7362 7363

        if (def->hpt_maxpagesize > 0) {
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_PSERIES_CAP_HPT_MAX_PAGE_SIZE)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("Configuring the page size for HPT guests "
                                 "is not supported by this QEMU binary"));
7364
                return -1;
7365 7366 7367 7368 7369
            }

            virBufferAsprintf(&buf, ",cap-hpt-max-page-size=%lluk",
                              def->hpt_maxpagesize);
        }
7370
    }
7371

7372 7373 7374 7375 7376 7377 7378
    if (def->features[VIR_DOMAIN_FEATURE_HTM] != VIR_TRISTATE_SWITCH_ABSENT) {
        const char *str;

        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_PSERIES_CAP_HTM)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("HTM configuration is not supported by this "
                             "QEMU binary"));
7379
            return -1;
7380 7381 7382 7383 7384 7385
        }

        str = virTristateSwitchTypeToString(def->features[VIR_DOMAIN_FEATURE_HTM]);
        if (!str) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Invalid setting for HTM state"));
7386
            return -1;
7387 7388 7389 7390 7391
        }

        virBufferAsprintf(&buf, ",cap-htm=%s", str);
    }

7392 7393 7394 7395 7396 7397 7398
    if (def->features[VIR_DOMAIN_FEATURE_NESTED_HV] != VIR_TRISTATE_SWITCH_ABSENT) {
        const char *str;

        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_PSERIES_CAP_NESTED_HV)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Nested HV configuration is not supported by "
                             "this QEMU binary"));
7399
            return -1;
7400 7401 7402 7403 7404 7405
        }

        str = virTristateSwitchTypeToString(def->features[VIR_DOMAIN_FEATURE_NESTED_HV]);
        if (!str) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Invalid setting for nested HV state"));
7406
            return -1;
7407 7408 7409 7410 7411
        }

        virBufferAsprintf(&buf, ",cap-nested-hv=%s", str);
    }

7412 7413 7414 7415 7416
    if (cpu && cpu->model &&
        cpu->mode == VIR_CPU_MODE_HOST_MODEL &&
        qemuDomainIsPSeries(def) &&
        virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_PSERIES_MAX_CPU_COMPAT)) {
        virBufferAsprintf(&buf, ",max-cpu-compat=%s", cpu->model);
7417 7418
    }

7419
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_LOADPARM))
7420 7421
        qemuAppendLoadparmMachineParm(&buf, def);

7422 7423 7424
    if (def->sev)
        virBufferAddLit(&buf, ",memory-encryption=sev0");

7425 7426
    virCommandAddArgBuffer(cmd, &buf);

7427
    return 0;
7428 7429
}

7430 7431 7432 7433 7434 7435 7436 7437 7438 7439 7440 7441 7442 7443 7444 7445

static void
qemuBuildTSEGCommandLine(virCommandPtr cmd,
                         const virDomainDef *def)
{
    if (!def->tseg_specified)
        return;

    virCommandAddArg(cmd, "-global");

    /* PostParse callback guarantees that the size is divisible by 1 MiB */
    virCommandAddArgFormat(cmd, "mch.extended-tseg-mbytes=%llu",
                           def->tseg_size >> 20);
}


7446 7447
static int
qemuBuildSmpCommandLine(virCommandPtr cmd,
7448
                        virDomainDefPtr def)
7449
{
7450
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
7451 7452 7453 7454 7455 7456 7457 7458 7459 7460 7461 7462
    unsigned int maxvcpus = virDomainDefGetVcpusMax(def);
    unsigned int nvcpus = 0;
    virDomainVcpuDefPtr vcpu;
    size_t i;

    /* count non-hotpluggable enabled vcpus. Hotpluggable ones will be added
     * in a different way */
    for (i = 0; i < maxvcpus; i++) {
        vcpu = virDomainDefGetVcpu(def, i);
        if (vcpu->online && vcpu->hotpluggable == VIR_TRISTATE_BOOL_NO)
            nvcpus++;
    }
7463

7464 7465
    virCommandAddArg(cmd, "-smp");

7466
    virBufferAsprintf(&buf, "%u", nvcpus);
7467

7468 7469
    if (nvcpus != maxvcpus)
        virBufferAsprintf(&buf, ",maxcpus=%u", maxvcpus);
7470 7471 7472 7473 7474 7475 7476 7477 7478 7479
    /* sockets, cores, and threads are either all zero
     * or all non-zero, thus checking one of them is enough */
    if (def->cpu && def->cpu->sockets) {
        virBufferAsprintf(&buf, ",sockets=%u", def->cpu->sockets);
        virBufferAsprintf(&buf, ",cores=%u", def->cpu->cores);
        virBufferAsprintf(&buf, ",threads=%u", def->cpu->threads);
    } else {
        virBufferAsprintf(&buf, ",sockets=%u", virDomainDefGetVcpusMax(def));
        virBufferAsprintf(&buf, ",cores=%u", 1);
        virBufferAsprintf(&buf, ",threads=%u", 1);
7480 7481
    }

7482
    if (virBufferCheckError(&buf) < 0)
7483
        return -1;
7484

7485
    virCommandAddArgBuffer(cmd, &buf);
7486
    return 0;
7487 7488
}

7489

7490 7491
static int
qemuBuildMemPathStr(virQEMUDriverConfigPtr cfg,
7492
                    const virDomainDef *def,
7493 7494
                    virCommandPtr cmd,
                    qemuDomainObjPrivatePtr priv)
7495 7496
{
    const long system_page_size = virGetSystemPageSizeKB();
7497
    VIR_AUTOFREE(char *) mem_path = NULL;
7498

7499 7500 7501 7502 7503 7504
    /* There are two cases where we want to put -mem-path onto
     * the command line: First one is when there are no guest
     * NUMA nodes and hugepages are configured. The second one is
     * if user requested file allocation. */
    if (def->mem.nhugepages &&
        def->mem.hugepages[0].size != system_page_size) {
7505 7506 7507 7508 7509
        unsigned long long pagesize = def->mem.hugepages[0].size;
        if (!pagesize &&
            qemuBuildMemoryGetDefaultPagesize(cfg, &pagesize) < 0)
            return -1;
        if (qemuGetDomainHupageMemPath(def, cfg, pagesize, &mem_path) < 0)
7510 7511 7512 7513 7514
            return -1;
    } else if (def->mem.source == VIR_DOMAIN_MEMORY_SOURCE_FILE) {
        if (qemuGetMemoryBackingPath(def, cfg, "ram", &mem_path) < 0)
            return -1;
    } else {
7515
        return 0;
7516
    }
7517

7518
    if (def->mem.allocation != VIR_DOMAIN_MEMORY_ALLOCATION_IMMEDIATE) {
7519
        virCommandAddArgList(cmd, "-mem-prealloc", NULL);
7520 7521
        priv->memPrealloc = true;
    }
7522 7523

    virCommandAddArgList(cmd, "-mem-path", mem_path, NULL);
7524 7525 7526 7527

    return 0;
}

7528 7529 7530 7531 7532

static int
qemuBuildMemCommandLine(virCommandPtr cmd,
                        virQEMUDriverConfigPtr cfg,
                        const virDomainDef *def,
7533 7534
                        virQEMUCapsPtr qemuCaps,
                        qemuDomainObjPrivatePtr priv)
7535 7536 7537 7538 7539 7540 7541 7542 7543 7544 7545 7546 7547 7548 7549 7550 7551 7552
{
    if (qemuDomainDefValidateMemoryHotplug(def, qemuCaps, NULL) < 0)
        return -1;

    virCommandAddArg(cmd, "-m");

    if (virDomainDefHasMemoryHotplug(def)) {
        /* Use the 'k' suffix to let qemu handle the units */
        virCommandAddArgFormat(cmd, "size=%lluk,slots=%u,maxmem=%lluk",
                               virDomainDefGetMemoryInitial(def),
                               def->mem.memory_slots,
                               def->mem.max_memory);

    } else {
       virCommandAddArgFormat(cmd, "%llu",
                              virDomainDefGetMemoryInitial(def) / 1024);
    }

7553
    if (def->mem.allocation == VIR_DOMAIN_MEMORY_ALLOCATION_IMMEDIATE) {
7554
        virCommandAddArgList(cmd, "-mem-prealloc", NULL);
7555 7556
        priv->memPrealloc = true;
    }
7557

7558
    /*
7559 7560
     * Add '-mem-path' (and '-mem-prealloc') parameter here if
     * the hugepages and no numa node is specified.
7561 7562
     */
    if (!virDomainNumaGetNodeCount(def->numa) &&
7563
        qemuBuildMemPathStr(cfg, def, cmd, priv) < 0)
7564 7565
        return -1;

7566 7567 7568 7569 7570 7571 7572 7573
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_OVERCOMMIT)) {
        virCommandAddArg(cmd, "-overcommit");
        virCommandAddArgFormat(cmd, "mem-lock=%s", def->mem.locked ? "on" : "off");
    } else {
        virCommandAddArg(cmd, "-realtime");
        virCommandAddArgFormat(cmd, "mlock=%s",
                               def->mem.locked ? "on" : "off");
    }
7574 7575 7576 7577 7578

    return 0;
}


7579 7580
static int
qemuBuildIOThreadCommandLine(virCommandPtr cmd,
7581
                             const virDomainDef *def)
7582 7583 7584 7585 7586 7587 7588 7589 7590 7591 7592 7593 7594 7595 7596 7597 7598 7599 7600 7601 7602
{
    size_t i;

    if (def->niothreadids == 0)
        return 0;

    /* Create iothread objects using the defined iothreadids list
     * and the defined id and name from the list. These may be used
     * by a disk definition which will associate to an iothread by
     * supplying a value of an id from the list
     */
    for (i = 0; i < def->niothreadids; i++) {
        virCommandAddArg(cmd, "-object");
        virCommandAddArgFormat(cmd, "iothread,id=iothread%u",
                               def->iothreadids[i]->iothread_id);
    }

    return 0;
}


B
Bharata B Rao 已提交
7603
static int
7604
qemuBuildNumaArgStr(virQEMUDriverConfigPtr cfg,
7605
                    virDomainDefPtr def,
7606
                    virCommandPtr cmd,
7607
                    qemuDomainObjPrivatePtr priv)
B
Bharata B Rao 已提交
7608
{
7609
    size_t i, j;
7610
    virQEMUCapsPtr qemuCaps = priv->qemuCaps;
7611
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
7612 7613 7614
    char *cpumask = NULL;
    char *tmpmask = NULL;
    char *next = NULL;
7615
    virBufferPtr nodeBackends = NULL;
7616 7617
    bool needBackend = false;
    int rc;
7618
    int ret = -1;
7619
    size_t ncells = virDomainNumaGetNodeCount(def->numa);
7620
    const long system_page_size = virGetSystemPageSizeKB();
7621
    bool numa_distances = false;
B
Bharata B Rao 已提交
7622

7623
    if (virDomainNumatuneHasPerNodeBinding(def->numa) &&
7624
        !(virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_RAM) ||
M
Marc-André Lureau 已提交
7625 7626
          virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE) ||
          virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_MEMFD))) {
7627 7628 7629 7630 7631 7632
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Per-node memory binding is not supported "
                         "with this QEMU"));
        goto cleanup;
    }

7633 7634
    if (def->mem.nhugepages &&
        def->mem.hugepages[0].size != system_page_size &&
7635 7636 7637 7638 7639 7640 7641
        !virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("huge pages per NUMA node are not "
                         "supported with this QEMU"));
        goto cleanup;
    }

7642
    if (!virDomainNumatuneNodesetIsAvailable(def->numa, priv->autoNodeset))
7643 7644
        goto cleanup;

7645
    if (VIR_ALLOC_N(nodeBackends, ncells) < 0)
7646 7647 7648 7649
        goto cleanup;

    /* using of -numa memdev= cannot be combined with -numa mem=, thus we
     * need to check which approach to use */
7650
    for (i = 0; i < ncells; i++) {
7651
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_RAM) ||
M
Marc-André Lureau 已提交
7652 7653
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_FILE) ||
            virQEMUCapsGet(qemuCaps, QEMU_CAPS_OBJECT_MEMORY_MEMFD)) {
7654

7655
            if ((rc = qemuBuildMemoryCellBackendStr(def, cfg, i, priv,
7656
                                                    &nodeBackends[i])) < 0)
7657 7658
                goto cleanup;

7659 7660
            if (rc == 0)
                needBackend = true;
7661
        } else {
7662
            if (virDomainNumaGetNodeMemoryAccessMode(def->numa, i)) {
7663 7664 7665 7666 7667
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("Shared memory mapping is not supported "
                                 "with this QEMU"));
                goto cleanup;
            }
7668
        }
7669 7670
    }

7671
    if (!needBackend &&
7672
        qemuBuildMemPathStr(cfg, def, cmd, priv) < 0)
7673 7674
        goto cleanup;

7675
    for (i = 0; i < ncells; i++) {
7676
        VIR_FREE(cpumask);
7677
        if (!(cpumask = virBitmapFormat(virDomainNumaGetNodeCpumask(def->numa, i))))
7678 7679 7680 7681 7682 7683 7684 7685 7686 7687
            goto cleanup;

        if (strchr(cpumask, ',') &&
            !virQEMUCapsGet(qemuCaps, QEMU_CAPS_NUMA)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("disjoint NUMA cpu ranges are not supported "
                             "with this QEMU"));
            goto cleanup;
        }

7688 7689
        if (needBackend) {
            virCommandAddArg(cmd, "-object");
7690
            virCommandAddArgBuffer(cmd, &nodeBackends[i]);
7691
        }
7692

B
Bharata B Rao 已提交
7693
        virCommandAddArg(cmd, "-numa");
7694
        virBufferAsprintf(&buf, "node,nodeid=%zu", i);
7695

7696 7697 7698 7699 7700 7701 7702
        for (tmpmask = cpumask; tmpmask; tmpmask = next) {
            if ((next = strchr(tmpmask, ',')))
                *(next++) = '\0';
            virBufferAddLit(&buf, ",cpus=");
            virBufferAdd(&buf, tmpmask, -1);
        }

7703
        if (needBackend)
7704
            virBufferAsprintf(&buf, ",memdev=ram-node%zu", i);
7705
        else
7706
            virBufferAsprintf(&buf, ",mem=%llu",
7707
                              virDomainNumaGetNodeMemorySize(def->numa, i) / 1024);
B
Bharata B Rao 已提交
7708 7709 7710

        virCommandAddArgBuffer(cmd, &buf);
    }
7711 7712 7713 7714 7715 7716 7717 7718 7719 7720 7721 7722 7723 7724 7725 7726 7727 7728 7729 7730 7731 7732 7733 7734 7735 7736 7737 7738 7739 7740 7741 7742 7743 7744 7745 7746

    /* If NUMA node distance is specified for at least one pair
     * of nodes, we have to specify all the distances. Even
     * though they might be the default ones. */
    for (i = 0; i < ncells; i++) {
        for (j = 0; j < ncells; j++) {
            if (virDomainNumaNodeDistanceIsUsingDefaults(def->numa, i, j))
                continue;

            numa_distances = true;
            break;
        }
        if (numa_distances)
            break;
    }

    if (numa_distances) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_NUMA_DIST)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("setting NUMA distances is not "
                             "supported with this qemu"));
            goto cleanup;
        }

        for (i = 0; i < ncells; i++) {
            for (j = 0; j < ncells; j++) {
                size_t distance = virDomainNumaGetNodeDistance(def->numa, i, j);

                virCommandAddArg(cmd, "-numa");
                virBufferAsprintf(&buf, "dist,src=%zu,dst=%zu,val=%zu", i, j, distance);

                virCommandAddArgBuffer(cmd, &buf);
            }
        }
    }

7747
    ret = 0;
B
Bharata B Rao 已提交
7748

7749
 cleanup:
7750
    VIR_FREE(cpumask);
7751 7752

    if (nodeBackends) {
7753
        for (i = 0; i < ncells; i++)
7754
            virBufferFreeAndReset(&nodeBackends[i]);
7755 7756 7757 7758

        VIR_FREE(nodeBackends);
    }

7759
    return ret;
B
Bharata B Rao 已提交
7760
}
7761

7762

7763
static int
7764 7765 7766
qemuBuildMemoryDeviceCommandLine(virCommandPtr cmd,
                                 virQEMUDriverConfigPtr cfg,
                                 virDomainDefPtr def,
7767
                                 qemuDomainObjPrivatePtr priv)
7768 7769 7770 7771 7772 7773
{
    size_t i;

    /* memory hotplug requires NUMA to be enabled - we already checked
     * that memory devices are present only when NUMA is */
    for (i = 0; i < def->nmems; i++) {
7774
        VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
7775 7776
        char *dimmStr;

7777
        if (qemuBuildMemoryDimmBackendStr(&buf, def->mems[i], def, cfg, priv) < 0)
7778 7779
            return -1;

7780 7781 7782
        virCommandAddArg(cmd, "-object");
        virCommandAddArgBuffer(cmd, &buf);

7783
        if (!(dimmStr = qemuBuildMemoryDeviceStr(def->mems[i], priv)))
7784 7785
            return -1;

7786
        virCommandAddArgList(cmd, "-device", dimmStr, NULL);
7787 7788 7789 7790 7791 7792 7793 7794

        VIR_FREE(dimmStr);
    }

    return 0;
}


7795 7796 7797 7798 7799 7800
static int
qemuBuildGraphicsSDLCommandLine(virQEMUDriverConfigPtr cfg ATTRIBUTE_UNUSED,
                                virCommandPtr cmd,
                                virQEMUCapsPtr qemuCaps ATTRIBUTE_UNUSED,
                                virDomainGraphicsDefPtr graphics)
{
7801
    VIR_AUTOCLEAN(virBuffer) opt = VIR_BUFFER_INITIALIZER;
7802

7803 7804 7805 7806 7807 7808 7809 7810 7811 7812 7813
    if (graphics->data.sdl.xauth)
        virCommandAddEnvPair(cmd, "XAUTHORITY", graphics->data.sdl.xauth);
    if (graphics->data.sdl.display)
        virCommandAddEnvPair(cmd, "DISPLAY", graphics->data.sdl.display);
    if (graphics->data.sdl.fullscreen)
        virCommandAddArg(cmd, "-full-screen");

    /* If using SDL for video, then we should just let it
     * use QEMU's host audio drivers, possibly SDL too
     * User can set these two before starting libvirtd
     */
7814 7815
    virCommandAddEnvPass(cmd, "QEMU_AUDIO_DRV");
    virCommandAddEnvPass(cmd, "SDL_AUDIODRIVER");
7816

7817 7818
    virCommandAddArg(cmd, "-display");
    virBufferAddLit(&opt, "sdl");
7819

7820
    if (graphics->data.sdl.gl != VIR_TRISTATE_BOOL_ABSENT) {
7821 7822
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SDL_GL)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
7823 7824
                           _("OpenGL for SDL is not supported with this QEMU "
                             "binary"));
7825
            return -1;
7826 7827
        }

7828
        virBufferAsprintf(&opt, ",gl=%s",
7829
                          virTristateSwitchTypeToString(graphics->data.sdl.gl));
7830

7831 7832
    }

7833
    if (virBufferCheckError(&opt) < 0)
7834
        return -1;
7835 7836

    virCommandAddArgBuffer(cmd, &opt);
7837

7838
    return 0;
7839 7840 7841
}


7842 7843 7844 7845
static int
qemuBuildGraphicsVNCCommandLine(virQEMUDriverConfigPtr cfg,
                                virCommandPtr cmd,
                                virQEMUCapsPtr qemuCaps,
7846
                                virDomainGraphicsDefPtr graphics)
7847
{
7848
    VIR_AUTOCLEAN(virBuffer) opt = VIR_BUFFER_INITIALIZER;
7849
    virDomainGraphicsListenDefPtr glisten = NULL;
7850 7851 7852 7853 7854
    bool escapeAddr;

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_VNC)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("vnc graphics are not supported with this QEMU"));
7855
        return -1;
7856 7857
    }

7858 7859 7860
    if (!(glisten = virDomainGraphicsGetListen(graphics, 0))) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("missing listen element"));
7861
        return -1;
7862
    }
7863

7864 7865
    switch (glisten->type) {
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_SOCKET:
7866 7867 7868 7869
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_VNC_MULTI_SERVERS))
            virBufferAddLit(&opt, "vnc=unix:");
        else
            virBufferAddLit(&opt, "unix:");
7870
        virQEMUBuildBufferEscapeComma(&opt, glisten->socket);
7871
        break;
7872

7873 7874
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_ADDRESS:
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_NETWORK:
7875 7876 7877 7878 7879
        if (!graphics->data.vnc.autoport &&
            (graphics->data.vnc.port < 5900 ||
             graphics->data.vnc.port > 65535)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("vnc port must be in range [5900,65535]"));
7880
            return -1;
7881
        }
7882

7883
        if (glisten->address) {
7884 7885 7886 7887 7888
            escapeAddr = strchr(glisten->address, ':') != NULL;
            if (escapeAddr)
                virBufferAsprintf(&opt, "[%s]", glisten->address);
            else
                virBufferAdd(&opt, glisten->address, -1);
7889 7890 7891
        }
        virBufferAsprintf(&opt, ":%d",
                          graphics->data.vnc.port - 5900);
7892

7893
        if (graphics->data.vnc.websocket)
7894
            virBufferAsprintf(&opt, ",websocket=%d", graphics->data.vnc.websocket);
7895 7896 7897
        break;

    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_NONE:
7898 7899 7900
        virBufferAddLit(&opt, "none");
        break;

7901 7902
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_LAST:
        break;
7903
    }
7904

7905 7906 7907
    if (graphics->data.vnc.sharePolicy) {
        virBufferAsprintf(&opt, ",share=%s",
                          virDomainGraphicsVNCSharePolicyTypeToString(
7908
                              graphics->data.vnc.sharePolicy));
7909
    }
7910

7911 7912
    if (graphics->data.vnc.auth.passwd || cfg->vncPassword)
        virBufferAddLit(&opt, ",password");
7913

7914
    if (cfg->vncTLS) {
7915 7916
        qemuDomainGraphicsPrivatePtr gfxPriv = QEMU_DOMAIN_GRAPHICS_PRIVATE(graphics);
        if (gfxPriv->tlsAlias) {
7917 7918 7919 7920 7921
            const char *secretAlias = NULL;

            if (gfxPriv->secinfo) {
                if (qemuBuildObjectSecretCommandLine(cmd,
                                                     gfxPriv->secinfo) < 0)
7922
                    return -1;
7923 7924 7925
                secretAlias = gfxPriv->secinfo->s.aes.alias;
            }

J
Ján Tomko 已提交
7926 7927 7928 7929
            if (qemuBuildTLSx509CommandLine(cmd,
                                            cfg->vncTLSx509certdir,
                                            true,
                                            cfg->vncTLSx509verify,
7930
                                            secretAlias,
7931
                                            gfxPriv->tlsAlias,
J
Ján Tomko 已提交
7932
                                            qemuCaps) < 0)
7933
                return -1;
J
Ján Tomko 已提交
7934

7935
            virBufferAsprintf(&opt, ",tls-creds=%s", gfxPriv->tlsAlias);
7936
        } else {
J
Ján Tomko 已提交
7937 7938 7939 7940 7941 7942 7943 7944
            virBufferAddLit(&opt, ",tls");
            if (cfg->vncTLSx509verify) {
                virBufferAddLit(&opt, ",x509verify=");
                virQEMUBuildBufferEscapeComma(&opt, cfg->vncTLSx509certdir);
            } else {
                virBufferAddLit(&opt, ",x509=");
                virQEMUBuildBufferEscapeComma(&opt, cfg->vncTLSx509certdir);
            }
7945
        }
7946
    }
7947

7948 7949
    if (cfg->vncSASL) {
        virBufferAddLit(&opt, ",sasl");
7950

7951 7952
        if (cfg->vncSASLdir)
            virCommandAddEnvPair(cmd, "SASL_CONF_PATH", cfg->vncSASLdir);
7953

7954
        /* TODO: Support ACLs later */
7955 7956 7957 7958 7959 7960 7961 7962 7963 7964 7965 7966
    }

    virCommandAddArg(cmd, "-vnc");
    virCommandAddArgBuffer(cmd, &opt);
    if (graphics->data.vnc.keymap)
        virCommandAddArgList(cmd, "-k", graphics->data.vnc.keymap, NULL);

    /* Unless user requested it, set the audio backend to none, to
     * prevent it opening the host OS audio devices, since that causes
     * security issues and might not work when using VNC.
     */
    if (cfg->vncAllowHostAudio)
7967
        virCommandAddEnvPass(cmd, "QEMU_AUDIO_DRV");
7968 7969 7970 7971 7972 7973 7974
    else
        virCommandAddEnvString(cmd, "QEMU_AUDIO_DRV=none");

    return 0;
}


7975 7976 7977 7978 7979 7980
static int
qemuBuildGraphicsSPICECommandLine(virQEMUDriverConfigPtr cfg,
                                  virCommandPtr cmd,
                                  virQEMUCapsPtr qemuCaps,
                                  virDomainGraphicsDefPtr graphics)
{
7981
    VIR_AUTOCLEAN(virBuffer) opt = VIR_BUFFER_INITIALIZER;
7982
    virDomainGraphicsListenDefPtr glisten = NULL;
7983 7984
    int port = graphics->data.spice.port;
    int tlsPort = graphics->data.spice.tlsPort;
7985
    size_t i;
7986 7987
    bool hasSecure = false;
    bool hasInsecure = false;
7988 7989 7990 7991

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SPICE)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("spice graphics are not supported with this QEMU"));
7992
        return -1;
7993 7994
    }

7995 7996 7997
    if (!(glisten = virDomainGraphicsGetListen(graphics, 0))) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("missing listen element"));
7998
        return -1;
7999
    }
8000

8001 8002 8003
    switch (glisten->type) {
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_SOCKET:
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SPICE_UNIX)) {
8004
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
8005 8006
                           _("unix socket for spice graphics are not supported "
                             "with this QEMU"));
8007
            return -1;
8008 8009
        }

8010
        virBufferAddLit(&opt, "unix,addr=");
8011
        virQEMUBuildBufferEscapeComma(&opt, glisten->socket);
8012
        virBufferAddLit(&opt, ",");
8013 8014 8015 8016 8017 8018 8019 8020 8021 8022 8023 8024 8025 8026 8027
        hasInsecure = true;
        break;

    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_ADDRESS:
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_NETWORK:
        if (port > 0) {
            virBufferAsprintf(&opt, "port=%u,", port);
            hasInsecure = true;
        }

        if (tlsPort > 0) {
            if (!cfg->spiceTLS) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("spice TLS port set in XML configuration, "
                                 "but TLS is disabled in qemu.conf"));
8028
                return -1;
8029 8030 8031 8032 8033 8034 8035 8036 8037 8038 8039 8040 8041
            }
            virBufferAsprintf(&opt, "tls-port=%u,", tlsPort);
            hasSecure = true;
        }

        if (port > 0 || tlsPort > 0) {
            if (glisten->address)
                virBufferAsprintf(&opt, "addr=%s,", glisten->address);
        }

        break;

    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_NONE:
P
Pavel Hrdina 已提交
8042 8043 8044 8045 8046
        /* QEMU requires either port or tls-port to be specified if there is no
         * other argument. Use a dummy port=0. */
        virBufferAddLit(&opt, "port=0,");
        hasInsecure = true;
        break;
8047 8048
    case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_LAST:
        break;
8049
    }
8050

8051 8052 8053 8054 8055 8056 8057 8058 8059 8060
    if (cfg->spiceSASL) {
        virBufferAddLit(&opt, "sasl,");

        if (cfg->spiceSASLdir)
            virCommandAddEnvPair(cmd, "SASL_CONF_PATH",
                                 cfg->spiceSASLdir);

        /* TODO: Support ACLs later */
    }

8061 8062 8063
    if (graphics->data.spice.mousemode) {
        switch (graphics->data.spice.mousemode) {
        case VIR_DOMAIN_GRAPHICS_SPICE_MOUSE_MODE_SERVER:
8064
            virBufferAddLit(&opt, "agent-mouse=off,");
8065 8066
            break;
        case VIR_DOMAIN_GRAPHICS_SPICE_MOUSE_MODE_CLIENT:
8067
            virBufferAddLit(&opt, "agent-mouse=on,");
8068
            break;
8069
        case VIR_DOMAIN_GRAPHICS_SPICE_MOUSE_MODE_DEFAULT:
8070
            break;
8071 8072 8073 8074
        case VIR_DOMAIN_GRAPHICS_SPICE_MOUSE_MODE_LAST:
        default:
            virReportEnumRangeError(virDomainGraphicsSpiceMouseMode,
                                    graphics->data.spice.mousemode);
8075
            return -1;
8076 8077 8078 8079 8080 8081 8082 8083
        }
    }

    /* In the password case we set it via monitor command, to avoid
     * making it visible on CLI, so there's no use of password=XXX
     * in this bit of the code */
    if (!graphics->data.spice.auth.passwd &&
        !cfg->spicePassword)
8084
        virBufferAddLit(&opt, "disable-ticketing,");
8085

8086 8087 8088 8089 8090
    if (hasSecure) {
        virBufferAddLit(&opt, "x509-dir=");
        virQEMUBuildBufferEscapeComma(&opt, cfg->spiceTLSx509certdir);
        virBufferAddLit(&opt, ",");
    }
8091

8092
    switch (graphics->data.spice.defaultMode) {
8093
    case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_SECURE:
8094 8095 8096 8097 8098
        if (!hasSecure) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("spice defaultMode secure requested in XML "
                             "configuration, but TLS connection is not "
                             "available"));
8099
            return -1;
8100
        }
8101
        virBufferAddLit(&opt, "tls-channel=default,");
8102 8103
        break;
    case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_INSECURE:
8104 8105 8106 8107 8108
        if (!hasInsecure) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("spice defaultMode insecure requested in XML "
                             "configuration, but plaintext connection is not "
                             "available"));
8109
            return -1;
8110
        }
8111
        virBufferAddLit(&opt, "plaintext-channel=default,");
8112 8113
        break;
    case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_ANY:
8114
    case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_LAST:
8115 8116 8117 8118
        /* nothing */
        break;
    }

8119
    for (i = 0; i < VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_LAST; i++) {
8120
        switch (graphics->data.spice.channels[i]) {
8121
        case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_SECURE:
8122
            if (!hasSecure) {
8123
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
8124 8125 8126
                               _("spice secure channels set in XML "
                                 "configuration, but TLS connection is not "
                                 "available"));
8127
                return -1;
8128
            }
8129
            virBufferAsprintf(&opt, "tls-channel=%s,",
8130 8131
                              virDomainGraphicsSpiceChannelNameTypeToString(i));
            break;
8132

8133
        case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_INSECURE:
8134
            if (!hasInsecure) {
8135 8136
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("spice insecure channels set in XML "
8137 8138
                                 "configuration, but plaintext connection "
                                 "is not available"));
8139
                return -1;
8140
            }
8141
            virBufferAsprintf(&opt, "plaintext-channel=%s,",
8142 8143
                              virDomainGraphicsSpiceChannelNameTypeToString(i));
            break;
8144 8145 8146

        case VIR_DOMAIN_GRAPHICS_SPICE_CHANNEL_MODE_ANY:
            break;
8147 8148
        }
    }
8149

8150
    if (graphics->data.spice.image)
8151
        virBufferAsprintf(&opt, "image-compression=%s,",
8152 8153
                          virDomainGraphicsSpiceImageCompressionTypeToString(graphics->data.spice.image));
    if (graphics->data.spice.jpeg)
8154
        virBufferAsprintf(&opt, "jpeg-wan-compression=%s,",
8155 8156
                          virDomainGraphicsSpiceJpegCompressionTypeToString(graphics->data.spice.jpeg));
    if (graphics->data.spice.zlib)
8157
        virBufferAsprintf(&opt, "zlib-glz-wan-compression=%s,",
8158 8159
                          virDomainGraphicsSpiceZlibCompressionTypeToString(graphics->data.spice.zlib));
    if (graphics->data.spice.playback)
8160
        virBufferAsprintf(&opt, "playback-compression=%s,",
J
Ján Tomko 已提交
8161
                          virTristateSwitchTypeToString(graphics->data.spice.playback));
8162
    if (graphics->data.spice.streaming)
8163
        virBufferAsprintf(&opt, "streaming-video=%s,",
8164
                          virDomainGraphicsSpiceStreamingModeTypeToString(graphics->data.spice.streaming));
J
Ján Tomko 已提交
8165
    if (graphics->data.spice.copypaste == VIR_TRISTATE_BOOL_NO)
8166 8167
        virBufferAddLit(&opt, "disable-copy-paste,");

J
Ján Tomko 已提交
8168
    if (graphics->data.spice.filetransfer == VIR_TRISTATE_BOOL_NO) {
8169 8170 8171
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SPICE_FILE_XFER_DISABLE)) {
           virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                          _("This QEMU can't disable file transfers through spice"));
8172
            return -1;
8173
        } else {
8174
            virBufferAddLit(&opt, "disable-agent-file-xfer,");
8175 8176
        }
    }
8177

8178
    if (graphics->data.spice.gl == VIR_TRISTATE_BOOL_YES) {
8179 8180 8181
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SPICE_GL)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("This QEMU doesn't support spice OpenGL"));
8182
            return -1;
8183 8184 8185 8186
        }

        /* spice.gl is a TristateBool, but qemu expects on/off: use
         * TristateSwitch helper */
8187
        virBufferAsprintf(&opt, "gl=%s,",
8188
                          virTristateSwitchTypeToString(graphics->data.spice.gl));
8189 8190 8191 8192 8193

        if (graphics->data.spice.rendernode) {
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_SPICE_RENDERNODE)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("This QEMU doesn't support spice OpenGL rendernode"));
8194
                return -1;
8195 8196
            }

8197 8198 8199
            virBufferAddLit(&opt, "rendernode=");
            virQEMUBuildBufferEscapeComma(&opt, graphics->data.spice.rendernode);
            virBufferAddLit(&opt, ",");
8200
        }
8201 8202
    }

8203 8204 8205
    /* Turn on seamless migration unconditionally. If migration destination
     * doesn't support it, it fallbacks to previous migration algorithm silently. */
    virBufferAddLit(&opt, "seamless-migration=on,");
8206

8207 8208
    virBufferTrim(&opt, ",", -1);

8209
    virCommandAddArg(cmd, "-spice");
P
Pavel Hrdina 已提交
8210
    virCommandAddArgBuffer(cmd, &opt);
8211 8212 8213 8214 8215 8216 8217 8218 8219 8220 8221
    if (graphics->data.spice.keymap)
        virCommandAddArgList(cmd, "-k",
                             graphics->data.spice.keymap, NULL);
    /* SPICE includes native support for tunnelling audio, so we
     * set the audio backend to point at SPICE's own driver
     */
    virCommandAddEnvString(cmd, "QEMU_AUDIO_DRV=spice");

    return 0;
}

8222

8223 8224 8225
static int
qemuBuildGraphicsEGLHeadlessCommandLine(virQEMUDriverConfigPtr cfg ATTRIBUTE_UNUSED,
                                        virCommandPtr cmd,
8226 8227
                                        virQEMUCapsPtr qemuCaps,
                                        virDomainGraphicsDefPtr graphics)
8228
{
8229
    VIR_AUTOCLEAN(virBuffer) opt = VIR_BUFFER_INITIALIZER;
8230 8231 8232 8233 8234 8235 8236 8237

    virBufferAddLit(&opt, "egl-headless");

    if (graphics->data.egl_headless.rendernode) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_EGL_HEADLESS_RENDERNODE)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("This QEMU doesn't support OpenGL rendernode "
                             "with egl-headless graphics type"));
8238
            return -1;
8239 8240 8241 8242 8243 8244 8245 8246
        }

        virBufferAddLit(&opt, ",rendernode=");
        virQEMUBuildBufferEscapeComma(&opt,
                                      graphics->data.egl_headless.rendernode);
    }

    if (virBufferCheckError(&opt) < 0)
8247
        return -1;
8248

8249
    virCommandAddArg(cmd, "-display");
8250
    virCommandAddArgBuffer(cmd, &opt);
8251

8252
    return 0;
8253 8254 8255
}


8256
static int
8257
qemuBuildGraphicsCommandLine(virQEMUDriverConfigPtr cfg,
8258
                             virCommandPtr cmd,
8259 8260
                             virDomainDefPtr def,
                             virQEMUCapsPtr qemuCaps)
8261
{
8262
    size_t i;
8263

8264 8265
    for (i = 0; i < def->ngraphics; i++) {
        virDomainGraphicsDefPtr graphics = def->graphics[i];
8266

8267 8268 8269 8270 8271
        switch (graphics->type) {
        case VIR_DOMAIN_GRAPHICS_TYPE_SDL:
            if (qemuBuildGraphicsSDLCommandLine(cfg, cmd,
                                                qemuCaps, graphics) < 0)
                return -1;
8272

8273 8274 8275 8276 8277 8278 8279 8280 8281 8282 8283 8284
            break;
        case VIR_DOMAIN_GRAPHICS_TYPE_VNC:
            if (qemuBuildGraphicsVNCCommandLine(cfg, cmd,
                                                qemuCaps, graphics) < 0)
                return -1;

            break;
        case VIR_DOMAIN_GRAPHICS_TYPE_SPICE:
            if (qemuBuildGraphicsSPICECommandLine(cfg, cmd,
                                                  qemuCaps, graphics) < 0)
                return -1;

8285 8286
            break;
        case VIR_DOMAIN_GRAPHICS_TYPE_EGL_HEADLESS:
8287 8288 8289
            if (qemuBuildGraphicsEGLHeadlessCommandLine(cfg, cmd,
                                                        qemuCaps, graphics) < 0)
                return -1;
8290

8291 8292 8293 8294 8295 8296 8297 8298 8299 8300 8301 8302
            break;
        case VIR_DOMAIN_GRAPHICS_TYPE_RDP:
        case VIR_DOMAIN_GRAPHICS_TYPE_DESKTOP:
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("unsupported graphics type '%s'"),
                           virDomainGraphicsTypeToString(graphics->type));
            return -1;
        case VIR_DOMAIN_GRAPHICS_TYPE_LAST:
        default:
            virReportEnumRangeError(virDomainGraphicsType, graphics->type);
            return -1;
        }
8303
    }
8304

8305 8306
    return 0;
}
8307

M
Michele Paolino 已提交
8308
static int
8309
qemuInterfaceVhostuserConnect(virQEMUDriverPtr driver,
8310
                              virLogManagerPtr logManager,
8311
                              virSecurityManagerPtr secManager,
8312
                              virCommandPtr cmd,
M
Michele Paolino 已提交
8313 8314
                              virDomainDefPtr def,
                              virDomainNetDefPtr net,
8315
                              virQEMUCapsPtr qemuCaps,
8316
                              char **chardev)
M
Michele Paolino 已提交
8317
{
J
Ján Tomko 已提交
8318
    VIR_AUTOUNREF(virQEMUDriverConfigPtr) cfg = virQEMUDriverGetConfig(driver);
M
Michele Paolino 已提交
8319

8320
    switch ((virDomainChrType)net->data.vhostuser->type) {
M
Michele Paolino 已提交
8321
    case VIR_DOMAIN_CHR_TYPE_UNIX:
8322 8323 8324 8325
        if (!(*chardev = qemuBuildChrChardevStr(logManager, secManager,
                                                cmd, cfg, def,
                                                net->data.vhostuser,
                                                net->info.alias, qemuCaps, 0)))
8326
            return -1;
M
Michele Paolino 已提交
8327 8328 8329 8330 8331 8332 8333 8334 8335 8336 8337 8338 8339 8340 8341 8342 8343
        break;

    case VIR_DOMAIN_CHR_TYPE_NULL:
    case VIR_DOMAIN_CHR_TYPE_VC:
    case VIR_DOMAIN_CHR_TYPE_PTY:
    case VIR_DOMAIN_CHR_TYPE_DEV:
    case VIR_DOMAIN_CHR_TYPE_FILE:
    case VIR_DOMAIN_CHR_TYPE_PIPE:
    case VIR_DOMAIN_CHR_TYPE_STDIO:
    case VIR_DOMAIN_CHR_TYPE_UDP:
    case VIR_DOMAIN_CHR_TYPE_TCP:
    case VIR_DOMAIN_CHR_TYPE_SPICEVMC:
    case VIR_DOMAIN_CHR_TYPE_SPICEPORT:
    case VIR_DOMAIN_CHR_TYPE_NMDM:
    case VIR_DOMAIN_CHR_TYPE_LAST:
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("vhost-user type '%s' not supported"),
8344
                       virDomainChrTypeToString(net->data.vhostuser->type));
8345
        return -1;
M
Michele Paolino 已提交
8346 8347
    }

8348
    return 0;
M
Michele Paolino 已提交
8349 8350
}

8351
static int
8352
qemuBuildInterfaceCommandLine(virQEMUDriverPtr driver,
8353
                              virDomainObjPtr vm,
8354
                              virLogManagerPtr logManager,
8355
                              virSecurityManagerPtr secManager,
8356
                              virCommandPtr cmd,
8357 8358
                              virDomainNetDefPtr net,
                              virQEMUCapsPtr qemuCaps,
8359
                              unsigned int bootindex,
8360
                              virNetDevVPortProfileOp vmop,
8361
                              bool standalone,
8362
                              size_t *nnicindexes,
8363
                              int **nicindexes)
8364
{
8365
    virDomainDefPtr def = vm->def;
8366
    int ret = -1;
8367 8368 8369
    VIR_AUTOFREE(char *) nic = NULL;
    VIR_AUTOFREE(char *) host = NULL;
    VIR_AUTOFREE(char *) chardev = NULL;
8370
    int *tapfd = NULL;
8371
    size_t tapfdSize = 0;
8372
    int *vhostfd = NULL;
8373
    size_t vhostfdSize = 0;
8374 8375
    char **tapfdName = NULL;
    char **vhostfdName = NULL;
8376
    VIR_AUTOFREE(char *) slirpfdName = NULL;
8377
    virDomainNetType actualType = virDomainNetGetActualType(net);
8378
    virNetDevBandwidthPtr actualBandwidth;
8379
    bool requireNicdev = false;
8380
    qemuSlirpPtr slirp;
8381
    size_t i;
8382

8383 8384 8385 8386

    if (!bootindex)
        bootindex = net->info.bootIndex;

8387
    if (qemuDomainValidateActualNetDef(net, qemuCaps) < 0)
8388
        return -1;
8389

8390
    switch (actualType) {
8391
    case VIR_DOMAIN_NET_TYPE_NETWORK:
8392
    case VIR_DOMAIN_NET_TYPE_BRIDGE:
8393 8394 8395 8396 8397
        tapfdSize = net->driver.virtio.queues;
        if (!tapfdSize)
            tapfdSize = 1;

        if (VIR_ALLOC_N(tapfd, tapfdSize) < 0 ||
8398
            VIR_ALLOC_N(tapfdName, tapfdSize) < 0)
8399 8400
            goto cleanup;

8401 8402
        memset(tapfd, -1, tapfdSize * sizeof(tapfd[0]));

8403
        if (qemuInterfaceBridgeConnect(def, driver, net,
8404
                                       tapfd, &tapfdSize) < 0)
8405
            goto cleanup;
8406 8407 8408
        break;

    case VIR_DOMAIN_NET_TYPE_DIRECT:
8409 8410 8411 8412 8413 8414
        tapfdSize = net->driver.virtio.queues;
        if (!tapfdSize)
            tapfdSize = 1;

        if (VIR_ALLOC_N(tapfd, tapfdSize) < 0 ||
            VIR_ALLOC_N(tapfdName, tapfdSize) < 0)
8415
            goto cleanup;
8416 8417 8418

        memset(tapfd, -1, tapfdSize * sizeof(tapfd[0]));

8419 8420
        if (qemuInterfaceDirectConnect(def, driver, net,
                                       tapfd, tapfdSize, vmop) < 0)
8421
            goto cleanup;
8422 8423 8424
        break;

    case VIR_DOMAIN_NET_TYPE_ETHERNET:
8425 8426 8427 8428 8429 8430 8431 8432 8433 8434 8435
        tapfdSize = net->driver.virtio.queues;
        if (!tapfdSize)
            tapfdSize = 1;

        if (VIR_ALLOC_N(tapfd, tapfdSize) < 0 ||
            VIR_ALLOC_N(tapfdName, tapfdSize) < 0)
            goto cleanup;

        memset(tapfd, -1, tapfdSize * sizeof(tapfd[0]));

        if (qemuInterfaceEthernetConnect(def, driver, net,
8436
                                         tapfd, tapfdSize) < 0)
8437
            goto cleanup;
8438 8439 8440
        break;

    case VIR_DOMAIN_NET_TYPE_HOSTDEV:
8441 8442 8443 8444 8445
        /* NET_TYPE_HOSTDEV devices are really hostdev devices, so
         * their commandlines are constructed with other hostdevs.
         */
        ret = 0;
        goto cleanup;
8446 8447 8448
        break;

    case VIR_DOMAIN_NET_TYPE_VHOSTUSER:
8449 8450 8451 8452 8453 8454 8455 8456 8457 8458
        requireNicdev = true;

        if (qemuInterfaceVhostuserConnect(driver, logManager, secManager,
                                          cmd, def, net, qemuCaps, &chardev) < 0)
            goto cleanup;

        if (virNetDevOpenvswitchGetVhostuserIfname(net->data.vhostuser->data.nix.path,
                                                   &net->ifname) < 0)
            goto cleanup;

8459 8460 8461 8462 8463 8464 8465 8466 8467 8468 8469
        break;

    case VIR_DOMAIN_NET_TYPE_USER:
    case VIR_DOMAIN_NET_TYPE_SERVER:
    case VIR_DOMAIN_NET_TYPE_CLIENT:
    case VIR_DOMAIN_NET_TYPE_MCAST:
    case VIR_DOMAIN_NET_TYPE_INTERNAL:
    case VIR_DOMAIN_NET_TYPE_UDP:
    case VIR_DOMAIN_NET_TYPE_LAST:
        /* nada */
        break;
8470 8471
    }

8472 8473 8474 8475 8476
    /* For types whose implementations use a netdev on the host, add
     * an entry to nicindexes for passing on to systemd.
    */
    switch ((virDomainNetType)actualType) {
    case VIR_DOMAIN_NET_TYPE_ETHERNET:
8477
    case VIR_DOMAIN_NET_TYPE_NETWORK:
8478 8479 8480 8481 8482 8483 8484 8485
    case VIR_DOMAIN_NET_TYPE_BRIDGE:
    case VIR_DOMAIN_NET_TYPE_DIRECT:
    {
        int nicindex;

        /* network and bridge use a tap device, and direct uses a
         * macvtap device
         */
8486 8487
        if (virQEMUDriverIsPrivileged(driver) && nicindexes && nnicindexes &&
            net->ifname) {
8488 8489 8490 8491 8492 8493 8494 8495 8496 8497 8498 8499
            if (virNetDevGetIndex(net->ifname, &nicindex) < 0 ||
                VIR_APPEND_ELEMENT(*nicindexes, *nnicindexes, nicindex) < 0)
                goto cleanup;
        }
        break;
    }

    case VIR_DOMAIN_NET_TYPE_USER:
    case VIR_DOMAIN_NET_TYPE_VHOSTUSER:
    case VIR_DOMAIN_NET_TYPE_SERVER:
    case VIR_DOMAIN_NET_TYPE_CLIENT:
    case VIR_DOMAIN_NET_TYPE_MCAST:
8500
    case VIR_DOMAIN_NET_TYPE_UDP:
8501 8502 8503 8504 8505 8506 8507 8508 8509 8510 8511 8512 8513 8514 8515 8516
    case VIR_DOMAIN_NET_TYPE_INTERNAL:
    case VIR_DOMAIN_NET_TYPE_HOSTDEV:
    case VIR_DOMAIN_NET_TYPE_LAST:
       /* These types don't use a network device on the host, but
        * instead use some other type of connection to the emulated
        * device in the qemu process.
        *
        * (Note that hostdev can't be considered as "using a network
        * device", because by the time it is being used, it has been
        * detached from the hostside network driver so it doesn't show
        * up in the list of interfaces on the host - it's just some
        * PCI device.)
        */
       break;
    }

8517 8518 8519 8520
    /* Set bandwidth or warn if requested and not supported. */
    actualBandwidth = virDomainNetGetActualBandwidth(net);
    if (actualBandwidth) {
        if (virNetDevSupportBandwidth(actualType)) {
8521 8522
            if (virNetDevBandwidthSet(net->ifname, actualBandwidth, false,
                                      !virDomainNetTypeSharesHostView(net)) < 0)
8523 8524 8525 8526 8527 8528 8529
                goto cleanup;
        } else {
            VIR_WARN("setting bandwidth on interfaces of "
                     "type '%s' is not implemented yet",
                     virDomainNetTypeToString(actualType));
        }
    }
8530

8531 8532 8533 8534
    if (net->mtu &&
        virNetDevSetMTU(net->ifname, net->mtu) < 0)
        goto cleanup;

8535 8536 8537 8538 8539
    if ((actualType == VIR_DOMAIN_NET_TYPE_NETWORK ||
         actualType == VIR_DOMAIN_NET_TYPE_BRIDGE ||
         actualType == VIR_DOMAIN_NET_TYPE_ETHERNET ||
         actualType == VIR_DOMAIN_NET_TYPE_DIRECT) &&
        !standalone) {
8540 8541
        /* Attempt to use vhost-net mode for these types of
           network device */
8542 8543 8544 8545 8546
        vhostfdSize = net->driver.virtio.queues;
        if (!vhostfdSize)
            vhostfdSize = 1;

        if (VIR_ALLOC_N(vhostfd, vhostfdSize) < 0 ||
8547
            VIR_ALLOC_N(vhostfdName, vhostfdSize))
8548 8549
            goto cleanup;

8550 8551
        memset(vhostfd, -1, vhostfdSize * sizeof(vhostfd[0]));

J
Ján Tomko 已提交
8552
        if (qemuInterfaceOpenVhostNet(def, net, vhostfd, &vhostfdSize) < 0)
8553 8554 8555
            goto cleanup;
    }

8556 8557 8558 8559 8560 8561 8562 8563 8564 8565
    slirp = QEMU_DOMAIN_NETWORK_PRIVATE(net)->slirp;
    if (slirp && !standalone) {
        int slirpfd = qemuSlirpGetFD(slirp);
        virCommandPassFD(cmd, slirpfd,
                         VIR_COMMAND_PASS_FD_CLOSE_PARENT);
        if (virAsprintf(&slirpfdName, "%d", slirpfd) < 0)
            goto cleanup;
    }


8566
    for (i = 0; i < tapfdSize; i++) {
8567 8568
        if (qemuSecuritySetTapFDLabel(driver->securityManager,
                                      def, tapfd[i]) < 0)
M
Michal Privoznik 已提交
8569
            goto cleanup;
8570
        if (virAsprintf(&tapfdName[i], "%d", tapfd[i]) < 0)
8571
            goto cleanup;
8572 8573 8574
        virCommandPassFD(cmd, tapfd[i],
                         VIR_COMMAND_PASS_FD_CLOSE_PARENT);
        tapfd[i] = -1;
8575 8576
    }

8577
    for (i = 0; i < vhostfdSize; i++) {
8578
        if (virAsprintf(&vhostfdName[i], "%d", vhostfd[i]) < 0)
8579
            goto cleanup;
8580 8581 8582
        virCommandPassFD(cmd, vhostfd[i],
                         VIR_COMMAND_PASS_FD_CLOSE_PARENT);
        vhostfd[i] = -1;
8583 8584
    }

8585 8586 8587
    if (chardev)
        virCommandAddArgList(cmd, "-chardev", chardev, NULL);

8588
    if (!(host = qemuBuildHostNetStr(net,
8589
                                     tapfdName, tapfdSize,
8590 8591
                                     vhostfdName, vhostfdSize,
                                     slirpfdName)))
8592 8593 8594
        goto cleanup;
    virCommandAddArgList(cmd, "-netdev", host, NULL);

8595 8596
    /* Possible combinations:
     *
8597 8598 8599
     *   Old way: -netdev type=tap,id=netdev1 \
     *              -net nic,model=e1000,netdev=netdev1
     *   New way: -netdev type=tap,id=netdev1 -device e1000,id=netdev1
8600
     */
8601
    if (qemuDomainSupportsNicdev(def, net)) {
8602 8603 8604
        if (qemuCommandAddExtDevice(cmd, &net->info) < 0)
            goto cleanup;

8605
        if (!(nic = qemuBuildNicDevStr(def, net, bootindex,
8606
                                       net->driver.virtio.queues, qemuCaps)))
8607 8608
            goto cleanup;
        virCommandAddArgList(cmd, "-device", nic, NULL);
8609
    } else if (!requireNicdev) {
8610 8611 8612
        if (qemuCommandAddExtDevice(cmd, &net->info) < 0)
            goto cleanup;

8613
        if (!(nic = qemuBuildLegacyNicStr(net)))
8614 8615
            goto cleanup;
        virCommandAddArgList(cmd, "-net", nic, NULL);
8616 8617 8618 8619
    } else {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("Nicdev support unavailable"));
        goto cleanup;
8620 8621 8622
    }

    ret = 0;
8623
 cleanup:
8624 8625
    if (ret < 0) {
        virErrorPtr saved_err = virSaveLastError();
8626
        virDomainConfNWFilterTeardown(net);
8627 8628 8629
        virSetError(saved_err);
        virFreeError(saved_err);
    }
8630
    for (i = 0; vhostfd && i < vhostfdSize; i++) {
8631 8632
        if (ret < 0)
            VIR_FORCE_CLOSE(vhostfd[i]);
8633 8634
        if (vhostfdName)
            VIR_FREE(vhostfdName[i]);
8635
    }
8636
    VIR_FREE(vhostfdName);
8637
    for (i = 0; tapfd && i < tapfdSize; i++) {
8638 8639 8640 8641 8642 8643
        if (ret < 0)
            VIR_FORCE_CLOSE(tapfd[i]);
        if (tapfdName)
            VIR_FREE(tapfdName[i]);
    }
    VIR_FREE(tapfdName);
8644
    VIR_FREE(vhostfd);
8645
    VIR_FREE(tapfd);
8646 8647 8648
    return ret;
}

8649 8650

/* NOTE: Not using const virDomainDef here since eventually a call is made
8651
 *       into qemuSecuritySetTapFDLabel which calls it's driver
8652 8653 8654
 *       API domainSetSecurityTapFDLabel that doesn't use the const format.
 */
static int
8655
qemuBuildNetCommandLine(virQEMUDriverPtr driver,
8656
                        virDomainObjPtr vm,
8657
                        virLogManagerPtr logManager,
8658
                        virSecurityManagerPtr secManager,
8659
                        virCommandPtr cmd,
8660 8661 8662 8663 8664
                        virQEMUCapsPtr qemuCaps,
                        virNetDevVPortProfileOp vmop,
                        bool standalone,
                        size_t *nnicindexes,
                        int **nicindexes,
8665
                        unsigned int *bootHostdevNet)
8666 8667 8668
{
    size_t i;
    int last_good_net = -1;
8669
    virErrorPtr originalError = NULL;
8670
    virDomainDefPtr def = vm->def;
8671

J
Ján Tomko 已提交
8672
    if (def->nnets) {
8673
        unsigned int bootNet = 0;
8674

8675 8676 8677 8678 8679
        /* convert <boot dev='network'/> to bootindex since we didn't emit -boot n */
        for (i = 0; i < def->os.nBootDevs; i++) {
            if (def->os.bootDevs[i] == VIR_DOMAIN_BOOT_NET) {
                bootNet = i + 1;
                break;
8680 8681 8682 8683 8684 8685
            }
        }

        for (i = 0; i < def->nnets; i++) {
            virDomainNetDefPtr net = def->nets[i];

8686
            if (qemuBuildInterfaceCommandLine(driver, vm, logManager, secManager, cmd, net,
8687
                                              qemuCaps, bootNet, vmop,
8688
                                              standalone, nnicindexes,
8689
                                              nicindexes) < 0)
8690 8691 8692 8693 8694 8695 8696 8697 8698 8699 8700 8701 8702 8703 8704 8705 8706 8707 8708
                goto error;

            last_good_net = i;
            /* if this interface is a type='hostdev' interface and we
             * haven't yet added a "bootindex" parameter to an
             * emulated network device, save the bootindex - hostdev
             * interface commandlines will be built later on when we
             * cycle through all the hostdevs, and we'll use it then.
             */
            if (virDomainNetGetActualType(net) == VIR_DOMAIN_NET_TYPE_HOSTDEV &&
                *bootHostdevNet == 0) {
                *bootHostdevNet = bootNet;
            }
            bootNet = 0;
        }
    }
    return 0;

 error:
8709 8710 8711
    /* free up any resources in the network driver
     * but don't overwrite the original error */
    originalError = virSaveLastError();
8712 8713
    for (i = 0; last_good_net != -1 && i <= last_good_net; i++)
        virDomainConfNWFilterTeardown(def->nets[i]);
8714 8715
    virSetError(originalError);
    virFreeError(originalError);
8716 8717 8718 8719
    return -1;
}


8720 8721 8722 8723 8724 8725 8726 8727 8728 8729 8730 8731 8732 8733 8734 8735 8736 8737 8738 8739 8740 8741 8742 8743 8744 8745
static const char *
qemuBuildSmartcardFindCCIDController(const virDomainDef *def,
                                     const virDomainSmartcardDef *smartcard)
{
    size_t i;

    /* Should never happen. But doesn't hurt to check. */
    if (smartcard->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCID)
        return NULL;

    for (i = 0; i < def->ncontrollers; i++) {
        const virDomainControllerDef *tmp = def->controllers[i];

        if (tmp->type != VIR_DOMAIN_CONTROLLER_TYPE_CCID)
            continue;

        if (tmp->idx != smartcard->info.addr.ccid.controller)
            continue;

        return tmp->info.alias;
    }

    return NULL;
}


8746 8747
static int
qemuBuildSmartcardCommandLine(virLogManagerPtr logManager,
8748
                              virSecurityManagerPtr secManager,
8749
                              virCommandPtr cmd,
8750
                              virQEMUDriverConfigPtr cfg,
8751
                              const virDomainDef *def,
8752 8753
                              virQEMUCapsPtr qemuCaps,
                              bool chardevStdioLogd)
8754 8755 8756
{
    size_t i;
    virDomainSmartcardDefPtr smartcard;
8757
    VIR_AUTOFREE(char *) devstr = NULL;
8758
    VIR_AUTOCLEAN(virBuffer) opt = VIR_BUFFER_INITIALIZER;
8759
    const char *database;
8760
    const char *contAlias = NULL;
8761 8762
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
8763 8764
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
8765 8766 8767 8768 8769 8770 8771 8772 8773 8774 8775 8776 8777 8778 8779 8780 8781 8782 8783 8784

    if (!def->nsmartcards)
        return 0;

    smartcard = def->smartcards[0];

    /* -device usb-ccid was already emitted along with other
     * controllers.  For now, qemu handles only one smartcard.  */
    if (def->nsmartcards > 1 ||
        smartcard->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCID ||
        smartcard->info.addr.ccid.controller != 0 ||
        smartcard->info.addr.ccid.slot != 0) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("this QEMU binary lacks multiple smartcard "
                         "support"));
        return -1;
    }

    switch (smartcard->type) {
    case VIR_DOMAIN_SMARTCARD_TYPE_HOST:
8785
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CCID_EMULATED)) {
8786 8787 8788 8789 8790 8791 8792 8793 8794 8795
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this QEMU binary lacks smartcard host "
                             "mode support"));
            return -1;
        }

        virBufferAddLit(&opt, "ccid-card-emulated,backend=nss-emulated");
        break;

    case VIR_DOMAIN_SMARTCARD_TYPE_HOST_CERTIFICATES:
8796
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CCID_EMULATED)) {
8797 8798 8799 8800 8801 8802 8803 8804
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this QEMU binary lacks smartcard host "
                             "mode support"));
            return -1;
        }

        virBufferAddLit(&opt, "ccid-card-emulated,backend=certificates");
        for (i = 0; i < VIR_DOMAIN_SMARTCARD_NUM_CERTIFICATES; i++) {
8805 8806
            virBufferAsprintf(&opt, ",cert%zu=", i + 1);
            virQEMUBuildBufferEscapeComma(&opt, smartcard->data.cert.file[i]);
8807 8808 8809 8810 8811 8812
        }
        if (smartcard->data.cert.database) {
            database = smartcard->data.cert.database;
        } else {
            database = VIR_DOMAIN_SMARTCARD_DEFAULT_DATABASE;
        }
8813 8814
        virBufferAddLit(&opt, ",db=");
        virQEMUBuildBufferEscapeComma(&opt, database);
8815 8816 8817
        break;

    case VIR_DOMAIN_SMARTCARD_TYPE_PASSTHROUGH:
8818
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CCID_PASSTHRU)) {
8819 8820 8821 8822 8823 8824
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("this QEMU binary lacks smartcard "
                             "passthrough mode support"));
            return -1;
        }

8825 8826
        if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                              cmd, cfg, def,
8827
                                              smartcard->data.passthru,
8828
                                              smartcard->info.alias,
8829
                                              qemuCaps, cdevflags))) {
8830 8831
            return -1;
        }
8832
        virCommandAddArg(cmd, "-chardev");
8833 8834 8835 8836 8837 8838 8839 8840 8841 8842 8843 8844
        virCommandAddArg(cmd, devstr);

        virBufferAsprintf(&opt, "ccid-card-passthru,chardev=char%s",
                          smartcard->info.alias);
        break;

    default:
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("unexpected smartcard type %d"),
                       smartcard->type);
        return -1;
    }
8845 8846 8847 8848 8849 8850 8851 8852 8853

    if (!(contAlias = qemuBuildSmartcardFindCCIDController(def,
                                                           smartcard))) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Unable to find controller for %s"),
                       smartcard->info.alias);
        return -1;
    }

8854
    virCommandAddArg(cmd, "-device");
8855
    virBufferAsprintf(&opt, ",id=%s,bus=%s.0", smartcard->info.alias, contAlias);
8856 8857 8858 8859 8860 8861
    virCommandAddArgBuffer(cmd, &opt);

    return 0;
}


8862
static char *
8863 8864 8865
qemuBuildShmemDevLegacyStr(virDomainDefPtr def,
                           virDomainShmemDefPtr shmem,
                           virQEMUCapsPtr qemuCaps)
8866
{
8867
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
8868 8869 8870 8871 8872

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_IVSHMEM)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("ivshmem device is not supported "
                         "with this QEMU binary"));
8873
        return NULL;
8874 8875 8876
    }

    virBufferAddLit(&buf, "ivshmem");
8877 8878
    virBufferAsprintf(&buf, ",id=%s", shmem->info.alias);

8879
    if (shmem->size)
M
Martin Kletzander 已提交
8880
        virBufferAsprintf(&buf, ",size=%llum", shmem->size >> 20);
8881 8882

    if (!shmem->server.enabled) {
8883
        virBufferAsprintf(&buf, ",shm=%s", shmem->name);
8884
    } else {
8885
        virBufferAsprintf(&buf, ",chardev=char%s", shmem->info.alias);
8886 8887 8888 8889 8890 8891 8892 8893 8894 8895 8896
        if (shmem->msi.enabled) {
            virBufferAddLit(&buf, ",msi=on");
            if (shmem->msi.vectors)
                virBufferAsprintf(&buf, ",vectors=%u", shmem->msi.vectors);
            if (shmem->msi.ioeventfd)
                virBufferAsprintf(&buf, ",ioeventfd=%s",
                                  virTristateSwitchTypeToString(shmem->msi.ioeventfd));
        }
    }

    if (qemuBuildDeviceAddressStr(&buf, def, &shmem->info, qemuCaps) < 0)
8897
        return NULL;
8898 8899

    if (virBufferCheckError(&buf) < 0)
8900
        return NULL;
8901

8902 8903 8904
    return virBufferContentAndReset(&buf);
}

8905 8906 8907 8908 8909
char *
qemuBuildShmemDevStr(virDomainDefPtr def,
                     virDomainShmemDefPtr shmem,
                     virQEMUCapsPtr qemuCaps)
{
8910
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
8911 8912 8913 8914 8915 8916 8917 8918 8919 8920 8921 8922 8923 8924 8925 8926 8927 8928 8929 8930 8931 8932 8933 8934 8935 8936 8937

    if ((shmem->model == VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_PLAIN &&
         !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_IVSHMEM_PLAIN)) ||
        (shmem->model == VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_DOORBELL &&
         !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_IVSHMEM_DOORBELL))) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("shmem model '%s' is not supported "
                             "by this QEMU binary"),
                           virDomainShmemModelTypeToString(shmem->model));
        return NULL;
    }

    virBufferAdd(&buf, virDomainShmemModelTypeToString(shmem->model), -1);
    virBufferAsprintf(&buf, ",id=%s", shmem->info.alias);

    if (shmem->server.enabled)
        virBufferAsprintf(&buf, ",chardev=char%s", shmem->info.alias);
    else
        virBufferAsprintf(&buf, ",memdev=shmmem-%s", shmem->info.alias);

    if (shmem->msi.vectors)
        virBufferAsprintf(&buf, ",vectors=%u", shmem->msi.vectors);
    if (shmem->msi.ioeventfd) {
        virBufferAsprintf(&buf, ",ioeventfd=%s",
                          virTristateSwitchTypeToString(shmem->msi.ioeventfd));
    }

8938
    if (qemuBuildDeviceAddressStr(&buf, def, &shmem->info, qemuCaps) < 0)
8939 8940 8941 8942 8943 8944 8945 8946 8947 8948 8949 8950
        return NULL;

    if (virBufferCheckError(&buf) < 0)
        return NULL;

    return virBufferContentAndReset(&buf);
}


virJSONValuePtr
qemuBuildShmemBackendMemProps(virDomainShmemDefPtr shmem)
{
8951 8952
    VIR_AUTOFREE(char *) mem_alias = NULL;
    VIR_AUTOFREE(char *) mem_path = NULL;
8953 8954 8955 8956 8957
    virJSONValuePtr ret = NULL;

    if (virAsprintf(&mem_path, "/dev/shm/%s", shmem->name) < 0)
        return NULL;

8958
    if (virAsprintf(&mem_alias, "shmmem-%s", shmem->info.alias) < 0)
8959
        return NULL;
8960

8961 8962 8963 8964 8965
    qemuMonitorCreateObjectProps(&ret, "memory-backend-file", mem_alias,
                                 "s:mem-path", mem_path,
                                 "U:size", shmem->size,
                                 "b:share", true,
                                 NULL);
8966 8967 8968 8969 8970

    return ret;
}


8971
static int
8972
qemuBuildShmemCommandLine(virLogManagerPtr logManager,
8973
                          virSecurityManagerPtr secManager,
8974
                          virCommandPtr cmd,
8975
                          virQEMUDriverConfigPtr cfg,
8976 8977
                          virDomainDefPtr def,
                          virDomainShmemDefPtr shmem,
8978 8979
                          virQEMUCapsPtr qemuCaps,
                          bool chardevStdioLogd)
8980
{
8981
    VIR_AUTOPTR(virJSONValue) memProps = NULL;
8982
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
8983
    VIR_AUTOFREE(char *) devstr = NULL;
8984
    VIR_AUTOFREE(char *) chardev = NULL;
8985
    int rc;
8986 8987
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
8988 8989
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
8990

8991 8992 8993 8994 8995 8996 8997 8998 8999 9000 9001 9002 9003 9004 9005 9006 9007 9008 9009 9010 9011 9012 9013 9014 9015 9016
    if (shmem->size) {
        /*
         * Thanks to our parsing code, we have a guarantee that the
         * size is power of two and is at least a mebibyte in size.
         * But because it may change in the future, the checks are
         * doubled in here.
         */
        if (shmem->size & (shmem->size - 1)) {
            virReportError(VIR_ERR_XML_ERROR, "%s",
                           _("shmem size must be a power of two"));
            return -1;
        }
        if (shmem->size < 1024 * 1024) {
            virReportError(VIR_ERR_XML_ERROR, "%s",
                           _("shmem size must be at least 1 MiB (1024 KiB)"));
            return -1;
        }
    }

    if (shmem->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("only 'pci' addresses are supported for the "
                         "shared memory device"));
        return -1;
    }

9017 9018 9019 9020 9021
    switch ((virDomainShmemModel)shmem->model) {
    case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM:
        devstr = qemuBuildShmemDevLegacyStr(def, shmem, qemuCaps);
        break;

9022
    case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_PLAIN:
9023
        if (!(memProps = qemuBuildShmemBackendMemProps(shmem)))
9024 9025
            return -1;

9026 9027 9028 9029 9030 9031 9032
        rc = virQEMUBuildObjectCommandlineFromJSON(&buf, memProps);

        if (rc < 0)
            return -1;

        virCommandAddArg(cmd, "-object");
        virCommandAddArgBuffer(cmd, &buf);
9033

M
Marc Hartmayer 已提交
9034
        ATTRIBUTE_FALLTHROUGH;
9035
    case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_DOORBELL:
9036
        devstr = qemuBuildShmemDevStr(def, shmem, qemuCaps);
9037 9038
        break;

9039 9040 9041 9042 9043
    case VIR_DOMAIN_SHMEM_MODEL_LAST:
        break;
    }

    if (!devstr)
9044
        return -1;
9045

9046
    if (qemuCommandAddExtDevice(cmd, &shmem->info) < 0)
9047 9048
        return -1;

9049
    virCommandAddArgList(cmd, "-device", devstr, NULL);
9050 9051

    if (shmem->server.enabled) {
9052
        chardev = qemuBuildChrChardevStr(logManager, secManager,
9053
                                        cmd, cfg, def,
9054
                                        &shmem->server.chr,
9055 9056
                                        shmem->info.alias, qemuCaps,
                                        cdevflags);
9057
        if (!chardev)
9058 9059
            return -1;

9060
        virCommandAddArgList(cmd, "-chardev", chardev, NULL);
9061 9062 9063 9064 9065
    }

    return 0;
}

9066 9067 9068 9069 9070

static virQEMUCapsFlags
qemuChrSerialTargetModelToCaps(virDomainChrSerialTargetModel targetModel)
{
    switch (targetModel) {
9071 9072
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_ISA_SERIAL:
        return QEMU_CAPS_DEVICE_ISA_SERIAL;
9073 9074 9075 9076
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_USB_SERIAL:
        return QEMU_CAPS_DEVICE_USB_SERIAL;
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_PCI_SERIAL:
        return QEMU_CAPS_DEVICE_PCI_SERIAL;
9077 9078
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_SPAPR_VTY:
        return QEMU_CAPS_DEVICE_SPAPR_VTY;
9079 9080 9081 9082
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_SCLPCONSOLE:
        return QEMU_CAPS_DEVICE_SCLPCONSOLE;
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_SCLPLMCONSOLE:
        return QEMU_CAPS_DEVICE_SCLPLMCONSOLE;
9083
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_PL011:
9084
        return QEMU_CAPS_DEVICE_PL011;
9085
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_16550A:
9086 9087 9088 9089 9090 9091 9092 9093 9094
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_NONE:
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_LAST:
        break;
    }

    return 0;
}


9095 9096
static int
qemuBuildChrDeviceCommandLine(virCommandPtr cmd,
9097
                              const virDomainDef *def,
9098 9099 9100
                              virDomainChrDefPtr chr,
                              virQEMUCapsPtr qemuCaps)
{
9101
    VIR_AUTOFREE(char *) devstr = NULL;
9102 9103 9104 9105 9106 9107 9108 9109

    if (qemuBuildChrDeviceStr(&devstr, def, chr, qemuCaps) < 0)
        return -1;

    virCommandAddArgList(cmd, "-device", devstr, NULL);
    return 0;
}

9110

9111 9112 9113 9114
static bool
qemuChrIsPlatformDevice(const virDomainDef *def,
                        virDomainChrDefPtr chr)
{
S
Stefan Schallenberg 已提交
9115 9116 9117
    if (def->os.arch == VIR_ARCH_ARMV6L ||
        def->os.arch == VIR_ARCH_ARMV7L ||
        def->os.arch == VIR_ARCH_AARCH64) {
9118 9119

        /* pl011 (used on mach-virt) is a platform device */
9120
        if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL &&
9121 9122
            chr->targetType == VIR_DOMAIN_CHR_SERIAL_TARGET_TYPE_SYSTEM &&
            chr->targetModel == VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_PL011) {
9123
            return true;
9124
        }
9125 9126
    }

9127 9128 9129 9130 9131 9132 9133 9134 9135 9136
    if (ARCH_IS_RISCV(def->os.arch)) {

        /* 16550a (used by riscv/virt guests) is a platform device */
        if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL &&
            chr->targetType == VIR_DOMAIN_CHR_SERIAL_TARGET_TYPE_SYSTEM &&
            chr->targetModel == VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_16550A) {
            return true;
        }
    }

9137 9138 9139 9140 9141 9142 9143 9144
    /* If we got all the way here and we're still stuck with the default
     * target type for a serial device, it means we have no clue what kind of
     * device we're talking about and we must treat it as a platform device. */
    if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL &&
        chr->targetType == VIR_DOMAIN_CHR_SERIAL_TARGET_TYPE_NONE) {
        return true;
    }

9145 9146 9147 9148
    return false;
}


9149 9150
static int
qemuBuildSerialCommandLine(virLogManagerPtr logManager,
9151
                           virSecurityManagerPtr secManager,
9152
                           virCommandPtr cmd,
9153
                           virQEMUDriverConfigPtr cfg,
9154
                           const virDomainDef *def,
9155 9156
                           virQEMUCapsPtr qemuCaps,
                           bool chardevStdioLogd)
9157 9158 9159
{
    size_t i;
    bool havespice = false;
9160 9161
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
9162 9163
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
9164 9165 9166 9167 9168 9169 9170 9171 9172 9173

    if (def->nserials) {
        for (i = 0; i < def->ngraphics && !havespice; i++) {
            if (def->graphics[i]->type == VIR_DOMAIN_GRAPHICS_TYPE_SPICE)
                havespice = true;
        }
    }

    for (i = 0; i < def->nserials; i++) {
        virDomainChrDefPtr serial = def->serials[i];
9174
        VIR_AUTOFREE(char *) devstr = NULL;
9175

9176
        if (serial->source->type == VIR_DOMAIN_CHR_TYPE_SPICEPORT && !havespice)
9177 9178
            continue;

9179 9180
        if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                              cmd, cfg, def,
9181 9182
                                              serial->source,
                                              serial->info.alias,
9183
                                              qemuCaps, cdevflags)))
9184 9185 9186 9187
            return -1;
        virCommandAddArg(cmd, "-chardev");
        virCommandAddArg(cmd, devstr);

9188 9189
        /* If the device is not a platform device, build the devstr */
        if (!qemuChrIsPlatformDevice(def, serial)) {
9190 9191 9192
            if (qemuBuildChrDeviceCommandLine(cmd, def, serial, qemuCaps) < 0)
                return -1;
        } else {
9193 9194 9195 9196 9197 9198 9199 9200 9201 9202 9203
            virQEMUCapsFlags caps;

            caps = qemuChrSerialTargetModelToCaps(serial->targetModel);

            if (caps && !virQEMUCapsGet(qemuCaps, caps)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                               _("'%s' is not supported in this QEMU binary"),
                               virDomainChrSerialTargetModelTypeToString(serial->targetModel));
                return -1;
            }

9204
            virCommandAddArg(cmd, "-serial");
9205
            virCommandAddArgFormat(cmd, "chardev:char%s", serial->info.alias);
9206 9207 9208 9209 9210 9211 9212
        }
    }

    return 0;
}


9213 9214
static int
qemuBuildParallelsCommandLine(virLogManagerPtr logManager,
9215
                              virSecurityManagerPtr secManager,
9216
                              virCommandPtr cmd,
9217
                              virQEMUDriverConfigPtr cfg,
9218
                              const virDomainDef *def,
9219 9220
                              virQEMUCapsPtr qemuCaps,
                              bool chardevStdioLogd)
9221 9222
{
    size_t i;
9223 9224
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
9225 9226
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
9227 9228 9229

    for (i = 0; i < def->nparallels; i++) {
        virDomainChrDefPtr parallel = def->parallels[i];
9230
        VIR_AUTOFREE(char *) devstr = NULL;
9231

9232 9233
        if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                              cmd, cfg, def,
9234 9235
                                              parallel->source,
                                              parallel->info.alias,
9236
                                              qemuCaps, cdevflags)))
9237 9238 9239
            return -1;
        virCommandAddArg(cmd, "-chardev");
        virCommandAddArg(cmd, devstr);
9240

9241 9242 9243
        if (qemuBuildChrDeviceCommandLine(cmd, def, parallel,
                                          qemuCaps) < 0)
            return -1;
9244 9245 9246 9247 9248 9249
    }

    return 0;
}


9250 9251
static int
qemuBuildChannelsCommandLine(virLogManagerPtr logManager,
9252
                             virSecurityManagerPtr secManager,
9253
                             virCommandPtr cmd,
9254
                             virQEMUDriverConfigPtr cfg,
9255
                             const virDomainDef *def,
9256 9257
                             virQEMUCapsPtr qemuCaps,
                             bool chardevStdioLogd)
9258 9259
{
    size_t i;
9260 9261
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
9262 9263
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
9264 9265 9266 9267 9268 9269 9270

    for (i = 0; i < def->nchannels; i++) {
        virDomainChrDefPtr channel = def->channels[i];
        char *devstr;

        switch (channel->targetType) {
        case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_GUESTFWD:
9271 9272
            if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                                  cmd, cfg, def,
9273
                                                  channel->source,
9274
                                                  channel->info.alias,
9275
                                                  qemuCaps, cdevflags)))
9276
                return -1;
9277
            virCommandAddArg(cmd, "-chardev");
9278 9279 9280 9281 9282 9283 9284 9285 9286 9287
            virCommandAddArg(cmd, devstr);
            VIR_FREE(devstr);

            if (qemuBuildChrDeviceStr(&devstr, def, channel, qemuCaps) < 0)
                return -1;
            virCommandAddArgList(cmd, "-netdev", devstr, NULL);
            VIR_FREE(devstr);
            break;

        case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_VIRTIO:
9288 9289
            if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                                  cmd, cfg, def,
9290 9291
                                                  channel->source,
                                                  channel->info.alias,
9292
                                                  qemuCaps, cdevflags)))
9293 9294 9295 9296
                return -1;
            virCommandAddArg(cmd, "-chardev");
            virCommandAddArg(cmd, devstr);
            VIR_FREE(devstr);
9297 9298 9299 9300 9301 9302 9303 9304 9305 9306 9307

            if (qemuBuildChrDeviceCommandLine(cmd, def, channel, qemuCaps) < 0)
                return -1;
            break;
        }
    }

    return 0;
}


9308 9309
static int
qemuBuildConsoleCommandLine(virLogManagerPtr logManager,
9310
                            virSecurityManagerPtr secManager,
9311
                            virCommandPtr cmd,
9312
                            virQEMUDriverConfigPtr cfg,
9313
                            const virDomainDef *def,
9314 9315
                            virQEMUCapsPtr qemuCaps,
                            bool chardevStdioLogd)
9316 9317
{
    size_t i;
9318 9319
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
9320 9321
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
9322 9323 9324 9325 9326 9327 9328 9329

    /* Explicit console devices */
    for (i = 0; i < def->nconsoles; i++) {
        virDomainChrDefPtr console = def->consoles[i];
        char *devstr;

        switch (console->targetType) {
        case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SCLP:
9330
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_SCLPCONSOLE)) {
9331
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
9332
                               _("sclpconsole is not supported in this QEMU binary"));
9333 9334 9335
                return -1;
            }

9336 9337
            if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                                  cmd, cfg, def,
9338 9339
                                                  console->source,
                                                  console->info.alias,
9340
                                                  qemuCaps, cdevflags)))
9341 9342 9343 9344 9345 9346 9347 9348 9349 9350 9351 9352 9353 9354 9355 9356
                return -1;
            virCommandAddArg(cmd, "-chardev");
            virCommandAddArg(cmd, devstr);
            VIR_FREE(devstr);

            if (qemuBuildChrDeviceCommandLine(cmd, def, console, qemuCaps) < 0)
                return -1;
            break;

        case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SCLPLM:
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_SCLPLMCONSOLE)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("sclplmconsole is not supported in this QEMU binary"));
                return -1;
            }

9357 9358
            if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                                  cmd, cfg, def,
9359
                                                  console->source,
9360
                                                  console->info.alias,
9361
                                                  qemuCaps, cdevflags)))
9362
                return -1;
9363
            virCommandAddArg(cmd, "-chardev");
9364 9365 9366 9367 9368 9369 9370 9371
            virCommandAddArg(cmd, devstr);
            VIR_FREE(devstr);

            if (qemuBuildChrDeviceCommandLine(cmd, def, console, qemuCaps) < 0)
                return -1;
            break;

        case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_VIRTIO:
9372 9373
            if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                                  cmd, cfg, def,
9374
                                                  console->source,
9375
                                                  console->info.alias,
9376
                                                  qemuCaps, cdevflags)))
9377
                return -1;
9378
            virCommandAddArg(cmd, "-chardev");
9379 9380 9381 9382 9383 9384 9385 9386 9387 9388 9389 9390 9391 9392 9393 9394 9395 9396 9397 9398 9399 9400
            virCommandAddArg(cmd, devstr);
            VIR_FREE(devstr);

            if (qemuBuildChrDeviceCommandLine(cmd, def, console, qemuCaps) < 0)
                return -1;
            break;

        case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL:
            break;

        default:
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("unsupported console target type %s"),
                           NULLSTR(virDomainChrConsoleTargetTypeToString(console->targetType)));
            return -1;
        }
    }

    return 0;
}


9401 9402 9403 9404 9405 9406
char *
qemuBuildRedirdevDevStr(const virDomainDef *def,
                        virDomainRedirdevDefPtr dev,
                        virQEMUCapsPtr qemuCaps)
{
    size_t i;
9407
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
9408 9409 9410 9411 9412 9413
    virDomainRedirFilterDefPtr redirfilter = def->redirfilter;

    if (dev->bus != VIR_DOMAIN_REDIRDEV_BUS_USB) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("Redirection bus %s is not supported by QEMU"),
                       virDomainRedirdevBusTypeToString(dev->bus));
9414
        return NULL;
9415 9416 9417 9418 9419 9420
    }

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_USB_REDIR)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("USB redirection is not supported "
                         "by this version of QEMU"));
9421
        return NULL;
9422 9423 9424 9425 9426 9427 9428 9429 9430 9431
    }

    virBufferAsprintf(&buf, "usb-redir,chardev=char%s,id=%s",
                      dev->info.alias, dev->info.alias);

    if (redirfilter && redirfilter->nusbdevs) {
        if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_USB_REDIR_FILTER)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("USB redirection filter is not "
                             "supported by this version of QEMU"));
9432
            return NULL;
9433 9434 9435 9436 9437 9438 9439 9440 9441 9442 9443 9444 9445 9446 9447 9448 9449 9450 9451 9452 9453 9454 9455 9456 9457 9458 9459 9460 9461 9462 9463 9464
        }

        virBufferAddLit(&buf, ",filter=");

        for (i = 0; i < redirfilter->nusbdevs; i++) {
            virDomainRedirFilterUSBDevDefPtr usbdev = redirfilter->usbdevs[i];
            if (usbdev->usbClass >= 0)
                virBufferAsprintf(&buf, "0x%02X:", usbdev->usbClass);
            else
                virBufferAddLit(&buf, "-1:");

            if (usbdev->vendor >= 0)
                virBufferAsprintf(&buf, "0x%04X:", usbdev->vendor);
            else
                virBufferAddLit(&buf, "-1:");

            if (usbdev->product >= 0)
                virBufferAsprintf(&buf, "0x%04X:", usbdev->product);
            else
                virBufferAddLit(&buf, "-1:");

            if (usbdev->version >= 0)
                virBufferAsprintf(&buf, "0x%04X:", usbdev->version);
            else
                virBufferAddLit(&buf, "-1:");

            virBufferAsprintf(&buf, "%u", usbdev->allow);
            if (i < redirfilter->nusbdevs -1)
                virBufferAddLit(&buf, "|");
        }
    }

9465
    if (dev->info.bootIndex)
9466
        virBufferAsprintf(&buf, ",bootindex=%u", dev->info.bootIndex);
9467 9468

    if (qemuBuildDeviceAddressStr(&buf, def, &dev->info, qemuCaps) < 0)
9469
        return NULL;
9470 9471

    if (virBufferCheckError(&buf) < 0)
9472
        return NULL;
9473 9474 9475 9476 9477 9478 9479

    return virBufferContentAndReset(&buf);
}


static int
qemuBuildRedirdevCommandLine(virLogManagerPtr logManager,
9480
                             virSecurityManagerPtr secManager,
9481
                             virCommandPtr cmd,
9482
                             virQEMUDriverConfigPtr cfg,
9483
                             const virDomainDef *def,
9484 9485
                             virQEMUCapsPtr qemuCaps,
                             bool chardevStdioLogd)
9486 9487
{
    size_t i;
9488 9489
    unsigned int cdevflags = QEMU_BUILD_CHARDEV_TCP_NOWAIT |
        QEMU_BUILD_CHARDEV_UNIX_FD_PASS;
9490 9491
    if (chardevStdioLogd)
        cdevflags |= QEMU_BUILD_CHARDEV_FILE_LOGD;
9492 9493 9494 9495 9496

    for (i = 0; i < def->nredirdevs; i++) {
        virDomainRedirdevDefPtr redirdev = def->redirdevs[i];
        char *devstr;

9497 9498
        if (!(devstr = qemuBuildChrChardevStr(logManager, secManager,
                                              cmd, cfg, def,
9499
                                              redirdev->source,
9500
                                              redirdev->info.alias,
9501
                                              qemuCaps, cdevflags))) {
9502 9503 9504
            return -1;
        }

9505
        virCommandAddArg(cmd, "-chardev");
9506 9507 9508 9509 9510 9511 9512 9513 9514 9515 9516 9517 9518 9519
        virCommandAddArg(cmd, devstr);
        VIR_FREE(devstr);

        virCommandAddArg(cmd, "-device");
        if (!(devstr = qemuBuildRedirdevDevStr(def, redirdev, qemuCaps)))
            return -1;
        virCommandAddArg(cmd, devstr);
        VIR_FREE(devstr);
    }

    return 0;
}


9520
static void
9521
qemuBuildDomainLoaderCommandLine(virCommandPtr cmd,
9522
                                 virDomainDefPtr def)
9523 9524
{
    virDomainLoaderDefPtr loader = def->os.loader;
9525
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
9526 9527 9528
    int unit = 0;

    if (!loader)
9529
        return;
9530 9531 9532 9533 9534 9535 9536 9537 9538

    switch ((virDomainLoader) loader->type) {
    case VIR_DOMAIN_LOADER_TYPE_ROM:
        virCommandAddArg(cmd, "-bios");
        virCommandAddArg(cmd, loader->path);
        break;

    case VIR_DOMAIN_LOADER_TYPE_PFLASH:

M
Michal Privoznik 已提交
9539 9540 9541 9542 9543 9544 9545
        if (loader->secure == VIR_TRISTATE_BOOL_YES) {
            virCommandAddArgList(cmd,
                                 "-global",
                                 "driver=cfi.pflash01,property=secure,value=on",
                                 NULL);
        }

9546 9547 9548
        virBufferAddLit(&buf, "file=");
        virQEMUBuildBufferEscapeComma(&buf, loader->path);
        virBufferAsprintf(&buf, ",if=pflash,format=raw,unit=%d", unit);
9549 9550 9551 9552 9553 9554 9555 9556 9557 9558 9559 9560
        unit++;

        if (loader->readonly) {
            virBufferAsprintf(&buf, ",readonly=%s",
                              virTristateSwitchTypeToString(loader->readonly));
        }

        virCommandAddArg(cmd, "-drive");
        virCommandAddArgBuffer(cmd, &buf);

        if (loader->nvram) {
            virBufferFreeAndReset(&buf);
9561 9562 9563
            virBufferAddLit(&buf, "file=");
            virQEMUBuildBufferEscapeComma(&buf, loader->nvram);
            virBufferAsprintf(&buf, ",if=pflash,format=raw,unit=%d", unit);
9564 9565 9566 9567 9568 9569

            virCommandAddArg(cmd, "-drive");
            virCommandAddArgBuffer(cmd, &buf);
        }
        break;

9570
    case VIR_DOMAIN_LOADER_TYPE_NONE:
9571 9572 9573 9574 9575 9576
    case VIR_DOMAIN_LOADER_TYPE_LAST:
        /* nada */
        break;
    }
}

J
John Ferlan 已提交
9577

J
John Ferlan 已提交
9578 9579
static char *
qemuBuildTPMDevStr(const virDomainDef *def,
9580
                   virQEMUCapsPtr qemuCaps)
J
John Ferlan 已提交
9581
{
9582
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
J
John Ferlan 已提交
9583 9584
    const virDomainTPMDef *tpm = def->tpm;
    const char *model = virDomainTPMModelTypeToString(tpm->model);
9585
    virQEMUCapsFlags flag;
J
John Ferlan 已提交
9586

9587 9588 9589 9590 9591 9592 9593 9594 9595 9596
    switch (tpm->model) {
    case VIR_DOMAIN_TPM_MODEL_TIS:
        flag = QEMU_CAPS_DEVICE_TPM_TIS;
        break;
    case VIR_DOMAIN_TPM_MODEL_CRB:
        flag = QEMU_CAPS_DEVICE_TPM_CRB;
        break;
    case VIR_DOMAIN_TPM_MODEL_LAST:
    default:
        virReportEnumRangeError(virDomainTPMModel, tpm->model);
9597
        return NULL;
9598 9599 9600
    }

    if (!virQEMUCapsGet(qemuCaps, flag)) {
J
John Ferlan 已提交
9601 9602 9603
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("The QEMU executable %s does not support TPM "
                       "model %s"),
9604
                       def->emulator, model);
9605
        return NULL;
J
John Ferlan 已提交
9606 9607 9608 9609 9610 9611
    }

    virBufferAsprintf(&buf, "%s,tpmdev=tpm-%s,id=%s",
                      model, tpm->info.alias, tpm->info.alias);

    if (virBufferCheckError(&buf) < 0)
9612
        return NULL;
J
John Ferlan 已提交
9613 9614 9615 9616 9617

    return virBufferContentAndReset(&buf);
}


9618 9619 9620 9621 9622 9623 9624 9625 9626 9627 9628 9629 9630 9631 9632 9633 9634 9635 9636 9637 9638 9639 9640 9641 9642
/* this function is exported so that tests can mock the FDs */
int
qemuBuildTPMOpenBackendFDs(const char *tpmdev,
                           const char *cancel_path,
                           int *tpmfd,
                           int *cancelfd)
{
    if ((*tpmfd = open(tpmdev, O_RDWR)) < 0) {
        virReportSystemError(errno, _("Could not open TPM device %s"),
                             tpmdev);
        return -1;
    }

    if ((*cancelfd = open(cancel_path, O_WRONLY)) < 0) {
        virReportSystemError(errno,
                             _("Could not open TPM device's cancel "
                               "path %s"), cancel_path);
        VIR_FORCE_CLOSE(*tpmfd);
        return -1;
    }

    return 0;
}


J
John Ferlan 已提交
9643 9644 9645 9646
static char *
qemuBuildTPMBackendStr(const virDomainDef *def,
                       virCommandPtr cmd,
                       int *tpmfd,
9647 9648
                       int *cancelfd,
                       char **chardev)
J
John Ferlan 已提交
9649 9650
{
    const virDomainTPMDef *tpm = def->tpm;
9651
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
9652 9653 9654
    VIR_AUTOFREE(char *) cancel_path = NULL;
    VIR_AUTOFREE(char *) devset = NULL;
    VIR_AUTOFREE(char *) cancelset = NULL;
J
John Ferlan 已提交
9655 9656 9657 9658 9659
    const char *tpmdev;

    *tpmfd = -1;
    *cancelfd = -1;

9660 9661
    virBufferAsprintf(&buf, "%s", virDomainTPMBackendTypeToString(tpm->type));
    virBufferAsprintf(&buf, ",id=tpm-%s", tpm->info.alias);
J
John Ferlan 已提交
9662 9663 9664 9665 9666

    switch (tpm->type) {
    case VIR_DOMAIN_TPM_TYPE_PASSTHROUGH:
        tpmdev = tpm->data.passthrough.source.data.file.path;
        if (!(cancel_path = virTPMCreateCancelPath(tpmdev)))
9667
            return NULL;
J
John Ferlan 已提交
9668

9669
        if (qemuBuildTPMOpenBackendFDs(tpmdev, cancel_path, tpmfd, cancelfd) < 0)
9670
            return NULL;
J
John Ferlan 已提交
9671

9672 9673 9674 9675 9676
        virCommandPassFD(cmd, *tpmfd, VIR_COMMAND_PASS_FD_CLOSE_PARENT);
        virCommandPassFD(cmd, *cancelfd, VIR_COMMAND_PASS_FD_CLOSE_PARENT);

        if (!(devset = qemuVirCommandGetDevSet(cmd, *tpmfd)) ||
            !(cancelset = qemuVirCommandGetDevSet(cmd, *cancelfd)))
9677
            return NULL;
J
John Ferlan 已提交
9678 9679

        virBufferAddLit(&buf, ",path=");
9680
        virQEMUBuildBufferEscapeComma(&buf, devset);
J
John Ferlan 已提交
9681 9682

        virBufferAddLit(&buf, ",cancel-path=");
9683
        virQEMUBuildBufferEscapeComma(&buf, cancelset);
J
John Ferlan 已提交
9684 9685

        break;
9686
    case VIR_DOMAIN_TPM_TYPE_EMULATOR:
9687 9688 9689 9690
        virBufferAddLit(&buf, ",chardev=chrtpm");

        if (virAsprintf(chardev, "socket,id=chrtpm,path=%s",
                        tpm->data.emulator.source.data.nix.path) < 0)
9691
            return NULL;
9692 9693

        break;
J
John Ferlan 已提交
9694
    case VIR_DOMAIN_TPM_TYPE_LAST:
9695
        return NULL;
J
John Ferlan 已提交
9696 9697 9698
    }

    if (virBufferCheckError(&buf) < 0)
9699
        return NULL;
J
John Ferlan 已提交
9700 9701 9702 9703 9704

    return virBufferContentAndReset(&buf);
}


9705
static int
9706 9707 9708
qemuBuildTPMCommandLine(virCommandPtr cmd,
                        const virDomainDef *def,
                        virQEMUCapsPtr qemuCaps)
9709 9710
{
    char *optstr;
9711
    VIR_AUTOFREE(char *) chardev = NULL;
9712 9713 9714
    int tpmfd = -1;
    int cancelfd = -1;
    char *fdset;
9715

9716 9717 9718
    if (!def->tpm)
        return 0;

9719
    if (!(optstr = qemuBuildTPMBackendStr(def, cmd,
9720 9721
                                          &tpmfd, &cancelfd,
                                          &chardev)))
9722 9723 9724 9725 9726
        return -1;

    virCommandAddArgList(cmd, "-tpmdev", optstr, NULL);
    VIR_FREE(optstr);

9727
    if (chardev)
9728 9729
        virCommandAddArgList(cmd, "-chardev", chardev, NULL);

9730 9731 9732 9733 9734 9735 9736 9737 9738 9739 9740 9741 9742 9743 9744 9745 9746 9747
    if (tpmfd >= 0) {
        fdset = qemuVirCommandGetFDSet(cmd, tpmfd);
        if (!fdset)
            return -1;

        virCommandAddArgList(cmd, "-add-fd", fdset, NULL);
        VIR_FREE(fdset);
    }

    if (cancelfd >= 0) {
        fdset = qemuVirCommandGetFDSet(cmd, cancelfd);
        if (!fdset)
            return -1;

        virCommandAddArgList(cmd, "-add-fd", fdset, NULL);
        VIR_FREE(fdset);
    }

9748
    if (!(optstr = qemuBuildTPMDevStr(def, qemuCaps)))
9749 9750 9751 9752 9753 9754 9755 9756
        return -1;

    virCommandAddArgList(cmd, "-device", optstr, NULL);
    VIR_FREE(optstr);

    return 0;
}

9757
static int
J
Ján Tomko 已提交
9758
qemuBuildSEVCommandLine(virDomainObjPtr vm, virCommandPtr cmd,
9759
                        virDomainSEVDefPtr sev)
9760
{
9761
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
9762 9763 9764 9765 9766 9767 9768 9769 9770
    qemuDomainObjPrivatePtr priv = vm->privateData;
    char *path = NULL;

    if (!sev)
        return 0;

    VIR_DEBUG("policy=0x%x cbitpos=%d reduced_phys_bits=%d",
              sev->policy, sev->cbitpos, sev->reduced_phys_bits);

9771 9772 9773
    virBufferAsprintf(&buf, "sev-guest,id=sev0,cbitpos=%d", sev->cbitpos);
    virBufferAsprintf(&buf, ",reduced-phys-bits=%d", sev->reduced_phys_bits);
    virBufferAsprintf(&buf, ",policy=0x%x", sev->policy);
9774 9775 9776

    if (sev->dh_cert) {
        if (virAsprintf(&path, "%s/dh_cert.base64", priv->libDir) < 0)
9777
            return -1;
9778
        virBufferAsprintf(&buf, ",dh-cert-file=%s", path);
9779 9780 9781 9782 9783
        VIR_FREE(path);
    }

    if (sev->session) {
        if (virAsprintf(&path, "%s/session.base64", priv->libDir) < 0)
9784
            return -1;
9785
        virBufferAsprintf(&buf, ",session-file=%s", path);
9786 9787 9788
        VIR_FREE(path);
    }

9789 9790
    virCommandAddArg(cmd, "-object");
    virCommandAddArgBuffer(cmd, &buf);
9791
    return 0;
9792
}
9793

M
Marc-André Lureau 已提交
9794 9795 9796 9797 9798 9799 9800 9801 9802 9803 9804 9805 9806 9807 9808 9809 9810 9811 9812 9813 9814 9815
static int
qemuBuildVMCoreInfoCommandLine(virCommandPtr cmd,
                               const virDomainDef *def,
                               virQEMUCapsPtr qemuCaps)
{
    virTristateSwitch vmci = def->features[VIR_DOMAIN_FEATURE_VMCOREINFO];

    if (vmci != VIR_TRISTATE_SWITCH_ON)
        return 0;

    if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VMCOREINFO)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("vmcoreinfo is not available "
                         "with this QEMU binary"));
        return -1;
    }

    virCommandAddArgList(cmd, "-device", "vmcoreinfo", NULL);
    return 0;
}


9816 9817 9818 9819 9820 9821 9822 9823 9824
static int
qemuBuildPanicCommandLine(virCommandPtr cmd,
                          const virDomainDef *def,
                          virQEMUCapsPtr qemuCaps)
{
    size_t i;

    for (i = 0; i < def->npanics; i++) {
        switch ((virDomainPanicModel) def->panics[i]->model) {
9825 9826 9827 9828 9829 9830 9831 9832 9833 9834 9835 9836 9837 9838 9839 9840 9841 9842 9843
        case VIR_DOMAIN_PANIC_MODEL_S390:
            /* For s390 guests, the hardware provides the same
             * functionality as the pvpanic device. The address
             * cannot be configured by the user */
            if (!ARCH_IS_S390(def->os.arch)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("only S390 guests support "
                                 "panic device of model 's390'"));
                return -1;
            }
            if (def->panics[i]->info.type !=
                VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("setting the panic device address is not "
                                 "supported for model 's390'"));
                return -1;
            }
            break;

9844 9845 9846 9847 9848 9849 9850 9851 9852 9853 9854 9855 9856 9857 9858 9859 9860 9861 9862 9863 9864 9865 9866
        case VIR_DOMAIN_PANIC_MODEL_HYPERV:
            /* Panic with model 'hyperv' is not a device, it should
             * be configured in cpu commandline. The address
             * cannot be configured by the user */
            if (!ARCH_IS_X86(def->os.arch)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("only i686 and x86_64 guests support "
                                 "panic device of model 'hyperv'"));
                return -1;
            }
            if (def->panics[i]->info.type !=
                VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("setting the panic device address is not "
                                 "supported for model 'hyperv'"));
                return -1;
            }
            break;

        case VIR_DOMAIN_PANIC_MODEL_PSERIES:
            /* For pSeries guests, the firmware provides the same
             * functionality as the pvpanic device. The address
             * cannot be configured by the user */
9867
            if (!qemuDomainIsPSeries(def)) {
9868 9869 9870 9871 9872 9873 9874 9875 9876 9877 9878 9879 9880 9881 9882 9883 9884 9885
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("only pSeries guests support panic device "
                                 "of model 'pseries'"));
                return -1;
            }
            if (def->panics[i]->info.type !=
                VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("setting the panic device address is not "
                                 "supported for model 'pseries'"));
                return -1;
            }
            break;

        case VIR_DOMAIN_PANIC_MODEL_ISA:
            if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_PANIC)) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("the QEMU binary does not support the "
9886
                                 "ISA panic device"));
9887 9888 9889 9890 9891 9892 9893 9894 9895 9896 9897 9898 9899 9900 9901 9902 9903 9904 9905 9906 9907 9908 9909 9910 9911 9912 9913 9914 9915 9916 9917 9918
                return -1;
            }

            switch (def->panics[i]->info.type) {
            case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_ISA:
                virCommandAddArg(cmd, "-device");
                virCommandAddArgFormat(cmd, "pvpanic,ioport=%d",
                                       def->panics[i]->info.addr.isa.iobase);
                break;

            case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE:
                virCommandAddArgList(cmd, "-device", "pvpanic", NULL);
                break;

            default:
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("panic is supported only "
                                 "with ISA address type"));
                return -1;
            }

        /* default model value was changed before in post parse */
        case VIR_DOMAIN_PANIC_MODEL_DEFAULT:
        case VIR_DOMAIN_PANIC_MODEL_LAST:
            break;
        }
    }

    return 0;
}


9919 9920 9921 9922 9923 9924 9925 9926 9927 9928 9929 9930 9931 9932 9933
static virJSONValuePtr
qemuBuildPRManagerInfoPropsInternal(const char *alias,
                                    const char *path)
{
    virJSONValuePtr ret = NULL;

    if (qemuMonitorCreateObjectProps(&ret,
                                     "pr-manager-helper", alias,
                                     "s:path", path, NULL) < 0)
        return NULL;

    return ret;
}


9934
/**
9935
 * qemuBuildPRManagedManagerInfoProps:
9936
 *
9937 9938
 * Build the JSON properties for the pr-manager object corresponding to the PR
 * daemon managed by libvirt.
9939
 */
9940
virJSONValuePtr
9941
qemuBuildPRManagedManagerInfoProps(qemuDomainObjPrivatePtr priv)
9942
{
9943
    VIR_AUTOFREE(char *) path = NULL;
9944

9945
    if (!(path = qemuDomainGetManagedPRSocketPath(priv)))
9946 9947
        return NULL;

9948 9949
    return qemuBuildPRManagerInfoPropsInternal(qemuDomainGetManagedPRAlias(),
                                               path);
9950 9951 9952
}


9953 9954 9955 9956 9957 9958 9959 9960 9961 9962 9963 9964 9965
/**
 * qemuBuildPRManagerInfoProps:
 * @src: storage source
 *
 * Build the JSON properties for the pr-manager object.
 */
virJSONValuePtr
qemuBuildPRManagerInfoProps(virStorageSourcePtr src)
{
    return qemuBuildPRManagerInfoPropsInternal(src->pr->mgralias, src->pr->path);
}


9966
static int
9967 9968 9969
qemuBuildManagedPRCommandLine(virCommandPtr cmd,
                              const virDomainDef *def,
                              qemuDomainObjPrivatePtr priv)
9970
{
9971
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
9972
    VIR_AUTOPTR(virJSONValue) props = NULL;
9973

9974 9975
    if (!virDomainDefHasManagedPR(def))
        return 0;
9976

9977 9978
    if (!(props = qemuBuildPRManagedManagerInfoProps(priv)))
        return -1;
9979

9980
    if (virQEMUBuildObjectCommandlineFromJSON(&buf, props) < 0)
9981
        return -1;
9982

9983 9984
    virCommandAddArg(cmd, "-object");
    virCommandAddArgBuffer(cmd, &buf);
9985

9986
    return 0;
9987 9988 9989
}


M
Marc-André Lureau 已提交
9990 9991 9992 9993 9994 9995 9996 9997 9998 9999 10000 10001 10002 10003 10004 10005 10006 10007 10008 10009 10010 10011 10012 10013 10014 10015 10016 10017 10018 10019 10020 10021 10022 10023 10024 10025 10026 10027 10028 10029 10030 10031 10032 10033 10034 10035 10036 10037 10038 10039 10040 10041 10042 10043 10044 10045 10046 10047 10048 10049 10050 10051 10052 10053 10054 10055 10056 10057 10058 10059 10060 10061 10062 10063 10064 10065 10066 10067 10068
static virJSONValuePtr
qemuBuildDBusVMStateInfoPropsInternal(const char *alias,
                                      const char *addr)
{
    virJSONValuePtr ret = NULL;

    if (qemuMonitorCreateObjectProps(&ret,
                                     "dbus-vmstate", alias,
                                     "s:addr", addr, NULL) < 0)
        return NULL;

    return ret;
}


virJSONValuePtr
qemuBuildDBusVMStateInfoProps(const char *id,
                              const char *addr)
{
    VIR_AUTOFREE(char *) alias = qemuAliasDBusVMStateFromId(id);

    if (!alias)
        return NULL;

    return qemuBuildDBusVMStateInfoPropsInternal(alias, addr);
}


typedef struct qemuBuildDBusVMStateCommandLineData {
    virCommandPtr cmd;
} qemuBuildDBusVMStateCommandLineData;


static int
qemuBuildDBusVMStateCommandLineEach(void *payload,
                                    const void *id,
                                    void *user_data)
{
    qemuBuildDBusVMStateCommandLineData *data = user_data;
    qemuDBusVMStatePtr vms = payload;
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
    VIR_AUTOPTR(virJSONValue) props = NULL;

    if (!(props = qemuBuildDBusVMStateInfoProps(id, vms->addr)))
        return -1;

    if (virQEMUBuildObjectCommandlineFromJSON(&buf, props) < 0)
        return -1;

    virCommandAddArg(data->cmd, "-object");
    virCommandAddArgBuffer(data->cmd, &buf);

    return 0;
}

static int
qemuBuildDBusVMStateCommandLine(virCommandPtr cmd,
                                qemuDomainObjPrivatePtr priv)
{
    qemuBuildDBusVMStateCommandLineData data = {
        .cmd = cmd,
    };

    if (virHashSize(priv->dbusVMStates) == 0)
        return 0;

    if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_DBUS_VMSTATE)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("dbus-vmstate object is not supported by this QEMU binary"));
        return 0;
    }

    if (virHashForEach(priv->dbusVMStates, qemuBuildDBusVMStateCommandLineEach, &data) < 0)
        return -1;

    return 0;
}


10069 10070 10071 10072 10073 10074 10075 10076 10077 10078 10079 10080 10081 10082 10083 10084 10085
/**
 * qemuBuildCommandLineValidate:
 *
 * Prior to taking the plunge and building a long command line only
 * to find some configuration option isn't valid, let's do a couple
 * of checks and fail early.
 *
 * Returns 0 on success, returns -1 and messages what the issue is.
 */
static int
qemuBuildCommandLineValidate(virQEMUDriverPtr driver,
                             const virDomainDef *def)
{
    size_t i;
    int sdl = 0;
    int vnc = 0;
    int spice = 0;
10086
    int egl_headless = 0;
10087 10088 10089 10090 10091 10092 10093 10094 10095 10096 10097 10098 10099 10100 10101 10102 10103 10104 10105 10106

    if (!virQEMUDriverIsPrivileged(driver)) {
        /* If we have no cgroups then we can have no tunings that
         * require them */

        if (virMemoryLimitIsSet(def->mem.hard_limit) ||
            virMemoryLimitIsSet(def->mem.soft_limit) ||
            virMemoryLimitIsSet(def->mem.swap_hard_limit)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Memory tuning is not available in session mode"));
            return -1;
        }

        if (def->blkio.weight) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("Block I/O tuning is not available in session mode"));
            return -1;
        }

        if (def->cputune.sharesSpecified || def->cputune.period ||
10107 10108
            def->cputune.quota || def->cputune.global_period ||
            def->cputune.global_quota || def->cputune.emulator_period ||
10109 10110
            def->cputune.emulator_quota || def->cputune.iothread_period ||
            def->cputune.iothread_quota) {
10111 10112 10113 10114 10115 10116 10117 10118 10119 10120 10121 10122 10123 10124 10125 10126 10127
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("CPU tuning is not available in session mode"));
            return -1;
        }
    }

    for (i = 0; i < def->ngraphics; ++i) {
        switch (def->graphics[i]->type) {
        case VIR_DOMAIN_GRAPHICS_TYPE_SDL:
            ++sdl;
            break;
        case VIR_DOMAIN_GRAPHICS_TYPE_VNC:
            ++vnc;
            break;
        case VIR_DOMAIN_GRAPHICS_TYPE_SPICE:
            ++spice;
            break;
10128 10129 10130
        case VIR_DOMAIN_GRAPHICS_TYPE_EGL_HEADLESS:
            ++egl_headless;
            break;
10131 10132 10133 10134
        case VIR_DOMAIN_GRAPHICS_TYPE_RDP:
        case VIR_DOMAIN_GRAPHICS_TYPE_DESKTOP:
        case VIR_DOMAIN_GRAPHICS_TYPE_LAST:
            break;
10135 10136 10137
        }
    }

10138
    if (sdl > 1 || vnc > 1 || spice > 1 || egl_headless > 1) {
10139 10140
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("only 1 graphics device of each type "
10141
                         "(sdl, vnc, spice, headless) is supported"));
10142 10143 10144 10145 10146 10147 10148 10149 10150 10151 10152 10153 10154 10155 10156 10157
        return -1;
    }

    if (def->virtType == VIR_DOMAIN_VIRT_XEN ||
        def->os.type == VIR_DOMAIN_OSTYPE_XEN ||
        def->os.type == VIR_DOMAIN_OSTYPE_LINUX) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("qemu emulator '%s' does not support xen"),
                       def->emulator);
        return -1;
    }

    return 0;
}


10158 10159 10160 10161 10162
static int
qemuBuildSeccompSandboxCommandLine(virCommandPtr cmd,
                                   virQEMUDriverConfigPtr cfg,
                                   virQEMUCapsPtr qemuCaps ATTRIBUTE_UNUSED)
{
10163
    if (cfg->seccompSandbox == 0) {
10164 10165
        if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_SECCOMP_SANDBOX))
            virCommandAddArgList(cmd, "-sandbox", "off", NULL);
10166 10167 10168
        return 0;
    }

10169 10170 10171 10172 10173 10174 10175 10176 10177 10178
    /* Use blacklist by default if supported */
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_SECCOMP_BLACKLIST)) {
        virCommandAddArgList(cmd, "-sandbox",
                             "on,obsolete=deny,elevateprivileges=deny,"
                             "spawn=deny,resourcecontrol=deny",
                             NULL);
        return 0;
    }

    /* Seccomp whitelist is opt-in */
10179
    if (cfg->seccompSandbox > 0)
10180 10181 10182 10183 10184 10185 10186
        virCommandAddArgList(cmd, "-sandbox", "on", NULL);

    return 0;

}


J
Ján Tomko 已提交
10187
char *
10188 10189
qemuBuildVsockDevStr(virDomainDefPtr def,
                     virDomainVsockDefPtr vsock,
J
Ján Tomko 已提交
10190 10191
                     virQEMUCapsPtr qemuCaps,
                     const char *fdprefix)
10192 10193
{
    qemuDomainVsockPrivatePtr priv = (qemuDomainVsockPrivatePtr)vsock->privateData;
10194
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
10195

10196
    if (qemuBuildVirtioDevStr(&buf, "vhost-vsock", qemuCaps,
10197
                              VIR_DOMAIN_DEVICE_VSOCK, vsock) < 0) {
10198
        return NULL;
10199
    }
10200

10201 10202
    virBufferAsprintf(&buf, ",id=%s", vsock->info.alias);
    virBufferAsprintf(&buf, ",guest-cid=%u", vsock->guest_cid);
J
Ján Tomko 已提交
10203
    virBufferAsprintf(&buf, ",vhostfd=%s%u", fdprefix, priv->vhostfd);
10204
    if (qemuBuildDeviceAddressStr(&buf, def, &vsock->info, qemuCaps) < 0)
10205
        return NULL;
10206 10207

    if (virBufferCheckError(&buf) < 0)
10208
        return NULL;
10209

10210
    return virBufferContentAndReset(&buf);
10211 10212 10213 10214 10215 10216 10217 10218 10219 10220
}


static int
qemuBuildVsockCommandLine(virCommandPtr cmd,
                          virDomainDefPtr def,
                          virDomainVsockDefPtr vsock,
                          virQEMUCapsPtr qemuCaps)
{
    qemuDomainVsockPrivatePtr priv = (qemuDomainVsockPrivatePtr)vsock->privateData;
10221
    VIR_AUTOFREE(char *) devstr = NULL;
10222

J
Ján Tomko 已提交
10223
    if (!(devstr = qemuBuildVsockDevStr(def, vsock, qemuCaps, "")))
10224
        return -1;
10225 10226 10227

    virCommandPassFD(cmd, priv->vhostfd, VIR_COMMAND_PASS_FD_CLOSE_PARENT);
    priv->vhostfd = -1;
10228 10229

    if (qemuCommandAddExtDevice(cmd, &vsock->info) < 0)
10230
        return -1;
10231

10232 10233
    virCommandAddArgList(cmd, "-device", devstr, NULL);

10234
    return 0;
10235 10236 10237
}


10238 10239 10240 10241 10242
/*
 * Constructs a argv suitable for launching qemu with config defined
 * for a given virtual machine.
 */
virCommandPtr
10243
qemuBuildCommandLine(virQEMUDriverPtr driver,
10244
                     virLogManagerPtr logManager,
10245
                     virSecurityManagerPtr secManager,
10246
                     virDomainObjPtr vm,
10247
                     const char *migrateURI,
10248
                     virDomainMomentObjPtr snapshot,
10249
                     virNetDevVPortProfileOp vmop,
10250
                     bool standalone,
10251
                     bool enableFips,
10252
                     size_t *nnicindexes,
10253
                     int **nicindexes)
10254
{
10255
    size_t i;
10256
    char uuid[VIR_UUID_STRING_BUFLEN];
10257
    VIR_AUTOPTR(virCommand) cmd = NULL;
J
Ján Tomko 已提交
10258
    VIR_AUTOUNREF(virQEMUDriverConfigPtr) cfg = virQEMUDriverGetConfig(driver);
10259
    unsigned int bootHostdevNet = 0;
10260 10261 10262 10263
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainDefPtr def = vm->def;
    virQEMUCapsPtr qemuCaps = priv->qemuCaps;
    bool chardevStdioLogd = priv->chardevStdioLogd;
10264

J
Ján Tomko 已提交
10265
    VIR_DEBUG("driver=%p def=%p mon=%p "
10266
              "qemuCaps=%p migrateURI=%s snapshot=%p vmop=%d",
J
Ján Tomko 已提交
10267
              driver, def, priv->monConfig,
10268
              qemuCaps, migrateURI, snapshot, vmop);
10269

10270
    if (qemuBuildCommandLineValidate(driver, def) < 0)
10271
        return NULL;
10272

J
John Ferlan 已提交
10273
    cmd = virCommandNew(def->emulator);
10274

10275
    virCommandAddEnvPassCommon(cmd);
10276

10277 10278 10279 10280 10281 10282 10283 10284 10285 10286 10287 10288 10289
    /* For system QEMU we want to set both HOME and all the XDG variables to
     * libDir/qemu otherwise apps QEMU links to might try to access the default
     * home dir '/' which would always result in a permission issue.
     *
     * For session QEMU, we only want to set XDG_CACHE_HOME as cache data
     * may be purged at any time and that should not affect any app. We
     * do want VMs to integrate with services in user's session so we're
     * not re-setting any other env variables
     */
    if (!driver->privileged) {
        virCommandAddEnvFormat(cmd, "XDG_CACHE_HOME=%s/%s",
                               priv->libDir, ".cache");
    } else {
10290
        virCommandAddEnvPair(cmd, "HOME", priv->libDir);
10291 10292 10293
        virCommandAddEnvXDG(cmd, priv->libDir);
    }

M
Marc-André Lureau 已提交
10294
    if (qemuBuildNameCommandLine(cmd, cfg, def, qemuCaps) < 0)
10295
        return NULL;
C
Cole Robinson 已提交
10296 10297 10298 10299

    if (!standalone)
        virCommandAddArg(cmd, "-S"); /* freeze CPU */

10300
    if (qemuBuildMasterKeyCommandLine(cmd, priv) < 0)
10301
        return NULL;
10302

M
Marc-André Lureau 已提交
10303 10304 10305
    if (qemuBuildDBusVMStateCommandLine(cmd, priv) < 0)
        return NULL;

10306
    if (qemuBuildManagedPRCommandLine(cmd, def, priv) < 0)
10307
        return NULL;
10308

10309
    if (enableFips)
10310
        virCommandAddArg(cmd, "-enable-fips");
10311

10312
    if (qemuBuildMachineCommandLine(cmd, cfg, def, qemuCaps) < 0)
10313
        return NULL;
10314

10315 10316
    qemuBuildTSEGCommandLine(cmd, def);

10317
    if (qemuBuildCpuCommandLine(cmd, driver, def, qemuCaps) < 0)
10318
        return NULL;
10319

10320
    qemuBuildDomainLoaderCommandLine(cmd, def);
10321

10322
    if (!migrateURI && !snapshot && qemuDomainAlignMemorySizes(def) < 0)
10323
        return NULL;
10324

10325
    if (qemuBuildMemCommandLine(cmd, cfg, def, qemuCaps, priv) < 0)
10326
        return NULL;
10327

10328
    if (qemuBuildSmpCommandLine(cmd, def) < 0)
10329
        return NULL;
10330

10331
    if (qemuBuildIOThreadCommandLine(cmd, def) < 0)
10332
        return NULL;
J
John Ferlan 已提交
10333

10334
    if (virDomainNumaGetNodeCount(def->numa) &&
10335
        qemuBuildNumaArgStr(cfg, def, cmd, priv) < 0)
10336
        return NULL;
10337

10338
    if (qemuBuildMemoryDeviceCommandLine(cmd, cfg, def, priv) < 0)
10339
        return NULL;
10340

10341
    virUUIDFormat(def->uuid, uuid);
10342
    virCommandAddArgList(cmd, "-uuid", uuid, NULL);
10343

10344
    if (qemuBuildSmbiosCommandLine(cmd, driver, def) < 0)
10345
        return NULL;
10346 10347

    if (qemuBuildVMGenIDCommandLine(cmd, def, qemuCaps) < 0)
10348
        return NULL;
10349

10350 10351 10352 10353 10354 10355 10356
    /*
     * NB, -nographic *MUST* come before any serial, or monitor
     * or parallel port flags due to QEMU craziness, where it
     * decides to change the serial port & monitor to be on stdout
     * if you ask for nographic. So we have to make sure we override
     * these defaults ourselves...
     */
10357
    if (!def->ngraphics) {
J
Ján Tomko 已提交
10358 10359
        virCommandAddArg(cmd, "-display");
        virCommandAddArg(cmd, "none");
10360

10361
        if (cfg->nogfxAllowHostAudio)
10362
            virCommandAddEnvPass(cmd, "QEMU_AUDIO_DRV");
10363 10364 10365 10366
        else
            virCommandAddEnvString(cmd, "QEMU_AUDIO_DRV=none");
    }

J
Ján Tomko 已提交
10367
    /* Disable global config files and default devices */
10368
    virCommandAddArg(cmd, "-no-user-config");
J
Ján Tomko 已提交
10369
    virCommandAddArg(cmd, "-nodefaults");
10370

10371
    if (qemuBuildSgaCommandLine(cmd, def, qemuCaps) < 0)
10372
        return NULL;
10373

10374
    if (qemuBuildMonitorCommandLine(logManager, secManager, cmd, cfg, def, priv) < 0)
10375
        return NULL;
10376

10377
    if (qemuBuildClockCommandLine(cmd, def, qemuCaps) < 0)
10378
        return NULL;
10379

10380
    if (qemuBuildPMCommandLine(cmd, def, priv) < 0)
10381
        return NULL;
10382

10383
    if (qemuBuildBootCommandLine(cmd, def, qemuCaps) < 0)
10384
        return NULL;
J
Ján Tomko 已提交
10385

10386
    if (qemuBuildIOMMUCommandLine(cmd, def, qemuCaps) < 0)
10387
        return NULL;
10388

10389
    if (qemuBuildGlobalControllerCommandLine(cmd, def, qemuCaps) < 0)
10390
        return NULL;
10391

10392
    if (qemuBuildControllersCommandLine(cmd, def, qemuCaps) < 0)
10393
        return NULL;
10394

10395
    if (qemuBuildHubCommandLine(cmd, def, qemuCaps) < 0)
10396
        return NULL;
10397

10398 10399
    if (qemuBuildControllersByTypeCommandLine(cmd, def, qemuCaps,
                                              VIR_DOMAIN_CONTROLLER_TYPE_CCID) < 0)
10400
        return NULL;
10401

10402
    if (qemuBuildDisksCommandLine(cmd, def, qemuCaps) < 0)
10403
        return NULL;
E
Eric Blake 已提交
10404

10405
    if (qemuBuildFilesystemCommandLine(cmd, def, qemuCaps) < 0)
10406
        return NULL;
10407

10408
    if (qemuBuildNetCommandLine(driver, vm, logManager, secManager, cmd,
10409
                                qemuCaps, vmop, standalone,
10410
                                nnicindexes, nicindexes, &bootHostdevNet) < 0)
10411
        return NULL;
10412

10413
    if (qemuBuildSmartcardCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10414
                                      chardevStdioLogd) < 0)
10415
        return NULL;
10416

10417
    if (qemuBuildSerialCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10418
                                   chardevStdioLogd) < 0)
10419
        return NULL;
M
Martin Kletzander 已提交
10420

10421
    if (qemuBuildParallelsCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10422
                                      chardevStdioLogd) < 0)
10423
        return NULL;
10424

10425
    if (qemuBuildChannelsCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10426
                                     chardevStdioLogd) < 0)
10427
        return NULL;
10428

10429
    if (qemuBuildConsoleCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10430
                                    chardevStdioLogd) < 0)
10431
        return NULL;
10432

10433
    if (qemuBuildTPMCommandLine(cmd, def, qemuCaps) < 0)
10434
        return NULL;
10435

10436
    if (qemuBuildInputCommandLine(cmd, def, qemuCaps) < 0)
10437
        return NULL;
10438

10439
    if (qemuBuildGraphicsCommandLine(cfg, cmd, def, qemuCaps) < 0)
10440
        return NULL;
10441

10442
    if (qemuBuildVideoCommandLine(cmd, def, qemuCaps) < 0)
10443
        return NULL;
10444

10445
    if (qemuBuildSoundCommandLine(cmd, def, qemuCaps) < 0)
10446
        return NULL;
10447

10448
    if (qemuBuildWatchdogCommandLine(cmd, def, qemuCaps) < 0)
10449
        return NULL;
10450

10451
    if (qemuBuildRedirdevCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10452
                                     chardevStdioLogd) < 0)
10453
        return NULL;
10454

10455
    if (qemuBuildHostdevCommandLine(cmd, def, qemuCaps, &bootHostdevNet) < 0)
10456
        return NULL;
10457

10458
    if (migrateURI)
10459
        virCommandAddArgList(cmd, "-incoming", migrateURI, NULL);
10460

10461
    if (qemuBuildMemballoonCommandLine(cmd, def, qemuCaps) < 0)
10462
        return NULL;
10463

10464
    if (qemuBuildRNGCommandLine(logManager, secManager, cmd, cfg, def, qemuCaps,
10465
                                chardevStdioLogd) < 0)
10466
        return NULL;
10467

10468
    if (qemuBuildNVRAMCommandLine(cmd, def, qemuCaps) < 0)
10469
        return NULL;
10470

M
Marc-André Lureau 已提交
10471
    if (qemuBuildVMCoreInfoCommandLine(cmd, def, qemuCaps) < 0)
10472
        return NULL;
M
Marc-André Lureau 已提交
10473

J
Ján Tomko 已提交
10474
    if (qemuBuildSEVCommandLine(vm, cmd, def->sev) < 0)
10475
        return NULL;
10476

10477
    if (snapshot)
10478
        virCommandAddArgList(cmd, "-loadvm", snapshot->def->name, NULL);
10479 10480

    if (def->namespaceData) {
10481 10482 10483 10484 10485 10486 10487 10488
        qemuDomainXmlNsDefPtr qemuxmlns;

        qemuxmlns = def->namespaceData;
        for (i = 0; i < qemuxmlns->num_args; i++)
            virCommandAddArg(cmd, qemuxmlns->args[i]);
        for (i = 0; i < qemuxmlns->num_env; i++)
            virCommandAddEnvPair(cmd, qemuxmlns->env_name[i],
                                 NULLSTR_EMPTY(qemuxmlns->env_value[i]));
10489 10490
    }

10491
    if (qemuBuildSeccompSandboxCommandLine(cmd, cfg, qemuCaps) < 0)
10492
        return NULL;
10493

10494
    if (qemuBuildPanicCommandLine(cmd, def, qemuCaps) < 0)
10495
        return NULL;
H
Hu Tao 已提交
10496

10497
    for (i = 0; i < def->nshmems; i++) {
10498
        if (qemuBuildShmemCommandLine(logManager, secManager, cmd, cfg,
10499 10500
                                      def, def->shmems[i], qemuCaps,
                                      chardevStdioLogd))
10501
            return NULL;
10502 10503
    }

10504 10505
    if (def->vsock &&
        qemuBuildVsockCommandLine(cmd, def, def->vsock, qemuCaps) < 0)
10506
        return NULL;
10507

10508 10509
    /* In some situations, eg. VFIO passthrough, QEMU might need to lock a
     * significant amount of memory, so we need to set the limit accordingly */
10510
    virCommandSetMaxMemLock(cmd, qemuDomainGetMemLockLimitBytes(def));
10511

10512 10513 10514 10515
    if (virQEMUCapsGet(qemuCaps, QEMU_CAPS_MSG_TIMESTAMP) &&
        cfg->logTimestamp)
        virCommandAddArgList(cmd, "-msg", "timestamp=on", NULL);

10516
    VIR_RETURN_PTR(cmd);
10517 10518
}

10519

10520 10521 10522
/* This function generates the correct '-device' string for character
 * devices of each architecture.
 */
10523 10524
static int
qemuBuildSerialChrDeviceStr(char **deviceStr,
10525
                            const virDomainDef *def,
10526
                            virDomainChrDefPtr serial,
10527
                            virQEMUCapsPtr qemuCaps)
10528
{
10529
    VIR_AUTOCLEAN(virBuffer) buf = VIR_BUFFER_INITIALIZER;
10530
    virQEMUCapsFlags caps;
10531

10532
    switch ((virDomainChrSerialTargetModel) serial->targetModel) {
10533
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_ISA_SERIAL:
10534 10535 10536
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_USB_SERIAL:
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_PCI_SERIAL:
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_SPAPR_VTY:
10537 10538
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_SCLPCONSOLE:
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_SCLPLMCONSOLE:
10539

10540
        caps = qemuChrSerialTargetModelToCaps(serial->targetModel);
M
Michal Privoznik 已提交
10541

10542 10543 10544 10545
        if (caps && !virQEMUCapsGet(qemuCaps, caps)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                           _("'%s' is not supported in this QEMU binary"),
                           virDomainChrSerialTargetModelTypeToString(serial->targetModel));
10546
            return -1;
G
Guannan Ren 已提交
10547
        }
10548
        break;
10549

10550
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_PL011:
10551
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_16550A:
10552 10553 10554 10555 10556 10557 10558 10559
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_NONE:
    case VIR_DOMAIN_CHR_SERIAL_TARGET_MODEL_LAST:
        /* Except from _LAST, which is just a guard value and will never
         * be used, all of the above are platform devices, which means
         * qemuBuildSerialCommandLine() will have taken the appropriate
         * branch and we will not have ended up here. */
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Invalid target model for serial device"));
10560
        return -1;
G
Guannan Ren 已提交
10561 10562
    }

10563
    virBufferAsprintf(&buf, "%s,chardev=char%s,id=%s",
10564 10565 10566
                      virDomainChrSerialTargetModelTypeToString(serial->targetModel),
                      serial->info.alias, serial->info.alias);

10567
    if (qemuBuildDeviceAddressStr(&buf, def, &serial->info, qemuCaps) < 0)
10568
        return -1;
10569

10570
    if (virBufferCheckError(&buf) < 0)
10571
        return -1;
10572

10573
    *deviceStr = virBufferContentAndReset(&buf);
10574 10575 10576 10577 10578 10579 10580 10581
    return 0;
}

static int
qemuBuildParallelChrDeviceStr(char **deviceStr,
                              virDomainChrDefPtr chr)
{
    if (virAsprintf(deviceStr, "isa-parallel,chardev=char%s,id=%s",
J
Ján Tomko 已提交
10582
                    chr->info.alias, chr->info.alias) < 0)
10583 10584
        return -1;
    return 0;
10585
}
10586

10587 10588
static int
qemuBuildChannelChrDeviceStr(char **deviceStr,
10589
                             const virDomainDef *def,
10590
                             virDomainChrDefPtr chr)
10591 10592
{
    int ret = -1;
10593
    VIR_AUTOFREE(char *) addr = NULL;
10594 10595
    int port;

10596
    switch ((virDomainChrChannelTargetType)chr->targetType) {
10597 10598 10599 10600 10601 10602 10603 10604
    case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_GUESTFWD:

        addr = virSocketAddrFormat(chr->target.addr);
        if (!addr)
            return ret;
        port = virSocketAddrGetPort(chr->target.addr);

        if (virAsprintf(deviceStr,
10605
                        "user,guestfwd=tcp:%s:%i-chardev:char%s,id=%s",
J
Ján Tomko 已提交
10606
                        addr, port, chr->info.alias, chr->info.alias) < 0)
10607
            return -1;
10608 10609 10610
        break;

    case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_VIRTIO:
10611
        if (!(*deviceStr = qemuBuildVirtioSerialPortDevStr(def, chr)))
10612
            return -1;
10613 10614
        break;

J
Joao Martins 已提交
10615
    case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_XEN:
10616 10617 10618 10619 10620
    case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_NONE:
    case VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_LAST:
        return ret;
    }

10621
    return 0;
10622 10623 10624 10625
}

static int
qemuBuildConsoleChrDeviceStr(char **deviceStr,
10626
                             const virDomainDef *def,
10627
                             virDomainChrDefPtr chr)
10628
{
10629
    switch ((virDomainChrConsoleTargetType)chr->targetType) {
10630 10631 10632
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SCLP:
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SCLPLM:
        if (!(*deviceStr = qemuBuildSclpDevStr(chr)))
10633
            return -1;
10634 10635 10636
        break;

    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_VIRTIO:
10637
        if (!(*deviceStr = qemuBuildVirtioSerialPortDevStr(def, chr)))
10638
            return -1;
10639 10640 10641
        break;

    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL:
10642 10643
        break;

10644 10645 10646 10647 10648 10649
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_NONE:
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_XEN:
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_UML:
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_LXC:
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_OPENVZ:
    case VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_LAST:
10650 10651 10652
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("unsupported console target type %s"),
                       NULLSTR(virDomainChrConsoleTargetTypeToString(chr->targetType)));
10653
        return -1;
10654 10655
    }

10656
    return 0;
10657 10658 10659 10660
}

int
qemuBuildChrDeviceStr(char **deviceStr,
10661
                      const virDomainDef *vmdef,
10662 10663 10664 10665 10666
                      virDomainChrDefPtr chr,
                      virQEMUCapsPtr qemuCaps)
{
    int ret = -1;

10667
    switch ((virDomainChrDeviceType)chr->deviceType) {
10668
    case VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL:
10669
        ret = qemuBuildSerialChrDeviceStr(deviceStr, vmdef, chr, qemuCaps);
10670 10671 10672 10673 10674 10675 10676
        break;

    case VIR_DOMAIN_CHR_DEVICE_TYPE_PARALLEL:
        ret = qemuBuildParallelChrDeviceStr(deviceStr, chr);
        break;

    case VIR_DOMAIN_CHR_DEVICE_TYPE_CHANNEL:
10677
        ret = qemuBuildChannelChrDeviceStr(deviceStr, vmdef, chr);
10678 10679 10680
        break;

    case VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE:
10681
        ret = qemuBuildConsoleChrDeviceStr(deviceStr, vmdef, chr);
10682 10683 10684 10685 10686 10687 10688 10689
        break;

    case VIR_DOMAIN_CHR_DEVICE_TYPE_LAST:
        return ret;
    }

    return ret;
}
10690 10691 10692 10693 10694 10695


virJSONValuePtr
qemuBuildHotpluggableCPUProps(const virDomainVcpuDef *vcpu)
{
    qemuDomainVcpuPrivatePtr vcpupriv = QEMU_DOMAIN_VCPU_PRIVATE(vcpu);
10696
    VIR_AUTOPTR(virJSONValue) ret = NULL;
10697

10698
    if (!(ret = virJSONValueCopy(vcpupriv->props)))
10699
        return NULL;
10700

10701 10702
    if (virJSONValueObjectPrependString(ret, "id", vcpupriv->alias) < 0 ||
        virJSONValueObjectPrependString(ret, "driver", vcpupriv->type) < 0)
10703
        return NULL;
10704

10705
    VIR_RETURN_PTR(ret);
10706
}
10707 10708 10709 10710 10711 10712


/**
 * qemuBuildStorageSourceAttachPrepareDrive:
 * @disk: disk object to prepare
 * @qemuCaps: qemu capabilities object
10713
 * @driveBoot: bootable flag for disks which don't have -device part
10714 10715 10716 10717 10718 10719
 *
 * Prepare qemuBlockStorageSourceAttachDataPtr for use with the old approach
 * using -drive/drive_add. See qemuBlockStorageSourceAttachPrepareBlockdev.
 */
qemuBlockStorageSourceAttachDataPtr
qemuBuildStorageSourceAttachPrepareDrive(virDomainDiskDefPtr disk,
10720
                                         virQEMUCapsPtr qemuCaps)
10721
{
10722 10723
    VIR_AUTOPTR(qemuBlockStorageSourceAttachData) data = NULL;
    qemuBlockStorageSourceAttachDataPtr ret = NULL;
10724 10725 10726 10727

    if (VIR_ALLOC(data) < 0)
        return NULL;

10728
    if (!(data->driveCmd = qemuBuildDriveStr(disk, qemuCaps)) ||
10729
        !(data->driveAlias = qemuAliasDiskDriveFromDisk(disk)))
10730 10731
        return NULL;

10732 10733 10734
    VIR_STEAL_PTR(ret, data);

    return ret;
10735
}
10736 10737 10738 10739 10740 10741


/**
 * qemuBuildStorageSourceAttachPrepareCommon:
 * @src: storage source
 * @data: already initialized data for disk source addition
10742
 * @qemuCaps: qemu capabilities object
10743 10744 10745 10746 10747 10748
 *
 * Prepare data for configuration associated with the disk source such as
 * secrets/TLS/pr objects etc ...
 */
int
qemuBuildStorageSourceAttachPrepareCommon(virStorageSourcePtr src,
10749 10750
                                          qemuBlockStorageSourceAttachDataPtr data,
                                          virQEMUCapsPtr qemuCaps)
10751
{
10752 10753
    qemuDomainStorageSourcePrivatePtr srcpriv = QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(src);

10754 10755 10756 10757 10758
    if (src->pr &&
        !virStoragePRDefIsManaged(src->pr) &&
        !(data->prmgrProps = qemuBuildPRManagerInfoProps(src)))
        return -1;

10759 10760 10761 10762 10763 10764 10765 10766 10767 10768 10769
    if (srcpriv) {
        if (srcpriv->secinfo &&
            srcpriv->secinfo->type == VIR_DOMAIN_SECRET_INFO_TYPE_AES &&
            qemuBuildSecretInfoProps(srcpriv->secinfo, &data->authsecretProps) < 0)
            return -1;

        if (srcpriv->encinfo &&
            qemuBuildSecretInfoProps(srcpriv->encinfo, &data->encryptsecretProps) < 0)
            return -1;
    }

10770 10771 10772 10773 10774
    if (src->haveTLS == VIR_TRISTATE_BOOL_YES &&
        qemuBuildTLSx509BackendProps(src->tlsCertdir, false, true, src->tlsAlias,
                                     NULL, qemuCaps, &data->tlsProps) < 0)
        return -1;

10775 10776
    return 0;
}
10777 10778 10779 10780 10781 10782 10783 10784 10785 10786 10787 10788 10789 10790 10791 10792 10793 10794 10795 10796 10797 10798 10799 10800 10801 10802 10803 10804 10805 10806 10807 10808


/**
 * qemuBuildStorageSourceChainAttachPrepareDrive:
 * @disk: disk definition
 * @qemuCaps: qemu capabilities object
 *
 * Prepares qemuBlockStorageSourceChainDataPtr for attaching @disk via -drive.
 */
qemuBlockStorageSourceChainDataPtr
qemuBuildStorageSourceChainAttachPrepareDrive(virDomainDiskDefPtr disk,
                                              virQEMUCapsPtr qemuCaps)
{
    VIR_AUTOPTR(qemuBlockStorageSourceAttachData) elem = NULL;
    VIR_AUTOPTR(qemuBlockStorageSourceChainData) data = NULL;

    if (VIR_ALLOC(data) < 0)
        return NULL;

    if (!(elem = qemuBuildStorageSourceAttachPrepareDrive(disk, qemuCaps)))
        return NULL;

    if (qemuBuildStorageSourceAttachPrepareCommon(disk->src, elem, qemuCaps) < 0)
        return NULL;

    if (VIR_APPEND_ELEMENT(data->srcdata, data->nsrcdata, elem) < 0)
        return NULL;

    VIR_RETURN_PTR(data);
}


10809 10810 10811
static int
qemuBuildStorageSourceChainAttachPrepareBlockdevOne(qemuBlockStorageSourceChainData *data,
                                                    virStorageSourcePtr src,
10812
                                                    virStorageSourcePtr backingStore,
10813
                                                    virQEMUCapsPtr qemuCaps)
10814 10815 10816
{
    VIR_AUTOPTR(qemuBlockStorageSourceAttachData) elem = NULL;

10817
    if (!(elem = qemuBlockStorageSourceAttachPrepareBlockdev(src, backingStore, true)))
10818
        return -1;
10819

10820 10821
    if (qemuBuildStorageSourceAttachPrepareCommon(src, elem, qemuCaps) < 0)
        return -1;
10822

10823 10824
    if (VIR_APPEND_ELEMENT(data->srcdata, data->nsrcdata, elem) < 0)
        return -1;
10825

10826
    return 0;
10827
}
10828 10829 10830 10831 10832 10833 10834 10835 10836 10837 10838 10839 10840 10841


/**
 * qemuBuildStorageSourceChainAttachPrepareBlockdev:
 * @top: storage source chain
 * @qemuCaps: qemu capabilities object
 *
 * Prepares qemuBlockStorageSourceChainDataPtr for attaching the chain of images
 * starting at @top via -blockdev.
 */
qemuBlockStorageSourceChainDataPtr
qemuBuildStorageSourceChainAttachPrepareBlockdev(virStorageSourcePtr top,
                                                 virQEMUCapsPtr qemuCaps)
{
10842 10843 10844 10845 10846 10847 10848
    VIR_AUTOPTR(qemuBlockStorageSourceChainData) data = NULL;
    virStorageSourcePtr n;

    if (VIR_ALLOC(data) < 0)
        return NULL;

    for (n = top; virStorageSourceIsBacking(n); n = n->backingStore) {
10849 10850 10851
        if (qemuBuildStorageSourceChainAttachPrepareBlockdevOne(data, n,
                                                                n->backingStore,
                                                                qemuCaps) < 0)
10852 10853 10854 10855
            return NULL;
    }

    VIR_RETURN_PTR(data);
10856 10857 10858 10859 10860 10861
}


/**
 * qemuBuildStorageSourceChainAttachPrepareBlockdevTop:
 * @top: storage source chain
10862
 * @backingStore: a storage source to use as backing of @top
10863 10864 10865 10866 10867 10868 10869
 * @qemuCaps: qemu capabilities object
 *
 * Prepares qemuBlockStorageSourceChainDataPtr for attaching of @top image only
 * via -blockdev.
 */
qemuBlockStorageSourceChainDataPtr
qemuBuildStorageSourceChainAttachPrepareBlockdevTop(virStorageSourcePtr top,
10870
                                                    virStorageSourcePtr backingStore,
10871 10872
                                                    virQEMUCapsPtr qemuCaps)
{
10873 10874 10875 10876 10877
    VIR_AUTOPTR(qemuBlockStorageSourceChainData) data = NULL;

    if (VIR_ALLOC(data) < 0)
        return NULL;

10878 10879
    if (qemuBuildStorageSourceChainAttachPrepareBlockdevOne(data, top, backingStore,
                                                            qemuCaps) < 0)
10880 10881 10882
        return NULL;

    VIR_RETURN_PTR(data);
10883
}