libvirt.c 616.4 KB
Newer Older
D
Daniel P. Berrange 已提交
1
/*
2
 * libvirt.c: Main interfaces for the libvirt library to handle virtualization
D
Daniel Veillard 已提交
3 4
 *           domains from a process running in domain 0
 *
E
Eric Blake 已提交
5
 * Copyright (C) 2005-2006, 2008-2014 Red Hat, Inc.
D
Daniel Veillard 已提交
6
 *
O
Osier Yang 已提交
7 8 9 10 11 12 13 14 15 16 17
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
D
Daniel Veillard 已提交
20 21 22 23
 *
 * Daniel Veillard <veillard@redhat.com>
 */

24
#include <config.h>
D
Daniel Veillard 已提交
25

26
#include <stdio.h>
27
#include <stdlib.h>
28
#include <string.h>
29 30 31
#include <sys/types.h>
#include <sys/stat.h>
#include <unistd.h>
E
Eric Blake 已提交
32
#include <sys/wait.h>
33
#include <time.h>
34

35 36
#include <libxml/parser.h>
#include <libxml/xpath.h>
37 38
#include "getpass.h"

39
#ifdef HAVE_WINSOCK2_H
40
# include <winsock2.h>
41
#endif
42

43
#ifdef WITH_CURL
44 45 46
# include <curl/curl.h>
#endif

47
#include "virerror.h"
48
#include "virlog.h"
49
#include "datatypes.h"
50
#include "driver.h"
51

52
#include "viruuid.h"
53
#include "viralloc.h"
54
#include "configmake.h"
55
#include "intprops.h"
56
#include "virconf.h"
57
#if WITH_GNUTLS
58 59 60
# if WITH_GNUTLS_GCRYPT
#  include <gcrypt.h>
# endif
61 62
# include "rpc/virnettlscontext.h"
#endif
63
#include "vircommand.h"
64
#include "virfile.h"
65
#include "virrandom.h"
M
Martin Kletzander 已提交
66
#include "viruri.h"
67
#include "virthread.h"
68
#include "virstring.h"
E
Eric Blake 已提交
69
#include "virutil.h"
70
#include "virtypedparam.h"
71

72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94
#ifdef WITH_TEST
# include "test/test_driver.h"
#endif
#ifdef WITH_REMOTE
# include "remote/remote_driver.h"
#endif
#ifdef WITH_OPENVZ
# include "openvz/openvz_driver.h"
#endif
#ifdef WITH_VMWARE
# include "vmware/vmware_driver.h"
#endif
#ifdef WITH_PHYP
# include "phyp/phyp_driver.h"
#endif
#ifdef WITH_ESX
# include "esx/esx_driver.h"
#endif
#ifdef WITH_HYPERV
# include "hyperv/hyperv_driver.h"
#endif
#ifdef WITH_XENAPI
# include "xenapi/xenapi_driver.h"
95
#endif
D
Dmitry Guryanov 已提交
96 97 98
#ifdef WITH_PARALLELS
# include "parallels/parallels_driver.h"
#endif
R
Roman Bogorodskiy 已提交
99 100 101
#ifdef WITH_BHYVE
# include "bhyve/bhyve_driver.h"
#endif
102

103 104
#define VIR_FROM_THIS VIR_FROM_NONE

105 106
VIR_LOG_INIT("libvirt");

D
Daniel Veillard 已提交
107 108 109
/*
 * TODO:
 * - use lock to protect against concurrent accesses ?
D
Daniel Veillard 已提交
110
 * - use reference counting to guarantee coherent pointer state ?
D
Daniel Veillard 已提交
111 112
 */

113
#define MAX_DRIVERS 20
114

115 116 117 118 119 120 121 122 123 124
#define virDriverCheckTabMaxReturn(count, ret)                          \
    do {                                                                \
        if ((count) >= MAX_DRIVERS) {                                   \
            virReportError(VIR_ERR_INTERNAL_ERROR,                      \
                           _("Too many drivers, cannot register %s"),   \
                           driver->name);                               \
            return ret;                                                 \
        }                                                               \
    } while (0)

125
static virDriverPtr virDriverTab[MAX_DRIVERS];
126
static int virDriverTabCount = 0;
127
static virNetworkDriverPtr virNetworkDriverTab[MAX_DRIVERS];
128
static int virNetworkDriverTabCount = 0;
D
Daniel Veillard 已提交
129 130
static virInterfaceDriverPtr virInterfaceDriverTab[MAX_DRIVERS];
static int virInterfaceDriverTabCount = 0;
131 132
static virStorageDriverPtr virStorageDriverTab[MAX_DRIVERS];
static int virStorageDriverTabCount = 0;
133 134
static virNodeDeviceDriverPtr virNodeDeviceDriverTab[MAX_DRIVERS];
static int virNodeDeviceDriverTabCount = 0;
135 136
static virSecretDriverPtr virSecretDriverTab[MAX_DRIVERS];
static int virSecretDriverTabCount = 0;
S
Stefan Berger 已提交
137 138
static virNWFilterDriverPtr virNWFilterDriverTab[MAX_DRIVERS];
static int virNWFilterDriverTabCount = 0;
A
Atsushi SAKAI 已提交
139
#ifdef WITH_LIBVIRTD
140 141
static virStateDriverPtr virStateDriverTab[MAX_DRIVERS];
static int virStateDriverTabCount = 0;
A
Atsushi SAKAI 已提交
142
#endif
143

144

145
#if defined(POLKIT_AUTH)
146 147 148
static int
virConnectAuthGainPolkit(const char *privilege)
{
E
Eric Blake 已提交
149 150
    virCommandPtr cmd;
    int ret = -1;
151

152
    if (geteuid() == 0)
153 154
        return 0;

E
Eric Blake 已提交
155
    cmd = virCommandNewArgList(POLKIT_AUTH, "--obtain", privilege, NULL);
156
    if (virCommandRun(cmd, NULL) < 0)
E
Eric Blake 已提交
157
        goto cleanup;
158

E
Eric Blake 已提交
159
    ret = 0;
160
 cleanup:
E
Eric Blake 已提交
161 162
    virCommandFree(cmd);
    return ret;
163 164 165
}
#endif

166 167 168 169 170 171

static int
virConnectAuthCallbackDefault(virConnectCredentialPtr cred,
                              unsigned int ncred,
                              void *cbdata ATTRIBUTE_UNUSED)
{
172
    size_t i;
173

174
    for (i = 0; i < ncred; i++) {
175 176
        char buf[1024];
        char *bufptr = buf;
177
        size_t len;
178 179

        switch (cred[i].type) {
180 181 182 183
        case VIR_CRED_EXTERNAL: {
            if (STRNEQ(cred[i].challenge, "PolicyKit"))
                return -1;

184
#if defined(POLKIT_AUTH)
185
            if (virConnectAuthGainPolkit(cred[i].prompt) < 0)
186
                return -1;
187 188 189 190 191 192 193
#else
            /*
             * Ignore & carry on. Although we can't auth
             * directly, the user may have authenticated
             * themselves already outside context of libvirt
             */
#endif
194 195
            break;
        }
196

197 198 199 200
        case VIR_CRED_USERNAME:
        case VIR_CRED_AUTHNAME:
        case VIR_CRED_ECHOPROMPT:
        case VIR_CRED_REALM:
201
            if (printf("%s: ", cred[i].prompt) < 0)
202 203 204 205
                return -1;
            if (fflush(stdout) != 0)
                return -1;

206 207 208 209 210 211 212
            if (!fgets(buf, sizeof(buf), stdin)) {
                if (feof(stdin)) { /* Treat EOF as "" */
                    buf[0] = '\0';
                    break;
                }
                return -1;
            }
213 214 215
            len = strlen(buf);
            if (len != 0 && buf[len-1] == '\n')
                buf[len-1] = '\0';
216 217 218 219
            break;

        case VIR_CRED_PASSPHRASE:
        case VIR_CRED_NOECHOPROMPT:
220
            if (printf("%s: ", cred[i].prompt) < 0)
221 222 223 224
                return -1;
            if (fflush(stdout) != 0)
                return -1;

225 226 227 228
            bufptr = getpass("");
            if (!bufptr)
                return -1;
            break;
229 230 231

        default:
            return -1;
232 233
        }

D
Daniel P. Berrange 已提交
234
        if (cred[i].type != VIR_CRED_EXTERNAL) {
235 236 237
            if (VIR_STRDUP(cred[i].result,
                           STREQ(bufptr, "") && cred[i].defresult ?
                           cred[i].defresult : bufptr) < 0)
D
Daniel P. Berrange 已提交
238 239 240
                return -1;
            cred[i].resultlen = strlen(cred[i].result);
        }
241 242 243 244 245
    }

    return 0;
}

246

247 248 249 250 251 252 253 254 255 256
/* Don't typically want VIR_CRED_USERNAME. It enables you to authenticate
 * as one user, and act as another. It just results in annoying
 * prompts for the username twice & is very rarely what you want
 */
static int virConnectCredTypeDefault[] = {
    VIR_CRED_AUTHNAME,
    VIR_CRED_ECHOPROMPT,
    VIR_CRED_REALM,
    VIR_CRED_PASSPHRASE,
    VIR_CRED_NOECHOPROMPT,
257
    VIR_CRED_EXTERNAL,
258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278
};

static virConnectAuth virConnectAuthDefault = {
    virConnectCredTypeDefault,
    sizeof(virConnectCredTypeDefault)/sizeof(int),
    virConnectAuthCallbackDefault,
    NULL,
};

/*
 * virConnectAuthPtrDefault
 *
 * A default implementation of the authentication callbacks. This
 * implementation is suitable for command line based tools. It will
 * prompt for username, passwords, realm and one time keys as needed.
 * It will print on STDOUT, and read from STDIN. If this is not
 * suitable for the application's needs an alternative implementation
 * should be provided.
 */
virConnectAuthPtr virConnectAuthPtrDefault = &virConnectAuthDefault;

279 280
#if HAVE_WINSOCK2_H
static int
281
winsock_init(void)
282 283 284 285 286 287 288
{
    WORD winsock_version, err;
    WSADATA winsock_data;

    /* http://msdn2.microsoft.com/en-us/library/ms742213.aspx */
    winsock_version = MAKEWORD (2, 2);
    err = WSAStartup (winsock_version, &winsock_data);
J
Jim Meyering 已提交
289
    return err == 0 ? 0 : -1;
290 291 292
}
#endif

293

294
#ifdef WITH_GNUTLS_GCRYPT
295 296
static int
virTLSMutexInit(void **priv)
297
{
D
Daniel P. Berrange 已提交
298 299
    virMutexPtr lock = NULL;

300
    if (VIR_ALLOC_QUIET(lock) < 0)
D
Daniel P. Berrange 已提交
301 302 303 304 305 306 307 308 309 310 311
        return ENOMEM;

    if (virMutexInit(lock) < 0) {
        VIR_FREE(lock);
        return errno;
    }

    *priv = lock;
    return 0;
}

312 313 314

static int
virTLSMutexDestroy(void **priv)
D
Daniel P. Berrange 已提交
315 316 317 318 319 320 321
{
    virMutexPtr lock = *priv;
    virMutexDestroy(lock);
    VIR_FREE(lock);
    return 0;
}

322 323 324

static int
virTLSMutexLock(void **priv)
D
Daniel P. Berrange 已提交
325 326 327 328 329 330
{
    virMutexPtr lock = *priv;
    virMutexLock(lock);
    return 0;
}

331 332 333

static int
virTLSMutexUnlock(void **priv)
D
Daniel P. Berrange 已提交
334 335 336 337 338 339
{
    virMutexPtr lock = *priv;
    virMutexUnlock(lock);
    return 0;
}

340

D
Daniel P. Berrange 已提交
341
static struct gcry_thread_cbs virTLSThreadImpl = {
342
    /* GCRY_THREAD_OPTION_VERSION was added in gcrypt 1.4.2 */
343
# ifdef GCRY_THREAD_OPTION_VERSION
D
Daniel P. Berrange 已提交
344
    (GCRY_THREAD_OPTION_PTHREAD | (GCRY_THREAD_OPTION_VERSION << 8)),
345
# else
346
    GCRY_THREAD_OPTION_PTHREAD,
347
# endif
D
Daniel P. Berrange 已提交
348 349 350 351 352 353 354
    NULL,
    virTLSMutexInit,
    virTLSMutexDestroy,
    virTLSMutexLock,
    virTLSMutexUnlock,
    NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL
};
355
#endif /* WITH_GNUTLS_GCRYPT */
D
Daniel P. Berrange 已提交
356

357

358 359
static bool virGlobalError = false;
static virOnceControl virGlobalOnce = VIR_ONCE_CONTROL_INITIALIZER;
360

361 362 363
static void
virGlobalInit(void)
{
364 365 366 367 368
    /* It would be nice if we could trace the use of this call, to
     * help diagnose in log files if a user calls something other than
     * virConnectOpen first.  But we can't rely on VIR_DEBUG working
     * until after initialization is complete, and since this is
     * one-shot, we never get here again.  */
369
    if (virThreadInitialize() < 0 ||
370
        virErrorInitialize() < 0)
371
        goto error;
372

373
#ifndef LIBVIRT_SETUID_RPC_CLIENT
374 375 376 377 378 379 380
    if (virIsSUID()) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("libvirt.so is not safe to use from setuid programs"));
        goto error;
    }
#endif

381
#ifdef WITH_GNUTLS_GCRYPT
382 383 384 385 386 387 388 389 390 391 392 393 394
    /*
     * This sequence of API calls it copied exactly from
     * gnutls 2.12.23 source lib/gcrypt/init.c, with
     * exception that GCRYCTL_ENABLE_QUICK_RANDOM, is
     * dropped
     */
    if (gcry_control(GCRYCTL_ANY_INITIALIZATION_P) == 0) {
        gcry_control(GCRYCTL_SET_THREAD_CBS, &virTLSThreadImpl);
        gcry_check_version(NULL);

        gcry_control(GCRYCTL_DISABLE_SECMEM, NULL, 0);
        gcry_control(GCRYCTL_INITIALIZATION_FINISHED, NULL, 0);
    }
395
#endif
D
Daniel P. Berrange 已提交
396

397
    virLogSetFromEnv();
398

399
#ifdef WITH_GNUTLS
400
    virNetTLSInit();
401
#endif
402

403
#if WITH_CURL
404 405 406
    curl_global_init(CURL_GLOBAL_DEFAULT);
#endif

407
    VIR_DEBUG("register drivers");
408

409
#if HAVE_WINSOCK2_H
410
    if (winsock_init() == -1)
411
        goto error;
412 413
#endif

414
    if (!bindtextdomain(PACKAGE, LOCALEDIR))
415
        goto error;
416

417 418 419 420 421
    /*
     * Note we must avoid everything except 'remote' driver
     * for virt-login-shell usage
     */
#ifndef LIBVIRT_SETUID_RPC_CLIENT
422
    /*
423 424
     * Note that the order is important: the first ones have a higher
     * priority when calling virConnectOpen.
425
     */
426
# ifdef WITH_TEST
427 428
    if (testRegister() == -1)
        goto error;
429 430
# endif
# ifdef WITH_OPENVZ
431 432
    if (openvzRegister() == -1)
        goto error;
433 434
# endif
# ifdef WITH_VMWARE
435 436
    if (vmwareRegister() == -1)
        goto error;
437 438
# endif
# ifdef WITH_PHYP
439 440
    if (phypRegister() == -1)
        goto error;
441 442
# endif
# ifdef WITH_ESX
443 444
    if (esxRegister() == -1)
        goto error;
445 446
# endif
# ifdef WITH_HYPERV
447 448
    if (hypervRegister() == -1)
        goto error;
449 450
# endif
# ifdef WITH_XENAPI
451 452
    if (xenapiRegister() == -1)
        goto error;
453 454
# endif
# ifdef WITH_PARALLELS
455 456
    if (parallelsRegister() == -1)
        goto error;
457
# endif
D
Dmitry Guryanov 已提交
458
#endif
459
#ifdef WITH_REMOTE
460
    if (remoteRegister() == -1)
461
        goto error;
462
#endif
D
Daniel P. Berrange 已提交
463

464 465
    return;

466
 error:
467 468 469
    virGlobalError = true;
}

470

471 472 473 474 475
/**
 * virInitialize:
 *
 * Initialize the library.
 *
476 477 478 479 480 481
 * This method is invoked automatically by any of the virConnectOpen() API
 * calls, and by virGetVersion(). Since release 1.0.0, there is no need to
 * call this method even in a multithreaded application, since
 * initialization is performed in a thread safe manner; but applications
 * using an older version of the library should manually call this before
 * setting up competing threads that attempt virConnectOpen in parallel.
482
 *
483 484 485 486 487
 * The only other time it would be necessary to call virInitialize is if the
 * application did not invoke virConnectOpen as its first API call, such
 * as when calling virEventRegisterImpl() before setting up connections,
 * or when using virSetErrorFunc() to alter error reporting of the first
 * connection attempt.
488 489 490 491 492 493 494 495 496 497 498
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
virInitialize(void)
{
    if (virOnce(&virGlobalOnce, virGlobalInit) < 0)
        return -1;

    if (virGlobalError)
        return -1;
499
    return 0;
500 501
}

502

503 504
#ifdef WIN32
BOOL WINAPI
505
DllMain(HINSTANCE instance, DWORD reason, LPVOID ignore);
506 507

BOOL WINAPI
508 509 510
DllMain(HINSTANCE instance ATTRIBUTE_UNUSED,
        DWORD reason,
        LPVOID ignore ATTRIBUTE_UNUSED)
511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535
{
    switch (reason) {
    case DLL_PROCESS_ATTACH:
        virInitialize();
        break;

    case DLL_THREAD_ATTACH:
        /* Nothing todo in libvirt yet */
        break;

    case DLL_THREAD_DETACH:
        /* Release per-thread local data */
        virThreadOnExit();
        break;

    case DLL_PROCESS_DETACH:
        /* Don't bother releasing per-thread data
           since (hopefully) windows cleans up
           everything on process exit */
        break;
    }

    return TRUE;
}
#endif
536

537

538 539 540 541 542 543 544 545 546 547 548
/**
 * virRegisterNetworkDriver:
 * @driver: pointer to a network driver block
 *
 * Register a network virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterNetworkDriver(virNetworkDriverPtr driver)
{
549
    virCheckNonNullArgReturn(driver, -1);
550
    virDriverCheckTabMaxReturn(virNetworkDriverTabCount, -1);
551

552
    VIR_DEBUG("registering %s as network driver %d",
553 554
           driver->name, virNetworkDriverTabCount);

555 556
    virNetworkDriverTab[virNetworkDriverTabCount] = driver;
    return virNetworkDriverTabCount++;
557 558
}

559

D
Daniel Veillard 已提交
560 561
/**
 * virRegisterInterfaceDriver:
L
Laine Stump 已提交
562
 * @driver: pointer to an interface driver block
D
Daniel Veillard 已提交
563
 *
L
Laine Stump 已提交
564
 * Register an interface virtualization driver
D
Daniel Veillard 已提交
565 566 567 568 569 570
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterInterfaceDriver(virInterfaceDriverPtr driver)
{
571
    virCheckNonNullArgReturn(driver, -1);
572
    virDriverCheckTabMaxReturn(virInterfaceDriverTabCount, -1);
D
Daniel Veillard 已提交
573

574
    VIR_DEBUG("registering %s as interface driver %d",
D
Daniel Veillard 已提交
575 576 577 578 579 580
           driver->name, virInterfaceDriverTabCount);

    virInterfaceDriverTab[virInterfaceDriverTabCount] = driver;
    return virInterfaceDriverTabCount++;
}

581

582 583 584 585 586 587 588 589 590 591 592
/**
 * virRegisterStorageDriver:
 * @driver: pointer to a storage driver block
 *
 * Register a storage virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterStorageDriver(virStorageDriverPtr driver)
{
593
    virCheckNonNullArgReturn(driver, -1);
594
    virDriverCheckTabMaxReturn(virStorageDriverTabCount, -1);
595

596
    VIR_DEBUG("registering %s as storage driver %d",
597 598
           driver->name, virStorageDriverTabCount);

599 600 601 602
    virStorageDriverTab[virStorageDriverTabCount] = driver;
    return virStorageDriverTabCount++;
}

603

604
/**
605
 * virRegisterNodeDeviceDriver:
606 607 608 609 610 611 612
 * @driver: pointer to a device monitor block
 *
 * Register a device monitor
 *
 * Returns the driver priority or -1 in case of error.
 */
int
613
virRegisterNodeDeviceDriver(virNodeDeviceDriverPtr driver)
614
{
615
    virCheckNonNullArgReturn(driver, -1);
616
    virDriverCheckTabMaxReturn(virNodeDeviceDriverTabCount, -1);
617

618
    VIR_DEBUG("registering %s as device driver %d",
619
           driver->name, virNodeDeviceDriverTabCount);
620

621 622
    virNodeDeviceDriverTab[virNodeDeviceDriverTabCount] = driver;
    return virNodeDeviceDriverTabCount++;
623 624
}

625

626 627 628 629 630 631 632 633 634 635 636
/**
 * virRegisterSecretDriver:
 * @driver: pointer to a secret driver block
 *
 * Register a secret driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterSecretDriver(virSecretDriverPtr driver)
{
637
    virCheckNonNullArgReturn(driver, -1);
638
    virDriverCheckTabMaxReturn(virSecretDriverTabCount, -1);
639

640
    VIR_DEBUG("registering %s as secret driver %d",
641 642 643 644 645 646
           driver->name, virSecretDriverTabCount);

    virSecretDriverTab[virSecretDriverTabCount] = driver;
    return virSecretDriverTabCount++;
}

647

S
Stefan Berger 已提交
648 649 650 651 652 653 654 655 656 657 658
/**
 * virRegisterNWFilterDriver:
 * @driver: pointer to a network filter driver block
 *
 * Register a network filter virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterNWFilterDriver(virNWFilterDriverPtr driver)
{
659
    virCheckNonNullArgReturn(driver, -1);
660
    virDriverCheckTabMaxReturn(virNWFilterDriverTabCount, -1);
S
Stefan Berger 已提交
661

662
    VIR_DEBUG("registering %s as network filter driver %d",
S
Stefan Berger 已提交
663 664 665 666 667 668 669
           driver->name, virNWFilterDriverTabCount);

    virNWFilterDriverTab[virNWFilterDriverTabCount] = driver;
    return virNWFilterDriverTabCount++;
}


670 671 672 673 674 675 676 677 678 679 680
/**
 * virRegisterDriver:
 * @driver: pointer to a driver block
 *
 * Register a virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterDriver(virDriverPtr driver)
{
681 682
    VIR_DEBUG("driver=%p name=%s", driver,
              driver ? NULLSTR(driver->name) : "(null)");
683

684
    virCheckNonNullArgReturn(driver, -1);
685
    virDriverCheckTabMaxReturn(virDriverTabCount, -1);
686

687
    VIR_DEBUG("registering %s as driver %d",
688 689
           driver->name, virDriverTabCount);

690 691
    virDriverTab[virDriverTabCount] = driver;
    return virDriverTabCount++;
692 693
}

694

A
Atsushi SAKAI 已提交
695
#ifdef WITH_LIBVIRTD
696 697 698 699 700 701 702 703 704 705 706
/**
 * virRegisterStateDriver:
 * @driver: pointer to a driver block
 *
 * Register a virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterStateDriver(virStateDriverPtr driver)
{
707
    virCheckNonNullArgReturn(driver, -1);
708
    virDriverCheckTabMaxReturn(virStateDriverTabCount, -1);
709 710 711 712 713

    virStateDriverTab[virStateDriverTabCount] = driver;
    return virStateDriverTabCount++;
}

714

715 716
/**
 * virStateInitialize:
717
 * @privileged: set to true if running with root privilege, false otherwise
718 719
 * @callback: callback to invoke to inhibit shutdown of the daemon
 * @opaque: data to pass to @callback
720
 *
721 722 723 724 725
 * Initialize all virtualization drivers. Accomplished in two phases,
 * the first being state and structure initialization followed by any
 * auto start supported by the driver.  This is done to ensure dependencies
 * that some drivers may have on another driver having been initialized
 * will exist, such as the storage driver's need to use the secret driver.
726
 *
727
 * Returns 0 if all succeed, -1 upon any failure.
728
 */
729 730 731 732
int
virStateInitialize(bool privileged,
                   virStateInhibitCallback callback,
                   void *opaque)
733
{
734
    size_t i;
735 736 737 738

    if (virInitialize() < 0)
        return -1;

739
    for (i = 0; i < virStateDriverTabCount; i++) {
740
        if (virStateDriverTab[i]->stateInitialize) {
741
            VIR_DEBUG("Running global init for %s state driver",
742
                      virStateDriverTab[i]->name);
743 744 745
            if (virStateDriverTab[i]->stateInitialize(privileged,
                                                      callback,
                                                      opaque) < 0) {
746 747 748 749
                virErrorPtr err = virGetLastError();
                VIR_ERROR(_("Initialization of %s state driver failed: %s"),
                          virStateDriverTab[i]->name,
                          err && err->message ? err->message : _("Unknown problem"));
750 751
                return -1;
            }
752
        }
753
    }
754 755 756 757 758 759 760 761

    for (i = 0; i < virStateDriverTabCount; i++) {
        if (virStateDriverTab[i]->stateAutoStart) {
            VIR_DEBUG("Running global auto start for %s state driver",
                      virStateDriverTab[i]->name);
            virStateDriverTab[i]->stateAutoStart();
        }
    }
762
    return 0;
763 764
}

765

766 767 768 769 770
/**
 * virStateCleanup:
 *
 * Run each virtualization driver's cleanup method.
 *
771
 * Returns 0 if all succeed, -1 upon any failure.
772
 */
773 774 775
int
virStateCleanup(void)
{
776 777
    size_t i;
    int ret = 0;
778

779
    for (i = 0; i < virStateDriverTabCount; i++) {
780 781
        if (virStateDriverTab[i]->stateCleanup &&
            virStateDriverTab[i]->stateCleanup() < 0)
782 783 784 785 786
            ret = -1;
    }
    return ret;
}

787

788 789 790 791 792
/**
 * virStateReload:
 *
 * Run each virtualization driver's reload method.
 *
793
 * Returns 0 if all succeed, -1 upon any failure.
794
 */
795 796 797
int
virStateReload(void)
{
798 799
    size_t i;
    int ret = 0;
800

801
    for (i = 0; i < virStateDriverTabCount; i++) {
802 803
        if (virStateDriverTab[i]->stateReload &&
            virStateDriverTab[i]->stateReload() < 0)
804 805 806 807 808
            ret = -1;
    }
    return ret;
}

809

810 811 812 813 814 815 816
/**
 * virStateStop:
 *
 * Run each virtualization driver's "stop" method.
 *
 * Returns 0 if successful, -1 on failure
 */
817 818 819
int
virStateStop(void)
{
820 821
    size_t i;
    int ret = 0;
822

823
    for (i = 0; i < virStateDriverTabCount; i++) {
824 825
        if (virStateDriverTab[i]->stateStop &&
            virStateDriverTab[i]->stateStop())
826 827 828 829
            ret = 1;
    }
    return ret;
}
830
#endif /* WITH_LIBVIRTD */
831 832


833 834 835
/**
 * virGetVersion:
 * @libVer: return value for the library version (OUT)
836 837 838 839 840 841 842 843 844 845
 * @type: ignored; pass NULL
 * @typeVer: pass NULL; for historical purposes duplicates @libVer if
 * non-NULL
 *
 * Provides version information. @libVer is the version of the
 * library and will always be set unless an error occurs, in which case
 * an error code will be returned. @typeVer exists for historical
 * compatibility; if it is not NULL it will duplicate @libVer (it was
 * originally intended to return hypervisor information based on @type,
 * but due to the design of remote clients this is not reliable). To
846
 * get the version of the running hypervisor use the virConnectGetVersion()
847
 * function instead. To get the libvirt library version used by a
848 849 850
 * connection use the virConnectGetLibVersion() instead.
 *
 * This function includes a call to virInitialize() when necessary.
851 852 853 854 855
 *
 * Returns -1 in case of failure, 0 otherwise, and values for @libVer and
 *       @typeVer have the format major * 1,000,000 + minor * 1,000 + release.
 */
int
856
virGetVersion(unsigned long *libVer, const char *type ATTRIBUTE_UNUSED,
857 858
              unsigned long *typeVer)
{
859 860
    if (virInitialize() < 0)
        goto error;
861
    VIR_DEBUG("libVir=%p, type=%s, typeVer=%p", libVer, type, typeVer);
862

863
    virResetLastError();
864
    if (libVer == NULL)
865
        goto error;
866 867
    *libVer = LIBVIR_VERSION_NUMBER;

868
    if (typeVer != NULL)
869 870
        *typeVer = LIBVIR_VERSION_NUMBER;

871
    return 0;
872

873
 error:
874 875
    virDispatchError(NULL);
    return -1;
876 877
}

878

879
static char *
880
virConnectGetConfigFilePath(void)
881 882 883 884 885
{
    char *path;
    if (geteuid() == 0) {
        if (virAsprintf(&path, "%s/libvirt/libvirt.conf",
                        SYSCONFDIR) < 0)
886
            return NULL;
887
    } else {
888
        char *userdir = virGetUserConfigDirectory();
889
        if (!userdir)
890
            return NULL;
891

892
        if (virAsprintf(&path, "%s/libvirt.conf",
893 894
                        userdir) < 0) {
            VIR_FREE(userdir);
895
            return NULL;
896 897
        }
        VIR_FREE(userdir);
898 899 900 901 902
    }

    return path;
}

903

904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925
static int
virConnectGetConfigFile(virConfPtr *conf)
{
    char *filename = NULL;
    int ret = -1;

    *conf = NULL;

    if (!(filename = virConnectGetConfigFilePath()))
        goto cleanup;

    if (!virFileExists(filename)) {
        ret = 0;
        goto cleanup;
    }

    VIR_DEBUG("Loading config file '%s'", filename);
    if (!(*conf = virConfReadFile(filename, 0)))
        goto cleanup;

    ret = 0;

926
 cleanup:
927 928 929 930
    VIR_FREE(filename);
    return ret;
}

931 932
#define URI_ALIAS_CHARS "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789_-"

933

934
static int
935 936
virConnectOpenFindURIAliasMatch(virConfValuePtr value, const char *alias,
                                char **uri)
937 938
{
    virConfValuePtr entry;
W
Wen Ruo Lv 已提交
939 940
    size_t alias_len;

941
    if (value->type != VIR_CONF_LIST) {
942 943
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Expected a list for 'uri_aliases' config parameter"));
944 945 946 947
        return -1;
    }

    entry = value->list;
W
Wen Ruo Lv 已提交
948
    alias_len = strlen(alias);
949 950 951 952 953
    while (entry) {
        char *offset;
        size_t safe;

        if (entry->type != VIR_CONF_STRING) {
954 955
            virReportError(VIR_ERR_CONF_SYNTAX, "%s",
                           _("Expected a string for 'uri_aliases' config parameter list entry"));
956 957 958 959
            return -1;
        }

        if (!(offset = strchr(entry->str, '='))) {
960 961
            virReportError(VIR_ERR_CONF_SYNTAX,
                           _("Malformed 'uri_aliases' config entry '%s', expected 'alias=uri://host/path'"),
962 963 964 965 966 967
                            entry->str);
            return -1;
        }

        safe  = strspn(entry->str, URI_ALIAS_CHARS);
        if (safe < (offset - entry->str)) {
968 969
            virReportError(VIR_ERR_CONF_SYNTAX,
                           _("Malformed 'uri_aliases' config entry '%s', aliases may only contain 'a-Z, 0-9, _, -'"),
970 971 972 973
                            entry->str);
            return -1;
        }

W
Wen Ruo Lv 已提交
974 975
        if (alias_len == (offset - entry->str) &&
            STREQLEN(entry->str, alias, alias_len)) {
976 977
            VIR_DEBUG("Resolved alias '%s' to '%s'",
                      alias, offset+1);
978
            return VIR_STRDUP(*uri, offset+1);
979 980 981 982 983 984 985 986 987 988
        }

        entry = entry->next;
    }

    VIR_DEBUG("No alias found for '%s', passing through to drivers",
              alias);
    return 0;
}

989

990
static int
991 992
virConnectOpenResolveURIAlias(virConfPtr conf,
                              const char *alias, char **uri)
993 994 995 996 997 998
{
    int ret = -1;
    virConfValuePtr value = NULL;

    *uri = NULL;

999
    if ((value = virConfGetValue(conf, "uri_aliases")))
1000 1001 1002 1003
        ret = virConnectOpenFindURIAliasMatch(value, alias, uri);
    else
        ret = 0;

1004 1005 1006 1007 1008 1009 1010 1011 1012 1013
    return ret;
}


static int
virConnectGetDefaultURI(virConfPtr conf,
                        const char **name)
{
    int ret = -1;
    virConfValuePtr value = NULL;
1014
    const char *defname = virGetEnvBlockSUID("LIBVIRT_DEFAULT_URI");
1015 1016 1017 1018 1019
    if (defname && *defname) {
        VIR_DEBUG("Using LIBVIRT_DEFAULT_URI '%s'", defname);
        *name = defname;
    } else if ((value = virConfGetValue(conf, "uri_default"))) {
        if (value->type != VIR_CONF_STRING) {
1020 1021
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Expected a string for 'uri_default' config parameter"));
1022 1023 1024 1025 1026 1027 1028
            goto cleanup;
        }
        VIR_DEBUG("Using config file uri '%s'", value->str);
        *name = value->str;
    }

    ret = 0;
1029
 cleanup:
1030 1031 1032
    return ret;
}

1033

1034
static virConnectPtr
1035 1036 1037
do_open(const char *name,
        virConnectAuthPtr auth,
        unsigned int flags)
1038
{
1039 1040
    size_t i;
    int res;
1041
    virConnectPtr ret;
1042
    virConfPtr conf = NULL;
1043 1044 1045 1046

    ret = virGetConnect();
    if (ret == NULL)
        return NULL;
1047

1048 1049 1050 1051 1052 1053
    if (virConnectGetConfigFile(&conf) < 0)
        goto failed;

    if (name && name[0] == '\0')
        name = NULL;

1054 1055 1056 1057 1058 1059
    if (!name && virIsSUID()) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("An explicit URI must be provided when setuid"));
        goto failed;
    }

1060
    /*
E
Eric Blake 已提交
1061 1062 1063
     * If no URI is passed, then check for an environment string if not
     * available probe the compiled in drivers to find a default hypervisor
     * if detectable.
1064
     */
1065 1066 1067
    if (!name &&
        virConnectGetDefaultURI(conf, &name) < 0)
        goto failed;
1068

1069
    if (name) {
1070
        char *alias = NULL;
1071 1072 1073 1074 1075 1076 1077
        /* Convert xen -> xen:/// for back compat */
        if (STRCASEEQ(name, "xen"))
            name = "xen:///";

        /* Convert xen:// -> xen:/// because xmlParseURI cannot parse the
         * former.  This allows URIs such as xen://localhost to work.
         */
1078
        if (STREQ(name, "xen://"))
1079 1080
            name = "xen:///";

1081
        if (!(flags & VIR_CONNECT_NO_ALIASES) &&
1082
            virConnectOpenResolveURIAlias(conf, name, &alias) < 0)
1083 1084
            goto failed;

1085
        if (!(ret->uri = virURIParse(alias ? alias : name))) {
1086
            VIR_FREE(alias);
1087 1088
            goto failed;
        }
1089

1090
        VIR_DEBUG("name \"%s\" to URI components:\n"
1091 1092 1093 1094 1095 1096
                  "  scheme %s\n"
                  "  server %s\n"
                  "  user %s\n"
                  "  port %d\n"
                  "  path %s\n",
                  alias ? alias : name,
1097
                  NULLSTR(ret->uri->scheme), NULLSTR(ret->uri->server),
1098 1099 1100 1101
                  NULLSTR(ret->uri->user), ret->uri->port,
                  NULLSTR(ret->uri->path));

        VIR_FREE(alias);
1102
    } else {
1103
        VIR_DEBUG("no name, allowing driver auto-select");
1104 1105
    }

1106 1107 1108
    /* Cleansing flags */
    ret->flags = flags & VIR_CONNECT_RO;

1109
    for (i = 0; i < virDriverTabCount; i++) {
1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123
        /* We're going to probe the remote driver next. So we have already
         * probed all other client-side-only driver before, but none of them
         * accepted the URI.
         * If the scheme corresponds to a known but disabled client-side-only
         * driver then report a useful error, instead of a cryptic one about
         * not being able to connect to libvirtd or not being able to find
         * certificates. */
        if (virDriverTab[i]->no == VIR_DRV_REMOTE &&
            ret->uri != NULL && ret->uri->scheme != NULL &&
            (
#ifndef WITH_PHYP
             STRCASEEQ(ret->uri->scheme, "phyp") ||
#endif
#ifndef WITH_ESX
1124
             STRCASEEQ(ret->uri->scheme, "vpx") ||
1125 1126
             STRCASEEQ(ret->uri->scheme, "esx") ||
             STRCASEEQ(ret->uri->scheme, "gsx") ||
M
Matthias Bolte 已提交
1127 1128 1129
#endif
#ifndef WITH_HYPERV
             STRCASEEQ(ret->uri->scheme, "hyperv") ||
1130 1131 1132
#endif
#ifndef WITH_XENAPI
             STRCASEEQ(ret->uri->scheme, "xenapi") ||
D
Dmitry Guryanov 已提交
1133 1134 1135
#endif
#ifndef WITH_PARALLELS
             STRCASEEQ(ret->uri->scheme, "parallels") ||
1136 1137
#endif
             false)) {
1138
            virReportErrorHelper(VIR_FROM_NONE, VIR_ERR_CONFIG_UNSUPPORTED,
1139 1140 1141 1142 1143 1144
                                 __FILE__, __FUNCTION__, __LINE__,
                                 _("libvirt was built without the '%s' driver"),
                                 ret->uri->scheme);
            goto failed;
        }

1145
        VIR_DEBUG("trying driver %zu (%s) ...", i, virDriverTab[i]->name);
1146
        ret->driver = virDriverTab[i];
1147
        res = virDriverTab[i]->connectOpen(ret, auth, flags);
1148
        VIR_DEBUG("driver %zu %s returned %s",
O
Osier Yang 已提交
1149 1150 1151 1152 1153 1154
                  i, virDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1155
            break;
O
Osier Yang 已提交
1156
        } else if (res == VIR_DRV_OPEN_ERROR) {
1157
            ret->driver = NULL;
O
Osier Yang 已提交
1158
            goto failed;
1159 1160
        } else {
            ret->driver = NULL;
1161
        }
1162 1163
    }

1164
    if (!ret->driver) {
1165
        /* If we reach here, then all drivers declined the connection. */
1166
        virReportError(VIR_ERR_NO_CONNECT, "%s", NULLSTR(name));
1167
        goto failed;
1168 1169
    }

1170
    for (i = 0; i < virNetworkDriverTabCount; i++) {
1171
        res = virNetworkDriverTab[i]->networkOpen(ret, auth, flags);
1172
        VIR_DEBUG("network driver %zu %s returned %s",
O
Osier Yang 已提交
1173 1174 1175 1176 1177 1178
                  i, virNetworkDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1179 1180
            ret->networkDriver = virNetworkDriverTab[i];
            break;
O
Osier Yang 已提交
1181 1182
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1183
        }
1184
    }
1185

D
Daniel Veillard 已提交
1186
    for (i = 0; i < virInterfaceDriverTabCount; i++) {
1187
        res = virInterfaceDriverTab[i]->interfaceOpen(ret, auth, flags);
1188
        VIR_DEBUG("interface driver %zu %s returned %s",
O
Osier Yang 已提交
1189 1190 1191 1192 1193 1194
                  i, virInterfaceDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
D
Daniel Veillard 已提交
1195 1196
            ret->interfaceDriver = virInterfaceDriverTab[i];
            break;
O
Osier Yang 已提交
1197 1198
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
D
Daniel Veillard 已提交
1199 1200
        }
    }
1201 1202 1203

    /* Secondary driver for storage. Optional */
    for (i = 0; i < virStorageDriverTabCount; i++) {
1204
        res = virStorageDriverTab[i]->storageOpen(ret, auth, flags);
1205
        VIR_DEBUG("storage driver %zu %s returned %s",
O
Osier Yang 已提交
1206 1207 1208 1209 1210 1211
                  i, virStorageDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1212 1213
            ret->storageDriver = virStorageDriverTab[i];
            break;
O
Osier Yang 已提交
1214 1215
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1216 1217 1218
        }
    }

1219
    /* Node driver (optional) */
1220
    for (i = 0; i < virNodeDeviceDriverTabCount; i++) {
1221
        res = virNodeDeviceDriverTab[i]->nodeDeviceOpen(ret, auth, flags);
1222
        VIR_DEBUG("node driver %zu %s returned %s",
1223
                  i, virNodeDeviceDriverTab[i]->name,
O
Osier Yang 已提交
1224 1225 1226 1227 1228
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1229
            ret->nodeDeviceDriver = virNodeDeviceDriverTab[i];
1230
            break;
O
Osier Yang 已提交
1231 1232
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1233 1234 1235
        }
    }

1236 1237
    /* Secret manipulation driver. Optional */
    for (i = 0; i < virSecretDriverTabCount; i++) {
1238
        res = virSecretDriverTab[i]->secretOpen(ret, auth, flags);
1239
        VIR_DEBUG("secret driver %zu %s returned %s",
O
Osier Yang 已提交
1240 1241 1242 1243 1244 1245
                  i, virSecretDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1246 1247
            ret->secretDriver = virSecretDriverTab[i];
            break;
O
Osier Yang 已提交
1248 1249
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1250 1251 1252
        }
    }

S
Stefan Berger 已提交
1253 1254
    /* Network filter driver. Optional */
    for (i = 0; i < virNWFilterDriverTabCount; i++) {
1255
        res = virNWFilterDriverTab[i]->nwfilterOpen(ret, auth, flags);
1256
        VIR_DEBUG("nwfilter driver %zu %s returned %s",
O
Osier Yang 已提交
1257 1258 1259 1260 1261 1262
                  i, virNWFilterDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
S
Stefan Berger 已提交
1263 1264
            ret->nwfilterDriver = virNWFilterDriverTab[i];
            break;
O
Osier Yang 已提交
1265 1266
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
S
Stefan Berger 已提交
1267 1268 1269
        }
    }

1270 1271
    virConfFree(conf);

1272
    return ret;
1273

1274
 failed:
1275
    virConfFree(conf);
1276
    virObjectUnref(ret);
1277

1278
    return NULL;
1279 1280
}

1281

1282 1283
/**
 * virConnectOpen:
1284
 * @name: (optional) URI of the hypervisor
1285
 *
1286
 * This function should be called first to get a connection to the
1287 1288
 * Hypervisor and xen store
 *
1289 1290 1291 1292 1293
 * If @name is NULL, if the LIBVIRT_DEFAULT_URI environment variable is set,
 * then it will be used. Otherwise if the client configuration file
 * has the "uri_default" parameter set, then it will be used. Finally
 * probing will be done to determine a suitable default driver to activate.
 * This involves trying each hypervisor in turn until one successfully opens.
1294 1295 1296 1297 1298 1299
 *
 * If connecting to an unprivileged hypervisor driver which requires
 * the libvirtd daemon to be active, it will automatically be launched
 * if not already running. This can be prevented by setting the
 * environment variable LIBVIRT_AUTOSTART=0
 *
1300
 * URIs are documented at http://libvirt.org/uri.html
E
Eric Blake 已提交
1301 1302
 *
 * Returns a pointer to the hypervisor connection or NULL in case of error
1303 1304
 */
virConnectPtr
1305
virConnectOpen(const char *name)
1306
{
1307
    virConnectPtr ret = NULL;
1308 1309 1310

    if (virInitialize() < 0)
        goto error;
1311

1312
    VIR_DEBUG("name=%s", NULLSTR(name));
1313
    virResetLastError();
1314
    ret = do_open(name, NULL, 0);
1315 1316 1317 1318
    if (!ret)
        goto error;
    return ret;

1319
 error:
1320 1321
    virDispatchError(NULL);
    return NULL;
1322 1323
}

1324

1325
/**
1326
 * virConnectOpenReadOnly:
1327
 * @name: (optional) URI of the hypervisor
1328
 *
1329
 * This function should be called first to get a restricted connection to the
D
Daniel Veillard 已提交
1330
 * library functionalities. The set of APIs usable are then restricted
1331
 * on the available methods to control the domains.
1332
 *
1333 1334 1335
 * See virConnectOpen for notes about environment variables which can
 * have an effect on opening drivers
 *
1336
 * URIs are documented at http://libvirt.org/uri.html
E
Eric Blake 已提交
1337 1338
 *
 * Returns a pointer to the hypervisor connection or NULL in case of error
1339
 */
1340
virConnectPtr
1341 1342
virConnectOpenReadOnly(const char *name)
{
1343
    virConnectPtr ret = NULL;
1344 1345 1346

    if (virInitialize() < 0)
        goto error;
1347

1348
    VIR_DEBUG("name=%s", NULLSTR(name));
1349
    virResetLastError();
1350
    ret = do_open(name, NULL, VIR_CONNECT_RO);
1351 1352 1353 1354
    if (!ret)
        goto error;
    return ret;

1355
 error:
1356 1357
    virDispatchError(NULL);
    return NULL;
1358 1359
}

1360

1361 1362
/**
 * virConnectOpenAuth:
1363
 * @name: (optional) URI of the hypervisor
1364
 * @auth: Authenticate callback parameters
1365
 * @flags: bitwise-OR of virConnectFlags
1366
 *
1367
 * This function should be called first to get a connection to the
1368
 * Hypervisor. If necessary, authentication will be performed fetching
1369 1370
 * credentials via the callback
 *
1371 1372 1373
 * See virConnectOpen for notes about environment variables which can
 * have an effect on opening drivers
 *
1374
 * URIs are documented at http://libvirt.org/uri.html
E
Eric Blake 已提交
1375 1376
 *
 * Returns a pointer to the hypervisor connection or NULL in case of error
1377 1378 1379 1380
 */
virConnectPtr
virConnectOpenAuth(const char *name,
                   virConnectAuthPtr auth,
1381
                   unsigned int flags)
1382
{
1383
    virConnectPtr ret = NULL;
1384 1385 1386

    if (virInitialize() < 0)
        goto error;
1387

1388
    VIR_DEBUG("name=%s, auth=%p, flags=%x", NULLSTR(name), auth, flags);
1389
    virResetLastError();
1390
    ret = do_open(name, auth, flags);
1391 1392 1393 1394
    if (!ret)
        goto error;
    return ret;

1395
 error:
1396 1397
    virDispatchError(NULL);
    return NULL;
D
Daniel Veillard 已提交
1398 1399
}

1400

D
Daniel Veillard 已提交
1401
/**
1402
 * virConnectClose:
D
Daniel Veillard 已提交
1403 1404 1405 1406 1407 1408 1409
 * @conn: pointer to the hypervisor connection
 *
 * This function closes the connection to the Hypervisor. This should
 * not be called if further interaction with the Hypervisor are needed
 * especially if there is running domain which need further monitoring by
 * the application.
 *
1410 1411 1412 1413 1414 1415 1416 1417
 * Connections are reference counted; the count is explicitly
 * increased by the initial open (virConnectOpen, virConnectOpenAuth,
 * and the like) as well as virConnectRef; it is also temporarily
 * increased by other API that depend on the connection remaining
 * alive.  The open and every virConnectRef call should have a
 * matching virConnectClose, and all other references will be released
 * after the corresponding operation completes.
 *
1418 1419 1420 1421 1422 1423 1424 1425 1426 1427
 * Returns a positive number if at least 1 reference remains on
 * success. The returned value should not be assumed to be the total
 * reference count. A return of 0 implies no references remain and
 * the connection is closed and memory has been freed. A return of -1
 * implies a failure.
 *
 * It is possible for the last virConnectClose to return a positive
 * value if some other object still has a temporary reference to the
 * connection, but the application should not try to further use a
 * connection after the virConnectClose that matches the initial open.
D
Daniel Veillard 已提交
1428 1429
 */
int
1430 1431
virConnectClose(virConnectPtr conn)
{
1432
    VIR_DEBUG("conn=%p", conn);
1433

1434 1435
    virResetLastError();

1436
    virCheckConnectReturn(conn, -1);
1437

1438 1439 1440
    if (!virObjectUnref(conn))
        return 0;
    return 1;
D
Daniel Veillard 已提交
1441 1442
}

1443

1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457
/**
 * virConnectRef:
 * @conn: the connection to hold a reference on
 *
 * Increment the reference count on the connection. For each
 * additional call to this method, there shall be a corresponding
 * call to virConnectClose to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a connection would increment
 * the reference count.
D
Daniel Veillard 已提交
1458 1459
 *
 * Returns 0 in case of success, -1 in case of failure
1460 1461 1462 1463
 */
int
virConnectRef(virConnectPtr conn)
{
1464 1465
    VIR_DEBUG("conn=%p refs=%d", conn, conn ? conn->object.u.s.refs : 0);

1466 1467
    virResetLastError();

1468
    virCheckConnectReturn(conn, -1);
1469
    virObjectRef(conn);
1470 1471 1472
    return 0;
}

1473

D
Daniel Veillard 已提交
1474 1475
/*
 * Not for public use.  This function is part of the internal
1476 1477 1478
 * implementation of driver features in the remote case.
 */
int
1479
virConnectSupportsFeature(virConnectPtr conn, int feature)
1480
{
1481
    int ret;
1482
    VIR_DEBUG("conn=%p, feature=%d", conn, feature);
1483

1484 1485
    virResetLastError();

1486
    virCheckConnectReturn(conn, -1);
1487

1488
    if (!conn->driver->connectSupportsFeature)
1489 1490
        ret = 0;
    else
1491
        ret = conn->driver->connectSupportsFeature(conn, feature);
1492 1493

    if (ret < 0)
1494
        virDispatchError(conn);
1495

1496
    return ret;
1497 1498
}

1499

1500 1501 1502 1503
/**
 * virConnectGetType:
 * @conn: pointer to the hypervisor connection
 *
1504 1505 1506 1507 1508
 * Get the name of the Hypervisor driver used. This is merely the driver
 * name; for example, both KVM and QEMU guests are serviced by the
 * driver for the qemu:// URI, so a return of "QEMU" does not indicate
 * whether KVM acceleration is present.  For more details about the
 * hypervisor, use virConnectGetCapabilities().
1509 1510
 *
 * Returns NULL in case of error, a static zero terminated string otherwise.
1511 1512 1513
 *
 * See also:
 * http://www.redhat.com/archives/libvir-list/2007-February/msg00096.html
1514 1515
 */
const char *
1516 1517
virConnectGetType(virConnectPtr conn)
{
1518
    const char *ret;
1519
    VIR_DEBUG("conn=%p", conn);
1520

1521 1522
    virResetLastError();

1523
    virCheckConnectReturn(conn, NULL);
1524

1525 1526
    if (conn->driver->connectGetType) {
        ret = conn->driver->connectGetType(conn);
1527
        if (ret) return ret;
1528
    }
1529
    return conn->driver->name;
1530 1531
}

1532

D
Daniel Veillard 已提交
1533
/**
1534
 * virConnectGetVersion:
D
Daniel Veillard 已提交
1535
 * @conn: pointer to the hypervisor connection
1536
 * @hvVer: return value for the version of the running hypervisor (OUT)
D
Daniel Veillard 已提交
1537
 *
1538
 * Get the version level of the Hypervisor running. This may work only with
1539
 * hypervisor call, i.e. with privileged access to the hypervisor, not
1540
 * with a Read-Only connection.
D
Daniel Veillard 已提交
1541
 *
1542 1543 1544
 * Returns -1 in case of error, 0 otherwise. if the version can't be
 *    extracted by lack of capacities returns 0 and @hvVer is 0, otherwise
 *    @hvVer value is major * 1,000,000 + minor * 1,000 + release
D
Daniel Veillard 已提交
1545
 */
1546
int
1547 1548
virConnectGetVersion(virConnectPtr conn, unsigned long *hvVer)
{
1549
    VIR_DEBUG("conn=%p, hvVer=%p", conn, hvVer);
1550

1551 1552
    virResetLastError();

1553
    virCheckConnectReturn(conn, -1);
1554
    virCheckNonNullArgGoto(hvVer, error);
1555

1556 1557
    if (conn->driver->connectGetVersion) {
        int ret = conn->driver->connectGetVersion(conn, hvVer);
1558 1559 1560 1561
        if (ret < 0)
            goto error;
        return ret;
    }
D
Daniel P. Berrange 已提交
1562

1563
    virReportUnsupportedError();
1564

1565
 error:
1566
    virDispatchError(conn);
1567
    return -1;
1568 1569
}

1570

1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585
/**
 * virConnectGetLibVersion:
 * @conn: pointer to the hypervisor connection
 * @libVer: returns the libvirt library version used on the connection (OUT)
 *
 * Provides @libVer, which is the version of libvirt used by the
 *   daemon running on the @conn host
 *
 * Returns -1 in case of failure, 0 otherwise, and values for @libVer have
 *      the format major * 1,000,000 + minor * 1,000 + release.
 */
int
virConnectGetLibVersion(virConnectPtr conn, unsigned long *libVer)
{
    int ret = -1;
1586
    VIR_DEBUG("conn=%p, libVir=%p", conn, libVer);
1587 1588 1589

    virResetLastError();

1590
    virCheckConnectReturn(conn, -1);
1591
    virCheckNonNullArgGoto(libVer, error);
1592

1593 1594
    if (conn->driver->connectGetLibVersion) {
        ret = conn->driver->connectGetLibVersion(conn, libVer);
1595 1596 1597 1598 1599
        if (ret < 0)
            goto error;
        return ret;
    }

1600 1601 1602
    *libVer = LIBVIR_VERSION_NUMBER;
    return 0;

1603
 error:
1604
    virDispatchError(conn);
1605 1606 1607
    return ret;
}

1608

1609 1610 1611 1612
/**
 * virConnectGetHostname:
 * @conn: pointer to a hypervisor connection
 *
E
Eric Blake 已提交
1613 1614 1615 1616
 * This returns a system hostname on which the hypervisor is
 * running (based on the result of the gethostname system call, but
 * possibly expanded to a fully-qualified domain name via getaddrinfo).
 * If we are connected to a remote system, then this returns the
1617 1618 1619 1620 1621 1622
 * hostname of the remote system.
 *
 * Returns the hostname which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
1623
virConnectGetHostname(virConnectPtr conn)
1624
{
1625
    VIR_DEBUG("conn=%p", conn);
1626

1627 1628
    virResetLastError();

1629
    virCheckConnectReturn(conn, NULL);
1630

1631 1632
    if (conn->driver->connectGetHostname) {
        char *ret = conn->driver->connectGetHostname(conn);
1633 1634 1635 1636
        if (!ret)
            goto error;
        return ret;
    }
1637

1638
    virReportUnsupportedError();
1639

1640
 error:
1641
    virDispatchError(conn);
1642 1643 1644
    return NULL;
}

1645

1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661
/**
 * virConnectGetURI:
 * @conn: pointer to a hypervisor connection
 *
 * This returns the URI (name) of the hypervisor connection.
 * Normally this is the same as or similar to the string passed
 * to the virConnectOpen/virConnectOpenReadOnly call, but
 * the driver may make the URI canonical.  If name == NULL
 * was passed to virConnectOpen, then the driver will return
 * a non-NULL URI which can be used to connect to the same
 * hypervisor later.
 *
 * Returns the URI string which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
1662
virConnectGetURI(virConnectPtr conn)
1663
{
1664
    char *name;
1665
    VIR_DEBUG("conn=%p", conn);
1666

1667 1668
    virResetLastError();

1669
    virCheckConnectReturn(conn, NULL);
1670

1671
    if (!(name = virURIFormat(conn->uri)))
1672
        goto error;
1673

1674
    return name;
1675

1676
 error:
1677
    virDispatchError(conn);
1678
    return NULL;
1679 1680
}

1681

E
Eric Blake 已提交
1682 1683 1684
/**
 * virConnectGetSysinfo:
 * @conn: pointer to a hypervisor connection
1685
 * @flags: extra flags; not used yet, so callers should always pass 0
E
Eric Blake 已提交
1686 1687 1688 1689 1690 1691 1692 1693 1694 1695
 *
 * This returns the XML description of the sysinfo details for the
 * host on which the hypervisor is running, in the same format as the
 * <sysinfo> element of a domain XML.  This information is generally
 * available only for hypervisors running with root privileges.
 *
 * Returns the XML string which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
1696
virConnectGetSysinfo(virConnectPtr conn, unsigned int flags)
E
Eric Blake 已提交
1697
{
E
Eric Blake 已提交
1698
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
E
Eric Blake 已提交
1699 1700 1701

    virResetLastError();

1702
    virCheckConnectReturn(conn, NULL);
E
Eric Blake 已提交
1703

1704 1705
    if (conn->driver->connectGetSysinfo) {
        char *ret = conn->driver->connectGetSysinfo(conn, flags);
E
Eric Blake 已提交
1706 1707 1708 1709 1710
        if (!ret)
            goto error;
        return ret;
    }

1711
    virReportUnsupportedError();
E
Eric Blake 已提交
1712

1713
 error:
E
Eric Blake 已提交
1714 1715 1716 1717
    virDispatchError(conn);
    return NULL;
}

1718

1719 1720 1721 1722 1723
/**
 * virConnectGetMaxVcpus:
 * @conn: pointer to the hypervisor connection
 * @type: value of the 'type' attribute in the <domain> element
 *
1724
 * Provides the maximum number of virtual CPUs supported for a guest VM of a
1725 1726 1727 1728 1729 1730 1731 1732 1733
 * specific type. The 'type' parameter here corresponds to the 'type'
 * attribute in the <domain> element of the XML.
 *
 * Returns the maximum of virtual CPU or -1 in case of error.
 */
int
virConnectGetMaxVcpus(virConnectPtr conn,
                      const char *type)
{
1734
    VIR_DEBUG("conn=%p, type=%s", conn, type);
1735

1736 1737
    virResetLastError();

1738
    virCheckConnectReturn(conn, -1);
1739

1740 1741
    if (conn->driver->connectGetMaxVcpus) {
        int ret = conn->driver->connectGetMaxVcpus(conn, type);
1742 1743 1744 1745
        if (ret < 0)
            goto error;
        return ret;
    }
1746

1747
    virReportUnsupportedError();
1748
 error:
1749
    virDispatchError(conn);
1750
    return -1;
1751 1752
}

1753

1754
/**
1755
 * virConnectListDomains:
1756 1757 1758 1759
 * @conn: pointer to the hypervisor connection
 * @ids: array to collect the list of IDs of active domains
 * @maxids: size of @ids
 *
1760
 * Collect the list of active domains, and store their IDs in array @ids
1761
 *
1762 1763 1764 1765 1766 1767 1768 1769
 * For inactive domains, see virConnectListDefinedDomains().  For more
 * control over the results, see virConnectListAllDomains().
 *
 * Returns the number of domains found or -1 in case of error.  Note that
 * this command is inherently racy; a domain can be started between a
 * call to virConnectNumOfDomains() and this call; you are only guaranteed
 * that all currently active domains were listed if the return is less
 * than @maxids.
1770 1771
 */
int
1772 1773
virConnectListDomains(virConnectPtr conn, int *ids, int maxids)
{
1774
    VIR_DEBUG("conn=%p, ids=%p, maxids=%d", conn, ids, maxids);
1775

1776 1777
    virResetLastError();

1778
    virCheckConnectReturn(conn, -1);
1779 1780
    virCheckNonNullArgGoto(ids, error);
    virCheckNonNegativeArgGoto(maxids, error);
1781

1782 1783
    if (conn->driver->connectListDomains) {
        int ret = conn->driver->connectListDomains(conn, ids, maxids);
1784 1785 1786 1787
        if (ret < 0)
            goto error;
        return ret;
    }
1788

1789
    virReportUnsupportedError();
1790
 error:
1791
    virDispatchError(conn);
1792
    return -1;
D
Daniel Veillard 已提交
1793 1794
}

1795

K
 
Karel Zak 已提交
1796 1797 1798 1799
/**
 * virConnectNumOfDomains:
 * @conn: pointer to the hypervisor connection
 *
1800 1801
 * Provides the number of active domains.
 *
K
 
Karel Zak 已提交
1802 1803 1804
 * Returns the number of domain found or -1 in case of error
 */
int
1805 1806
virConnectNumOfDomains(virConnectPtr conn)
{
1807
    VIR_DEBUG("conn=%p", conn);
1808

1809 1810
    virResetLastError();

1811
    virCheckConnectReturn(conn, -1);
K
Karel Zak 已提交
1812

1813 1814
    if (conn->driver->connectNumOfDomains) {
        int ret = conn->driver->connectNumOfDomains(conn);
1815 1816 1817 1818
        if (ret < 0)
            goto error;
        return ret;
    }
1819

1820
    virReportUnsupportedError();
1821
 error:
1822
    virDispatchError(conn);
1823
    return -1;
K
 
Karel Zak 已提交
1824 1825
}

1826

1827 1828 1829 1830
/**
 * virDomainGetConnect:
 * @dom: pointer to a domain
 *
1831
 * Provides the connection pointer associated with a domain.  The
1832 1833 1834
 * reference counter on the connection is not increased by this
 * call.
 *
1835 1836 1837 1838
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the domain object together.
 *
1839 1840 1841
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
1842
virDomainGetConnect(virDomainPtr dom)
1843
{
1844
    VIR_DOMAIN_DEBUG(dom);
1845

1846 1847
    virResetLastError();

1848 1849
    virCheckDomainReturn(dom, NULL);

1850 1851 1852
    return dom->conn;
}

1853

D
Daniel Veillard 已提交
1854
/**
1855
 * virDomainCreateXML:
D
Daniel Veillard 已提交
1856
 * @conn: pointer to the hypervisor connection
D
Daniel Veillard 已提交
1857
 * @xmlDesc: string containing an XML description of the domain
1858
 * @flags: bitwise-OR of supported virDomainCreateFlags
D
Daniel Veillard 已提交
1859
 *
1860
 * Launch a new guest domain, based on an XML description similar
1861
 * to the one returned by virDomainGetXMLDesc()
1862
 * This function may require privileged access to the hypervisor.
1863 1864 1865
 * The domain is not persistent, so its definition will disappear when it
 * is destroyed, or if the host is restarted (see virDomainDefineXML() to
 * define persistent domains).
1866
 *
1867 1868 1869 1870 1871 1872 1873
 * If the VIR_DOMAIN_START_PAUSED flag is set, the guest domain
 * will be started, but its CPUs will remain paused. The CPUs
 * can later be manually started using virDomainResume.
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
E
Eric Blake 已提交
1874
 * client application crashes / loses its connection to the
1875
 * libvirtd daemon. Any domains marked for auto destroy will
1876
 * block attempts at migration, save-to-file, or snapshots.
1877
 *
D
Daniel Veillard 已提交
1878 1879
 * Returns a new domain object or NULL in case of failure
 */
1880
virDomainPtr
1881 1882
virDomainCreateXML(virConnectPtr conn, const char *xmlDesc,
                   unsigned int flags)
1883
{
1884
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
1885

1886 1887
    virResetLastError();

1888
    virCheckConnectReturn(conn, NULL);
1889
    virCheckNonNullArgGoto(xmlDesc, error);
1890
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
1891

1892 1893
    if (conn->driver->domainCreateXML) {
        virDomainPtr ret;
1894
        ret = conn->driver->domainCreateXML(conn, xmlDesc, flags);
1895 1896 1897 1898
        if (!ret)
            goto error;
        return ret;
    }
1899

1900
    virReportUnsupportedError();
1901
 error:
1902
    virDispatchError(conn);
1903
    return NULL;
D
Daniel Veillard 已提交
1904 1905
}

1906

1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952
/**
 * virDomainCreateXMLWithFiles:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: string containing an XML description of the domain
 * @nfiles: number of file descriptors passed
 * @files: list of file descriptors passed
 * @flags: bitwise-OR of supported virDomainCreateFlags
 *
 * Launch a new guest domain, based on an XML description similar
 * to the one returned by virDomainGetXMLDesc()
 * This function may require privileged access to the hypervisor.
 * The domain is not persistent, so its definition will disappear when it
 * is destroyed, or if the host is restarted (see virDomainDefineXML() to
 * define persistent domains).
 *
 * @files provides an array of file descriptors which will be
 * made available to the 'init' process of the guest. The file
 * handles exposed to the guest will be renumbered to start
 * from 3 (ie immediately following stderr). This is only
 * supported for guests which use container based virtualization
 * technology.
 *
 * If the VIR_DOMAIN_START_PAUSED flag is set, the guest domain
 * will be started, but its CPUs will remain paused. The CPUs
 * can later be manually started using virDomainResume.
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
 * client application crashes / loses its connection to the
 * libvirtd daemon. Any domains marked for auto destroy will
 * block attempts at migration, save-to-file, or snapshots.
 *
 * Returns a new domain object or NULL in case of failure
 */
virDomainPtr
virDomainCreateXMLWithFiles(virConnectPtr conn, const char *xmlDesc,
                            unsigned int nfiles,
                            int *files,
                            unsigned int flags)
{
    VIR_DEBUG("conn=%p, xmlDesc=%s, nfiles=%u, files=%p, flags=%x",
              conn, xmlDesc, nfiles, files, flags);

    virResetLastError();

1953
    virCheckConnectReturn(conn, NULL);
1954
    virCheckNonNullArgGoto(xmlDesc, error);
1955
    virCheckReadOnlyGoto(conn->flags, error);
1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966

    if (conn->driver->domainCreateXMLWithFiles) {
        virDomainPtr ret;
        ret = conn->driver->domainCreateXMLWithFiles(conn, xmlDesc,
                                                     nfiles, files,
                                                     flags);
        if (!ret)
            goto error;
        return ret;
    }

1967
    virReportUnsupportedError();
1968
 error:
1969 1970 1971 1972
    virDispatchError(conn);
    return NULL;
}

1973

1974 1975 1976 1977
/**
 * virDomainCreateLinux:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: string containing an XML description of the domain
1978
 * @flags: extra flags; not used yet, so callers should always pass 0
1979 1980 1981
 *
 * Deprecated after 0.4.6.
 * Renamed to virDomainCreateXML() providing identical functionality.
1982
 * This existing name will left indefinitely for API compatibility.
1983 1984 1985 1986 1987 1988 1989
 *
 * Returns a new domain object or NULL in case of failure
 */
virDomainPtr
virDomainCreateLinux(virConnectPtr conn, const char *xmlDesc,
                     unsigned int flags)
{
1990
    return virDomainCreateXML(conn, xmlDesc, flags);
1991
}
1992

1993

1994
/**
1995
 * virDomainLookupByID:
1996 1997 1998 1999
 * @conn: pointer to the hypervisor connection
 * @id: the domain ID number
 *
 * Try to find a domain based on the hypervisor ID number
D
Daniel Veillard 已提交
2000 2001
 * Note that this won't work for inactive domains which have an ID of -1,
 * in that case a lookup based on the Name or UUId need to be done instead.
2002
 *
2003 2004
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
2005
 */
2006
virDomainPtr
2007 2008
virDomainLookupByID(virConnectPtr conn, int id)
{
2009
    VIR_DEBUG("conn=%p, id=%d", conn, id);
2010

2011 2012
    virResetLastError();

2013
    virCheckConnectReturn(conn, NULL);
2014
    virCheckNonNegativeArgGoto(id, error);
2015

2016 2017
    if (conn->driver->domainLookupByID) {
        virDomainPtr ret;
2018
        ret = conn->driver->domainLookupByID(conn, id);
2019 2020 2021 2022
        if (!ret)
            goto error;
        return ret;
    }
2023

2024
    virReportUnsupportedError();
2025

2026
 error:
2027
    virDispatchError(conn);
2028
    return NULL;
2029 2030
}

2031

2032 2033 2034
/**
 * virDomainLookupByUUID:
 * @conn: pointer to the hypervisor connection
K
Karel Zak 已提交
2035
 * @uuid: the raw UUID for the domain
2036 2037 2038
 *
 * Try to lookup a domain on the given hypervisor based on its UUID.
 *
2039 2040
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
2041 2042
 */
virDomainPtr
2043 2044
virDomainLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
{
2045
    VIR_UUID_DEBUG(conn, uuid);
2046

2047 2048
    virResetLastError();

2049
    virCheckConnectReturn(conn, NULL);
2050
    virCheckNonNullArgGoto(uuid, error);
2051

2052 2053
    if (conn->driver->domainLookupByUUID) {
        virDomainPtr ret;
2054
        ret = conn->driver->domainLookupByUUID(conn, uuid);
2055 2056 2057 2058
        if (!ret)
            goto error;
        return ret;
    }
2059

2060
    virReportUnsupportedError();
2061

2062
 error:
2063
    virDispatchError(conn);
2064
    return NULL;
2065 2066
}

2067

K
Karel Zak 已提交
2068 2069 2070 2071 2072 2073 2074
/**
 * virDomainLookupByUUIDString:
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the domain
 *
 * Try to lookup a domain on the given hypervisor based on its UUID.
 *
2075 2076
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
K
Karel Zak 已提交
2077 2078 2079 2080
 */
virDomainPtr
virDomainLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
2081
    unsigned char uuid[VIR_UUID_BUFLEN];
2082
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
2083

2084 2085
    virResetLastError();

2086
    virCheckConnectReturn(conn, NULL);
2087
    virCheckNonNullArgGoto(uuidstr, error);
2088 2089

    if (virUUIDParse(uuidstr, uuid) < 0) {
2090 2091 2092
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
2093
        goto error;
K
Karel Zak 已提交
2094
    }
2095

K
Karel Zak 已提交
2096
    return virDomainLookupByUUID(conn, &uuid[0]);
2097

2098
 error:
2099
    virDispatchError(conn);
2100
    return NULL;
K
Karel Zak 已提交
2101 2102
}

2103

2104 2105 2106 2107 2108
/**
 * virDomainLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the domain
 *
2109
 * Try to lookup a domain on the given hypervisor based on its name.
2110
 *
2111 2112
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
2113 2114
 */
virDomainPtr
2115 2116
virDomainLookupByName(virConnectPtr conn, const char *name)
{
2117
    VIR_DEBUG("conn=%p, name=%s", conn, name);
2118

2119 2120
    virResetLastError();

2121
    virCheckConnectReturn(conn, NULL);
2122
    virCheckNonNullArgGoto(name, error);
2123

2124 2125
    if (conn->driver->domainLookupByName) {
        virDomainPtr dom;
2126
        dom = conn->driver->domainLookupByName(conn, name);
2127 2128 2129 2130
        if (!dom)
            goto error;
        return dom;
    }
2131

2132
    virReportUnsupportedError();
2133

2134
 error:
2135
    virDispatchError(conn);
2136
    return NULL;
2137 2138
}

2139

D
Daniel Veillard 已提交
2140
/**
2141
 * virDomainDestroy:
D
Daniel Veillard 已提交
2142 2143 2144
 * @domain: a domain object
 *
 * Destroy the domain object. The running instance is shutdown if not down
2145 2146
 * already and all resources used by it are given back to the hypervisor. This
 * does not free the associated virDomainPtr object.
2147
 * This function may require privileged access.
D
Daniel Veillard 已提交
2148
 *
2149 2150
 * virDomainDestroy first requests that a guest terminate
 * (e.g. SIGTERM), then waits for it to comply. After a reasonable
2151
 * timeout, if the guest still exists, virDomainDestroy will
2152 2153 2154 2155 2156 2157
 * forcefully terminate the guest (e.g. SIGKILL) if necessary (which
 * may produce undesirable results, for example unflushed disk cache
 * in the guest). To avoid this possibility, it's recommended to
 * instead call virDomainDestroyFlags, sending the
 * VIR_DOMAIN_DESTROY_GRACEFUL flag.
 *
2158 2159 2160 2161
 * If the domain is transient and has any snapshot metadata (see
 * virDomainSnapshotNum()), then that metadata will automatically
 * be deleted when the domain quits.
 *
D
Daniel Veillard 已提交
2162
 * Returns 0 in case of success and -1 in case of failure.
2163
 */
D
Daniel Veillard 已提交
2164
int
2165 2166
virDomainDestroy(virDomainPtr domain)
{
2167
    virConnectPtr conn;
2168

2169
    VIR_DOMAIN_DEBUG(domain);
2170

2171 2172
    virResetLastError();

2173
    virCheckDomainReturn(domain, -1);
2174
    conn = domain->conn;
2175

2176
    virCheckReadOnlyGoto(conn->flags, error);
2177

2178 2179
    if (conn->driver->domainDestroy) {
        int ret;
2180
        ret = conn->driver->domainDestroy(domain);
2181 2182 2183 2184
        if (ret < 0)
            goto error;
        return ret;
    }
2185

2186
    virReportUnsupportedError();
2187

2188
 error:
2189
    virDispatchError(conn);
2190
    return -1;
2191 2192
}

2193

2194 2195 2196
/**
 * virDomainDestroyFlags:
 * @domain: a domain object
2197
 * @flags: bitwise-OR of virDomainDestroyFlagsValues
2198 2199 2200 2201 2202 2203
 *
 * Destroy the domain object. The running instance is shutdown if not down
 * already and all resources used by it are given back to the hypervisor.
 * This does not free the associated virDomainPtr object.
 * This function may require privileged access.
 *
2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219
 * Calling this function with no @flags set (equal to zero) is
 * equivalent to calling virDomainDestroy, and after a reasonable
 * timeout will forcefully terminate the guest (e.g. SIGKILL) if
 * necessary (which may produce undesirable results, for example
 * unflushed disk cache in the guest). Including
 * VIR_DOMAIN_DESTROY_GRACEFUL in the flags will prevent the forceful
 * termination of the guest, and virDomainDestroyFlags will instead
 * return an error if the guest doesn't terminate by the end of the
 * timeout; at that time, the management application can decide if
 * calling again without VIR_DOMAIN_DESTROY_GRACEFUL is appropriate.
 *
 * Another alternative which may produce cleaner results for the
 * guest's disks is to use virDomainShutdown() instead, but that
 * depends on guest support (some hypervisor/guest combinations may
 * ignore the shutdown request).
 *
2220 2221 2222 2223 2224 2225 2226 2227 2228
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainDestroyFlags(virDomainPtr domain,
                      unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
2229
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
2230 2231 2232

    virResetLastError();

2233
    virCheckDomainReturn(domain, -1);
2234
    conn = domain->conn;
2235

2236
    virCheckReadOnlyGoto(conn->flags, error);
2237 2238 2239 2240 2241 2242 2243 2244 2245

    if (conn->driver->domainDestroyFlags) {
        int ret;
        ret = conn->driver->domainDestroyFlags(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

2246
    virReportUnsupportedError();
2247

2248
 error:
2249 2250 2251 2252
    virDispatchError(conn);
    return -1;
}

2253

2254 2255 2256 2257 2258 2259 2260 2261 2262 2263
/**
 * virDomainFree:
 * @domain: a domain object
 *
 * Free the domain object. The running instance is kept alive.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2264 2265
virDomainFree(virDomainPtr domain)
{
2266
    VIR_DOMAIN_DEBUG(domain);
2267

2268 2269
    virResetLastError();

2270 2271
    virCheckDomainReturn(domain, -1);

2272
    virObjectUnref(domain);
2273
    return 0;
D
Daniel Veillard 已提交
2274 2275
}

2276

2277 2278
/**
 * virDomainRef:
D
Daniel Veillard 已提交
2279
 * @domain: the domain to hold a reference on
2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290
 *
 * Increment the reference count on the domain. For each
 * additional call to this method, there shall be a corresponding
 * call to virDomainFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a domain would increment
 * the reference count.
D
Daniel Veillard 已提交
2291 2292
 *
 * Returns 0 in case of success and -1 in case of failure.
2293 2294 2295 2296
 */
int
virDomainRef(virDomainPtr domain)
{
2297 2298
    VIR_DOMAIN_DEBUG(domain, "refs=%d", domain ? domain->object.u.s.refs : 0);

2299 2300
    virResetLastError();

2301
    virCheckDomainReturn(domain, -1);
2302 2303

    virObjectRef(domain);
2304 2305 2306 2307
    return 0;
}


D
Daniel Veillard 已提交
2308
/**
2309
 * virDomainSuspend:
D
Daniel Veillard 已提交
2310 2311 2312
 * @domain: a domain object
 *
 * Suspends an active domain, the process is frozen without further access
2313
 * to CPU resources and I/O but the memory used by the domain at the
2314
 * hypervisor level will stay allocated. Use virDomainResume() to reactivate
D
Daniel Veillard 已提交
2315
 * the domain.
2316
 * This function may require privileged access.
2317 2318
 * Moreover, suspend may not be supported if domain is in some
 * special state like VIR_DOMAIN_PMSUSPENDED.
D
Daniel Veillard 已提交
2319 2320 2321 2322
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2323 2324
virDomainSuspend(virDomainPtr domain)
{
2325
    virConnectPtr conn;
2326

2327
    VIR_DOMAIN_DEBUG(domain);
2328

2329 2330
    virResetLastError();

2331
    virCheckDomainReturn(domain, -1);
2332 2333
    conn = domain->conn;

2334 2335
    virCheckReadOnlyGoto(conn->flags, error);

2336 2337
    if (conn->driver->domainSuspend) {
        int ret;
2338
        ret = conn->driver->domainSuspend(domain);
2339 2340 2341 2342
        if (ret < 0)
            goto error;
        return ret;
    }
2343

2344
    virReportUnsupportedError();
2345

2346
 error:
2347
    virDispatchError(domain->conn);
2348
    return -1;
D
Daniel Veillard 已提交
2349 2350
}

2351

D
Daniel Veillard 已提交
2352
/**
2353
 * virDomainResume:
D
Daniel Veillard 已提交
2354 2355
 * @domain: a domain object
 *
D
Dan Kenigsberg 已提交
2356
 * Resume a suspended domain, the process is restarted from the state where
2357
 * it was frozen by calling virDomainSuspend().
2358
 * This function may require privileged access
2359 2360
 * Moreover, resume may not be supported if domain is in some
 * special state like VIR_DOMAIN_PMSUSPENDED.
D
Daniel Veillard 已提交
2361 2362 2363 2364
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2365 2366
virDomainResume(virDomainPtr domain)
{
2367
    virConnectPtr conn;
2368

2369
    VIR_DOMAIN_DEBUG(domain);
2370

2371 2372
    virResetLastError();

2373
    virCheckDomainReturn(domain, -1);
2374 2375
    conn = domain->conn;

2376 2377
    virCheckReadOnlyGoto(conn->flags, error);

2378 2379
    if (conn->driver->domainResume) {
        int ret;
2380
        ret = conn->driver->domainResume(domain);
2381 2382 2383 2384
        if (ret < 0)
            goto error;
        return ret;
    }
2385

2386
    virReportUnsupportedError();
2387

2388
 error:
2389
    virDispatchError(domain->conn);
2390
    return -1;
D
Daniel Veillard 已提交
2391 2392
}

2393

2394 2395 2396
/**
 * virDomainPMSuspendForDuration:
 * @dom: a domain object
2397 2398 2399
 * @target: a value from virNodeSuspendTarget
 * @duration: duration in seconds to suspend, or 0 for indefinite
 * @flags: extra flags; not used yet, so callers should always pass 0
2400
 *
2401 2402 2403 2404 2405
 * Attempt to have the guest enter the given @target power management
 * suspension level.  If @duration is non-zero, also schedule the guest to
 * resume normal operation after that many seconds, if nothing else has
 * resumed it earlier.  Some hypervisors require that @duration be 0, for
 * an indefinite suspension.
2406
 *
2407
 * Dependent on hypervisor used, this may require a
2408 2409
 * guest agent to be available, e.g. QEMU.
 *
2410 2411 2412 2413 2414 2415 2416
 * Beware that at least for QEMU, the domain's process will be terminated
 * when VIR_NODE_SUSPEND_TARGET_DISK is used and a new process will be
 * launched when libvirt is asked to wake up the domain. As a result of
 * this, any runtime changes, such as device hotplug or memory settings,
 * are lost unless such changes were made with VIR_DOMAIN_AFFECT_CONFIG
 * flag.
 *
2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432
 * Returns: 0 on success,
 *          -1 on failure.
 */
int
virDomainPMSuspendForDuration(virDomainPtr dom,
                              unsigned int target,
                              unsigned long long duration,
                              unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "target=%u duration=%llu flags=%x",
                     target, duration, flags);

    virResetLastError();

2433
    virCheckDomainReturn(dom, -1);
2434 2435
    conn = dom->conn;

2436
    virCheckReadOnlyGoto(conn->flags, error);
2437 2438 2439 2440 2441 2442 2443 2444 2445 2446

    if (conn->driver->domainPMSuspendForDuration) {
        int ret;
        ret = conn->driver->domainPMSuspendForDuration(dom, target,
                                                       duration, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

2447
    virReportUnsupportedError();
2448

2449
 error:
2450 2451 2452 2453
    virDispatchError(conn);
    return -1;
}

2454

2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476
/**
 * virDomainPMWakeup:
 * @dom: a domain object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Inject a wakeup into the guest that previously used
 * virDomainPMSuspendForDuration, rather than waiting for the
 * previously requested duration (if any) to elapse.
 *
 * Returns: 0 on success,
 *          -1 on failure.
 */
int
virDomainPMWakeup(virDomainPtr dom,
                  unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);

    virResetLastError();

2477
    virCheckDomainReturn(dom, -1);
2478 2479
    conn = dom->conn;

2480
    virCheckReadOnlyGoto(conn->flags, error);
2481 2482 2483 2484 2485 2486 2487 2488 2489

    if (conn->driver->domainPMWakeup) {
        int ret;
        ret = conn->driver->domainPMWakeup(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

2490
    virReportUnsupportedError();
2491

2492
 error:
2493 2494 2495 2496
    virDispatchError(conn);
    return -1;
}

2497

2498 2499 2500 2501 2502 2503
/**
 * virDomainSave:
 * @domain: a domain object
 * @to: path for the output file
 *
 * This method will suspend a domain and save its memory contents to
2504
 * a file on disk. After the call, if successful, the domain is not
2505
 * listed as running anymore (this ends the life of a transient domain).
2506
 * Use virDomainRestore() to restore a domain after saving.
2507
 *
2508 2509 2510
 * See virDomainSaveFlags() for more control.  Also, a save file can
 * be inspected or modified slightly with virDomainSaveImageGetXMLDesc()
 * and virDomainSaveImageDefineXML().
2511
 *
2512 2513 2514
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2515 2516
virDomainSave(virDomainPtr domain, const char *to)
{
2517
    virConnectPtr conn;
2518 2519

    VIR_DOMAIN_DEBUG(domain, "to=%s", to);
2520

2521 2522
    virResetLastError();

2523
    virCheckDomainReturn(domain, -1);
2524
    conn = domain->conn;
2525 2526

    virCheckReadOnlyGoto(conn->flags, error);
2527
    virCheckNonNullArgGoto(to, error);
2528

2529 2530 2531
    if (conn->driver->domainSave) {
        int ret;
        char *absolute_to;
2532

2533 2534
        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
2535 2536
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute output file path"));
2537 2538
            goto error;
        }
2539

2540 2541 2542
        ret = conn->driver->domainSave(domain, absolute_to);

        VIR_FREE(absolute_to);
2543

2544 2545 2546 2547
        if (ret < 0)
            goto error;
        return ret;
    }
2548

2549
    virReportUnsupportedError();
2550

2551
 error:
2552
    virDispatchError(domain->conn);
2553
    return -1;
2554 2555
}

2556

2557 2558 2559 2560 2561 2562 2563 2564 2565
/**
 * virDomainSaveFlags:
 * @domain: a domain object
 * @to: path for the output file
 * @dxml: (optional) XML config for adjusting guest xml used on restore
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
 *
 * This method will suspend a domain and save its memory contents to
 * a file on disk. After the call, if successful, the domain is not
2566
 * listed as running anymore (this ends the life of a transient domain).
2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579 2580
 * Use virDomainRestore() to restore a domain after saving.
 *
 * If the hypervisor supports it, @dxml can be used to alter
 * host-specific portions of the domain XML that will be used when
 * restoring an image.  For example, it is possible to alter the
 * backing filename that is associated with a disk device, in order to
 * prepare for file renaming done as part of backing up the disk
 * device while the domain is stopped.
 *
 * If @flags includes VIR_DOMAIN_SAVE_BYPASS_CACHE, then libvirt will
 * attempt to bypass the file system cache while creating the file, or
 * fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
2581 2582 2583 2584 2585 2586
 * Normally, the saved state file will remember whether the domain was
 * running or paused, and restore defaults to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override what state gets saved into the file.  These
 * two flags are mutually exclusive.
 *
2587 2588 2589
 * A save file can be inspected or modified slightly with
 * virDomainSaveImageGetXMLDesc() and virDomainSaveImageDefineXML().
 *
E
Eric Blake 已提交
2590 2591 2592 2593
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation; in that case, use virDomainBlockJobAbort()
 * to stop the block copy first.
 *
2594 2595 2596 2597 2598 2599 2600 2601
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSaveFlags(virDomainPtr domain, const char *to,
                   const char *dxml, unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
2602
    VIR_DOMAIN_DEBUG(domain, "to=%s, dxml=%s, flags=%x",
2603 2604 2605 2606
                     to, NULLSTR(dxml), flags);

    virResetLastError();

2607
    virCheckDomainReturn(domain, -1);
2608
    conn = domain->conn;
2609 2610

    virCheckReadOnlyGoto(conn->flags, error);
2611
    virCheckNonNullArgGoto(to, error);
2612

2613
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
2614
        virReportInvalidArg(flags, "%s",
2615 2616
                            _("running and paused flags are mutually "
                              "exclusive"));
2617 2618 2619
        goto error;
    }

2620 2621 2622 2623 2624 2625
    if (conn->driver->domainSaveFlags) {
        int ret;
        char *absolute_to;

        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
2626 2627
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute output file path"));
2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639
            goto error;
        }

        ret = conn->driver->domainSaveFlags(domain, absolute_to, dxml, flags);

        VIR_FREE(absolute_to);

        if (ret < 0)
            goto error;
        return ret;
    }

2640
    virReportUnsupportedError();
2641

2642
 error:
2643 2644 2645 2646
    virDispatchError(domain->conn);
    return -1;
}

2647

2648 2649
/**
 * virDomainRestore:
2650
 * @conn: pointer to the hypervisor connection
2651
 * @from: path to the input file
2652 2653 2654
 *
 * This method will restore a domain saved to disk by virDomainSave().
 *
2655 2656
 * See virDomainRestoreFlags() for more control.
 *
2657 2658 2659
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2660 2661
virDomainRestore(virConnectPtr conn, const char *from)
{
2662
    VIR_DEBUG("conn=%p, from=%s", conn, from);
2663

2664 2665
    virResetLastError();

2666
    virCheckConnectReturn(conn, -1);
2667
    virCheckReadOnlyGoto(conn->flags, error);
2668
    virCheckNonNullArgGoto(from, error);
D
Daniel Veillard 已提交
2669

2670 2671 2672
    if (conn->driver->domainRestore) {
        int ret;
        char *absolute_from;
2673

2674 2675
        /* We must absolutize the file path as the restore is done out of process */
        if (virFileAbsPath(from, &absolute_from) < 0) {
2676 2677
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2678 2679
            goto error;
        }
2680

2681 2682 2683 2684
        ret = conn->driver->domainRestore(conn, absolute_from);

        VIR_FREE(absolute_from);

2685 2686 2687 2688
        if (ret < 0)
            goto error;
        return ret;
    }
2689

2690
    virReportUnsupportedError();
2691

2692
 error:
2693
    virDispatchError(conn);
2694
    return -1;
D
Daniel Veillard 已提交
2695 2696
}

2697

2698 2699 2700 2701 2702 2703 2704 2705 2706 2707 2708 2709 2710 2711 2712 2713 2714 2715 2716
/**
 * virDomainRestoreFlags:
 * @conn: pointer to the hypervisor connection
 * @from: path to the input file
 * @dxml: (optional) XML config for adjusting guest xml used on restore
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
 *
 * This method will restore a domain saved to disk by virDomainSave().
 *
 * If the hypervisor supports it, @dxml can be used to alter
 * host-specific portions of the domain XML that will be used when
 * restoring an image.  For example, it is possible to alter the
 * backing filename that is associated with a disk device, in order to
 * prepare for file renaming done as part of backing up the disk
 * device while the domain is stopped.
 *
 * If @flags includes VIR_DOMAIN_SAVE_BYPASS_CACHE, then libvirt will
 * attempt to bypass the file system cache while restoring the file, or
 * fail if it cannot do so for the given system; this can allow less
2717
 * pressure on file system cache, but also risks slowing restores from NFS.
2718
 *
2719 2720 2721 2722 2723 2724
 * Normally, the saved state file will remember whether the domain was
 * running or paused, and restore defaults to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override the default read from the file.  These two
 * flags are mutually exclusive.
 *
2725 2726 2727 2728
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainRestoreFlags(virConnectPtr conn, const char *from, const char *dxml,
2729
                      unsigned int flags)
2730 2731 2732 2733 2734 2735
{
    VIR_DEBUG("conn=%p, from=%s, dxml=%s, flags=%x",
              conn, from, NULLSTR(dxml), flags);

    virResetLastError();

2736
    virCheckConnectReturn(conn, -1);
2737
    virCheckReadOnlyGoto(conn->flags, error);
2738
    virCheckNonNullArgGoto(from, error);
2739

2740
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
2741
        virReportInvalidArg(flags, "%s",
2742 2743
                            _("running and paused flags are mutually "
                              "exclusive"));
2744 2745 2746
        goto error;
    }

2747 2748 2749 2750 2751 2752
    if (conn->driver->domainRestoreFlags) {
        int ret;
        char *absolute_from;

        /* We must absolutize the file path as the restore is done out of process */
        if (virFileAbsPath(from, &absolute_from) < 0) {
2753 2754
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767
            goto error;
        }

        ret = conn->driver->domainRestoreFlags(conn, absolute_from, dxml,
                                               flags);

        VIR_FREE(absolute_from);

        if (ret < 0)
            goto error;
        return ret;
    }

2768
    virReportUnsupportedError();
2769

2770
 error:
2771 2772 2773 2774
    virDispatchError(conn);
    return -1;
}

2775

2776 2777 2778 2779 2780 2781 2782 2783 2784 2785 2786 2787 2788 2789 2790 2791 2792 2793 2794 2795 2796 2797 2798 2799 2800 2801 2802
/**
 * virDomainSaveImageGetXMLDesc:
 * @conn: pointer to the hypervisor connection
 * @file: path to saved state file
 * @flags: bitwise-OR of subset of virDomainXMLFlags
 *
 * This method will extract the XML describing the domain at the time
 * a saved state file was created.  @file must be a file created
 * previously by virDomainSave() or virDomainSaveFlags().
 *
 * No security-sensitive data will be included unless @flags contains
 * VIR_DOMAIN_XML_SECURE; this flag is rejected on read-only
 * connections.  For this API, @flags should not contain either
 * VIR_DOMAIN_XML_INACTIVE or VIR_DOMAIN_XML_UPDATE_CPU.
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of
 * error.  The caller must free() the returned value.
 */
char *
virDomainSaveImageGetXMLDesc(virConnectPtr conn, const char *file,
                             unsigned int flags)
{
    VIR_DEBUG("conn=%p, file=%s, flags=%x",
              conn, file, flags);

    virResetLastError();

2803
    virCheckConnectReturn(conn, NULL);
2804
    virCheckNonNullArgGoto(file, error);
2805 2806

    if ((conn->flags & VIR_CONNECT_RO) && (flags & VIR_DOMAIN_XML_SECURE)) {
2807 2808
        virReportError(VIR_ERR_OPERATION_DENIED, "%s",
                       _("virDomainSaveImageGetXMLDesc with secure flag"));
2809 2810 2811 2812 2813 2814 2815 2816 2817
        goto error;
    }

    if (conn->driver->domainSaveImageGetXMLDesc) {
        char *ret;
        char *absolute_file;

        /* We must absolutize the file path as the read is done out of process */
        if (virFileAbsPath(file, &absolute_file) < 0) {
2818 2819
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2820 2821 2822 2823 2824 2825 2826 2827 2828 2829 2830 2831 2832
            goto error;
        }

        ret = conn->driver->domainSaveImageGetXMLDesc(conn, absolute_file,
                                                      flags);

        VIR_FREE(absolute_file);

        if (!ret)
            goto error;
        return ret;
    }

2833
    virReportUnsupportedError();
2834

2835
 error:
2836 2837 2838 2839
    virDispatchError(conn);
    return NULL;
}

2840

2841 2842 2843 2844 2845
/**
 * virDomainSaveImageDefineXML:
 * @conn: pointer to the hypervisor connection
 * @file: path to saved state file
 * @dxml: XML config for adjusting guest xml used on restore
2846
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
2847 2848 2849 2850 2851 2852 2853 2854 2855 2856 2857
 *
 * This updates the definition of a domain stored in a saved state
 * file.  @file must be a file created previously by virDomainSave()
 * or virDomainSaveFlags().
 *
 * @dxml can be used to alter host-specific portions of the domain XML
 * that will be used when restoring an image.  For example, it is
 * possible to alter the backing filename that is associated with a
 * disk device, to match renaming done as part of backing up the disk
 * device while the domain is stopped.
 *
2858 2859 2860 2861 2862 2863 2864
 * Normally, the saved state file will remember whether the domain was
 * running or paused, and restore defaults to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override the default saved into the file; omitting both
 * leaves the file's default unchanged.  These two flags are mutually
 * exclusive.
 *
2865 2866 2867 2868 2869 2870 2871 2872 2873 2874 2875
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSaveImageDefineXML(virConnectPtr conn, const char *file,
                            const char *dxml, unsigned int flags)
{
    VIR_DEBUG("conn=%p, file=%s, dxml=%s, flags=%x",
              conn, file, dxml, flags);

    virResetLastError();

2876
    virCheckConnectReturn(conn, -1);
2877
    virCheckReadOnlyGoto(conn->flags, error);
2878 2879
    virCheckNonNullArgGoto(file, error);
    virCheckNonNullArgGoto(dxml, error);
2880

2881
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
2882
        virReportInvalidArg(flags, "%s",
2883 2884
                            _("running and paused flags are mutually "
                              "exclusive"));
2885 2886 2887
        goto error;
    }

2888 2889 2890 2891 2892 2893
    if (conn->driver->domainSaveImageDefineXML) {
        int ret;
        char *absolute_file;

        /* We must absolutize the file path as the read is done out of process */
        if (virFileAbsPath(file, &absolute_file) < 0) {
2894 2895
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2896 2897 2898 2899 2900 2901 2902 2903 2904 2905 2906 2907 2908
            goto error;
        }

        ret = conn->driver->domainSaveImageDefineXML(conn, absolute_file,
                                                     dxml, flags);

        VIR_FREE(absolute_file);

        if (ret < 0)
            goto error;
        return ret;
    }

2909
    virReportUnsupportedError();
2910

2911
 error:
2912 2913 2914 2915
    virDispatchError(conn);
    return -1;
}

2916

D
Daniel Veillard 已提交
2917 2918 2919 2920
/**
 * virDomainCoreDump:
 * @domain: a domain object
 * @to: path for the core file
2921
 * @flags: bitwise-OR of virDomainCoreDumpFlags
D
Daniel Veillard 已提交
2922 2923 2924
 *
 * This method will dump the core of a domain on a given file for analysis.
 * Note that for remote Xen Daemon the file path will be interpreted in
2925 2926
 * the remote host. Hypervisors may require  the user to manually ensure
 * proper permissions on the file named by @to.
D
Daniel Veillard 已提交
2927
 *
2928 2929 2930 2931
 * If @flags includes VIR_DUMP_CRASH, then leave the guest shut off with
 * a crashed state after the dump completes.  If @flags includes
 * VIR_DUMP_LIVE, then make the core dump while continuing to allow
 * the guest to run; otherwise, the guest is suspended during the dump.
2932 2933
 * VIR_DUMP_RESET flag forces reset of the quest after dump.
 * The above three flags are mutually exclusive.
2934 2935 2936 2937 2938 2939
 *
 * Additionally, if @flags includes VIR_DUMP_BYPASS_CACHE, then libvirt
 * will attempt to bypass the file system cache while creating the file,
 * or fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
2940 2941
 * For more control over the output format, see virDomainCoreDumpWithFormat().
 *
D
Daniel Veillard 已提交
2942 2943 2944
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2945
virDomainCoreDump(virDomainPtr domain, const char *to, unsigned int flags)
D
Daniel Veillard 已提交
2946 2947
{
    virConnectPtr conn;
2948

2949
    VIR_DOMAIN_DEBUG(domain, "to=%s, flags=%x", to, flags);
D
Daniel Veillard 已提交
2950

2951 2952
    virResetLastError();

2953
    virCheckDomainReturn(domain, -1);
D
Daniel Veillard 已提交
2954
    conn = domain->conn;
2955 2956

    virCheckReadOnlyGoto(conn->flags, error);
2957
    virCheckNonNullArgGoto(to, error);
D
Daniel Veillard 已提交
2958

2959
    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_LIVE)) {
2960 2961
        virReportInvalidArg(flags, "%s",
                            _("crash and live flags are mutually exclusive"));
2962 2963 2964
        goto error;
    }

2965
    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_RESET)) {
2966
        virReportInvalidArg(flags, "%s",
2967 2968 2969 2970 2971
                         _("crash and reset flags are mutually exclusive"));
        goto error;
    }

    if ((flags & VIR_DUMP_LIVE) && (flags & VIR_DUMP_RESET)) {
2972 2973
        virReportInvalidArg(flags, "%s",
                            _("live and reset flags are mutually exclusive"));
2974 2975 2976
        goto error;
    }

2977 2978 2979
    if (conn->driver->domainCoreDump) {
        int ret;
        char *absolute_to;
D
Daniel Veillard 已提交
2980

2981 2982
        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
2983 2984
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute core file path"));
2985 2986
            goto error;
        }
D
Daniel Veillard 已提交
2987

2988 2989 2990
        ret = conn->driver->domainCoreDump(domain, absolute_to, flags);

        VIR_FREE(absolute_to);
D
Daniel Veillard 已提交
2991

2992 2993 2994 2995
        if (ret < 0)
            goto error;
        return ret;
    }
2996

2997
    virReportUnsupportedError();
2998

2999
 error:
3000
    virDispatchError(domain->conn);
3001
    return -1;
3002 3003
}

3004 3005 3006 3007 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 3029 3030 3031 3032 3033 3034 3035 3036 3037 3038 3039 3040 3041 3042 3043 3044 3045 3046 3047 3048 3049 3050 3051 3052 3053 3054 3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065 3066 3067 3068 3069 3070 3071 3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097
/**
 * virDomainCoreDumpWithFormat:
 * @domain: a domain object
 * @to: path for the core file
 * @dumpformat: format of domain memory's dump
 * @flags: bitwise-OR of virDomainCoreDumpFlags
 *
 * This method will dump the core of a domain on a given file for analysis.
 * Note that for remote Xen Daemon the file path will be interpreted in
 * the remote host. Hypervisors may require  the user to manually ensure
 * proper permissions on the file named by @to.
 *
 * @dumpformat controls which format the dump will have; use of
 * VIR_DOMAIN_CORE_DUMP_FORMAT_RAW mirrors what virDomainCoreDump() will
 * perform.  Not all hypervisors are able to support all formats.
 *
 * If @flags includes VIR_DUMP_CRASH, then leave the guest shut off with
 * a crashed state after the dump completes.  If @flags includes
 * VIR_DUMP_LIVE, then make the core dump while continuing to allow
 * the guest to run; otherwise, the guest is suspended during the dump.
 * VIR_DUMP_RESET flag forces reset of the quest after dump.
 * The above three flags are mutually exclusive.
 *
 * Additionally, if @flags includes VIR_DUMP_BYPASS_CACHE, then libvirt
 * will attempt to bypass the file system cache while creating the file,
 * or fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainCoreDumpWithFormat(virDomainPtr domain, const char *to,
                            unsigned int dumpformat, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "to=%s, dumpformat=%u, flags=%x",
                     to, dumpformat, flags);

    virResetLastError();

    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
    virCheckNonNullArgGoto(to, error);

    if (dumpformat >= VIR_DOMAIN_CORE_DUMP_FORMAT_LAST) {
        virReportInvalidArg(flags, _("dumpformat '%d' is not supported"),
                            dumpformat);
        goto error;
    }

    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_LIVE)) {
        virReportInvalidArg(flags, "%s",
                            _("crash and live flags are mutually exclusive"));
        goto error;
    }

    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_RESET)) {
        virReportInvalidArg(flags, "%s",
                            _("crash and reset flags are mutually exclusive"));
        goto error;
    }

    if ((flags & VIR_DUMP_LIVE) && (flags & VIR_DUMP_RESET)) {
        virReportInvalidArg(flags, "%s",
                            _("live and reset flags are mutually exclusive"));
        goto error;
    }

    if (conn->driver->domainCoreDumpWithFormat) {
        int ret;
        char *absolute_to;

        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute core file path"));
            goto error;
        }

        ret = conn->driver->domainCoreDumpWithFormat(domain, absolute_to,
                                                     dumpformat, flags);

        VIR_FREE(absolute_to);

        if (ret < 0)
            goto error;
        return ret;
    }

    virReportUnsupportedError();

3098
 error:
3099 3100 3101 3102
    virDispatchError(domain->conn);
    return -1;
}

3103

3104 3105 3106 3107 3108
/**
 * virDomainScreenshot:
 * @domain: a domain object
 * @stream: stream to use as output
 * @screen: monitor ID to take screenshot from
3109
 * @flags: extra flags; not used yet, so callers should always pass 0
3110 3111 3112 3113 3114 3115 3116
 *
 * Take a screenshot of current domain console as a stream. The image format
 * is hypervisor specific. Moreover, some hypervisors supports multiple
 * displays per domain. These can be distinguished by @screen argument.
 *
 * This call sets up a stream; subsequent use of stream API is necessary
 * to transfer actual data, determine how much data is successfully
J
Ján Tomko 已提交
3117
 * transferred, and detect any errors.
3118 3119 3120 3121
 *
 * The screen ID is the sequential number of screen. In case of multiple
 * graphics cards, heads are enumerated before devices, e.g. having
 * two graphics cards, both with four heads, screen ID 5 addresses
3122
 * the second head on the second card.
3123 3124 3125 3126 3127 3128 3129 3130 3131 3132
 *
 * Returns a string representing the mime-type of the image format, or
 * NULL upon error. The caller must free() the returned value.
 */
char *
virDomainScreenshot(virDomainPtr domain,
                    virStreamPtr stream,
                    unsigned int screen,
                    unsigned int flags)
{
E
Eric Blake 已提交
3133
    VIR_DOMAIN_DEBUG(domain, "stream=%p, flags=%x", stream, flags);
3134 3135 3136

    virResetLastError();

3137
    virCheckDomainReturn(domain, NULL);
3138 3139 3140 3141 3142 3143 3144 3145
    virCheckStreamGoto(stream, error);
    virCheckReadOnlyGoto(domain->conn->flags, error);

    if (domain->conn != stream->conn) {
        virReportInvalidArg(stream,
                            _("stream in %s must match connection of domain '%s'"),
                            __FUNCTION__, domain->name);
        goto error;
3146 3147 3148
    }

    if (domain->conn->driver->domainScreenshot) {
3149
        char *ret;
3150 3151 3152 3153 3154 3155 3156 3157
        ret = domain->conn->driver->domainScreenshot(domain, stream,
                                                     screen, flags);

        if (ret == NULL)
            goto error;
        return ret;
    }

3158
    virReportUnsupportedError();
3159

3160
 error:
3161 3162 3163 3164
    virDispatchError(domain->conn);
    return NULL;
}

3165

3166 3167 3168 3169
/**
 * virDomainShutdown:
 * @domain: a domain object
 *
3170
 * Shutdown a domain, the domain object is still usable thereafter, but
3171
 * the domain OS is being stopped. Note that the guest OS may ignore the
3172 3173 3174
 * request. Additionally, the hypervisor may check and support the domain
 * 'on_poweroff' XML setting resulting in a domain that reboots instead of
 * shutting down. For guests that react to a shutdown request, the differences
3175 3176 3177 3178
 * from virDomainDestroy() are that the guests disk storage will be in a
 * stable state rather than having the (virtual) power cord pulled, and
 * this command returns as soon as the shutdown request is issued rather
 * than blocking until the guest is no longer running.
3179
 *
3180 3181 3182
 * If the domain is transient and has any snapshot metadata (see
 * virDomainSnapshotNum()), then that metadata will automatically
 * be deleted when the domain quits.
3183 3184 3185 3186
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
3187 3188
virDomainShutdown(virDomainPtr domain)
{
3189
    virConnectPtr conn;
3190

3191
    VIR_DOMAIN_DEBUG(domain);
3192

3193 3194
    virResetLastError();

3195
    virCheckDomainReturn(domain, -1);
3196 3197
    conn = domain->conn;

3198 3199
    virCheckReadOnlyGoto(conn->flags, error);

3200 3201
    if (conn->driver->domainShutdown) {
        int ret;
3202
        ret = conn->driver->domainShutdown(domain);
3203 3204 3205 3206
        if (ret < 0)
            goto error;
        return ret;
    }
3207

3208
    virReportUnsupportedError();
3209

3210
 error:
3211
    virDispatchError(domain->conn);
3212
    return -1;
3213 3214
}

3215

3216 3217 3218 3219 3220 3221 3222
/**
 * virDomainShutdownFlags:
 * @domain: a domain object
 * @flags: bitwise-OR of virDomainShutdownFlagValues
 *
 * Shutdown a domain, the domain object is still usable thereafter but
 * the domain OS is being stopped. Note that the guest OS may ignore the
3223 3224 3225
 * request. Additionally, the hypervisor may check and support the domain
 * 'on_poweroff' XML setting resulting in a domain that reboots instead of
 * shutting down. For guests that react to a shutdown request, the differences
3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236
 * from virDomainDestroy() are that the guest's disk storage will be in a
 * stable state rather than having the (virtual) power cord pulled, and
 * this command returns as soon as the shutdown request is issued rather
 * than blocking until the guest is no longer running.
 *
 * If the domain is transient and has any snapshot metadata (see
 * virDomainSnapshotNum()), then that metadata will automatically
 * be deleted when the domain quits.
 *
 * If @flags is set to zero, then the hypervisor will choose the
 * method of shutdown it considers best. To have greater control
3237 3238 3239
 * pass one or more of the virDomainShutdownFlagValues. The order
 * in which the hypervisor tries each shutdown method is undefined,
 * and a hypervisor is not required to support all methods.
3240
 *
3241 3242 3243
 * To use guest agent (VIR_DOMAIN_SHUTDOWN_GUEST_AGENT) the domain XML
 * must have <channel> configured.
 *
3244 3245 3246 3247 3248 3249 3250
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainShutdownFlags(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;

3251
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
3252 3253 3254

    virResetLastError();

3255
    virCheckDomainReturn(domain, -1);
3256 3257
    conn = domain->conn;

3258 3259
    virCheckReadOnlyGoto(conn->flags, error);

3260 3261 3262 3263 3264 3265 3266 3267
    if (conn->driver->domainShutdownFlags) {
        int ret;
        ret = conn->driver->domainShutdownFlags(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3268
    virReportUnsupportedError();
3269

3270
 error:
3271 3272 3273 3274
    virDispatchError(domain->conn);
    return -1;
}

3275

3276 3277 3278
/**
 * virDomainReboot:
 * @domain: a domain object
3279
 * @flags: bitwise-OR of virDomainRebootFlagValues
3280
 *
3281
 * Reboot a domain, the domain object is still usable thereafter, but
3282 3283
 * the domain OS is being stopped for a restart.
 * Note that the guest OS may ignore the request.
3284 3285 3286
 * Additionally, the hypervisor may check and support the domain
 * 'on_reboot' XML setting resulting in a domain that shuts down instead
 * of rebooting.
3287
 *
3288 3289
 * If @flags is set to zero, then the hypervisor will choose the
 * method of shutdown it considers best. To have greater control
3290
 * pass one or more of the virDomainRebootFlagValues. The order
3291 3292
 * in which the hypervisor tries each shutdown method is undefined,
 * and a hypervisor is not required to support all methods.
3293 3294 3295 3296
 *
 * To use guest agent (VIR_DOMAIN_REBOOT_GUEST_AGENT) the domain XML
 * must have <channel> configured.
 *
3297 3298 3299 3300 3301
 * Due to implementation limitations in some drivers (the qemu driver,
 * for instance) it is not advised to migrate or save a guest that is
 * rebooting as a result of this API. Migrating such a guest can lead
 * to a plain shutdown on the destination.
 *
3302 3303 3304 3305 3306
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainReboot(virDomainPtr domain, unsigned int flags)
{
3307
    virConnectPtr conn;
3308

3309
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
3310

3311 3312
    virResetLastError();

3313
    virCheckDomainReturn(domain, -1);
3314 3315
    conn = domain->conn;

3316 3317
    virCheckReadOnlyGoto(conn->flags, error);

3318 3319
    if (conn->driver->domainReboot) {
        int ret;
3320
        ret = conn->driver->domainReboot(domain, flags);
3321 3322 3323 3324
        if (ret < 0)
            goto error;
        return ret;
    }
3325

3326
    virReportUnsupportedError();
X
Xu He Jie 已提交
3327

3328
 error:
X
Xu He Jie 已提交
3329 3330 3331 3332
    virDispatchError(domain->conn);
    return -1;
}

3333

X
Xu He Jie 已提交
3334 3335 3336
/**
 * virDomainReset:
 * @domain: a domain object
3337
 * @flags: extra flags; not used yet, so callers should always pass 0
X
Xu He Jie 已提交
3338 3339 3340 3341 3342 3343 3344 3345 3346 3347 3348 3349 3350 3351 3352 3353 3354 3355 3356
 *
 * Reset a domain immediately without any guest OS shutdown.
 * Reset emulates the power reset button on a machine, where all
 * hardware sees the RST line set and reinitializes internal state.
 *
 * Note that there is a risk of data loss caused by reset without any
 * guest OS shutdown.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainReset(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);

    virResetLastError();

3357
    virCheckDomainReturn(domain, -1);
X
Xu He Jie 已提交
3358 3359
    conn = domain->conn;

3360 3361
    virCheckReadOnlyGoto(conn->flags, error);

X
Xu He Jie 已提交
3362 3363
    if (conn->driver->domainReset) {
        int ret;
3364
        ret = conn->driver->domainReset(domain, flags);
X
Xu He Jie 已提交
3365 3366 3367 3368 3369
        if (ret < 0)
            goto error;
        return ret;
    }

3370
    virReportUnsupportedError();
3371

3372
 error:
3373
    virDispatchError(domain->conn);
3374
    return -1;
3375 3376
}

3377

3378
/**
3379
 * virDomainGetName:
3380 3381 3382 3383 3384 3385 3386 3387
 * @domain: a domain object
 *
 * Get the public name for that domain
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the domain object.
 */
const char *
3388 3389
virDomainGetName(virDomainPtr domain)
{
3390
    VIR_DEBUG("domain=%p", domain);
3391

3392 3393
    virResetLastError();

3394 3395
    virCheckDomainReturn(domain, NULL);

3396
    return domain->name;
3397 3398
}

3399

3400 3401 3402
/**
 * virDomainGetUUID:
 * @domain: a domain object
3403
 * @uuid: pointer to a VIR_UUID_BUFLEN bytes array
3404 3405 3406 3407 3408 3409
 *
 * Get the UUID for a domain
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
3410 3411
virDomainGetUUID(virDomainPtr domain, unsigned char *uuid)
{
3412
    VIR_DOMAIN_DEBUG(domain, "uuid=%p", uuid);
3413

3414 3415
    virResetLastError();

3416
    virCheckDomainReturn(domain, -1);
3417
    virCheckNonNullArgGoto(uuid, error);
D
Daniel Veillard 已提交
3418

3419 3420
    memcpy(uuid, &domain->uuid[0], VIR_UUID_BUFLEN);

3421
    return 0;
3422

3423
 error:
3424 3425
    virDispatchError(domain->conn);
    return -1;
3426 3427
}

3428

K
Karel Zak 已提交
3429 3430 3431
/**
 * virDomainGetUUIDString:
 * @domain: a domain object
3432
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
K
Karel Zak 已提交
3433
 *
3434
 * Get the UUID for a domain as string. For more information about
K
Karel Zak 已提交
3435 3436 3437 3438 3439 3440 3441
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virDomainGetUUIDString(virDomainPtr domain, char *buf)
{
3442
    VIR_DOMAIN_DEBUG(domain, "buf=%p", buf);
3443

3444 3445
    virResetLastError();

3446
    virCheckDomainReturn(domain, -1);
3447
    virCheckNonNullArgGoto(buf, error);
3448

E
Eric Blake 已提交
3449
    virUUIDFormat(domain->uuid, buf);
3450
    return 0;
3451

3452
 error:
3453
    virDispatchError(domain->conn);
3454
    return -1;
K
Karel Zak 已提交
3455 3456
}

3457

3458
/**
3459
 * virDomainGetID:
3460 3461 3462 3463 3464 3465 3466
 * @domain: a domain object
 *
 * Get the hypervisor ID number for the domain
 *
 * Returns the domain ID number or (unsigned int) -1 in case of error
 */
unsigned int
3467 3468
virDomainGetID(virDomainPtr domain)
{
3469
    VIR_DOMAIN_DEBUG(domain);
3470

3471 3472
    virResetLastError();

3473 3474
    virCheckDomainReturn(domain, (unsigned int)-1);

3475
    return domain->id;
3476 3477
}

3478

3479 3480 3481 3482 3483 3484
/**
 * virDomainGetOSType:
 * @domain: a domain object
 *
 * Get the type of domain operation system.
 *
3485 3486
 * Returns the new string or NULL in case of error, the string must be
 *         freed by the caller.
3487 3488
 */
char *
3489 3490
virDomainGetOSType(virDomainPtr domain)
{
3491
    virConnectPtr conn;
3492

3493
    VIR_DOMAIN_DEBUG(domain);
3494

3495 3496
    virResetLastError();

3497
    virCheckDomainReturn(domain, NULL);
3498 3499
    conn = domain->conn;

3500 3501
    if (conn->driver->domainGetOSType) {
        char *ret;
3502
        ret = conn->driver->domainGetOSType(domain);
3503 3504 3505 3506
        if (!ret)
            goto error;
        return ret;
    }
3507

3508
    virReportUnsupportedError();
3509

3510
 error:
3511
    virDispatchError(domain->conn);
3512
    return NULL;
3513 3514
}

3515

3516
/**
3517
 * virDomainGetMaxMemory:
3518
 * @domain: a domain object or NULL
3519
 *
3520 3521 3522 3523
 * Retrieve the maximum amount of physical memory allocated to a
 * domain. If domain is NULL, then this get the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
 *
3524 3525
 * Returns the memory size in kibibytes (blocks of 1024 bytes), or 0 in
 * case of error.
3526 3527
 */
unsigned long
3528 3529
virDomainGetMaxMemory(virDomainPtr domain)
{
3530
    virConnectPtr conn;
3531

3532
    VIR_DOMAIN_DEBUG(domain);
3533

3534 3535
    virResetLastError();

3536
    virCheckDomainReturn(domain, 0);
3537 3538
    conn = domain->conn;

3539
    if (conn->driver->domainGetMaxMemory) {
3540
        unsigned long long ret;
3541
        ret = conn->driver->domainGetMaxMemory(domain);
3542 3543
        if (ret == 0)
            goto error;
3544
        if ((unsigned long) ret != ret) {
3545 3546
            virReportError(VIR_ERR_OVERFLOW, _("result too large: %llu"),
                           ret);
3547 3548
            goto error;
        }
3549 3550
        return ret;
    }
3551

3552
    virReportUnsupportedError();
3553

3554
 error:
3555
    virDispatchError(domain->conn);
3556
    return 0;
3557 3558
}

3559

D
Daniel Veillard 已提交
3560
/**
3561
 * virDomainSetMaxMemory:
D
Daniel Veillard 已提交
3562
 * @domain: a domain object or NULL
3563
 * @memory: the memory size in kibibytes (blocks of 1024 bytes)
3564
 *
D
Daniel Veillard 已提交
3565 3566 3567
 * Dynamically change the maximum amount of physical memory allocated to a
 * domain. If domain is NULL, then this change the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
3568
 * This function may require privileged access to the hypervisor.
D
Daniel Veillard 已提交
3569
 *
3570 3571 3572
 * This command is hypervisor-specific for whether active, persistent,
 * or both configurations are changed; for more control, use
 * virDomainSetMemoryFlags().
3573
 *
D
Daniel Veillard 已提交
3574 3575 3576
 * Returns 0 in case of success and -1 in case of failure.
 */
int
3577 3578
virDomainSetMaxMemory(virDomainPtr domain, unsigned long memory)
{
3579
    virConnectPtr conn;
3580 3581

    VIR_DOMAIN_DEBUG(domain, "memory=%lu", memory);
3582

3583 3584
    virResetLastError();

3585
    virCheckDomainReturn(domain, -1);
3586
    conn = domain->conn;
3587

3588 3589 3590
    virCheckReadOnlyGoto(conn->flags, error);
    virCheckNonZeroArgGoto(memory, error);

3591 3592
    if (conn->driver->domainSetMaxMemory) {
        int ret;
3593
        ret = conn->driver->domainSetMaxMemory(domain, memory);
3594 3595 3596 3597
        if (ret < 0)
            goto error;
        return ret;
    }
3598

3599
    virReportUnsupportedError();
3600

3601
 error:
3602
    virDispatchError(domain->conn);
3603
    return -1;
3604
}
3605

3606

3607 3608 3609
/**
 * virDomainSetMemory:
 * @domain: a domain object or NULL
3610
 * @memory: the memory size in kibibytes (blocks of 1024 bytes)
3611
 *
3612 3613 3614
 * Dynamically change the target amount of physical memory allocated to a
 * domain. If domain is NULL, then this change the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
3615
 * This function may require privileged access to the hypervisor.
3616
 *
3617 3618 3619
 * This command only changes the runtime configuration of the domain,
 * so can only be called on an active domain.
 *
3620 3621 3622 3623 3624 3625
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSetMemory(virDomainPtr domain, unsigned long memory)
{
    virConnectPtr conn;
3626 3627

    VIR_DOMAIN_DEBUG(domain, "memory=%lu", memory);
3628

3629 3630
    virResetLastError();

3631
    virCheckDomainReturn(domain, -1);
3632
    conn = domain->conn;
3633

3634 3635 3636
    virCheckReadOnlyGoto(conn->flags, error);
    virCheckNonZeroArgGoto(memory, error);

3637 3638
    if (conn->driver->domainSetMemory) {
        int ret;
3639
        ret = conn->driver->domainSetMemory(domain, memory);
3640 3641 3642 3643
        if (ret < 0)
            goto error;
        return ret;
    }
3644

3645
    virReportUnsupportedError();
3646

3647
 error:
3648
    virDispatchError(domain->conn);
3649
    return -1;
D
Daniel Veillard 已提交
3650 3651
}

3652

3653
/**
3654
 * virDomainSetMemoryFlags:
3655
 * @domain: a domain object or NULL
3656
 * @memory: the memory size in kibibytes (blocks of 1024 bytes)
3657
 * @flags: bitwise-OR of virDomainMemoryModFlags
3658 3659 3660 3661
 *
 * Dynamically change the target amount of physical memory allocated to a
 * domain. If domain is NULL, then this change the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
3662
 * This function may require privileged access to the hypervisor.
3663
 *
3664 3665
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set. If VIR_DOMAIN_AFFECT_LIVE is set, the change affects
3666
 * a running domain and will fail if domain is not active.
3667
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
3668
 * and will fail for transient domains. If neither flag is specified
3669
 * (that is, @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain
3670 3671
 * modifies persistent setup, while an active domain is hypervisor-dependent
 * on whether just live or both live and persistent state is changed.
3672 3673
 * If VIR_DOMAIN_MEM_MAXIMUM is set, the change affects domain's maximum memory
 * size rather than current memory size.
3674
 * Not all hypervisors can support all flag combinations.
3675 3676 3677 3678 3679 3680 3681 3682 3683
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetMemoryFlags(virDomainPtr domain, unsigned long memory,
                        unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
3684
    VIR_DOMAIN_DEBUG(domain, "memory=%lu, flags=%x", memory, flags);
3685 3686 3687

    virResetLastError();

3688 3689
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
3690

3691
    virCheckReadOnlyGoto(conn->flags, error);
3692
    virCheckNonZeroArgGoto(memory, error);
3693 3694 3695 3696 3697 3698 3699 3700 3701

    if (conn->driver->domainSetMemoryFlags) {
        int ret;
        ret = conn->driver->domainSetMemoryFlags(domain, memory, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3702
    virReportUnsupportedError();
3703

3704
 error:
3705 3706 3707 3708
    virDispatchError(domain->conn);
    return -1;
}

3709

3710 3711 3712 3713 3714 3715 3716 3717 3718 3719 3720 3721 3722 3723 3724 3725 3726 3727 3728 3729 3730 3731 3732 3733 3734 3735 3736 3737 3738 3739 3740 3741
/**
 * virDomainSetMemoryStatsPeriod:
 * @domain: a domain object or NULL
 * @period: the period in seconds for stats collection
 * @flags: bitwise-OR of virDomainMemoryModFlags
 *
 * Dynamically change the domain memory balloon driver statistics collection
 * period. Use 0 to disable and a positive value to enable.
 *
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set. If VIR_DOMAIN_AFFECT_LIVE is set, the change affects
 * a running domain and will fail if domain is not active.
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
 * and will fail for transient domains. If neither flag is specified
 * (that is, @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain
 * modifies persistent setup, while an active domain is hypervisor-dependent
 * on whether just live or both live and persistent state is changed.
 *
 * Not all hypervisors can support all flag combinations.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetMemoryStatsPeriod(virDomainPtr domain, int period,
                              unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "peroid=%d, flags=%x", period, flags);

    virResetLastError();

3742 3743
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
3744

3745
    virCheckReadOnlyGoto(conn->flags, error);
3746 3747 3748 3749 3750 3751 3752 3753 3754 3755 3756 3757

    /* This must be positive to set the balloon collection period */
    virCheckNonNegativeArgGoto(period, error);

    if (conn->driver->domainSetMemoryStatsPeriod) {
        int ret;
        ret = conn->driver->domainSetMemoryStatsPeriod(domain, period, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3758
    virReportUnsupportedError();
3759

3760
 error:
3761 3762 3763 3764
    virDispatchError(domain->conn);
    return -1;
}

3765

E
Eric Blake 已提交
3766 3767 3768
/* Helper function called to validate incoming client array on any
 * interface that sets typed parameters in the hypervisor.  */
static int
3769
virTypedParameterValidateSet(virConnectPtr conn,
E
Eric Blake 已提交
3770 3771 3772 3773
                             virTypedParameterPtr params,
                             int nparams)
{
    bool string_okay;
3774
    size_t i;
E
Eric Blake 已提交
3775

3776 3777
    string_okay = VIR_DRV_SUPPORTS_FEATURE(conn->driver,
                                           conn,
E
Eric Blake 已提交
3778 3779 3780 3781
                                           VIR_DRV_FEATURE_TYPED_PARAM_STRING);
    for (i = 0; i < nparams; i++) {
        if (strnlen(params[i].field, VIR_TYPED_PARAM_FIELD_LENGTH) ==
            VIR_TYPED_PARAM_FIELD_LENGTH) {
3782 3783 3784 3785
            virReportInvalidArg(params,
                                _("string parameter name '%.*s' too long"),
                                VIR_TYPED_PARAM_FIELD_LENGTH,
                                params[i].field);
E
Eric Blake 已提交
3786 3787 3788 3789 3790
            return -1;
        }
        if (params[i].type == VIR_TYPED_PARAM_STRING) {
            if (string_okay) {
                if (!params[i].value.s) {
3791 3792 3793
                    virReportInvalidArg(params,
                                        _("NULL string parameter '%s'"),
                                        params[i].field);
E
Eric Blake 已提交
3794 3795 3796
                    return -1;
                }
            } else {
3797 3798 3799
                virReportInvalidArg(params,
                                    _("string parameter '%s' unsupported"),
                                    params[i].field);
E
Eric Blake 已提交
3800 3801 3802 3803 3804 3805 3806
                return -1;
            }
        }
    }
    return 0;
}

3807

3808 3809 3810 3811
/**
 * virDomainSetMemoryParameters:
 * @domain: pointer to domain object
 * @params: pointer to memory parameter objects
3812
 * @nparams: number of memory parameter (this value can be the same or
3813
 *          less than the number of parameters supported)
3814
 * @flags: bitwise-OR of virDomainModificationImpact
3815
 *
3816
 * Change all or a subset of the memory tunables.
3817
 * This function may require privileged access to the hypervisor.
3818 3819 3820 3821 3822
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetMemoryParameters(virDomainPtr domain,
3823
                             virTypedParameterPtr params,
3824 3825 3826
                             int nparams, unsigned int flags)
{
    virConnectPtr conn;
3827

3828
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
3829
                     params, nparams, flags);
3830
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
3831 3832 3833

    virResetLastError();

3834 3835 3836 3837
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
3838 3839 3840
    virCheckNonNullArgGoto(params, error);
    virCheckPositiveArgGoto(nparams, error);

3841
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
3842
        goto error;
E
Eric Blake 已提交
3843

3844 3845
    if (conn->driver->domainSetMemoryParameters) {
        int ret;
3846
        ret = conn->driver->domainSetMemoryParameters(domain, params, nparams, flags);
3847 3848 3849 3850 3851
        if (ret < 0)
            goto error;
        return ret;
    }

3852
    virReportUnsupportedError();
3853

3854
 error:
3855 3856 3857 3858
    virDispatchError(domain->conn);
    return -1;
}

3859

3860 3861 3862 3863 3864
/**
 * virDomainGetMemoryParameters:
 * @domain: pointer to domain object
 * @params: pointer to memory parameter object
 *          (return value, allocated by the caller)
3865
 * @nparams: pointer to number of memory parameters; input and output
E
Eric Blake 已提交
3866
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
3867
 *
3868 3869 3870 3871
 * Get all memory parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.
3872
 *
3873 3874 3875
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
3876
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
3877 3878
 * again.
 *
3879
 * Here is a sample code snippet:
3880
 *
3881 3882
 *   if (virDomainGetMemoryParameters(dom, NULL, &nparams, 0) == 0 &&
 *       nparams != 0) {
3883 3884 3885 3886 3887 3888
 *       if ((params = malloc(sizeof(*params) * nparams)) == NULL)
 *           goto error;
 *       memset(params, 0, sizeof(*params) * nparams);
 *       if (virDomainGetMemoryParameters(dom, params, &nparams, 0))
 *           goto error;
 *   }
3889
 *
3890
 * This function may require privileged access to the hypervisor. This function
3891
 * expects the caller to allocate the @params.
3892 3893 3894 3895 3896
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetMemoryParameters(virDomainPtr domain,
3897
                             virTypedParameterPtr params,
3898 3899 3900
                             int *nparams, unsigned int flags)
{
    virConnectPtr conn;
3901

3902
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
3903
                     params, (nparams) ? *nparams : -1, flags);
3904 3905 3906

    virResetLastError();

3907
    virCheckDomainReturn(domain, -1);
3908 3909 3910 3911 3912
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

E
Eric Blake 已提交
3913 3914 3915
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
3916 3917 3918 3919

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
3920
        virReportInvalidArg(flags,
3921 3922
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
3923
                            __FUNCTION__);
3924 3925
        goto error;
    }
3926 3927 3928 3929
    conn = domain->conn;

    if (conn->driver->domainGetMemoryParameters) {
        int ret;
3930
        ret = conn->driver->domainGetMemoryParameters(domain, params, nparams, flags);
3931 3932 3933 3934
        if (ret < 0)
            goto error;
        return ret;
    }
3935
    virReportUnsupportedError();
3936

3937
 error:
3938 3939 3940 3941
    virDispatchError(domain->conn);
    return -1;
}

3942

3943 3944 3945 3946 3947 3948 3949 3950 3951 3952 3953 3954 3955 3956 3957 3958 3959 3960 3961 3962 3963 3964
/**
 * virDomainSetNumaParameters:
 * @domain: pointer to domain object
 * @params: pointer to numa parameter objects
 * @nparams: number of numa parameters (this value can be the same or
 *          less than the number of parameters supported)
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Change all or a subset of the numa tunables.
 * This function may require privileged access to the hypervisor.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetNumaParameters(virDomainPtr domain,
                           virTypedParameterPtr params,
                           int nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
                     params, nparams, flags);
3965
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
3966 3967 3968

    virResetLastError();

3969
    virCheckDomainReturn(domain, -1);
3970
    virCheckReadOnlyGoto(domain->conn->flags, error);
3971 3972
    virCheckNonNullArgGoto(params, error);
    virCheckPositiveArgGoto(nparams, error);
3973
    if (virTypedParameterValidateSet(domain->conn, params, nparams) < 0)
3974
        goto error;
3975 3976 3977 3978 3979 3980 3981 3982 3983 3984 3985 3986

    conn = domain->conn;

    if (conn->driver->domainSetNumaParameters) {
        int ret;
        ret = conn->driver->domainSetNumaParameters(domain, params, nparams,
                                                    flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3987
    virReportUnsupportedError();
3988

3989
 error:
3990 3991 3992 3993
    virDispatchError(domain->conn);
    return -1;
}

3994

3995 3996 3997 3998 3999 4000 4001 4002 4003 4004 4005 4006 4007 4008 4009 4010 4011 4012 4013 4014 4015 4016 4017 4018 4019 4020 4021 4022 4023 4024 4025 4026 4027 4028 4029 4030 4031 4032
/**
 * virDomainGetNumaParameters:
 * @domain: pointer to domain object
 * @params: pointer to numa parameter object
 *          (return value, allocated by the caller)
 * @nparams: pointer to number of numa parameters
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
 *
 * Get all numa parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.
 *
 * See virDomainGetMemoryParameters() for an equivalent usage example.
 *
 * This function may require privileged access to the hypervisor. This function
 * expects the caller to allocate the @params.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetNumaParameters(virDomainPtr domain,
                           virTypedParameterPtr params,
                           int *nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
                     params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

4033
    virCheckDomainReturn(domain, -1);
4034 4035 4036 4037 4038
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

4039 4040 4041 4042 4043 4044 4045 4046 4047 4048 4049 4050 4051 4052
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    conn = domain->conn;

    if (conn->driver->domainGetNumaParameters) {
        int ret;
        ret = conn->driver->domainGetNumaParameters(domain, params, nparams,
                                                    flags);
        if (ret < 0)
            goto error;
        return ret;
    }
4053
    virReportUnsupportedError();
4054

4055
 error:
4056 4057 4058 4059
    virDispatchError(domain->conn);
    return -1;
}

4060

4061 4062 4063 4064
/**
 * virDomainSetBlkioParameters:
 * @domain: pointer to domain object
 * @params: pointer to blkio parameter objects
4065
 * @nparams: number of blkio parameters (this value can be the same or
4066
 *          less than the number of parameters supported)
E
Eric Blake 已提交
4067
 * @flags: bitwise-OR of virDomainModificationImpact
4068
 *
4069
 * Change all or a subset of the blkio tunables.
4070
 * This function may require privileged access to the hypervisor.
4071 4072 4073 4074 4075
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetBlkioParameters(virDomainPtr domain,
4076 4077
                            virTypedParameterPtr params,
                            int nparams, unsigned int flags)
4078 4079 4080
{
    virConnectPtr conn;

4081
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
4082
                     params, nparams, flags);
4083
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
4084 4085 4086

    virResetLastError();

4087 4088 4089 4090
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
4091 4092 4093
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

4094
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
4095
        goto error;
E
Eric Blake 已提交
4096

4097 4098
    if (conn->driver->domainSetBlkioParameters) {
        int ret;
4099
        ret = conn->driver->domainSetBlkioParameters(domain, params, nparams, flags);
4100 4101 4102 4103 4104
        if (ret < 0)
            goto error;
        return ret;
    }

4105
    virReportUnsupportedError();
4106

4107
 error:
4108 4109 4110 4111
    virDispatchError(domain->conn);
    return -1;
}

4112

4113 4114 4115 4116 4117
/**
 * virDomainGetBlkioParameters:
 * @domain: pointer to domain object
 * @params: pointer to blkio parameter object
 *          (return value, allocated by the caller)
4118
 * @nparams: pointer to number of blkio parameters; input and output
E
Eric Blake 已提交
4119
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
4120
 *
4121 4122 4123 4124 4125 4126 4127 4128 4129 4130 4131 4132
 * Get all blkio parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.
 *
 * See virDomainGetMemoryParameters() for an equivalent usage example.
4133
 *
4134
 * This function may require privileged access to the hypervisor. This function
4135 4136 4137 4138 4139 4140
 * expects the caller to allocate the @params.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetBlkioParameters(virDomainPtr domain,
4141 4142
                            virTypedParameterPtr params,
                            int *nparams, unsigned int flags)
4143 4144 4145
{
    virConnectPtr conn;

4146
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
4147 4148 4149 4150
                     params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

4151
    virCheckDomainReturn(domain, -1);
4152 4153 4154 4155 4156
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

E
Eric Blake 已提交
4157 4158 4159
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
4160 4161 4162 4163

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
4164
        virReportInvalidArg(flags,
4165 4166
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
4167
                            __FUNCTION__);
4168 4169
        goto error;
    }
4170 4171 4172 4173
    conn = domain->conn;

    if (conn->driver->domainGetBlkioParameters) {
        int ret;
4174
        ret = conn->driver->domainGetBlkioParameters(domain, params, nparams, flags);
4175 4176 4177 4178
        if (ret < 0)
            goto error;
        return ret;
    }
4179
    virReportUnsupportedError();
4180

4181
 error:
4182 4183 4184 4185
    virDispatchError(domain->conn);
    return -1;
}

4186

4187 4188
/**
 * virDomainGetInfo:
4189
 * @domain: a domain object
4190
 * @info: pointer to a virDomainInfo structure allocated by the user
4191
 *
4192
 * Extract information about a domain. Note that if the connection
4193
 * used to get the domain is limited only a partial set of the information
4194 4195 4196 4197 4198
 * can be extracted.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
4199 4200
virDomainGetInfo(virDomainPtr domain, virDomainInfoPtr info)
{
4201
    virConnectPtr conn;
4202 4203

    VIR_DOMAIN_DEBUG(domain, "info=%p", info);
4204

4205 4206
    virResetLastError();

4207 4208 4209
    if (info)
        memset(info, 0, sizeof(*info));

4210
    virCheckDomainReturn(domain, -1);
4211
    virCheckNonNullArgGoto(info, error);
4212

4213 4214
    conn = domain->conn;

4215 4216
    if (conn->driver->domainGetInfo) {
        int ret;
4217
        ret = conn->driver->domainGetInfo(domain, info);
4218 4219 4220 4221
        if (ret < 0)
            goto error;
        return ret;
    }
4222

4223
    virReportUnsupportedError();
4224

4225
 error:
4226
    virDispatchError(domain->conn);
4227
    return -1;
4228
}
4229

4230

4231 4232 4233 4234 4235 4236
/**
 * virDomainGetState:
 * @domain: a domain object
 * @state: returned state of the domain (one of virDomainState)
 * @reason: returned reason which led to @state (one of virDomain*Reason
 * corresponding to the current state); it is allowed to be NULL
4237
 * @flags: extra flags; not used yet, so callers should always pass 0
4238 4239 4240 4241 4242 4243 4244 4245 4246 4247 4248 4249 4250 4251
 *
 * Extract domain state. Each state can be accompanied with a reason (if known)
 * which led to the state.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetState(virDomainPtr domain,
                  int *state,
                  int *reason,
                  unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
4252 4253
    VIR_DOMAIN_DEBUG(domain, "state=%p, reason=%p, flags=%x",
                     state, reason, flags);
4254 4255 4256

    virResetLastError();

4257
    virCheckDomainReturn(domain, -1);
4258
    virCheckNonNullArgGoto(state, error);
4259 4260 4261 4262 4263 4264

    conn = domain->conn;
    if (conn->driver->domainGetState) {
        int ret;
        ret = conn->driver->domainGetState(domain, state, reason, flags);
        if (ret < 0)
4265 4266 4267 4268
            goto error;
        return ret;
    }

4269
    virReportUnsupportedError();
4270

4271
 error:
4272 4273 4274 4275
    virDispatchError(domain->conn);
    return -1;
}

4276

4277 4278 4279 4280
/**
 * virDomainGetControlInfo:
 * @domain: a domain object
 * @info: pointer to a virDomainControlInfo structure allocated by the user
4281
 * @flags: extra flags; not used yet, so callers should always pass 0
4282 4283 4284 4285 4286 4287 4288 4289 4290 4291 4292 4293
 *
 * Extract details about current state of control interface to a domain.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetControlInfo(virDomainPtr domain,
                        virDomainControlInfoPtr info,
                        unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
4294
    VIR_DOMAIN_DEBUG(domain, "info=%p, flags=%x", info, flags);
4295 4296 4297

    virResetLastError();

4298
    virCheckDomainReturn(domain, -1);
4299
    virCheckNonNullArgGoto(info, error);
4300 4301 4302 4303 4304 4305

    conn = domain->conn;
    if (conn->driver->domainGetControlInfo) {
        int ret;
        ret = conn->driver->domainGetControlInfo(domain, info, flags);
        if (ret < 0)
4306 4307 4308 4309
            goto error;
        return ret;
    }

4310
    virReportUnsupportedError();
4311

4312
 error:
4313 4314 4315 4316
    virDispatchError(domain->conn);
    return -1;
}

4317

4318 4319 4320
/**
 * virDomainGetXMLDesc:
 * @domain: a domain object
4321
 * @flags: bitwise-OR of virDomainXMLFlags
4322 4323
 *
 * Provide an XML description of the domain. The description may be reused
4324
 * later to relaunch the domain with virDomainCreateXML().
4325
 *
4326 4327 4328 4329 4330 4331 4332 4333 4334 4335
 * No security-sensitive data will be included unless @flags contains
 * VIR_DOMAIN_XML_SECURE; this flag is rejected on read-only
 * connections.  If @flags includes VIR_DOMAIN_XML_INACTIVE, then the
 * XML represents the configuration that will be used on the next boot
 * of a persistent domain; otherwise, the configuration represents the
 * currently running domain.  If @flags contains
 * VIR_DOMAIN_XML_UPDATE_CPU, then the portion of the domain XML
 * describing CPU capabilities is modified to match actual
 * capabilities of the host.
 *
4336 4337 4338 4339
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
4340
virDomainGetXMLDesc(virDomainPtr domain, unsigned int flags)
4341
{
4342
    virConnectPtr conn;
4343

4344
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
4345

4346 4347
    virResetLastError();

4348
    virCheckDomainReturn(domain, NULL);
4349 4350
    conn = domain->conn;

4351
    if ((conn->flags & VIR_CONNECT_RO) && (flags & VIR_DOMAIN_XML_SECURE)) {
4352 4353
        virReportError(VIR_ERR_OPERATION_DENIED, "%s",
                       _("virDomainGetXMLDesc with secure flag"));
4354 4355 4356
        goto error;
    }

4357
    if (conn->driver->domainGetXMLDesc) {
4358
        char *ret;
4359
        ret = conn->driver->domainGetXMLDesc(domain, flags);
4360 4361 4362 4363
        if (!ret)
            goto error;
        return ret;
    }
4364

4365
    virReportUnsupportedError();
4366

4367
 error:
4368
    virDispatchError(domain->conn);
4369
    return NULL;
4370
}
4371

4372

4373 4374 4375 4376 4377
/**
 * virConnectDomainXMLFromNative:
 * @conn: a connection object
 * @nativeFormat: configuration format importing from
 * @nativeConfig: the configuration data to import
4378
 * @flags: extra flags; not used yet, so callers should always pass 0
4379 4380 4381 4382 4383 4384 4385 4386
 *
 * Reads native configuration data  describing a domain, and
 * generates libvirt domain XML. The format of the native
 * data is hypervisor dependant.
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
4387 4388 4389 4390 4391
char *
virConnectDomainXMLFromNative(virConnectPtr conn,
                              const char *nativeFormat,
                              const char *nativeConfig,
                              unsigned int flags)
4392
{
E
Eric Blake 已提交
4393
    VIR_DEBUG("conn=%p, format=%s, config=%s, flags=%x",
4394
              conn, nativeFormat, nativeConfig, flags);
4395 4396 4397

    virResetLastError();

4398
    virCheckConnectReturn(conn, NULL);
4399
    virCheckReadOnlyGoto(conn->flags, error);
4400

4401 4402
    virCheckNonNullArgGoto(nativeFormat, error);
    virCheckNonNullArgGoto(nativeConfig, error);
4403

4404
    if (conn->driver->connectDomainXMLFromNative) {
4405
        char *ret;
4406 4407 4408 4409
        ret = conn->driver->connectDomainXMLFromNative(conn,
                                                       nativeFormat,
                                                       nativeConfig,
                                                       flags);
4410 4411 4412 4413 4414
        if (!ret)
            goto error;
        return ret;
    }

4415
    virReportUnsupportedError();
4416

4417
 error:
4418
    virDispatchError(conn);
4419 4420 4421
    return NULL;
}

4422

4423 4424 4425 4426 4427
/**
 * virConnectDomainXMLToNative:
 * @conn: a connection object
 * @nativeFormat: configuration format exporting to
 * @domainXml: the domain configuration to export
4428
 * @flags: extra flags; not used yet, so callers should always pass 0
4429 4430
 *
 * Reads a domain XML configuration document, and generates
E
Eric Blake 已提交
4431
 * a native configuration file describing the domain.
4432 4433 4434 4435 4436
 * The format of the native data is hypervisor dependant.
 *
 * Returns a 0 terminated UTF-8 encoded native config datafile, or NULL in case of error.
 *         the caller must free() the returned value.
 */
4437 4438 4439 4440 4441
char *
virConnectDomainXMLToNative(virConnectPtr conn,
                            const char *nativeFormat,
                            const char *domainXml,
                            unsigned int flags)
4442
{
E
Eric Blake 已提交
4443
    VIR_DEBUG("conn=%p, format=%s, xml=%s, flags=%x",
4444
              conn, nativeFormat, domainXml, flags);
4445 4446 4447

    virResetLastError();

4448
    virCheckConnectReturn(conn, NULL);
4449
    virCheckReadOnlyGoto(conn->flags, error);
4450

4451 4452
    virCheckNonNullArgGoto(nativeFormat, error);
    virCheckNonNullArgGoto(domainXml, error);
4453

4454
    if (conn->driver->connectDomainXMLToNative) {
4455
        char *ret;
4456 4457 4458 4459
        ret = conn->driver->connectDomainXMLToNative(conn,
                                                     nativeFormat,
                                                     domainXml,
                                                     flags);
4460 4461 4462 4463 4464
        if (!ret)
            goto error;
        return ret;
    }

4465
    virReportUnsupportedError();
4466

4467
 error:
4468
    virDispatchError(conn);
4469 4470 4471 4472
    return NULL;
}


4473 4474 4475 4476 4477 4478 4479 4480 4481 4482 4483 4484 4485 4486 4487 4488
/*
 * Sequence v1:
 *
 *  Dst: Prepare
 *        - Get ready to accept incoming VM
 *        - Generate optional cookie to pass to src
 *
 *  Src: Perform
 *        - Start migration and wait for send completion
 *        - Kill off VM if successful, resume if failed
 *
 *  Dst: Finish
 *        - Wait for recv completion and check status
 *        - Kill off VM if unsuccessful
 *
 */
4489
static virDomainPtr
4490 4491 4492 4493 4494 4495
virDomainMigrateVersion1(virDomainPtr domain,
                         virConnectPtr dconn,
                         unsigned long flags,
                         const char *dname,
                         const char *uri,
                         unsigned long bandwidth)
4496 4497 4498 4499
{
    virDomainPtr ddomain = NULL;
    char *uri_out = NULL;
    char *cookie = NULL;
4500 4501
    int cookielen = 0, ret;
    virDomainInfo info;
4502
    unsigned int destflags;
4503

4504
    VIR_DOMAIN_DEBUG(domain,
E
Eric Blake 已提交
4505
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
4506
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);
4507

4508
    ret = virDomainGetInfo(domain, &info);
4509
    if (ret == 0 && info.state == VIR_DOMAIN_PAUSED)
4510
        flags |= VIR_MIGRATE_PAUSED;
4511

4512 4513
    destflags = flags & ~(VIR_MIGRATE_ABORT_ON_ERROR |
                          VIR_MIGRATE_AUTO_CONVERGE);
4514 4515 4516 4517 4518 4519 4520 4521 4522 4523 4524 4525 4526

    /* Prepare the migration.
     *
     * The destination host may return a cookie, or leave cookie as
     * NULL.
     *
     * The destination host MUST set uri_out if uri_in is NULL.
     *
     * If uri_in is non-NULL, then the destination host may modify
     * the URI by setting uri_out.  If it does not wish to modify
     * the URI, it should leave uri_out as NULL.
     */
    if (dconn->driver->domainMigratePrepare
4527
        (dconn, &cookie, &cookielen, uri, &uri_out, destflags, dname,
4528 4529 4530 4531
         bandwidth) == -1)
        goto done;

    if (uri == NULL && uri_out == NULL) {
4532 4533
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("domainMigratePrepare did not set uri"));
4534 4535 4536 4537 4538 4539 4540 4541 4542 4543 4544 4545 4546 4547 4548 4549 4550 4551 4552 4553
        goto done;
    }
    if (uri_out)
        uri = uri_out; /* Did domainMigratePrepare change URI? */

    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete.
     */
    if (domain->conn->driver->domainMigratePerform
        (domain, cookie, cookielen, uri, flags, dname, bandwidth) == -1)
        goto done;

    /* Get the destination domain and return it or error.
     * 'domain' no longer actually exists at this point
     * (or so we hope), but we still use the object in memory
     * in order to get the name.
     */
    dname = dname ? dname : domain->name;
    if (dconn->driver->domainMigrateFinish)
        ddomain = dconn->driver->domainMigrateFinish
4554
            (dconn, dname, cookie, cookielen, uri, destflags);
4555
    else
4556
        ddomain = virDomainLookupByName(dconn, dname);
4557

4558
 done:
4559 4560
    VIR_FREE(uri_out);
    VIR_FREE(cookie);
4561 4562 4563
    return ddomain;
}

4564

4565 4566 4567 4568 4569 4570 4571 4572 4573 4574 4575 4576 4577 4578 4579 4580 4581 4582 4583
/*
 * Sequence v2:
 *
 *  Src: DumpXML
 *        - Generate XML to pass to dst
 *
 *  Dst: Prepare
 *        - Get ready to accept incoming VM
 *        - Generate optional cookie to pass to src
 *
 *  Src: Perform
 *        - Start migration and wait for send completion
 *        - Kill off VM if successful, resume if failed
 *
 *  Dst: Finish
 *        - Wait for recv completion and check status
 *        - Kill off VM if unsuccessful
 *
 */
4584
static virDomainPtr
4585 4586 4587 4588 4589 4590
virDomainMigrateVersion2(virDomainPtr domain,
                         virConnectPtr dconn,
                         unsigned long flags,
                         const char *dname,
                         const char *uri,
                         unsigned long bandwidth)
4591 4592 4593 4594 4595 4596
{
    virDomainPtr ddomain = NULL;
    char *uri_out = NULL;
    char *cookie = NULL;
    char *dom_xml = NULL;
    int cookielen = 0, ret;
4597
    virDomainInfo info;
4598
    virErrorPtr orig_err = NULL;
4599
    unsigned int getxml_flags = 0;
4600
    int cancelled;
4601
    unsigned long destflags;
4602

4603
    VIR_DOMAIN_DEBUG(domain,
E
Eric Blake 已提交
4604
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
4605
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);
4606 4607 4608 4609 4610 4611 4612 4613 4614 4615 4616 4617 4618 4619 4620 4621 4622

    /* Prepare the migration.
     *
     * The destination host may return a cookie, or leave cookie as
     * NULL.
     *
     * The destination host MUST set uri_out if uri_in is NULL.
     *
     * If uri_in is non-NULL, then the destination host may modify
     * the URI by setting uri_out.  If it does not wish to modify
     * the URI, it should leave uri_out as NULL.
     */

    /* In version 2 of the protocol, the prepare step is slightly
     * different.  We fetch the domain XML of the source domain
     * and pass it to Prepare2.
     */
4623
    if (!domain->conn->driver->domainGetXMLDesc) {
4624
        virReportUnsupportedError();
4625 4626
        return NULL;
    }
4627 4628 4629 4630 4631 4632 4633 4634 4635

    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_XML_MIGRATABLE)) {
        getxml_flags |= VIR_DOMAIN_XML_MIGRATABLE;
    } else {
        getxml_flags |= VIR_DOMAIN_XML_SECURE | VIR_DOMAIN_XML_UPDATE_CPU;
    }

    dom_xml = domain->conn->driver->domainGetXMLDesc(domain, getxml_flags);
4636 4637 4638
    if (!dom_xml)
        return NULL;

4639
    ret = virDomainGetInfo(domain, &info);
4640
    if (ret == 0 && info.state == VIR_DOMAIN_PAUSED)
4641 4642
        flags |= VIR_MIGRATE_PAUSED;

4643 4644
    destflags = flags & ~(VIR_MIGRATE_ABORT_ON_ERROR |
                          VIR_MIGRATE_AUTO_CONVERGE);
4645 4646

    VIR_DEBUG("Prepare2 %p flags=%lx", dconn, destflags);
4647
    ret = dconn->driver->domainMigratePrepare2
4648
        (dconn, &cookie, &cookielen, uri, &uri_out, destflags, dname,
4649
         bandwidth, dom_xml);
4650
    VIR_FREE(dom_xml);
4651 4652 4653 4654
    if (ret == -1)
        goto done;

    if (uri == NULL && uri_out == NULL) {
4655 4656
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("domainMigratePrepare2 did not set uri"));
4657
        cancelled = 1;
4658 4659
        /* Make sure Finish doesn't overwrite the error */
        orig_err = virSaveLastError();
4660
        goto finish;
4661 4662 4663 4664 4665 4666 4667
    }
    if (uri_out)
        uri = uri_out; /* Did domainMigratePrepare2 change URI? */

    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete.
     */
4668
    VIR_DEBUG("Perform %p", domain->conn);
4669 4670 4671
    ret = domain->conn->driver->domainMigratePerform
        (domain, cookie, cookielen, uri, flags, dname, bandwidth);

4672 4673 4674 4675
    /* Perform failed. Make sure Finish doesn't overwrite the error */
    if (ret < 0)
        orig_err = virSaveLastError();

4676 4677 4678 4679 4680
    /* If Perform returns < 0, then we need to cancel the VM
     * startup on the destination
     */
    cancelled = ret < 0 ? 1 : 0;

4681
 finish:
4682 4683 4684 4685 4686
    /* In version 2 of the migration protocol, we pass the
     * status code from the sender to the destination host,
     * so it can do any cleanup if the migration failed.
     */
    dname = dname ? dname : domain->name;
4687
    VIR_DEBUG("Finish2 %p ret=%d", dconn, ret);
4688
    ddomain = dconn->driver->domainMigrateFinish2
4689
        (dconn, dname, cookie, cookielen, uri, destflags, cancelled);
4690 4691
    if (cancelled && ddomain)
        VIR_ERROR(_("finish step ignored that migration was cancelled"));
4692

4693
 done:
4694 4695 4696 4697
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
4698 4699
    VIR_FREE(uri_out);
    VIR_FREE(cookie);
4700 4701 4702
    return ddomain;
}

4703

4704 4705 4706 4707 4708 4709 4710 4711 4712 4713 4714 4715 4716 4717 4718 4719 4720 4721 4722 4723 4724 4725 4726
/*
 * Sequence v3:
 *
 *  Src: Begin
 *        - Generate XML to pass to dst
 *        - Generate optional cookie to pass to dst
 *
 *  Dst: Prepare
 *        - Get ready to accept incoming VM
 *        - Generate optional cookie to pass to src
 *
 *  Src: Perform
 *        - Start migration and wait for send completion
 *        - Generate optional cookie to pass to dst
 *
 *  Dst: Finish
 *        - Wait for recv completion and check status
 *        - Kill off VM if failed, resume if success
 *        - Generate optional cookie to pass to src
 *
 *  Src: Confirm
 *        - Kill off VM if success, resume if failed
 *
4727 4728 4729 4730
  * If useParams is true, params and nparams contain migration parameters and
  * we know it's safe to call the API which supports extensible parameters.
  * Otherwise, we have to use xmlin, dname, uri, and bandwidth and pass them
  * to the old-style APIs.
4731 4732
 */
static virDomainPtr
4733 4734 4735 4736 4737 4738 4739 4740 4741 4742
virDomainMigrateVersion3Full(virDomainPtr domain,
                             virConnectPtr dconn,
                             const char *xmlin,
                             const char *dname,
                             const char *uri,
                             unsigned long long bandwidth,
                             virTypedParameterPtr params,
                             int nparams,
                             bool useParams,
                             unsigned int flags)
4743 4744 4745 4746 4747 4748 4749 4750 4751 4752 4753
{
    virDomainPtr ddomain = NULL;
    char *uri_out = NULL;
    char *cookiein = NULL;
    char *cookieout = NULL;
    char *dom_xml = NULL;
    int cookieinlen = 0;
    int cookieoutlen = 0;
    int ret;
    virDomainInfo info;
    virErrorPtr orig_err = NULL;
4754 4755
    int cancelled = 1;
    unsigned long protection = 0;
4756
    bool notify_source = true;
4757
    unsigned int destflags;
4758 4759
    int state;
    virTypedParameterPtr tmp;
4760

4761 4762 4763 4764 4765 4766
    VIR_DOMAIN_DEBUG(domain,
                     "dconn=%p, xmlin=%s, dname=%s, uri=%s, bandwidth=%llu, "
                     "params=%p, nparams=%d, useParams=%d, flags=%x",
                     dconn, NULLSTR(xmlin), NULLSTR(dname), NULLSTR(uri),
                     bandwidth, params, nparams, useParams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
4767

4768 4769 4770 4771 4772 4773 4774 4775 4776 4777 4778 4779
    if ((!useParams &&
         (!domain->conn->driver->domainMigrateBegin3 ||
          !domain->conn->driver->domainMigratePerform3 ||
          !domain->conn->driver->domainMigrateConfirm3 ||
          !dconn->driver->domainMigratePrepare3 ||
          !dconn->driver->domainMigrateFinish3)) ||
        (useParams &&
         (!domain->conn->driver->domainMigrateBegin3Params ||
          !domain->conn->driver->domainMigratePerform3Params ||
          !domain->conn->driver->domainMigrateConfirm3Params ||
          !dconn->driver->domainMigratePrepare3Params ||
          !dconn->driver->domainMigrateFinish3Params))) {
4780
        virReportUnsupportedError();
4781 4782 4783
        return NULL;
    }

4784 4785 4786 4787
    if (virTypedParamsCopy(&tmp, params, nparams) < 0)
        return NULL;
    params = tmp;

4788 4789 4790 4791
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION))
        protection = VIR_MIGRATE_CHANGE_PROTECTION;

4792
    VIR_DEBUG("Begin3 %p", domain->conn);
4793 4794 4795 4796 4797 4798 4799 4800 4801
    if (useParams) {
        dom_xml = domain->conn->driver->domainMigrateBegin3Params
            (domain, params, nparams, &cookieout, &cookieoutlen,
             flags | protection);
    } else {
        dom_xml = domain->conn->driver->domainMigrateBegin3
            (domain, xmlin, &cookieout, &cookieoutlen,
             flags | protection, dname, bandwidth);
    }
4802 4803 4804
    if (!dom_xml)
        goto done;

4805 4806 4807 4808 4809 4810 4811
    if (useParams) {
        /* If source is new enough to support extensible migration parameters,
         * it's certainly new enough to support virDomainGetState. */
        ret = virDomainGetState(domain, &state, NULL, 0);
    } else {
        ret = virDomainGetInfo(domain, &info);
        state = info.state;
4812
    }
4813 4814
    if (ret == 0 && state == VIR_DOMAIN_PAUSED)
        flags |= VIR_MIGRATE_PAUSED;
4815

4816 4817
    destflags = flags & ~(VIR_MIGRATE_ABORT_ON_ERROR |
                          VIR_MIGRATE_AUTO_CONVERGE);
4818 4819

    VIR_DEBUG("Prepare3 %p flags=%x", dconn, destflags);
4820 4821 4822 4823
    cookiein = cookieout;
    cookieinlen = cookieoutlen;
    cookieout = NULL;
    cookieoutlen = 0;
4824 4825 4826 4827 4828 4829 4830 4831 4832 4833 4834 4835 4836
    if (useParams) {
        if (virTypedParamsReplaceString(&params, &nparams,
                                        VIR_MIGRATE_PARAM_DEST_XML,
                                        dom_xml) < 0)
            goto done;
        ret = dconn->driver->domainMigratePrepare3Params
            (dconn, params, nparams, cookiein, cookieinlen,
             &cookieout, &cookieoutlen, &uri_out, destflags);
    } else {
        ret = dconn->driver->domainMigratePrepare3
            (dconn, cookiein, cookieinlen, &cookieout, &cookieoutlen,
             uri, &uri_out, destflags, dname, bandwidth, dom_xml);
    }
4837 4838 4839 4840 4841 4842 4843 4844 4845 4846 4847
    if (ret == -1) {
        if (protection) {
            /* Begin already started a migration job so we need to cancel it by
             * calling Confirm while making sure it doesn't overwrite the error
             */
            orig_err = virSaveLastError();
            goto confirm;
        } else {
            goto done;
        }
    }
4848

4849 4850 4851 4852 4853 4854
    /* Did domainMigratePrepare3 change URI? */
    if (uri_out) {
        uri = uri_out;
        if (useParams &&
            virTypedParamsReplaceString(&params, &nparams,
                                        VIR_MIGRATE_PARAM_URI,
4855 4856 4857
                                        uri_out) < 0) {
            cancelled = 1;
            orig_err = virSaveLastError();
4858
            goto finish;
4859
        }
4860 4861 4862
    } else if (!uri &&
               virTypedParamsGetString(params, nparams,
                                       VIR_MIGRATE_PARAM_URI, &uri) <= 0) {
4863 4864
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("domainMigratePrepare3 did not set uri"));
4865 4866 4867
        cancelled = 1;
        orig_err = virSaveLastError();
        goto finish;
4868 4869
    }

L
liguang 已提交
4870 4871 4872 4873 4874 4875 4876 4877
    if (flags & VIR_MIGRATE_OFFLINE) {
        VIR_DEBUG("Offline migration, skipping Perform phase");
        VIR_FREE(cookieout);
        cookieoutlen = 0;
        cancelled = 0;
        goto finish;
    }

4878 4879 4880 4881 4882 4883 4884 4885 4886 4887 4888
    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete. The src VM should remain
     * running, but in paused state until the destination can
     * confirm migration completion.
     */
    VIR_DEBUG("Perform3 %p uri=%s", domain->conn, uri);
    VIR_FREE(cookiein);
    cookiein = cookieout;
    cookieinlen = cookieoutlen;
    cookieout = NULL;
    cookieoutlen = 0;
4889
    /* dconnuri not relevant in non-P2P modes, so left NULL here */
4890 4891 4892 4893 4894 4895 4896 4897 4898 4899
    if (useParams) {
        ret = domain->conn->driver->domainMigratePerform3Params
            (domain, NULL, params, nparams, cookiein, cookieinlen,
             &cookieout, &cookieoutlen, flags | protection);
    } else {
        ret = domain->conn->driver->domainMigratePerform3
            (domain, NULL, cookiein, cookieinlen,
             &cookieout, &cookieoutlen, NULL,
             uri, flags | protection, dname, bandwidth);
    }
4900 4901

    /* Perform failed. Make sure Finish doesn't overwrite the error */
4902
    if (ret < 0) {
4903
        orig_err = virSaveLastError();
4904 4905 4906 4907 4908
        /* Perform failed so we don't need to call confirm to let source know
         * about the failure.
         */
        notify_source = false;
    }
4909 4910 4911 4912 4913 4914

    /* If Perform returns < 0, then we need to cancel the VM
     * startup on the destination
     */
    cancelled = ret < 0 ? 1 : 0;

4915
 finish:
4916 4917 4918 4919 4920 4921 4922 4923 4924 4925 4926 4927
    /*
     * The status code from the source is passed to the destination.
     * The dest can cleanup if the source indicated it failed to
     * send all migration data. Returns NULL for ddomain if
     * the dest was unable to complete migration.
     */
    VIR_DEBUG("Finish3 %p ret=%d", dconn, ret);
    VIR_FREE(cookiein);
    cookiein = cookieout;
    cookieinlen = cookieoutlen;
    cookieout = NULL;
    cookieoutlen = 0;
4928 4929 4930 4931 4932 4933
    if (useParams) {
        if (virTypedParamsGetString(params, nparams,
                                    VIR_MIGRATE_PARAM_DEST_NAME, NULL) <= 0 &&
            virTypedParamsReplaceString(&params, &nparams,
                                        VIR_MIGRATE_PARAM_DEST_NAME,
                                        domain->name) < 0) {
4934
            ddomain = NULL;
4935 4936 4937 4938 4939 4940 4941 4942 4943 4944 4945
        } else {
            ddomain = dconn->driver->domainMigrateFinish3Params
                (dconn, params, nparams, cookiein, cookieinlen,
                 &cookieout, &cookieoutlen, destflags, cancelled);
        }
    } else {
        dname = dname ? dname : domain->name;
        ddomain = dconn->driver->domainMigrateFinish3
            (dconn, dname, cookiein, cookieinlen, &cookieout, &cookieoutlen,
             NULL, uri, destflags, cancelled);
    }
4946 4947
    if (cancelled && ddomain)
        VIR_ERROR(_("finish step ignored that migration was cancelled"));
4948 4949 4950 4951 4952 4953 4954 4955

    /* If ddomain is NULL, then we were unable to start
     * the guest on the target, and must restart on the
     * source. There is a small chance that the ddomain
     * is NULL due to an RPC failure, in which case
     * ddomain could in fact be running on the dest.
     * The lock manager plugins should take care of
     * safety in this scenario.
4956
     */
4957
    cancelled = ddomain == NULL ? 1 : 0;
4958

4959 4960 4961 4962 4963 4964
    /* If finish3 set an error, and we don't have an earlier
     * one we need to preserve it in case confirm3 overwrites
     */
    if (!orig_err)
        orig_err = virSaveLastError();

4965
 confirm:
4966
    /*
4967 4968 4969
     * If cancelled, then src VM will be restarted, else it will be killed.
     * Don't do this if migration failed on source and thus it was already
     * cancelled there.
4970
     */
4971 4972 4973 4974 4975 4976 4977
    if (notify_source) {
        VIR_DEBUG("Confirm3 %p ret=%d domain=%p", domain->conn, ret, domain);
        VIR_FREE(cookiein);
        cookiein = cookieout;
        cookieinlen = cookieoutlen;
        cookieout = NULL;
        cookieoutlen = 0;
4978 4979 4980 4981 4982 4983 4984 4985 4986
        if (useParams) {
            ret = domain->conn->driver->domainMigrateConfirm3Params
                (domain, params, nparams, cookiein, cookieinlen,
                 flags | protection, cancelled);
        } else {
            ret = domain->conn->driver->domainMigrateConfirm3
                (domain, cookiein, cookieinlen,
                 flags | protection, cancelled);
        }
4987 4988 4989 4990 4991 4992 4993 4994 4995
        /* If Confirm3 returns -1, there's nothing more we can
         * do, but fortunately worst case is that there is a
         * domain left in 'paused' state on source.
         */
        if (ret < 0) {
            VIR_WARN("Guest %s probably left in 'paused' state on source",
                     domain->name);
        }
    }
4996

4997
 done:
4998 4999 5000 5001
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
5002
    VIR_FREE(dom_xml);
5003 5004 5005
    VIR_FREE(uri_out);
    VIR_FREE(cookiein);
    VIR_FREE(cookieout);
5006
    virTypedParamsFree(params, nparams);
5007 5008 5009
    return ddomain;
}

5010

5011 5012 5013 5014 5015 5016 5017 5018 5019 5020 5021 5022 5023
static virDomainPtr
virDomainMigrateVersion3(virDomainPtr domain,
                         virConnectPtr dconn,
                         const char *xmlin,
                         unsigned long flags,
                         const char *dname,
                         const char *uri,
                         unsigned long bandwidth)
{
    return virDomainMigrateVersion3Full(domain, dconn, xmlin, dname, uri,
                                        bandwidth, NULL, 0, false, flags);
}

5024

J
Jiri Denemark 已提交
5025 5026 5027 5028 5029 5030 5031 5032 5033 5034 5035
static virDomainPtr
virDomainMigrateVersion3Params(virDomainPtr domain,
                               virConnectPtr dconn,
                               virTypedParameterPtr params,
                               int nparams,
                               unsigned int flags)
{
    return virDomainMigrateVersion3Full(domain, dconn, NULL, NULL, NULL, 0,
                                        params, nparams, true, flags);
}

5036

5037 5038 5039 5040 5041 5042 5043 5044 5045 5046 5047 5048 5049 5050
/*
 * In normal migration, the libvirt client co-ordinates communication
 * between the 2 libvirtd instances on source & dest hosts.
 *
 * In this peer-2-peer migration alternative, the libvirt client
 * only talks to the source libvirtd instance. The source libvirtd
 * then opens its own connection to the destination and co-ordinates
 * migration itself.
 *
 * If useParams is true, params and nparams contain migration parameters and
 * we know it's safe to call the API which supports extensible parameters.
 * Otherwise, we have to use xmlin, dname, uri, and bandwidth and pass them
 * to the old-style APIs.
 */
5051
static int
5052 5053 5054 5055 5056 5057 5058 5059 5060 5061
virDomainMigratePeer2PeerFull(virDomainPtr domain,
                              const char *dconnuri,
                              const char *xmlin,
                              const char *dname,
                              const char *uri,
                              unsigned long long bandwidth,
                              virTypedParameterPtr params,
                              int nparams,
                              bool useParams,
                              unsigned int flags)
5062
{
M
Martin Kletzander 已提交
5063
    virURIPtr tempuri = NULL;
5064

5065 5066 5067 5068 5069 5070
    VIR_DOMAIN_DEBUG(domain,
                     "dconnuri=%s, xmlin=%s, dname=%s, uri=%s, bandwidth=%llu "
                     "params=%p, nparams=%d, useParams=%d, flags=%x",
                     dconnuri, NULLSTR(xmlin), NULLSTR(dname), NULLSTR(uri),
                     bandwidth, params, nparams, useParams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
5071

5072 5073 5074 5075
    if ((useParams && !domain->conn->driver->domainMigratePerform3Params) ||
        (!useParams &&
         !domain->conn->driver->domainMigratePerform &&
         !domain->conn->driver->domainMigratePerform3)) {
5076
        virReportUnsupportedError();
5077 5078 5079
        return -1;
    }

5080
    if (!(tempuri = virURIParse(dconnuri)))
5081
        return -1;
5082
    if (!tempuri->server || STRPREFIX(tempuri->server, "localhost")) {
5083 5084 5085
        virReportInvalidArg(dconnuri,
                            _("unable to parse server from dconnuri in %s"),
                            __FUNCTION__);
5086
        virURIFree(tempuri);
5087 5088
        return -1;
    }
5089
    virURIFree(tempuri);
5090

5091 5092 5093 5094 5095 5096 5097
    if (useParams) {
        VIR_DEBUG("Using migration protocol 3 with extensible parameters");
        return domain->conn->driver->domainMigratePerform3Params
                (domain, dconnuri, params, nparams,
                 NULL, 0, NULL, NULL, flags);
    } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                        VIR_DRV_FEATURE_MIGRATION_V3)) {
5098
        VIR_DEBUG("Using migration protocol 3");
5099 5100 5101
        return domain->conn->driver->domainMigratePerform3
                (domain, xmlin, NULL, 0, NULL, NULL, dconnuri,
                 uri, flags, dname, bandwidth);
5102 5103
    } else {
        VIR_DEBUG("Using migration protocol 2");
5104
        if (xmlin) {
5105 5106 5107
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during "
                             "migration"));
5108 5109
            return -1;
        }
5110
        if (uri) {
5111 5112
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unable to override peer2peer migration URI"));
5113 5114
            return -1;
        }
5115 5116
        return domain->conn->driver->domainMigratePerform
                (domain, NULL, 0, dconnuri, flags, dname, bandwidth);
5117
    }
5118 5119
}

5120

5121 5122 5123 5124 5125 5126 5127 5128 5129 5130 5131 5132 5133
static int
virDomainMigratePeer2Peer(virDomainPtr domain,
                          const char *xmlin,
                          unsigned long flags,
                          const char *dname,
                          const char *dconnuri,
                          const char *uri,
                          unsigned long bandwidth)
{
    return virDomainMigratePeer2PeerFull(domain, dconnuri, xmlin, dname, uri,
                                         bandwidth, NULL, 0, false, flags);
}

5134

J
Jiri Denemark 已提交
5135 5136 5137 5138 5139 5140 5141 5142 5143 5144 5145
static int
virDomainMigratePeer2PeerParams(virDomainPtr domain,
                                const char *dconnuri,
                                virTypedParameterPtr params,
                                int nparams,
                                unsigned int flags)
{
    return virDomainMigratePeer2PeerFull(domain, dconnuri, NULL, NULL, NULL, 0,
                                         params, nparams, true, flags);
}

5146

C
Chris Lalancette 已提交
5147
/*
5148
 * In normal migration, the libvirt client co-ordinates communication
5149
 * between the 2 libvirtd instances on source & dest hosts.
C
Chris Lalancette 已提交
5150
 *
5151 5152 5153
 * Some hypervisors support an alternative, direct migration where
 * there is no requirement for a libvirtd instance on the dest host.
 * In this case
5154
 *
5155 5156
 * eg, XenD can talk direct to XenD, so libvirtd on dest does not
 * need to be involved at all, or even running
C
Chris Lalancette 已提交
5157
 */
5158
static int
5159 5160 5161 5162 5163 5164
virDomainMigrateDirect(virDomainPtr domain,
                       const char *xmlin,
                       unsigned long flags,
                       const char *dname,
                       const char *uri,
                       unsigned long bandwidth)
5165
{
5166 5167 5168 5169
    VIR_DOMAIN_DEBUG(domain,
                     "xmlin=%s, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
                     NULLSTR(xmlin), flags, NULLSTR(dname), NULLSTR(uri),
                     bandwidth);
5170

5171
    if (!domain->conn->driver->domainMigratePerform) {
5172
        virReportUnsupportedError();
5173 5174 5175
        return -1;
    }

C
Chris Lalancette 已提交
5176 5177 5178
    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete.
     */
5179 5180 5181
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATION_V3)) {
        VIR_DEBUG("Using migration protocol 3");
5182 5183
        /* dconn URI not relevant in direct migration, since no
         * target libvirtd is involved */
5184
        return domain->conn->driver->domainMigratePerform3(domain,
5185
                                                           xmlin,
5186 5187 5188 5189
                                                           NULL, /* cookiein */
                                                           0,    /* cookieinlen */
                                                           NULL, /* cookieoutlen */
                                                           NULL, /* cookieoutlen */
5190
                                                           NULL, /* dconnuri */
5191 5192 5193 5194 5195 5196
                                                           uri,
                                                           flags,
                                                           dname,
                                                           bandwidth);
    } else {
        VIR_DEBUG("Using migration protocol 2");
5197
        if (xmlin) {
5198 5199
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during migration"));
5200 5201
            return -1;
        }
5202 5203 5204 5205 5206 5207 5208 5209
        return domain->conn->driver->domainMigratePerform(domain,
                                                          NULL, /* cookie */
                                                          0,    /* cookielen */
                                                          uri,
                                                          flags,
                                                          dname,
                                                          bandwidth);
    }
C
Chris Lalancette 已提交
5210 5211
}

5212

5213 5214 5215 5216
/**
 * virDomainMigrate:
 * @domain: a domain object
 * @dconn: destination host (a connection object)
5217
 * @flags: bitwise-OR of virDomainMigrateFlags
5218 5219
 * @dname: (optional) rename domain to this at destination
 * @uri: (optional) dest hostname/URI as seen from the source host
5220
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5221 5222 5223 5224 5225
 *
 * Migrate the domain object from its current host to the destination
 * host given by dconn (a connection to the destination host).
 *
 * Flags may be one of more of the following:
5226 5227 5228
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
C
Chris Lalancette 已提交
5229 5230 5231 5232
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
5233
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
5234 5235 5236 5237
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
5238 5239 5240
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
5241
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
5242
 *   VIR_MIGRATE_OFFLINE Migrate offline
5243 5244 5245 5246 5247
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 * Applications using the VIR_MIGRATE_PEER2PEER flag will probably
 * prefer to invoke virDomainMigrateToURI, avoiding the need to
 * open connection to the destination host themselves.
5248 5249 5250 5251 5252 5253
 *
 * If a hypervisor supports renaming domains during migration,
 * then you may set the dname parameter to the new name (otherwise
 * it keeps the same name).  If this is not supported by the
 * hypervisor, dname must be NULL or else you will get an error.
 *
5254 5255 5256 5257 5258 5259 5260 5261 5262 5263 5264
 * If the VIR_MIGRATE_PEER2PEER flag is set, the uri parameter
 * must be a valid libvirt connection URI, by which the source
 * libvirt driver can connect to the destination libvirt. If
 * omitted, the dconn connection object will be queried for its
 * current URI.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, the URI parameter
 * takes a hypervisor specific format. The hypervisor capabilities
 * XML includes details of the support URI schemes. If omitted
 * the dconn will be asked for a default URI.
 *
5265 5266 5267 5268
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
5269
 * In either case it is typically only necessary to specify a
5270 5271
 * URI if the destination host has multiple interfaces and a
 * specific interface is required to transmit migration data.
5272
 *
5273
 * The maximum bandwidth (in MiB/s) that will be used to do migration
5274 5275 5276 5277 5278 5279 5280 5281 5282 5283 5284 5285 5286 5287 5288 5289 5290 5291
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns the new domain object if the migration was successful,
 *   or NULL in case of error.  Note that the new domain object
 *   exists in the scope of the destination connection (dconn).
 */
virDomainPtr
5292 5293 5294 5295 5296 5297
virDomainMigrate(virDomainPtr domain,
                 virConnectPtr dconn,
                 unsigned long flags,
                 const char *dname,
                 const char *uri,
                 unsigned long bandwidth)
5298 5299
{
    virDomainPtr ddomain = NULL;
5300

5301 5302
    VIR_DOMAIN_DEBUG(domain,
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
5303
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);
5304

5305 5306
    virResetLastError();

5307
    /* First checkout the source */
5308
    virCheckDomainReturn(domain, NULL);
5309
    virCheckReadOnlyGoto(domain->conn->flags, error);
5310

5311
    /* Now checkout the destination */
5312
    virCheckConnectGoto(dconn, error);
5313
    virCheckReadOnlyGoto(dconn->flags, error);
5314

5315 5316 5317 5318 5319 5320 5321 5322 5323
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

L
liguang 已提交
5324 5325 5326
    if (flags & VIR_MIGRATE_OFFLINE) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5327 5328 5329
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the source host"));
L
liguang 已提交
5330 5331 5332 5333
            goto error;
        }
        if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5334 5335 5336
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the destination host"));
L
liguang 已提交
5337 5338 5339 5340
            goto error;
        }
    }

5341
    if (flags & VIR_MIGRATE_PEER2PEER) {
5342 5343
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
5344 5345 5346
            char *dstURI = NULL;
            if (uri == NULL) {
                dstURI = virConnectGetURI(dconn);
5347
                if (!dstURI)
5348 5349
                    return NULL;
            }
5350

5351
            VIR_DEBUG("Using peer2peer migration");
5352
            if (virDomainMigratePeer2Peer(domain, NULL, flags, dname,
5353
                                          uri ? uri : dstURI, NULL, bandwidth) < 0) {
5354 5355 5356 5357
                VIR_FREE(dstURI);
                goto error;
            }
            VIR_FREE(dstURI);
C
Chris Lalancette 已提交
5358

5359
            ddomain = virDomainLookupByName(dconn, dname ? dname : domain->name);
5360 5361
        } else {
            /* This driver does not support peer to peer migration */
5362
            virReportUnsupportedError();
5363 5364
            goto error;
        }
5365
    } else {
5366 5367 5368 5369 5370 5371 5372 5373
        /* Change protection requires support only on source side, and
         * is only needed in v3 migration, which automatically re-adds
         * the flag for just the source side.  We mask it out for
         * non-peer2peer to allow migration from newer source to an
         * older destination that rejects the flag.  */
        if (flags & VIR_MIGRATE_CHANGE_PROTECTION &&
            !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION)) {
5374 5375
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("cannot enforce change protection"));
5376 5377 5378
            goto error;
        }
        flags &= ~VIR_MIGRATE_CHANGE_PROTECTION;
5379
        if (flags & VIR_MIGRATE_TUNNELLED) {
5380 5381
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("cannot perform tunnelled migration without using peer2peer flag"));
5382 5383 5384
            goto error;
        }

C
Chris Lalancette 已提交
5385 5386
        /* Check that migration is supported by both drivers. */
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
5387
                                     VIR_DRV_FEATURE_MIGRATION_V3) &&
C
Chris Lalancette 已提交
5388
            VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
5389 5390
                                     VIR_DRV_FEATURE_MIGRATION_V3)) {
            VIR_DEBUG("Using migration protocol 3");
5391 5392
            ddomain = virDomainMigrateVersion3(domain, dconn, NULL,
                                               flags, dname, uri, bandwidth);
5393 5394 5395 5396 5397
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V2) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                          VIR_DRV_FEATURE_MIGRATION_V2)) {
            VIR_DEBUG("Using migration protocol 2");
5398 5399
            ddomain = virDomainMigrateVersion2(domain, dconn, flags,
                                               dname, uri, bandwidth);
5400 5401 5402 5403 5404
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V1) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                            VIR_DRV_FEATURE_MIGRATION_V1)) {
            VIR_DEBUG("Using migration protocol 1");
5405 5406 5407 5408
            ddomain = virDomainMigrateVersion1(domain, dconn, flags,
                                               dname, uri, bandwidth);
        } else {
            /* This driver does not support any migration method */
5409
            virReportUnsupportedError();
5410 5411 5412 5413 5414 5415 5416 5417 5418
            goto error;
        }
    }

    if (ddomain == NULL)
        goto error;

    return ddomain;

5419
 error:
5420 5421 5422 5423 5424 5425 5426 5427 5428
    virDispatchError(domain->conn);
    return NULL;
}


/**
 * virDomainMigrate2:
 * @domain: a domain object
 * @dconn: destination host (a connection object)
5429
 * @flags: bitwise-OR of virDomainMigrateFlags
5430 5431 5432
 * @dxml: (optional) XML config for launching guest on target
 * @dname: (optional) rename domain to this at destination
 * @uri: (optional) dest hostname/URI as seen from the source host
5433
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5434 5435 5436 5437 5438 5439 5440 5441 5442 5443 5444 5445 5446
 *
 * Migrate the domain object from its current host to the destination
 * host given by dconn (a connection to the destination host).
 *
 * Flags may be one of more of the following:
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
5447 5448 5449 5450
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
5451 5452 5453
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
5454
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
5455
 *   VIR_MIGRATE_OFFLINE Migrate offline
5456 5457 5458 5459 5460 5461 5462 5463 5464 5465 5466 5467 5468 5469 5470 5471 5472 5473 5474 5475 5476 5477
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 * Applications using the VIR_MIGRATE_PEER2PEER flag will probably
 * prefer to invoke virDomainMigrateToURI, avoiding the need to
 * open connection to the destination host themselves.
 *
 * If a hypervisor supports renaming domains during migration,
 * then you may set the dname parameter to the new name (otherwise
 * it keeps the same name).  If this is not supported by the
 * hypervisor, dname must be NULL or else you will get an error.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is set, the uri parameter
 * must be a valid libvirt connection URI, by which the source
 * libvirt driver can connect to the destination libvirt. If
 * omitted, the dconn connection object will be queried for its
 * current URI.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, the URI parameter
 * takes a hypervisor specific format. The hypervisor capabilities
 * XML includes details of the support URI schemes. If omitted
 * the dconn will be asked for a default URI.
 *
5478 5479 5480 5481
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
5482 5483 5484 5485
 * In either case it is typically only necessary to specify a
 * URI if the destination host has multiple interfaces and a
 * specific interface is required to transmit migration data.
 *
5486
 * The maximum bandwidth (in MiB/s) that will be used to do migration
5487 5488 5489 5490 5491 5492 5493 5494 5495 5496 5497 5498 5499
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
5500 5501 5502 5503 5504 5505 5506 5507
 * If the hypervisor supports it, @dxml can be used to alter
 * host-specific portions of the domain XML that will be used on
 * the destination.  For example, it is possible to alter the
 * backing filename that is associated with a disk device, in order
 * to account for naming differences between source and destination
 * in accessing the underlying storage.  The migration will fail
 * if @dxml would cause any guest-visible changes.  Pass NULL
 * if no changes are needed to the XML between source and destination.
5508
 * @dxml cannot be used to rename the domain during migration (use
5509 5510
 * @dname for that purpose).  Domain name in @dxml must match the
 * original domain name.
5511
 *
5512 5513 5514 5515 5516 5517 5518 5519 5520 5521 5522 5523 5524 5525 5526
 * Returns the new domain object if the migration was successful,
 *   or NULL in case of error.  Note that the new domain object
 *   exists in the scope of the destination connection (dconn).
 */
virDomainPtr
virDomainMigrate2(virDomainPtr domain,
                  virConnectPtr dconn,
                  const char *dxml,
                  unsigned long flags,
                  const char *dname,
                  const char *uri,
                  unsigned long bandwidth)
{
    virDomainPtr ddomain = NULL;

5527 5528
    VIR_DOMAIN_DEBUG(domain,
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
5529 5530 5531 5532 5533
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);

    virResetLastError();

    /* First checkout the source */
5534
    virCheckDomainReturn(domain, NULL);
5535
    virCheckReadOnlyGoto(domain->conn->flags, error);
5536 5537

    /* Now checkout the destination */
5538
    virCheckConnectGoto(dconn, error);
5539
    virCheckReadOnlyGoto(dconn->flags, error);
5540

5541 5542 5543 5544 5545 5546 5547 5548 5549
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

L
liguang 已提交
5550 5551 5552
    if (flags & VIR_MIGRATE_OFFLINE) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5553 5554 5555
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the source host"));
L
liguang 已提交
5556 5557 5558 5559
            goto error;
        }
        if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5560 5561 5562
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the destination host"));
L
liguang 已提交
5563 5564 5565 5566
            goto error;
        }
    }

5567
    if (flags & VIR_MIGRATE_PEER2PEER) {
5568 5569
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
5570 5571 5572 5573 5574 5575 5576 5577 5578 5579 5580 5581
            char *dstURI = virConnectGetURI(dconn);
            if (!dstURI)
                return NULL;

            VIR_DEBUG("Using peer2peer migration");
            if (virDomainMigratePeer2Peer(domain, dxml, flags, dname,
                                          dstURI, uri, bandwidth) < 0) {
                VIR_FREE(dstURI);
                goto error;
            }
            VIR_FREE(dstURI);

5582
            ddomain = virDomainLookupByName(dconn, dname ? dname : domain->name);
5583 5584
        } else {
            /* This driver does not support peer to peer migration */
5585
            virReportUnsupportedError();
5586 5587 5588
            goto error;
        }
    } else {
5589 5590 5591 5592 5593 5594 5595 5596
        /* Change protection requires support only on source side, and
         * is only needed in v3 migration, which automatically re-adds
         * the flag for just the source side.  We mask it out for
         * non-peer2peer to allow migration from newer source to an
         * older destination that rejects the flag.  */
        if (flags & VIR_MIGRATE_CHANGE_PROTECTION &&
            !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION)) {
5597 5598
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("cannot enforce change protection"));
5599 5600 5601
            goto error;
        }
        flags &= ~VIR_MIGRATE_CHANGE_PROTECTION;
5602
        if (flags & VIR_MIGRATE_TUNNELLED) {
5603 5604
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("cannot perform tunnelled migration without using peer2peer flag"));
5605 5606 5607 5608 5609 5610 5611 5612 5613 5614 5615 5616 5617 5618 5619 5620 5621
            goto error;
        }

        /* Check that migration is supported by both drivers. */
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_V3) &&
            VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                     VIR_DRV_FEATURE_MIGRATION_V3)) {
            VIR_DEBUG("Using migration protocol 3");
            ddomain = virDomainMigrateVersion3(domain, dconn, dxml,
                                               flags, dname, uri, bandwidth);
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V2) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                          VIR_DRV_FEATURE_MIGRATION_V2)) {
            VIR_DEBUG("Using migration protocol 2");
            if (dxml) {
5622 5623
                virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                               _("Unable to change target guest XML during migration"));
5624 5625 5626 5627 5628 5629 5630 5631 5632 5633
                goto error;
            }
            ddomain = virDomainMigrateVersion2(domain, dconn, flags,
                                               dname, uri, bandwidth);
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V1) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                            VIR_DRV_FEATURE_MIGRATION_V1)) {
            VIR_DEBUG("Using migration protocol 1");
            if (dxml) {
5634 5635
                virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                               _("Unable to change target guest XML during migration"));
5636 5637 5638 5639
                goto error;
            }
            ddomain = virDomainMigrateVersion1(domain, dconn, flags,
                                               dname, uri, bandwidth);
5640
        } else {
5641
            /* This driver does not support any migration method */
5642
            virReportUnsupportedError();
C
Chris Lalancette 已提交
5643 5644
            goto error;
        }
5645 5646
    }

5647 5648
    if (ddomain == NULL)
        goto error;
D
Daniel Veillard 已提交
5649

5650
    return ddomain;
5651

5652
 error:
5653
    virDispatchError(domain->conn);
5654
    return NULL;
5655 5656
}

5657

J
Jiri Denemark 已提交
5658 5659 5660 5661 5662 5663 5664 5665 5666 5667 5668 5669 5670 5671 5672 5673 5674 5675 5676 5677 5678 5679 5680 5681 5682 5683 5684 5685 5686 5687 5688 5689 5690 5691 5692 5693 5694 5695 5696 5697 5698 5699 5700 5701 5702 5703 5704 5705 5706 5707 5708 5709 5710
/**
 * virDomainMigrate3:
 * @domain: a domain object
 * @dconn: destination host (a connection object)
 * @params: (optional) migration parameters
 * @nparams: (optional) number of migration parameters in @params
 * @flags: bitwise-OR of virDomainMigrateFlags
 *
 * Migrate the domain object from its current host to the destination host
 * given by dconn (a connection to the destination host).
 *
 * See virDomainMigrateFlags documentation for description of individual flags.
 *
 * VIR_MIGRATE_TUNNELLED and VIR_MIGRATE_PEER2PEER are not supported by this
 * API, use virDomainMigrateToURI3 instead.
 *
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns the new domain object if the migration was successful,
 *   or NULL in case of error.  Note that the new domain object
 *   exists in the scope of the destination connection (dconn).
 */
virDomainPtr
virDomainMigrate3(virDomainPtr domain,
                  virConnectPtr dconn,
                  virTypedParameterPtr params,
                  unsigned int nparams,
                  unsigned int flags)
{
    virDomainPtr ddomain = NULL;
    const char *compatParams[] = { VIR_MIGRATE_PARAM_URI,
                                   VIR_MIGRATE_PARAM_DEST_NAME,
                                   VIR_MIGRATE_PARAM_DEST_XML,
                                   VIR_MIGRATE_PARAM_BANDWIDTH };
    const char *uri = NULL;
    const char *dname = NULL;
    const char *dxml = NULL;
    unsigned long long bandwidth = 0;

    VIR_DOMAIN_DEBUG(domain, "dconn=%p, params=%p, nparms=%u flags=%x",
                     dconn, params, nparams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

    /* First checkout the source */
5711
    virCheckDomainReturn(domain, NULL);
5712
    virCheckReadOnlyGoto(domain->conn->flags, error);
J
Jiri Denemark 已提交
5713 5714

    /* Now checkout the destination */
5715
    virCheckConnectGoto(dconn, error);
5716
    virCheckReadOnlyGoto(dconn->flags, error);
J
Jiri Denemark 已提交
5717 5718 5719 5720 5721 5722 5723 5724 5725 5726 5727 5728 5729 5730 5731 5732 5733 5734 5735

    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }
    if (flags & (VIR_MIGRATE_PEER2PEER | VIR_MIGRATE_TUNNELLED)) {
        virReportInvalidArg(flags, "%s",
                            _("use virDomainMigrateToURI3 for peer-to-peer "
                              "migration"));
        goto error;
    }

    if (flags & VIR_MIGRATE_OFFLINE) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5736 5737 5738
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the source host"));
J
Jiri Denemark 已提交
5739 5740 5741 5742
            goto error;
        }
        if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5743 5744 5745
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the destination host"));
J
Jiri Denemark 已提交
5746 5747 5748 5749 5750 5751 5752 5753 5754 5755 5756 5757
            goto error;
        }
    }

    /* Change protection requires support only on source side, and
     * is only needed in v3 migration, which automatically re-adds
     * the flag for just the source side.  We mask it out to allow
     * migration from newer source to an older destination that
     * rejects the flag.  */
    if (flags & VIR_MIGRATE_CHANGE_PROTECTION &&
        !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                  VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION)) {
5758 5759
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("cannot enforce change protection"));
J
Jiri Denemark 已提交
5760 5761 5762 5763 5764 5765 5766 5767 5768 5769 5770 5771 5772 5773 5774 5775 5776 5777
        goto error;
    }
    flags &= ~VIR_MIGRATE_CHANGE_PROTECTION;

    /* Prefer extensible API but fall back to older migration APIs if params
     * only contains parameters which were supported by the older API. */
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATION_PARAMS) &&
        VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                 VIR_DRV_FEATURE_MIGRATION_PARAMS)) {
        VIR_DEBUG("Using migration protocol 3 with extensible parameters");
        ddomain = virDomainMigrateVersion3Params(domain, dconn, params,
                                                 nparams, flags);
        goto done;
    }

    if (!virTypedParamsCheck(params, nparams, compatParams,
                             ARRAY_CARDINALITY(compatParams))) {
5778 5779 5780
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("Migration APIs with extensible parameters are not "
                         "supported but extended parameters were passed"));
J
Jiri Denemark 已提交
5781 5782 5783 5784 5785 5786 5787 5788 5789 5790 5791 5792 5793 5794 5795 5796 5797 5798 5799 5800 5801 5802 5803 5804 5805 5806 5807
        goto error;
    }

    if (virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_URI, &uri) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_NAME, &dname) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_XML, &dxml) < 0 ||
        virTypedParamsGetULLong(params, nparams,
                                VIR_MIGRATE_PARAM_BANDWIDTH, &bandwidth) < 0) {
        goto error;
    }

    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATION_V3) &&
        VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                 VIR_DRV_FEATURE_MIGRATION_V3)) {
        VIR_DEBUG("Using migration protocol 3");
        ddomain = virDomainMigrateVersion3(domain, dconn, dxml, flags,
                                           dname, uri, bandwidth);
    } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                        VIR_DRV_FEATURE_MIGRATION_V2) &&
               VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_V2)) {
        VIR_DEBUG("Using migration protocol 2");
        if (dxml) {
5808 5809 5810
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during "
                             "migration"));
J
Jiri Denemark 已提交
5811 5812 5813 5814 5815 5816 5817 5818 5819 5820
            goto error;
        }
        ddomain = virDomainMigrateVersion2(domain, dconn, flags,
                                           dname, uri, bandwidth);
    } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                        VIR_DRV_FEATURE_MIGRATION_V1) &&
               VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                        VIR_DRV_FEATURE_MIGRATION_V1)) {
        VIR_DEBUG("Using migration protocol 1");
        if (dxml) {
5821 5822 5823
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during "
                             "migration"));
J
Jiri Denemark 已提交
5824 5825 5826 5827 5828 5829
            goto error;
        }
        ddomain = virDomainMigrateVersion1(domain, dconn, flags,
                                           dname, uri, bandwidth);
    } else {
        /* This driver does not support any migration method */
5830
        virReportUnsupportedError();
J
Jiri Denemark 已提交
5831 5832 5833
        goto error;
    }

5834
 done:
J
Jiri Denemark 已提交
5835 5836 5837 5838 5839
    if (ddomain == NULL)
        goto error;

    return ddomain;

5840
 error:
J
Jiri Denemark 已提交
5841 5842 5843 5844 5845
    virDispatchError(domain->conn);
    return NULL;
}


5846 5847 5848 5849
/**
 * virDomainMigrateToURI:
 * @domain: a domain object
 * @duri: mandatory URI for the destination host
5850
 * @flags: bitwise-OR of virDomainMigrateFlags
5851
 * @dname: (optional) rename domain to this at destination
5852
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5853 5854
 *
 * Migrate the domain object from its current host to the destination
D
Dan Kenigsberg 已提交
5855
 * host given by duri.
5856 5857 5858 5859 5860
 *
 * Flags may be one of more of the following:
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
5861 5862 5863 5864
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
5865 5866 5867 5868 5869
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
5870 5871 5872
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
5873
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
5874
 *   VIR_MIGRATE_OFFLINE Migrate offline
5875
 *
5876 5877 5878 5879 5880 5881 5882 5883 5884 5885
 * The operation of this API hinges on the VIR_MIGRATE_PEER2PEER flag.
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, the duri parameter
 * takes a hypervisor specific format. The uri_transports element of the
 * hypervisor capabilities XML includes details of the supported URI
 * schemes. Not all hypervisors will support this mode of migration, so
 * if the VIR_MIGRATE_PEER2PEER flag is not set, then it may be necessary
 * to use the alternative virDomainMigrate API providing and explicit
 * virConnectPtr for the destination host.
 *
 * If the VIR_MIGRATE_PEER2PEER flag IS set, the duri parameter
5886
 * must be a valid libvirt connection URI, by which the source
D
Dan Kenigsberg 已提交
5887
 * libvirt driver can connect to the destination libvirt.
5888
 *
5889 5890
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 *
5891 5892 5893 5894
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
5895 5896 5897 5898 5899
 * If a hypervisor supports renaming domains during migration,
 * the dname parameter specifies the new name for the domain.
 * Setting dname to NULL keeps the domain name the same.  If domain
 * renaming is not supported by the hypervisor, dname must be NULL or
 * else an error will be returned.
5900
 *
5901
 * The maximum bandwidth (in MiB/s) that will be used to do migration
5902 5903 5904 5905 5906 5907 5908 5909 5910 5911 5912 5913 5914 5915 5916 5917
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns 0 if the migration succeeded, -1 upon error.
 */
int
5918 5919 5920 5921 5922
virDomainMigrateToURI(virDomainPtr domain,
                      const char *duri,
                      unsigned long flags,
                      const char *dname,
                      unsigned long bandwidth)
5923
{
5924
    VIR_DOMAIN_DEBUG(domain, "duri=%p, flags=%lx, dname=%s, bandwidth=%lu",
5925
                     NULLSTR(duri), flags, NULLSTR(dname), bandwidth);
5926 5927 5928 5929

    virResetLastError();

    /* First checkout the source */
5930
    virCheckDomainReturn(domain, -1);
5931
    virCheckReadOnlyGoto(domain->conn->flags, error);
5932

5933
    virCheckNonNullArgGoto(duri, error);
5934

5935 5936 5937 5938 5939 5940 5941 5942 5943
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

L
liguang 已提交
5944 5945 5946
    if (flags & VIR_MIGRATE_OFFLINE &&
        !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                  VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5947 5948 5949
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("offline migration is not supported by "
                         "the source host"));
L
liguang 已提交
5950 5951 5952
        goto error;
    }

5953
    if (flags & VIR_MIGRATE_PEER2PEER) {
5954 5955
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
5956
            VIR_DEBUG("Using peer2peer migration");
5957
            if (virDomainMigratePeer2Peer(domain, NULL, flags,
5958
                                          dname, duri, NULL, bandwidth) < 0)
5959 5960 5961
                goto error;
        } else {
            /* No peer to peer migration supported */
5962
            virReportUnsupportedError();
5963 5964 5965
            goto error;
        }
    } else {
5966 5967
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_DIRECT)) {
5968
            VIR_DEBUG("Using direct migration");
5969 5970
            if (virDomainMigrateDirect(domain, NULL, flags,
                                       dname, duri, bandwidth) < 0)
5971 5972 5973
                goto error;
        } else {
            /* Cannot do a migration with only the perform step */
5974 5975 5976
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("direct migration is not supported by the"
                             " connection driver"));
5977 5978 5979 5980 5981 5982
            goto error;
        }
    }

    return 0;

5983
 error:
5984
    virDispatchError(domain->conn);
5985 5986 5987 5988
    return -1;
}


5989 5990 5991 5992 5993 5994
/**
 * virDomainMigrateToURI2:
 * @domain: a domain object
 * @dconnuri: (optional) URI for target libvirtd if @flags includes VIR_MIGRATE_PEER2PEER
 * @miguri: (optional) URI for invoking the migration, not if @flags includs VIR_MIGRATE_TUNNELLED
 * @dxml: (optional) XML config for launching guest on target
5995
 * @flags: bitwise-OR of virDomainMigrateFlags
5996
 * @dname: (optional) rename domain to this at destination
5997
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5998 5999 6000 6001 6002 6003 6004 6005 6006 6007 6008 6009
 *
 * Migrate the domain object from its current host to the destination
 * host given by duri.
 *
 * Flags may be one of more of the following:
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
6010 6011 6012 6013 6014
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
6015 6016 6017
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
6018
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
6019
 *   VIR_MIGRATE_OFFLINE Migrate offline
6020 6021 6022 6023 6024 6025 6026 6027 6028 6029 6030 6031 6032 6033 6034 6035 6036
 *
 * The operation of this API hinges on the VIR_MIGRATE_PEER2PEER flag.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is set, the @dconnuri parameter
 * must be a valid libvirt connection URI, by which the source
 * libvirt driver can connect to the destination libvirt. If the
 * VIR_MIGRATE_PEER2PEER flag is NOT set, then @dconnuri must be
 * NULL.
 *
 * If the VIR_MIGRATE_TUNNELLED flag is NOT set, then the @miguri
 * parameter allows specification of a URI to use to initiate the
 * VM migration. It takes a hypervisor specific format. The uri_transports
 * element of the hypervisor capabilities XML includes details of the
 * supported URI schemes.
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 *
6037 6038 6039 6040
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
6041 6042 6043 6044 6045 6046 6047 6048 6049 6050 6051 6052 6053 6054 6055
 * If a hypervisor supports changing the configuration of the guest
 * during migration, the @dxml parameter specifies the new config
 * for the guest. The configuration must include an identical set
 * of virtual devices, to ensure a stable guest ABI across migration.
 * Only parameters related to host side configuration can be
 * changed in the XML. Hypervisors will validate this and refuse to
 * allow migration if the provided XML would cause a change in the
 * guest ABI,
 *
 * If a hypervisor supports renaming domains during migration,
 * the dname parameter specifies the new name for the domain.
 * Setting dname to NULL keeps the domain name the same.  If domain
 * renaming is not supported by the hypervisor, dname must be NULL or
 * else an error will be returned.
 *
6056
 * The maximum bandwidth (in MiB/s) that will be used to do migration
6057 6058 6059 6060 6061 6062 6063 6064 6065 6066 6067 6068 6069 6070 6071 6072 6073 6074 6075 6076 6077 6078 6079 6080 6081
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns 0 if the migration succeeded, -1 upon error.
 */
int
virDomainMigrateToURI2(virDomainPtr domain,
                       const char *dconnuri,
                       const char *miguri,
                       const char *dxml,
                       unsigned long flags,
                       const char *dname,
                       unsigned long bandwidth)
{
    VIR_DOMAIN_DEBUG(domain, "dconnuri=%s, miguri=%s, dxml=%s, "
6082
                     "flags=%lx, dname=%s, bandwidth=%lu",
6083 6084 6085 6086 6087 6088
                     NULLSTR(dconnuri), NULLSTR(miguri), NULLSTR(dxml),
                     flags, NULLSTR(dname), bandwidth);

    virResetLastError();

    /* First checkout the source */
6089
    virCheckDomainReturn(domain, -1);
6090
    virCheckReadOnlyGoto(domain->conn->flags, error);
6091

6092 6093 6094 6095 6096 6097 6098 6099 6100
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

6101
    if (flags & VIR_MIGRATE_PEER2PEER) {
6102 6103
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
6104 6105 6106 6107 6108 6109
            VIR_DEBUG("Using peer2peer migration");
            if (virDomainMigratePeer2Peer(domain, dxml, flags,
                                          dname, dconnuri, miguri, bandwidth) < 0)
                goto error;
        } else {
            /* No peer to peer migration supported */
6110
            virReportUnsupportedError();
6111 6112 6113
            goto error;
        }
    } else {
6114 6115
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_DIRECT)) {
6116 6117 6118 6119 6120 6121
            VIR_DEBUG("Using direct migration");
            if (virDomainMigrateDirect(domain, dxml, flags,
                                       dname, miguri, bandwidth) < 0)
                goto error;
        } else {
            /* Cannot do a migration with only the perform step */
6122 6123 6124
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("direct migration is not supported by the"
                             " connection driver"));
6125 6126 6127 6128 6129 6130
            goto error;
        }
    }

    return 0;

6131
 error:
6132 6133 6134 6135 6136
    virDispatchError(domain->conn);
    return -1;
}


J
Jiri Denemark 已提交
6137 6138 6139 6140 6141 6142 6143 6144 6145 6146 6147 6148 6149 6150 6151 6152 6153 6154 6155 6156 6157 6158 6159 6160 6161 6162 6163 6164 6165 6166 6167 6168 6169 6170 6171 6172 6173 6174 6175 6176 6177 6178 6179 6180 6181 6182 6183 6184 6185 6186 6187 6188 6189 6190 6191 6192 6193 6194 6195 6196 6197
/**
 * virDomainMigrateToURI3:
 * @domain: a domain object
 * @dconnuri: (optional) URI for target libvirtd if @flags includes VIR_MIGRATE_PEER2PEER
 * @params: (optional) migration parameters
 * @nparams: (optional) number of migration parameters in @params
 * @flags: bitwise-OR of virDomainMigrateFlags
 *
 * Migrate the domain object from its current host to the destination host
 * given by URI.
 *
 * See virDomainMigrateFlags documentation for description of individual flags.
 *
 * The operation of this API hinges on the VIR_MIGRATE_PEER2PEER flag.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is set, the @dconnuri parameter must be a
 * valid libvirt connection URI, by which the source libvirt daemon can connect
 * to the destination libvirt.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, then @dconnuri must be NULL
 * and VIR_MIGRATE_PARAM_URI migration parameter must be filled in with
 * hypervisor specific URI used to initiate the migration. This is called
 * "direct" migration.
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 *
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns 0 if the migration succeeded, -1 upon error.
 */
int
virDomainMigrateToURI3(virDomainPtr domain,
                       const char *dconnuri,
                       virTypedParameterPtr params,
                       unsigned int nparams,
                       unsigned int flags)
{
    bool compat;
    const char *compatParams[] = { VIR_MIGRATE_PARAM_URI,
                                   VIR_MIGRATE_PARAM_DEST_NAME,
                                   VIR_MIGRATE_PARAM_DEST_XML,
                                   VIR_MIGRATE_PARAM_BANDWIDTH };
    const char *uri = NULL;
    const char *dname = NULL;
    const char *dxml = NULL;
    unsigned long long bandwidth = 0;

    VIR_DOMAIN_DEBUG(domain, "dconnuri=%s, params=%p, nparms=%u flags=%x",
                     NULLSTR(dconnuri), params, nparams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

    /* First checkout the source */
6198
    virCheckDomainReturn(domain, -1);
6199
    virCheckReadOnlyGoto(domain->conn->flags, error);
J
Jiri Denemark 已提交
6200 6201 6202 6203 6204 6205 6206 6207 6208 6209 6210 6211 6212 6213 6214 6215 6216 6217 6218 6219 6220 6221 6222 6223 6224 6225 6226

    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

    compat = virTypedParamsCheck(params, nparams, compatParams,
                                 ARRAY_CARDINALITY(compatParams));

    if (virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_URI, &uri) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_NAME, &dname) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_XML, &dxml) < 0 ||
        virTypedParamsGetULLong(params, nparams,
                                VIR_MIGRATE_PARAM_BANDWIDTH, &bandwidth) < 0) {
        goto error;
    }

    if (flags & VIR_MIGRATE_PEER2PEER) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_P2P)) {
6227 6228 6229
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                           _("Peer-to-peer migration is not supported by "
                             "the connection driver"));
J
Jiri Denemark 已提交
6230 6231 6232 6233 6234 6235 6236 6237 6238 6239 6240 6241 6242 6243 6244
            goto error;
        }

        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_PARAMS)) {
            VIR_DEBUG("Using peer2peer migration with extensible parameters");
            if (virDomainMigratePeer2PeerParams(domain, dconnuri, params,
                                                nparams, flags) < 0)
                goto error;
        } else if (compat) {
            VIR_DEBUG("Using peer2peer migration");
            if (virDomainMigratePeer2Peer(domain, dxml, flags, dname,
                                          dconnuri, uri, bandwidth) < 0)
                goto error;
        } else {
6245 6246 6247 6248
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Peer-to-peer migration with extensible "
                             "parameters is not supported but extended "
                             "parameters were passed"));
J
Jiri Denemark 已提交
6249 6250 6251 6252 6253 6254
            goto error;
        }
    } else {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_DIRECT)) {
            /* Cannot do a migration with only the perform step */
6255 6256 6257
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                           _("Direct migration is not supported by the"
                             " connection driver"));
J
Jiri Denemark 已提交
6258 6259 6260 6261
            goto error;
        }

        if (!compat) {
6262 6263 6264
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Direct migration does not support extensible "
                             "parameters"));
J
Jiri Denemark 已提交
6265 6266 6267 6268 6269 6270 6271 6272 6273 6274 6275
            goto error;
        }

        VIR_DEBUG("Using direct migration");
        if (virDomainMigrateDirect(domain, dxml, flags,
                                   dname, uri, bandwidth) < 0)
            goto error;
    }

    return 0;

6276
 error:
J
Jiri Denemark 已提交
6277 6278 6279 6280 6281
    virDispatchError(domain->conn);
    return -1;
}


D
Daniel Veillard 已提交
6282 6283
/*
 * Not for public use.  This function is part of the internal
6284 6285 6286
 * implementation of migration in the remote case.
 */
int
6287 6288 6289 6290 6291 6292 6293 6294
virDomainMigratePrepare(virConnectPtr dconn,
                        char **cookie,
                        int *cookielen,
                        const char *uri_in,
                        char **uri_out,
                        unsigned long flags,
                        const char *dname,
                        unsigned long bandwidth)
6295
{
J
John Levon 已提交
6296
    VIR_DEBUG("dconn=%p, cookie=%p, cookielen=%p, uri_in=%s, uri_out=%p, "
6297
              "flags=%lx, dname=%s, bandwidth=%lu", dconn, cookie, cookielen,
J
John Levon 已提交
6298
              NULLSTR(uri_in), uri_out, flags, NULLSTR(dname), bandwidth);
6299

6300 6301
    virResetLastError();

6302
    virCheckConnectReturn(dconn, -1);
6303
    virCheckReadOnlyGoto(dconn->flags, error);
6304

6305 6306
    if (dconn->driver->domainMigratePrepare) {
        int ret;
6307 6308 6309
        ret = dconn->driver->domainMigratePrepare(dconn, cookie, cookielen,
                                                  uri_in, uri_out,
                                                  flags, dname, bandwidth);
6310 6311 6312 6313
        if (ret < 0)
            goto error;
        return ret;
    }
6314

6315
    virReportUnsupportedError();
6316

6317
 error:
6318
    virDispatchError(dconn);
6319 6320 6321
    return -1;
}

6322

D
Daniel Veillard 已提交
6323 6324
/*
 * Not for public use.  This function is part of the internal
6325 6326 6327
 * implementation of migration in the remote case.
 */
int
6328 6329 6330 6331 6332 6333 6334
virDomainMigratePerform(virDomainPtr domain,
                        const char *cookie,
                        int cookielen,
                        const char *uri,
                        unsigned long flags,
                        const char *dname,
                        unsigned long bandwidth)
6335 6336
{
    virConnectPtr conn;
6337

6338
    VIR_DOMAIN_DEBUG(domain, "cookie=%p, cookielen=%d, uri=%s, flags=%lx, "
6339 6340
                     "dname=%s, bandwidth=%lu", cookie, cookielen, uri, flags,
                     NULLSTR(dname), bandwidth);
6341

6342 6343
    virResetLastError();

6344
    virCheckDomainReturn(domain, -1);
6345 6346
    conn = domain->conn;

6347
    virCheckReadOnlyGoto(conn->flags, error);
6348

6349 6350
    if (conn->driver->domainMigratePerform) {
        int ret;
6351 6352 6353
        ret = conn->driver->domainMigratePerform(domain, cookie, cookielen,
                                                 uri,
                                                 flags, dname, bandwidth);
6354 6355 6356 6357
        if (ret < 0)
            goto error;
        return ret;
    }
6358

6359
    virReportUnsupportedError();
6360

6361
 error:
6362
    virDispatchError(domain->conn);
6363 6364 6365
    return -1;
}

6366

D
Daniel Veillard 已提交
6367 6368
/*
 * Not for public use.  This function is part of the internal
6369 6370 6371
 * implementation of migration in the remote case.
 */
virDomainPtr
6372 6373 6374 6375 6376 6377
virDomainMigrateFinish(virConnectPtr dconn,
                       const char *dname,
                       const char *cookie,
                       int cookielen,
                       const char *uri,
                       unsigned long flags)
6378
{
J
John Levon 已提交
6379
    VIR_DEBUG("dconn=%p, dname=%s, cookie=%p, cookielen=%d, uri=%s, "
6380
              "flags=%lx", dconn, NULLSTR(dname), cookie, cookielen,
J
John Levon 已提交
6381
              uri, flags);
6382

6383 6384
    virResetLastError();

6385
    virCheckConnectReturn(dconn, NULL);
6386
    virCheckReadOnlyGoto(dconn->flags, error);
6387

6388 6389
    if (dconn->driver->domainMigrateFinish) {
        virDomainPtr ret;
6390 6391 6392
        ret = dconn->driver->domainMigrateFinish(dconn, dname,
                                                 cookie, cookielen,
                                                 uri, flags);
6393 6394 6395 6396
        if (!ret)
            goto error;
        return ret;
    }
6397

6398
    virReportUnsupportedError();
6399

6400
 error:
6401
    virDispatchError(dconn);
6402
    return NULL;
D
Daniel Veillard 已提交
6403 6404 6405
}


D
Daniel Veillard 已提交
6406 6407
/*
 * Not for public use.  This function is part of the internal
D
Daniel Veillard 已提交
6408 6409 6410
 * implementation of migration in the remote case.
 */
int
6411 6412 6413 6414 6415 6416 6417 6418 6419
virDomainMigratePrepare2(virConnectPtr dconn,
                         char **cookie,
                         int *cookielen,
                         const char *uri_in,
                         char **uri_out,
                         unsigned long flags,
                         const char *dname,
                         unsigned long bandwidth,
                         const char *dom_xml)
D
Daniel Veillard 已提交
6420
{
J
John Levon 已提交
6421
    VIR_DEBUG("dconn=%p, cookie=%p, cookielen=%p, uri_in=%s, uri_out=%p,"
6422
              "flags=%lx, dname=%s, bandwidth=%lu, dom_xml=%s", dconn,
J
John Levon 已提交
6423 6424
              cookie, cookielen, uri_in, uri_out, flags, NULLSTR(dname),
              bandwidth, dom_xml);
D
Daniel Veillard 已提交
6425

6426 6427
    virResetLastError();

6428
    virCheckConnectReturn(dconn, -1);
6429
    virCheckReadOnlyGoto(dconn->flags, error);
6430

6431 6432
    if (dconn->driver->domainMigratePrepare2) {
        int ret;
6433 6434 6435 6436
        ret = dconn->driver->domainMigratePrepare2(dconn, cookie, cookielen,
                                                   uri_in, uri_out,
                                                   flags, dname, bandwidth,
                                                   dom_xml);
6437 6438 6439 6440
        if (ret < 0)
            goto error;
        return ret;
    }
D
Daniel Veillard 已提交
6441

6442
    virReportUnsupportedError();
6443

6444
 error:
6445
    virDispatchError(dconn);
D
Daniel Veillard 已提交
6446 6447 6448
    return -1;
}

6449

D
Daniel Veillard 已提交
6450 6451
/*
 * Not for public use.  This function is part of the internal
D
Daniel Veillard 已提交
6452 6453 6454
 * implementation of migration in the remote case.
 */
virDomainPtr
6455 6456 6457 6458 6459 6460 6461
virDomainMigrateFinish2(virConnectPtr dconn,
                        const char *dname,
                        const char *cookie,
                        int cookielen,
                        const char *uri,
                        unsigned long flags,
                        int retcode)
D
Daniel Veillard 已提交
6462
{
J
John Levon 已提交
6463
    VIR_DEBUG("dconn=%p, dname=%s, cookie=%p, cookielen=%d, uri=%s, "
6464
              "flags=%lx, retcode=%d", dconn, NULLSTR(dname), cookie,
J
John Levon 已提交
6465
              cookielen, uri, flags, retcode);
D
Daniel Veillard 已提交
6466

6467 6468
    virResetLastError();

6469
    virCheckConnectReturn(dconn, NULL);
6470
    virCheckReadOnlyGoto(dconn->flags, error);
6471

6472 6473
    if (dconn->driver->domainMigrateFinish2) {
        virDomainPtr ret;
6474 6475 6476 6477
        ret = dconn->driver->domainMigrateFinish2(dconn, dname,
                                                  cookie, cookielen,
                                                  uri, flags,
                                                  retcode);
6478
        if (!ret && !retcode)
6479 6480 6481
            goto error;
        return ret;
    }
D
Daniel Veillard 已提交
6482

6483
    virReportUnsupportedError();
6484

6485
 error:
6486
    virDispatchError(dconn);
D
Daniel Veillard 已提交
6487
    return NULL;
6488 6489 6490
}


C
Chris Lalancette 已提交
6491 6492 6493 6494 6495 6496 6497 6498 6499 6500 6501 6502
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepareTunnel(virConnectPtr conn,
                              virStreamPtr st,
                              unsigned long flags,
                              const char *dname,
                              unsigned long bandwidth,
                              const char *dom_xml)
{
6503
    VIR_DEBUG("conn=%p, stream=%p, flags=%lx, dname=%s, "
6504
              "bandwidth=%lu, dom_xml=%s", conn, st, flags,
C
Chris Lalancette 已提交
6505 6506 6507 6508
              NULLSTR(dname), bandwidth, dom_xml);

    virResetLastError();

6509
    virCheckConnectReturn(conn, -1);
6510
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
6511 6512

    if (conn != st->conn) {
6513 6514 6515
        virReportInvalidArg(conn,
                            _("conn in %s must match stream connection"),
                            __FUNCTION__);
C
Chris Lalancette 已提交
6516 6517 6518 6519
        goto error;
    }

    if (conn->driver->domainMigratePrepareTunnel) {
6520
        int rv = conn->driver->domainMigratePrepareTunnel(conn, st,
C
Chris Lalancette 已提交
6521 6522 6523 6524 6525 6526 6527
                                                          flags, dname,
                                                          bandwidth, dom_xml);
        if (rv < 0)
            goto error;
        return rv;
    }

6528
    virReportUnsupportedError();
C
Chris Lalancette 已提交
6529

6530
 error:
6531
    virDispatchError(conn);
C
Chris Lalancette 已提交
6532 6533 6534
    return -1;
}

6535

6536 6537 6538 6539 6540 6541
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
char *
virDomainMigrateBegin3(virDomainPtr domain,
6542
                       const char *xmlin,
6543 6544 6545 6546 6547 6548 6549 6550
                       char **cookieout,
                       int *cookieoutlen,
                       unsigned long flags,
                       const char *dname,
                       unsigned long bandwidth)
{
    virConnectPtr conn;

6551
    VIR_DOMAIN_DEBUG(domain, "xmlin=%s cookieout=%p, cookieoutlen=%p, "
6552
                     "flags=%lx, dname=%s, bandwidth=%lu",
6553
                     NULLSTR(xmlin), cookieout, cookieoutlen, flags,
6554 6555 6556 6557
                     NULLSTR(dname), bandwidth);

    virResetLastError();

6558
    virCheckDomainReturn(domain, NULL);
6559 6560
    conn = domain->conn;

6561
    virCheckReadOnlyGoto(conn->flags, error);
6562 6563 6564

    if (conn->driver->domainMigrateBegin3) {
        char *xml;
6565
        xml = conn->driver->domainMigrateBegin3(domain, xmlin,
6566 6567 6568 6569 6570 6571 6572 6573
                                                cookieout, cookieoutlen,
                                                flags, dname, bandwidth);
        VIR_DEBUG("xml %s", NULLSTR(xml));
        if (!xml)
            goto error;
        return xml;
    }

6574
    virReportUnsupportedError();
6575

6576
 error:
6577 6578 6579 6580 6581 6582 6583 6584 6585 6586 6587 6588 6589 6590 6591 6592 6593 6594 6595 6596 6597 6598
    virDispatchError(domain->conn);
    return NULL;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepare3(virConnectPtr dconn,
                         const char *cookiein,
                         int cookieinlen,
                         char **cookieout,
                         int *cookieoutlen,
                         const char *uri_in,
                         char **uri_out,
                         unsigned long flags,
                         const char *dname,
                         unsigned long bandwidth,
                         const char *dom_xml)
{
6599 6600 6601 6602 6603
    VIR_DEBUG("dconn=%p, cookiein=%p, cookieinlen=%d, cookieout=%p, "
              "cookieoutlen=%p, uri_in=%s, uri_out=%p, flags=%lx, dname=%s, "
              "bandwidth=%lu, dom_xml=%s",
              dconn, cookiein, cookieinlen, cookieout, cookieoutlen, uri_in,
              uri_out, flags, NULLSTR(dname), bandwidth, dom_xml);
6604 6605 6606

    virResetLastError();

6607
    virCheckConnectReturn(dconn, -1);
6608
    virCheckReadOnlyGoto(dconn->flags, error);
6609 6610 6611 6612 6613 6614 6615 6616 6617 6618 6619 6620 6621 6622

    if (dconn->driver->domainMigratePrepare3) {
        int ret;
        ret = dconn->driver->domainMigratePrepare3(dconn,
                                                   cookiein, cookieinlen,
                                                   cookieout, cookieoutlen,
                                                   uri_in, uri_out,
                                                   flags, dname, bandwidth,
                                                   dom_xml);
        if (ret < 0)
            goto error;
        return ret;
    }

6623
    virReportUnsupportedError();
6624

6625
 error:
6626 6627 6628 6629
    virDispatchError(dconn);
    return -1;
}

6630

6631 6632 6633 6634 6635 6636 6637 6638 6639 6640 6641 6642 6643 6644 6645 6646
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepareTunnel3(virConnectPtr conn,
                               virStreamPtr st,
                               const char *cookiein,
                               int cookieinlen,
                               char **cookieout,
                               int *cookieoutlen,
                               unsigned long flags,
                               const char *dname,
                               unsigned long bandwidth,
                               const char *dom_xml)
{
6647 6648 6649
    VIR_DEBUG("conn=%p, stream=%p, cookiein=%p, cookieinlen=%d, cookieout=%p, "
              "cookieoutlen=%p, flags=%lx, dname=%s, bandwidth=%lu, "
              "dom_xml=%s",
6650 6651 6652 6653 6654
              conn, st, cookiein, cookieinlen, cookieout, cookieoutlen, flags,
              NULLSTR(dname), bandwidth, dom_xml);

    virResetLastError();

6655
    virCheckConnectReturn(conn, -1);
6656
    virCheckReadOnlyGoto(conn->flags, error);
6657 6658

    if (conn != st->conn) {
6659 6660 6661
        virReportInvalidArg(conn,
                            _("conn in %s must match stream connection"),
                            __FUNCTION__);
6662 6663 6664 6665 6666 6667 6668 6669 6670 6671 6672 6673 6674 6675
        goto error;
    }

    if (conn->driver->domainMigratePrepareTunnel3) {
        int rv = conn->driver->domainMigratePrepareTunnel3(conn, st,
                                                           cookiein, cookieinlen,
                                                           cookieout, cookieoutlen,
                                                           flags, dname,
                                                           bandwidth, dom_xml);
        if (rv < 0)
            goto error;
        return rv;
    }

6676
    virReportUnsupportedError();
6677

6678
 error:
6679 6680 6681 6682 6683 6684 6685 6686 6687 6688 6689
    virDispatchError(conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePerform3(virDomainPtr domain,
6690
                         const char *xmlin,
6691 6692 6693 6694
                         const char *cookiein,
                         int cookieinlen,
                         char **cookieout,
                         int *cookieoutlen,
6695
                         const char *dconnuri,
6696 6697 6698 6699 6700 6701 6702
                         const char *uri,
                         unsigned long flags,
                         const char *dname,
                         unsigned long bandwidth)
{
    virConnectPtr conn;

6703
    VIR_DOMAIN_DEBUG(domain, "xmlin=%s cookiein=%p, cookieinlen=%d, "
6704
                     "cookieout=%p, cookieoutlen=%p, dconnuri=%s, "
6705
                     "uri=%s, flags=%lx, dname=%s, bandwidth=%lu",
6706
                     NULLSTR(xmlin), cookiein, cookieinlen,
6707 6708
                     cookieout, cookieoutlen, NULLSTR(dconnuri),
                     NULLSTR(uri), flags, NULLSTR(dname), bandwidth);
6709 6710 6711

    virResetLastError();

6712
    virCheckDomainReturn(domain, -1);
6713 6714
    conn = domain->conn;

6715
    virCheckReadOnlyGoto(conn->flags, error);
6716 6717 6718

    if (conn->driver->domainMigratePerform3) {
        int ret;
6719
        ret = conn->driver->domainMigratePerform3(domain, xmlin,
6720 6721
                                                  cookiein, cookieinlen,
                                                  cookieout, cookieoutlen,
6722
                                                  dconnuri, uri,
6723 6724 6725 6726 6727 6728
                                                  flags, dname, bandwidth);
        if (ret < 0)
            goto error;
        return ret;
    }

6729
    virReportUnsupportedError();
6730

6731
 error:
6732 6733 6734 6735 6736 6737 6738 6739 6740
    virDispatchError(domain->conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
6741
virDomainPtr
6742 6743 6744 6745 6746 6747
virDomainMigrateFinish3(virConnectPtr dconn,
                        const char *dname,
                        const char *cookiein,
                        int cookieinlen,
                        char **cookieout,
                        int *cookieoutlen,
6748
                        const char *dconnuri,
6749 6750
                        const char *uri,
                        unsigned long flags,
6751
                        int cancelled)
6752 6753
{
    VIR_DEBUG("dconn=%p, dname=%s, cookiein=%p, cookieinlen=%d, cookieout=%p,"
6754
              "cookieoutlen=%p, dconnuri=%s, uri=%s, flags=%lx, retcode=%d",
6755
              dconn, NULLSTR(dname), cookiein, cookieinlen, cookieout,
6756
              cookieoutlen, NULLSTR(dconnuri), NULLSTR(uri), flags, cancelled);
6757 6758 6759

    virResetLastError();

6760
    virCheckConnectReturn(dconn, NULL);
6761
    virCheckReadOnlyGoto(dconn->flags, error);
6762 6763

    if (dconn->driver->domainMigrateFinish3) {
6764
        virDomainPtr ret;
6765 6766 6767
        ret = dconn->driver->domainMigrateFinish3(dconn, dname,
                                                  cookiein, cookieinlen,
                                                  cookieout, cookieoutlen,
6768
                                                  dconnuri, uri, flags,
6769
                                                  cancelled);
6770
        if (!ret && !cancelled)
6771 6772 6773 6774
            goto error;
        return ret;
    }

6775
    virReportUnsupportedError();
6776

6777
 error:
6778
    virDispatchError(dconn);
6779
    return NULL;
6780 6781 6782 6783 6784 6785 6786 6787 6788 6789 6790 6791 6792 6793 6794 6795
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigrateConfirm3(virDomainPtr domain,
                         const char *cookiein,
                         int cookieinlen,
                         unsigned long flags,
                         int cancelled)
{
    virConnectPtr conn;

6796 6797
    VIR_DOMAIN_DEBUG(domain,
                     "cookiein=%p, cookieinlen=%d, flags=%lx, cancelled=%d",
6798 6799 6800 6801
                     cookiein, cookieinlen, flags, cancelled);

    virResetLastError();

6802
    virCheckDomainReturn(domain, -1);
6803 6804
    conn = domain->conn;

6805
    virCheckReadOnlyGoto(conn->flags, error);
6806 6807 6808 6809 6810 6811 6812 6813 6814 6815 6816

    if (conn->driver->domainMigrateConfirm3) {
        int ret;
        ret = conn->driver->domainMigrateConfirm3(domain,
                                                  cookiein, cookieinlen,
                                                  flags, cancelled);
        if (ret < 0)
            goto error;
        return ret;
    }

6817
    virReportUnsupportedError();
6818

6819
 error:
6820 6821 6822 6823
    virDispatchError(domain->conn);
    return -1;
}

C
Chris Lalancette 已提交
6824

6825 6826 6827 6828 6829 6830 6831 6832 6833 6834 6835 6836 6837 6838 6839 6840 6841 6842 6843 6844 6845
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
char *
virDomainMigrateBegin3Params(virDomainPtr domain,
                             virTypedParameterPtr params,
                             int nparams,
                             char **cookieout,
                             int *cookieoutlen,
                             unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, "
                     "cookieout=%p, cookieoutlen=%p, flags=%x",
                     params, nparams, cookieout, cookieoutlen, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6846
    virCheckDomainReturn(domain, NULL);
6847 6848
    conn = domain->conn;

6849
    virCheckReadOnlyGoto(conn->flags, error);
6850 6851 6852 6853 6854 6855 6856 6857 6858 6859 6860 6861

    if (conn->driver->domainMigrateBegin3Params) {
        char *xml;
        xml = conn->driver->domainMigrateBegin3Params(domain, params, nparams,
                                                      cookieout, cookieoutlen,
                                                      flags);
        VIR_DEBUG("xml %s", NULLSTR(xml));
        if (!xml)
            goto error;
        return xml;
    }

6862
    virReportUnsupportedError();
6863

6864
 error:
6865 6866 6867 6868 6869 6870 6871 6872 6873 6874 6875 6876 6877 6878 6879 6880 6881 6882 6883 6884 6885 6886 6887 6888 6889 6890 6891 6892
    virDispatchError(domain->conn);
    return NULL;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepare3Params(virConnectPtr dconn,
                               virTypedParameterPtr params,
                               int nparams,
                               const char *cookiein,
                               int cookieinlen,
                               char **cookieout,
                               int *cookieoutlen,
                               char **uri_out,
                               unsigned int flags)
{
    VIR_DEBUG("dconn=%p, params=%p, nparams=%d, cookiein=%p, cookieinlen=%d, "
              "cookieout=%p, cookieoutlen=%p, uri_out=%p, flags=%x",
              dconn, params, nparams, cookiein, cookieinlen,
              cookieout, cookieoutlen, uri_out, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6893
    virCheckConnectReturn(dconn, -1);
6894
    virCheckReadOnlyGoto(dconn->flags, error);
6895 6896 6897 6898 6899 6900 6901 6902 6903 6904 6905 6906

    if (dconn->driver->domainMigratePrepare3Params) {
        int ret;
        ret = dconn->driver->domainMigratePrepare3Params(dconn, params, nparams,
                                                         cookiein, cookieinlen,
                                                         cookieout, cookieoutlen,
                                                         uri_out, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

6907
    virReportUnsupportedError();
6908

6909
 error:
6910 6911 6912 6913 6914 6915 6916 6917 6918 6919 6920 6921 6922 6923 6924 6925 6926 6927 6928 6929 6930 6931 6932 6933 6934 6935 6936 6937
    virDispatchError(dconn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepareTunnel3Params(virConnectPtr conn,
                                     virStreamPtr st,
                                     virTypedParameterPtr params,
                                     int nparams,
                                     const char *cookiein,
                                     int cookieinlen,
                                     char **cookieout,
                                     int *cookieoutlen,
                                     unsigned int flags)
{
    VIR_DEBUG("conn=%p, stream=%p, params=%p, nparams=%d, cookiein=%p, "
              "cookieinlen=%d, cookieout=%p, cookieoutlen=%p, flags=%x",
              conn, st, params, nparams, cookiein, cookieinlen,
              cookieout, cookieoutlen, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6938
    virCheckConnectReturn(conn, -1);
6939
    virCheckReadOnlyGoto(conn->flags, error);
6940 6941 6942 6943 6944 6945 6946 6947 6948 6949 6950 6951 6952 6953 6954 6955 6956 6957

    if (conn != st->conn) {
        virReportInvalidArg(conn,
                            _("conn in %s must match stream connection"),
                            __FUNCTION__);
        goto error;
    }

    if (conn->driver->domainMigratePrepareTunnel3Params) {
        int rv;
        rv = conn->driver->domainMigratePrepareTunnel3Params(
                conn, st, params, nparams, cookiein, cookieinlen,
                cookieout, cookieoutlen, flags);
        if (rv < 0)
            goto error;
        return rv;
    }

6958
    virReportUnsupportedError();
6959

6960
 error:
6961 6962 6963 6964 6965 6966 6967 6968 6969 6970 6971 6972 6973 6974 6975 6976 6977 6978 6979 6980 6981 6982 6983 6984 6985 6986 6987 6988 6989 6990
    virDispatchError(conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePerform3Params(virDomainPtr domain,
                               const char *dconnuri,
                               virTypedParameterPtr params,
                               int nparams,
                               const char *cookiein,
                               int cookieinlen,
                               char **cookieout,
                               int *cookieoutlen,
                               unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "dconnuri=%s, params=%p, nparams=%d, cookiein=%p, "
                     "cookieinlen=%d, cookieout=%p, cookieoutlen=%p, flags=%x",
                     NULLSTR(dconnuri), params, nparams, cookiein,
                     cookieinlen, cookieout, cookieoutlen, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6991
    virCheckDomainReturn(domain, -1);
6992 6993
    conn = domain->conn;

6994
    virCheckReadOnlyGoto(conn->flags, error);
6995 6996 6997 6998 6999 7000 7001 7002 7003 7004 7005

    if (conn->driver->domainMigratePerform3Params) {
        int ret;
        ret = conn->driver->domainMigratePerform3Params(
                domain, dconnuri, params, nparams, cookiein, cookieinlen,
                cookieout, cookieoutlen, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7006
    virReportUnsupportedError();
7007

7008
 error:
7009 7010 7011 7012 7013 7014 7015 7016 7017 7018 7019 7020 7021 7022 7023 7024 7025 7026 7027 7028 7029 7030 7031 7032 7033 7034 7035 7036
    virDispatchError(domain->conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
virDomainPtr
virDomainMigrateFinish3Params(virConnectPtr dconn,
                              virTypedParameterPtr params,
                              int nparams,
                              const char *cookiein,
                              int cookieinlen,
                              char **cookieout,
                              int *cookieoutlen,
                              unsigned int flags,
                              int cancelled)
{
    VIR_DEBUG("dconn=%p, params=%p, nparams=%d, cookiein=%p, cookieinlen=%d, "
              "cookieout=%p, cookieoutlen=%p, flags=%x, cancelled=%d",
              dconn, params, nparams, cookiein, cookieinlen, cookieout,
              cookieoutlen, flags, cancelled);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

7037
    virCheckConnectReturn(dconn, NULL);
7038
    virCheckReadOnlyGoto(dconn->flags, error);
7039 7040 7041 7042 7043 7044

    if (dconn->driver->domainMigrateFinish3Params) {
        virDomainPtr ret;
        ret = dconn->driver->domainMigrateFinish3Params(
                dconn, params, nparams, cookiein, cookieinlen,
                cookieout, cookieoutlen, flags, cancelled);
7045
        if (!ret && !cancelled)
7046 7047 7048 7049
            goto error;
        return ret;
    }

7050
    virReportUnsupportedError();
7051

7052
 error:
7053 7054 7055 7056 7057 7058 7059 7060 7061 7062 7063 7064 7065 7066 7067 7068 7069 7070 7071 7072 7073 7074 7075 7076 7077 7078 7079
    virDispatchError(dconn);
    return NULL;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigrateConfirm3Params(virDomainPtr domain,
                               virTypedParameterPtr params,
                               int nparams,
                               const char *cookiein,
                               int cookieinlen,
                               unsigned int flags,
                               int cancelled)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, cookiein=%p, "
                     "cookieinlen=%d, flags=%x, cancelled=%d",
                     params, nparams, cookiein, cookieinlen, flags, cancelled);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

7080
    virCheckDomainReturn(domain, -1);
7081 7082
    conn = domain->conn;

7083
    virCheckReadOnlyGoto(conn->flags, error);
7084 7085 7086 7087 7088 7089 7090 7091 7092 7093 7094

    if (conn->driver->domainMigrateConfirm3Params) {
        int ret;
        ret = conn->driver->domainMigrateConfirm3Params(
                domain, params, nparams,
                cookiein, cookieinlen, flags, cancelled);
        if (ret < 0)
            goto error;
        return ret;
    }

7095
    virReportUnsupportedError();
7096

7097
 error:
7098 7099 7100 7101 7102
    virDispatchError(domain->conn);
    return -1;
}


7103 7104 7105 7106
/**
 * virNodeGetInfo:
 * @conn: pointer to the hypervisor connection
 * @info: pointer to a virNodeInfo structure allocated by the user
7107
 *
7108 7109 7110 7111 7112
 * Extract hardware information about the node.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
7113 7114
virNodeGetInfo(virConnectPtr conn, virNodeInfoPtr info)
{
7115
    VIR_DEBUG("conn=%p, info=%p", conn, info);
7116

7117 7118
    virResetLastError();

7119
    virCheckConnectReturn(conn, -1);
7120
    virCheckNonNullArgGoto(info, error);
7121

7122 7123
    if (conn->driver->nodeGetInfo) {
        int ret;
7124
        ret = conn->driver->nodeGetInfo(conn, info);
7125 7126 7127 7128
        if (ret < 0)
            goto error;
        return ret;
    }
7129

7130
    virReportUnsupportedError();
7131

7132
 error:
7133
    virDispatchError(conn);
7134
    return -1;
7135
}
7136

7137

7138 7139 7140 7141 7142 7143
/**
 * virConnectGetCapabilities:
 * @conn: pointer to the hypervisor connection
 *
 * Provides capabilities of the hypervisor / driver.
 *
7144 7145
 * Returns NULL in case of error, or an XML string
 * defining the capabilities.
7146 7147 7148
 * The client must free the returned string after use.
 */
char *
7149
virConnectGetCapabilities(virConnectPtr conn)
7150
{
7151
    VIR_DEBUG("conn=%p", conn);
7152

7153 7154
    virResetLastError();

7155
    virCheckConnectReturn(conn, NULL);
7156

7157
    if (conn->driver->connectGetCapabilities) {
7158
        char *ret;
7159
        ret = conn->driver->connectGetCapabilities(conn);
7160 7161
        if (!ret)
            goto error;
7162
        VIR_DEBUG("conn=%p ret=%s", conn, ret);
7163 7164
        return ret;
    }
7165

7166
    virReportUnsupportedError();
7167

7168
 error:
7169
    virDispatchError(conn);
7170 7171 7172
    return NULL;
}

7173

7174 7175 7176
/**
 * virNodeGetCPUStats:
 * @conn: pointer to the hypervisor connection.
7177
 * @cpuNum: number of node cpu. (VIR_NODE_CPU_STATS_ALL_CPUS means total cpu
7178 7179 7180 7181
 *          statistics)
 * @params: pointer to node cpu time parameter objects
 * @nparams: number of node cpu time parameter (this value should be same or
 *          less than the number of parameters supported)
7182
 * @flags: extra flags; not used yet, so callers should always pass 0
7183 7184 7185
 *
 * This function provides individual cpu statistics of the node.
 * If you want to get total cpu statistics of the node, you must specify
7186
 * VIR_NODE_CPU_STATS_ALL_CPUS to @cpuNum.
7187 7188 7189 7190 7191 7192
 * The @params array will be filled with the values equal to the number of
 * parameters suggested by @nparams
 *
 * As the value of @nparams is dynamic, call the API setting @nparams to 0 and
 * @params as NULL, the API returns the number of parameters supported by the
 * HV by updating @nparams on SUCCESS. The caller should then allocate @params
7193
 * array, i.e. (sizeof(@virNodeCPUStats) * @nparams) bytes and call
7194 7195 7196 7197
 * the API again.
 *
 * Here is a sample code snippet:
 *
E
Eric Blake 已提交
7198 7199 7200 7201 7202 7203 7204 7205
 *   if (virNodeGetCPUStats(conn, cpuNum, NULL, &nparams, 0) == 0 &&
 *       nparams != 0) {
 *       if ((params = malloc(sizeof(virNodeCPUStats) * nparams)) == NULL)
 *           goto error;
 *       memset(params, 0, sizeof(virNodeCPUStats) * nparams);
 *       if (virNodeGetCPUStats(conn, cpuNum, params, &nparams, 0))
 *           goto error;
 *   }
7206 7207 7208 7209 7210 7211 7212 7213 7214 7215 7216 7217 7218 7219 7220 7221 7222 7223 7224 7225 7226 7227
 *
 * This function doesn't require privileged access to the hypervisor.
 * This function expects the caller to allocate the @params.
 *
 * CPU time Statistics:
 *
 * VIR_NODE_CPU_STATS_KERNEL:
 *     The cumulative CPU time which spends by kernel,
 *     when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_USER:
 *     The cumulative CPU time which spends by user processes,
 *     when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_IDLE:
 *     The cumulative idle CPU time, when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_IOWAIT:
 *     The cumulative I/O wait CPU time, when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_UTILIZATION:
 *     The CPU utilization. The usage value is in percent and 100%
 *     represents all CPUs on the server.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
7228 7229 7230 7231 7232
int
virNodeGetCPUStats(virConnectPtr conn,
                   int cpuNum,
                   virNodeCPUStatsPtr params,
                   int *nparams, unsigned int flags)
7233
{
7234
    VIR_DEBUG("conn=%p, cpuNum=%d, params=%p, nparams=%d, flags=%x",
7235 7236 7237 7238
              conn, cpuNum, params, nparams ? *nparams : -1, flags);

    virResetLastError();

7239
    virCheckConnectReturn(conn, -1);
7240 7241
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
7242
    if (cpuNum < 0 && cpuNum != VIR_NODE_CPU_STATS_ALL_CPUS) {
7243
        virReportInvalidArg(cpuNum,
7244 7245
                            _("cpuNum in %s only accepts %d as a negative "
                              "value"),
7246
                            __FUNCTION__, VIR_NODE_CPU_STATS_ALL_CPUS);
7247 7248 7249 7250 7251
        goto error;
    }

    if (conn->driver->nodeGetCPUStats) {
        int ret;
7252
        ret = conn->driver->nodeGetCPUStats(conn, cpuNum, params, nparams, flags);
7253 7254 7255 7256
        if (ret < 0)
            goto error;
        return ret;
    }
7257
    virReportUnsupportedError();
7258

7259
 error:
7260 7261 7262 7263
    virDispatchError(conn);
    return -1;
}

7264

7265 7266 7267
/**
 * virNodeGetMemoryStats:
 * @conn: pointer to the hypervisor connection.
7268 7269
 * @cellNum: number of node cell. (VIR_NODE_MEMORY_STATS_ALL_CELLS means total
 *           cell statistics)
7270 7271 7272
 * @params: pointer to node memory stats objects
 * @nparams: number of node memory stats (this value should be same or
 *          less than the number of stats supported)
7273
 * @flags: extra flags; not used yet, so callers should always pass 0
7274 7275
 *
 * This function provides memory stats of the node.
7276
 * If you want to get total memory statistics of the node, you must specify
7277
 * VIR_NODE_MEMORY_STATS_ALL_CELLS to @cellNum.
7278 7279 7280 7281 7282 7283
 * The @params array will be filled with the values equal to the number of
 * stats suggested by @nparams
 *
 * As the value of @nparams is dynamic, call the API setting @nparams to 0 and
 * @params as NULL, the API returns the number of parameters supported by the
 * HV by updating @nparams on SUCCESS. The caller should then allocate @params
7284
 * array, i.e. (sizeof(@virNodeMemoryStats) * @nparams) bytes and call
7285 7286 7287 7288
 * the API again.
 *
 * Here is the sample code snippet:
 *
E
Eric Blake 已提交
7289 7290 7291 7292 7293 7294 7295 7296
 *   if (virNodeGetMemoryStats(conn, cellNum, NULL, &nparams, 0) == 0 &&
 *       nparams != 0) {
 *       if ((params = malloc(sizeof(virNodeMemoryStats) * nparams)) == NULL)
 *           goto error;
 *       memset(params, cellNum, 0, sizeof(virNodeMemoryStats) * nparams);
 *       if (virNodeGetMemoryStats(conn, params, &nparams, 0))
 *           goto error;
 *   }
7297 7298 7299 7300 7301 7302
 *
 * This function doesn't require privileged access to the hypervisor.
 * This function expects the caller to allocate the @params.
 *
 * Memory Stats:
 *
7303
 * VIR_NODE_MEMORY_STATS_TOTAL:
7304
 *     The total memory usage.(KB)
7305
 * VIR_NODE_MEMORY_STATS_FREE:
7306 7307
 *     The free memory usage.(KB)
 *     On linux, this usage includes buffers and cached.
7308
 * VIR_NODE_MEMORY_STATS_BUFFERS:
7309
 *     The buffers memory usage.(KB)
7310
 * VIR_NODE_MEMORY_STATS_CACHED:
7311 7312 7313 7314
 *     The cached memory usage.(KB)
 *
 * Returns -1 in case of error, 0 in case of success.
 */
7315 7316 7317 7318 7319
int
virNodeGetMemoryStats(virConnectPtr conn,
                      int cellNum,
                      virNodeMemoryStatsPtr params,
                      int *nparams, unsigned int flags)
7320
{
7321
    VIR_DEBUG("conn=%p, cellNum=%d, params=%p, nparams=%d, flags=%x",
7322 7323 7324 7325
              conn, cellNum, params, nparams ? *nparams : -1, flags);

    virResetLastError();

7326
    virCheckConnectReturn(conn, -1);
7327 7328
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
7329
    if (cellNum < 0 && cellNum != VIR_NODE_MEMORY_STATS_ALL_CELLS) {
7330
        virReportInvalidArg(cpuNum,
7331 7332
                            _("cellNum in %s only accepts %d as a negative "
                              "value"),
7333
                            __FUNCTION__, VIR_NODE_MEMORY_STATS_ALL_CELLS);
7334 7335 7336 7337 7338
        goto error;
    }

    if (conn->driver->nodeGetMemoryStats) {
        int ret;
7339
        ret = conn->driver->nodeGetMemoryStats(conn, cellNum, params, nparams, flags);
7340 7341 7342 7343
        if (ret < 0)
            goto error;
        return ret;
    }
7344
    virReportUnsupportedError();
7345

7346
 error:
7347 7348 7349 7350
    virDispatchError(conn);
    return -1;
}

7351

7352 7353 7354
/**
 * virNodeGetFreeMemory:
 * @conn: pointer to the hypervisor connection
7355
 *
D
Daniel Veillard 已提交
7356
 * provides the free memory available on the Node
7357
 * Note: most libvirt APIs provide memory sizes in kibibytes, but in this
D
Daniel Veillard 已提交
7358
 * function the returned value is in bytes. Divide by 1024 as necessary.
7359
 *
D
Daniel Veillard 已提交
7360
 * Returns the available free memory in bytes or 0 in case of error
7361 7362 7363 7364
 */
unsigned long long
virNodeGetFreeMemory(virConnectPtr conn)
{
7365
    VIR_DEBUG("conn=%p", conn);
7366

7367 7368
    virResetLastError();

7369
    virCheckConnectReturn(conn, 0);
7370

7371
    if (conn->driver->nodeGetFreeMemory) {
7372
        unsigned long long ret;
7373
        ret = conn->driver->nodeGetFreeMemory(conn);
7374 7375 7376 7377
        if (ret == 0)
            goto error;
        return ret;
    }
7378

7379
    virReportUnsupportedError();
7380

7381
 error:
7382
    virDispatchError(conn);
7383 7384 7385
    return 0;
}

7386

7387 7388 7389 7390 7391 7392 7393 7394 7395 7396
/**
 * virNodeSuspendForDuration:
 * @conn: pointer to the hypervisor connection
 * @target: the state to which the host must be suspended to,
 *         such as: VIR_NODE_SUSPEND_TARGET_MEM (Suspend-to-RAM)
 *                  VIR_NODE_SUSPEND_TARGET_DISK (Suspend-to-Disk)
 *                  VIR_NODE_SUSPEND_TARGET_HYBRID (Hybrid-Suspend,
 *                  which is a combination of the former modes).
 * @duration: the time duration in seconds for which the host
 *            has to be suspended
7397
 * @flags: extra flags; not used yet, so callers should always pass 0
7398 7399 7400 7401 7402 7403 7404 7405 7406 7407 7408 7409 7410 7411 7412 7413
 *
 * Attempt to suspend the node (host machine) for the given duration of
 * time in the specified state (Suspend-to-RAM, Suspend-to-Disk or
 * Hybrid-Suspend). Schedule the node's Real-Time-Clock interrupt to
 * resume the node after the duration is complete.
 *
 * Returns 0 on success (i.e., the node will be suspended after a short
 * delay), -1 on failure (the operation is not supported, or an attempted
 * suspend is already underway).
 */
int
virNodeSuspendForDuration(virConnectPtr conn,
                          unsigned int target,
                          unsigned long long duration,
                          unsigned int flags)
{
7414 7415
    VIR_DEBUG("conn=%p, target=%d, duration=%lld, flags=%x",
              conn, target, duration, flags);
7416 7417 7418

    virResetLastError();

7419
    virCheckConnectReturn(conn, -1);
7420
    virCheckReadOnlyGoto(conn->flags, error);
7421 7422 7423 7424 7425 7426 7427 7428 7429 7430

    if (conn->driver->nodeSuspendForDuration) {
        int ret;
        ret = conn->driver->nodeSuspendForDuration(conn, target,
                                                   duration, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7431
    virReportUnsupportedError();
7432

7433
 error:
7434 7435 7436 7437
    virDispatchError(conn);
    return -1;
}

7438

7439 7440 7441 7442 7443 7444 7445 7446
/*
 * virNodeGetMemoryParameters:
 * @conn: pointer to the hypervisor connection
 * @params: pointer to memory parameter object
 *          (return value, allocated by the caller)
 * @nparams: pointer to number of memory parameters; input and output
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
7447 7448 7449 7450
 * Get all node memory parameters (parameters unsupported by OS will be
 * omitted).  On input, @nparams gives the size of the @params array;
 * on output, @nparams gives how many slots were filled with parameter
 * information, which might be less but will not exceed the input value.
7451 7452 7453 7454 7455 7456 7457 7458 7459 7460 7461 7462 7463 7464 7465 7466 7467 7468 7469 7470 7471
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.  See virDomainGetMemoryParameters() for an equivalent usage
 * example.
 *
 * Returns 0 in case of success, and -1 in case of failure.
 */
int
virNodeGetMemoryParameters(virConnectPtr conn,
                           virTypedParameterPtr params,
                           int *nparams,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, params=%p, nparams=%p, flags=%x",
              conn, params, nparams, flags);

    virResetLastError();

7472
    virCheckConnectReturn(conn, -1);
7473 7474 7475 7476 7477 7478 7479 7480 7481 7482 7483 7484 7485 7486 7487 7488 7489 7490
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

    if (VIR_DRV_SUPPORTS_FEATURE(conn->driver, conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    if (conn->driver->nodeGetMemoryParameters) {
        int ret;
        ret = conn->driver->nodeGetMemoryParameters(conn, params,
                                                    nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7491
    virReportUnsupportedError();
7492

7493
 error:
7494 7495 7496 7497
    virDispatchError(conn);
    return -1;
}

7498

7499 7500 7501 7502 7503 7504 7505 7506 7507
/*
 * virNodeSetMemoryParameters:
 * @conn: pointer to the hypervisor connection
 * @params: pointer to scheduler parameter objects
 * @nparams: number of scheduler parameter objects
 *          (this value can be the same or less than the returned
 *           value nparams of virDomainGetSchedulerType)
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
7508 7509
 * Change all or a subset of the node memory tunables. The function
 * fails if not all of the tunables are supported.
O
Osier Yang 已提交
7510 7511 7512 7513 7514 7515
 *
 * Note that it's not recommended to use this function while the
 * outside tuning program is running (such as ksmtuned under Linux),
 * as they could change the tunables in parallel, which could cause
 * conflicts.
 *
7516 7517 7518 7519 7520 7521 7522 7523 7524 7525 7526 7527
 * This function may require privileged access to the hypervisor.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virNodeSetMemoryParameters(virConnectPtr conn,
                           virTypedParameterPtr params,
                           int nparams,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, params=%p, nparams=%d, flags=%x",
              conn, params, nparams, flags);
7528
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
7529 7530 7531

    virResetLastError();

7532
    virCheckConnectReturn(conn, -1);
7533
    virCheckReadOnlyGoto(conn->flags, error);
7534 7535 7536 7537 7538 7539 7540 7541 7542 7543 7544 7545 7546 7547 7548
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
        goto error;

    if (conn->driver->nodeSetMemoryParameters) {
        int ret;
        ret = conn->driver->nodeSetMemoryParameters(conn, params,
                                                          nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7549
    virReportUnsupportedError();
7550

7551
 error:
7552 7553 7554
    virDispatchError(conn);
    return -1;
}
7555

7556

7557 7558 7559
/**
 * virDomainGetSchedulerType:
 * @domain: pointer to domain object
7560 7561
 * @nparams: pointer to number of scheduler parameters, can be NULL
 *           (return value)
7562
 *
7563
 * Get the scheduler type and the number of scheduler parameters.
7564 7565 7566 7567 7568 7569 7570 7571
 *
 * Returns NULL in case of error. The caller must free the returned string.
 */
char *
virDomainGetSchedulerType(virDomainPtr domain, int *nparams)
{
    virConnectPtr conn;
    char *schedtype;
7572 7573

    VIR_DOMAIN_DEBUG(domain, "nparams=%p", nparams);
7574

7575 7576
    virResetLastError();

7577
    virCheckDomainReturn(domain, NULL);
7578 7579 7580
    conn = domain->conn;

    if (conn->driver->domainGetSchedulerType){
7581
        schedtype = conn->driver->domainGetSchedulerType(domain, nparams);
7582 7583
        if (!schedtype)
            goto error;
7584 7585 7586
        return schedtype;
    }

7587
    virReportUnsupportedError();
7588

7589
 error:
7590
    virDispatchError(domain->conn);
7591 7592 7593 7594 7595 7596 7597
    return NULL;
}


/**
 * virDomainGetSchedulerParameters:
 * @domain: pointer to domain object
7598
 * @params: pointer to scheduler parameter objects
7599
 *          (return value)
7600
 * @nparams: pointer to number of scheduler parameter objects
7601 7602 7603 7604 7605 7606 7607
 *          (this value should generally be as large as the returned value
 *           nparams of virDomainGetSchedulerType()); input and output
 *
 * Get all scheduler parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.  @nparams cannot be 0.
7608
 *
7609
 * It is hypervisor specific whether this returns the live or
7610
 * persistent state; for more control, use
7611
 * virDomainGetSchedulerParametersFlags().
7612 7613 7614 7615 7616
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetSchedulerParameters(virDomainPtr domain,
7617
                                virTypedParameterPtr params, int *nparams)
7618 7619
{
    virConnectPtr conn;
7620 7621

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%p", params, nparams);
7622

7623 7624
    virResetLastError();

7625
    virCheckDomainReturn(domain, -1);
7626

7627 7628 7629
    virCheckNonNullArgGoto(params, error);
    virCheckNonNullArgGoto(nparams, error);
    virCheckPositiveArgGoto(*nparams, error);
7630

7631 7632
    conn = domain->conn;

7633 7634
    if (conn->driver->domainGetSchedulerParameters) {
        int ret;
7635
        ret = conn->driver->domainGetSchedulerParameters(domain, params, nparams);
7636 7637 7638 7639
        if (ret < 0)
            goto error;
        return ret;
    }
7640

7641
    virReportUnsupportedError();
7642

7643
 error:
7644
    virDispatchError(domain->conn);
7645 7646 7647
    return -1;
}

7648

7649 7650 7651 7652 7653 7654 7655
/**
 * virDomainGetSchedulerParametersFlags:
 * @domain: pointer to domain object
 * @params: pointer to scheduler parameter object
 *          (return value)
 * @nparams: pointer to number of scheduler parameter
 *          (this value should be same than the returned value
7656
 *           nparams of virDomainGetSchedulerType()); input and output
E
Eric Blake 已提交
7657
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
7658
 *
7659 7660 7661 7662
 * Get all scheduler parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.  @nparams cannot be 0.
7663
 *
7664 7665
 * The value of @flags can be exactly VIR_DOMAIN_AFFECT_CURRENT,
 * VIR_DOMAIN_AFFECT_LIVE, or VIR_DOMAIN_AFFECT_CONFIG.
7666
 *
7667 7668
 * Here is a sample code snippet:
 *
E
Eric Blake 已提交
7669 7670 7671 7672 7673 7674 7675 7676
 *   char *ret = virDomainGetSchedulerType(dom, &nparams);
 *   if (ret && nparams != 0) {
 *       if ((params = malloc(sizeof(*params) * nparams)) == NULL)
 *           goto error;
 *       memset(params, 0, sizeof(*params) * nparams);
 *       if (virDomainGetSchedulerParametersFlags(dom, params, &nparams, 0))
 *           goto error;
 *   }
7677
 *
7678 7679 7680 7681 7682 7683 7684 7685 7686
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetSchedulerParametersFlags(virDomainPtr domain,
                                     virTypedParameterPtr params, int *nparams,
                                     unsigned int flags)
{
    virConnectPtr conn;

7687
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%p, flags=%x",
7688 7689 7690 7691
                     params, nparams, flags);

    virResetLastError();

7692
    virCheckDomainReturn(domain, -1);
7693

7694 7695 7696
    virCheckNonNullArgGoto(params, error);
    virCheckNonNullArgGoto(nparams, error);
    virCheckPositiveArgGoto(*nparams, error);
7697

E
Eric Blake 已提交
7698 7699 7700
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
7701 7702 7703 7704

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
7705
        virReportInvalidArg(flags,
7706 7707
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
7708
                            __FUNCTION__);
7709 7710
        goto error;
    }
7711 7712 7713 7714
    conn = domain->conn;

    if (conn->driver->domainGetSchedulerParametersFlags) {
        int ret;
7715 7716
        ret = conn->driver->domainGetSchedulerParametersFlags(domain, params,
                                                              nparams, flags);
7717 7718 7719 7720 7721
        if (ret < 0)
            goto error;
        return ret;
    }

7722
    virReportUnsupportedError();
7723

7724
 error:
7725 7726 7727 7728
    virDispatchError(domain->conn);
    return -1;
}

7729

7730 7731 7732 7733
/**
 * virDomainSetSchedulerParameters:
 * @domain: pointer to domain object
 * @params: pointer to scheduler parameter objects
7734 7735
 * @nparams: number of scheduler parameter objects
 *          (this value can be the same or less than the returned value
7736 7737
 *           nparams of virDomainGetSchedulerType)
 *
7738 7739 7740 7741
 * Change all or a subset or the scheduler parameters.  It is
 * hypervisor-specific whether this sets live, persistent, or both
 * settings; for more control, use
 * virDomainSetSchedulerParametersFlags.
7742 7743 7744 7745
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
7746
virDomainSetSchedulerParameters(virDomainPtr domain,
7747
                                virTypedParameterPtr params, int nparams)
7748 7749
{
    virConnectPtr conn;
7750 7751

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d", params, nparams);
7752
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
7753

7754 7755
    virResetLastError();

7756 7757
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
7758

7759
    virCheckReadOnlyGoto(conn->flags, error);
7760 7761 7762
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

7763
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
7764
        goto error;
7765

7766 7767
    if (conn->driver->domainSetSchedulerParameters) {
        int ret;
7768
        ret = conn->driver->domainSetSchedulerParameters(domain, params, nparams);
7769 7770 7771 7772
        if (ret < 0)
            goto error;
        return ret;
    }
7773

7774
    virReportUnsupportedError();
7775

7776
 error:
7777 7778 7779 7780 7781 7782 7783 7784 7785
    virDispatchError(domain->conn);
    return -1;
}


/**
 * virDomainSetSchedulerParametersFlags:
 * @domain: pointer to domain object
 * @params: pointer to scheduler parameter objects
7786 7787
 * @nparams: number of scheduler parameter objects
 *          (this value can be the same or less than the returned value
7788
 *           nparams of virDomainGetSchedulerType)
7789
 * @flags: bitwise-OR of virDomainModificationImpact
7790
 *
7791
 * Change a subset or all scheduler parameters.  The value of @flags
7792 7793 7794
 * should be either VIR_DOMAIN_AFFECT_CURRENT, or a bitwise-or of
 * values from VIR_DOMAIN_AFFECT_LIVE and
 * VIR_DOMAIN_AFFECT_CURRENT, although hypervisors vary in which
7795
 * flags are supported.
7796 7797 7798 7799 7800
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetSchedulerParametersFlags(virDomainPtr domain,
7801
                                     virTypedParameterPtr params,
7802 7803 7804 7805 7806
                                     int nparams,
                                     unsigned int flags)
{
    virConnectPtr conn;

7807
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
7808
                     params, nparams, flags);
7809
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
7810 7811 7812

    virResetLastError();

7813 7814
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
7815

7816
    virCheckReadOnlyGoto(conn->flags, error);
7817 7818 7819
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

7820
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
7821
        goto error;
7822

7823 7824 7825 7826 7827 7828 7829 7830 7831 7832 7833
    if (conn->driver->domainSetSchedulerParametersFlags) {
        int ret;
        ret = conn->driver->domainSetSchedulerParametersFlags(domain,
                                                              params,
                                                              nparams,
                                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7834
    virReportUnsupportedError();
7835

7836
 error:
7837
    virDispatchError(domain->conn);
7838 7839 7840 7841
    return -1;
}


7842
/**
7843
 * virDomainBlockStats:
7844
 * @dom: pointer to the domain object
7845
 * @disk: path to the block device, or device shorthand
7846 7847 7848 7849 7850 7851
 * @stats: block device stats (returned)
 * @size: size of stats structure
 *
 * This function returns block device (disk) stats for block
 * devices attached to the domain.
 *
7852
 * The @disk parameter is either the device target shorthand (the
7853 7854 7855 7856
 * <target dev='...'/> sub-element, such as "xvda"), or (since 0.9.8)
 * an unambiguous source name of the block device (the <source
 * file='...'/> sub-element, such as "/path/to/image").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
7857 7858 7859
 * elements within //domain/devices/disk. Some drivers might also
 * accept the empty string for the @disk parameter, and then yield
 * summary stats for the entire domain.
7860 7861 7862 7863 7864 7865 7866 7867 7868 7869 7870
 *
 * Domains may have more than one block device.  To get stats for
 * each you should make multiple calls to this function.
 *
 * Individual fields within the stats structure may be returned
 * as -1, which indicates that the hypervisor does not support
 * that particular statistic.
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
7871 7872
virDomainBlockStats(virDomainPtr dom, const char *disk,
                    virDomainBlockStatsPtr stats, size_t size)
7873 7874 7875
{
    virConnectPtr conn;
    struct _virDomainBlockStats stats2 = { -1, -1, -1, -1, -1 };
7876

7877
    VIR_DOMAIN_DEBUG(dom, "disk=%s, stats=%p, size=%zi", disk, stats, size);
7878

7879 7880
    virResetLastError();

7881
    virCheckDomainReturn(dom, -1);
7882 7883 7884 7885 7886 7887
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(stats, error);
    if (size > sizeof(stats2)) {
        virReportInvalidArg(size,
                            _("size in %s must not exceed %zu"),
                            __FUNCTION__, sizeof(stats2));
7888 7889
        goto error;
    }
7890 7891 7892
    conn = dom->conn;

    if (conn->driver->domainBlockStats) {
7893
        if (conn->driver->domainBlockStats(dom, disk, &stats2) == -1)
7894
            goto error;
7895

7896
        memcpy(stats, &stats2, size);
7897 7898 7899
        return 0;
    }

7900
    virReportUnsupportedError();
7901

7902
 error:
7903
    virDispatchError(dom->conn);
7904 7905 7906
    return -1;
}

7907

O
Osier Yang 已提交
7908 7909 7910
/**
 * virDomainBlockStatsFlags:
 * @dom: pointer to domain object
7911
 * @disk: path to the block device, or device shorthand
O
Osier Yang 已提交
7912 7913
 * @params: pointer to block stats parameter object
 *          (return value)
7914
 * @nparams: pointer to number of block stats; input and output
E
Eric Blake 已提交
7915
 * @flags: bitwise-OR of virTypedParameterFlags
O
Osier Yang 已提交
7916 7917 7918 7919
 *
 * This function is to get block stats parameters for block
 * devices attached to the domain.
 *
7920
 * The @disk parameter is either the device target shorthand (the
7921 7922 7923 7924
 * <target dev='...'/> sub-element, such as "xvda"), or (since 0.9.8)
 * an unambiguous source name of the block device (the <source
 * file='...'/> sub-element, such as "/path/to/image").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
7925 7926 7927
 * elements within //domain/devices/disk. Some drivers might also
 * accept the empty string for the @disk parameter, and then yield
 * summary stats for the entire domain.
O
Osier Yang 已提交
7928 7929 7930 7931
 *
 * Domains may have more than one block device.  To get stats for
 * each you should make multiple calls to this function.
 *
7932 7933 7934 7935
 * On input, @nparams gives the size of the @params array; on output,
 * @nparams gives how many slots were filled with parameter
 * information, which might be less but will not exceed the input
 * value.
O
Osier Yang 已提交
7936
 *
7937 7938 7939 7940 7941
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. (Note that block devices of different types
 * might support different parameters, so it might be necessary to compute
 * @nparams for each block device). The caller should then allocate @params
O
Osier Yang 已提交
7942
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
7943
 * again. See virDomainGetMemoryParameters() for more details.
O
Osier Yang 已提交
7944 7945 7946
 *
 * Returns -1 in case of error, 0 in case of success.
 */
7947 7948 7949 7950 7951 7952
int
virDomainBlockStatsFlags(virDomainPtr dom,
                         const char *disk,
                         virTypedParameterPtr params,
                         int *nparams,
                         unsigned int flags)
O
Osier Yang 已提交
7953 7954 7955
{
    virConnectPtr conn;

7956 7957
    VIR_DOMAIN_DEBUG(dom, "disk=%s, params=%p, nparams=%d, flags=%x",
                     disk, params, nparams ? *nparams : -1, flags);
O
Osier Yang 已提交
7958 7959 7960

    virResetLastError();

7961
    virCheckDomainReturn(dom, -1);
7962 7963 7964 7965 7966 7967
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

E
Eric Blake 已提交
7968 7969 7970
    if (VIR_DRV_SUPPORTS_FEATURE(dom->conn->driver, dom->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
O
Osier Yang 已提交
7971 7972 7973 7974
    conn = dom->conn;

    if (conn->driver->domainBlockStatsFlags) {
        int ret;
7975
        ret = conn->driver->domainBlockStatsFlags(dom, disk, params, nparams, flags);
O
Osier Yang 已提交
7976 7977 7978 7979
        if (ret < 0)
            goto error;
        return ret;
    }
7980
    virReportUnsupportedError();
O
Osier Yang 已提交
7981

7982
 error:
O
Osier Yang 已提交
7983 7984 7985 7986 7987
    virDispatchError(dom->conn);
    return -1;
}


7988
/**
7989
 * virDomainInterfaceStats:
7990 7991 7992 7993 7994 7995 7996 7997 7998 7999
 * @dom: pointer to the domain object
 * @path: path to the interface
 * @stats: network interface stats (returned)
 * @size: size of stats structure
 *
 * This function returns network interface stats for interfaces
 * attached to the domain.
 *
 * The path parameter is the name of the network interface.
 *
D
Dan Kenigsberg 已提交
8000
 * Domains may have more than one network interface.  To get stats for
8001 8002 8003 8004 8005 8006 8007 8008 8009
 * each you should make multiple calls to this function.
 *
 * Individual fields within the stats structure may be returned
 * as -1, which indicates that the hypervisor does not support
 * that particular statistic.
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8010 8011
virDomainInterfaceStats(virDomainPtr dom, const char *path,
                        virDomainInterfaceStatsPtr stats, size_t size)
8012 8013 8014 8015
{
    virConnectPtr conn;
    struct _virDomainInterfaceStats stats2 = { -1, -1, -1, -1,
                                               -1, -1, -1, -1 };
8016 8017 8018

    VIR_DOMAIN_DEBUG(dom, "path=%s, stats=%p, size=%zi",
                     path, stats, size);
8019

8020 8021
    virResetLastError();

8022
    virCheckDomainReturn(dom, -1);
8023 8024 8025 8026 8027 8028
    virCheckNonNullArgGoto(path, error);
    virCheckNonNullArgGoto(stats, error);
    if (size > sizeof(stats2)) {
        virReportInvalidArg(size,
                            _("size in %s must not exceed %zu"),
                            __FUNCTION__, sizeof(stats2));
8029 8030
        goto error;
    }
8031

8032 8033 8034
    conn = dom->conn;

    if (conn->driver->domainInterfaceStats) {
8035
        if (conn->driver->domainInterfaceStats(dom, path, &stats2) == -1)
8036
            goto error;
8037

8038
        memcpy(stats, &stats2, size);
8039 8040 8041
        return 0;
    }

8042
    virReportUnsupportedError();
8043

8044
 error:
8045
    virDispatchError(dom->conn);
8046 8047 8048
    return -1;
}

8049 8050

/**
8051 8052 8053 8054 8055 8056 8057 8058
 * virDomainSetInterfaceParameters:
 * @domain: pointer to domain object
 * @device: the interface name or mac address
 * @params: pointer to interface parameter objects
 * @nparams: number of interface parameter (this value can be the same or
 *          less than the number of parameters supported)
 * @flags: bitwise-OR of virDomainModificationImpact
 *
8059 8060
 * Change a subset or all parameters of interface; currently this
 * includes bandwidth parameters.  The value of @flags should be
8061 8062
 * either VIR_DOMAIN_AFFECT_CURRENT, or a bitwise-or of values
 * VIR_DOMAIN_AFFECT_LIVE and VIR_DOMAIN_AFFECT_CONFIG, although
8063 8064
 * hypervisors vary in which flags are supported.
 *
8065 8066 8067 8068 8069 8070 8071 8072 8073 8074 8075 8076 8077 8078
 * This function may require privileged access to the hypervisor.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetInterfaceParameters(virDomainPtr domain,
                                const char *device,
                                virTypedParameterPtr params,
                                int nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "device=%s, params=%p, nparams=%d, flags=%x",
                     device, params, nparams, flags);
8079
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
8080 8081 8082

    virResetLastError();

8083 8084 8085 8086
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
8087 8088 8089
    virCheckNonNullArgGoto(params, error);
    virCheckPositiveArgGoto(nparams, error);

8090
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
8091
        goto error;
8092 8093 8094

    if (conn->driver->domainSetInterfaceParameters) {
        int ret;
8095 8096 8097
        ret = conn->driver->domainSetInterfaceParameters(domain, device,
                                                         params, nparams,
                                                         flags);
8098 8099 8100 8101 8102
        if (ret < 0)
            goto error;
        return ret;
    }

8103
    virReportUnsupportedError();
8104

8105
 error:
8106 8107 8108 8109
    virDispatchError(domain->conn);
    return -1;
}

8110 8111

/**
8112 8113 8114 8115 8116
 * virDomainGetInterfaceParameters:
 * @domain: pointer to domain object
 * @device: the interface name or mac address
 * @params: pointer to interface parameter objects
 *          (return value, allocated by the caller)
8117 8118
 * @nparams: pointer to number of interface parameter; input and output
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
8119 8120 8121 8122 8123 8124 8125 8126 8127 8128 8129 8130 8131 8132 8133 8134 8135 8136 8137 8138 8139 8140 8141 8142 8143 8144 8145 8146 8147 8148 8149
 *
 * Get all interface parameters. On input, @nparams gives the size of
 * the @params array; on output, @nparams gives how many slots were
 * filled with parameter information, which might be less but will not
 * exceed the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the
 * API again. See virDomainGetMemoryParameters() for an equivalent usage
 * example.
 *
 * This function may require privileged access to the hypervisor. This function
 * expects the caller to allocate the @params.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetInterfaceParameters(virDomainPtr domain,
                                const char *device,
                                virTypedParameterPtr params,
                                int *nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "device=%s, params=%p, nparams=%d, flags=%x",
                     device, params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

8150
    virCheckDomainReturn(domain, -1);
8151 8152 8153 8154 8155
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

8156 8157 8158 8159 8160 8161 8162 8163
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    conn = domain->conn;

    if (conn->driver->domainGetInterfaceParameters) {
        int ret;
8164 8165 8166
        ret = conn->driver->domainGetInterfaceParameters(domain, device,
                                                         params, nparams,
                                                         flags);
8167 8168 8169 8170
        if (ret < 0)
            goto error;
        return ret;
    }
8171
    virReportUnsupportedError();
8172

8173
 error:
8174 8175 8176 8177
    virDispatchError(domain->conn);
    return -1;
}

8178

8179 8180 8181 8182 8183
/**
 * virDomainMemoryStats:
 * @dom: pointer to the domain object
 * @stats: nr_stats-sized array of stat structures (returned)
 * @nr_stats: number of memory statistics requested
8184
 * @flags: extra flags; not used yet, so callers should always pass 0
8185 8186 8187 8188 8189 8190 8191 8192 8193 8194 8195 8196 8197 8198 8199 8200 8201 8202 8203 8204 8205
 *
 * This function provides memory statistics for the domain.
 *
 * Up to 'nr_stats' elements of 'stats' will be populated with memory statistics
 * from the domain.  Only statistics supported by the domain, the driver, and
 * this version of libvirt will be returned.
 *
 * Memory Statistics:
 *
 * VIR_DOMAIN_MEMORY_STAT_SWAP_IN:
 *     The total amount of data read from swap space (in kb).
 * VIR_DOMAIN_MEMORY_STAT_SWAP_OUT:
 *     The total amount of memory written out to swap space (in kb).
 * VIR_DOMAIN_MEMORY_STAT_MAJOR_FAULT:
 *     The number of page faults that required disk IO to service.
 * VIR_DOMAIN_MEMORY_STAT_MINOR_FAULT:
 *     The number of page faults serviced without disk IO.
 * VIR_DOMAIN_MEMORY_STAT_UNUSED:
 *     The amount of memory which is not being used for any purpose (in kb).
 * VIR_DOMAIN_MEMORY_STAT_AVAILABLE:
 *     The total amount of memory available to the domain's OS (in kb).
8206 8207
 * VIR_DOMAIN_MEMORY_STAT_ACTUAL_BALLOON:
 *     Current balloon value (in kb).
8208 8209 8210
 *
 * Returns: The number of stats provided or -1 in case of failure.
 */
8211 8212 8213
int
virDomainMemoryStats(virDomainPtr dom, virDomainMemoryStatPtr stats,
                     unsigned int nr_stats, unsigned int flags)
8214 8215 8216
{
    virConnectPtr conn;
    unsigned long nr_stats_ret = 0;
8217

E
Eric Blake 已提交
8218 8219
    VIR_DOMAIN_DEBUG(dom, "stats=%p, nr_stats=%u, flags=%x",
                     stats, nr_stats, flags);
8220 8221 8222

    virResetLastError();

8223
    virCheckDomainReturn(dom, -1);
8224

8225 8226 8227 8228 8229 8230 8231 8232
    if (!stats || nr_stats == 0)
        return 0;

    if (nr_stats > VIR_DOMAIN_MEMORY_STAT_NR)
        nr_stats = VIR_DOMAIN_MEMORY_STAT_NR;

    conn = dom->conn;
    if (conn->driver->domainMemoryStats) {
8233 8234
        nr_stats_ret = conn->driver->domainMemoryStats(dom, stats, nr_stats,
                                                       flags);
8235 8236 8237 8238 8239
        if (nr_stats_ret == -1)
            goto error;
        return nr_stats_ret;
    }

8240
    virReportUnsupportedError();
8241

8242
 error:
8243
    virDispatchError(dom->conn);
8244 8245 8246
    return -1;
}

8247

R
Richard W.M. Jones 已提交
8248 8249 8250
/**
 * virDomainBlockPeek:
 * @dom: pointer to the domain object
8251
 * @disk: path to the block device, or device shorthand
R
Richard W.M. Jones 已提交
8252 8253 8254
 * @offset: offset within block device
 * @size: size to read
 * @buffer: return buffer (must be at least size bytes)
8255
 * @flags: extra flags; not used yet, so callers should always pass 0
R
Richard W.M. Jones 已提交
8256 8257 8258 8259 8260 8261 8262 8263 8264 8265 8266 8267 8268 8269
 *
 * This function allows you to read the contents of a domain's
 * disk device.
 *
 * Typical uses for this are to determine if the domain has
 * written a Master Boot Record (indicating that the domain
 * has completed installation), or to try to work out the state
 * of the domain's filesystems.
 *
 * (Note that in the local case you might try to open the
 * block device or file directly, but that won't work in the
 * remote case, nor if you don't have sufficient permission.
 * Hence the need for this call).
 *
8270
 * The @disk parameter is either an unambiguous source name of the
8271 8272 8273 8274 8275
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
R
Richard W.M. Jones 已提交
8276 8277 8278 8279 8280 8281 8282
 *
 * 'offset' and 'size' represent an area which must lie entirely
 * within the device or file.  'size' may be 0 to test if the
 * call would succeed.
 *
 * 'buffer' is the return buffer and must be at least 'size' bytes.
 *
R
Richard W.M. Jones 已提交
8283 8284 8285
 * NB. The remote driver imposes a 64K byte limit on 'size'.
 * For your program to be able to work reliably over a remote
 * connection you should split large requests to <= 65536 bytes.
M
Michal Privoznik 已提交
8286
 * However, with 0.9.13 this RPC limit has been raised to 1M byte.
8287 8288
 * Starting with version 1.0.6 the RPC limit has been raised again.
 * Now large requests up to 16M byte are supported.
R
Richard W.M. Jones 已提交
8289
 *
R
Richard W.M. Jones 已提交
8290 8291 8292
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8293 8294 8295 8296 8297 8298
virDomainBlockPeek(virDomainPtr dom,
                   const char *disk,
                   unsigned long long offset /* really 64 bits */,
                   size_t size,
                   void *buffer,
                   unsigned int flags)
R
Richard W.M. Jones 已提交
8299 8300
{
    virConnectPtr conn;
8301

8302 8303
    VIR_DOMAIN_DEBUG(dom, "disk=%s, offset=%lld, size=%zi, buffer=%p, flags=%x",
                     disk, offset, size, buffer, flags);
R
Richard W.M. Jones 已提交
8304

8305 8306
    virResetLastError();

8307
    virCheckDomainReturn(dom, -1);
R
Richard W.M. Jones 已提交
8308
    conn = dom->conn;
8309

8310
    virCheckReadOnlyGoto(conn->flags, error);
8311
    virCheckNonNullArgGoto(disk, error);
R
Richard W.M. Jones 已提交
8312 8313

    /* Allow size == 0 as an access test. */
8314 8315
    if (size > 0)
        virCheckNonNullArgGoto(buffer, error);
R
Richard W.M. Jones 已提交
8316

8317 8318
    if (conn->driver->domainBlockPeek) {
        int ret;
8319
        ret = conn->driver->domainBlockPeek(dom, disk, offset, size,
8320 8321 8322 8323 8324
                                            buffer, flags);
        if (ret < 0)
            goto error;
        return ret;
    }
R
Richard W.M. Jones 已提交
8325

8326
    virReportUnsupportedError();
8327

8328
 error:
8329
    virDispatchError(dom->conn);
R
Richard W.M. Jones 已提交
8330 8331
    return -1;
}
8332

8333

O
Osier Yang 已提交
8334 8335 8336 8337
/**
 * virDomainBlockResize:
 * @dom: pointer to the domain object
 * @disk: path to the block image, or shorthand
E
Eric Blake 已提交
8338 8339
 * @size: new size of the block image, see below for unit
 * @flags: bitwise-OR of virDomainBlockResizeFlags
O
Osier Yang 已提交
8340
 *
E
Eric Blake 已提交
8341
 * Resize a block device of domain while the domain is running.  If
8342 8343 8344 8345 8346
 * @flags is 0, then @size is in kibibytes (blocks of 1024 bytes);
 * since 0.9.11, if @flags includes VIR_DOMAIN_BLOCK_RESIZE_BYTES,
 * @size is in bytes instead.  @size is taken directly as the new
 * size.  Depending on the file format, the hypervisor may round up
 * to the next alignment boundary.
O
Osier Yang 已提交
8347 8348 8349 8350 8351 8352 8353 8354
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
E
Eric Blake 已提交
8355 8356 8357
 * Note that this call may fail if the underlying virtualization hypervisor
 * does not support it; this call requires privileged access to the
 * hypervisor.
O
Osier Yang 已提交
8358 8359 8360 8361
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8362 8363 8364 8365
virDomainBlockResize(virDomainPtr dom,
                     const char *disk,
                     unsigned long long size,
                     unsigned int flags)
O
Osier Yang 已提交
8366 8367 8368 8369 8370 8371 8372
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "disk=%s, size=%llu, flags=%x", disk, size, flags);

    virResetLastError();

8373
    virCheckDomainReturn(dom, -1);
O
Osier Yang 已提交
8374 8375
    conn = dom->conn;

8376
    virCheckReadOnlyGoto(conn->flags, error);
8377
    virCheckNonNullArgGoto(disk, error);
O
Osier Yang 已提交
8378 8379 8380

    if (conn->driver->domainBlockResize) {
        int ret;
8381
        ret = conn->driver->domainBlockResize(dom, disk, size, flags);
O
Osier Yang 已提交
8382 8383 8384 8385 8386
        if (ret < 0)
            goto error;
        return ret;
    }

8387
    virReportUnsupportedError();
O
Osier Yang 已提交
8388

8389
 error:
O
Osier Yang 已提交
8390 8391 8392 8393
    virDispatchError(dom->conn);
    return -1;
}

8394

R
Richard W.M. Jones 已提交
8395 8396 8397 8398 8399 8400
/**
 * virDomainMemoryPeek:
 * @dom: pointer to the domain object
 * @start: start of memory to peek
 * @size: size of memory to peek
 * @buffer: return buffer (must be at least size bytes)
8401
 * @flags: bitwise-OR of virDomainMemoryFlags
R
Richard W.M. Jones 已提交
8402 8403 8404 8405 8406 8407 8408 8409 8410 8411 8412 8413 8414 8415 8416 8417 8418 8419 8420 8421 8422
 *
 * This function allows you to read the contents of a domain's
 * memory.
 *
 * The memory which is read is controlled by the 'start', 'size'
 * and 'flags' parameters.
 *
 * If 'flags' is VIR_MEMORY_VIRTUAL then the 'start' and 'size'
 * parameters are interpreted as virtual memory addresses for
 * whichever task happens to be running on the domain at the
 * moment.  Although this sounds haphazard it is in fact what
 * you want in order to read Linux kernel state, because it
 * ensures that pointers in the kernel image can be interpreted
 * coherently.
 *
 * 'buffer' is the return buffer and must be at least 'size' bytes.
 * 'size' may be 0 to test if the call would succeed.
 *
 * NB. The remote driver imposes a 64K byte limit on 'size'.
 * For your program to be able to work reliably over a remote
 * connection you should split large requests to <= 65536 bytes.
M
Michal Privoznik 已提交
8423
 * However, with 0.9.13 this RPC limit has been raised to 1M byte.
8424 8425
 * Starting with version 1.0.6 the RPC limit has been raised again.
 * Now large requests up to 16M byte are supported.
R
Richard W.M. Jones 已提交
8426 8427 8428 8429
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8430 8431 8432 8433 8434
virDomainMemoryPeek(virDomainPtr dom,
                    unsigned long long start /* really 64 bits */,
                    size_t size,
                    void *buffer,
                    unsigned int flags)
R
Richard W.M. Jones 已提交
8435 8436
{
    virConnectPtr conn;
8437

8438
    VIR_DOMAIN_DEBUG(dom, "start=%lld, size=%zi, buffer=%p, flags=%x",
8439
                     start, size, buffer, flags);
R
Richard W.M. Jones 已提交
8440

8441 8442
    virResetLastError();

8443
    virCheckDomainReturn(dom, -1);
R
Richard W.M. Jones 已提交
8444 8445
    conn = dom->conn;

8446
    virCheckReadOnlyGoto(conn->flags, error);
8447

8448
    /* Note on access to physical memory: A VIR_MEMORY_PHYSICAL flag is
R
Richard W.M. Jones 已提交
8449 8450 8451 8452 8453 8454
     * a possibility.  However it isn't really useful unless the caller
     * can also access registers, particularly CR3 on x86 in order to
     * get the Page Table Directory.  Since registers are different on
     * every architecture, that would imply another call to get the
     * machine registers.
     *
8455
     * The QEMU driver handles VIR_MEMORY_VIRTUAL, mapping it
R
Richard W.M. Jones 已提交
8456 8457 8458
     * to the qemu 'memsave' command which does the virtual to physical
     * mapping inside qemu.
     *
8459 8460 8461
     * The QEMU driver also handles VIR_MEMORY_PHYSICAL, mapping it
     * to the qemu 'pmemsave' command.
     *
R
Richard W.M. Jones 已提交
8462 8463 8464 8465 8466 8467 8468 8469
     * At time of writing there is no Xen driver.  However the Xen
     * hypervisor only lets you map physical pages from other domains,
     * and so the Xen driver would have to do the virtual to physical
     * mapping by chasing 2, 3 or 4-level page tables from the PTD.
     * There is example code in libxc (xc_translate_foreign_address)
     * which does this, although we cannot copy this code directly
     * because of incompatible licensing.
     */
8470

8471 8472
    /* Exactly one of these two flags must be set.  */
    if (!(flags & VIR_MEMORY_VIRTUAL) == !(flags & VIR_MEMORY_PHYSICAL)) {
8473
        virReportInvalidArg(flags,
8474 8475
                            _("flags in %s must include VIR_MEMORY_VIRTUAL or "
                              "VIR_MEMORY_PHYSICAL"),
8476
                            __FUNCTION__);
8477
        goto error;
R
Richard W.M. Jones 已提交
8478 8479 8480
    }

    /* Allow size == 0 as an access test. */
8481 8482
    if (size > 0)
        virCheckNonNullArgGoto(buffer, error);
R
Richard W.M. Jones 已提交
8483

8484 8485
    if (conn->driver->domainMemoryPeek) {
        int ret;
8486 8487
        ret = conn->driver->domainMemoryPeek(dom, start, size,
                                             buffer, flags);
8488 8489 8490 8491
        if (ret < 0)
            goto error;
        return ret;
    }
R
Richard W.M. Jones 已提交
8492

8493
    virReportUnsupportedError();
8494

8495
 error:
8496
    virDispatchError(dom->conn);
R
Richard W.M. Jones 已提交
8497 8498 8499
    return -1;
}

8500

8501 8502 8503
/**
 * virDomainGetBlockInfo:
 * @domain: a domain object
8504
 * @disk: path to the block device, or device shorthand
8505
 * @info: pointer to a virDomainBlockInfo structure allocated by the user
8506
 * @flags: extra flags; not used yet, so callers should always pass 0
8507 8508 8509
 *
 * Extract information about a domain's block device.
 *
8510
 * The @disk parameter is either an unambiguous source name of the
8511 8512 8513 8514 8515
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
8516 8517 8518 8519 8520 8521 8522 8523 8524 8525 8526 8527 8528 8529 8530 8531 8532 8533 8534 8535 8536 8537 8538 8539 8540 8541 8542 8543 8544 8545 8546 8547 8548 8549 8550 8551 8552 8553 8554 8555 8556 8557 8558 8559 8560 8561 8562 8563 8564 8565 8566 8567 8568
 *
 * For QEMU domains, the allocation and physical virDomainBlockInfo
 * values returned will generally be the same, except when using a
 * non raw, block backing device, such as qcow2 for an active domain.
 * When the persistent domain is not active, QEMU will return the
 * default which is the same value for allocation and physical.
 *
 * Active QEMU domains can return an allocation value which is more
 * representative of the currently used blocks by the device compared
 * to the physical size of the device. Applications can use/monitor
 * the allocation value with the understanding that if the domain
 * becomes inactive during an attempt to get the value, the default
 * values will be returned. Thus, the application should check
 * after the call for the domain being inactive if the values are
 * the same. Optionally, the application could be watching for a
 * shutdown event and then ignore any values received afterwards.
 * This can be an issue when a domain is being migrated and the
 * exact timing of the domain being made inactive and check of
 * the allocation value results the default being returned. For
 * a transient domain in the similar situation, this call will return
 * -1 and an error message indicating the "domain is not running".
 *
 * The following is some pseudo code illustrating the call sequence:
 *
 *   ...
 *   virDomainPtr dom;
 *   virDomainBlockInfo info;
 *   char *device;
 *   ...
 *   // Either get a list of all domains or a specific domain
 *   // via a virDomainLookupBy*() call.
 *   //
 *   // It's also required to fill in the device pointer, but that's
 *   // specific to the implementation. For the purposes of this example
 *   // a qcow2 backed device name string would need to be provided.
 *   ...
 *   // If the following call is made on a persistent domain with a
 *   // qcow2 block backed block device, then it's possible the returned
 *   // allocation equals the physical value. In that case, the domain
 *   // that may have been active prior to calling has become inactive,
 *   // such as is the case during a domain migration. Thus once we
 *   // get data returned, check for active domain when the values are
 *   // the same.
 *   if (virDomainGetBlockInfo(dom, device, &info, 0) < 0)
 *       goto failure;
 *   if (info.allocation == info.physical) {
 *       // If the domain is no longer active,
 *       // then the defaults are being returned.
 *       if (!virDomainIsActive())
 *               goto ignore_return;
 *   }
 *   // Do something with the allocation and physical values
 *   ...
8569
 *
8570 8571 8572
 * Returns 0 in case of success and -1 in case of failure.
 */
int
8573
virDomainGetBlockInfo(virDomainPtr domain, const char *disk,
8574
                      virDomainBlockInfoPtr info, unsigned int flags)
8575 8576
{
    virConnectPtr conn;
8577

E
Eric Blake 已提交
8578
    VIR_DOMAIN_DEBUG(domain, "info=%p, flags=%x", info, flags);
8579 8580 8581

    virResetLastError();

8582 8583 8584
    if (info)
        memset(info, 0, sizeof(*info));

8585
    virCheckDomainReturn(domain, -1);
8586 8587
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(info, error);
8588 8589 8590 8591 8592

    conn = domain->conn;

    if (conn->driver->domainGetBlockInfo) {
        int ret;
8593
        ret = conn->driver->domainGetBlockInfo(domain, disk, info, flags);
8594 8595 8596 8597 8598
        if (ret < 0)
            goto error;
        return ret;
    }

8599
    virReportUnsupportedError();
8600

8601
 error:
8602 8603 8604 8605 8606
    virDispatchError(domain->conn);
    return -1;
}


8607 8608 8609 8610 8611 8612 8613 8614 8615 8616 8617
/************************************************************************
 *									*
 *		Handling of defined but not running domains		*
 *									*
 ************************************************************************/

/**
 * virDomainDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xml: the XML description for the domain, preferably in UTF-8
 *
8618 8619
 * Define a domain, but does not start it.
 * This definition is persistent, until explicitly undefined with
8620
 * virDomainUndefine(). A previous definition for this domain would be
8621
 * overridden if it already exists.
8622
 *
E
Eric Blake 已提交
8623 8624 8625 8626 8627
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation on a transient domain with the same id as the
 * domain being defined; in that case, use virDomainBlockJobAbort() to
 * stop the block copy first.
 *
8628 8629 8630
 * Returns NULL in case of error, a pointer to the domain otherwise
 */
virDomainPtr
8631 8632
virDomainDefineXML(virConnectPtr conn, const char *xml)
{
8633
    VIR_DEBUG("conn=%p, xml=%s", conn, xml);
8634

8635 8636
    virResetLastError();

8637
    virCheckConnectReturn(conn, NULL);
8638
    virCheckReadOnlyGoto(conn->flags, error);
8639
    virCheckNonNullArgGoto(xml, error);
8640

8641 8642
    if (conn->driver->domainDefineXML) {
        virDomainPtr ret;
8643
        ret = conn->driver->domainDefineXML(conn, xml);
8644 8645 8646 8647
        if (!ret)
            goto error;
        return ret;
    }
8648

8649
    virReportUnsupportedError();
8650

8651
 error:
8652
    virDispatchError(conn);
8653
    return NULL;
8654 8655
}

8656

8657 8658 8659 8660
/**
 * virDomainUndefine:
 * @domain: pointer to a defined domain
 *
O
Osier Yang 已提交
8661 8662 8663 8664 8665
 * Undefine a domain. If the domain is running, it's converted to
 * transient domain, without stopping it. If the domain is inactive,
 * the domain configuration is removed.
 *
 * If the domain has a managed save image (see
8666 8667 8668
 * virDomainHasManagedSaveImage()), or if it is inactive and has any
 * snapshot metadata (see virDomainSnapshotNum()), then the undefine will
 * fail. See virDomainUndefineFlags() for more control.
8669 8670 8671 8672
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
8673 8674
virDomainUndefine(virDomainPtr domain)
{
8675
    virConnectPtr conn;
8676

8677
    VIR_DOMAIN_DEBUG(domain);
8678

8679 8680
    virResetLastError();

8681
    virCheckDomainReturn(domain, -1);
8682
    conn = domain->conn;
8683

8684
    virCheckReadOnlyGoto(conn->flags, error);
8685

8686 8687
    if (conn->driver->domainUndefine) {
        int ret;
8688
        ret = conn->driver->domainUndefine(domain);
8689 8690 8691 8692
        if (ret < 0)
            goto error;
        return ret;
    }
8693

8694
    virReportUnsupportedError();
8695

8696
 error:
8697
    virDispatchError(domain->conn);
8698
    return -1;
8699 8700
}

8701

O
Osier Yang 已提交
8702 8703 8704
/**
 * virDomainUndefineFlags:
 * @domain: pointer to a defined domain
8705
 * @flags: bitwise-OR of supported virDomainUndefineFlagsValues
O
Osier Yang 已提交
8706 8707 8708 8709 8710 8711 8712 8713 8714
 *
 * Undefine a domain. If the domain is running, it's converted to
 * transient domain, without stopping it. If the domain is inactive,
 * the domain configuration is removed.
 *
 * If the domain has a managed save image (see virDomainHasManagedSaveImage()),
 * then including VIR_DOMAIN_UNDEFINE_MANAGED_SAVE in @flags will also remove
 * that file, and omitting the flag will cause the undefine process to fail.
 *
8715 8716 8717 8718 8719 8720 8721 8722 8723
 * If the domain is inactive and has any snapshot metadata (see
 * virDomainSnapshotNum()), then including
 * VIR_DOMAIN_UNDEFINE_SNAPSHOTS_METADATA in @flags will also remove
 * that metadata.  Omitting the flag will cause the undefine of an
 * inactive domain to fail.  Active snapshots will retain snapshot
 * metadata until the (now-transient) domain halts, regardless of
 * whether this flag is present.  On hypervisors where snapshots do
 * not use libvirt metadata, this flag has no effect.
 *
O
Osier Yang 已提交
8724 8725 8726 8727 8728 8729 8730 8731 8732 8733 8734 8735
 * Returns 0 in case of success, -1 in case of error
 */
int
virDomainUndefineFlags(virDomainPtr domain,
                       unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);

    virResetLastError();

8736
    virCheckDomainReturn(domain, -1);
O
Osier Yang 已提交
8737
    conn = domain->conn;
8738

8739
    virCheckReadOnlyGoto(conn->flags, error);
O
Osier Yang 已提交
8740 8741 8742

    if (conn->driver->domainUndefineFlags) {
        int ret;
8743
        ret = conn->driver->domainUndefineFlags(domain, flags);
O
Osier Yang 已提交
8744 8745 8746 8747 8748
        if (ret < 0)
            goto error;
        return ret;
    }

8749
    virReportUnsupportedError();
O
Osier Yang 已提交
8750

8751
 error:
O
Osier Yang 已提交
8752 8753 8754 8755 8756
    virDispatchError(domain->conn);
    return -1;
}


8757 8758 8759 8760
/**
 * virConnectNumOfDefinedDomains:
 * @conn: pointer to the hypervisor connection
 *
8761
 * Provides the number of defined but inactive domains.
8762 8763 8764 8765 8766 8767
 *
 * Returns the number of domain found or -1 in case of error
 */
int
virConnectNumOfDefinedDomains(virConnectPtr conn)
{
8768
    VIR_DEBUG("conn=%p", conn);
8769

8770 8771
    virResetLastError();

8772
    virCheckConnectReturn(conn, -1);
8773

8774
    if (conn->driver->connectNumOfDefinedDomains) {
8775
        int ret;
8776
        ret = conn->driver->connectNumOfDefinedDomains(conn);
8777 8778 8779 8780
        if (ret < 0)
            goto error;
        return ret;
    }
8781

8782
    virReportUnsupportedError();
8783

8784
 error:
8785
    virDispatchError(conn);
8786
    return -1;
8787 8788
}

8789

8790 8791 8792 8793 8794 8795
/**
 * virConnectListDefinedDomains:
 * @conn: pointer to the hypervisor connection
 * @names: pointer to an array to store the names
 * @maxnames: size of the array
 *
8796 8797
 * list the defined but inactive domains, stores the pointers to the names
 * in @names
8798
 *
8799 8800 8801 8802 8803 8804 8805 8806
 * For active domains, see virConnectListDomains().  For more control over
 * the results, see virConnectListAllDomains().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a domain can be defined between
 * a call to virConnectNumOfDefinedDomains() and this call; you are only
 * guaranteed that all currently defined domains were listed if the return
 * is less than @maxids.  The client must call free() on each returned name.
8807 8808
 */
int
8809
virConnectListDefinedDomains(virConnectPtr conn, char **const names,
8810 8811
                             int maxnames)
{
8812
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
8813

8814 8815
    virResetLastError();

8816
    virCheckConnectReturn(conn, -1);
8817 8818
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
8819

8820
    if (conn->driver->connectListDefinedDomains) {
8821
        int ret;
8822
        ret = conn->driver->connectListDefinedDomains(conn, names, maxnames);
8823 8824 8825 8826
        if (ret < 0)
            goto error;
        return ret;
    }
8827

8828
    virReportUnsupportedError();
8829

8830
 error:
8831
    virDispatchError(conn);
8832
    return -1;
8833 8834
}

8835

8836 8837 8838 8839 8840 8841 8842 8843 8844 8845 8846 8847 8848 8849 8850 8851 8852 8853 8854 8855 8856 8857 8858 8859 8860 8861 8862 8863 8864 8865 8866 8867 8868 8869 8870 8871 8872 8873 8874 8875 8876 8877 8878 8879 8880 8881 8882 8883
/**
 * virConnectListAllDomains:
 * @conn: Pointer to the hypervisor connection.
 * @domains: Pointer to a variable to store the array containing domain objects
 *           or NULL if the list is not required (just returns number of guests).
 * @flags: bitwise-OR of virConnectListAllDomainsFlags
 *
 * Collect a possibly-filtered list of all domains, and return an allocated
 * array of information for each.  This API solves the race inherent in
 * virConnectListDomains() and virConnectListDefinedDomains().
 *
 * Normally, all domains are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted domains.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a domain, and where all bits
 * within a group describe all possible domains.  Some hypervisors might
 * reject explicit bits from a group where the hypervisor cannot make a
 * distinction (for example, not all hypervisors can tell whether domains
 * have snapshots).  For a group supported by a given hypervisor, the
 * behavior when no bits of a group are set is identical to the behavior
 * when all bits in that group are set.  When setting bits from more than
 * one group, it is possible to select an impossible combination (such
 * as an inactive transient domain), in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_CONNECT_LIST_DOMAINS_ACTIVE (online
 * domains) and VIR_CONNECT_LIST_DOMAINS_INACTIVE (offline domains).
 *
 * The next group of @flags is VIR_CONNECT_LIST_DOMAINS_PERSISTENT (defined
 * domains) and VIR_CONNECT_LIST_DOMAINS_TRANSIENT (running but not defined).
 *
 * The next group of @flags covers various domain states:
 * VIR_CONNECT_LIST_DOMAINS_RUNNING, VIR_CONNECT_LIST_DOMAINS_PAUSED,
 * VIR_CONNECT_LIST_DOMAINS_SHUTOFF, and a catch-all for all other states
 * (such as crashed, this catch-all covers the possibility of adding new
 * states).
 *
 * The remaining groups cover boolean attributes commonly asked about
 * domains; they include VIR_CONNECT_LIST_DOMAINS_MANAGEDSAVE and
 * VIR_CONNECT_LIST_DOMAINS_NO_MANAGEDSAVE, for filtering based on whether
 * a managed save image exists; VIR_CONNECT_LIST_DOMAINS_AUTOSTART and
 * VIR_CONNECT_LIST_DOMAINS_NO_AUTOSTART, for filtering based on autostart;
 * VIR_CONNECT_LIST_DOMAINS_HAS_SNAPSHOT and
 * VIR_CONNECT_LIST_DOMAINS_NO_SNAPSHOT, for filtering based on whether
 * a domain has snapshots.
 *
 * Example of usage:
 *
E
Eric Blake 已提交
8884 8885 8886 8887 8888 8889 8890 8891 8892 8893 8894 8895 8896 8897
 *   virDomainPtr *domains;
 *   size_t i;
 *   int ret;
 *   unsigned int flags = VIR_CONNECT_LIST_DOMAINS_RUNNING |
 *                        VIR_CONNECT_LIST_DOMAINS_PERSISTENT;
 *   ret = virConnectListAllDomains(conn, &domains, flags);
 *   if (ret < 0)
 *       error();
 *   for (i = 0; i < ret; i++) {
 *        do_something_with_domain(domains[i]);
 *        //here or in a separate loop if needed
 *        virDomainFree(domains[i]);
 *   }
 *   free(domains);
E
Eric Blake 已提交
8898 8899 8900 8901 8902 8903
 *
 * Returns the number of domains found or -1 and sets domains to NULL in case of
 * error.  On success, the array stored into @domains is guaranteed to have an
 * extra allocated element set to NULL but not included in the return count, to
 * make iteration easier. The caller is responsible for calling virDomainFree()
 * on each array element, then calling free() on @domains.
8904 8905 8906 8907 8908 8909 8910 8911 8912 8913 8914 8915 8916
 */
int
virConnectListAllDomains(virConnectPtr conn,
                         virDomainPtr **domains,
                         unsigned int flags)
{
    VIR_DEBUG("conn=%p, domains=%p, flags=%x", conn, domains, flags);

    virResetLastError();

    if (domains)
        *domains = NULL;

8917
    virCheckConnectReturn(conn, -1);
8918

8919
    if (conn->driver->connectListAllDomains) {
8920
        int ret;
8921
        ret = conn->driver->connectListAllDomains(conn, domains, flags);
8922 8923 8924 8925 8926
        if (ret < 0)
            goto error;
        return ret;
    }

8927
    virReportUnsupportedError();
8928

8929
 error:
8930 8931 8932 8933
    virDispatchError(conn);
    return -1;
}

8934

8935 8936 8937 8938
/**
 * virDomainCreate:
 * @domain: pointer to a defined domain
 *
8939
 * Launch a defined domain. If the call succeeds the domain moves from the
8940 8941 8942
 * defined to the running domains pools.  The domain will be paused only
 * if restoring from managed state created from a paused domain.  For more
 * control, see virDomainCreateWithFlags().
8943 8944 8945 8946
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
8947 8948
virDomainCreate(virDomainPtr domain)
{
8949
    virConnectPtr conn;
8950

8951
    VIR_DOMAIN_DEBUG(domain);
8952

8953 8954
    virResetLastError();

8955
    virCheckDomainReturn(domain, -1);
8956
    conn = domain->conn;
8957

8958
    virCheckReadOnlyGoto(conn->flags, error);
8959

8960 8961
    if (conn->driver->domainCreate) {
        int ret;
8962
        ret = conn->driver->domainCreate(domain);
8963 8964 8965 8966
        if (ret < 0)
            goto error;
        return ret;
    }
8967

8968
    virReportUnsupportedError();
8969

8970
 error:
8971
    virDispatchError(domain->conn);
8972
    return -1;
8973 8974
}

8975

8976 8977 8978
/**
 * virDomainCreateWithFlags:
 * @domain: pointer to a defined domain
8979
 * @flags: bitwise-OR of supported virDomainCreateFlags
8980 8981 8982 8983
 *
 * Launch a defined domain. If the call succeeds the domain moves from the
 * defined to the running domains pools.
 *
8984 8985 8986 8987 8988 8989
 * If the VIR_DOMAIN_START_PAUSED flag is set, or if the guest domain
 * has a managed save image that requested paused state (see
 * virDomainManagedSave()) the guest domain will be started, but its
 * CPUs will remain paused. The CPUs can later be manually started
 * using virDomainResume().  In all other cases, the guest domain will
 * be running.
8990 8991 8992 8993
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
E
Eric Blake 已提交
8994
 * client application crashes / loses its connection to the
8995
 * libvirtd daemon. Any domains marked for auto destroy will
8996
 * block attempts at migration, save-to-file, or snapshots.
8997
 *
8998 8999 9000 9001 9002 9003
 * If the VIR_DOMAIN_START_BYPASS_CACHE flag is set, and there is a
 * managed save file for this domain (created by virDomainManagedSave()),
 * then libvirt will attempt to bypass the file system cache while restoring
 * the file, or fail if it cannot do so for the given system; this can allow
 * less pressure on file system cache, but also risks slowing loads from NFS.
 *
9004 9005 9006
 * If the VIR_DOMAIN_START_FORCE_BOOT flag is set, then any managed save
 * file for this domain is discarded, and the domain boots from scratch.
 *
9007 9008 9009
 * Returns 0 in case of success, -1 in case of error
 */
int
9010 9011
virDomainCreateWithFlags(virDomainPtr domain, unsigned int flags)
{
9012
    virConnectPtr conn;
9013

9014
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
9015 9016 9017

    virResetLastError();

9018
    virCheckDomainReturn(domain, -1);
9019
    conn = domain->conn;
9020

9021
    virCheckReadOnlyGoto(conn->flags, error);
9022 9023 9024

    if (conn->driver->domainCreateWithFlags) {
        int ret;
9025
        ret = conn->driver->domainCreateWithFlags(domain, flags);
9026 9027 9028 9029 9030
        if (ret < 0)
            goto error;
        return ret;
    }

9031
    virReportUnsupportedError();
9032

9033
 error:
9034 9035 9036 9037
    virDispatchError(domain->conn);
    return -1;
}

9038

9039 9040 9041 9042 9043 9044 9045 9046 9047 9048 9049 9050 9051 9052 9053 9054 9055 9056 9057 9058 9059 9060 9061 9062 9063 9064 9065 9066 9067 9068 9069 9070 9071 9072 9073 9074 9075 9076 9077 9078 9079 9080 9081 9082 9083 9084 9085 9086 9087 9088 9089 9090 9091
/**
 * virDomainCreateWithFiles:
 * @domain: pointer to a defined domain
 * @nfiles: number of file descriptors passed
 * @files: list of file descriptors passed
 * @flags: bitwise-OR of supported virDomainCreateFlags
 *
 * Launch a defined domain. If the call succeeds the domain moves from the
 * defined to the running domains pools.
 *
 * @files provides an array of file descriptors which will be
 * made available to the 'init' process of the guest. The file
 * handles exposed to the guest will be renumbered to start
 * from 3 (ie immediately following stderr). This is only
 * supported for guests which use container based virtualization
 * technology.
 *
 * If the VIR_DOMAIN_START_PAUSED flag is set, or if the guest domain
 * has a managed save image that requested paused state (see
 * virDomainManagedSave()) the guest domain will be started, but its
 * CPUs will remain paused. The CPUs can later be manually started
 * using virDomainResume().  In all other cases, the guest domain will
 * be running.
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
 * client application crashes / loses its connection to the
 * libvirtd daemon. Any domains marked for auto destroy will
 * block attempts at migration, save-to-file, or snapshots.
 *
 * If the VIR_DOMAIN_START_BYPASS_CACHE flag is set, and there is a
 * managed save file for this domain (created by virDomainManagedSave()),
 * then libvirt will attempt to bypass the file system cache while restoring
 * the file, or fail if it cannot do so for the given system; this can allow
 * less pressure on file system cache, but also risks slowing loads from NFS.
 *
 * If the VIR_DOMAIN_START_FORCE_BOOT flag is set, then any managed save
 * file for this domain is discarded, and the domain boots from scratch.
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
virDomainCreateWithFiles(virDomainPtr domain, unsigned int nfiles,
                         int *files, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "nfiles=%u, files=%p, flags=%x",
                     nfiles, files, flags);

    virResetLastError();

9092
    virCheckDomainReturn(domain, -1);
9093
    conn = domain->conn;
9094

9095
    virCheckReadOnlyGoto(conn->flags, error);
9096 9097 9098 9099 9100 9101 9102 9103 9104 9105 9106

    if (conn->driver->domainCreateWithFiles) {
        int ret;
        ret = conn->driver->domainCreateWithFiles(domain,
                                                  nfiles, files,
                                                  flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9107
    virReportUnsupportedError();
9108

9109
 error:
9110 9111 9112 9113
    virDispatchError(domain->conn);
    return -1;
}

9114

9115 9116 9117
/**
 * virDomainGetAutostart:
 * @domain: a domain object
9118
 * @autostart: the value returned
9119
 *
9120
 * Provides a boolean value indicating whether the domain
9121 9122 9123 9124 9125 9126 9127
 * configured to be automatically started when the host
 * machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virDomainGetAutostart(virDomainPtr domain,
9128 9129 9130
                      int *autostart)
{
    virConnectPtr conn;
9131 9132

    VIR_DOMAIN_DEBUG(domain, "autostart=%p", autostart);
9133

9134 9135
    virResetLastError();

9136
    virCheckDomainReturn(domain, -1);
9137
    virCheckNonNullArgGoto(autostart, error);
9138

9139 9140
    conn = domain->conn;

9141 9142
    if (conn->driver->domainGetAutostart) {
        int ret;
9143
        ret = conn->driver->domainGetAutostart(domain, autostart);
9144 9145 9146 9147
        if (ret < 0)
            goto error;
        return ret;
    }
9148

9149
    virReportUnsupportedError();
9150

9151
 error:
9152
    virDispatchError(domain->conn);
9153
    return -1;
9154 9155
}

9156

9157 9158 9159
/**
 * virDomainSetAutostart:
 * @domain: a domain object
9160
 * @autostart: whether the domain should be automatically started 0 or 1
9161 9162 9163 9164 9165 9166 9167 9168
 *
 * Configure the domain to be automatically started
 * when the host machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virDomainSetAutostart(virDomainPtr domain,
9169 9170 9171
                      int autostart)
{
    virConnectPtr conn;
9172 9173

    VIR_DOMAIN_DEBUG(domain, "autostart=%d", autostart);
9174

9175 9176
    virResetLastError();

9177
    virCheckDomainReturn(domain, -1);
9178 9179
    conn = domain->conn;

9180
    virCheckReadOnlyGoto(conn->flags, error);
9181

9182 9183
    if (conn->driver->domainSetAutostart) {
        int ret;
9184
        ret = conn->driver->domainSetAutostart(domain, autostart);
9185 9186 9187 9188
        if (ret < 0)
            goto error;
        return ret;
    }
9189

9190
    virReportUnsupportedError();
9191

9192
 error:
9193
    virDispatchError(domain->conn);
9194
    return -1;
9195 9196
}

9197

9198 9199 9200
/**
 * virDomainInjectNMI:
 * @domain: pointer to domain object, or NULL for Domain0
9201
 * @flags: extra flags; not used yet, so callers should always pass 0
9202 9203 9204 9205 9206
 *
 * Send NMI to the guest
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
9207 9208
int
virDomainInjectNMI(virDomainPtr domain, unsigned int flags)
9209 9210
{
    virConnectPtr conn;
9211
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
9212 9213 9214

    virResetLastError();

9215
    virCheckDomainReturn(domain, -1);
9216 9217
    conn = domain->conn;

9218 9219
    virCheckReadOnlyGoto(conn->flags, error);

9220 9221 9222 9223 9224 9225 9226 9227
    if (conn->driver->domainInjectNMI) {
        int ret;
        ret = conn->driver->domainInjectNMI(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9228
    virReportUnsupportedError();
9229

9230
 error:
9231 9232 9233 9234
    virDispatchError(domain->conn);
    return -1;
}

9235

9236 9237 9238 9239 9240 9241 9242
/**
 * virDomainSendKey:
 * @domain:    pointer to domain object, or NULL for Domain0
 * @codeset:   the code set of keycodes, from virKeycodeSet
 * @holdtime:  the duration (in milliseconds) that the keys will be held
 * @keycodes:  array of keycodes
 * @nkeycodes: number of keycodes, up to VIR_DOMAIN_SEND_KEY_MAX_KEYS
9243
 * @flags: extra flags; not used yet, so callers should always pass 0
9244 9245 9246 9247 9248
 *
 * Send key(s) to the guest.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
9249 9250 9251 9252 9253 9254 9255
int
virDomainSendKey(virDomainPtr domain,
                 unsigned int codeset,
                 unsigned int holdtime,
                 unsigned int *keycodes,
                 int nkeycodes,
                 unsigned int flags)
9256 9257
{
    virConnectPtr conn;
9258
    VIR_DOMAIN_DEBUG(domain, "codeset=%u, holdtime=%u, nkeycodes=%u, flags=%x",
9259 9260 9261 9262
                     codeset, holdtime, nkeycodes, flags);

    virResetLastError();

9263
    virCheckDomainReturn(domain, -1);
9264 9265 9266
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
9267 9268 9269 9270 9271 9272 9273 9274 9275 9276
    virCheckNonNullArgGoto(keycodes, error);
    virCheckPositiveArgGoto(nkeycodes, error);

    if (nkeycodes > VIR_DOMAIN_SEND_KEY_MAX_KEYS) {
        virReportInvalidArg(nkeycodes,
                            _("nkeycodes in %s must be <= %d"),
                            __FUNCTION__, VIR_DOMAIN_SEND_KEY_MAX_KEYS);
        goto error;
    }

9277 9278 9279 9280 9281 9282 9283 9284 9285
    if (conn->driver->domainSendKey) {
        int ret;
        ret = conn->driver->domainSendKey(domain, codeset, holdtime,
                                          keycodes, nkeycodes, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9286
    virReportUnsupportedError();
9287

9288
 error:
9289 9290 9291 9292
    virDispatchError(domain->conn);
    return -1;
}

9293 9294 9295 9296 9297 9298 9299 9300 9301 9302 9303 9304 9305 9306 9307 9308 9309 9310 9311 9312 9313 9314 9315 9316 9317

/**
 * virDomainSendProcessSignal:
 * @domain: pointer to domain object
 * @pid_value: a positive integer process ID, or negative integer process group ID
 * @signum: a signal from the virDomainProcessSignal enum
 * @flags: one of the virDomainProcessSignalFlag values
 *
 * Send a signal to the designated process in the guest
 *
 * The signal numbers must be taken from the virDomainProcessSignal
 * enum. These will be translated to the corresponding signal
 * number for the guest OS, by the guest agent delivering the
 * signal. If there is no mapping from virDomainProcessSignal to
 * the native OS signals, this API will report an error.
 *
 * If @pid_value is an integer greater than zero, it is
 * treated as a process ID. If @pid_value is an integer
 * less than zero, it is treated as a process group ID.
 * All the @pid_value numbers are from the container/guest
 * namespace. The value zero is not valid.
 *
 * Not all hypervisors will support sending signals to
 * arbitrary processes or process groups. If this API is
 * implemented the minimum requirement is to be able to
9318
 * use @pid_value == 1 (i.e. kill init). No other value is
9319 9320 9321 9322 9323 9324 9325 9326
 * required to be supported.
 *
 * If the @signum is VIR_DOMAIN_PROCESS_SIGNAL_NOP then this
 * API will simply report whether the process is running in
 * the container/guest.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
9327 9328 9329 9330 9331
int
virDomainSendProcessSignal(virDomainPtr domain,
                           long long pid_value,
                           unsigned int signum,
                           unsigned int flags)
9332 9333 9334 9335 9336 9337 9338
{
    virConnectPtr conn;
    VIR_DOMAIN_DEBUG(domain, "pid=%lld, signum=%u flags=%x",
                     pid_value, signum, flags);

    virResetLastError();

9339 9340
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9341 9342

    virCheckNonZeroArgGoto(pid_value, error);
9343
    virCheckReadOnlyGoto(conn->flags, error);
9344 9345 9346 9347 9348 9349 9350 9351 9352 9353 9354 9355

    if (conn->driver->domainSendProcessSignal) {
        int ret;
        ret = conn->driver->domainSendProcessSignal(domain,
                                                    pid_value,
                                                    signum,
                                                    flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9356
    virReportUnsupportedError();
9357

9358
 error:
9359 9360 9361 9362 9363
    virDispatchError(domain->conn);
    return -1;
}


9364 9365 9366 9367 9368 9369 9370
/**
 * virDomainSetVcpus:
 * @domain: pointer to domain object, or NULL for Domain0
 * @nvcpus: the new number of virtual CPUs for this domain
 *
 * Dynamically change the number of virtual CPUs used by the domain.
 * Note that this call may fail if the underlying virtualization hypervisor
9371
 * does not support it or if growing the number is arbitrarily limited.
9372
 * This function may require privileged access to the hypervisor.
9373
 *
9374 9375 9376
 * Note that if this call is executed before the guest has finished booting,
 * the guest may fail to process the change.
 *
9377
 * This command only changes the runtime configuration of the domain,
E
Eric Blake 已提交
9378 9379 9380
 * so can only be called on an active domain.  It is hypervisor-dependent
 * whether it also affects persistent configuration; for more control,
 * use virDomainSetVcpusFlags().
9381
 *
9382 9383 9384 9385 9386
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetVcpus(virDomainPtr domain, unsigned int nvcpus)
{
9387
    virConnectPtr conn;
9388 9389

    VIR_DOMAIN_DEBUG(domain, "nvcpus=%u", nvcpus);
9390

9391 9392
    virResetLastError();

9393 9394
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9395

9396
    virCheckReadOnlyGoto(conn->flags, error);
9397 9398
    virCheckNonZeroArgGoto(nvcpus, error);

9399 9400
    if (conn->driver->domainSetVcpus) {
        int ret;
9401
        ret = conn->driver->domainSetVcpus(domain, nvcpus);
9402 9403 9404 9405
        if (ret < 0)
            goto error;
        return ret;
    }
9406

9407
    virReportUnsupportedError();
9408

9409
 error:
9410
    virDispatchError(domain->conn);
9411
    return -1;
9412 9413
}

9414

E
Eric Blake 已提交
9415 9416 9417 9418
/**
 * virDomainSetVcpusFlags:
 * @domain: pointer to domain object, or NULL for Domain0
 * @nvcpus: the new number of virtual CPUs for this domain, must be at least 1
9419
 * @flags: bitwise-OR of virDomainVcpuFlags
E
Eric Blake 已提交
9420 9421 9422
 *
 * Dynamically change the number of virtual CPUs used by the domain.
 * Note that this call may fail if the underlying virtualization hypervisor
9423
 * does not support it or if growing the number is arbitrarily limited.
9424
 * This function may require privileged access to the hypervisor.
E
Eric Blake 已提交
9425
 *
9426
 * @flags may include VIR_DOMAIN_AFFECT_LIVE to affect a running
E
Eric Blake 已提交
9427
 * domain (which may fail if domain is not active), or
9428
 * VIR_DOMAIN_AFFECT_CONFIG to affect the next boot via the XML
E
Eric Blake 已提交
9429
 * description of the domain.  Both flags may be set.
9430 9431 9432 9433
 * If neither flag is specified (that is, @flags is VIR_DOMAIN_AFFECT_CURRENT),
 * then an inactive domain modifies persistent setup, while an active domain
 * is hypervisor-dependent on whether just live or both live and persistent
 * state is changed.
E
Eric Blake 已提交
9434
 *
9435 9436 9437
 * Note that if this call is executed before the guest has finished booting,
 * the guest may fail to process the change.
 *
E
Eric Blake 已提交
9438
 * If @flags includes VIR_DOMAIN_VCPU_MAXIMUM, then
9439
 * VIR_DOMAIN_AFFECT_LIVE must be clear, and only the maximum virtual
E
Eric Blake 已提交
9440 9441 9442 9443
 * CPU limit is altered; generally, this value must be less than or
 * equal to virConnectGetMaxVcpus().  Otherwise, this call affects the
 * current virtual CPU limit, which must be less than or equal to the
 * maximum limit.
9444
 *
9445 9446 9447 9448
 * If @flags includes VIR_DOMAIN_VCPU_GUEST, then the state of processors is
 * modified inside the guest instead of the hypervisor. This flag can only
 * be used with live guests and is incompatible with VIR_DOMAIN_VCPU_MAXIMUM.
 * The usage of this flag may require a guest agent configured.
9449
 *
9450
 * Not all hypervisors can support all flag combinations.
E
Eric Blake 已提交
9451 9452 9453 9454 9455 9456 9457 9458
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetVcpusFlags(virDomainPtr domain, unsigned int nvcpus,
                       unsigned int flags)
{
    virConnectPtr conn;
9459

9460
    VIR_DOMAIN_DEBUG(domain, "nvcpus=%u, flags=%x", nvcpus, flags);
E
Eric Blake 已提交
9461 9462 9463

    virResetLastError();

9464
    virCheckDomainReturn(domain, -1);
9465
    virCheckReadOnlyGoto(domain->conn->flags, error);
E
Eric Blake 已提交
9466

9467
    if (flags & VIR_DOMAIN_VCPU_GUEST &&
9468 9469 9470
        flags & VIR_DOMAIN_VCPU_MAXIMUM) {
        virReportInvalidArg(flags,
                            _("flags 'VIR_DOMAIN_VCPU_MAXIMUM' and "
9471
                              "'VIR_DOMAIN_VCPU_GUEST' in '%s' are mutually "
9472 9473 9474 9475
                              "exclusive"), __FUNCTION__);
        goto error;
    }

9476 9477
    virCheckNonZeroArgGoto(nvcpus, error);

E
Eric Blake 已提交
9478
    if ((unsigned short) nvcpus != nvcpus) {
9479
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u"), nvcpus);
E
Eric Blake 已提交
9480 9481
        goto error;
    }
E
Eric Blake 已提交
9482 9483 9484 9485
    conn = domain->conn;

    if (conn->driver->domainSetVcpusFlags) {
        int ret;
9486
        ret = conn->driver->domainSetVcpusFlags(domain, nvcpus, flags);
E
Eric Blake 已提交
9487 9488 9489 9490 9491
        if (ret < 0)
            goto error;
        return ret;
    }

9492
    virReportUnsupportedError();
E
Eric Blake 已提交
9493

9494
 error:
E
Eric Blake 已提交
9495 9496 9497 9498
    virDispatchError(domain->conn);
    return -1;
}

9499

E
Eric Blake 已提交
9500 9501 9502
/**
 * virDomainGetVcpusFlags:
 * @domain: pointer to domain object, or NULL for Domain0
9503
 * @flags: bitwise-OR of virDomainVcpuFlags
E
Eric Blake 已提交
9504 9505 9506
 *
 * Query the number of virtual CPUs used by the domain.  Note that
 * this call may fail if the underlying virtualization hypervisor does
9507
 * not support it.  This function may require privileged access to the
E
Eric Blake 已提交
9508 9509
 * hypervisor.
 *
9510 9511 9512 9513 9514 9515 9516
 * If @flags includes VIR_DOMAIN_AFFECT_LIVE, this will query a
 * running domain (which will fail if domain is not active); if
 * it includes VIR_DOMAIN_AFFECT_CONFIG, this will query the XML
 * description of the domain.  It is an error to set both flags.
 * If neither flag is set (that is, VIR_DOMAIN_AFFECT_CURRENT),
 * then the configuration queried depends on whether the domain
 * is currently running.
E
Eric Blake 已提交
9517 9518 9519
 *
 * If @flags includes VIR_DOMAIN_VCPU_MAXIMUM, then the maximum
 * virtual CPU limit is queried.  Otherwise, this call queries the
9520 9521
 * current virtual CPU count.
 *
9522
 * If @flags includes VIR_DOMAIN_VCPU_GUEST, then the state of the processors
9523
 * is queried in the guest instead of the hypervisor. This flag is only usable
9524
 * on live domains. Guest agent may be needed for this flag to be available.
E
Eric Blake 已提交
9525
 *
9526
 * Returns the number of vCPUs in case of success, -1 in case of failure.
E
Eric Blake 已提交
9527 9528 9529 9530 9531
 */
int
virDomainGetVcpusFlags(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;
9532

9533
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
E
Eric Blake 已提交
9534 9535 9536

    virResetLastError();

9537
    virCheckDomainReturn(domain, -1);
9538 9539 9540 9541
    conn = domain->conn;

    if (flags & VIR_DOMAIN_VCPU_GUEST)
        virCheckReadOnlyGoto(conn->flags, error);
E
Eric Blake 已提交
9542

9543
    /* At most one of these two flags should be set.  */
9544 9545
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
9546
        virReportInvalidArg(flags,
9547 9548
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
9549
                            __FUNCTION__);
E
Eric Blake 已提交
9550 9551 9552 9553 9554
        goto error;
    }

    if (conn->driver->domainGetVcpusFlags) {
        int ret;
9555
        ret = conn->driver->domainGetVcpusFlags(domain, flags);
E
Eric Blake 已提交
9556 9557 9558 9559 9560
        if (ret < 0)
            goto error;
        return ret;
    }

9561
    virReportUnsupportedError();
E
Eric Blake 已提交
9562

9563
 error:
E
Eric Blake 已提交
9564 9565 9566 9567
    virDispatchError(domain->conn);
    return -1;
}

9568

9569 9570 9571 9572 9573
/**
 * virDomainPinVcpu:
 * @domain: pointer to domain object, or NULL for Domain0
 * @vcpu: virtual CPU number
 * @cpumap: pointer to a bit map of real CPUs (in 8-bit bytes) (IN)
E
Eric Blake 已提交
9574 9575 9576
 *      Each bit set to 1 means that corresponding CPU is usable.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
9577
 * @maplen: number of bytes in cpumap, from 1 up to size of CPU map in
O
Osier Yang 已提交
9578 9579 9580
 *      underlying virtualization system (Xen...).
 *      If maplen < size, missing bytes are set to zero.
 *      If maplen > size, failure code is returned.
9581
 *
9582
 * Dynamically change the real CPUs which can be allocated to a virtual CPU.
9583
 * This function may require privileged access to the hypervisor.
9584
 *
9585 9586 9587
 * This command only changes the runtime configuration of the domain,
 * so can only be called on an active domain.
 *
9588 9589 9590 9591 9592 9593
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainPinVcpu(virDomainPtr domain, unsigned int vcpu,
                 unsigned char *cpumap, int maplen)
{
9594
    virConnectPtr conn;
9595 9596 9597

    VIR_DOMAIN_DEBUG(domain, "vcpu=%u, cpumap=%p, maplen=%d",
                     vcpu, cpumap, maplen);
9598

9599 9600
    virResetLastError();

9601 9602
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9603

9604
    virCheckReadOnlyGoto(conn->flags, error);
9605 9606 9607 9608
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);

    if ((unsigned short) vcpu != vcpu) {
9609
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u"), vcpu);
9610
        goto error;
9611
    }
9612

9613 9614
    if (conn->driver->domainPinVcpu) {
        int ret;
9615
        ret = conn->driver->domainPinVcpu(domain, vcpu, cpumap, maplen);
9616 9617 9618 9619
        if (ret < 0)
            goto error;
        return ret;
    }
9620

9621
    virReportUnsupportedError();
9622

9623
 error:
9624
    virDispatchError(domain->conn);
9625
    return -1;
9626 9627
}

9628

9629 9630 9631 9632 9633 9634 9635 9636 9637 9638 9639 9640
/**
 * virDomainPinVcpuFlags:
 * @domain: pointer to domain object, or NULL for Domain0
 * @vcpu: virtual CPU number
 * @cpumap: pointer to a bit map of real CPUs (in 8-bit bytes) (IN)
 *      Each bit set to 1 means that corresponding CPU is usable.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
 * @maplen: number of bytes in cpumap, from 1 up to size of CPU map in
 *      underlying virtualization system (Xen...).
 *      If maplen < size, missing bytes are set to zero.
 *      If maplen > size, failure code is returned.
9641
 * @flags: bitwise-OR of virDomainModificationImpact
9642 9643
 *
 * Dynamically change the real CPUs which can be allocated to a virtual CPU.
9644
 * This function may require privileged access to the hypervisor.
9645 9646 9647 9648 9649 9650 9651 9652 9653 9654 9655 9656
 *
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set.
 * If VIR_DOMAIN_AFFECT_LIVE is set, the change affects a running domain
 * and may fail if domain is not alive.
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
 * and will fail for transient domains. If neither flag is specified (that is,
 * @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain modifies
 * persistent setup, while an active domain is hypervisor-dependent on whether
 * just live or both live and persistent state is changed.
 * Not all hypervisors can support all flag combinations.
 *
E
Eric Blake 已提交
9657
 * See also virDomainGetVcpuPinInfo for querying this information.
9658
 *
9659 9660 9661 9662 9663 9664 9665 9666 9667
 * Returns 0 in case of success, -1 in case of failure.
 *
 */
int
virDomainPinVcpuFlags(virDomainPtr domain, unsigned int vcpu,
                      unsigned char *cpumap, int maplen, unsigned int flags)
{
    virConnectPtr conn;

9668
    VIR_DOMAIN_DEBUG(domain, "vcpu=%u, cpumap=%p, maplen=%d, flags=%x",
9669 9670
                     vcpu, cpumap, maplen, flags);

9671 9672 9673 9674
    virResetLastError();

    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9675

9676
    virCheckReadOnlyGoto(conn->flags, error);
9677 9678 9679 9680
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);

    if ((unsigned short) vcpu != vcpu) {
9681
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u"), vcpu);
9682 9683 9684 9685 9686
        goto error;
    }

    if (conn->driver->domainPinVcpuFlags) {
        int ret;
9687
        ret = conn->driver->domainPinVcpuFlags(domain, vcpu, cpumap, maplen, flags);
9688 9689 9690 9691 9692
        if (ret < 0)
            goto error;
        return ret;
    }

9693
    virReportUnsupportedError();
9694

9695
 error:
9696 9697 9698 9699
    virDispatchError(domain->conn);
    return -1;
}

9700

9701
/**
E
Eric Blake 已提交
9702
 * virDomainGetVcpuPinInfo:
9703 9704 9705 9706 9707 9708 9709 9710 9711 9712 9713 9714
 * @domain: pointer to domain object, or NULL for Domain0
 * @ncpumaps: the number of cpumap (listed first to match virDomainGetVcpus)
 * @cpumaps: pointer to a bit map of real CPUs for all vcpus of this
 *     domain (in 8-bit bytes) (OUT)
 *     It's assumed there is <ncpumaps> cpumap in cpumaps array.
 *     The memory allocated to cpumaps must be (ncpumaps * maplen) bytes
 *     (ie: calloc(ncpumaps, maplen)).
 *     One cpumap inside cpumaps has the format described in
 *     virDomainPinVcpu() API.
 *     Must not be NULL.
 * @maplen: the number of bytes in one cpumap, from 1 up to size of CPU map.
 *     Must be positive.
9715
 * @flags: bitwise-OR of virDomainModificationImpact
9716 9717 9718 9719 9720 9721 9722 9723 9724 9725
 *     Must not be VIR_DOMAIN_AFFECT_LIVE and
 *     VIR_DOMAIN_AFFECT_CONFIG concurrently.
 *
 * Query the CPU affinity setting of all virtual CPUs of domain, store it
 * in cpumaps.
 *
 * Returns the number of virtual CPUs in case of success,
 * -1 in case of failure.
 */
int
9726 9727
virDomainGetVcpuPinInfo(virDomainPtr domain, int ncpumaps,
                        unsigned char *cpumaps, int maplen, unsigned int flags)
9728 9729 9730
{
    virConnectPtr conn;

9731
    VIR_DOMAIN_DEBUG(domain, "ncpumaps=%d, cpumaps=%p, maplen=%d, flags=%x",
9732 9733 9734 9735
                     ncpumaps, cpumaps, maplen, flags);

    virResetLastError();

9736 9737
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9738

9739 9740 9741 9742
    virCheckNonNullArgGoto(cpumaps, error);
    virCheckPositiveArgGoto(ncpumaps, error);
    virCheckPositiveArgGoto(maplen, error);

E
Eric Blake 已提交
9743
    if (INT_MULTIPLY_OVERFLOW(ncpumaps, maplen)) {
9744 9745
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %d * %d"),
                       ncpumaps, maplen);
E
Eric Blake 已提交
9746 9747
        goto error;
    }
9748

9749 9750 9751
    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
9752
        virReportInvalidArg(flags,
9753 9754
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
9755
                            __FUNCTION__);
9756 9757
        goto error;
    }
9758

E
Eric Blake 已提交
9759
    if (conn->driver->domainGetVcpuPinInfo) {
9760
        int ret;
9761 9762
        ret = conn->driver->domainGetVcpuPinInfo(domain, ncpumaps,
                                                 cpumaps, maplen, flags);
9763 9764 9765 9766 9767
        if (ret < 0)
            goto error;
        return ret;
    }

9768
    virReportUnsupportedError();
9769

9770
 error:
9771 9772 9773 9774
    virDispatchError(domain->conn);
    return -1;
}

9775

9776 9777 9778 9779 9780 9781 9782 9783 9784 9785 9786 9787 9788 9789 9790 9791 9792 9793 9794 9795 9796 9797 9798 9799 9800 9801 9802 9803 9804 9805 9806 9807 9808 9809 9810 9811 9812 9813 9814 9815 9816 9817 9818
/**
 * virDomainPinEmulator:
 * @domain: pointer to domain object, or NULL for Domain0
 * @cpumap: pointer to a bit map of real CPUs (in 8-bit bytes) (IN)
 *      Each bit set to 1 means that corresponding CPU is usable.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
 * @maplen: number of bytes in cpumap, from 1 up to size of CPU map in
 *      underlying virtualization system (Xen...).
 *      If maplen < size, missing bytes are set to zero.
 *      If maplen > size, failure code is returned.
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Dynamically change the real CPUs which can be allocated to all emulator
 * threads. This function may require privileged access to the hypervisor.
 *
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set.
 * If VIR_DOMAIN_AFFECT_LIVE is set, the change affects a running domain
 * and may fail if domain is not alive.
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
 * and will fail for transient domains. If neither flag is specified (that is,
 * @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain modifies
 * persistent setup, while an active domain is hypervisor-dependent on whether
 * just live or both live and persistent state is changed.
 * Not all hypervisors can support all flag combinations.
 *
 * See also virDomainGetEmulatorPinInfo for querying this information.
 *
 * Returns 0 in case of success, -1 in case of failure.
 *
 */
int
virDomainPinEmulator(virDomainPtr domain, unsigned char *cpumap,
                     int maplen, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cpumap=%p, maplen=%d, flags=%x",
                     cpumap, maplen, flags);

    virResetLastError();

9819 9820
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9821

9822
    virCheckReadOnlyGoto(conn->flags, error);
9823

9824 9825
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);
9826 9827 9828

    if (conn->driver->domainPinEmulator) {
        int ret;
9829
        ret = conn->driver->domainPinEmulator(domain, cpumap, maplen, flags);
9830 9831 9832 9833 9834
        if (ret < 0)
            goto error;
        return ret;
    }

9835
    virReportUnsupportedError();
9836

9837
 error:
9838 9839 9840 9841
    virDispatchError(domain->conn);
    return -1;
}

9842

9843 9844 9845 9846 9847 9848 9849 9850 9851 9852 9853 9854 9855 9856 9857 9858 9859 9860 9861 9862 9863 9864 9865 9866 9867 9868 9869 9870 9871 9872 9873
/**
 * virDomainGetEmulatorPinInfo:
 * @domain: pointer to domain object, or NULL for Domain0
 * @cpumap: pointer to a bit map of real CPUs for all emulator threads of
 *     this domain (in 8-bit bytes) (OUT)
 *     There is only one cpumap for all emulator threads.
 *     Must not be NULL.
 * @maplen: the number of bytes in one cpumap, from 1 up to size of CPU map.
 *     Must be positive.
 * @flags: bitwise-OR of virDomainModificationImpact
 *     Must not be VIR_DOMAIN_AFFECT_LIVE and
 *     VIR_DOMAIN_AFFECT_CONFIG concurrently.
 *
 * Query the CPU affinity setting of all emulator threads of domain, store
 * it in cpumap.
 *
 * Returns 1 in case of success,
 * 0 in case of no emulator threads are pined to pcpus,
 * -1 in case of failure.
 */
int
virDomainGetEmulatorPinInfo(virDomainPtr domain, unsigned char *cpumap,
                            int maplen, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cpumap=%p, maplen=%d, flags=%x",
                     cpumap, maplen, flags);

    virResetLastError();

9874
    virCheckDomainReturn(domain, -1);
9875

9876 9877
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);
9878 9879 9880 9881

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
9882 9883 9884 9885
        virReportInvalidArg(flags,
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
                            __FUNCTION__);
9886 9887 9888 9889 9890 9891 9892 9893 9894 9895 9896 9897 9898
        goto error;
    }
    conn = domain->conn;

    if (conn->driver->domainGetEmulatorPinInfo) {
        int ret;
        ret = conn->driver->domainGetEmulatorPinInfo(domain, cpumap,
                                                     maplen, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9899
    virReportUnsupportedError();
9900

9901
 error:
9902 9903 9904 9905
    virDispatchError(domain->conn);
    return -1;
}

9906

9907 9908 9909 9910 9911
/**
 * virDomainGetVcpus:
 * @domain: pointer to domain object, or NULL for Domain0
 * @info: pointer to an array of virVcpuInfo structures (OUT)
 * @maxinfo: number of structures in info array
D
Dan Kenigsberg 已提交
9912
 * @cpumaps: pointer to a bit map of real CPUs for all vcpus of this
9913
 *      domain (in 8-bit bytes) (OUT)
O
Osier Yang 已提交
9914 9915 9916 9917 9918
 *      If cpumaps is NULL, then no cpumap information is returned by the API.
 *      It's assumed there is <maxinfo> cpumap in cpumaps array.
 *      The memory allocated to cpumaps must be (maxinfo * maplen) bytes
 *      (ie: calloc(maxinfo, maplen)).
 *      One cpumap inside cpumaps has the format described in
9919 9920
 *      virDomainPinVcpu() API.
 * @maplen: number of bytes in one cpumap, from 1 up to size of CPU map in
O
Osier Yang 已提交
9921 9922
 *      underlying virtualization system (Xen...).
 *      Must be zero when cpumaps is NULL and positive when it is non-NULL.
9923
 *
9924
 * Extract information about virtual CPUs of domain, store it in info array
9925 9926 9927
 * and also in cpumaps if this pointer isn't NULL.  This call may fail
 * on an inactive domain.
 *
E
Eric Blake 已提交
9928
 * See also virDomainGetVcpuPinInfo for querying just cpumaps, including on
9929
 * an inactive domain.
9930 9931 9932 9933 9934
 *
 * Returns the number of info filled in case of success, -1 in case of failure.
 */
int
virDomainGetVcpus(virDomainPtr domain, virVcpuInfoPtr info, int maxinfo,
9935
                  unsigned char *cpumaps, int maplen)
9936
{
9937
    virConnectPtr conn;
9938 9939 9940

    VIR_DOMAIN_DEBUG(domain, "info=%p, maxinfo=%d, cpumaps=%p, maplen=%d",
                     info, maxinfo, cpumaps, maplen);
9941

9942 9943
    virResetLastError();

9944
    virCheckDomainReturn(domain, -1);
9945 9946
    virCheckNonNullArgGoto(info, error);
    virCheckPositiveArgGoto(maxinfo, error);
9947 9948 9949

    /* Ensure that domainGetVcpus (aka remoteDomainGetVcpus) does not
       try to memcpy anything into a NULL pointer.  */
9950 9951 9952 9953 9954
    if (cpumaps)
        virCheckPositiveArgGoto(maplen, error);
    else
        virCheckZeroArgGoto(maplen, error);

E
Eric Blake 已提交
9955
    if (cpumaps && INT_MULTIPLY_OVERFLOW(maxinfo, maplen)) {
9956 9957
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %d * %d"),
                       maxinfo, maplen);
E
Eric Blake 已提交
9958 9959
        goto error;
    }
9960

9961 9962
    conn = domain->conn;

9963 9964
    if (conn->driver->domainGetVcpus) {
        int ret;
9965 9966
        ret = conn->driver->domainGetVcpus(domain, info, maxinfo,
                                           cpumaps, maplen);
9967 9968 9969 9970
        if (ret < 0)
            goto error;
        return ret;
    }
9971

9972
    virReportUnsupportedError();
9973

9974
 error:
9975
    virDispatchError(domain->conn);
9976
    return -1;
9977
}
9978

9979

9980 9981 9982
/**
 * virDomainGetMaxVcpus:
 * @domain: pointer to domain object
9983
 *
9984 9985
 * Provides the maximum number of virtual CPUs supported for
 * the guest VM. If the guest is inactive, this is basically
E
Eric Blake 已提交
9986
 * the same as virConnectGetMaxVcpus(). If the guest is running
9987
 * this will reflect the maximum number of virtual CPUs the
E
Eric Blake 已提交
9988
 * guest was booted with.  For more details, see virDomainGetVcpusFlags().
9989 9990 9991 9992
 *
 * Returns the maximum of virtual CPU or -1 in case of error.
 */
int
9993 9994
virDomainGetMaxVcpus(virDomainPtr domain)
{
9995
    virConnectPtr conn;
9996

9997
    VIR_DOMAIN_DEBUG(domain);
9998

9999 10000
    virResetLastError();

10001
    virCheckDomainReturn(domain, -1);
10002 10003
    conn = domain->conn;

10004 10005
    if (conn->driver->domainGetMaxVcpus) {
        int ret;
10006
        ret = conn->driver->domainGetMaxVcpus(domain);
10007 10008 10009 10010
        if (ret < 0)
            goto error;
        return ret;
    }
10011

10012
    virReportUnsupportedError();
10013

10014
 error:
10015
    virDispatchError(domain->conn);
10016
    return -1;
10017 10018
}

10019

10020 10021 10022 10023 10024
/**
 * virDomainGetSecurityLabel:
 * @domain: a domain object
 * @seclabel: pointer to a virSecurityLabel structure
 *
10025 10026 10027
 * Extract security label of an active domain. The 'label' field
 * in the @seclabel argument will be initialized to the empty
 * string if the domain is not running under a security model.
10028
 *
10029
 * Returns 0 in case of success, -1 in case of failure
10030 10031 10032 10033 10034 10035
 */
int
virDomainGetSecurityLabel(virDomainPtr domain, virSecurityLabelPtr seclabel)
{
    virConnectPtr conn;

10036 10037
    VIR_DOMAIN_DEBUG(domain, "seclabel=%p", seclabel);

10038 10039
    virResetLastError();

10040 10041
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10042

10043
    virCheckNonNullArgGoto(seclabel, error);
10044

10045 10046 10047 10048 10049 10050 10051 10052
    if (conn->driver->domainGetSecurityLabel) {
        int ret;
        ret = conn->driver->domainGetSecurityLabel(domain, seclabel);
        if (ret < 0)
            goto error;
        return ret;
    }

10053
    virReportUnsupportedError();
10054

10055
 error:
10056
    virDispatchError(domain->conn);
10057
    return -1;
10058 10059
}

10060

M
Marcelo Cerri 已提交
10061 10062 10063 10064 10065 10066 10067 10068 10069 10070 10071 10072 10073 10074 10075 10076 10077 10078 10079 10080
/**
 * virDomainGetSecurityLabelList:
 * @domain: a domain object
 * @seclabels: will be auto-allocated and filled with domains' security labels.
 * Caller must free memory on return.
 *
 * Extract the security labels of an active domain. The 'label' field
 * in the @seclabels argument will be initialized to the empty
 * string if the domain is not running under a security model.
 *
 * Returns number of elemnets in @seclabels on success, -1 in case of failure.
 */
int
virDomainGetSecurityLabelList(virDomainPtr domain,
                              virSecurityLabelPtr* seclabels)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "seclabels=%p", seclabels);

10081 10082
    virResetLastError();

10083
    virCheckDomainReturn(domain, -1);
M
Marcelo Cerri 已提交
10084

10085
    virCheckNonNullArgGoto(seclabels, error);
M
Marcelo Cerri 已提交
10086 10087 10088 10089 10090 10091 10092 10093 10094 10095 10096

    conn = domain->conn;

    if (conn->driver->domainGetSecurityLabelList) {
        int ret;
        ret = conn->driver->domainGetSecurityLabelList(domain, seclabels);
        if (ret < 0)
            goto error;
        return ret;
    }

10097
    virReportUnsupportedError();
M
Marcelo Cerri 已提交
10098

10099
 error:
M
Marcelo Cerri 已提交
10100 10101 10102
    virDispatchError(domain->conn);
    return -1;
}
10103 10104 10105 10106 10107 10108 10109 10110 10111 10112 10113 10114 10115 10116 10117 10118 10119 10120 10121 10122 10123 10124 10125 10126 10127 10128 10129 10130 10131 10132 10133 10134 10135 10136 10137 10138 10139 10140 10141 10142 10143 10144 10145 10146 10147
/**
 * virDomainSetMetadata:
 * @domain: a domain object
 * @type: type of description, from virDomainMetadataType
 * @metadata: new metadata text
 * @key: XML namespace key, or NULL
 * @uri: XML namespace URI, or NULL
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Sets the appropriate domain element given by @type to the
 * value of @description.  A @type of VIR_DOMAIN_METADATA_DESCRIPTION
 * is free-form text; VIR_DOMAIN_METADATA_TITLE is free-form, but no
 * newlines are permitted, and should be short (although the length is
 * not enforced). For these two options @key and @uri are irrelevant and
 * must be set to NULL.
 *
 * For type VIR_DOMAIN_METADATA_ELEMENT @metadata  must be well-formed
 * XML belonging to namespace defined by @uri with local name @key.
 *
 * Passing NULL for @metadata says to remove that element from the
 * domain XML (passing the empty string leaves the element present).
 *
 * The resulting metadata will be present in virDomainGetXMLDesc(),
 * as well as quick access through virDomainGetMetadata().
 *
 * @flags controls whether the live domain, persistent configuration,
 * or both will be modified.
 *
 * Returns 0 on success, -1 in case of failure.
 */
int
virDomainSetMetadata(virDomainPtr domain,
                     int type,
                     const char *metadata,
                     const char *key,
                     const char *uri,
                     unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain,
                     "type=%d, metadata='%s', key='%s', uri='%s', flags=%x",
                     type, NULLSTR(metadata), NULLSTR(key), NULLSTR(uri),
                     flags);

10148 10149
    virResetLastError();

10150
    virCheckDomainReturn(domain, -1);
10151 10152
    conn = domain->conn;

10153
    virCheckReadOnlyGoto(conn->flags, error);
10154 10155 10156 10157

    switch (type) {
    case VIR_DOMAIN_METADATA_TITLE:
        if (metadata && strchr(metadata, '\n')) {
10158
            virReportInvalidArg(metadata,
10159 10160
                                _("metadata title in %s can't contain "
                                  "newlines"),
10161 10162
                                __FUNCTION__);
            goto error;
10163 10164 10165
        }
        /* fallthrough */
    case VIR_DOMAIN_METADATA_DESCRIPTION:
10166 10167
        virCheckNullArgGoto(uri, error);
        virCheckNullArgGoto(key, error);
10168 10169
        break;
    case VIR_DOMAIN_METADATA_ELEMENT:
10170
        virCheckNonNullArgGoto(uri, error);
10171 10172
        if (metadata)
            virCheckNonNullArgGoto(key, error);
10173 10174 10175 10176 10177 10178 10179 10180 10181 10182 10183 10184 10185 10186 10187
        break;
    default:
        /* For future expansion */
        break;
    }

    if (conn->driver->domainSetMetadata) {
        int ret;
        ret = conn->driver->domainSetMetadata(domain, type, metadata, key, uri,
                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

10188
    virReportUnsupportedError();
10189

10190
 error:
10191 10192 10193 10194
    virDispatchError(domain->conn);
    return -1;
}

10195

10196 10197 10198 10199 10200 10201 10202 10203 10204 10205 10206 10207 10208 10209 10210 10211 10212 10213 10214 10215 10216 10217 10218 10219 10220 10221 10222 10223 10224 10225 10226 10227 10228 10229
/**
 * virDomainGetMetadata:
 * @domain: a domain object
 * @type: type of description, from virDomainMetadataType
 * @uri: XML namespace identifier
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Retrieves the appropriate domain element given by @type.
 * If VIR_DOMAIN_METADATA_ELEMENT is requested parameter @uri
 * must be set to the name of the namespace the requested elements
 * belong to, otherwise must be NULL.
 *
 * If an element of the domain XML is not present, the resulting
 * error will be VIR_ERR_NO_DOMAIN_METADATA.  This method forms
 * a shortcut for seeing information from virDomainSetMetadata()
 * without having to go through virDomainGetXMLDesc().
 *
 * @flags controls whether the live domain or persistent
 * configuration will be queried.
 *
 * Returns the metadata string on success (caller must free),
 * or NULL in case of failure.
 */
char *
virDomainGetMetadata(virDomainPtr domain,
                     int type,
                     const char *uri,
                     unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "type=%d, uri='%s', flags=%x",
                     type, NULLSTR(uri), flags);

10230 10231
    virResetLastError();

10232
    virCheckDomainReturn(domain, NULL);
10233 10234 10235

    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
10236
        virReportInvalidArg(flags,
10237 10238
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
10239
                            __FUNCTION__);
10240 10241 10242 10243 10244 10245
        goto error;
    }

    switch (type) {
    case VIR_DOMAIN_METADATA_TITLE:
    case VIR_DOMAIN_METADATA_DESCRIPTION:
10246
        virCheckNullArgGoto(uri, error);
10247 10248
        break;
    case VIR_DOMAIN_METADATA_ELEMENT:
10249
        virCheckNonNullArgGoto(uri, error);
10250 10251 10252 10253 10254 10255 10256 10257 10258 10259 10260 10261 10262 10263 10264
        break;
    default:
        /* For future expansion */
        break;
    }

    conn = domain->conn;

    if (conn->driver->domainGetMetadata) {
        char *ret;
        if (!(ret = conn->driver->domainGetMetadata(domain, type, uri, flags)))
            goto error;
        return ret;
    }

10265
    virReportUnsupportedError();
10266

10267
 error:
10268 10269 10270 10271
    virDispatchError(domain->conn);
    return NULL;
}

10272

10273 10274 10275 10276 10277
/**
 * virNodeGetSecurityModel:
 * @conn: a connection object
 * @secmodel: pointer to a virSecurityModel structure
 *
10278 10279 10280
 * Extract the security model of a hypervisor. The 'model' field
 * in the @secmodel argument may be initialized to the empty
 * string if the driver has not activated a security model.
10281
 *
10282
 * Returns 0 in case of success, -1 in case of failure
10283 10284 10285 10286
 */
int
virNodeGetSecurityModel(virConnectPtr conn, virSecurityModelPtr secmodel)
{
10287
    VIR_DEBUG("conn=%p secmodel=%p", conn, secmodel);
10288

10289 10290
    virResetLastError();

10291
    virCheckConnectReturn(conn, -1);
10292
    virCheckNonNullArgGoto(secmodel, error);
10293 10294 10295 10296 10297 10298 10299

    if (conn->driver->nodeGetSecurityModel) {
        int ret;
        ret = conn->driver->nodeGetSecurityModel(conn, secmodel);
        if (ret < 0)
            goto error;
        return ret;
10300 10301
    }

10302
    virReportUnsupportedError();
10303

10304
 error:
10305
    virDispatchError(conn);
10306
    return -1;
10307
}
10308

10309

10310 10311 10312 10313
/**
 * virDomainAttachDevice:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10314
 *
10315 10316
 * Create a virtual device attachment to backend.  This function,
 * having hotplug semantics, is only allowed on an active domain.
10317
 *
10318 10319 10320 10321
 * For compatibility, this method can also be used to change the media
 * in an existing CDROM/Floppy device, however, applications are
 * recommended to use the virDomainUpdateDeviceFlag method instead.
 *
10322 10323 10324 10325
 * Be aware that hotplug changes might not persist across a domain going
 * into S4 state (also known as hibernation) unless you also modify the
 * persistent domain definition.
 *
10326 10327 10328
 * Returns 0 in case of success, -1 in case of failure.
 */
int
10329
virDomainAttachDevice(virDomainPtr domain, const char *xml)
10330 10331
{
    virConnectPtr conn;
10332 10333

    VIR_DOMAIN_DEBUG(domain, "xml=%s", xml);
10334

10335 10336
    virResetLastError();

10337 10338
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10339

10340
    virCheckNonNullArgGoto(xml, error);
10341
    virCheckReadOnlyGoto(conn->flags, error);
10342

10343
    if (conn->driver->domainAttachDevice) {
J
Jim Fehlig 已提交
10344
       int ret;
10345
       ret = conn->driver->domainAttachDevice(domain, xml);
J
Jim Fehlig 已提交
10346 10347 10348 10349 10350
       if (ret < 0)
          goto error;
       return ret;
    }

10351
    virReportUnsupportedError();
J
Jim Fehlig 已提交
10352

10353
 error:
J
Jim Fehlig 已提交
10354 10355 10356 10357
    virDispatchError(domain->conn);
    return -1;
}

10358

J
Jim Fehlig 已提交
10359 10360 10361 10362
/**
 * virDomainAttachDeviceFlags:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10363
 * @flags: bitwise-OR of virDomainDeviceModifyFlags
J
Jim Fehlig 已提交
10364 10365
 *
 * Attach a virtual device to a domain, using the flags parameter
10366
 * to control how the device is attached.  VIR_DOMAIN_AFFECT_CURRENT
J
Jim Fehlig 已提交
10367
 * specifies that the device allocation is made based on current domain
10368
 * state.  VIR_DOMAIN_AFFECT_LIVE specifies that the device shall be
J
Jim Fehlig 已提交
10369
 * allocated to the active domain instance only and is not added to the
10370
 * persisted domain configuration.  VIR_DOMAIN_AFFECT_CONFIG
J
Jim Fehlig 已提交
10371 10372 10373 10374 10375 10376
 * specifies that the device shall be allocated to the persisted domain
 * configuration only.  Note that the target hypervisor must return an
 * error if unable to satisfy flags.  E.g. the hypervisor driver will
 * return failure if LIVE is specified but it only supports modifying the
 * persisted device allocation.
 *
10377 10378 10379 10380
 * For compatibility, this method can also be used to change the media
 * in an existing CDROM/Floppy device, however, applications are
 * recommended to use the virDomainUpdateDeviceFlag method instead.
 *
10381 10382 10383 10384
 * Be aware that hotplug changes might not persist across a domain going
 * into S4 state (also known as hibernation) unless you also modify the
 * persistent domain definition.
 *
J
Jim Fehlig 已提交
10385 10386 10387 10388 10389 10390 10391
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainAttachDeviceFlags(virDomainPtr domain,
                           const char *xml, unsigned int flags)
{
    virConnectPtr conn;
10392

10393
    VIR_DOMAIN_DEBUG(domain, "xml=%s, flags=%x", xml, flags);
J
Jim Fehlig 已提交
10394 10395 10396

    virResetLastError();

10397 10398
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10399

10400
    virCheckNonNullArgGoto(xml, error);
10401
    virCheckReadOnlyGoto(conn->flags, error);
J
Jim Fehlig 已提交
10402 10403

    if (conn->driver->domainAttachDeviceFlags) {
10404
        int ret;
J
Jim Fehlig 已提交
10405
        ret = conn->driver->domainAttachDeviceFlags(domain, xml, flags);
10406 10407 10408 10409
        if (ret < 0)
            goto error;
        return ret;
    }
10410

10411
    virReportUnsupportedError();
10412

10413
 error:
10414
    virDispatchError(domain->conn);
10415
    return -1;
10416 10417
}

10418

10419 10420 10421 10422
/**
 * virDomainDetachDevice:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10423
 *
10424 10425
 * Destroy a virtual device attachment to backend.  This function,
 * having hot-unplug semantics, is only allowed on an active domain.
10426
 *
10427 10428 10429 10430
 * Be aware that hotplug changes might not persist across a domain going
 * into S4 state (also known as hibernation) unless you also modify the
 * persistent domain definition.
 *
10431 10432 10433
 * Returns 0 in case of success, -1 in case of failure.
 */
int
10434
virDomainDetachDevice(virDomainPtr domain, const char *xml)
10435 10436
{
    virConnectPtr conn;
10437 10438

    VIR_DOMAIN_DEBUG(domain, "xml=%s", xml);
10439

10440 10441
    virResetLastError();

10442 10443
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10444

10445
    virCheckNonNullArgGoto(xml, error);
10446
    virCheckReadOnlyGoto(conn->flags, error);
10447

10448 10449
    if (conn->driver->domainDetachDevice) {
        int ret;
10450
        ret = conn->driver->domainDetachDevice(domain, xml);
J
Jim Fehlig 已提交
10451 10452 10453 10454 10455
         if (ret < 0)
             goto error;
         return ret;
     }

10456
    virReportUnsupportedError();
J
Jim Fehlig 已提交
10457

10458
 error:
J
Jim Fehlig 已提交
10459 10460 10461 10462
    virDispatchError(domain->conn);
    return -1;
}

10463

J
Jim Fehlig 已提交
10464 10465 10466 10467
/**
 * virDomainDetachDeviceFlags:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10468
 * @flags: bitwise-OR of virDomainDeviceModifyFlags
J
Jim Fehlig 已提交
10469 10470
 *
 * Detach a virtual device from a domain, using the flags parameter
10471
 * to control how the device is detached.  VIR_DOMAIN_AFFECT_CURRENT
J
Jim Fehlig 已提交
10472
 * specifies that the device allocation is removed based on current domain
10473
 * state.  VIR_DOMAIN_AFFECT_LIVE specifies that the device shall be
J
Jim Fehlig 已提交
10474
 * deallocated from the active domain instance only and is not from the
10475
 * persisted domain configuration.  VIR_DOMAIN_AFFECT_CONFIG
J
Jim Fehlig 已提交
10476 10477 10478 10479 10480 10481
 * specifies that the device shall be deallocated from the persisted domain
 * configuration only.  Note that the target hypervisor must return an
 * error if unable to satisfy flags.  E.g. the hypervisor driver will
 * return failure if LIVE is specified but it only supports removing the
 * persisted device allocation.
 *
E
Eric Blake 已提交
10482 10483 10484 10485
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation on the device being detached; in that case,
 * use virDomainBlockJobAbort() to stop the block copy first.
 *
10486 10487 10488 10489 10490 10491 10492 10493 10494 10495 10496 10497 10498 10499 10500 10501
 * Beware that depending on the hypervisor and device type, detaching a device
 * from a running domain may be asynchronous. That is, calling
 * virDomainDetachDeviceFlags may just request device removal while the device
 * is actually removed later (in cooperation with a guest OS). Previously,
 * this fact was ignored and the device could have been removed from domain
 * configuration before it was actually removed by the hypervisor causing
 * various failures on subsequent operations. To check whether the device was
 * successfully removed, either recheck domain configuration using
 * virDomainGetXMLDesc() or add handler for VIR_DOMAIN_EVENT_ID_DEVICE_REMOVED
 * event. In case the device is already gone when virDomainDetachDeviceFlags
 * returns, the event is delivered before this API call ends. To help existing
 * clients work better in most cases, this API will try to transform an
 * asynchronous device removal that finishes shortly after the request into
 * a synchronous removal. In other words, this API may wait a bit for the
 * removal to complete in case it was not synchronous.
 *
10502 10503 10504 10505
 * Be aware that hotplug changes might not persist across a domain going
 * into S4 state (also known as hibernation) unless you also modify the
 * persistent domain definition.
 *
J
Jim Fehlig 已提交
10506 10507 10508 10509 10510 10511 10512
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainDetachDeviceFlags(virDomainPtr domain,
                           const char *xml, unsigned int flags)
{
    virConnectPtr conn;
10513

10514
    VIR_DOMAIN_DEBUG(domain, "xml=%s, flags=%x", xml, flags);
J
Jim Fehlig 已提交
10515 10516 10517

    virResetLastError();

10518 10519
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10520

10521
    virCheckNonNullArgGoto(xml, error);
10522
    virCheckReadOnlyGoto(conn->flags, error);
J
Jim Fehlig 已提交
10523 10524 10525 10526

    if (conn->driver->domainDetachDeviceFlags) {
        int ret;
        ret = conn->driver->domainDetachDeviceFlags(domain, xml, flags);
10527 10528 10529 10530 10531
        if (ret < 0)
            goto error;
        return ret;
    }

10532
    virReportUnsupportedError();
10533

10534
 error:
10535 10536 10537 10538
    virDispatchError(domain->conn);
    return -1;
}

10539

10540 10541 10542 10543
/**
 * virDomainUpdateDeviceFlags:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10544
 * @flags: bitwise-OR of virDomainDeviceModifyFlags
10545 10546
 *
 * Change a virtual device on a domain, using the flags parameter
10547
 * to control how the device is changed.  VIR_DOMAIN_AFFECT_CURRENT
10548
 * specifies that the device change is made based on current domain
10549
 * state.  VIR_DOMAIN_AFFECT_LIVE specifies that the device shall be
10550
 * changed on the active domain instance only and is not added to the
10551
 * persisted domain configuration. VIR_DOMAIN_AFFECT_CONFIG
10552 10553 10554 10555 10556 10557 10558 10559 10560 10561 10562 10563 10564 10565 10566 10567 10568
 * specifies that the device shall be changed on the persisted domain
 * configuration only.  Note that the target hypervisor must return an
 * error if unable to satisfy flags.  E.g. the hypervisor driver will
 * return failure if LIVE is specified but it only supports modifying the
 * persisted device allocation.
 *
 * This method is used for actions such changing CDROM/Floppy device
 * media, altering the graphics configuration such as password,
 * reconfiguring the NIC device backend connectivity, etc.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainUpdateDeviceFlags(virDomainPtr domain,
                           const char *xml, unsigned int flags)
{
    virConnectPtr conn;
10569

10570
    VIR_DOMAIN_DEBUG(domain, "xml=%s, flags=%x", xml, flags);
10571 10572 10573

    virResetLastError();

10574 10575
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10576

10577
    virCheckNonNullArgGoto(xml, error);
10578
    virCheckReadOnlyGoto(conn->flags, error);
10579 10580 10581 10582

    if (conn->driver->domainUpdateDeviceFlags) {
        int ret;
        ret = conn->driver->domainUpdateDeviceFlags(domain, xml, flags);
10583 10584 10585 10586
        if (ret < 0)
            goto error;
        return ret;
    }
10587

10588
    virReportUnsupportedError();
10589

10590
 error:
10591
    virDispatchError(domain->conn);
10592
    return -1;
10593
}
10594

10595

10596 10597 10598 10599 10600 10601 10602 10603 10604 10605
/**
 * virNodeGetCellsFreeMemory:
 * @conn: pointer to the hypervisor connection
 * @freeMems: pointer to the array of unsigned long long
 * @startCell: index of first cell to return freeMems info on.
 * @maxCells: Maximum number of cells for which freeMems information can
 *            be returned.
 *
 * This call returns the amount of free memory in one or more NUMA cells.
 * The @freeMems array must be allocated by the caller and will be filled
10606
 * with the amount of free memory in bytes for each cell requested,
10607 10608 10609 10610 10611 10612 10613 10614 10615 10616
 * starting with startCell (in freeMems[0]), up to either
 * (startCell + maxCells), or the number of additional cells in the node,
 * whichever is smaller.
 *
 * Returns the number of entries filled in freeMems, or -1 in case of error.
 */
int
virNodeGetCellsFreeMemory(virConnectPtr conn, unsigned long long *freeMems,
                          int startCell, int maxCells)
{
10617
    VIR_DEBUG("conn=%p, freeMems=%p, startCell=%d, maxCells=%d",
10618 10619
          conn, freeMems, startCell, maxCells);

10620 10621
    virResetLastError();

10622
    virCheckConnectReturn(conn, -1);
10623 10624 10625
    virCheckNonNullArgGoto(freeMems, error);
    virCheckPositiveArgGoto(maxCells, error);
    virCheckNonNegativeArgGoto(startCell, error);
10626

10627 10628
    if (conn->driver->nodeGetCellsFreeMemory) {
        int ret;
10629
        ret = conn->driver->nodeGetCellsFreeMemory(conn, freeMems, startCell, maxCells);
10630 10631 10632 10633
        if (ret < 0)
            goto error;
        return ret;
    }
10634

10635
    virReportUnsupportedError();
10636

10637
 error:
10638
    virDispatchError(conn);
10639 10640 10641
    return -1;
}

10642

10643 10644 10645 10646
/**
 * virNetworkGetConnect:
 * @net: pointer to a network
 *
10647
 * Provides the connection pointer associated with a network.  The
10648 10649 10650
 * reference counter on the connection is not increased by this
 * call.
 *
10651 10652 10653 10654
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the network object together.
 *
10655 10656 10657
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
10658
virNetworkGetConnect(virNetworkPtr net)
10659
{
10660
    VIR_DEBUG("net=%p", net);
10661

10662 10663
    virResetLastError();

10664 10665
    virCheckNetworkReturn(net, NULL);

10666 10667 10668
    return net->conn;
}

10669

10670 10671 10672 10673 10674 10675 10676 10677 10678 10679 10680 10681 10682 10683 10684 10685 10686 10687 10688 10689 10690 10691 10692 10693 10694 10695 10696 10697 10698 10699 10700 10701 10702 10703 10704 10705 10706 10707 10708 10709 10710 10711 10712 10713 10714 10715 10716
/**
 * virConnectListAllNetworks:
 * @conn: Pointer to the hypervisor connection.
 * @nets: Pointer to a variable to store the array containing the network
 *        objects or NULL if the list is not required (just returns number
 *        of networks).
 * @flags: bitwise-OR of virConnectListAllNetworksFlags.
 *
 * Collect the list of networks, and allocate an array to store those
 * objects. This API solves the race inherent between virConnectListNetworks
 * and virConnectListDefinedNetworks.
 *
 * Normally, all networks are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted networks.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a network, and where all bits
 * within a group describe all possible networks.
 *
 * The first group of @flags is VIR_CONNECT_LIST_NETWORKS_ACTIVE (up) and
 * VIR_CONNECT_LIST_NETWORKS_INACTIVE (down) to filter the networks by state.
 *
 * The second group of @flags is VIR_CONNECT_LIST_NETWORKS_PERSISTENT (defined)
 * and VIR_CONNECT_LIST_NETWORKS_TRANSIENT (running but not defined), to filter
 * the networks by whether they have persistent config or not.
 *
 * The third group of @flags is VIR_CONNECT_LIST_NETWORKS_AUTOSTART
 * and VIR_CONNECT_LIST_NETWORKS_NO_AUTOSTART, to filter the networks by
 * whether they are marked as autostart or not.
 *
 * Returns the number of networks found or -1 and sets @nets to  NULL in case
 * of error.  On success, the array stored into @nets is guaranteed to have an
 * extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virNetworkFree() on each array element, then calling free() on @nets.
 */
int
virConnectListAllNetworks(virConnectPtr conn,
                          virNetworkPtr **nets,
                          unsigned int flags)
{
    VIR_DEBUG("conn=%p, nets=%p, flags=%x", conn, nets, flags);

    virResetLastError();

    if (nets)
        *nets = NULL;

10717
    virCheckConnectReturn(conn, -1);
10718 10719

    if (conn->networkDriver &&
10720
        conn->networkDriver->connectListAllNetworks) {
10721
        int ret;
10722
        ret = conn->networkDriver->connectListAllNetworks(conn, nets, flags);
10723 10724 10725 10726 10727
        if (ret < 0)
            goto error;
        return ret;
    }

10728
    virReportUnsupportedError();
10729

10730
 error:
10731 10732 10733 10734 10735
    virDispatchError(conn);
    return -1;
}


10736 10737 10738 10739 10740 10741 10742 10743 10744 10745 10746
/**
 * virConnectNumOfNetworks:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of active networks.
 *
 * Returns the number of network found or -1 in case of error
 */
int
virConnectNumOfNetworks(virConnectPtr conn)
{
10747
    VIR_DEBUG("conn=%p", conn);
10748

10749 10750
    virResetLastError();

10751
    virCheckConnectReturn(conn, -1);
10752

10753
    if (conn->networkDriver && conn->networkDriver->connectNumOfNetworks) {
10754
        int ret;
10755
        ret = conn->networkDriver->connectNumOfNetworks(conn);
10756 10757 10758 10759
        if (ret < 0)
            goto error;
        return ret;
    }
10760

10761
    virReportUnsupportedError();
10762

10763
 error:
10764
    virDispatchError(conn);
10765
    return -1;
10766 10767
}

10768

10769 10770 10771 10772 10773 10774 10775 10776
/**
 * virConnectListNetworks:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of active networks
 * @maxnames: size of @names
 *
 * Collect the list of active networks, and store their names in @names
 *
10777 10778 10779 10780 10781 10782
 * For more control over the results, see virConnectListAllNetworks().
 *
 * Returns the number of networks found or -1 in case of error.  Note that
 * this command is inherently racy; a network can be started between a call
 * to virConnectNumOfNetworks() and this call; you are only guaranteed that
 * all currently active networks were listed if the return is less than
J
John Ferlan 已提交
10783
 * @maxnames. The client must call free() on each returned name.
10784 10785
 */
int
10786
virConnectListNetworks(virConnectPtr conn, char **const names, int maxnames)
10787
{
10788
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
10789

10790 10791
    virResetLastError();

10792
    virCheckConnectReturn(conn, -1);
10793 10794
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
10795

10796
    if (conn->networkDriver && conn->networkDriver->connectListNetworks) {
10797
        int ret;
10798
        ret = conn->networkDriver->connectListNetworks(conn, names, maxnames);
10799 10800 10801 10802
        if (ret < 0)
            goto error;
        return ret;
    }
10803

10804
    virReportUnsupportedError();
10805

10806
 error:
10807
    virDispatchError(conn);
10808
    return -1;
10809 10810
}

10811

10812 10813 10814 10815 10816 10817 10818 10819 10820 10821 10822
/**
 * virConnectNumOfDefinedNetworks:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of inactive networks.
 *
 * Returns the number of networks found or -1 in case of error
 */
int
virConnectNumOfDefinedNetworks(virConnectPtr conn)
{
10823
    VIR_DEBUG("conn=%p", conn);
10824

10825 10826
    virResetLastError();

10827
    virCheckConnectReturn(conn, -1);
10828

10829
    if (conn->networkDriver && conn->networkDriver->connectNumOfDefinedNetworks) {
10830
        int ret;
10831
        ret = conn->networkDriver->connectNumOfDefinedNetworks(conn);
10832 10833 10834 10835
        if (ret < 0)
            goto error;
        return ret;
    }
10836

10837
    virReportUnsupportedError();
10838

10839
 error:
10840
    virDispatchError(conn);
10841
    return -1;
10842 10843
}

10844

10845 10846 10847 10848 10849 10850 10851 10852
/**
 * virConnectListDefinedNetworks:
 * @conn: pointer to the hypervisor connection
 * @names: pointer to an array to store the names
 * @maxnames: size of the array
 *
 * list the inactive networks, stores the pointers to the names in @names
 *
10853 10854 10855 10856 10857 10858 10859
 * For more control over the results, see virConnectListAllNetworks().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a network can be defined between
 * a call to virConnectNumOfDefinedNetworks() and this call; you are only
 * guaranteed that all currently defined networks were listed if the return
 * is less than @maxnames.  The client must call free() on each returned name.
10860 10861
 */
int
10862
virConnectListDefinedNetworks(virConnectPtr conn, char **const names,
10863 10864
                              int maxnames)
{
10865
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
10866

10867 10868
    virResetLastError();

10869
    virCheckConnectReturn(conn, -1);
10870 10871
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
10872

10873
    if (conn->networkDriver && conn->networkDriver->connectListDefinedNetworks) {
10874
        int ret;
10875
        ret = conn->networkDriver->connectListDefinedNetworks(conn, names, maxnames);
10876 10877 10878 10879
        if (ret < 0)
            goto error;
        return ret;
    }
10880

10881
    virReportUnsupportedError();
10882

10883
 error:
10884
    virDispatchError(conn);
10885
    return -1;
10886 10887
}

10888

10889 10890 10891 10892 10893 10894 10895
/**
 * virNetworkLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the network
 *
 * Try to lookup a network on the given hypervisor based on its name.
 *
10896 10897
 * Returns a new network object or NULL in case of failure.  If the
 * network cannot be found, then VIR_ERR_NO_NETWORK error is raised.
10898 10899 10900 10901
 */
virNetworkPtr
virNetworkLookupByName(virConnectPtr conn, const char *name)
{
10902
    VIR_DEBUG("conn=%p, name=%s", conn, name);
10903

10904 10905
    virResetLastError();

10906
    virCheckConnectReturn(conn, NULL);
10907
    virCheckNonNullArgGoto(name, error);
10908

10909 10910
    if (conn->networkDriver && conn->networkDriver->networkLookupByName) {
        virNetworkPtr ret;
10911
        ret = conn->networkDriver->networkLookupByName(conn, name);
10912 10913 10914 10915
        if (!ret)
            goto error;
        return ret;
    }
10916

10917
    virReportUnsupportedError();
10918

10919
 error:
10920
    virDispatchError(conn);
10921
    return NULL;
10922 10923
}

10924

10925 10926 10927 10928 10929 10930 10931
/**
 * virNetworkLookupByUUID:
 * @conn: pointer to the hypervisor connection
 * @uuid: the raw UUID for the network
 *
 * Try to lookup a network on the given hypervisor based on its UUID.
 *
10932 10933
 * Returns a new network object or NULL in case of failure.  If the
 * network cannot be found, then VIR_ERR_NO_NETWORK error is raised.
10934 10935 10936 10937
 */
virNetworkPtr
virNetworkLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
{
10938
    VIR_UUID_DEBUG(conn, uuid);
10939

10940 10941
    virResetLastError();

10942
    virCheckConnectReturn(conn, NULL);
10943
    virCheckNonNullArgGoto(uuid, error);
10944

10945 10946
    if (conn->networkDriver && conn->networkDriver->networkLookupByUUID){
        virNetworkPtr ret;
10947
        ret = conn->networkDriver->networkLookupByUUID(conn, uuid);
10948 10949 10950 10951
        if (!ret)
            goto error;
        return ret;
    }
10952

10953
    virReportUnsupportedError();
10954

10955
 error:
10956
    virDispatchError(conn);
10957
    return NULL;
10958 10959
}

10960

10961 10962 10963 10964 10965 10966 10967
/**
 * virNetworkLookupByUUIDString:
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the network
 *
 * Try to lookup a network on the given hypervisor based on its UUID.
 *
10968 10969
 * Returns a new network object or NULL in case of failure.  If the
 * network cannot be found, then VIR_ERR_NO_NETWORK error is raised.
10970 10971 10972 10973 10974
 */
virNetworkPtr
virNetworkLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
    unsigned char uuid[VIR_UUID_BUFLEN];
10975
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
10976

10977 10978
    virResetLastError();

10979
    virCheckConnectReturn(conn, NULL);
10980
    virCheckNonNullArgGoto(uuidstr, error);
10981

10982
    if (virUUIDParse(uuidstr, uuid) < 0) {
10983 10984 10985
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
10986
        goto error;
10987 10988 10989
    }

    return virNetworkLookupByUUID(conn, &uuid[0]);
10990

10991
 error:
10992
    virDispatchError(conn);
10993
    return NULL;
10994 10995
}

10996

10997 10998 10999 11000 11001 11002 11003 11004 11005 11006 11007 11008 11009
/**
 * virNetworkCreateXML:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: an XML description of the network
 *
 * Create and start a new virtual network, based on an XML description
 * similar to the one returned by virNetworkGetXMLDesc()
 *
 * Returns a new network object or NULL in case of failure
 */
virNetworkPtr
virNetworkCreateXML(virConnectPtr conn, const char *xmlDesc)
{
11010
    VIR_DEBUG("conn=%p, xmlDesc=%s", conn, xmlDesc);
11011

11012 11013
    virResetLastError();

11014
    virCheckConnectReturn(conn, NULL);
11015
    virCheckNonNullArgGoto(xmlDesc, error);
11016
    virCheckReadOnlyGoto(conn->flags, error);
11017

11018 11019
    if (conn->networkDriver && conn->networkDriver->networkCreateXML) {
        virNetworkPtr ret;
11020
        ret = conn->networkDriver->networkCreateXML(conn, xmlDesc);
11021 11022 11023 11024
        if (!ret)
            goto error;
        return ret;
    }
11025

11026
    virReportUnsupportedError();
11027

11028
 error:
11029
    virDispatchError(conn);
11030
    return NULL;
11031 11032
}

11033

11034 11035 11036 11037 11038 11039 11040 11041 11042 11043
/**
 * virNetworkDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xml: the XML description for the network, preferably in UTF-8
 *
 * Define a network, but does not create it
 *
 * Returns NULL in case of error, a pointer to the network otherwise
 */
virNetworkPtr
11044 11045
virNetworkDefineXML(virConnectPtr conn, const char *xml)
{
11046
    VIR_DEBUG("conn=%p, xml=%s", conn, xml);
11047

11048 11049
    virResetLastError();

11050
    virCheckConnectReturn(conn, NULL);
11051
    virCheckReadOnlyGoto(conn->flags, error);
11052
    virCheckNonNullArgGoto(xml, error);
11053

11054 11055
    if (conn->networkDriver && conn->networkDriver->networkDefineXML) {
        virNetworkPtr ret;
11056
        ret = conn->networkDriver->networkDefineXML(conn, xml);
11057 11058 11059 11060
        if (!ret)
            goto error;
        return ret;
    }
11061

11062
    virReportUnsupportedError();
11063

11064
 error:
11065
    virDispatchError(conn);
11066
    return NULL;
11067 11068
}

11069

11070 11071 11072 11073 11074 11075 11076 11077 11078
/**
 * virNetworkUndefine:
 * @network: pointer to a defined network
 *
 * Undefine a network but does not stop it if it is running
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
11079 11080
virNetworkUndefine(virNetworkPtr network)
{
11081
    virConnectPtr conn;
11082
    VIR_DEBUG("network=%p", network);
11083

11084 11085
    virResetLastError();

11086
    virCheckNetworkReturn(network, -1);
11087
    conn = network->conn;
11088

11089
    virCheckReadOnlyGoto(conn->flags, error);
11090

11091 11092
    if (conn->networkDriver && conn->networkDriver->networkUndefine) {
        int ret;
11093
        ret = conn->networkDriver->networkUndefine(network);
11094 11095 11096 11097
        if (ret < 0)
            goto error;
        return ret;
    }
11098

11099
    virReportUnsupportedError();
11100

11101
 error:
11102 11103 11104 11105
    virDispatchError(network->conn);
    return -1;
}

11106

11107 11108 11109 11110 11111 11112 11113 11114 11115 11116 11117 11118 11119 11120 11121 11122 11123 11124 11125 11126 11127 11128 11129 11130 11131 11132 11133 11134 11135 11136 11137 11138 11139
/**
 * virNetworkUpdate:
 * @network: pointer to a defined network
 * @section: which section of the network to update
 *           (see virNetworkUpdateSection for descriptions)
 * @command: what action to perform (add/delete/modify)
 *           (see virNetworkUpdateCommand for descriptions)
 * @parentIndex: which parent element, if there are multiple parents
 *           of the same type (e.g. which <ip> element when modifying
 *           a <dhcp>/<host> element), or "-1" for "don't care" or
 *           "automatically find appropriate one".
 * @xml: the XML description for the network, preferably in UTF-8
 * @flags: bitwise OR of virNetworkUpdateFlags.
 *
 * Update the definition of an existing network, either its live
 * running state, its persistent configuration, or both.
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
virNetworkUpdate(virNetworkPtr network,
                 unsigned int command, /* virNetworkUpdateCommand */
                 unsigned int section, /* virNetworkUpdateSection */
                 int parentIndex,
                 const char *xml,
                 unsigned int flags)
{
    virConnectPtr conn;
    VIR_DEBUG("network=%p, section=%d, parentIndex=%d, xml=%s, flags=0x%x",
              network, section, parentIndex, xml, flags);

    virResetLastError();

11140
    virCheckNetworkReturn(network, -1);
11141 11142
    conn = network->conn;

11143
    virCheckReadOnlyGoto(conn->flags, error);
11144 11145 11146 11147 11148 11149 11150 11151 11152 11153 11154
    virCheckNonNullArgGoto(xml, error);

    if (conn->networkDriver && conn->networkDriver->networkUpdate) {
        int ret;
        ret = conn->networkDriver->networkUpdate(network, section, command,
                                                 parentIndex, xml, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

11155
    virReportUnsupportedError();
11156

11157
 error:
11158
    virDispatchError(network->conn);
11159
    return -1;
11160 11161
}

11162

11163 11164 11165 11166 11167 11168 11169 11170 11171 11172
/**
 * virNetworkCreate:
 * @network: pointer to a defined network
 *
 * Create and start a defined network. If the call succeed the network
 * moves from the defined to the running networks pools.
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
11173 11174
virNetworkCreate(virNetworkPtr network)
{
11175
    virConnectPtr conn;
11176
    VIR_DEBUG("network=%p", network);
11177

11178 11179
    virResetLastError();

11180
    virCheckNetworkReturn(network, -1);
11181
    conn = network->conn;
11182

11183
    virCheckReadOnlyGoto(conn->flags, error);
11184

11185 11186
    if (conn->networkDriver && conn->networkDriver->networkCreate) {
        int ret;
11187
        ret = conn->networkDriver->networkCreate(network);
11188 11189 11190 11191
        if (ret < 0)
            goto error;
        return ret;
    }
11192

11193
    virReportUnsupportedError();
11194

11195
 error:
11196
    virDispatchError(network->conn);
11197
    return -1;
11198 11199
}

11200

11201 11202 11203 11204 11205
/**
 * virNetworkDestroy:
 * @network: a network object
 *
 * Destroy the network object. The running instance is shutdown if not down
11206 11207 11208
 * already and all resources used by it are given back to the hypervisor. This
 * does not free the associated virNetworkPtr object.
 * This function may require privileged access
11209 11210 11211 11212 11213 11214 11215
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNetworkDestroy(virNetworkPtr network)
{
    virConnectPtr conn;
11216
    VIR_DEBUG("network=%p", network);
11217

11218 11219
    virResetLastError();

11220
    virCheckNetworkReturn(network, -1);
11221
    conn = network->conn;
11222

11223
    virCheckReadOnlyGoto(conn->flags, error);
11224

11225 11226
    if (conn->networkDriver && conn->networkDriver->networkDestroy) {
        int ret;
11227
        ret = conn->networkDriver->networkDestroy(network);
11228 11229 11230 11231
        if (ret < 0)
            goto error;
        return ret;
    }
11232

11233
    virReportUnsupportedError();
11234

11235
 error:
11236
    virDispatchError(network->conn);
11237
    return -1;
11238 11239
}

11240

11241 11242 11243 11244 11245 11246 11247 11248 11249 11250 11251 11252
/**
 * virNetworkFree:
 * @network: a network object
 *
 * Free the network object. The running instance is kept alive.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNetworkFree(virNetworkPtr network)
{
11253
    VIR_DEBUG("network=%p", network);
11254

11255 11256
    virResetLastError();

11257 11258
    virCheckNetworkReturn(network, -1);

11259
    virObjectUnref(network);
11260
    return 0;
11261 11262
}

11263

11264 11265
/**
 * virNetworkRef:
D
Daniel Veillard 已提交
11266
 * @network: the network to hold a reference on
11267 11268 11269 11270 11271 11272 11273 11274 11275 11276 11277
 *
 * Increment the reference count on the network. For each
 * additional call to this method, there shall be a corresponding
 * call to virNetworkFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a network would increment
 * the reference count.
D
Daniel Veillard 已提交
11278 11279
 *
 * Returns 0 in case of success, -1 in case of failure.
11280 11281 11282 11283
 */
int
virNetworkRef(virNetworkPtr network)
{
11284 11285 11286
    VIR_DEBUG("network=%p refs=%d", network,
              network ? network->object.u.s.refs : 0);

11287 11288
    virResetLastError();

11289 11290
    virCheckNetworkReturn(network, -1);

11291
    virObjectRef(network);
11292 11293 11294
    return 0;
}

11295

11296 11297 11298 11299 11300 11301 11302 11303 11304 11305 11306 11307
/**
 * virNetworkGetName:
 * @network: a network object
 *
 * Get the public name for that network
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the network object.
 */
const char *
virNetworkGetName(virNetworkPtr network)
{
11308
    VIR_DEBUG("network=%p", network);
11309

11310 11311
    virResetLastError();

11312 11313
    virCheckNetworkReturn(network, NULL);

11314
    return network->name;
11315 11316
}

11317

11318 11319 11320 11321 11322 11323 11324 11325 11326 11327 11328 11329
/**
 * virNetworkGetUUID:
 * @network: a network object
 * @uuid: pointer to a VIR_UUID_BUFLEN bytes array
 *
 * Get the UUID for a network
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkGetUUID(virNetworkPtr network, unsigned char *uuid)
{
11330
    VIR_DEBUG("network=%p, uuid=%p", network, uuid);
11331

11332 11333
    virResetLastError();

11334
    virCheckNetworkReturn(network, -1);
11335
    virCheckNonNullArgGoto(uuid, error);
11336 11337 11338

    memcpy(uuid, &network->uuid[0], VIR_UUID_BUFLEN);

11339
    return 0;
11340

11341
 error:
11342
    virDispatchError(network->conn);
11343
    return -1;
11344 11345
}

11346

11347 11348 11349 11350 11351 11352 11353 11354 11355 11356 11357 11358 11359
/**
 * virNetworkGetUUIDString:
 * @network: a network object
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
 *
 * Get the UUID for a network as string. For more information about
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkGetUUIDString(virNetworkPtr network, char *buf)
{
11360
    VIR_DEBUG("network=%p, buf=%p", network, buf);
11361

11362 11363
    virResetLastError();

11364
    virCheckNetworkReturn(network, -1);
11365
    virCheckNonNullArgGoto(buf, error);
11366

E
Eric Blake 已提交
11367
    virUUIDFormat(network->uuid, buf);
11368
    return 0;
11369

11370
 error:
11371
    virDispatchError(network->conn);
11372
    return -1;
11373 11374
}

11375

11376 11377 11378
/**
 * virNetworkGetXMLDesc:
 * @network: a network object
11379
 * @flags: bitwise-OR of virNetworkXMLFlags
11380 11381 11382 11383
 *
 * Provide an XML description of the network. The description may be reused
 * later to relaunch the network with virNetworkCreateXML().
 *
11384 11385 11386 11387 11388
 * Normally, if a network included a physical function, the output includes
 * all virtual functions tied to that physical interface.  If @flags includes
 * VIR_NETWORK_XML_INACTIVE, then the expansion of virtual interfaces is
 * not performed.
 *
11389 11390 11391 11392
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
11393
virNetworkGetXMLDesc(virNetworkPtr network, unsigned int flags)
11394
{
11395
    virConnectPtr conn;
11396
    VIR_DEBUG("network=%p, flags=%x", network, flags);
11397

11398 11399
    virResetLastError();

11400
    virCheckNetworkReturn(network, NULL);
11401 11402
    conn = network->conn;

11403
    if (conn->networkDriver && conn->networkDriver->networkGetXMLDesc) {
11404
        char *ret;
11405
        ret = conn->networkDriver->networkGetXMLDesc(network, flags);
11406 11407 11408 11409
        if (!ret)
            goto error;
        return ret;
    }
11410

11411
    virReportUnsupportedError();
11412

11413
 error:
11414
    virDispatchError(network->conn);
11415
    return NULL;
11416
}
11417

11418

11419 11420 11421 11422
/**
 * virNetworkGetBridgeName:
 * @network: a network object
 *
11423
 * Provides a bridge interface name to which a domain may connect
11424 11425 11426 11427 11428 11429 11430 11431
 * a network interface in order to join the network.
 *
 * Returns a 0 terminated interface name, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
virNetworkGetBridgeName(virNetworkPtr network)
{
11432
    virConnectPtr conn;
11433
    VIR_DEBUG("network=%p", network);
11434

11435 11436
    virResetLastError();

11437
    virCheckNetworkReturn(network, NULL);
11438 11439
    conn = network->conn;

11440 11441
    if (conn->networkDriver && conn->networkDriver->networkGetBridgeName) {
        char *ret;
11442
        ret = conn->networkDriver->networkGetBridgeName(network);
11443 11444 11445 11446
        if (!ret)
            goto error;
        return ret;
    }
11447

11448
    virReportUnsupportedError();
11449

11450
 error:
11451
    virDispatchError(network->conn);
11452
    return NULL;
11453
}
11454

11455

11456 11457 11458
/**
 * virNetworkGetAutostart:
 * @network: a network object
11459
 * @autostart: the value returned
11460
 *
11461
 * Provides a boolean value indicating whether the network
11462 11463 11464 11465 11466 11467 11468
 * configured to be automatically started when the host
 * machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkGetAutostart(virNetworkPtr network,
11469 11470 11471
                       int *autostart)
{
    virConnectPtr conn;
11472
    VIR_DEBUG("network=%p, autostart=%p", network, autostart);
11473

11474 11475
    virResetLastError();

11476
    virCheckNetworkReturn(network, -1);
11477
    virCheckNonNullArgGoto(autostart, error);
11478

11479 11480
    conn = network->conn;

11481 11482
    if (conn->networkDriver && conn->networkDriver->networkGetAutostart) {
        int ret;
11483
        ret = conn->networkDriver->networkGetAutostart(network, autostart);
11484 11485 11486 11487
        if (ret < 0)
            goto error;
        return ret;
    }
11488

11489
    virReportUnsupportedError();
11490

11491
 error:
11492
    virDispatchError(network->conn);
11493
    return -1;
11494 11495
}

11496

11497 11498 11499
/**
 * virNetworkSetAutostart:
 * @network: a network object
11500
 * @autostart: whether the network should be automatically started 0 or 1
11501 11502 11503 11504 11505 11506 11507 11508
 *
 * Configure the network to be automatically started
 * when the host machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkSetAutostart(virNetworkPtr network,
11509 11510 11511
                       int autostart)
{
    virConnectPtr conn;
11512
    VIR_DEBUG("network=%p, autostart=%d", network, autostart);
11513

11514 11515
    virResetLastError();

11516
    virCheckNetworkReturn(network, -1);
11517 11518
    conn = network->conn;

11519 11520
    virCheckReadOnlyGoto(conn->flags, error);

11521 11522
    if (conn->networkDriver && conn->networkDriver->networkSetAutostart) {
        int ret;
11523
        ret = conn->networkDriver->networkSetAutostart(network, autostart);
11524 11525 11526 11527
        if (ret < 0)
            goto error;
        return ret;
    }
11528

11529
    virReportUnsupportedError();
11530

11531
 error:
11532
    virDispatchError(network->conn);
11533
    return -1;
11534
}
11535

11536

D
Daniel Veillard 已提交
11537 11538
/**
 * virInterfaceGetConnect:
L
Laine Stump 已提交
11539
 * @iface: pointer to an interface
D
Daniel Veillard 已提交
11540 11541 11542 11543 11544 11545 11546 11547 11548 11549 11550 11551
 *
 * Provides the connection pointer associated with an interface.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the interface object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
11552
virInterfaceGetConnect(virInterfacePtr iface)
D
Daniel Veillard 已提交
11553
{
11554
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11555 11556 11557

    virResetLastError();

11558 11559
    virCheckInterfaceReturn(iface, NULL);

11560
    return iface->conn;
D
Daniel Veillard 已提交
11561 11562
}

11563

11564 11565 11566 11567 11568 11569 11570 11571 11572 11573 11574 11575 11576 11577 11578 11579 11580 11581 11582 11583 11584 11585 11586 11587 11588 11589 11590 11591 11592 11593 11594 11595 11596 11597 11598 11599 11600 11601 11602
/**
 * virConnectListAllInterfaces:
 * @conn: Pointer to the hypervisor connection.
 * @ifaces: Pointer to a variable to store the array containing the interface
 *          objects or NULL if the list is not required (just returns number
 *          of interfaces).
 * @flags: bitwise-OR of virConnectListAllInterfacesFlags.
 *
 * Collect the list of interfaces, and allocate an array to store those
 * objects. This API solves the race inherent between virConnectListInterfaces
 * and virConnectListDefinedInterfaces.
 *
 * Normally, all interfaces are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted interfaces.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a interface, and where all bits
 * within a group describe all possible interfaces.
 *
 * The only group of @flags is VIR_CONNECT_LIST_INTERFACES_ACTIVE (up) and
 * VIR_CONNECT_LIST_INTERFACES_INACTIVE (down) to filter the interfaces by state.
 *
 * Returns the number of interfaces found or -1 and sets @ifaces to  NULL in case
 * of error.  On success, the array stored into @ifaces is guaranteed to have an
 * extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virStorageInterfaceFree() on each array element, then calling free() on @ifaces.
 */
int
virConnectListAllInterfaces(virConnectPtr conn,
                            virInterfacePtr **ifaces,
                            unsigned int flags)
{
    VIR_DEBUG("conn=%p, ifaces=%p, flags=%x", conn, ifaces, flags);

    virResetLastError();

    if (ifaces)
        *ifaces = NULL;

11603
    virCheckConnectReturn(conn, -1);
11604 11605

    if (conn->interfaceDriver &&
11606
        conn->interfaceDriver->connectListAllInterfaces) {
11607
        int ret;
11608
        ret = conn->interfaceDriver->connectListAllInterfaces(conn, ifaces, flags);
11609 11610 11611 11612 11613
        if (ret < 0)
            goto error;
        return ret;
    }

11614
    virReportUnsupportedError();
11615

11616
 error:
11617 11618 11619 11620
    virDispatchError(conn);
    return -1;
}

11621

D
Daniel Veillard 已提交
11622 11623 11624 11625
/**
 * virConnectNumOfInterfaces:
 * @conn: pointer to the hypervisor connection
 *
11626
 * Provides the number of active interfaces on the physical host.
D
Daniel Veillard 已提交
11627
 *
11628
 * Returns the number of active interfaces found or -1 in case of error
D
Daniel Veillard 已提交
11629 11630 11631 11632
 */
int
virConnectNumOfInterfaces(virConnectPtr conn)
{
11633
    VIR_DEBUG("conn=%p", conn);
D
Daniel Veillard 已提交
11634 11635 11636

    virResetLastError();

11637
    virCheckConnectReturn(conn, -1);
D
Daniel Veillard 已提交
11638

11639
    if (conn->interfaceDriver && conn->interfaceDriver->connectNumOfInterfaces) {
D
Daniel Veillard 已提交
11640
        int ret;
11641
        ret = conn->interfaceDriver->connectNumOfInterfaces(conn);
D
Daniel Veillard 已提交
11642 11643 11644 11645 11646
        if (ret < 0)
            goto error;
        return ret;
    }

11647
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11648

11649
 error:
11650
    virDispatchError(conn);
D
Daniel Veillard 已提交
11651 11652 11653
    return -1;
}

11654

D
Daniel Veillard 已提交
11655 11656 11657 11658 11659 11660
/**
 * virConnectListInterfaces:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of interfaces
 * @maxnames: size of @names
 *
11661 11662
 * Collect the list of active physical host interfaces,
 * and store their names in @names
D
Daniel Veillard 已提交
11663
 *
11664 11665 11666 11667 11668 11669
 * For more control over the results, see virConnectListAllInterfaces().
 *
 * Returns the number of interfaces found or -1 in case of error.  Note that
 * this command is inherently racy; a interface can be started between a call
 * to virConnectNumOfInterfaces() and this call; you are only guaranteed that
 * all currently active interfaces were listed if the return is less than
J
John Ferlan 已提交
11670
 * @maxnames. The client must call free() on each returned name.
D
Daniel Veillard 已提交
11671 11672 11673 11674
 */
int
virConnectListInterfaces(virConnectPtr conn, char **const names, int maxnames)
{
11675
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
D
Daniel Veillard 已提交
11676 11677 11678

    virResetLastError();

11679
    virCheckConnectReturn(conn, -1);
11680 11681
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
D
Daniel Veillard 已提交
11682

11683
    if (conn->interfaceDriver && conn->interfaceDriver->connectListInterfaces) {
D
Daniel Veillard 已提交
11684
        int ret;
11685
        ret = conn->interfaceDriver->connectListInterfaces(conn, names, maxnames);
D
Daniel Veillard 已提交
11686 11687 11688 11689 11690
        if (ret < 0)
            goto error;
        return ret;
    }

11691
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11692

11693
 error:
11694
    virDispatchError(conn);
D
Daniel Veillard 已提交
11695 11696 11697
    return -1;
}

11698

11699 11700 11701 11702 11703 11704 11705 11706 11707 11708 11709
/**
 * virConnectNumOfDefinedInterfaces:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of defined (inactive) interfaces on the physical host.
 *
 * Returns the number of defined interface found or -1 in case of error
 */
int
virConnectNumOfDefinedInterfaces(virConnectPtr conn)
{
11710
    VIR_DEBUG("conn=%p", conn);
11711 11712 11713

    virResetLastError();

11714
    virCheckConnectReturn(conn, -1);
11715

11716
    if (conn->interfaceDriver && conn->interfaceDriver->connectNumOfDefinedInterfaces) {
11717
        int ret;
11718
        ret = conn->interfaceDriver->connectNumOfDefinedInterfaces(conn);
11719 11720 11721 11722 11723
        if (ret < 0)
            goto error;
        return ret;
    }

11724
    virReportUnsupportedError();
11725

11726
 error:
11727
    virDispatchError(conn);
11728 11729 11730
    return -1;
}

11731

11732 11733 11734 11735 11736 11737 11738 11739 11740
/**
 * virConnectListDefinedInterfaces:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of interfaces
 * @maxnames: size of @names
 *
 * Collect the list of defined (inactive) physical host interfaces,
 * and store their names in @names.
 *
11741 11742 11743 11744 11745 11746 11747
 * For more control over the results, see virConnectListAllInterfaces().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a interface can be defined between
 * a call to virConnectNumOfDefinedInterfaces() and this call; you are only
 * guaranteed that all currently defined interfaces were listed if the return
 * is less than @maxnames.  The client must call free() on each returned name.
11748 11749 11750 11751 11752 11753
 */
int
virConnectListDefinedInterfaces(virConnectPtr conn,
                                char **const names,
                                int maxnames)
{
11754
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
11755 11756 11757

    virResetLastError();

11758
    virCheckConnectReturn(conn, -1);
11759 11760
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
11761

11762
    if (conn->interfaceDriver && conn->interfaceDriver->connectListDefinedInterfaces) {
11763
        int ret;
11764
        ret = conn->interfaceDriver->connectListDefinedInterfaces(conn, names, maxnames);
11765 11766 11767 11768 11769
        if (ret < 0)
            goto error;
        return ret;
    }

11770
    virReportUnsupportedError();
11771

11772
 error:
11773
    virDispatchError(conn);
11774 11775 11776
    return -1;
}

11777

D
Daniel Veillard 已提交
11778 11779 11780 11781 11782 11783 11784 11785 11786 11787 11788 11789 11790
/**
 * virInterfaceLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the interface
 *
 * Try to lookup an interface on the given hypervisor based on its name.
 *
 * Returns a new interface object or NULL in case of failure.  If the
 * interface cannot be found, then VIR_ERR_NO_INTERFACE error is raised.
 */
virInterfacePtr
virInterfaceLookupByName(virConnectPtr conn, const char *name)
{
11791
    VIR_DEBUG("conn=%p, name=%s", conn, name);
D
Daniel Veillard 已提交
11792 11793 11794

    virResetLastError();

11795
    virCheckConnectReturn(conn, NULL);
11796
    virCheckNonNullArgGoto(name, error);
D
Daniel Veillard 已提交
11797 11798 11799

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceLookupByName) {
        virInterfacePtr ret;
11800
        ret = conn->interfaceDriver->interfaceLookupByName(conn, name);
D
Daniel Veillard 已提交
11801 11802 11803 11804 11805
        if (!ret)
            goto error;
        return ret;
    }

11806
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11807

11808
 error:
11809
    virDispatchError(conn);
D
Daniel Veillard 已提交
11810 11811 11812
    return NULL;
}

11813

D
Daniel Veillard 已提交
11814 11815 11816 11817 11818 11819 11820 11821 11822 11823 11824 11825 11826
/**
 * virInterfaceLookupByMACString:
 * @conn: pointer to the hypervisor connection
 * @macstr: the MAC for the interface (null-terminated ASCII format)
 *
 * Try to lookup an interface on the given hypervisor based on its MAC.
 *
 * Returns a new interface object or NULL in case of failure.  If the
 * interface cannot be found, then VIR_ERR_NO_INTERFACE error is raised.
 */
virInterfacePtr
virInterfaceLookupByMACString(virConnectPtr conn, const char *macstr)
{
11827
    VIR_DEBUG("conn=%p, macstr=%s", conn, macstr);
D
Daniel Veillard 已提交
11828 11829 11830

    virResetLastError();

11831
    virCheckConnectReturn(conn, NULL);
11832
    virCheckNonNullArgGoto(macstr, error);
D
Daniel Veillard 已提交
11833 11834 11835

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceLookupByMACString) {
        virInterfacePtr ret;
11836
        ret = conn->interfaceDriver->interfaceLookupByMACString(conn, macstr);
D
Daniel Veillard 已提交
11837 11838 11839 11840 11841
        if (!ret)
            goto error;
        return ret;
    }

11842
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11843

11844
 error:
11845
    virDispatchError(conn);
D
Daniel Veillard 已提交
11846 11847 11848
    return NULL;
}

11849

D
Daniel Veillard 已提交
11850 11851
/**
 * virInterfaceGetName:
L
Laine Stump 已提交
11852
 * @iface: an interface object
D
Daniel Veillard 已提交
11853 11854 11855 11856 11857 11858 11859
 *
 * Get the public name for that interface
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the interface object.
 */
const char *
11860
virInterfaceGetName(virInterfacePtr iface)
D
Daniel Veillard 已提交
11861
{
11862
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11863 11864 11865

    virResetLastError();

11866 11867
    virCheckInterfaceReturn(iface, NULL);

11868
    return iface->name;
D
Daniel Veillard 已提交
11869 11870
}

11871

D
Daniel Veillard 已提交
11872 11873
/**
 * virInterfaceGetMACString:
L
Laine Stump 已提交
11874
 * @iface: an interface object
D
Daniel Veillard 已提交
11875
 *
L
Laine Stump 已提交
11876
 * Get the MAC for an interface as string. For more information about
D
Daniel Veillard 已提交
11877 11878 11879 11880 11881 11882 11883
 * MAC see RFC4122.
 *
 * Returns a pointer to the MAC address (in null-terminated ASCII
 * format) or NULL, the string need not be deallocated its lifetime
 * will be the same as the interface object.
 */
const char *
11884
virInterfaceGetMACString(virInterfacePtr iface)
D
Daniel Veillard 已提交
11885
{
11886
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11887 11888 11889

    virResetLastError();

11890 11891
    virCheckInterfaceReturn(iface, NULL);

11892
    return iface->mac;
D
Daniel Veillard 已提交
11893 11894
}

11895

D
Daniel Veillard 已提交
11896 11897
/**
 * virInterfaceGetXMLDesc:
L
Laine Stump 已提交
11898
 * @iface: an interface object
11899
 * @flags: bitwise-OR of extraction flags. Current valid bits:
11900 11901 11902 11903
 *
 *      VIR_INTERFACE_XML_INACTIVE - return the static configuration,
 *                                   suitable for use redefining the
 *                                   interface via virInterfaceDefineXML()
D
Daniel Veillard 已提交
11904
 *
11905 11906 11907 11908 11909
 * Provide an XML description of the interface. If
 * VIR_INTERFACE_XML_INACTIVE is set, the description may be reused
 * later to redefine the interface with virInterfaceDefineXML(). If it
 * is not set, the ip address and netmask will be the current live
 * setting of the interface, not the settings from the config files.
D
Daniel Veillard 已提交
11910 11911 11912 11913 11914
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
11915
virInterfaceGetXMLDesc(virInterfacePtr iface, unsigned int flags)
D
Daniel Veillard 已提交
11916 11917
{
    virConnectPtr conn;
11918
    VIR_DEBUG("iface=%p, flags=%x", iface, flags);
D
Daniel Veillard 已提交
11919 11920 11921

    virResetLastError();

11922
    virCheckInterfaceReturn(iface, NULL);
11923
    conn = iface->conn;
D
Daniel Veillard 已提交
11924 11925 11926

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceGetXMLDesc) {
        char *ret;
11927
        ret = conn->interfaceDriver->interfaceGetXMLDesc(iface, flags);
D
Daniel Veillard 已提交
11928 11929 11930 11931 11932
        if (!ret)
            goto error;
        return ret;
    }

11933
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11934

11935
 error:
11936
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
11937 11938 11939
    return NULL;
}

11940

D
Daniel Veillard 已提交
11941 11942 11943 11944
/**
 * virInterfaceDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xml: the XML description for the interface, preferably in UTF-8
11945
 * @flags: extra flags; not used yet, so callers should always pass 0
D
Daniel Veillard 已提交
11946
 *
11947 11948 11949 11950 11951 11952 11953 11954 11955 11956 11957
 * Define an interface (or modify existing interface configuration).
 *
 * Normally this change in the interface configuration is immediately
 * permanent/persistent, but if virInterfaceChangeBegin() has been
 * previously called (i.e. if an interface config transaction is
 * open), the new interface definition will only become permanent if
 * virInterfaceChangeCommit() is called prior to the next reboot of
 * the system running libvirtd. Prior to that time, it can be
 * explicitly removed using virInterfaceChangeRollback(), or will be
 * automatically removed during the next reboot of the system running
 * libvirtd.
D
Daniel Veillard 已提交
11958 11959 11960 11961 11962 11963
 *
 * Returns NULL in case of error, a pointer to the interface otherwise
 */
virInterfacePtr
virInterfaceDefineXML(virConnectPtr conn, const char *xml, unsigned int flags)
{
11964
    VIR_DEBUG("conn=%p, xml=%s, flags=%x", conn, xml, flags);
D
Daniel Veillard 已提交
11965 11966 11967

    virResetLastError();

11968
    virCheckConnectReturn(conn, NULL);
11969
    virCheckReadOnlyGoto(conn->flags, error);
11970
    virCheckNonNullArgGoto(xml, error);
D
Daniel Veillard 已提交
11971 11972 11973

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceDefineXML) {
        virInterfacePtr ret;
11974
        ret = conn->interfaceDriver->interfaceDefineXML(conn, xml, flags);
D
Daniel Veillard 已提交
11975 11976 11977 11978 11979
        if (!ret)
            goto error;
        return ret;
    }

11980
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11981

11982
 error:
11983
    virDispatchError(conn);
D
Daniel Veillard 已提交
11984 11985 11986
    return NULL;
}

11987

D
Daniel Veillard 已提交
11988 11989
/**
 * virInterfaceUndefine:
11990
 * @iface: pointer to a defined interface
D
Daniel Veillard 已提交
11991 11992 11993 11994
 *
 * Undefine an interface, ie remove it from the config.
 * This does not free the associated virInterfacePtr object.
 *
11995 11996 11997 11998 11999 12000 12001 12002 12003 12004
 * Normally this change in the interface configuration is
 * permanent/persistent, but if virInterfaceChangeBegin() has been
 * previously called (i.e. if an interface config transaction is
 * open), the removal of the interface definition will only become
 * permanent if virInterfaceChangeCommit() is called prior to the next
 * reboot of the system running libvirtd. Prior to that time, the
 * definition can be explicitly restored using
 * virInterfaceChangeRollback(), or will be automatically restored
 * during the next reboot of the system running libvirtd.
 *
D
Daniel Veillard 已提交
12005 12006 12007
 * Returns 0 in case of success, -1 in case of error
 */
int
12008 12009
virInterfaceUndefine(virInterfacePtr iface)
{
D
Daniel Veillard 已提交
12010
    virConnectPtr conn;
12011
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
12012 12013 12014

    virResetLastError();

12015
    virCheckInterfaceReturn(iface, -1);
12016
    conn = iface->conn;
12017

12018
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
12019 12020 12021

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceUndefine) {
        int ret;
12022
        ret = conn->interfaceDriver->interfaceUndefine(iface);
D
Daniel Veillard 已提交
12023 12024 12025 12026 12027
        if (ret < 0)
            goto error;
        return ret;
    }

12028
    virReportUnsupportedError();
D
Daniel Veillard 已提交
12029

12030
 error:
12031
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
12032 12033 12034
    return -1;
}

12035

D
Daniel Veillard 已提交
12036 12037
/**
 * virInterfaceCreate:
12038
 * @iface: pointer to a defined interface
12039
 * @flags: extra flags; not used yet, so callers should always pass 0
D
Daniel Veillard 已提交
12040
 *
12041
 * Activate an interface (i.e. call "ifup").
D
Daniel Veillard 已提交
12042
 *
12043 12044 12045 12046
 * If there was an open network config transaction at the time this
 * interface was defined (that is, if virInterfaceChangeBegin() had
 * been called), the interface will be brought back down (and then
 * undefined) if virInterfaceChangeRollback() is called.
W
Wangyufei (A) 已提交
12047
 *
D
Daniel Veillard 已提交
12048 12049 12050
 * Returns 0 in case of success, -1 in case of error
 */
int
12051
virInterfaceCreate(virInterfacePtr iface, unsigned int flags)
D
Daniel Veillard 已提交
12052 12053
{
    virConnectPtr conn;
12054
    VIR_DEBUG("iface=%p, flags=%x", iface, flags);
D
Daniel Veillard 已提交
12055 12056 12057

    virResetLastError();

12058
    virCheckInterfaceReturn(iface, -1);
12059
    conn = iface->conn;
12060

12061
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
12062 12063 12064

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceCreate) {
        int ret;
12065
        ret = conn->interfaceDriver->interfaceCreate(iface, flags);
D
Daniel Veillard 已提交
12066 12067 12068 12069 12070
        if (ret < 0)
            goto error;
        return ret;
    }

12071
    virReportUnsupportedError();
D
Daniel Veillard 已提交
12072

12073
 error:
12074
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
12075 12076 12077
    return -1;
}

12078

D
Daniel Veillard 已提交
12079 12080
/**
 * virInterfaceDestroy:
12081
 * @iface: an interface object
12082
 * @flags: extra flags; not used yet, so callers should always pass 0
D
Daniel Veillard 已提交
12083 12084 12085 12086 12087
 *
 * deactivate an interface (ie call "ifdown")
 * This does not remove the interface from the config, and
 * does not free the associated virInterfacePtr object.
 *
12088 12089 12090 12091 12092 12093 12094

 * If there is an open network config transaction at the time this
 * interface is destroyed (that is, if virInterfaceChangeBegin() had
 * been called), and if the interface is later undefined and then
 * virInterfaceChangeRollback() is called, the restoral of the
 * interface definition will also bring the interface back up.
 *
D
Daniel Veillard 已提交
12095 12096 12097
 * Returns 0 in case of success and -1 in case of failure.
 */
int
12098
virInterfaceDestroy(virInterfacePtr iface, unsigned int flags)
D
Daniel Veillard 已提交
12099 12100
{
    virConnectPtr conn;
12101
    VIR_DEBUG("iface=%p, flags=%x", iface, flags);
D
Daniel Veillard 已提交
12102 12103 12104

    virResetLastError();

12105
    virCheckInterfaceReturn(iface, -1);
12106
    conn = iface->conn;
12107

12108
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
12109 12110 12111

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceDestroy) {
        int ret;
12112
        ret = conn->interfaceDriver->interfaceDestroy(iface, flags);
D
Daniel Veillard 已提交
12113 12114 12115 12116 12117
        if (ret < 0)
            goto error;
        return ret;
    }

12118
    virReportUnsupportedError();
D
Daniel Veillard 已提交
12119

12120
 error:
12121
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
12122 12123 12124
    return -1;
}

12125

D
Daniel Veillard 已提交
12126 12127
/**
 * virInterfaceRef:
12128
 * @iface: the interface to hold a reference on
D
Daniel Veillard 已提交
12129 12130 12131 12132 12133 12134 12135 12136 12137
 *
 * Increment the reference count on the interface. For each
 * additional call to this method, there shall be a corresponding
 * call to virInterfaceFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
L
Laine Stump 已提交
12138
 * it. ie, each new thread using an interface would increment
D
Daniel Veillard 已提交
12139 12140 12141 12142 12143
 * the reference count.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
12144
virInterfaceRef(virInterfacePtr iface)
D
Daniel Veillard 已提交
12145
{
12146 12147
    VIR_DEBUG("iface=%p refs=%d", iface, iface ? iface->object.u.s.refs : 0);

12148 12149
    virResetLastError();

12150 12151
    virCheckInterfaceReturn(iface, -1);

12152
    virObjectRef(iface);
D
Daniel Veillard 已提交
12153 12154 12155
    return 0;
}

12156

D
Daniel Veillard 已提交
12157 12158
/**
 * virInterfaceFree:
L
Laine Stump 已提交
12159
 * @iface: an interface object
D
Daniel Veillard 已提交
12160 12161 12162 12163 12164 12165 12166
 *
 * Free the interface object. The interface itself is unaltered.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
12167
virInterfaceFree(virInterfacePtr iface)
D
Daniel Veillard 已提交
12168
{
12169
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
12170 12171 12172

    virResetLastError();

12173 12174
    virCheckInterfaceReturn(iface, -1);

12175
    virObjectUnref(iface);
12176
    return 0;
D
Daniel Veillard 已提交
12177 12178
}

12179

12180 12181 12182
/**
 * virInterfaceChangeBegin:
 * @conn: pointer to hypervisor connection
12183
 * @flags: extra flags; not used yet, so callers should always pass 0
12184
 *
Y
Yuri Chornoivan 已提交
12185
 * This function creates a restore point to which one can return
12186 12187
 * later by calling virInterfaceChangeRollback(). This function should
 * be called before any transaction with interface configuration.
Y
Yuri Chornoivan 已提交
12188
 * Once it is known that a new configuration works, it can be committed via
12189 12190 12191 12192 12193 12194 12195 12196 12197 12198 12199
 * virInterfaceChangeCommit(), which frees the restore point.
 *
 * If virInterfaceChangeBegin() is called when a transaction is
 * already opened, this function will fail, and a
 * VIR_ERR_INVALID_OPERATION will be logged.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virInterfaceChangeBegin(virConnectPtr conn, unsigned int flags)
{
12200
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
12201 12202 12203

    virResetLastError();

12204
    virCheckConnectReturn(conn, -1);
12205
    virCheckReadOnlyGoto(conn->flags, error);
12206 12207 12208 12209 12210 12211 12212 12213 12214

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceChangeBegin) {
        int ret;
        ret = conn->interfaceDriver->interfaceChangeBegin(conn, flags);
        if (ret < 0)
           goto error;
        return ret;
    }

12215
    virReportUnsupportedError();
12216

12217
 error:
12218 12219 12220 12221
    virDispatchError(conn);
    return -1;
}

12222

12223 12224 12225
/**
 * virInterfaceChangeCommit:
 * @conn: pointer to hypervisor connection
12226
 * @flags: extra flags; not used yet, so callers should always pass 0
12227 12228 12229 12230 12231 12232 12233 12234 12235 12236 12237 12238 12239
 *
 * This commits the changes made to interfaces and frees the restore point
 * created by virInterfaceChangeBegin().
 *
 * If virInterfaceChangeCommit() is called when a transaction is not
 * opened, this function will fail, and a VIR_ERR_INVALID_OPERATION
 * will be logged.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virInterfaceChangeCommit(virConnectPtr conn, unsigned int flags)
{
12240
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
12241 12242 12243

    virResetLastError();

12244
    virCheckConnectReturn(conn, -1);
12245
    virCheckReadOnlyGoto(conn->flags, error);
12246 12247 12248 12249 12250 12251 12252 12253 12254

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceChangeCommit) {
        int ret;
        ret = conn->interfaceDriver->interfaceChangeCommit(conn, flags);
        if (ret < 0)
           goto error;
        return ret;
    }

12255
    virReportUnsupportedError();
12256

12257
 error:
12258 12259 12260 12261
    virDispatchError(conn);
    return -1;
}

12262

12263 12264 12265
/**
 * virInterfaceChangeRollback:
 * @conn: pointer to hypervisor connection
12266
 * @flags: extra flags; not used yet, so callers should always pass 0
12267 12268 12269 12270 12271 12272 12273 12274 12275 12276 12277 12278 12279
 *
 * This cancels changes made to interfaces settings by restoring previous
 * state created by virInterfaceChangeBegin().
 *
 * If virInterfaceChangeRollback() is called when a transaction is not
 * opened, this function will fail, and a VIR_ERR_INVALID_OPERATION
 * will be logged.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virInterfaceChangeRollback(virConnectPtr conn, unsigned int flags)
{
12280
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
12281 12282 12283

    virResetLastError();

12284
    virCheckConnectReturn(conn, -1);
12285
    virCheckReadOnlyGoto(conn->flags, error);
12286 12287 12288 12289 12290 12291 12292 12293 12294 12295

    if (conn->interfaceDriver &&
        conn->interfaceDriver->interfaceChangeRollback) {
        int ret;
        ret = conn->interfaceDriver->interfaceChangeRollback(conn, flags);
        if (ret < 0)
           goto error;
        return ret;
    }

12296
    virReportUnsupportedError();
12297

12298
 error:
12299 12300 12301 12302
    virDispatchError(conn);
    return -1;
}

12303 12304 12305

/**
 * virStoragePoolGetConnect:
12306
 * @pool: pointer to a pool
12307 12308 12309 12310 12311 12312 12313 12314 12315 12316 12317 12318
 *
 * Provides the connection pointer associated with a storage pool.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the pool object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
12319
virStoragePoolGetConnect(virStoragePoolPtr pool)
12320
{
12321
    VIR_DEBUG("pool=%p", pool);
12322

12323 12324
    virResetLastError();

12325 12326
    virCheckStoragePoolReturn(pool, NULL);

12327 12328 12329
    return pool->conn;
}

12330

12331 12332 12333 12334 12335 12336 12337 12338 12339 12340 12341 12342 12343 12344 12345 12346 12347 12348 12349 12350 12351 12352 12353 12354 12355 12356 12357 12358 12359 12360 12361 12362 12363 12364 12365 12366 12367 12368 12369 12370 12371 12372 12373 12374 12375 12376 12377 12378 12379 12380 12381 12382 12383 12384 12385 12386 12387 12388 12389 12390 12391 12392
/**
 * virConnectListAllStoragePools:
 * @conn: Pointer to the hypervisor connection.
 * @pools: Pointer to a variable to store the array containing storage pool
 *         objects or NULL if the list is not required (just returns number
 *         of pools).
 * @flags: bitwise-OR of virConnectListAllStoragePoolsFlags.
 *
 * Collect the list of storage pools, and allocate an array to store those
 * objects. This API solves the race inherent between
 * virConnectListStoragePools and virConnectListDefinedStoragePools.
 *
 * Normally, all storage pools are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted pools.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a pool, and where all bits
 * within a group describe all possible pools.
 *
 * The first group of @flags is VIR_CONNECT_LIST_STORAGE_POOLS_ACTIVE (online)
 * and VIR_CONNECT_LIST_STORAGE_POOLS_INACTIVE (offline) to filter the pools
 * by state.
 *
 * The second group of @flags is VIR_CONNECT_LIST_STORAGE_POOLS_PERSITENT
 * (defined) and VIR_CONNECT_LIST_STORAGE_POOLS_TRANSIENT (running but not
 * defined), to filter the pools by whether they have persistent config or not.
 *
 * The third group of @flags is VIR_CONNECT_LIST_STORAGE_POOLS_AUTOSTART
 * and VIR_CONNECT_LIST_STORAGE_POOLS_NO_AUTOSTART, to filter the pools by
 * whether they are marked as autostart or not.
 *
 * The last group of @flags is provided to filter the pools by the types,
 * the flags include:
 * VIR_CONNECT_LIST_STORAGE_POOLS_DIR
 * VIR_CONNECT_LIST_STORAGE_POOLS_FS
 * VIR_CONNECT_LIST_STORAGE_POOLS_NETFS
 * VIR_CONNECT_LIST_STORAGE_POOLS_LOGICAL
 * VIR_CONNECT_LIST_STORAGE_POOLS_DISK
 * VIR_CONNECT_LIST_STORAGE_POOLS_ISCSI
 * VIR_CONNECT_LIST_STORAGE_POOLS_SCSI
 * VIR_CONNECT_LIST_STORAGE_POOLS_MPATH
 * VIR_CONNECT_LIST_STORAGE_POOLS_RBD
 * VIR_CONNECT_LIST_STORAGE_POOLS_SHEEPDOG
 *
 * Returns the number of storage pools found or -1 and sets @pools to
 * NULL in case of error.  On success, the array stored into @pools is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virStoragePoolFree() on each array element, then calling
 * free() on @pools.
 */
int
virConnectListAllStoragePools(virConnectPtr conn,
                              virStoragePoolPtr **pools,
                              unsigned int flags)
{
    VIR_DEBUG("conn=%p, pools=%p, flags=%x", conn, pools, flags);

    virResetLastError();

    if (pools)
        *pools = NULL;

12393
    virCheckConnectReturn(conn, -1);
12394 12395

    if (conn->storageDriver &&
12396
        conn->storageDriver->connectListAllStoragePools) {
12397
        int ret;
12398
        ret = conn->storageDriver->connectListAllStoragePools(conn, pools, flags);
12399 12400 12401 12402 12403
        if (ret < 0)
            goto error;
        return ret;
    }

12404
    virReportUnsupportedError();
12405

12406
 error:
12407 12408 12409 12410
    virDispatchError(conn);
    return -1;
}

12411

12412 12413 12414 12415 12416 12417 12418 12419 12420
/**
 * virConnectNumOfStoragePools:
 * @conn: pointer to hypervisor connection
 *
 * Provides the number of active storage pools
 *
 * Returns the number of pools found, or -1 on error
 */
int
O
Osier Yang 已提交
12421
virConnectNumOfStoragePools(virConnectPtr conn)
12422
{
12423
    VIR_DEBUG("conn=%p", conn);
12424

12425 12426
    virResetLastError();

12427
    virCheckConnectReturn(conn, -1);
12428

12429
    if (conn->storageDriver && conn->storageDriver->connectNumOfStoragePools) {
12430
        int ret;
12431
        ret = conn->storageDriver->connectNumOfStoragePools(conn);
12432 12433 12434 12435
        if (ret < 0)
            goto error;
        return ret;
    }
12436

12437
    virReportUnsupportedError();
12438

12439
 error:
12440
    virDispatchError(conn);
12441 12442 12443
    return -1;
}

12444

12445 12446 12447 12448 12449 12450
/**
 * virConnectListStoragePools:
 * @conn: pointer to hypervisor connection
 * @names: array of char * to fill with pool names (allocated by caller)
 * @maxnames: size of the names array
 *
12451 12452 12453 12454 12455
 * Provides the list of names of active storage pools up to maxnames.
 * If there are more than maxnames, the remaining names will be silently
 * ignored.
 *
 * For more control over the results, see virConnectListAllStoragePools().
12456
 *
12457 12458 12459 12460
 * Returns the number of pools found or -1 in case of error.  Note that
 * this command is inherently racy; a pool can be started between a call to
 * virConnectNumOfStoragePools() and this call; you are only guaranteed
 * that all currently active pools were listed if the return is less than
J
John Ferlan 已提交
12461
 * @maxnames. The client must call free() on each returned name.
12462 12463
 */
int
O
Osier Yang 已提交
12464 12465 12466
virConnectListStoragePools(virConnectPtr conn,
                           char **const names,
                           int maxnames)
12467
{
12468
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
12469

12470 12471
    virResetLastError();

12472
    virCheckConnectReturn(conn, -1);
12473 12474
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
12475

12476
    if (conn->storageDriver && conn->storageDriver->connectListStoragePools) {
12477
        int ret;
12478
        ret = conn->storageDriver->connectListStoragePools(conn, names, maxnames);
12479 12480 12481 12482
        if (ret < 0)
            goto error;
        return ret;
    }
12483

12484
    virReportUnsupportedError();
12485

12486
 error:
12487
    virDispatchError(conn);
12488
    return -1;
12489 12490 12491 12492 12493 12494 12495 12496 12497 12498 12499 12500 12501 12502
}


/**
 * virConnectNumOfDefinedStoragePools:
 * @conn: pointer to hypervisor connection
 *
 * Provides the number of inactive storage pools
 *
 * Returns the number of pools found, or -1 on error
 */
int
virConnectNumOfDefinedStoragePools(virConnectPtr conn)
{
12503
    VIR_DEBUG("conn=%p", conn);
12504

12505 12506
    virResetLastError();

12507
    virCheckConnectReturn(conn, -1);
12508

12509
    if (conn->storageDriver && conn->storageDriver->connectNumOfDefinedStoragePools) {
12510
        int ret;
12511
        ret = conn->storageDriver->connectNumOfDefinedStoragePools(conn);
12512 12513 12514 12515
        if (ret < 0)
            goto error;
        return ret;
    }
12516

12517
    virReportUnsupportedError();
12518

12519
 error:
12520
    virDispatchError(conn);
12521 12522 12523 12524 12525 12526 12527 12528 12529 12530
    return -1;
}


/**
 * virConnectListDefinedStoragePools:
 * @conn: pointer to hypervisor connection
 * @names: array of char * to fill with pool names (allocated by caller)
 * @maxnames: size of the names array
 *
12531 12532 12533
 * Provides the list of names of inactive storage pools up to maxnames.
 * If there are more than maxnames, the remaining names will be silently
 * ignored.
12534
 *
12535 12536 12537 12538 12539 12540 12541
 * For more control over the results, see virConnectListAllStoragePools().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a pool can be defined between
 * a call to virConnectNumOfDefinedStoragePools() and this call; you are only
 * guaranteed that all currently defined pools were listed if the return
 * is less than @maxnames.  The client must call free() on each returned name.
12542 12543 12544 12545 12546 12547
 */
int
virConnectListDefinedStoragePools(virConnectPtr conn,
                                  char **const names,
                                  int maxnames)
{
12548
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
12549

12550 12551
    virResetLastError();

12552
    virCheckConnectReturn(conn, -1);
12553 12554
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
12555

12556
    if (conn->storageDriver && conn->storageDriver->connectListDefinedStoragePools) {
12557
        int ret;
12558
        ret = conn->storageDriver->connectListDefinedStoragePools(conn, names, maxnames);
12559 12560 12561 12562
        if (ret < 0)
            goto error;
        return ret;
    }
12563

12564
    virReportUnsupportedError();
12565

12566
 error:
12567
    virDispatchError(conn);
12568 12569 12570 12571
    return -1;
}


12572 12573 12574 12575 12576
/**
 * virConnectFindStoragePoolSources:
 * @conn: pointer to hypervisor connection
 * @type: type of storage pool sources to discover
 * @srcSpec: XML document specifying discovery source
12577
 * @flags: extra flags; not used yet, so callers should always pass 0
12578 12579 12580 12581 12582 12583 12584 12585 12586 12587 12588 12589 12590 12591 12592 12593 12594 12595 12596 12597 12598
 *
 * Talks to a storage backend and attempts to auto-discover the set of
 * available storage pool sources. e.g. For iSCSI this would be a set of
 * iSCSI targets. For NFS this would be a list of exported paths.  The
 * srcSpec (optional for some storage pool types, e.g. local ones) is
 * an instance of the storage pool's source element specifying where
 * to look for the pools.
 *
 * srcSpec is not required for some types (e.g., those querying
 * local storage resources only)
 *
 * Returns an xml document consisting of a SourceList element
 * containing a source document appropriate to the given pool
 * type for each discovered source.
 */
char *
virConnectFindStoragePoolSources(virConnectPtr conn,
                                 const char *type,
                                 const char *srcSpec,
                                 unsigned int flags)
{
12599
    VIR_DEBUG("conn=%p, type=%s, src=%s, flags=%x",
O
Osier Yang 已提交
12600
              conn, NULLSTR(type), NULLSTR(srcSpec), flags);
12601 12602 12603

    virResetLastError();

12604
    virCheckConnectReturn(conn, NULL);
12605
    virCheckNonNullArgGoto(type, error);
12606
    virCheckReadOnlyGoto(conn->flags, error);
12607

12608
    if (conn->storageDriver && conn->storageDriver->connectFindStoragePoolSources) {
12609
        char *ret;
12610
        ret = conn->storageDriver->connectFindStoragePoolSources(conn, type, srcSpec, flags);
12611 12612 12613 12614
        if (!ret)
            goto error;
        return ret;
    }
12615

12616
    virReportUnsupportedError();
12617

12618
 error:
12619
    virDispatchError(conn);
12620 12621 12622 12623
    return NULL;
}


12624 12625 12626 12627 12628 12629 12630 12631 12632 12633 12634 12635 12636
/**
 * virStoragePoolLookupByName:
 * @conn: pointer to hypervisor connection
 * @name: name of pool to fetch
 *
 * Fetch a storage pool based on its unique name
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByName(virConnectPtr conn,
                           const char *name)
{
12637
    VIR_DEBUG("conn=%p, name=%s", conn, name);
12638

12639 12640
    virResetLastError();

12641
    virCheckConnectReturn(conn, NULL);
12642
    virCheckNonNullArgGoto(name, error);
12643

12644
    if (conn->storageDriver && conn->storageDriver->storagePoolLookupByName) {
12645
        virStoragePoolPtr ret;
12646
        ret = conn->storageDriver->storagePoolLookupByName(conn, name);
12647 12648 12649 12650
        if (!ret)
            goto error;
        return ret;
    }
12651

12652
    virReportUnsupportedError();
12653

12654
 error:
12655
    virDispatchError(conn);
12656 12657 12658 12659 12660 12661 12662 12663 12664 12665 12666 12667 12668 12669 12670 12671 12672
    return NULL;
}


/**
 * virStoragePoolLookupByUUID:
 * @conn: pointer to hypervisor connection
 * @uuid: globally unique id of pool to fetch
 *
 * Fetch a storage pool based on its globally unique id
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByUUID(virConnectPtr conn,
                           const unsigned char *uuid)
{
12673
    VIR_UUID_DEBUG(conn, uuid);
12674

12675 12676
    virResetLastError();

12677
    virCheckConnectReturn(conn, NULL);
12678
    virCheckNonNullArgGoto(uuid, error);
12679

12680
    if (conn->storageDriver && conn->storageDriver->storagePoolLookupByUUID) {
12681
        virStoragePoolPtr ret;
12682
        ret = conn->storageDriver->storagePoolLookupByUUID(conn, uuid);
12683 12684 12685 12686
        if (!ret)
            goto error;
        return ret;
    }
12687

12688
    virReportUnsupportedError();
12689

12690
 error:
12691
    virDispatchError(conn);
12692
    return NULL;
12693 12694 12695 12696 12697 12698 12699 12700 12701 12702 12703 12704 12705 12706
}


/**
 * virStoragePoolLookupByUUIDString:
 * @conn: pointer to hypervisor connection
 * @uuidstr: globally unique id of pool to fetch
 *
 * Fetch a storage pool based on its globally unique id
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByUUIDString(virConnectPtr conn,
12707
                                 const char *uuidstr)
12708 12709
{
    unsigned char uuid[VIR_UUID_BUFLEN];
12710
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
12711

12712 12713
    virResetLastError();

12714
    virCheckConnectReturn(conn, NULL);
12715
    virCheckNonNullArgGoto(uuidstr, error);
12716 12717

    if (virUUIDParse(uuidstr, uuid) < 0) {
12718 12719 12720
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
12721
        goto error;
12722 12723 12724
    }

    return virStoragePoolLookupByUUID(conn, uuid);
12725

12726
 error:
12727
    virDispatchError(conn);
12728
    return NULL;
12729 12730 12731 12732 12733 12734 12735 12736 12737 12738 12739 12740 12741 12742
}


/**
 * virStoragePoolLookupByVolume:
 * @vol: pointer to storage volume
 *
 * Fetch a storage pool which contains a particular volume
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByVolume(virStorageVolPtr vol)
{
12743
    VIR_DEBUG("vol=%p", vol);
12744

12745 12746
    virResetLastError();

12747
    virCheckStorageVolReturn(vol, NULL);
12748

12749
    if (vol->conn->storageDriver && vol->conn->storageDriver->storagePoolLookupByVolume) {
12750
        virStoragePoolPtr ret;
12751
        ret = vol->conn->storageDriver->storagePoolLookupByVolume(vol);
12752 12753 12754 12755
        if (!ret)
            goto error;
        return ret;
    }
12756

12757
    virReportUnsupportedError();
12758

12759
 error:
12760
    virDispatchError(vol->conn);
12761
    return NULL;
12762 12763
}

12764

12765 12766 12767 12768
/**
 * virStoragePoolCreateXML:
 * @conn: pointer to hypervisor connection
 * @xmlDesc: XML description for new pool
12769
 * @flags: extra flags; not used yet, so callers should always pass 0
12770 12771
 *
 * Create a new storage based on its XML description. The
D
Daniel Veillard 已提交
12772
 * pool is not persistent, so its definition will disappear
12773 12774 12775 12776 12777 12778 12779 12780 12781
 * when it is destroyed, or if the host is restarted
 *
 * Returns a virStoragePoolPtr object, or NULL if creation failed
 */
virStoragePoolPtr
virStoragePoolCreateXML(virConnectPtr conn,
                        const char *xmlDesc,
                        unsigned int flags)
{
E
Eric Blake 已提交
12782
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
12783

12784 12785
    virResetLastError();

12786
    virCheckConnectReturn(conn, NULL);
12787
    virCheckNonNullArgGoto(xmlDesc, error);
12788
    virCheckReadOnlyGoto(conn->flags, error);
12789

12790
    if (conn->storageDriver && conn->storageDriver->storagePoolCreateXML) {
12791
        virStoragePoolPtr ret;
12792
        ret = conn->storageDriver->storagePoolCreateXML(conn, xmlDesc, flags);
12793 12794 12795 12796
        if (!ret)
            goto error;
        return ret;
    }
12797

12798
    virReportUnsupportedError();
12799

12800
 error:
12801
    virDispatchError(conn);
12802 12803 12804
    return NULL;
}

12805

12806 12807 12808 12809
/**
 * virStoragePoolDefineXML:
 * @conn: pointer to hypervisor connection
 * @xml: XML description for new pool
12810
 * @flags: extra flags; not used yet, so callers should always pass 0
12811 12812
 *
 * Define a new inactive storage pool based on its XML description. The
D
Daniel Veillard 已提交
12813
 * pool is persistent, until explicitly undefined.
12814 12815 12816 12817 12818 12819 12820 12821
 *
 * Returns a virStoragePoolPtr object, or NULL if creation failed
 */
virStoragePoolPtr
virStoragePoolDefineXML(virConnectPtr conn,
                        const char *xml,
                        unsigned int flags)
{
E
Eric Blake 已提交
12822
    VIR_DEBUG("conn=%p, xml=%s, flags=%x", conn, xml, flags);
12823

12824 12825
    virResetLastError();

12826
    virCheckConnectReturn(conn, NULL);
12827
    virCheckReadOnlyGoto(conn->flags, error);
12828
    virCheckNonNullArgGoto(xml, error);
12829

12830
    if (conn->storageDriver && conn->storageDriver->storagePoolDefineXML) {
12831
        virStoragePoolPtr ret;
12832
        ret = conn->storageDriver->storagePoolDefineXML(conn, xml, flags);
12833 12834 12835 12836
        if (!ret)
            goto error;
        return ret;
    }
12837

12838
    virReportUnsupportedError();
12839

12840
 error:
12841
    virDispatchError(conn);
12842
    return NULL;
12843 12844
}

12845

12846 12847 12848
/**
 * virStoragePoolBuild:
 * @pool: pointer to storage pool
12849
 * @flags: bitwise-OR of virStoragePoolBuildFlags
O
Osier Yang 已提交
12850 12851 12852
 *
 * Currently only filesystem pool accepts flags VIR_STORAGE_POOL_BUILD_OVERWRITE
 * and VIR_STORAGE_POOL_BUILD_NO_OVERWRITE.
12853 12854 12855 12856 12857 12858 12859 12860 12861 12862
 *
 * Build the underlying storage pool
 *
 * Returns 0 on success, or -1 upon failure
 */
int
virStoragePoolBuild(virStoragePoolPtr pool,
                    unsigned int flags)
{
    virConnectPtr conn;
12863
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
12864

12865 12866
    virResetLastError();

12867
    virCheckStoragePoolReturn(pool, -1);
12868
    conn = pool->conn;
12869

12870
    virCheckReadOnlyGoto(conn->flags, error);
12871

12872
    if (conn->storageDriver && conn->storageDriver->storagePoolBuild) {
12873
        int ret;
12874
        ret = conn->storageDriver->storagePoolBuild(pool, flags);
12875 12876 12877 12878
        if (ret < 0)
            goto error;
        return ret;
    }
12879

12880
    virReportUnsupportedError();
12881

12882
 error:
12883
    virDispatchError(pool->conn);
12884
    return -1;
12885 12886 12887 12888 12889 12890 12891 12892 12893
}


/**
 * virStoragePoolUndefine:
 * @pool: pointer to storage pool
 *
 * Undefine an inactive storage pool
 *
12894
 * Returns 0 on success, -1 on failure
12895 12896 12897 12898 12899
 */
int
virStoragePoolUndefine(virStoragePoolPtr pool)
{
    virConnectPtr conn;
12900
    VIR_DEBUG("pool=%p", pool);
12901

12902 12903
    virResetLastError();

12904
    virCheckStoragePoolReturn(pool, -1);
12905
    conn = pool->conn;
12906

12907
    virCheckReadOnlyGoto(conn->flags, error);
12908

12909
    if (conn->storageDriver && conn->storageDriver->storagePoolUndefine) {
12910
        int ret;
12911
        ret = conn->storageDriver->storagePoolUndefine(pool);
12912 12913 12914 12915
        if (ret < 0)
            goto error;
        return ret;
    }
12916

12917
    virReportUnsupportedError();
12918

12919
 error:
12920
    virDispatchError(pool->conn);
12921
    return -1;
12922 12923 12924 12925 12926 12927
}


/**
 * virStoragePoolCreate:
 * @pool: pointer to storage pool
12928
 * @flags: extra flags; not used yet, so callers should always pass 0
12929 12930 12931 12932 12933 12934 12935 12936 12937 12938
 *
 * Starts an inactive storage pool
 *
 * Returns 0 on success, or -1 if it could not be started
 */
int
virStoragePoolCreate(virStoragePoolPtr pool,
                     unsigned int flags)
{
    virConnectPtr conn;
E
Eric Blake 已提交
12939
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
12940

12941 12942
    virResetLastError();

12943
    virCheckStoragePoolReturn(pool, -1);
12944
    conn = pool->conn;
12945

12946
    virCheckReadOnlyGoto(conn->flags, error);
12947

12948
    if (conn->storageDriver && conn->storageDriver->storagePoolCreate) {
12949
        int ret;
12950
        ret = conn->storageDriver->storagePoolCreate(pool, flags);
12951 12952 12953 12954
        if (ret < 0)
            goto error;
        return ret;
    }
12955

12956
    virReportUnsupportedError();
12957

12958
 error:
12959
    virDispatchError(pool->conn);
12960
    return -1;
12961 12962 12963 12964 12965 12966 12967 12968 12969 12970 12971 12972 12973 12974 12975 12976 12977 12978 12979
}


/**
 * virStoragePoolDestroy:
 * @pool: pointer to storage pool
 *
 * Destroy an active storage pool. This will deactivate the
 * pool on the host, but keep any persistent config associated
 * with it. If it has a persistent config it can later be
 * restarted with virStoragePoolCreate(). This does not free
 * the associated virStoragePoolPtr object.
 *
 * Returns 0 on success, or -1 if it could not be destroyed
 */
int
virStoragePoolDestroy(virStoragePoolPtr pool)
{
    virConnectPtr conn;
12980
    VIR_DEBUG("pool=%p", pool);
12981

12982 12983
    virResetLastError();

12984
    virCheckStoragePoolReturn(pool, -1);
12985
    conn = pool->conn;
12986

12987
    virCheckReadOnlyGoto(conn->flags, error);
12988

12989
    if (conn->storageDriver && conn->storageDriver->storagePoolDestroy) {
12990
        int ret;
12991
        ret = conn->storageDriver->storagePoolDestroy(pool);
12992 12993 12994 12995
        if (ret < 0)
            goto error;
        return ret;
    }
12996

12997
    virReportUnsupportedError();
12998

12999
 error:
13000
    virDispatchError(pool->conn);
13001 13002 13003
    return -1;
}

13004

13005 13006 13007
/**
 * virStoragePoolDelete:
 * @pool: pointer to storage pool
13008
 * @flags: bitwise-OR of virStoragePoolDeleteFlags
13009 13010 13011 13012 13013 13014 13015 13016 13017 13018 13019 13020
 *
 * Delete the underlying pool resources. This is
 * a non-recoverable operation. The virStoragePoolPtr object
 * itself is not free'd.
 *
 * Returns 0 on success, or -1 if it could not be obliterate
 */
int
virStoragePoolDelete(virStoragePoolPtr pool,
                     unsigned int flags)
{
    virConnectPtr conn;
13021
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
13022

13023 13024
    virResetLastError();

13025
    virCheckStoragePoolReturn(pool, -1);
13026
    conn = pool->conn;
13027

13028
    virCheckReadOnlyGoto(conn->flags, error);
13029

13030
    if (conn->storageDriver && conn->storageDriver->storagePoolDelete) {
13031
        int ret;
13032
        ret = conn->storageDriver->storagePoolDelete(pool, flags);
13033 13034 13035 13036
        if (ret < 0)
            goto error;
        return ret;
    }
13037

13038
    virReportUnsupportedError();
13039

13040
 error:
13041
    virDispatchError(pool->conn);
13042 13043 13044 13045 13046 13047 13048 13049 13050 13051 13052 13053 13054 13055 13056 13057
    return -1;
}


/**
 * virStoragePoolFree:
 * @pool: pointer to storage pool
 *
 * Free a storage pool object, releasing all memory associated with
 * it. Does not change the state of the pool on the host.
 *
 * Returns 0 on success, or -1 if it could not be free'd.
 */
int
virStoragePoolFree(virStoragePoolPtr pool)
{
13058
    VIR_DEBUG("pool=%p", pool);
13059

13060 13061
    virResetLastError();

13062 13063
    virCheckStoragePoolReturn(pool, -1);

13064
    virObjectUnref(pool);
13065
    return 0;
13066 13067 13068 13069

}


13070 13071
/**
 * virStoragePoolRef:
D
Daniel Veillard 已提交
13072
 * @pool: the pool to hold a reference on
13073 13074 13075 13076 13077 13078 13079 13080 13081 13082 13083
 *
 * Increment the reference count on the pool. For each
 * additional call to this method, there shall be a corresponding
 * call to virStoragePoolFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a pool would increment
 * the reference count.
D
Daniel Veillard 已提交
13084 13085
 *
 * Returns 0 in case of success, -1 in case of failure.
13086 13087 13088 13089
 */
int
virStoragePoolRef(virStoragePoolPtr pool)
{
13090 13091
    VIR_DEBUG("pool=%p refs=%d", pool, pool ? pool->object.u.s.refs : 0);

13092 13093
    virResetLastError();

13094 13095
    virCheckStoragePoolReturn(pool, -1);

13096
    virObjectRef(pool);
13097 13098 13099
    return 0;
}

13100

13101 13102 13103
/**
 * virStoragePoolRefresh:
 * @pool: pointer to storage pool
13104
 * @flags: extra flags; not used yet, so callers should always pass 0
13105 13106 13107 13108 13109
 *
 * Request that the pool refresh its list of volumes. This may
 * involve communicating with a remote server, and/or initializing
 * new devices at the OS layer
 *
13110
 * Returns 0 if the volume list was refreshed, -1 on failure
13111 13112 13113 13114 13115 13116
 */
int
virStoragePoolRefresh(virStoragePoolPtr pool,
                      unsigned int flags)
{
    virConnectPtr conn;
E
Eric Blake 已提交
13117
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
13118

13119 13120
    virResetLastError();

13121
    virCheckStoragePoolReturn(pool, -1);
13122
    conn = pool->conn;
13123

13124
    virCheckReadOnlyGoto(conn->flags, error);
13125

13126
    if (conn->storageDriver && conn->storageDriver->storagePoolRefresh) {
13127
        int ret;
13128
        ret = conn->storageDriver->storagePoolRefresh(pool, flags);
13129 13130 13131 13132
        if (ret < 0)
            goto error;
        return ret;
    }
13133

13134
    virReportUnsupportedError();
13135

13136
 error:
13137
    virDispatchError(pool->conn);
13138 13139 13140 13141 13142 13143 13144 13145 13146 13147
    return -1;
}


/**
 * virStoragePoolGetName:
 * @pool: pointer to storage pool
 *
 * Fetch the locally unique name of the storage pool
 *
13148
 * Returns the name of the pool, or NULL on error
13149 13150 13151 13152
 */
const char*
virStoragePoolGetName(virStoragePoolPtr pool)
{
13153
    VIR_DEBUG("pool=%p", pool);
13154

13155 13156
    virResetLastError();

13157 13158
    virCheckStoragePoolReturn(pool, NULL);

13159
    return pool->name;
13160 13161 13162 13163 13164 13165 13166 13167 13168 13169
}


/**
 * virStoragePoolGetUUID:
 * @pool: pointer to storage pool
 * @uuid: buffer of VIR_UUID_BUFLEN bytes in size
 *
 * Fetch the globally unique ID of the storage pool
 *
13170
 * Returns 0 on success, or -1 on error;
13171 13172 13173 13174 13175
 */
int
virStoragePoolGetUUID(virStoragePoolPtr pool,
                      unsigned char *uuid)
{
13176
    VIR_DEBUG("pool=%p, uuid=%p", pool, uuid);
13177

13178 13179
    virResetLastError();

13180
    virCheckStoragePoolReturn(pool, -1);
13181
    virCheckNonNullArgGoto(uuid, error);
13182 13183 13184

    memcpy(uuid, &pool->uuid[0], VIR_UUID_BUFLEN);

13185
    return 0;
13186

13187
 error:
13188
    virDispatchError(pool->conn);
13189
    return -1;
13190 13191
}

13192

13193 13194 13195 13196 13197 13198 13199
/**
 * virStoragePoolGetUUIDString:
 * @pool: pointer to storage pool
 * @buf: buffer of VIR_UUID_STRING_BUFLEN bytes in size
 *
 * Fetch the globally unique ID of the storage pool as a string
 *
13200
 * Returns 0 on success, or -1 on error;
13201 13202 13203 13204 13205
 */
int
virStoragePoolGetUUIDString(virStoragePoolPtr pool,
                            char *buf)
{
13206
    VIR_DEBUG("pool=%p, buf=%p", pool, buf);
13207

13208 13209
    virResetLastError();

13210
    virCheckStoragePoolReturn(pool, -1);
13211
    virCheckNonNullArgGoto(buf, error);
13212

E
Eric Blake 已提交
13213
    virUUIDFormat(pool->uuid, buf);
13214
    return 0;
13215

13216
 error:
13217
    virDispatchError(pool->conn);
13218
    return -1;
13219 13220 13221 13222 13223 13224 13225 13226 13227 13228 13229
}


/**
 * virStoragePoolGetInfo:
 * @pool: pointer to storage pool
 * @info: pointer at which to store info
 *
 * Get volatile information about the storage pool
 * such as free space / usage summary
 *
13230
 * Returns 0 on success, or -1 on failure.
13231 13232 13233 13234 13235 13236
 */
int
virStoragePoolGetInfo(virStoragePoolPtr pool,
                      virStoragePoolInfoPtr info)
{
    virConnectPtr conn;
13237
    VIR_DEBUG("pool=%p, info=%p", pool, info);
13238

13239 13240
    virResetLastError();

13241 13242 13243
    if (info)
        memset(info, 0, sizeof(*info));

13244
    virCheckStoragePoolReturn(pool, -1);
13245
    virCheckNonNullArgGoto(info, error);
13246 13247 13248

    conn = pool->conn;

13249
    if (conn->storageDriver->storagePoolGetInfo) {
13250
        int ret;
13251
        ret = conn->storageDriver->storagePoolGetInfo(pool, info);
13252 13253 13254 13255
        if (ret < 0)
            goto error;
        return ret;
    }
13256

13257
    virReportUnsupportedError();
13258

13259
 error:
13260
    virDispatchError(pool->conn);
13261
    return -1;
13262 13263 13264 13265 13266 13267
}


/**
 * virStoragePoolGetXMLDesc:
 * @pool: pointer to storage pool
13268
 * @flags: bitwise-OR of virStorageXMLFlags
13269 13270 13271 13272 13273
 *
 * Fetch an XML document describing all aspects of the
 * storage pool. This is suitable for later feeding back
 * into the virStoragePoolCreateXML method.
 *
13274
 * Returns a XML document, or NULL on error
13275 13276 13277 13278 13279 13280
 */
char *
virStoragePoolGetXMLDesc(virStoragePoolPtr pool,
                         unsigned int flags)
{
    virConnectPtr conn;
13281
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
13282

13283 13284
    virResetLastError();

13285
    virCheckStoragePoolReturn(pool, NULL);
13286 13287
    conn = pool->conn;

13288
    if (conn->storageDriver && conn->storageDriver->storagePoolGetXMLDesc) {
13289
        char *ret;
13290
        ret = conn->storageDriver->storagePoolGetXMLDesc(pool, flags);
13291 13292 13293 13294
        if (!ret)
            goto error;
        return ret;
    }
13295

13296
    virReportUnsupportedError();
13297

13298
 error:
13299
    virDispatchError(pool->conn);
13300
    return NULL;
13301 13302 13303 13304 13305 13306 13307 13308 13309 13310 13311
}


/**
 * virStoragePoolGetAutostart:
 * @pool: pointer to storage pool
 * @autostart: location in which to store autostart flag
 *
 * Fetches the value of the autostart flag, which determines
 * whether the pool is automatically started at boot time
 *
13312
 * Returns 0 on success, -1 on failure
13313 13314 13315 13316 13317 13318
 */
int
virStoragePoolGetAutostart(virStoragePoolPtr pool,
                           int *autostart)
{
    virConnectPtr conn;
13319
    VIR_DEBUG("pool=%p, autostart=%p", pool, autostart);
13320

13321 13322
    virResetLastError();

13323
    virCheckStoragePoolReturn(pool, -1);
13324
    virCheckNonNullArgGoto(autostart, error);
13325 13326 13327

    conn = pool->conn;

13328
    if (conn->storageDriver && conn->storageDriver->storagePoolGetAutostart) {
13329
        int ret;
13330
        ret = conn->storageDriver->storagePoolGetAutostart(pool, autostart);
13331 13332 13333 13334
        if (ret < 0)
            goto error;
        return ret;
    }
13335

13336
    virReportUnsupportedError();
13337

13338
 error:
13339
    virDispatchError(pool->conn);
13340 13341 13342 13343 13344 13345 13346 13347 13348 13349 13350
    return -1;
}


/**
 * virStoragePoolSetAutostart:
 * @pool: pointer to storage pool
 * @autostart: new flag setting
 *
 * Sets the autostart flag
 *
13351
 * Returns 0 on success, -1 on failure
13352 13353 13354 13355 13356 13357
 */
int
virStoragePoolSetAutostart(virStoragePoolPtr pool,
                           int autostart)
{
    virConnectPtr conn;
13358
    VIR_DEBUG("pool=%p, autostart=%d", pool, autostart);
13359

13360 13361
    virResetLastError();

13362
    virCheckStoragePoolReturn(pool, -1);
13363 13364
    conn = pool->conn;

13365 13366
    virCheckReadOnlyGoto(conn->flags, error);

13367
    if (conn->storageDriver && conn->storageDriver->storagePoolSetAutostart) {
13368
        int ret;
13369
        ret = conn->storageDriver->storagePoolSetAutostart(pool, autostart);
13370 13371 13372 13373
        if (ret < 0)
            goto error;
        return ret;
    }
13374

13375
    virReportUnsupportedError();
13376

13377
 error:
13378
    virDispatchError(pool->conn);
13379 13380 13381
    return -1;
}

13382

13383 13384 13385 13386 13387 13388 13389 13390 13391 13392 13393 13394 13395 13396 13397 13398 13399 13400 13401 13402 13403 13404 13405 13406 13407 13408 13409
/**
 * virStoragePoolListAllVolumes:
 * @pool: Pointer to storage pool
 * @vols: Pointer to a variable to store the array containing storage volume
 *        objects or NULL if the list is not required (just returns number
 *        of volumes).
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Collect the list of storage volumes, and allocate an array to store those
 * objects.
 *
 * Returns the number of storage volumes found or -1 and sets @vols to
 * NULL in case of error.  On success, the array stored into @vols is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virStorageVolFree() on each array element, then calling
 * free() on @vols.
 */
int
virStoragePoolListAllVolumes(virStoragePoolPtr pool,
                             virStorageVolPtr **vols,
                             unsigned int flags)
{
    VIR_DEBUG("pool=%p, vols=%p, flags=%x", pool, vols, flags);

    virResetLastError();

13410
    virCheckStoragePoolReturn(pool, -1);
13411 13412

    if (pool->conn->storageDriver &&
13413
        pool->conn->storageDriver->storagePoolListAllVolumes) {
13414
        int ret;
13415
        ret = pool->conn->storageDriver->storagePoolListAllVolumes(pool, vols, flags);
13416 13417 13418 13419 13420
        if (ret < 0)
            goto error;
        return ret;
    }

13421
    virReportUnsupportedError();
13422

13423
 error:
13424 13425 13426
    virDispatchError(pool->conn);
    return -1;
}
13427

13428

13429 13430 13431 13432 13433 13434 13435 13436 13437 13438 13439
/**
 * virStoragePoolNumOfVolumes:
 * @pool: pointer to storage pool
 *
 * Fetch the number of storage volumes within a pool
 *
 * Returns the number of storage pools, or -1 on failure
 */
int
virStoragePoolNumOfVolumes(virStoragePoolPtr pool)
{
13440
    VIR_DEBUG("pool=%p", pool);
13441

13442 13443
    virResetLastError();

13444
    virCheckStoragePoolReturn(pool, -1);
13445

13446
    if (pool->conn->storageDriver && pool->conn->storageDriver->storagePoolNumOfVolumes) {
13447
        int ret;
13448
        ret = pool->conn->storageDriver->storagePoolNumOfVolumes(pool);
13449 13450 13451 13452
        if (ret < 0)
            goto error;
        return ret;
    }
13453

13454
    virReportUnsupportedError();
13455

13456
 error:
13457
    virDispatchError(pool->conn);
13458 13459 13460 13461 13462 13463 13464 13465 13466 13467 13468 13469 13470
    return -1;
}


/**
 * virStoragePoolListVolumes:
 * @pool: pointer to storage pool
 * @names: array in which to storage volume names
 * @maxnames: size of names array
 *
 * Fetch list of storage volume names, limiting to
 * at most maxnames.
 *
13471 13472
 * To list the volume objects directly, see virStoragePoolListAllVolumes().
 *
13473 13474 13475 13476 13477 13478 13479
 * Returns the number of names fetched, or -1 on error
 */
int
virStoragePoolListVolumes(virStoragePoolPtr pool,
                          char **const names,
                          int maxnames)
{
13480
    VIR_DEBUG("pool=%p, names=%p, maxnames=%d", pool, names, maxnames);
13481

13482 13483
    virResetLastError();

13484
    virCheckStoragePoolReturn(pool, -1);
13485 13486
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
13487

13488
    if (pool->conn->storageDriver && pool->conn->storageDriver->storagePoolListVolumes) {
13489
        int ret;
13490
        ret = pool->conn->storageDriver->storagePoolListVolumes(pool, names, maxnames);
13491 13492 13493 13494
        if (ret < 0)
            goto error;
        return ret;
    }
13495

13496
    virReportUnsupportedError();
13497

13498
 error:
13499
    virDispatchError(pool->conn);
13500 13501 13502 13503 13504 13505
    return -1;
}


/**
 * virStorageVolGetConnect:
13506
 * @vol: pointer to a pool
13507 13508 13509 13510 13511 13512 13513 13514 13515 13516 13517 13518
 *
 * Provides the connection pointer associated with a storage volume.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the volume object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
13519
virStorageVolGetConnect(virStorageVolPtr vol)
13520
{
13521
    VIR_DEBUG("vol=%p", vol);
13522

13523 13524
    virResetLastError();

13525 13526
    virCheckStorageVolReturn(vol, NULL);

13527 13528 13529 13530 13531 13532 13533 13534 13535 13536 13537 13538
    return vol->conn;
}


/**
 * virStorageVolLookupByName:
 * @pool: pointer to storage pool
 * @name: name of storage volume
 *
 * Fetch a pointer to a storage volume based on its name
 * within a pool
 *
13539
 * Returns a storage volume, or NULL if not found / error
13540 13541 13542 13543 13544
 */
virStorageVolPtr
virStorageVolLookupByName(virStoragePoolPtr pool,
                          const char *name)
{
13545
    VIR_DEBUG("pool=%p, name=%s", pool, name);
13546

13547 13548
    virResetLastError();

13549
    virCheckStoragePoolReturn(pool, NULL);
13550
    virCheckNonNullArgGoto(name, error);
13551

13552
    if (pool->conn->storageDriver && pool->conn->storageDriver->storageVolLookupByName) {
13553
        virStorageVolPtr ret;
13554
        ret = pool->conn->storageDriver->storageVolLookupByName(pool, name);
13555 13556 13557 13558
        if (!ret)
            goto error;
        return ret;
    }
13559

13560
    virReportUnsupportedError();
13561

13562
 error:
13563
    virDispatchError(pool->conn);
13564 13565 13566 13567 13568 13569 13570 13571 13572 13573 13574 13575
    return NULL;
}


/**
 * virStorageVolLookupByKey:
 * @conn: pointer to hypervisor connection
 * @key: globally unique key
 *
 * Fetch a pointer to a storage volume based on its
 * globally unique key
 *
13576
 * Returns a storage volume, or NULL if not found / error
13577 13578 13579 13580 13581
 */
virStorageVolPtr
virStorageVolLookupByKey(virConnectPtr conn,
                         const char *key)
{
13582
    VIR_DEBUG("conn=%p, key=%s", conn, key);
13583

13584 13585
    virResetLastError();

13586
    virCheckConnectReturn(conn, NULL);
13587
    virCheckNonNullArgGoto(key, error);
13588

13589
    if (conn->storageDriver && conn->storageDriver->storageVolLookupByKey) {
13590
        virStorageVolPtr ret;
13591
        ret = conn->storageDriver->storageVolLookupByKey(conn, key);
13592 13593 13594 13595
        if (!ret)
            goto error;
        return ret;
    }
13596

13597
    virReportUnsupportedError();
13598

13599
 error:
13600
    virDispatchError(conn);
13601 13602 13603
    return NULL;
}

13604

13605 13606 13607 13608 13609 13610 13611 13612
/**
 * virStorageVolLookupByPath:
 * @conn: pointer to hypervisor connection
 * @path: locally unique path
 *
 * Fetch a pointer to a storage volume based on its
 * locally (host) unique path
 *
13613
 * Returns a storage volume, or NULL if not found / error
13614 13615 13616 13617 13618
 */
virStorageVolPtr
virStorageVolLookupByPath(virConnectPtr conn,
                          const char *path)
{
13619
    VIR_DEBUG("conn=%p, path=%s", conn, path);
13620

13621 13622
    virResetLastError();

13623
    virCheckConnectReturn(conn, NULL);
13624
    virCheckNonNullArgGoto(path, error);
13625

13626
    if (conn->storageDriver && conn->storageDriver->storageVolLookupByPath) {
13627
        virStorageVolPtr ret;
13628
        ret = conn->storageDriver->storageVolLookupByPath(conn, path);
13629 13630 13631 13632
        if (!ret)
            goto error;
        return ret;
    }
13633

13634
    virReportUnsupportedError();
13635

13636
 error:
13637
    virDispatchError(conn);
13638 13639 13640 13641 13642 13643 13644 13645 13646 13647 13648
    return NULL;
}


/**
 * virStorageVolGetName:
 * @vol: pointer to storage volume
 *
 * Fetch the storage volume name. This is unique
 * within the scope of a pool
 *
13649
 * Returns the volume name, or NULL on error
13650 13651 13652 13653
 */
const char*
virStorageVolGetName(virStorageVolPtr vol)
{
13654
    VIR_DEBUG("vol=%p", vol);
13655

13656 13657
    virResetLastError();

13658 13659
    virCheckStorageVolReturn(vol, NULL);

13660
    return vol->name;
13661 13662 13663 13664 13665 13666 13667 13668
}


/**
 * virStorageVolGetKey:
 * @vol: pointer to storage volume
 *
 * Fetch the storage volume key. This is globally
13669
 * unique, so the same volume will have the same
13670 13671
 * key no matter what host it is accessed from
 *
13672
 * Returns the volume key, or NULL on error
13673 13674 13675 13676
 */
const char*
virStorageVolGetKey(virStorageVolPtr vol)
{
13677
    VIR_DEBUG("vol=%p", vol);
13678

13679 13680
    virResetLastError();

13681 13682
    virCheckStorageVolReturn(vol, NULL);

13683
    return vol->key;
13684 13685 13686 13687 13688 13689
}


/**
 * virStorageVolCreateXML:
 * @pool: pointer to storage pool
E
Eric Blake 已提交
13690
 * @xmlDesc: description of volume to create
13691
 * @flags: bitwise-OR of virStorageVolCreateFlags
13692 13693 13694
 *
 * Create a storage volume within a pool based
 * on an XML description. Not all pools support
13695 13696 13697 13698 13699 13700
 * creation of volumes.
 *
 * Since 1.0.1 VIR_STORAGE_VOL_CREATE_PREALLOC_METADATA
 * in flags can be used to get higher performance with
 * qcow2 image files which don't support full preallocation,
 * by creating a sparse image file with metadata.
13701
 *
13702
 * Returns the storage volume, or NULL on error
13703 13704 13705
 */
virStorageVolPtr
virStorageVolCreateXML(virStoragePoolPtr pool,
E
Eric Blake 已提交
13706
                       const char *xmlDesc,
13707 13708
                       unsigned int flags)
{
E
Eric Blake 已提交
13709
    VIR_DEBUG("pool=%p, xmlDesc=%s, flags=%x", pool, xmlDesc, flags);
13710

13711 13712
    virResetLastError();

13713
    virCheckStoragePoolReturn(pool, NULL);
E
Eric Blake 已提交
13714
    virCheckNonNullArgGoto(xmlDesc, error);
13715
    virCheckReadOnlyGoto(pool->conn->flags, error);
13716

13717
    if (pool->conn->storageDriver && pool->conn->storageDriver->storageVolCreateXML) {
13718
        virStorageVolPtr ret;
13719
        ret = pool->conn->storageDriver->storageVolCreateXML(pool, xmlDesc, flags);
13720 13721 13722 13723
        if (!ret)
            goto error;
        return ret;
    }
13724

13725
    virReportUnsupportedError();
13726

13727
 error:
13728
    virDispatchError(pool->conn);
13729 13730 13731 13732
    return NULL;
}


13733 13734 13735
/**
 * virStorageVolCreateXMLFrom:
 * @pool: pointer to parent pool for the new volume
E
Eric Blake 已提交
13736
 * @xmlDesc: description of volume to create
13737
 * @clonevol: storage volume to use as input
13738
 * @flags: bitwise-OR of virStorageVolCreateFlags
13739 13740 13741 13742 13743 13744
 *
 * Create a storage volume in the parent pool, using the
 * 'clonevol' volume as input. Information for the new
 * volume (name, perms)  are passed via a typical volume
 * XML description.
 *
13745 13746 13747 13748 13749
 * Since 1.0.1 VIR_STORAGE_VOL_CREATE_PREALLOC_METADATA
 * in flags can be used to get higher performance with
 * qcow2 image files which don't support full preallocation,
 * by creating a sparse image file with metadata.
 *
13750
 * Returns the storage volume, or NULL on error
13751 13752 13753
 */
virStorageVolPtr
virStorageVolCreateXMLFrom(virStoragePoolPtr pool,
E
Eric Blake 已提交
13754
                           const char *xmlDesc,
13755 13756 13757
                           virStorageVolPtr clonevol,
                           unsigned int flags)
{
E
Eric Blake 已提交
13758 13759
    VIR_DEBUG("pool=%p, xmlDesc=%s, clonevol=%p, flags=%x",
              pool, xmlDesc, clonevol, flags);
13760 13761 13762

    virResetLastError();

13763
    virCheckStoragePoolReturn(pool, NULL);
13764
    virCheckStorageVolGoto(clonevol, error);
E
Eric Blake 已提交
13765
    virCheckNonNullArgGoto(xmlDesc, error);
13766
    virCheckReadOnlyGoto(pool->conn->flags | clonevol->conn->flags, error);
13767 13768

    if (pool->conn->storageDriver &&
13769
        pool->conn->storageDriver->storageVolCreateXMLFrom) {
13770
        virStorageVolPtr ret;
13771
        ret = pool->conn->storageDriver->storageVolCreateXMLFrom(pool, xmlDesc,
13772
                                                          clonevol, flags);
13773 13774 13775 13776 13777
        if (!ret)
            goto error;
        return ret;
    }

13778
    virReportUnsupportedError();
13779

13780
 error:
13781
    virDispatchError(pool->conn);
13782 13783 13784 13785
    return NULL;
}


13786 13787 13788 13789 13790 13791
/**
 * virStorageVolDownload:
 * @vol: pointer to volume to download from
 * @stream: stream to use as output
 * @offset: position in @vol to start reading from
 * @length: limit on amount of data to download
13792
 * @flags: extra flags; not used yet, so callers should always pass 0
13793 13794 13795 13796 13797 13798 13799 13800 13801 13802 13803 13804 13805 13806 13807 13808 13809 13810 13811 13812
 *
 * Download the content of the volume as a stream. If @length
 * is zero, then the remaining contents of the volume after
 * @offset will be downloaded.
 *
 * This call sets up an asynchronous stream; subsequent use of
 * stream APIs is necessary to transfer the actual data,
 * determine how much data is successfully transferred, and
 * detect any errors. The results will be unpredictable if
 * another active stream is writing to the storage volume.
 *
 * Returns 0, or -1 upon error.
 */
int
virStorageVolDownload(virStorageVolPtr vol,
                      virStreamPtr stream,
                      unsigned long long offset,
                      unsigned long long length,
                      unsigned int flags)
{
E
Eric Blake 已提交
13813
    VIR_DEBUG("vol=%p, stream=%p, offset=%llu, length=%llu, flags=%x",
13814 13815 13816 13817
              vol, stream, offset, length, flags);

    virResetLastError();

13818
    virCheckStorageVolReturn(vol, -1);
13819 13820
    virCheckStreamGoto(stream, error);
    virCheckReadOnlyGoto(vol->conn->flags, error);
13821

13822 13823 13824 13825 13826
    if (vol->conn != stream->conn) {
        virReportInvalidArg(stream,
                            _("stream in %s must match connection of volume '%s'"),
                            __FUNCTION__, vol->name);
        goto error;
13827 13828 13829
    }

    if (vol->conn->storageDriver &&
13830
        vol->conn->storageDriver->storageVolDownload) {
13831
        int ret;
13832
        ret = vol->conn->storageDriver->storageVolDownload(vol,
O
Osier Yang 已提交
13833 13834 13835 13836
                                                           stream,
                                                           offset,
                                                           length,
                                                           flags);
13837 13838 13839 13840 13841
        if (ret < 0)
            goto error;
        return ret;
    }

13842
    virReportUnsupportedError();
13843

13844
 error:
13845 13846 13847 13848 13849 13850 13851 13852 13853 13854 13855
    virDispatchError(vol->conn);
    return -1;
}


/**
 * virStorageVolUpload:
 * @vol: pointer to volume to upload
 * @stream: stream to use as input
 * @offset: position to start writing to
 * @length: limit on amount of data to upload
13856
 * @flags: extra flags; not used yet, so callers should always pass 0
13857 13858 13859 13860 13861 13862 13863 13864 13865 13866 13867 13868 13869 13870 13871 13872 13873 13874 13875 13876 13877 13878
 *
 * Upload new content to the volume from a stream. This call
 * will fail if @offset + @length exceeds the size of the
 * volume. Otherwise, if @length is non-zero, an error
 * will be raised if an attempt is made to upload greater
 * than @length bytes of data.
 *
 * This call sets up an asynchronous stream; subsequent use of
 * stream APIs is necessary to transfer the actual data,
 * determine how much data is successfully transferred, and
 * detect any errors. The results will be unpredictable if
 * another active stream is writing to the storage volume.
 *
 * Returns 0, or -1 upon error.
 */
int
virStorageVolUpload(virStorageVolPtr vol,
                    virStreamPtr stream,
                    unsigned long long offset,
                    unsigned long long length,
                    unsigned int flags)
{
E
Eric Blake 已提交
13879
    VIR_DEBUG("vol=%p, stream=%p, offset=%llu, length=%llu, flags=%x",
13880 13881 13882 13883
              vol, stream, offset, length, flags);

    virResetLastError();

13884
    virCheckStorageVolReturn(vol, -1);
13885 13886
    virCheckStreamGoto(stream, error);
    virCheckReadOnlyGoto(vol->conn->flags, error);
13887

13888 13889 13890 13891 13892
    if (vol->conn != stream->conn) {
        virReportInvalidArg(stream,
                            _("stream in %s must match connection of volume '%s'"),
                            __FUNCTION__, vol->name);
        goto error;
13893 13894 13895
    }

    if (vol->conn->storageDriver &&
13896
        vol->conn->storageDriver->storageVolUpload) {
13897
        int ret;
13898
        ret = vol->conn->storageDriver->storageVolUpload(vol,
13899 13900 13901 13902 13903 13904 13905 13906 13907
                                                  stream,
                                                  offset,
                                                  length,
                                                  flags);
        if (ret < 0)
            goto error;
        return ret;
    }

13908
    virReportUnsupportedError();
13909

13910
 error:
13911 13912 13913 13914 13915
    virDispatchError(vol->conn);
    return -1;
}


13916 13917 13918
/**
 * virStorageVolDelete:
 * @vol: pointer to storage volume
13919
 * @flags: extra flags; not used yet, so callers should always pass 0
13920 13921 13922
 *
 * Delete the storage volume from the pool
 *
13923
 * Returns 0 on success, or -1 on error
13924 13925 13926 13927 13928 13929
 */
int
virStorageVolDelete(virStorageVolPtr vol,
                    unsigned int flags)
{
    virConnectPtr conn;
13930
    VIR_DEBUG("vol=%p, flags=%x", vol, flags);
13931

13932 13933
    virResetLastError();

13934
    virCheckStorageVolReturn(vol, -1);
13935
    conn = vol->conn;
13936

13937
    virCheckReadOnlyGoto(conn->flags, error);
13938

13939
    if (conn->storageDriver && conn->storageDriver->storageVolDelete) {
13940
        int ret;
13941
        ret = conn->storageDriver->storageVolDelete(vol, flags);
13942 13943 13944 13945
        if (ret < 0)
            goto error;
        return ret;
    }
13946

13947
    virReportUnsupportedError();
13948

13949
 error:
13950
    virDispatchError(vol->conn);
13951 13952 13953 13954
    return -1;
}


13955 13956 13957
/**
 * virStorageVolWipe:
 * @vol: pointer to storage volume
13958
 * @flags: extra flags; not used yet, so callers should always pass 0
13959 13960 13961 13962 13963 13964 13965 13966 13967 13968
 *
 * Ensure data previously on a volume is not accessible to future reads
 *
 * Returns 0 on success, or -1 on error
 */
int
virStorageVolWipe(virStorageVolPtr vol,
                  unsigned int flags)
{
    virConnectPtr conn;
13969
    VIR_DEBUG("vol=%p, flags=%x", vol, flags);
13970 13971 13972

    virResetLastError();

13973
    virCheckStorageVolReturn(vol, -1);
13974
    conn = vol->conn;
13975

13976
    virCheckReadOnlyGoto(conn->flags, error);
13977

13978
    if (conn->storageDriver && conn->storageDriver->storageVolWipe) {
13979
        int ret;
13980
        ret = conn->storageDriver->storageVolWipe(vol, flags);
13981 13982 13983 13984 13985 13986
        if (ret < 0) {
            goto error;
        }
        return ret;
    }

13987
    virReportUnsupportedError();
13988

13989
 error:
13990 13991 13992 13993 13994
    virDispatchError(vol->conn);
    return -1;
}


13995 13996 13997 13998 13999 14000 14001 14002 14003 14004 14005 14006 14007 14008 14009 14010 14011 14012 14013 14014 14015
/**
 * virStorageVolWipePattern:
 * @vol: pointer to storage volume
 * @algorithm: one of virStorageVolWipeAlgorithm
 * @flags: future flags, use 0 for now
 *
 * Similar to virStorageVolWipe, but one can choose
 * between different wiping algorithms.
 *
 * Returns 0 on success, or -1 on error.
 */
int
virStorageVolWipePattern(virStorageVolPtr vol,
                         unsigned int algorithm,
                         unsigned int flags)
{
    virConnectPtr conn;
    VIR_DEBUG("vol=%p, algorithm=%u, flags=%x", vol, algorithm, flags);

    virResetLastError();

14016
    virCheckStorageVolReturn(vol, -1);
14017
    conn = vol->conn;
14018

14019
    virCheckReadOnlyGoto(conn->flags, error);
14020

14021
    if (conn->storageDriver && conn->storageDriver->storageVolWipePattern) {
14022
        int ret;
14023
        ret = conn->storageDriver->storageVolWipePattern(vol, algorithm, flags);
14024 14025 14026 14027 14028 14029
        if (ret < 0) {
            goto error;
        }
        return ret;
    }

14030
    virReportUnsupportedError();
14031

14032
 error:
14033 14034 14035 14036
    virDispatchError(vol->conn);
    return -1;
}

14037

14038 14039 14040 14041 14042
/**
 * virStorageVolFree:
 * @vol: pointer to storage volume
 *
 * Release the storage volume handle. The underlying
14043
 * storage volume continues to exist.
14044
 *
14045
 * Returns 0 on success, or -1 on error
14046 14047 14048 14049
 */
int
virStorageVolFree(virStorageVolPtr vol)
{
14050
    VIR_DEBUG("vol=%p", vol);
14051

14052 14053
    virResetLastError();

14054 14055
    virCheckStorageVolReturn(vol, -1);

14056
    virObjectUnref(vol);
14057
    return 0;
14058 14059 14060
}


14061 14062
/**
 * virStorageVolRef:
D
Daniel Veillard 已提交
14063
 * @vol: the vol to hold a reference on
14064 14065 14066 14067 14068 14069 14070 14071 14072 14073 14074
 *
 * Increment the reference count on the vol. For each
 * additional call to this method, there shall be a corresponding
 * call to virStorageVolFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a vol would increment
 * the reference count.
D
Daniel Veillard 已提交
14075 14076
 *
 * Returns 0 in case of success, -1 in case of failure.
14077 14078 14079 14080
 */
int
virStorageVolRef(virStorageVolPtr vol)
{
14081 14082
    VIR_DEBUG("vol=%p refs=%d", vol, vol ? vol->object.u.s.refs : 0);

14083 14084
    virResetLastError();

14085 14086
    virCheckStorageVolReturn(vol, -1);

14087
    virObjectRef(vol);
14088 14089 14090
    return 0;
}

14091

14092 14093 14094 14095 14096 14097 14098 14099
/**
 * virStorageVolGetInfo:
 * @vol: pointer to storage volume
 * @info: pointer at which to store info
 *
 * Fetches volatile information about the storage
 * volume such as its current allocation
 *
14100
 * Returns 0 on success, or -1 on failure
14101 14102 14103 14104 14105 14106
 */
int
virStorageVolGetInfo(virStorageVolPtr vol,
                     virStorageVolInfoPtr info)
{
    virConnectPtr conn;
14107
    VIR_DEBUG("vol=%p, info=%p", vol, info);
14108

14109 14110
    virResetLastError();

14111 14112 14113
    if (info)
        memset(info, 0, sizeof(*info));

14114
    virCheckStorageVolReturn(vol, -1);
14115
    virCheckNonNullArgGoto(info, error);
14116 14117 14118

    conn = vol->conn;

14119
    if (conn->storageDriver->storageVolGetInfo){
14120
        int ret;
14121
        ret = conn->storageDriver->storageVolGetInfo(vol, info);
14122 14123 14124 14125
        if (ret < 0)
            goto error;
        return ret;
    }
14126

14127
    virReportUnsupportedError();
14128

14129
 error:
14130
    virDispatchError(vol->conn);
14131 14132 14133 14134 14135 14136 14137
    return -1;
}


/**
 * virStorageVolGetXMLDesc:
 * @vol: pointer to storage volume
14138
 * @flags: extra flags; not used yet, so callers should always pass 0
14139 14140 14141 14142
 *
 * Fetch an XML document describing all aspects of
 * the storage volume
 *
14143
 * Returns the XML document, or NULL on error
14144 14145 14146 14147 14148 14149
 */
char *
virStorageVolGetXMLDesc(virStorageVolPtr vol,
                        unsigned int flags)
{
    virConnectPtr conn;
14150
    VIR_DEBUG("vol=%p, flags=%x", vol, flags);
14151

14152 14153
    virResetLastError();

14154
    virCheckStorageVolReturn(vol, NULL);
14155 14156
    conn = vol->conn;

14157
    if (conn->storageDriver && conn->storageDriver->storageVolGetXMLDesc) {
14158
        char *ret;
14159
        ret = conn->storageDriver->storageVolGetXMLDesc(vol, flags);
14160 14161 14162 14163
        if (!ret)
            goto error;
        return ret;
    }
14164

14165
    virReportUnsupportedError();
14166

14167
 error:
14168
    virDispatchError(vol->conn);
14169
    return NULL;
14170 14171 14172 14173 14174 14175 14176 14177 14178 14179 14180 14181 14182
}


/**
 * virStorageVolGetPath:
 * @vol: pointer to storage volume
 *
 * Fetch the storage volume path. Depending on the pool
 * configuration this is either persistent across hosts,
 * or dynamically assigned at pool startup. Consult
 * pool documentation for information on getting the
 * persistent naming
 *
14183 14184
 * Returns the storage volume path, or NULL on error. The
 * caller must free() the returned path after use.
14185 14186 14187 14188 14189
 */
char *
virStorageVolGetPath(virStorageVolPtr vol)
{
    virConnectPtr conn;
14190
    VIR_DEBUG("vol=%p", vol);
14191

14192 14193
    virResetLastError();

14194
    virCheckStorageVolReturn(vol, NULL);
14195 14196
    conn = vol->conn;

14197
    if (conn->storageDriver && conn->storageDriver->storageVolGetPath) {
14198
        char *ret;
14199
        ret = conn->storageDriver->storageVolGetPath(vol);
14200 14201 14202 14203
        if (!ret)
            goto error;
        return ret;
    }
14204

14205
    virReportUnsupportedError();
14206

14207
 error:
14208
    virDispatchError(vol->conn);
14209 14210
    return NULL;
}
14211

14212

14213 14214 14215 14216 14217 14218 14219 14220 14221
/**
 * virStorageVolResize:
 * @vol: pointer to storage volume
 * @capacity: new capacity, in bytes
 * @flags: bitwise-OR of virStorageVolResizeFlags
 *
 * Changes the capacity of the storage volume @vol to @capacity. The
 * operation will fail if the new capacity requires allocation that would
 * exceed the remaining free space in the parent pool.  The contents of
14222 14223
 * the new capacity will appear as all zero bytes. The capacity value will
 * be rounded to the granularity supported by the hypervisor.
14224 14225 14226 14227 14228 14229 14230 14231
 *
 * Normally, the operation will attempt to affect capacity with a minimum
 * impact on allocation (that is, the default operation favors a sparse
 * resize).  If @flags contains VIR_STORAGE_VOL_RESIZE_ALLOCATE, then the
 * operation will ensure that allocation is sufficient for the new
 * capacity; this may make the operation take noticeably longer.
 *
 * Normally, the operation treats @capacity as the new size in bytes;
A
Alex Jia 已提交
14232
 * but if @flags contains VIR_STORAGE_VOL_RESIZE_DELTA, then @capacity
14233 14234 14235 14236 14237
 * represents the size difference to add to the current size.  It is
 * up to the storage pool implementation whether unaligned requests are
 * rounded up to the next valid boundary, or rejected.
 *
 * Normally, this operation should only be used to enlarge capacity;
A
Alex Jia 已提交
14238
 * but if @flags contains VIR_STORAGE_VOL_RESIZE_SHRINK, it is possible to
14239
 * attempt a reduction in capacity even though it might cause data loss.
A
Alex Jia 已提交
14240
 * If VIR_STORAGE_VOL_RESIZE_DELTA is also present, then @capacity is
E
Eric Blake 已提交
14241 14242 14243
 * subtracted from the current size; without it, @capacity represents
 * the absolute new size regardless of whether it is larger or smaller
 * than the current size.
14244 14245 14246 14247 14248
 *
 * Returns 0 on success, or -1 on error.
 */
int
virStorageVolResize(virStorageVolPtr vol,
E
Eric Blake 已提交
14249
                    unsigned long long capacity,
14250 14251 14252
                    unsigned int flags)
{
    virConnectPtr conn;
E
Eric Blake 已提交
14253
    VIR_DEBUG("vol=%p capacity=%llu flags=%x", vol, capacity, flags);
14254 14255 14256

    virResetLastError();

14257
    virCheckStorageVolReturn(vol, -1);
14258 14259
    conn = vol->conn;

14260
    virCheckReadOnlyGoto(conn->flags, error);
14261

E
Eric Blake 已提交
14262 14263 14264
    /* Zero capacity is only valid with either delta or shrink.  */
    if (capacity == 0 && !((flags & VIR_STORAGE_VOL_RESIZE_DELTA) ||
                           (flags & VIR_STORAGE_VOL_RESIZE_SHRINK))) {
14265
        virReportInvalidArg(capacity,
14266 14267
                            _("capacity in %s cannot be zero without 'delta' "
                              "or 'shrink' flags set"),
14268
                            __FUNCTION__);
14269 14270 14271
        goto error;
    }

14272
    if (conn->storageDriver && conn->storageDriver->storageVolResize) {
14273
        int ret;
14274
        ret = conn->storageDriver->storageVolResize(vol, capacity, flags);
14275 14276 14277 14278 14279
        if (ret < 0)
            goto error;
        return ret;
    }

14280
    virReportUnsupportedError();
14281

14282
 error:
14283 14284 14285
    virDispatchError(vol->conn);
    return -1;
}
14286

14287

14288 14289 14290 14291
/**
 * virNodeNumOfDevices:
 * @conn: pointer to the hypervisor connection
 * @cap: capability name
14292
 * @flags: extra flags; not used yet, so callers should always pass 0
14293 14294 14295 14296 14297 14298 14299 14300 14301 14302 14303
 *
 * Provides the number of node devices.
 *
 * If the optional 'cap'  argument is non-NULL, then the count
 * will be restricted to devices with the specified capability
 *
 * Returns the number of node devices or -1 in case of error
 */
int
virNodeNumOfDevices(virConnectPtr conn, const char *cap, unsigned int flags)
{
14304
    VIR_DEBUG("conn=%p, cap=%s, flags=%x", conn, NULLSTR(cap), flags);
14305

14306 14307
    virResetLastError();

14308
    virCheckConnectReturn(conn, -1);
14309

14310
    if (conn->nodeDeviceDriver && conn->nodeDeviceDriver->nodeNumOfDevices) {
14311
        int ret;
14312
        ret = conn->nodeDeviceDriver->nodeNumOfDevices(conn, cap, flags);
14313 14314 14315 14316
        if (ret < 0)
            goto error;
        return ret;
    }
14317

14318
    virReportUnsupportedError();
14319

14320
 error:
14321
    virDispatchError(conn);
14322 14323 14324
    return -1;
}

14325

14326 14327 14328 14329 14330 14331 14332 14333 14334 14335 14336 14337 14338 14339 14340 14341 14342 14343 14344 14345 14346 14347 14348 14349 14350 14351 14352 14353
/**
 * virConnectListAllNodeDevices:
 * @conn: Pointer to the hypervisor connection.
 * @devices: Pointer to a variable to store the array containing the node
 *           device objects or NULL if the list is not required (just returns
 *           number of node devices).
 * @flags: bitwise-OR of virConnectListAllNodeDevices.
 *
 * Collect the list of node devices, and allocate an array to store those
 * objects.
 *
 * Normally, all node devices are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted node devices.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a node device, and where all bits
 * within a group describe all possible node devices.
 *
 * Only one group of the @flags is provided to filter the node devices by
 * capability type, flags include:
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SYSTEM
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_PCI_DEV
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_USB_DEV
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_USB_INTERFACE
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_NET
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI_HOST
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI_TARGET
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_STORAGE
14354 14355
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_FC_HOST
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_VPORTS
14356
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI_GENERIC
14357 14358 14359 14360 14361 14362 14363 14364 14365 14366 14367 14368 14369 14370 14371 14372 14373 14374 14375 14376
 *
 * Returns the number of node devices found or -1 and sets @devices to NULL in
 * case of error.  On success, the array stored into @devices is guaranteed to
 * have an extra allocated element set to NULL but not included in the return
 * count, to make iteration easier.  The caller is responsible for calling
 * virNodeDeviceFree() on each array element, then calling free() on
 * @devices.
 */
int
virConnectListAllNodeDevices(virConnectPtr conn,
                             virNodeDevicePtr **devices,
                             unsigned int flags)
{
    VIR_DEBUG("conn=%p, devices=%p, flags=%x", conn, devices, flags);

    virResetLastError();

    if (devices)
        *devices = NULL;

14377
    virCheckConnectReturn(conn, -1);
14378

14379 14380
    if (conn->nodeDeviceDriver &&
        conn->nodeDeviceDriver->connectListAllNodeDevices) {
14381
        int ret;
14382
        ret = conn->nodeDeviceDriver->connectListAllNodeDevices(conn, devices, flags);
14383 14384 14385 14386 14387
        if (ret < 0)
            goto error;
        return ret;
    }

14388
    virReportUnsupportedError();
14389

14390
 error:
14391 14392 14393
    virDispatchError(conn);
    return -1;
}
14394

14395

14396 14397 14398 14399 14400 14401
/**
 * virNodeListDevices:
 * @conn: pointer to the hypervisor connection
 * @cap: capability name
 * @names: array to collect the list of node device names
 * @maxnames: size of @names
14402
 * @flags: extra flags; not used yet, so callers should always pass 0
14403 14404 14405
 *
 * Collect the list of node devices, and store their names in @names
 *
14406 14407
 * For more control over the results, see virConnectListAllNodeDevices().
 *
14408 14409 14410 14411 14412 14413 14414 14415 14416 14417 14418
 * If the optional 'cap'  argument is non-NULL, then the count
 * will be restricted to devices with the specified capability
 *
 * Returns the number of node devices found or -1 in case of error
 */
int
virNodeListDevices(virConnectPtr conn,
                   const char *cap,
                   char **const names, int maxnames,
                   unsigned int flags)
{
14419
    VIR_DEBUG("conn=%p, cap=%s, names=%p, maxnames=%d, flags=%x",
14420 14421
          conn, cap, names, maxnames, flags);

14422 14423
    virResetLastError();

14424
    virCheckConnectReturn(conn, -1);
14425 14426
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
14427

14428
    if (conn->nodeDeviceDriver && conn->nodeDeviceDriver->nodeListDevices) {
14429
        int ret;
14430
        ret = conn->nodeDeviceDriver->nodeListDevices(conn, cap, names, maxnames, flags);
14431 14432 14433 14434
        if (ret < 0)
            goto error;
        return ret;
    }
14435

14436
    virReportUnsupportedError();
14437

14438
 error:
14439
    virDispatchError(conn);
14440 14441 14442 14443 14444 14445 14446 14447 14448 14449 14450 14451 14452
    return -1;
}


/**
 * virNodeDeviceLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: unique device name
 *
 * Lookup a node device by its name.
 *
 * Returns a virNodeDevicePtr if found, NULL otherwise.
 */
14453 14454
virNodeDevicePtr
virNodeDeviceLookupByName(virConnectPtr conn, const char *name)
14455
{
14456
    VIR_DEBUG("conn=%p, name=%p", conn, name);
14457

14458 14459
    virResetLastError();

14460
    virCheckConnectReturn(conn, NULL);
14461
    virCheckNonNullArgGoto(name, error);
14462

14463
    if (conn->nodeDeviceDriver && conn->nodeDeviceDriver->nodeDeviceLookupByName) {
14464
        virNodeDevicePtr ret;
14465
        ret = conn->nodeDeviceDriver->nodeDeviceLookupByName(conn, name);
14466 14467 14468 14469
        if (!ret)
            goto error;
        return ret;
    }
14470

14471
    virReportUnsupportedError();
14472

14473
 error:
14474
    virDispatchError(conn);
14475 14476 14477
    return NULL;
}

14478

14479 14480 14481 14482 14483 14484 14485 14486 14487 14488 14489 14490 14491 14492 14493 14494 14495 14496 14497 14498 14499
/**
 * virNodeDeviceLookupSCSIHostByWWN:
 * @conn: pointer to the hypervisor connection
 * @wwnn: WWNN of the SCSI Host.
 * @wwpn: WWPN of the SCSI Host.
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Lookup SCSI Host which is capable with 'fc_host' by its WWNN and WWPN.
 *
 * Returns a virNodeDevicePtr if found, NULL otherwise.
 */
virNodeDevicePtr
virNodeDeviceLookupSCSIHostByWWN(virConnectPtr conn,
                                 const char *wwnn,
                                 const char *wwpn,
                                 unsigned int flags)
{
    VIR_DEBUG("conn=%p, wwnn=%p, wwpn=%p, flags=%x", conn, wwnn, wwpn, flags);

    virResetLastError();

14500
    virCheckConnectReturn(conn, NULL);
14501 14502 14503
    virCheckNonNullArgGoto(wwnn, error);
    virCheckNonNullArgGoto(wwpn, error);

14504 14505
    if (conn->nodeDeviceDriver &&
        conn->nodeDeviceDriver->nodeDeviceLookupSCSIHostByWWN) {
14506
        virNodeDevicePtr ret;
14507
        ret = conn->nodeDeviceDriver->nodeDeviceLookupSCSIHostByWWN(conn, wwnn,
14508 14509 14510 14511 14512 14513
                                                             wwpn, flags);
        if (!ret)
            goto error;
        return ret;
    }

14514
    virReportUnsupportedError();
14515

14516
 error:
14517 14518 14519
    virDispatchError(conn);
    return NULL;
}
14520

14521

14522 14523 14524
/**
 * virNodeDeviceGetXMLDesc:
 * @dev: pointer to the node device
14525
 * @flags: extra flags; not used yet, so callers should always pass 0
14526 14527 14528 14529
 *
 * Fetch an XML document describing all aspects of
 * the device.
 *
14530
 * Returns the XML document, or NULL on error
14531
 */
14532 14533
char *
virNodeDeviceGetXMLDesc(virNodeDevicePtr dev, unsigned int flags)
14534
{
E
Eric Blake 已提交
14535
    VIR_DEBUG("dev=%p, conn=%p, flags=%x", dev, dev ? dev->conn : NULL, flags);
14536

14537 14538
    virResetLastError();

14539
    virCheckNodeDeviceReturn(dev, NULL);
14540

14541
    if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceGetXMLDesc) {
14542
        char *ret;
14543
        ret = dev->conn->nodeDeviceDriver->nodeDeviceGetXMLDesc(dev, flags);
14544 14545 14546 14547
        if (!ret)
            goto error;
        return ret;
    }
14548

14549
    virReportUnsupportedError();
14550

14551
 error:
14552
    virDispatchError(dev->conn);
14553 14554 14555 14556 14557 14558 14559 14560
    return NULL;
}


/**
 * virNodeDeviceGetName:
 * @dev: the device
 *
D
Daniel Veillard 已提交
14561 14562 14563
 * Just return the device name
 *
 * Returns the device name or NULL in case of error
14564
 */
14565 14566
const char *
virNodeDeviceGetName(virNodeDevicePtr dev)
14567
{
14568
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14569

14570 14571
    virResetLastError();

14572
    virCheckNodeDeviceReturn(dev, NULL);
14573 14574 14575 14576

    return dev->name;
}

14577

14578 14579 14580 14581
/**
 * virNodeDeviceGetParent:
 * @dev: the device
 *
D
Daniel Veillard 已提交
14582 14583
 * Accessor for the parent of the device
 *
14584 14585
 * Returns the name of the device's parent, or NULL if an
 * error occurred or when the device has no parent.
14586
 */
14587 14588
const char *
virNodeDeviceGetParent(virNodeDevicePtr dev)
14589
{
14590
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14591

14592 14593
    virResetLastError();

14594
    virCheckNodeDeviceReturn(dev, NULL);
14595

14596
    if (!dev->parent) {
14597 14598
        if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceGetParent) {
            dev->parent = dev->conn->nodeDeviceDriver->nodeDeviceGetParent(dev);
14599
        } else {
14600
            virReportUnsupportedError();
14601
            virDispatchError(dev->conn);
14602 14603 14604 14605
            return NULL;
        }
    }
    return dev->parent;
14606 14607
}

14608

14609 14610 14611 14612
/**
 * virNodeDeviceNumOfCaps:
 * @dev: the device
 *
D
Daniel Veillard 已提交
14613 14614
 * Accessor for the number of capabilities supported by the device.
 *
14615 14616
 * Returns the number of capabilities supported by the device or -1
 * in case of error.
14617
 */
14618 14619
int
virNodeDeviceNumOfCaps(virNodeDevicePtr dev)
14620
{
14621
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14622

14623 14624
    virResetLastError();

14625
    virCheckNodeDeviceReturn(dev, -1);
14626

14627
    if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceNumOfCaps) {
14628
        int ret;
14629
        ret = dev->conn->nodeDeviceDriver->nodeDeviceNumOfCaps(dev);
14630 14631 14632 14633
        if (ret < 0)
            goto error;
        return ret;
    }
14634

14635
    virReportUnsupportedError();
14636

14637
 error:
14638
    virDispatchError(dev->conn);
14639 14640 14641
    return -1;
}

14642

14643 14644 14645 14646 14647 14648 14649 14650
/**
 * virNodeDeviceListCaps:
 * @dev: the device
 * @names: array to collect the list of capability names
 * @maxnames: size of @names
 *
 * Lists the names of the capabilities supported by the device.
 *
14651 14652
 * Returns the number of capability names listed in @names or -1
 * in case of error.
14653
 */
14654 14655 14656 14657
int
virNodeDeviceListCaps(virNodeDevicePtr dev,
                      char **const names,
                      int maxnames)
14658
{
14659
    VIR_DEBUG("dev=%p, conn=%p, names=%p, maxnames=%d",
14660 14661
          dev, dev ? dev->conn : NULL, names, maxnames);

14662 14663
    virResetLastError();

14664
    virCheckNodeDeviceReturn(dev, -1);
14665 14666
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
14667

14668
    if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceListCaps) {
14669
        int ret;
14670
        ret = dev->conn->nodeDeviceDriver->nodeDeviceListCaps(dev, names, maxnames);
14671 14672 14673 14674
        if (ret < 0)
            goto error;
        return ret;
    }
14675

14676
    virReportUnsupportedError();
14677

14678
 error:
14679
    virDispatchError(dev->conn);
14680 14681 14682 14683 14684 14685 14686 14687 14688 14689 14690 14691 14692
    return -1;
}


/**
 * virNodeDeviceFree:
 * @dev: pointer to the node device
 *
 * Drops a reference to the node device, freeing it if
 * this was the last reference.
 *
 * Returns the 0 for success, -1 for error.
 */
14693 14694
int
virNodeDeviceFree(virNodeDevicePtr dev)
14695
{
14696
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14697

14698 14699
    virResetLastError();

14700 14701
    virCheckNodeDeviceReturn(dev, -1);

14702
    virObjectUnref(dev);
14703
    return 0;
14704 14705 14706
}


14707 14708
/**
 * virNodeDeviceRef:
D
Daniel Veillard 已提交
14709
 * @dev: the dev to hold a reference on
14710 14711 14712 14713 14714 14715 14716 14717 14718 14719 14720
 *
 * Increment the reference count on the dev. For each
 * additional call to this method, there shall be a corresponding
 * call to virNodeDeviceFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a dev would increment
 * the reference count.
D
Daniel Veillard 已提交
14721 14722
 *
 * Returns 0 in case of success, -1 in case of failure.
14723 14724 14725 14726
 */
int
virNodeDeviceRef(virNodeDevicePtr dev)
{
14727 14728
    VIR_DEBUG("dev=%p refs=%d", dev, dev ? dev->object.u.s.refs : 0);

14729 14730
    virResetLastError();

14731 14732
    virCheckNodeDeviceReturn(dev, -1);

14733
    virObjectRef(dev);
14734 14735 14736
    return 0;
}

14737

14738
/**
D
Daniel Veillard 已提交
14739
 * virNodeDeviceDettach:
14740 14741 14742 14743 14744 14745 14746 14747 14748 14749 14750 14751 14752 14753
 * @dev: pointer to the node device
 *
 * Dettach the node device from the node itself so that it may be
 * assigned to a guest domain.
 *
 * Depending on the hypervisor, this may involve operations such
 * as unbinding any device drivers from the device, binding the
 * device to a dummy device driver and resetting the device.
 *
 * If the device is currently in use by the node, this method may
 * fail.
 *
 * Once the device is not assigned to any guest, it may be re-attached
 * to the node using the virNodeDeviceReattach() method.
D
Daniel Veillard 已提交
14754
 *
14755 14756 14757 14758 14759
 * If the caller needs control over which backend driver will be used
 * during PCI device assignment (to use something other than the
 * default, for example VFIO), the newer virNodeDeviceDetachFlags()
 * API should be used instead.
 *
D
Daniel Veillard 已提交
14760
 * Returns 0 in case of success, -1 in case of failure.
14761 14762 14763 14764
 */
int
virNodeDeviceDettach(virNodeDevicePtr dev)
{
14765
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14766 14767 14768

    virResetLastError();

14769
    virCheckNodeDeviceReturn(dev, -1);
14770
    virCheckReadOnlyGoto(dev->conn->flags, error);
14771

14772 14773
    if (dev->conn->driver->nodeDeviceDettach) {
        int ret;
14774
        ret = dev->conn->driver->nodeDeviceDettach(dev);
14775 14776 14777 14778 14779
        if (ret < 0)
            goto error;
        return ret;
    }

14780
    virReportUnsupportedError();
14781

14782
 error:
14783
    virDispatchError(dev->conn);
14784
    return -1;
14785 14786
}

14787

14788 14789 14790 14791 14792 14793 14794 14795 14796 14797 14798 14799 14800 14801 14802 14803 14804 14805 14806 14807 14808 14809 14810 14811 14812 14813 14814 14815 14816 14817 14818 14819 14820 14821 14822 14823 14824 14825
/**
 * virNodeDeviceDetachFlags:
 * @dev: pointer to the node device
 * @driverName: name of backend driver that will be used
 *              for later device assignment to a domain. NULL
 *              means "use the hypervisor default driver"
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Detach the node device from the node itself so that it may be
 * assigned to a guest domain.
 *
 * Depending on the hypervisor, this may involve operations such as
 * unbinding any device drivers from the device, binding the device to
 * a dummy device driver and resetting the device. Different backend
 * drivers expect the device to be bound to different dummy
 * devices. For example, QEMU's "kvm" backend driver (the default)
 * expects the device to be bound to "pci-stub", but its "vfio"
 * backend driver expects the device to be bound to "vfio-pci".
 *
 * If the device is currently in use by the node, this method may
 * fail.
 *
 * Once the device is not assigned to any guest, it may be re-attached
 * to the node using the virNodeDeviceReAttach() method.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virNodeDeviceDetachFlags(virNodeDevicePtr dev,
                         const char *driverName,
                         unsigned int flags)
{
    VIR_DEBUG("dev=%p, conn=%p driverName=%s flags=%x",
              dev, dev ? dev->conn : NULL,
              driverName ? driverName : "(default)", flags);

    virResetLastError();

14826
    virCheckNodeDeviceReturn(dev, -1);
14827
    virCheckReadOnlyGoto(dev->conn->flags, error);
14828 14829 14830 14831 14832 14833 14834 14835 14836

    if (dev->conn->driver->nodeDeviceDetachFlags) {
        int ret;
        ret = dev->conn->driver->nodeDeviceDetachFlags(dev, driverName, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

14837
    virReportUnsupportedError();
14838

14839
 error:
14840 14841 14842 14843
    virDispatchError(dev->conn);
    return -1;
}

14844

14845 14846 14847 14848 14849 14850 14851 14852 14853 14854 14855 14856
/**
 * virNodeDeviceReAttach:
 * @dev: pointer to the node device
 *
 * Re-attach a previously dettached node device to the node so that it
 * may be used by the node again.
 *
 * Depending on the hypervisor, this may involve operations such
 * as resetting the device, unbinding it from a dummy device driver
 * and binding it to its appropriate driver.
 *
 * If the device is currently in use by a guest, this method may fail.
D
Daniel Veillard 已提交
14857 14858
 *
 * Returns 0 in case of success, -1 in case of failure.
14859 14860 14861 14862
 */
int
virNodeDeviceReAttach(virNodeDevicePtr dev)
{
14863
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14864 14865 14866

    virResetLastError();

14867
    virCheckNodeDeviceReturn(dev, -1);
14868
    virCheckReadOnlyGoto(dev->conn->flags, error);
14869

14870 14871
    if (dev->conn->driver->nodeDeviceReAttach) {
        int ret;
14872
        ret = dev->conn->driver->nodeDeviceReAttach(dev);
14873 14874 14875 14876 14877
        if (ret < 0)
            goto error;
        return ret;
    }

14878
    virReportUnsupportedError();
14879

14880
 error:
14881
    virDispatchError(dev->conn);
14882
    return -1;
14883 14884
}

14885

14886 14887 14888 14889 14890 14891 14892 14893 14894 14895 14896 14897 14898 14899
/**
 * virNodeDeviceReset:
 * @dev: pointer to the node device
 *
 * Reset a previously dettached node device to the node before or
 * after assigning it to a guest.
 *
 * The exact reset semantics depends on the hypervisor and device
 * type but, for example, KVM will attempt to reset PCI devices with
 * a Function Level Reset, Secondary Bus Reset or a Power Management
 * D-State reset.
 *
 * If the reset will affect other devices which are currently in use,
 * this function may fail.
D
Daniel Veillard 已提交
14900 14901
 *
 * Returns 0 in case of success, -1 in case of failure.
14902 14903 14904 14905
 */
int
virNodeDeviceReset(virNodeDevicePtr dev)
{
14906
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14907 14908 14909

    virResetLastError();

14910
    virCheckNodeDeviceReturn(dev, -1);
14911
    virCheckReadOnlyGoto(dev->conn->flags, error);
14912

14913 14914
    if (dev->conn->driver->nodeDeviceReset) {
        int ret;
14915
        ret = dev->conn->driver->nodeDeviceReset(dev);
14916 14917 14918 14919 14920
        if (ret < 0)
            goto error;
        return ret;
    }

14921
    virReportUnsupportedError();
14922

14923
 error:
14924
    virDispatchError(dev->conn);
14925
    return -1;
14926 14927
}

14928

14929 14930 14931 14932
/**
 * virNodeDeviceCreateXML:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: string containing an XML description of the device to be created
14933
 * @flags: extra flags; not used yet, so callers should always pass 0
14934 14935 14936 14937 14938 14939 14940 14941 14942 14943 14944
 *
 * Create a new device on the VM host machine, for example, virtual
 * HBAs created using vport_create.
 *
 * Returns a node device object if successful, NULL in case of failure
 */
virNodeDevicePtr
virNodeDeviceCreateXML(virConnectPtr conn,
                       const char *xmlDesc,
                       unsigned int flags)
{
14945
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
14946 14947 14948

    virResetLastError();

14949
    virCheckConnectReturn(conn, NULL);
14950
    virCheckReadOnlyGoto(conn->flags, error);
14951
    virCheckNonNullArgGoto(xmlDesc, error);
14952

14953 14954 14955
    if (conn->nodeDeviceDriver &&
        conn->nodeDeviceDriver->nodeDeviceCreateXML) {
        virNodeDevicePtr dev = conn->nodeDeviceDriver->nodeDeviceCreateXML(conn, xmlDesc, flags);
14956 14957 14958 14959 14960
        if (dev == NULL)
            goto error;
        return dev;
    }

14961
    virReportUnsupportedError();
14962

14963
 error:
14964
    virDispatchError(conn);
14965 14966 14967 14968 14969 14970 14971 14972
    return NULL;
}


/**
 * virNodeDeviceDestroy:
 * @dev: a device object
 *
14973 14974 14975
 * Destroy the device object. The virtual device (only works for vHBA
 * currently) is removed from the host operating system.  This function
 * may require privileged access.
14976 14977 14978 14979 14980 14981
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNodeDeviceDestroy(virNodeDevicePtr dev)
{
14982
    VIR_DEBUG("dev=%p", dev);
14983 14984 14985

    virResetLastError();

14986
    virCheckNodeDeviceReturn(dev, -1);
14987
    virCheckReadOnlyGoto(dev->conn->flags, error);
14988

14989 14990 14991
    if (dev->conn->nodeDeviceDriver &&
        dev->conn->nodeDeviceDriver->nodeDeviceDestroy) {
        int retval = dev->conn->nodeDeviceDriver->nodeDeviceDestroy(dev);
14992 14993 14994 14995 14996 14997 14998
        if (retval < 0) {
            goto error;
        }

        return 0;
    }

14999
    virReportUnsupportedError();
15000

15001
 error:
15002
    virDispatchError(dev->conn);
15003 15004 15005 15006
    return -1;
}


15007 15008 15009 15010 15011 15012 15013 15014 15015
/*
 * Domain Event Notification
 */

/**
 * virConnectDomainEventRegister:
 * @conn: pointer to the connection
 * @cb: callback to the function handling domain events
 * @opaque: opaque data to pass on to the callback
D
Daniel Veillard 已提交
15016
 * @freecb: optional function to deallocate opaque when not used anymore
15017
 *
15018
 * Adds a callback to receive notifications of domain lifecycle events
E
Eric Blake 已提交
15019 15020 15021
 * occurring on a connection.  This function requires that an event loop
 * has been previously registered with virEventRegisterImpl() or
 * virEventRegisterDefaultImpl().
15022 15023
 *
 * Use of this method is no longer recommended. Instead applications
15024
 * should try virConnectDomainEventRegisterAny() which has a more flexible
E
Eric Blake 已提交
15025
 * API contract.
15026
 *
15027 15028
 * The virDomainPtr object handle passed into the callback upon delivery
 * of an event is only valid for the duration of execution of the callback.
15029 15030
 * If the callback wishes to keep the domain object after the callback returns,
 * it shall take a reference to it, by calling virDomainRef.
15031 15032 15033
 * The reference can be released once the object is no longer required
 * by calling virDomainFree.
 *
15034 15035 15036
 * Returns 0 on success, -1 on failure.  Older versions of some hypervisors
 * sometimes returned a positive number on success, but without any reliable
 * semantics on what that number represents.
15037 15038 15039 15040
 */
int
virConnectDomainEventRegister(virConnectPtr conn,
                              virConnectDomainEventCallback cb,
15041 15042
                              void *opaque,
                              virFreeCallback freecb)
15043
{
15044
    VIR_DEBUG("conn=%p, cb=%p, opaque=%p, freecb=%p", conn, cb, opaque, freecb);
15045
    virResetLastError();
15046

15047
    virCheckConnectReturn(conn, -1);
15048
    virCheckNonNullArgGoto(cb, error);
15049

15050
    if (conn->driver && conn->driver->connectDomainEventRegister) {
15051
        int ret;
15052
        ret = conn->driver->connectDomainEventRegister(conn, cb, opaque, freecb);
15053 15054 15055 15056 15057
        if (ret < 0)
            goto error;
        return ret;
    }

15058
    virReportUnsupportedError();
15059
 error:
15060
    virDispatchError(conn);
15061 15062 15063
    return -1;
}

15064

15065 15066 15067 15068 15069
/**
 * virConnectDomainEventDeregister:
 * @conn: pointer to the connection
 * @cb: callback to the function handling domain events
 *
15070 15071
 * Removes a callback previously registered with the
 * virConnectDomainEventRegister() function.
15072 15073
 *
 * Use of this method is no longer recommended. Instead applications
15074
 * should try virConnectDomainEventDeregisterAny() which has a more flexible
15075
 * API contract
15076
 *
15077 15078 15079
 * Returns 0 on success, -1 on failure.  Older versions of some hypervisors
 * sometimes returned a positive number on success, but without any reliable
 * semantics on what that number represents.
15080 15081 15082 15083 15084
 */
int
virConnectDomainEventDeregister(virConnectPtr conn,
                                virConnectDomainEventCallback cb)
{
15085
    VIR_DEBUG("conn=%p, cb=%p", conn, cb);
15086 15087

    virResetLastError();
15088

15089
    virCheckConnectReturn(conn, -1);
15090 15091
    virCheckNonNullArgGoto(cb, error);

15092
    if (conn->driver && conn->driver->connectDomainEventDeregister) {
15093
        int ret;
15094
        ret = conn->driver->connectDomainEventDeregister(conn, cb);
15095 15096 15097
        if (ret < 0)
            goto error;
        return ret;
15098 15099
    }

15100
    virReportUnsupportedError();
15101
 error:
15102
    virDispatchError(conn);
15103 15104
    return -1;
}
15105

15106

15107 15108 15109 15110 15111 15112 15113 15114 15115 15116 15117 15118 15119
/**
 * virSecretGetConnect:
 * @secret: A virSecret secret
 *
 * Provides the connection pointer associated with a secret.  The reference
 * counter on the connection is not increased by this call.
 *
 * WARNING: When writing libvirt bindings in other languages, do not use this
 * function.  Instead, store the connection and the secret object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
15120
virSecretGetConnect(virSecretPtr secret)
15121
{
15122
    VIR_DEBUG("secret=%p", secret);
15123 15124 15125

    virResetLastError();

15126 15127
    virCheckSecretReturn(secret, NULL);

15128 15129 15130
    return secret->conn;
}

15131

15132 15133 15134 15135 15136 15137 15138 15139 15140 15141 15142 15143 15144 15145 15146
/**
 * virConnectNumOfSecrets:
 * @conn: virConnect connection
 *
 * Fetch number of currently defined secrets.
 *
 * Returns the number currently defined secrets.
 */
int
virConnectNumOfSecrets(virConnectPtr conn)
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

15147
    virCheckConnectReturn(conn, -1);
15148 15149

    if (conn->secretDriver != NULL &&
15150
        conn->secretDriver->connectNumOfSecrets != NULL) {
15151 15152
        int ret;

15153
        ret = conn->secretDriver->connectNumOfSecrets(conn);
15154 15155 15156 15157 15158
        if (ret < 0)
            goto error;
        return ret;
    }

15159
    virReportUnsupportedError();
15160

15161
 error:
15162
    virDispatchError(conn);
15163 15164 15165
    return -1;
}

15166

15167 15168 15169 15170 15171 15172 15173 15174 15175 15176 15177 15178 15179 15180 15181 15182 15183 15184 15185 15186 15187 15188 15189 15190 15191 15192 15193 15194 15195 15196 15197 15198 15199 15200 15201 15202 15203 15204 15205 15206 15207 15208 15209 15210 15211
/**
 * virConnectListAllSecrets:
 * @conn: Pointer to the hypervisor connection.
 * @secrets: Pointer to a variable to store the array containing the secret
 *           objects or NULL if the list is not required (just returns the
 *           number of secrets).
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Collect the list of secrets, and allocate an array to store those
 * objects.
 *
 * Normally, all secrets are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted secrets. The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a secret, and where all bits
 * within a group describe all possible secrets.
 *
 * The first group of @flags is used to filter secrets by its storage
 * location. Flag VIR_CONNECT_LIST_SECRETS_EPHEMERAL selects secrets that
 * are kept only in memory. Flag VIR_CONNECT_LIST_SECRETS_NO_EPHEMERAL
 * selects secrets that are kept in persistent storage.
 *
 * The second group of @flags is used to filter secrets by privacy. Flag
 * VIR_CONNECT_LIST_SECRETS_PRIVATE seclets secrets that are never revealed
 * to any caller of libvirt nor to any other node. Flag
 * VIR_CONNECT_LIST_SECRETS_NO_PRIVATE selects non-private secrets.
 *
 * Returns the number of secrets found or -1 and sets @secrets to NULL in case
 * of error.  On success, the array stored into @secrets is guaranteed to
 * have an extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virSecretFree() on each array element, then calling free() on @secrets.
 */
int
virConnectListAllSecrets(virConnectPtr conn,
                         virSecretPtr **secrets,
                         unsigned int flags)
{
    VIR_DEBUG("conn=%p, secrets=%p, flags=%x", conn, secrets, flags);

    virResetLastError();

    if (secrets)
        *secrets = NULL;

15212
    virCheckConnectReturn(conn, -1);
15213 15214

    if (conn->secretDriver &&
15215
        conn->secretDriver->connectListAllSecrets) {
15216
        int ret;
15217
        ret = conn->secretDriver->connectListAllSecrets(conn, secrets, flags);
15218 15219 15220 15221 15222
        if (ret < 0)
            goto error;
        return ret;
    }

15223
    virReportUnsupportedError();
15224

15225
 error:
15226 15227 15228 15229
    virDispatchError(conn);
    return -1;
}

15230

15231 15232 15233 15234 15235 15236 15237 15238 15239 15240 15241 15242 15243 15244 15245 15246 15247
/**
 * virConnectListSecrets:
 * @conn: virConnect connection
 * @uuids: Pointer to an array to store the UUIDs
 * @maxuuids: size of the array.
 *
 * List UUIDs of defined secrets, store pointers to names in uuids.
 *
 * Returns the number of UUIDs provided in the array, or -1 on failure.
 */
int
virConnectListSecrets(virConnectPtr conn, char **uuids, int maxuuids)
{
    VIR_DEBUG("conn=%p, uuids=%p, maxuuids=%d", conn, uuids, maxuuids);

    virResetLastError();

15248
    virCheckConnectReturn(conn, -1);
15249 15250
    virCheckNonNullArgGoto(uuids, error);
    virCheckNonNegativeArgGoto(maxuuids, error);
15251

15252
    if (conn->secretDriver != NULL && conn->secretDriver->connectListSecrets != NULL) {
15253 15254
        int ret;

15255
        ret = conn->secretDriver->connectListSecrets(conn, uuids, maxuuids);
15256 15257 15258 15259 15260
        if (ret < 0)
            goto error;
        return ret;
    }

15261
    virReportUnsupportedError();
15262

15263
 error:
15264
    virDispatchError(conn);
15265 15266 15267
    return -1;
}

15268

15269
/**
15270 15271 15272
 * virSecretLookupByUUID:
 * @conn: pointer to the hypervisor connection
 * @uuid: the raw UUID for the secret
15273
 *
15274 15275
 * Try to lookup a secret on the given hypervisor based on its UUID.
 * Uses the 16 bytes of raw data to describe the UUID
15276
 *
15277 15278
 * Returns a new secret object or NULL in case of failure.  If the
 * secret cannot be found, then VIR_ERR_NO_SECRET error is raised.
15279 15280
 */
virSecretPtr
15281
virSecretLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
15282
{
15283
    VIR_UUID_DEBUG(conn, uuid);
15284 15285 15286

    virResetLastError();

15287
    virCheckConnectReturn(conn, NULL);
15288
    virCheckNonNullArgGoto(uuid, error);
15289

15290
    if (conn->secretDriver &&
15291
        conn->secretDriver->secretLookupByUUID) {
15292
        virSecretPtr ret;
15293
        ret = conn->secretDriver->secretLookupByUUID(conn, uuid);
15294
        if (!ret)
15295 15296 15297 15298
            goto error;
        return ret;
    }

15299
    virReportUnsupportedError();
15300

15301
 error:
15302
    virDispatchError(conn);
15303 15304 15305
    return NULL;
}

15306

15307 15308 15309 15310 15311 15312 15313 15314 15315 15316 15317 15318 15319 15320 15321
/**
 * virSecretLookupByUUIDString:
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the secret
 *
 * Try to lookup a secret on the given hypervisor based on its UUID.
 * Uses the printable string value to describe the UUID
 *
 * Returns a new secret object or NULL in case of failure.  If the
 * secret cannot be found, then VIR_ERR_NO_SECRET error is raised.
 */
virSecretPtr
virSecretLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
    unsigned char uuid[VIR_UUID_BUFLEN];
15322
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
15323 15324 15325

    virResetLastError();

15326
    virCheckConnectReturn(conn, NULL);
15327
    virCheckNonNullArgGoto(uuidstr, error);
15328 15329

    if (virUUIDParse(uuidstr, uuid) < 0) {
15330 15331 15332
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
15333 15334 15335 15336 15337
        goto error;
    }

    return virSecretLookupByUUID(conn, &uuid[0]);

15338
 error:
15339
    virDispatchError(conn);
15340 15341 15342 15343
    return NULL;
}


15344 15345 15346 15347 15348 15349 15350 15351 15352 15353 15354 15355 15356 15357 15358 15359 15360 15361
/**
 * virSecretLookupByUsage:
 * @conn: pointer to the hypervisor connection
 * @usageType: the type of secret usage
 * @usageID: identifier of the object using the secret
 *
 * Try to lookup a secret on the given hypervisor based on its usage
 * The usageID is unique within the set of secrets sharing the
 * same usageType value.
 *
 * Returns a new secret object or NULL in case of failure.  If the
 * secret cannot be found, then VIR_ERR_NO_SECRET error is raised.
 */
virSecretPtr
virSecretLookupByUsage(virConnectPtr conn,
                       int usageType,
                       const char *usageID)
{
15362
    VIR_DEBUG("conn=%p, usageType=%d usageID=%s", conn, usageType, NULLSTR(usageID));
15363 15364 15365

    virResetLastError();

15366
    virCheckConnectReturn(conn, NULL);
15367
    virCheckNonNullArgGoto(usageID, error);
15368 15369

    if (conn->secretDriver &&
15370
        conn->secretDriver->secretLookupByUsage) {
15371
        virSecretPtr ret;
15372
        ret = conn->secretDriver->secretLookupByUsage(conn, usageType, usageID);
15373 15374 15375 15376 15377
        if (!ret)
            goto error;
        return ret;
    }

15378
    virReportUnsupportedError();
15379

15380
 error:
15381
    virDispatchError(conn);
15382 15383 15384 15385
    return NULL;
}


15386 15387 15388 15389
/**
 * virSecretDefineXML:
 * @conn: virConnect connection
 * @xml: XML describing the secret.
15390
 * @flags: extra flags; not used yet, so callers should always pass 0
15391
 *
D
Dan Kenigsberg 已提交
15392
 * If XML specifies a UUID, locates the specified secret and replaces all
15393 15394 15395 15396 15397 15398
 * attributes of the secret specified by UUID by attributes specified in xml
 * (any attributes not specified in xml are discarded).
 *
 * Otherwise, creates a new secret with an automatically chosen UUID, and
 * initializes its attributes from xml.
 *
W
Wang Yufei 已提交
15399
 * Returns a secret on success, NULL on failure.
15400 15401 15402 15403
 */
virSecretPtr
virSecretDefineXML(virConnectPtr conn, const char *xml, unsigned int flags)
{
15404
    VIR_DEBUG("conn=%p, xml=%s, flags=%x", conn, xml, flags);
15405 15406 15407

    virResetLastError();

15408
    virCheckConnectReturn(conn, NULL);
15409
    virCheckReadOnlyGoto(conn->flags, error);
15410
    virCheckNonNullArgGoto(xml, error);
15411

15412
    if (conn->secretDriver != NULL && conn->secretDriver->secretDefineXML != NULL) {
15413 15414
        virSecretPtr ret;

15415
        ret = conn->secretDriver->secretDefineXML(conn, xml, flags);
15416 15417 15418 15419 15420
        if (ret == NULL)
            goto error;
        return ret;
    }

15421
    virReportUnsupportedError();
15422

15423
 error:
15424
    virDispatchError(conn);
15425 15426 15427
    return NULL;
}

15428

15429
/**
15430
 * virSecretGetUUID:
15431
 * @secret: A virSecret secret
15432
 * @uuid: buffer of VIR_UUID_BUFLEN bytes in size
15433 15434 15435
 *
 * Fetches the UUID of the secret.
 *
15436 15437
 * Returns 0 on success with the uuid buffer being filled, or
 * -1 upon failure.
15438
 */
15439 15440
int
virSecretGetUUID(virSecretPtr secret, unsigned char *uuid)
15441 15442 15443 15444 15445
{
    VIR_DEBUG("secret=%p", secret);

    virResetLastError();

15446
    virCheckSecretReturn(secret, -1);
15447
    virCheckNonNullArgGoto(uuid, error);
15448

15449 15450 15451
    memcpy(uuid, &secret->uuid[0], VIR_UUID_BUFLEN);

    return 0;
15452

15453
 error:
15454 15455
    virDispatchError(secret->conn);
    return -1;
15456 15457
}

15458

15459 15460 15461 15462 15463 15464 15465 15466 15467 15468 15469 15470 15471
/**
 * virSecretGetUUIDString:
 * @secret: a secret object
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
 *
 * Get the UUID for a secret as string. For more information about
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virSecretGetUUIDString(virSecretPtr secret, char *buf)
{
15472
    VIR_DEBUG("secret=%p, buf=%p", secret, buf);
15473 15474

    virResetLastError();
15475

15476
    virCheckSecretReturn(secret, -1);
15477
    virCheckNonNullArgGoto(buf, error);
15478

E
Eric Blake 已提交
15479
    virUUIDFormat(secret->uuid, buf);
15480
    return 0;
15481

15482
 error:
15483
    virDispatchError(secret->conn);
15484
    return -1;
15485 15486
}

15487

15488 15489 15490 15491 15492 15493 15494 15495 15496 15497 15498 15499 15500 15501 15502 15503
/**
 * virSecretGetUsageType:
 * @secret: a secret object
 *
 * Get the type of object which uses this secret. The returned
 * value is one of the constants defined in the virSecretUsageType
 * enumeration. More values may be added to this enumeration in
 * the future, so callers should expect to see usage types they
 * do not explicitly know about.
 *
 * Returns a positive integer identifying the type of object,
 * or -1 upon error.
 */
int
virSecretGetUsageType(virSecretPtr secret)
{
15504
    VIR_DEBUG("secret=%p", secret);
15505 15506 15507

    virResetLastError();

15508 15509
    virCheckSecretReturn(secret, -1);

15510
    return secret->usageType;
15511 15512
}

15513

15514 15515 15516 15517 15518 15519 15520 15521 15522 15523 15524 15525 15526 15527 15528 15529 15530 15531 15532
/**
 * virSecretGetUsageID:
 * @secret: a secret object
 *
 * Get the unique identifier of the object with which this
 * secret is to be used. The format of the identifier is
 * dependant on the usage type of the secret. For a secret
 * with a usage type of VIR_SECRET_USAGE_TYPE_VOLUME the
 * identifier will be a fully qualfied path name. The
 * identifiers are intended to be unique within the set of
 * all secrets sharing the same usage type. ie, there shall
 * only ever be one secret for each volume path.
 *
 * Returns a string identifying the object using the secret,
 * or NULL upon error
 */
const char *
virSecretGetUsageID(virSecretPtr secret)
{
15533
    VIR_DEBUG("secret=%p", secret);
15534 15535 15536

    virResetLastError();

15537 15538
    virCheckSecretReturn(secret, NULL);

15539
    return secret->usageID;
15540 15541
}

15542

15543 15544 15545
/**
 * virSecretGetXMLDesc:
 * @secret: A virSecret secret
15546
 * @flags: extra flags; not used yet, so callers should always pass 0
15547 15548 15549 15550 15551 15552 15553 15554 15555 15556 15557
 *
 * Fetches an XML document describing attributes of the secret.
 *
 * Returns the XML document on success, NULL on failure.  The caller must
 * free() the XML.
 */
char *
virSecretGetXMLDesc(virSecretPtr secret, unsigned int flags)
{
    virConnectPtr conn;

15558
    VIR_DEBUG("secret=%p, flags=%x", secret, flags);
15559 15560 15561

    virResetLastError();

15562
    virCheckSecretReturn(secret, NULL);
15563
    conn = secret->conn;
15564

15565
    if (conn->secretDriver != NULL && conn->secretDriver->secretGetXMLDesc != NULL) {
15566 15567
        char *ret;

15568
        ret = conn->secretDriver->secretGetXMLDesc(secret, flags);
15569 15570 15571 15572 15573
        if (ret == NULL)
            goto error;
        return ret;
    }

15574
    virReportUnsupportedError();
15575

15576
 error:
15577
    virDispatchError(conn);
15578 15579 15580
    return NULL;
}

15581

15582 15583 15584 15585 15586
/**
 * virSecretSetValue:
 * @secret: A virSecret secret
 * @value: Value of the secret
 * @value_size: Size of the value
15587
 * @flags: extra flags; not used yet, so callers should always pass 0
15588 15589 15590 15591 15592 15593 15594 15595 15596 15597 15598
 *
 * Sets the value of a secret.
 *
 * Returns 0 on success, -1 on failure.
 */
int
virSecretSetValue(virSecretPtr secret, const unsigned char *value,
                  size_t value_size, unsigned int flags)
{
    virConnectPtr conn;

15599
    VIR_DEBUG("secret=%p, value=%p, value_size=%zu, flags=%x", secret, value,
15600 15601 15602 15603
              value_size, flags);

    virResetLastError();

15604
    virCheckSecretReturn(secret, -1);
15605
    conn = secret->conn;
15606

15607
    virCheckReadOnlyGoto(conn->flags, error);
15608
    virCheckNonNullArgGoto(value, error);
15609

15610
    if (conn->secretDriver != NULL && conn->secretDriver->secretSetValue != NULL) {
15611 15612
        int ret;

15613
        ret = conn->secretDriver->secretSetValue(secret, value, value_size, flags);
15614 15615 15616 15617 15618
        if (ret < 0)
            goto error;
        return ret;
    }

15619
    virReportUnsupportedError();
15620

15621
 error:
15622
    virDispatchError(conn);
15623 15624 15625
    return -1;
}

15626

15627 15628 15629 15630
/**
 * virSecretGetValue:
 * @secret: A virSecret connection
 * @value_size: Place for storing size of the secret value
15631
 * @flags: extra flags; not used yet, so callers should always pass 0
15632 15633 15634 15635 15636 15637 15638 15639 15640 15641 15642
 *
 * Fetches the value of a secret.
 *
 * Returns the secret value on success, NULL on failure.  The caller must
 * free() the secret value.
 */
unsigned char *
virSecretGetValue(virSecretPtr secret, size_t *value_size, unsigned int flags)
{
    virConnectPtr conn;

15643
    VIR_DEBUG("secret=%p, value_size=%p, flags=%x", secret, value_size, flags);
15644 15645 15646

    virResetLastError();

15647
    virCheckSecretReturn(secret, NULL);
15648
    conn = secret->conn;
15649

15650
    virCheckReadOnlyGoto(conn->flags, error);
15651
    virCheckNonNullArgGoto(value_size, error);
15652

15653
    if (conn->secretDriver != NULL && conn->secretDriver->secretGetValue != NULL) {
15654 15655
        unsigned char *ret;

15656
        ret = conn->secretDriver->secretGetValue(secret, value_size, flags, 0);
15657 15658 15659 15660 15661
        if (ret == NULL)
            goto error;
        return ret;
    }

15662
    virReportUnsupportedError();
15663

15664
 error:
15665
    virDispatchError(conn);
15666 15667 15668
    return NULL;
}

15669

15670 15671 15672 15673 15674 15675 15676 15677 15678 15679 15680 15681 15682 15683 15684 15685 15686 15687
/**
 * virSecretUndefine:
 * @secret: A virSecret secret
 *
 * Deletes the specified secret.  This does not free the associated
 * virSecretPtr object.
 *
 * Returns 0 on success, -1 on failure.
 */
int
virSecretUndefine(virSecretPtr secret)
{
    virConnectPtr conn;

    VIR_DEBUG("secret=%p", secret);

    virResetLastError();

15688
    virCheckSecretReturn(secret, -1);
15689
    conn = secret->conn;
15690

15691
    virCheckReadOnlyGoto(conn->flags, error);
15692

15693
    if (conn->secretDriver != NULL && conn->secretDriver->secretUndefine != NULL) {
15694 15695
        int ret;

15696
        ret = conn->secretDriver->secretUndefine(secret);
15697 15698 15699 15700 15701
        if (ret < 0)
            goto error;
        return ret;
    }

15702
    virReportUnsupportedError();
15703

15704
 error:
15705
    virDispatchError(conn);
15706 15707 15708
    return -1;
}

15709

15710 15711 15712 15713 15714 15715 15716 15717 15718 15719 15720 15721 15722 15723 15724 15725 15726 15727 15728
/**
 * virSecretRef:
 * @secret: the secret to hold a reference on
 *
 * Increment the reference count on the secret. For each additional call to
 * this method, there shall be a corresponding call to virSecretFree to release
 * the reference count, once the caller no longer needs the reference to this
 * object.
 *
 * This method is typically useful for applications where multiple threads are
 * using a connection, and it is required that the connection remain open until
 * all threads have finished using it. ie, each new thread using a secret would
 * increment the reference count.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virSecretRef(virSecretPtr secret)
{
15729 15730 15731
    VIR_DEBUG("secret=%p refs=%d", secret,
              secret ? secret->object.u.s.refs : 0);

15732 15733
    virResetLastError();

15734 15735
    virCheckSecretReturn(secret, -1);

15736
    virObjectRef(secret);
15737 15738 15739
    return 0;
}

15740

15741 15742 15743 15744 15745 15746
/**
 * virSecretFree:
 * @secret: pointer to a secret
 *
 * Release the secret handle. The underlying secret continues to exist.
 *
15747
 * Returns 0 on success, or -1 on error
15748 15749 15750 15751
 */
int
virSecretFree(virSecretPtr secret)
{
15752
    VIR_DEBUG("secret=%p", secret);
15753 15754 15755

    virResetLastError();

15756 15757
    virCheckSecretReturn(secret, -1);

15758
    virObjectUnref(secret);
15759 15760
    return 0;
}
15761 15762 15763 15764 15765


/**
 * virStreamNew:
 * @conn: pointer to the connection
15766
 * @flags: bitwise-OR of virStreamFlags
15767 15768 15769 15770 15771 15772 15773 15774 15775 15776 15777 15778 15779 15780 15781 15782 15783 15784 15785 15786 15787
 *
 * Creates a new stream object which can be used to perform
 * streamed I/O with other public API function.
 *
 * When no longer needed, a stream object must be released
 * with virStreamFree. If a data stream has been used,
 * then the application must call virStreamFinish or
 * virStreamAbort before free'ing to, in order to notify
 * the driver of termination.
 *
 * If a non-blocking data stream is required passed
 * VIR_STREAM_NONBLOCK for flags, otherwise pass 0.
 *
 * Returns the new stream, or NULL upon error
 */
virStreamPtr
virStreamNew(virConnectPtr conn,
             unsigned int flags)
{
    virStreamPtr st;

15788
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
15789 15790 15791

    virResetLastError();

15792
    virCheckConnectReturn(conn, NULL);
15793 15794 15795 15796

    st = virGetStream(conn);
    if (st)
        st->flags = flags;
15797 15798
    else
        virDispatchError(conn);
15799 15800 15801 15802 15803 15804 15805 15806 15807 15808 15809 15810 15811 15812 15813 15814 15815 15816 15817

    return st;
}


/**
 * virStreamRef:
 * @stream: pointer to the stream
 *
 * Increment the reference count on the stream. For each
 * additional call to this method, there shall be a corresponding
 * call to virStreamFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * Returns 0 in case of success, -1 in case of failure
 */
int
virStreamRef(virStreamPtr stream)
{
15818 15819 15820
    VIR_DEBUG("stream=%p refs=%d", stream,
              stream ? stream->object.u.s.refs : 0);

15821 15822
    virResetLastError();

15823 15824
    virCheckStreamReturn(stream, -1);

15825
    virObjectRef(stream);
15826 15827 15828 15829 15830 15831 15832 15833 15834 15835 15836 15837 15838
    return 0;
}


/**
 * virStreamSend:
 * @stream: pointer to the stream object
 * @data: buffer to write to stream
 * @nbytes: size of @data buffer
 *
 * Write a series of bytes to the stream. This method may
 * block the calling application for an arbitrary amount
 * of time. Once an application has finished sending data
15839
 * it should call virStreamFinish to wait for successful
15840
 * confirmation from the driver, or detect any error.
15841 15842
 *
 * This method may not be used if a stream source has been
15843
 * registered.
15844 15845 15846 15847 15848
 *
 * Errors are not guaranteed to be reported synchronously
 * with the call, but may instead be delayed until a
 * subsequent call.
 *
D
Dan Kenigsberg 已提交
15849
 * An example using this with a hypothetical file upload
15850 15851
 * API looks like
 *
15852
 *     virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
15853
 *     int fd = open("demo.iso", O_RDONLY);
15854 15855 15856 15857 15858 15859 15860
 *
 *     virConnectUploadFile(conn, "demo.iso", st);
 *
 *     while (1) {
 *          char buf[1024];
 *          int got = read(fd, buf, 1024);
 *          if (got < 0) {
15861
 *             virStreamAbort(st);
15862 15863 15864 15865 15866
 *             break;
 *          }
 *          if (got == 0) {
 *             virStreamFinish(st);
 *             break;
15867
 *          }
15868 15869
 *          int offset = 0;
 *          while (offset < got) {
E
Eric Blake 已提交
15870
 *             int sent = virStreamSend(st, buf+offset, got-offset);
15871 15872 15873 15874 15875 15876 15877 15878 15879 15880 15881 15882
 *             if (sent < 0) {
 *                virStreamAbort(st);
 *                goto done;
 *             }
 *             offset += sent;
 *          }
 *      }
 *      if (virStreamFinish(st) < 0)
 *         ... report an error ....
 *    done:
 *      virStreamFree(st);
 *      close(fd);
15883 15884 15885 15886 15887 15888 15889 15890 15891 15892 15893
 *
 * Returns the number of bytes written, which may be less
 * than requested.
 *
 * Returns -1 upon error, at which time the stream will
 * be marked as aborted, and the caller should now release
 * the stream with virStreamFree.
 *
 * Returns -2 if the outgoing transmit buffers are full &
 * the stream is marked as non-blocking.
 */
15894 15895 15896 15897
int
virStreamSend(virStreamPtr stream,
              const char *data,
              size_t nbytes)
15898
{
15899
    VIR_DEBUG("stream=%p, data=%p, nbytes=%zi", stream, data, nbytes);
15900 15901 15902

    virResetLastError();

15903
    virCheckStreamReturn(stream, -1);
15904
    virCheckNonNullArgGoto(data, error);
15905

15906 15907 15908 15909 15910 15911 15912 15913 15914 15915 15916
    if (stream->driver &&
        stream->driver->streamSend) {
        int ret;
        ret = (stream->driver->streamSend)(stream, data, nbytes);
        if (ret == -2)
            return -2;
        if (ret < 0)
            goto error;
        return ret;
    }

15917
    virReportUnsupportedError();
15918

15919
 error:
15920
    virDispatchError(stream->conn);
15921 15922 15923 15924 15925 15926 15927
    return -1;
}


/**
 * virStreamRecv:
 * @stream: pointer to the stream object
15928
 * @data: buffer to read into from stream
15929 15930
 * @nbytes: size of @data buffer
 *
15931
 * Reads a series of bytes from the stream. This method may
15932 15933 15934 15935 15936 15937 15938
 * block the calling application for an arbitrary amount
 * of time.
 *
 * Errors are not guaranteed to be reported synchronously
 * with the call, but may instead be delayed until a
 * subsequent call.
 *
D
Dan Kenigsberg 已提交
15939
 * An example using this with a hypothetical file download
15940 15941
 * API looks like
 *
15942
 *     virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
15943
 *     int fd = open("demo.iso", O_WRONLY, 0600);
15944 15945 15946 15947 15948 15949 15950 15951 15952 15953 15954 15955 15956 15957
 *
 *     virConnectDownloadFile(conn, "demo.iso", st);
 *
 *     while (1) {
 *         char buf[1024];
 *         int got = virStreamRecv(st, buf, 1024);
 *         if (got < 0)
 *            break;
 *         if (got == 0) {
 *            virStreamFinish(st);
 *            break;
 *         }
 *         int offset = 0;
 *         while (offset < got) {
E
Eric Blake 已提交
15958
 *            int sent = write(fd, buf + offset, got - offset);
15959 15960 15961 15962 15963 15964 15965 15966 15967 15968 15969 15970
 *            if (sent < 0) {
 *               virStreamAbort(st);
 *               goto done;
 *            }
 *            offset += sent;
 *         }
 *     }
 *     if (virStreamFinish(st) < 0)
 *        ... report an error ....
 *   done:
 *     virStreamFree(st);
 *     close(fd);
15971 15972 15973 15974 15975 15976 15977 15978 15979 15980 15981 15982 15983 15984 15985 15986
 *
 *
 * Returns the number of bytes read, which may be less
 * than requested.
 *
 * Returns 0 when the end of the stream is reached, at
 * which time the caller should invoke virStreamFinish()
 * to get confirmation of stream completion.
 *
 * Returns -1 upon error, at which time the stream will
 * be marked as aborted, and the caller should now release
 * the stream with virStreamFree.
 *
 * Returns -2 if there is no data pending to be read & the
 * stream is marked as non-blocking.
 */
15987 15988 15989 15990
int
virStreamRecv(virStreamPtr stream,
              char *data,
              size_t nbytes)
15991
{
15992
    VIR_DEBUG("stream=%p, data=%p, nbytes=%zi", stream, data, nbytes);
15993 15994 15995

    virResetLastError();

15996
    virCheckStreamReturn(stream, -1);
15997
    virCheckNonNullArgGoto(data, error);
15998

15999 16000 16001 16002 16003 16004 16005 16006 16007 16008 16009
    if (stream->driver &&
        stream->driver->streamRecv) {
        int ret;
        ret = (stream->driver->streamRecv)(stream, data, nbytes);
        if (ret == -2)
            return -2;
        if (ret < 0)
            goto error;
        return ret;
    }

16010
    virReportUnsupportedError();
16011

16012
 error:
16013
    virDispatchError(stream->conn);
16014 16015 16016 16017 16018 16019 16020 16021 16022 16023 16024 16025
    return -1;
}


/**
 * virStreamSendAll:
 * @stream: pointer to the stream object
 * @handler: source callback for reading data from application
 * @opaque: application defined data
 *
 * Send the entire data stream, reading the data from the
 * requested data source. This is simply a convenient alternative
16026
 * to virStreamSend, for apps that do blocking-I/O.
16027
 *
D
Dan Kenigsberg 已提交
16028
 * An example using this with a hypothetical file upload
16029 16030 16031 16032 16033 16034 16035 16036 16037
 * API looks like
 *
 *   int mysource(virStreamPtr st, char *buf, int nbytes, void *opaque) {
 *       int *fd = opaque;
 *
 *       return read(*fd, buf, nbytes);
 *   }
 *
 *   virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
16038
 *   int fd = open("demo.iso", O_RDONLY);
16039 16040 16041 16042 16043 16044 16045 16046 16047 16048 16049
 *
 *   virConnectUploadFile(conn, st);
 *   if (virStreamSendAll(st, mysource, &fd) < 0) {
 *      ...report an error ...
 *      goto done;
 *   }
 *   if (virStreamFinish(st) < 0)
 *      ...report an error...
 *   virStreamFree(st);
 *   close(fd);
 *
16050
 * Returns 0 if all the data was successfully sent. The caller
16051 16052 16053 16054 16055 16056 16057
 * should invoke virStreamFinish(st) to flush the stream upon
 * success and then virStreamFree
 *
 * Returns -1 upon any error, with virStreamAbort() already
 * having been called,  so the caller need only call
 * virStreamFree()
 */
16058 16059 16060 16061
int
virStreamSendAll(virStreamPtr stream,
                 virStreamSourceFunc handler,
                 void *opaque)
16062 16063 16064 16065
{
    char *bytes = NULL;
    int want = 1024*64;
    int ret = -1;
16066
    VIR_DEBUG("stream=%p, handler=%p, opaque=%p", stream, handler, opaque);
16067 16068 16069

    virResetLastError();

16070
    virCheckStreamReturn(stream, -1);
16071
    virCheckNonNullArgGoto(handler, cleanup);
16072

16073
    if (stream->flags & VIR_STREAM_NONBLOCK) {
16074 16075
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("data sources cannot be used for non-blocking streams"));
16076 16077 16078
        goto cleanup;
    }

16079
    if (VIR_ALLOC_N(bytes, want) < 0)
16080 16081 16082 16083 16084 16085 16086 16087 16088 16089 16090 16091 16092 16093 16094 16095 16096 16097 16098 16099 16100
        goto cleanup;

    for (;;) {
        int got, offset = 0;
        got = (handler)(stream, bytes, want, opaque);
        if (got < 0) {
            virStreamAbort(stream);
            goto cleanup;
        }
        if (got == 0)
            break;
        while (offset < got) {
            int done;
            done = virStreamSend(stream, bytes + offset, got - offset);
            if (done < 0)
                goto cleanup;
            offset += done;
        }
    }
    ret = 0;

16101
 cleanup:
16102 16103 16104
    VIR_FREE(bytes);

    if (ret != 0)
16105
        virDispatchError(stream->conn);
16106 16107 16108 16109 16110 16111 16112 16113 16114 16115 16116 16117 16118

    return ret;
}


/**
 * virStreamRecvAll:
 * @stream: pointer to the stream object
 * @handler: sink callback for writing data to application
 * @opaque: application defined data
 *
 * Receive the entire data stream, sending the data to the
 * requested data sink. This is simply a convenient alternative
16119
 * to virStreamRecv, for apps that do blocking-I/O.
16120
 *
D
Dan Kenigsberg 已提交
16121
 * An example using this with a hypothetical file download
16122 16123 16124 16125 16126 16127 16128 16129 16130
 * API looks like
 *
 *   int mysink(virStreamPtr st, const char *buf, int nbytes, void *opaque) {
 *       int *fd = opaque;
 *
 *       return write(*fd, buf, nbytes);
 *   }
 *
 *   virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
16131
 *   int fd = open("demo.iso", O_WRONLY);
16132 16133 16134 16135 16136 16137 16138 16139 16140 16141 16142
 *
 *   virConnectUploadFile(conn, st);
 *   if (virStreamRecvAll(st, mysink, &fd) < 0) {
 *      ...report an error ...
 *      goto done;
 *   }
 *   if (virStreamFinish(st) < 0)
 *      ...report an error...
 *   virStreamFree(st);
 *   close(fd);
 *
16143
 * Returns 0 if all the data was successfully received. The caller
16144 16145 16146 16147 16148 16149 16150
 * should invoke virStreamFinish(st) to flush the stream upon
 * success and then virStreamFree
 *
 * Returns -1 upon any error, with virStreamAbort() already
 * having been called,  so the caller need only call
 * virStreamFree()
 */
16151 16152 16153 16154
int
virStreamRecvAll(virStreamPtr stream,
                 virStreamSinkFunc handler,
                 void *opaque)
16155 16156 16157 16158
{
    char *bytes = NULL;
    int want = 1024*64;
    int ret = -1;
16159
    VIR_DEBUG("stream=%p, handler=%p, opaque=%p", stream, handler, opaque);
16160 16161 16162

    virResetLastError();

16163
    virCheckStreamReturn(stream, -1);
16164
    virCheckNonNullArgGoto(handler, cleanup);
16165

16166
    if (stream->flags & VIR_STREAM_NONBLOCK) {
16167 16168
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("data sinks cannot be used for non-blocking streams"));
16169 16170 16171 16172
        goto cleanup;
    }


16173
    if (VIR_ALLOC_N(bytes, want) < 0)
16174 16175 16176 16177 16178 16179 16180 16181 16182 16183 16184 16185 16186 16187 16188 16189 16190 16191 16192 16193 16194
        goto cleanup;

    for (;;) {
        int got, offset = 0;
        got = virStreamRecv(stream, bytes, want);
        if (got < 0)
            goto cleanup;
        if (got == 0)
            break;
        while (offset < got) {
            int done;
            done = (handler)(stream, bytes + offset, got - offset, opaque);
            if (done < 0) {
                virStreamAbort(stream);
                goto cleanup;
            }
            offset += done;
        }
    }
    ret = 0;

16195
 cleanup:
16196 16197 16198
    VIR_FREE(bytes);

    if (ret != 0)
16199
        virDispatchError(stream->conn);
16200 16201 16202 16203 16204 16205

    return ret;
}


/**
M
Matthias Bolte 已提交
16206
 * virStreamEventAddCallback:
16207 16208 16209 16210 16211 16212 16213 16214 16215 16216 16217 16218 16219
 * @stream: pointer to the stream object
 * @events: set of events to monitor
 * @cb: callback to invoke when an event occurs
 * @opaque: application defined data
 * @ff: callback to free @opaque data
 *
 * Register a callback to be notified when a stream
 * becomes writable, or readable. This is most commonly
 * used in conjunction with non-blocking data streams
 * to integrate into an event loop
 *
 * Returns 0 on success, -1 upon error
 */
16220 16221 16222 16223 16224 16225
int
virStreamEventAddCallback(virStreamPtr stream,
                          int events,
                          virStreamEventCallback cb,
                          void *opaque,
                          virFreeCallback ff)
16226
{
16227 16228
    VIR_DEBUG("stream=%p, events=%d, cb=%p, opaque=%p, ff=%p",
              stream, events, cb, opaque, ff);
16229 16230 16231

    virResetLastError();

16232
    virCheckStreamReturn(stream, -1);
16233 16234

    if (stream->driver &&
16235
        stream->driver->streamEventAddCallback) {
16236
        int ret;
16237
        ret = (stream->driver->streamEventAddCallback)(stream, events, cb, opaque, ff);
16238 16239 16240 16241 16242
        if (ret < 0)
            goto error;
        return ret;
    }

16243
    virReportUnsupportedError();
16244

16245
 error:
16246
    virDispatchError(stream->conn);
16247 16248 16249 16250 16251
    return -1;
}


/**
M
Matthias Bolte 已提交
16252
 * virStreamEventUpdateCallback:
16253 16254 16255 16256 16257 16258
 * @stream: pointer to the stream object
 * @events: set of events to monitor
 *
 * Changes the set of events to monitor for a stream. This allows
 * for event notification to be changed without having to
 * unregister & register the callback completely. This method
E
Eric Blake 已提交
16259
 * is guaranteed to succeed if a callback is already registered
16260 16261 16262
 *
 * Returns 0 on success, -1 if no callback is registered
 */
16263 16264 16265
int
virStreamEventUpdateCallback(virStreamPtr stream,
                             int events)
16266
{
16267
    VIR_DEBUG("stream=%p, events=%d", stream, events);
16268 16269 16270

    virResetLastError();

16271
    virCheckStreamReturn(stream, -1);
16272 16273

    if (stream->driver &&
16274
        stream->driver->streamEventUpdateCallback) {
16275
        int ret;
16276
        ret = (stream->driver->streamEventUpdateCallback)(stream, events);
16277 16278 16279 16280 16281
        if (ret < 0)
            goto error;
        return ret;
    }

16282
    virReportUnsupportedError();
16283

16284
 error:
16285
    virDispatchError(stream->conn);
16286 16287 16288
    return -1;
}

16289

16290
/**
M
Matthias Bolte 已提交
16291
 * virStreamEventRemoveCallback:
16292 16293
 * @stream: pointer to the stream object
 *
D
Dan Kenigsberg 已提交
16294
 * Remove an event callback from the stream
16295 16296 16297
 *
 * Returns 0 on success, -1 on error
 */
16298 16299
int
virStreamEventRemoveCallback(virStreamPtr stream)
16300
{
16301
    VIR_DEBUG("stream=%p", stream);
16302 16303 16304

    virResetLastError();

16305
    virCheckStreamReturn(stream, -1);
16306 16307

    if (stream->driver &&
16308
        stream->driver->streamEventRemoveCallback) {
16309
        int ret;
16310
        ret = (stream->driver->streamEventRemoveCallback)(stream);
16311 16312 16313 16314 16315
        if (ret < 0)
            goto error;
        return ret;
    }

16316
    virReportUnsupportedError();
16317

16318
 error:
16319
    virDispatchError(stream->conn);
16320 16321 16322
    return -1;
}

16323

16324 16325 16326 16327
/**
 * virStreamFinish:
 * @stream: pointer to the stream object
 *
16328
 * Indicate that there is no further data to be transmitted
16329 16330 16331 16332 16333 16334 16335 16336 16337 16338
 * on the stream. For output streams this should be called once
 * all data has been written. For input streams this should be
 * called once virStreamRecv returns end-of-file.
 *
 * This method is a synchronization point for all asynchronous
 * errors, so if this returns a success code the application can
 * be sure that all data has been successfully processed.
 *
 * Returns 0 on success, -1 upon error
 */
16339 16340
int
virStreamFinish(virStreamPtr stream)
16341
{
16342
    VIR_DEBUG("stream=%p", stream);
16343 16344 16345

    virResetLastError();

16346
    virCheckStreamReturn(stream, -1);
16347 16348 16349 16350 16351 16352 16353 16354 16355 16356

    if (stream->driver &&
        stream->driver->streamFinish) {
        int ret;
        ret = (stream->driver->streamFinish)(stream);
        if (ret < 0)
            goto error;
        return ret;
    }

16357
    virReportUnsupportedError();
16358

16359
 error:
16360
    virDispatchError(stream->conn);
16361 16362 16363
    return -1;
}

16364

16365 16366 16367 16368 16369 16370 16371 16372 16373 16374 16375 16376 16377
/**
 * virStreamAbort:
 * @stream: pointer to the stream object
 *
 * Request that the in progress data transfer be cancelled
 * abnormally before the end of the stream has been reached.
 * For output streams this can be used to inform the driver
 * that the stream is being terminated early. For input
 * streams this can be used to inform the driver that it
 * should stop sending data.
 *
 * Returns 0 on success, -1 upon error
 */
16378 16379
int
virStreamAbort(virStreamPtr stream)
16380
{
16381
    VIR_DEBUG("stream=%p", stream);
16382 16383 16384

    virResetLastError();

16385
    virCheckStreamReturn(stream, -1);
16386

16387 16388 16389 16390 16391 16392
    if (!stream->driver) {
        VIR_DEBUG("aborting unused stream");
        return 0;
    }

    if (stream->driver->streamAbort) {
16393 16394 16395 16396 16397 16398 16399
        int ret;
        ret = (stream->driver->streamAbort)(stream);
        if (ret < 0)
            goto error;
        return ret;
    }

16400
    virReportUnsupportedError();
16401

16402
 error:
16403
    virDispatchError(stream->conn);
16404 16405 16406
    return -1;
}

16407

16408 16409 16410 16411 16412 16413 16414
/**
 * virStreamFree:
 * @stream: pointer to the stream object
 *
 * Decrement the reference count on a stream, releasing
 * the stream object if the reference count has hit zero.
 *
D
Dan Kenigsberg 已提交
16415
 * There must not be an active data transfer in progress
16416 16417 16418 16419 16420 16421
 * when releasing the stream. If a stream needs to be
 * disposed of prior to end of stream being reached, then
 * the virStreamAbort function should be called first.
 *
 * Returns 0 upon success, or -1 on error
 */
16422 16423
int
virStreamFree(virStreamPtr stream)
16424
{
16425
    VIR_DEBUG("stream=%p", stream);
16426 16427 16428

    virResetLastError();

16429
    virCheckStreamReturn(stream, -1);
16430 16431 16432

    /* XXX Enforce shutdown before free'ing resources ? */

16433
    virObjectUnref(stream);
16434
    return 0;
16435
}
16436 16437 16438 16439 16440 16441 16442 16443 16444 16445


/**
 * virDomainIsActive:
 * @dom: pointer to the domain object
 *
 * Determine if the domain is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
16446 16447
int
virDomainIsActive(virDomainPtr dom)
16448
{
16449
    VIR_DEBUG("dom=%p", dom);
16450 16451 16452

    virResetLastError();

16453 16454
    virCheckDomainReturn(dom, -1);

16455 16456 16457 16458 16459 16460 16461 16462
    if (dom->conn->driver->domainIsActive) {
        int ret;
        ret = dom->conn->driver->domainIsActive(dom);
        if (ret < 0)
            goto error;
        return ret;
    }

16463
    virReportUnsupportedError();
16464
 error:
16465
    virDispatchError(dom->conn);
16466 16467 16468
    return -1;
}

16469

16470 16471 16472 16473 16474 16475 16476 16477 16478
/**
 * virDomainIsPersistent:
 * @dom: pointer to the domain object
 *
 * Determine if the domain has a persistent configuration
 * which means it will still exist after shutting down
 *
 * Returns 1 if persistent, 0 if transient, -1 on error
 */
16479 16480
int
virDomainIsPersistent(virDomainPtr dom)
16481
{
16482
    VIR_DOMAIN_DEBUG(dom);
16483 16484 16485

    virResetLastError();

16486 16487
    virCheckDomainReturn(dom, -1);

16488 16489 16490 16491 16492 16493 16494 16495
    if (dom->conn->driver->domainIsPersistent) {
        int ret;
        ret = dom->conn->driver->domainIsPersistent(dom);
        if (ret < 0)
            goto error;
        return ret;
    }

16496
    virReportUnsupportedError();
16497
 error:
16498
    virDispatchError(dom->conn);
16499 16500 16501
    return -1;
}

16502

16503 16504 16505 16506 16507 16508 16509 16510
/**
 * virDomainIsUpdated:
 * @dom: pointer to the domain object
 *
 * Determine if the domain has been updated.
 *
 * Returns 1 if updated, 0 if not, -1 on error
 */
16511 16512
int
virDomainIsUpdated(virDomainPtr dom)
16513
{
16514
    VIR_DOMAIN_DEBUG(dom);
16515 16516 16517

    virResetLastError();

16518 16519
    virCheckDomainReturn(dom, -1);

16520 16521 16522 16523 16524 16525 16526 16527
    if (dom->conn->driver->domainIsUpdated) {
        int ret;
        ret = dom->conn->driver->domainIsUpdated(dom);
        if (ret < 0)
            goto error;
        return ret;
    }

16528
    virReportUnsupportedError();
16529
 error:
16530 16531 16532 16533
    virDispatchError(dom->conn);
    return -1;
}

16534

16535 16536 16537 16538 16539 16540 16541 16542
/**
 * virNetworkIsActive:
 * @net: pointer to the network object
 *
 * Determine if the network is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
16543 16544
int
virNetworkIsActive(virNetworkPtr net)
16545
{
16546
    VIR_DEBUG("net=%p", net);
16547 16548 16549

    virResetLastError();

16550 16551
    virCheckNetworkReturn(net, -1);

16552 16553 16554 16555 16556 16557 16558 16559
    if (net->conn->networkDriver->networkIsActive) {
        int ret;
        ret = net->conn->networkDriver->networkIsActive(net);
        if (ret < 0)
            goto error;
        return ret;
    }

16560
    virReportUnsupportedError();
16561
 error:
16562
    virDispatchError(net->conn);
16563 16564 16565 16566 16567 16568 16569 16570 16571 16572 16573 16574 16575
    return -1;
}


/**
 * virNetworkIsPersistent:
 * @net: pointer to the network object
 *
 * Determine if the network has a persistent configuration
 * which means it will still exist after shutting down
 *
 * Returns 1 if persistent, 0 if transient, -1 on error
 */
16576 16577
int
virNetworkIsPersistent(virNetworkPtr net)
16578
{
16579
    VIR_DEBUG("net=%p", net);
16580 16581 16582

    virResetLastError();

16583 16584
    virCheckNetworkReturn(net, -1);

16585 16586 16587 16588 16589 16590 16591 16592
    if (net->conn->networkDriver->networkIsPersistent) {
        int ret;
        ret = net->conn->networkDriver->networkIsPersistent(net);
        if (ret < 0)
            goto error;
        return ret;
    }

16593
    virReportUnsupportedError();
16594
 error:
16595
    virDispatchError(net->conn);
16596 16597 16598 16599 16600 16601 16602 16603 16604 16605 16606 16607
    return -1;
}


/**
 * virStoragePoolIsActive:
 * @pool: pointer to the storage pool object
 *
 * Determine if the storage pool is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
16608 16609
int
virStoragePoolIsActive(virStoragePoolPtr pool)
16610
{
16611
    VIR_DEBUG("pool=%p", pool);
16612 16613 16614

    virResetLastError();

16615 16616
    virCheckStoragePoolReturn(pool, -1);

16617
    if (pool->conn->storageDriver->storagePoolIsActive) {
16618
        int ret;
16619
        ret = pool->conn->storageDriver->storagePoolIsActive(pool);
16620 16621 16622 16623 16624
        if (ret < 0)
            goto error;
        return ret;
    }

16625
    virReportUnsupportedError();
16626
 error:
16627
    virDispatchError(pool->conn);
16628 16629 16630 16631 16632 16633 16634 16635 16636 16637 16638 16639 16640
    return -1;
}


/**
 * virStoragePoolIsPersistent:
 * @pool: pointer to the storage pool object
 *
 * Determine if the storage pool has a persistent configuration
 * which means it will still exist after shutting down
 *
 * Returns 1 if persistent, 0 if transient, -1 on error
 */
16641 16642
int
virStoragePoolIsPersistent(virStoragePoolPtr pool)
16643
{
16644
    VIR_DEBUG("pool=%p", pool);
16645 16646 16647

    virResetLastError();

16648 16649
    virCheckStoragePoolReturn(pool, -1);

16650
    if (pool->conn->storageDriver->storagePoolIsPersistent) {
16651
        int ret;
16652
        ret = pool->conn->storageDriver->storagePoolIsPersistent(pool);
16653 16654 16655 16656 16657
        if (ret < 0)
            goto error;
        return ret;
    }

16658
    virReportUnsupportedError();
16659
 error:
16660
    virDispatchError(pool->conn);
16661 16662 16663 16664
    return -1;
}


S
Stefan Berger 已提交
16665 16666 16667 16668 16669 16670 16671 16672 16673 16674 16675
/**
 * virConnectNumOfNWFilters:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of nwfilters.
 *
 * Returns the number of nwfilters found or -1 in case of error
 */
int
virConnectNumOfNWFilters(virConnectPtr conn)
{
16676
    VIR_DEBUG("conn=%p", conn);
S
Stefan Berger 已提交
16677 16678 16679

    virResetLastError();

16680
    virCheckConnectReturn(conn, -1);
S
Stefan Berger 已提交
16681

16682
    if (conn->nwfilterDriver && conn->nwfilterDriver->connectNumOfNWFilters) {
S
Stefan Berger 已提交
16683
        int ret;
16684
        ret = conn->nwfilterDriver->connectNumOfNWFilters(conn);
S
Stefan Berger 已提交
16685 16686 16687 16688 16689
        if (ret < 0)
            goto error;
        return ret;
    }

16690
    virReportUnsupportedError();
S
Stefan Berger 已提交
16691

16692
 error:
S
Stefan Berger 已提交
16693 16694 16695 16696
    virDispatchError(conn);
    return -1;
}

16697

16698 16699 16700 16701 16702 16703 16704 16705 16706 16707 16708 16709 16710 16711 16712 16713 16714 16715 16716 16717 16718 16719 16720 16721 16722 16723 16724 16725 16726
/**
 * virConnectListAllNWFilters:
 * @conn: Pointer to the hypervisor connection.
 * @filters: Pointer to a variable to store the array containing the network
 *           filter objects or NULL if the list is not required (just returns
 *           number of network filters).
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Collect the list of network filters, and allocate an array to store those
 * objects.
 *
 * Returns the number of network filters found or -1 and sets @filters to  NULL
 * in case of error.  On success, the array stored into @filters is guaranteed to
 * have an extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virNWFilterFree() on each array element, then calling free() on @filters.
 */
int
virConnectListAllNWFilters(virConnectPtr conn,
                           virNWFilterPtr **filters,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, filters=%p, flags=%x", conn, filters, flags);

    virResetLastError();

    if (filters)
        *filters = NULL;

16727
    virCheckConnectReturn(conn, -1);
16728 16729

    if (conn->nwfilterDriver &&
16730
        conn->nwfilterDriver->connectListAllNWFilters) {
16731
        int ret;
16732
        ret = conn->nwfilterDriver->connectListAllNWFilters(conn, filters, flags);
16733 16734 16735 16736 16737
        if (ret < 0)
            goto error;
        return ret;
    }

16738
    virReportUnsupportedError();
16739

16740
 error:
16741 16742 16743
    virDispatchError(conn);
    return -1;
}
S
Stefan Berger 已提交
16744

16745

S
Stefan Berger 已提交
16746 16747 16748 16749 16750 16751 16752 16753 16754 16755 16756 16757 16758
/**
 * virConnectListNWFilters:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of network filters
 * @maxnames: size of @names
 *
 * Collect the list of network filters, and store their names in @names
 *
 * Returns the number of network filters found or -1 in case of error
 */
int
virConnectListNWFilters(virConnectPtr conn, char **const names, int maxnames)
{
16759
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
S
Stefan Berger 已提交
16760 16761 16762

    virResetLastError();

16763
    virCheckConnectReturn(conn, -1);
16764 16765
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
S
Stefan Berger 已提交
16766

16767
    if (conn->nwfilterDriver && conn->nwfilterDriver->connectListNWFilters) {
S
Stefan Berger 已提交
16768
        int ret;
16769
        ret = conn->nwfilterDriver->connectListNWFilters(conn, names, maxnames);
S
Stefan Berger 已提交
16770 16771 16772 16773 16774
        if (ret < 0)
            goto error;
        return ret;
    }

16775
    virReportUnsupportedError();
S
Stefan Berger 已提交
16776

16777
 error:
S
Stefan Berger 已提交
16778 16779 16780 16781 16782 16783 16784 16785 16786 16787 16788 16789 16790 16791 16792 16793 16794 16795
    virDispatchError(conn);
    return -1;
}


/**
 * virNWFilterLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the network filter
 *
 * Try to lookup a network filter on the given hypervisor based on its name.
 *
 * Returns a new nwfilter object or NULL in case of failure.  If the
 * network filter cannot be found, then VIR_ERR_NO_NWFILTER error is raised.
 */
virNWFilterPtr
virNWFilterLookupByName(virConnectPtr conn, const char *name)
{
16796
    VIR_DEBUG("conn=%p, name=%s", conn, name);
S
Stefan Berger 已提交
16797 16798 16799

    virResetLastError();

16800
    virCheckConnectReturn(conn, NULL);
16801
    virCheckNonNullArgGoto(name, error);
S
Stefan Berger 已提交
16802 16803 16804

    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterLookupByName) {
        virNWFilterPtr ret;
16805
        ret = conn->nwfilterDriver->nwfilterLookupByName(conn, name);
S
Stefan Berger 已提交
16806 16807 16808 16809 16810
        if (!ret)
            goto error;
        return ret;
    }

16811
    virReportUnsupportedError();
S
Stefan Berger 已提交
16812

16813
 error:
S
Stefan Berger 已提交
16814 16815 16816 16817
    virDispatchError(conn);
    return NULL;
}

16818

S
Stefan Berger 已提交
16819 16820 16821 16822 16823 16824 16825 16826 16827 16828 16829 16830 16831
/**
 * virNWFilterLookupByUUID:
 * @conn: pointer to the hypervisor connection
 * @uuid: the raw UUID for the network filter
 *
 * Try to lookup a network filter on the given hypervisor based on its UUID.
 *
 * Returns a new nwfilter object or NULL in case of failure.  If the
 * nwfdilter cannot be found, then VIR_ERR_NO_NWFILTER error is raised.
 */
virNWFilterPtr
virNWFilterLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
{
16832
    VIR_UUID_DEBUG(conn, uuid);
S
Stefan Berger 已提交
16833 16834 16835

    virResetLastError();

16836
    virCheckConnectReturn(conn, NULL);
16837
    virCheckNonNullArgGoto(uuid, error);
S
Stefan Berger 已提交
16838 16839 16840

    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterLookupByUUID){
        virNWFilterPtr ret;
16841
        ret = conn->nwfilterDriver->nwfilterLookupByUUID(conn, uuid);
S
Stefan Berger 已提交
16842 16843 16844 16845 16846
        if (!ret)
            goto error;
        return ret;
    }

16847
    virReportUnsupportedError();
S
Stefan Berger 已提交
16848

16849
 error:
S
Stefan Berger 已提交
16850 16851 16852 16853
    virDispatchError(conn);
    return NULL;
}

16854

S
Stefan Berger 已提交
16855
/**
16856
 * virNWFilterLookupByUUIDString:
S
Stefan Berger 已提交
16857 16858 16859 16860 16861 16862 16863 16864 16865 16866 16867 16868
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the nwfilter
 *
 * Try to lookup an nwfilter on the given hypervisor based on its UUID.
 *
 * Returns a new nwfilter object or NULL in case of failure.  If the
 * nwfilter cannot be found, then VIR_ERR_NO_NWFILTER error is raised.
 */
virNWFilterPtr
virNWFilterLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
    unsigned char uuid[VIR_UUID_BUFLEN];
16869
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
S
Stefan Berger 已提交
16870 16871 16872

    virResetLastError();

16873
    virCheckConnectReturn(conn, NULL);
16874
    virCheckNonNullArgGoto(uuidstr, error);
S
Stefan Berger 已提交
16875 16876

    if (virUUIDParse(uuidstr, uuid) < 0) {
16877 16878 16879
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
S
Stefan Berger 已提交
16880 16881 16882 16883 16884
        goto error;
    }

    return virNWFilterLookupByUUID(conn, &uuid[0]);

16885
 error:
S
Stefan Berger 已提交
16886 16887 16888 16889
    virDispatchError(conn);
    return NULL;
}

16890

S
Stefan Berger 已提交
16891 16892 16893 16894 16895 16896 16897 16898 16899 16900 16901 16902
/**
 * virNWFilterFree:
 * @nwfilter: a nwfilter object
 *
 * Free the nwfilter object. The running instance is kept alive.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNWFilterFree(virNWFilterPtr nwfilter)
{
16903
    VIR_DEBUG("nwfilter=%p", nwfilter);
S
Stefan Berger 已提交
16904 16905 16906

    virResetLastError();

16907
    virCheckNWFilterReturn(nwfilter, -1);
16908 16909

    virObjectUnref(nwfilter);
S
Stefan Berger 已提交
16910 16911 16912
    return 0;
}

16913

S
Stefan Berger 已提交
16914 16915 16916 16917 16918 16919 16920 16921 16922 16923 16924 16925
/**
 * virNWFilterGetName:
 * @nwfilter: a nwfilter object
 *
 * Get the public name for the network filter
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the nwfilter object.
 */
const char *
virNWFilterGetName(virNWFilterPtr nwfilter)
{
16926
    VIR_DEBUG("nwfilter=%p", nwfilter);
S
Stefan Berger 已提交
16927 16928 16929

    virResetLastError();

16930 16931
    virCheckNWFilterReturn(nwfilter, NULL);

16932
    return nwfilter->name;
S
Stefan Berger 已提交
16933 16934
}

16935

S
Stefan Berger 已提交
16936 16937 16938 16939 16940 16941 16942 16943 16944 16945 16946 16947
/**
 * virNWFilterGetUUID:
 * @nwfilter: a nwfilter object
 * @uuid: pointer to a VIR_UUID_BUFLEN bytes array
 *
 * Get the UUID for a network filter
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNWFilterGetUUID(virNWFilterPtr nwfilter, unsigned char *uuid)
{
16948
    VIR_DEBUG("nwfilter=%p, uuid=%p", nwfilter, uuid);
S
Stefan Berger 已提交
16949 16950 16951

    virResetLastError();

16952
    virCheckNWFilterReturn(nwfilter, -1);
16953
    virCheckNonNullArgGoto(uuid, error);
S
Stefan Berger 已提交
16954 16955 16956 16957 16958

    memcpy(uuid, &nwfilter->uuid[0], VIR_UUID_BUFLEN);

    return 0;

16959
 error:
S
Stefan Berger 已提交
16960 16961 16962 16963
    virDispatchError(nwfilter->conn);
    return -1;
}

16964

S
Stefan Berger 已提交
16965 16966 16967 16968 16969 16970 16971 16972 16973 16974 16975 16976 16977
/**
 * virNWFilterGetUUIDString:
 * @nwfilter: a nwfilter object
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
 *
 * Get the UUID for a network filter as string. For more information about
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNWFilterGetUUIDString(virNWFilterPtr nwfilter, char *buf)
{
16978
    VIR_DEBUG("nwfilter=%p, buf=%p", nwfilter, buf);
S
Stefan Berger 已提交
16979 16980 16981

    virResetLastError();

16982
    virCheckNWFilterReturn(nwfilter, -1);
16983
    virCheckNonNullArgGoto(buf, error);
S
Stefan Berger 已提交
16984

E
Eric Blake 已提交
16985
    virUUIDFormat(nwfilter->uuid, buf);
S
Stefan Berger 已提交
16986 16987
    return 0;

16988
 error:
S
Stefan Berger 已提交
16989 16990 16991 16992 16993 16994 16995 16996 16997 16998 16999 17000 17001 17002 17003 17004 17005 17006
    virDispatchError(nwfilter->conn);
    return -1;
}


/**
 * virNWFilterDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: an XML description of the nwfilter
 *
 * Define a new network filter, based on an XML description
 * similar to the one returned by virNWFilterGetXMLDesc()
 *
 * Returns a new nwfilter object or NULL in case of failure
 */
virNWFilterPtr
virNWFilterDefineXML(virConnectPtr conn, const char *xmlDesc)
{
17007
    VIR_DEBUG("conn=%p, xmlDesc=%s", conn, xmlDesc);
S
Stefan Berger 已提交
17008 17009 17010

    virResetLastError();

17011
    virCheckConnectReturn(conn, NULL);
17012
    virCheckNonNullArgGoto(xmlDesc, error);
17013
    virCheckReadOnlyGoto(conn->flags, error);
S
Stefan Berger 已提交
17014

17015
    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterDefineXML) {
S
Stefan Berger 已提交
17016
        virNWFilterPtr ret;
17017
        ret = conn->nwfilterDriver->nwfilterDefineXML(conn, xmlDesc);
S
Stefan Berger 已提交
17018 17019 17020 17021 17022
        if (!ret)
            goto error;
        return ret;
    }

17023
    virReportUnsupportedError();
S
Stefan Berger 已提交
17024

17025
 error:
S
Stefan Berger 已提交
17026 17027 17028 17029 17030 17031 17032 17033 17034 17035 17036 17037 17038 17039 17040 17041 17042 17043 17044
    virDispatchError(conn);
    return NULL;
}


/**
 * virNWFilterUndefine:
 * @nwfilter: a nwfilter object
 *
 * Undefine the nwfilter object. This call will not succeed if
 * a running VM is referencing the filter. This does not free the
 * associated virNWFilterPtr object.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNWFilterUndefine(virNWFilterPtr nwfilter)
{
    virConnectPtr conn;
17045
    VIR_DEBUG("nwfilter=%p", nwfilter);
S
Stefan Berger 已提交
17046 17047 17048

    virResetLastError();

17049
    virCheckNWFilterReturn(nwfilter, -1);
S
Stefan Berger 已提交
17050
    conn = nwfilter->conn;
17051

17052
    virCheckReadOnlyGoto(conn->flags, error);
S
Stefan Berger 已提交
17053

17054
    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterUndefine) {
S
Stefan Berger 已提交
17055
        int ret;
17056
        ret = conn->nwfilterDriver->nwfilterUndefine(nwfilter);
S
Stefan Berger 已提交
17057 17058 17059 17060 17061
        if (ret < 0)
            goto error;
        return ret;
    }

17062
    virReportUnsupportedError();
S
Stefan Berger 已提交
17063

17064
 error:
S
Stefan Berger 已提交
17065 17066 17067 17068 17069 17070 17071 17072
    virDispatchError(nwfilter->conn);
    return -1;
}


/**
 * virNWFilterGetXMLDesc:
 * @nwfilter: a nwfilter object
17073
 * @flags: extra flags; not used yet, so callers should always pass 0
S
Stefan Berger 已提交
17074 17075 17076 17077 17078 17079 17080 17081
 *
 * Provide an XML description of the network filter. The description may be
 * reused later to redefine the network filter with virNWFilterCreateXML().
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
17082
virNWFilterGetXMLDesc(virNWFilterPtr nwfilter, unsigned int flags)
S
Stefan Berger 已提交
17083 17084
{
    virConnectPtr conn;
17085
    VIR_DEBUG("nwfilter=%p, flags=%x", nwfilter, flags);
S
Stefan Berger 已提交
17086 17087 17088

    virResetLastError();

17089
    virCheckNWFilterReturn(nwfilter, NULL);
S
Stefan Berger 已提交
17090 17091
    conn = nwfilter->conn;

17092
    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterGetXMLDesc) {
S
Stefan Berger 已提交
17093
        char *ret;
17094
        ret = conn->nwfilterDriver->nwfilterGetXMLDesc(nwfilter, flags);
S
Stefan Berger 已提交
17095 17096 17097 17098 17099
        if (!ret)
            goto error;
        return ret;
    }

17100
    virReportUnsupportedError();
S
Stefan Berger 已提交
17101

17102
 error:
S
Stefan Berger 已提交
17103 17104 17105 17106 17107 17108 17109 17110 17111 17112 17113 17114 17115 17116 17117 17118 17119 17120 17121 17122 17123 17124 17125 17126 17127
    virDispatchError(nwfilter->conn);
    return NULL;
}


/**
 * virNWFilterRef:
 * @nwfilter: the nwfilter to hold a reference on
 *
 * Increment the reference count on the nwfilter. For each
 * additional call to this method, there shall be a corresponding
 * call to virNWFilterFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using an nwfilter would increment
 * the reference count.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virNWFilterRef(virNWFilterPtr nwfilter)
{
17128 17129 17130
    VIR_DEBUG("nwfilter=%p refs=%d", nwfilter,
              nwfilter ? nwfilter->object.u.s.refs : 0);

17131 17132
    virResetLastError();

17133 17134
    virCheckNWFilterReturn(nwfilter, -1);

17135
    virObjectRef(nwfilter);
S
Stefan Berger 已提交
17136 17137 17138 17139
    return 0;
}


17140 17141 17142 17143 17144 17145 17146 17147
/**
 * virInterfaceIsActive:
 * @iface: pointer to the interface object
 *
 * Determine if the interface is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
17148 17149
int
virInterfaceIsActive(virInterfacePtr iface)
17150
{
17151
    VIR_DEBUG("iface=%p", iface);
17152 17153 17154

    virResetLastError();

17155 17156
    virCheckInterfaceReturn(iface, -1);

17157 17158 17159 17160 17161 17162 17163 17164
    if (iface->conn->interfaceDriver->interfaceIsActive) {
        int ret;
        ret = iface->conn->interfaceDriver->interfaceIsActive(iface);
        if (ret < 0)
            goto error;
        return ret;
    }

17165
    virReportUnsupportedError();
17166
 error:
17167
    virDispatchError(iface->conn);
17168 17169 17170 17171 17172 17173 17174 17175 17176 17177 17178 17179
    return -1;
}


/**
 * virConnectIsEncrypted:
 * @conn: pointer to the connection object
 *
 * Determine if the connection to the hypervisor is encrypted
 *
 * Returns 1 if encrypted, 0 if not encrypted, -1 on error
 */
17180 17181
int
virConnectIsEncrypted(virConnectPtr conn)
17182
{
17183
    VIR_DEBUG("conn=%p", conn);
17184 17185 17186

    virResetLastError();

17187
    virCheckConnectReturn(conn, -1);
17188
    if (conn->driver->connectIsEncrypted) {
17189
        int ret;
17190
        ret = conn->driver->connectIsEncrypted(conn);
17191 17192 17193 17194 17195
        if (ret < 0)
            goto error;
        return ret;
    }

17196
    virReportUnsupportedError();
17197
 error:
17198
    virDispatchError(conn);
17199 17200 17201
    return -1;
}

17202

17203 17204 17205 17206 17207 17208 17209 17210 17211 17212
/**
 * virConnectIsSecure:
 * @conn: pointer to the connection object
 *
 * Determine if the connection to the hypervisor is secure
 *
 * A connection will be classed as secure if it is either
 * encrypted, or running over a channel which is not exposed
 * to eavesdropping (eg a UNIX domain socket, or pipe)
 *
C
Claudio Bley 已提交
17213
 * Returns 1 if secure, 0 if not secure, -1 on error
17214
 */
17215 17216
int
virConnectIsSecure(virConnectPtr conn)
17217
{
17218
    VIR_DEBUG("conn=%p", conn);
17219 17220 17221

    virResetLastError();

17222
    virCheckConnectReturn(conn, -1);
17223
    if (conn->driver->connectIsSecure) {
17224
        int ret;
17225
        ret = conn->driver->connectIsSecure(conn);
17226 17227 17228 17229 17230
        if (ret < 0)
            goto error;
        return ret;
    }

17231
    virReportUnsupportedError();
17232
 error:
17233
    virDispatchError(conn);
17234 17235
    return -1;
}
J
Jiri Denemark 已提交
17236 17237 17238 17239 17240


/**
 * virConnectCompareCPU:
 * @conn: virConnect connection
17241
 * @xmlDesc: XML describing the CPU to compare with host CPU
17242
 * @flags: extra flags; not used yet, so callers should always pass 0
17243 17244
 *
 * Compares the given CPU description with the host CPU
J
Jiri Denemark 已提交
17245 17246 17247 17248 17249 17250 17251 17252
 *
 * Returns comparison result according to enum virCPUCompareResult
 */
int
virConnectCompareCPU(virConnectPtr conn,
                     const char *xmlDesc,
                     unsigned int flags)
{
17253
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
J
Jiri Denemark 已提交
17254 17255 17256

    virResetLastError();

17257
    virCheckConnectReturn(conn, VIR_CPU_COMPARE_ERROR);
17258
    virCheckNonNullArgGoto(xmlDesc, error);
J
Jiri Denemark 已提交
17259

17260
    if (conn->driver->connectCompareCPU) {
J
Jiri Denemark 已提交
17261 17262
        int ret;

17263
        ret = conn->driver->connectCompareCPU(conn, xmlDesc, flags);
J
Jiri Denemark 已提交
17264 17265 17266 17267 17268
        if (ret == VIR_CPU_COMPARE_ERROR)
            goto error;
        return ret;
    }

17269
    virReportUnsupportedError();
J
Jiri Denemark 已提交
17270

17271
 error:
17272
    virDispatchError(conn);
J
Jiri Denemark 已提交
17273 17274
    return VIR_CPU_COMPARE_ERROR;
}
17275 17276


17277 17278 17279 17280 17281 17282 17283 17284 17285 17286 17287 17288 17289 17290 17291 17292 17293 17294 17295 17296 17297 17298 17299 17300 17301 17302
/**
 * virConnectGetCPUModelNames:
 *
 * @conn: virConnect connection
 * @arch: Architecture
 * @models: Pointer to a variable to store the NULL-terminated array of the
 *          CPU models supported for the specified architecture.  Each element
 *          and the array itself must be freed by the caller with free.  Pass
 *          NULL if only the list length is needed.
 * @flags: extra flags; not used yet, so callers should always pass 0.
 *
 * Get the list of supported CPU models for a specific architecture.
 *
 * Returns -1 on error, number of elements in @models on success.
 */
int
virConnectGetCPUModelNames(virConnectPtr conn, const char *arch, char ***models,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, arch=%s, models=%p, flags=%x",
              conn, arch, models, flags);
    virResetLastError();

    if (models)
        *models = NULL;

17303
    virCheckConnectReturn(conn, -1);
17304
    virCheckNonNullArgGoto(arch, error);
17305 17306 17307 17308 17309 17310 17311 17312 17313 17314 17315

    if (conn->driver->connectGetCPUModelNames) {
        int ret;

        ret = conn->driver->connectGetCPUModelNames(conn, arch, models, flags);
        if (ret < 0)
            goto error;

        return ret;
    }

17316
    virReportUnsupportedError();
17317

17318
 error:
17319 17320 17321 17322 17323
    virDispatchError(conn);
    return -1;
}


17324 17325 17326 17327 17328 17329
/**
 * virConnectBaselineCPU:
 *
 * @conn: virConnect connection
 * @xmlCPUs: array of XML descriptions of host CPUs
 * @ncpus: number of CPUs in xmlCPUs
17330
 * @flags: bitwise-OR of virConnectBaselineCPUFlags
17331 17332 17333 17334
 *
 * Computes the most feature-rich CPU which is compatible with all given
 * host CPUs.
 *
17335 17336 17337 17338 17339
 * If @flags includes VIR_CONNECT_BASELINE_CPU_EXPAND_FEATURES then libvirt
 * will explicitly list all CPU features that are part of the host CPU,
 * without this flag features that are part of the CPU model will not be
 * listed.
 *
17340 17341 17342 17343 17344 17345 17346 17347
 * Returns XML description of the computed CPU or NULL on error.
 */
char *
virConnectBaselineCPU(virConnectPtr conn,
                      const char **xmlCPUs,
                      unsigned int ncpus,
                      unsigned int flags)
{
17348
    size_t i;
17349

17350
    VIR_DEBUG("conn=%p, xmlCPUs=%p, ncpus=%u, flags=%x",
17351 17352 17353
              conn, xmlCPUs, ncpus, flags);
    if (xmlCPUs) {
        for (i = 0; i < ncpus; i++)
17354
            VIR_DEBUG("xmlCPUs[%zu]=%s", i, NULLSTR(xmlCPUs[i]));
17355 17356 17357 17358
    }

    virResetLastError();

17359
    virCheckConnectReturn(conn, NULL);
17360
    virCheckNonNullArgGoto(xmlCPUs, error);
17361

17362
    if (conn->driver->connectBaselineCPU) {
17363 17364
        char *cpu;

17365
        cpu = conn->driver->connectBaselineCPU(conn, xmlCPUs, ncpus, flags);
17366 17367 17368 17369 17370
        if (!cpu)
            goto error;
        return cpu;
    }

17371
    virReportUnsupportedError();
17372

17373
 error:
17374 17375 17376
    virDispatchError(conn);
    return NULL;
}
17377 17378 17379 17380 17381 17382 17383 17384 17385 17386


/**
 * virDomainGetJobInfo:
 * @domain: a domain object
 * @info: pointer to a virDomainJobInfo structure allocated by the user
 *
 * Extract information about progress of a background job on a domain.
 * Will return an error if the domain is not active.
 *
E
Eric Blake 已提交
17387 17388 17389
 * This function returns a limited amount of information in comparison
 * to virDomainGetJobStats().
 *
17390 17391 17392 17393 17394 17395
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetJobInfo(virDomainPtr domain, virDomainJobInfoPtr info)
{
    virConnectPtr conn;
17396 17397

    VIR_DOMAIN_DEBUG(domain, "info=%p", info);
17398 17399 17400

    virResetLastError();

17401 17402 17403
    if (info)
        memset(info, 0, sizeof(*info));

17404
    virCheckDomainReturn(domain, -1);
17405
    virCheckNonNullArgGoto(info, error);
17406 17407 17408 17409 17410

    conn = domain->conn;

    if (conn->driver->domainGetJobInfo) {
        int ret;
17411
        ret = conn->driver->domainGetJobInfo(domain, info);
17412 17413 17414 17415 17416
        if (ret < 0)
            goto error;
        return ret;
    }

17417
    virReportUnsupportedError();
17418

17419
 error:
17420 17421
    virDispatchError(domain->conn);
    return -1;
17422 17423 17424 17425 17426 17427 17428 17429 17430 17431 17432 17433 17434 17435 17436 17437 17438 17439 17440 17441 17442 17443 17444 17445 17446 17447 17448 17449 17450 17451 17452 17453 17454 17455 17456
}


/**
 * virDomainGetJobStats:
 * @domain: a domain object
 * @type: where to store the job type (one of virDomainJobType)
 * @params: where to store job statistics
 * @nparams: number of items in @params
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Extract information about progress of a background job on a domain.
 * Will return an error if the domain is not active. The function returns
 * a superset of progress information provided by virDomainGetJobInfo.
 * Possible fields returned in @params are defined by VIR_DOMAIN_JOB_*
 * macros and new fields will likely be introduced in the future so callers
 * may receive fields that they do not understand in case they talk to a
 * newer server.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetJobStats(virDomainPtr domain,
                     int *type,
                     virTypedParameterPtr *params,
                     int *nparams,
                     unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "type=%p, params=%p, nparams=%p, flags=%x",
                     type, params, nparams, flags);

    virResetLastError();

17457
    virCheckDomainReturn(domain, -1);
17458 17459 17460 17461 17462 17463 17464 17465 17466 17467 17468 17469 17470 17471 17472
    virCheckNonNullArgGoto(type, error);
    virCheckNonNullArgGoto(params, error);
    virCheckNonNullArgGoto(nparams, error);

    conn = domain->conn;

    if (conn->driver->domainGetJobStats) {
        int ret;
        ret = conn->driver->domainGetJobStats(domain, type, params,
                                              nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

17473
    virReportUnsupportedError();
17474

17475
 error:
17476 17477
    virDispatchError(domain->conn);
    return -1;
17478
}
17479 17480 17481 17482 17483 17484 17485


/**
 * virDomainAbortJob:
 * @domain: a domain object
 *
 * Requests that the current background job be aborted at the
M
Michal Privoznik 已提交
17486
 * soonest opportunity.
17487 17488 17489 17490 17491 17492 17493 17494
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainAbortJob(virDomainPtr domain)
{
    virConnectPtr conn;

17495
    VIR_DOMAIN_DEBUG(domain);
17496 17497 17498

    virResetLastError();

17499
    virCheckDomainReturn(domain, -1);
17500
    conn = domain->conn;
17501

17502
    virCheckReadOnlyGoto(conn->flags, error);
17503 17504 17505 17506 17507 17508 17509 17510 17511

    if (conn->driver->domainAbortJob) {
        int ret;
        ret = conn->driver->domainAbortJob(domain);
        if (ret < 0)
            goto error;
        return ret;
    }

17512
    virReportUnsupportedError();
17513

17514
 error:
17515 17516 17517
    virDispatchError(conn);
    return -1;
}
17518 17519 17520 17521 17522 17523


/**
 * virDomainMigrateSetMaxDowntime:
 * @domain: a domain object
 * @downtime: maximum tolerable downtime for live migration, in milliseconds
17524
 * @flags: extra flags; not used yet, so callers should always pass 0
17525 17526 17527 17528 17529 17530 17531 17532 17533 17534 17535 17536 17537 17538
 *
 * Sets maximum tolerable time for which the domain is allowed to be paused
 * at the end of live migration. It's supposed to be called while the domain is
 * being live-migrated as a reaction to migration progress.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateSetMaxDowntime(virDomainPtr domain,
                               unsigned long long downtime,
                               unsigned int flags)
{
    virConnectPtr conn;

17539
    VIR_DOMAIN_DEBUG(domain, "downtime=%llu, flags=%x", downtime, flags);
17540 17541 17542

    virResetLastError();

17543
    virCheckDomainReturn(domain, -1);
17544
    conn = domain->conn;
17545

17546
    virCheckReadOnlyGoto(conn->flags, error);
17547 17548 17549 17550 17551 17552 17553

    if (conn->driver->domainMigrateSetMaxDowntime) {
        if (conn->driver->domainMigrateSetMaxDowntime(domain, downtime, flags) < 0)
            goto error;
        return 0;
    }

17554
    virReportUnsupportedError();
17555
 error:
17556 17557 17558 17559
    virDispatchError(conn);
    return -1;
}

17560

17561 17562 17563 17564 17565 17566 17567 17568 17569 17570 17571 17572 17573 17574 17575 17576 17577 17578 17579 17580 17581 17582
/**
 * virDomainMigrateGetCompressionCache:
 * @domain: a domain object
 * @cacheSize: return value of current size of the cache (in bytes)
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Gets current size of the cache (in bytes) used for compressing repeatedly
 * transferred memory pages during live migration.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateGetCompressionCache(virDomainPtr domain,
                                    unsigned long long *cacheSize,
                                    unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cacheSize=%p, flags=%x", cacheSize, flags);

    virResetLastError();

17583
    virCheckDomainReturn(domain, -1);
17584 17585 17586 17587 17588 17589 17590 17591 17592 17593 17594
    conn = domain->conn;

    virCheckNonNullArgGoto(cacheSize, error);

    if (conn->driver->domainMigrateGetCompressionCache) {
        if (conn->driver->domainMigrateGetCompressionCache(domain, cacheSize,
                                                           flags) < 0)
            goto error;
        return 0;
    }

17595
    virReportUnsupportedError();
17596
 error:
17597 17598 17599 17600
    virDispatchError(conn);
    return -1;
}

17601

17602 17603 17604 17605 17606 17607 17608 17609 17610 17611 17612 17613 17614 17615 17616 17617 17618 17619 17620 17621 17622 17623 17624 17625 17626
/**
 * virDomainMigrateSetCompressionCache:
 * @domain: a domain object
 * @cacheSize: size of the cache (in bytes) used for compression
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Sets size of the cache (in bytes) used for compressing repeatedly
 * transferred memory pages during live migration. It's supposed to be called
 * while the domain is being live-migrated as a reaction to migration progress
 * and increasing number of compression cache misses obtained from
 * virDomainGetJobStats.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateSetCompressionCache(virDomainPtr domain,
                                    unsigned long long cacheSize,
                                    unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cacheSize=%llu, flags=%x", cacheSize, flags);

    virResetLastError();

17627
    virCheckDomainReturn(domain, -1);
17628
    conn = domain->conn;
17629

17630
    virCheckReadOnlyGoto(conn->flags, error);
17631 17632 17633 17634 17635 17636 17637 17638

    if (conn->driver->domainMigrateSetCompressionCache) {
        if (conn->driver->domainMigrateSetCompressionCache(domain, cacheSize,
                                                           flags) < 0)
            goto error;
        return 0;
    }

17639
    virReportUnsupportedError();
17640
 error:
17641 17642 17643 17644
    virDispatchError(conn);
    return -1;
}

17645

17646 17647 17648
/**
 * virDomainMigrateSetMaxSpeed:
 * @domain: a domain object
17649
 * @bandwidth: migration bandwidth limit in MiB/s
17650
 * @flags: extra flags; not used yet, so callers should always pass 0
17651
 *
17652
 * The maximum bandwidth (in MiB/s) that will be used to do migration
17653 17654 17655 17656 17657 17658 17659 17660 17661 17662 17663 17664
 * can be specified with the bandwidth parameter. Not all hypervisors
 * will support a bandwidth cap
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateSetMaxSpeed(virDomainPtr domain,
                            unsigned long bandwidth,
                            unsigned int flags)
{
    virConnectPtr conn;

17665
    VIR_DOMAIN_DEBUG(domain, "bandwidth=%lu, flags=%x", bandwidth, flags);
17666 17667 17668

    virResetLastError();

17669
    virCheckDomainReturn(domain, -1);
17670
    conn = domain->conn;
17671

17672
    virCheckReadOnlyGoto(conn->flags, error);
17673 17674 17675 17676 17677 17678 17679

    if (conn->driver->domainMigrateSetMaxSpeed) {
        if (conn->driver->domainMigrateSetMaxSpeed(domain, bandwidth, flags) < 0)
            goto error;
        return 0;
    }

17680
    virReportUnsupportedError();
17681
 error:
17682 17683 17684 17685
    virDispatchError(conn);
    return -1;
}

17686

17687 17688 17689
/**
 * virDomainMigrateGetMaxSpeed:
 * @domain: a domain object
17690
 * @bandwidth: return value of current migration bandwidth limit in MiB/s
17691
 * @flags: extra flags; not used yet, so callers should always pass 0
17692
 *
17693
 * Get the current maximum bandwidth (in MiB/s) that will be used if the
17694 17695 17696 17697 17698 17699 17700 17701 17702 17703 17704 17705 17706 17707 17708
 * domain is migrated.  Not all hypervisors will support a bandwidth limit.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateGetMaxSpeed(virDomainPtr domain,
                            unsigned long *bandwidth,
                            unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "bandwidth = %p, flags=%x", bandwidth, flags);

    virResetLastError();

17709
    virCheckDomainReturn(domain, -1);
17710 17711
    conn = domain->conn;

17712
    virCheckNonNullArgGoto(bandwidth, error);
17713
    virCheckReadOnlyGoto(conn->flags, error);
17714 17715 17716 17717 17718 17719 17720

    if (conn->driver->domainMigrateGetMaxSpeed) {
        if (conn->driver->domainMigrateGetMaxSpeed(domain, bandwidth, flags) < 0)
            goto error;
        return 0;
    }

17721
    virReportUnsupportedError();
17722
 error:
17723 17724 17725 17726
    virDispatchError(conn);
    return -1;
}

17727

17728 17729 17730 17731 17732 17733 17734 17735 17736 17737
/**
 * virConnectDomainEventRegisterAny:
 * @conn: pointer to the connection
 * @dom: pointer to the domain
 * @eventID: the event type to receive
 * @cb: callback to the function handling domain events
 * @opaque: opaque data to pass on to the callback
 * @freecb: optional function to deallocate opaque when not used anymore
 *
 * Adds a callback to receive notifications of arbitrary domain events
E
Eric Blake 已提交
17738 17739 17740
 * occurring on a domain.  This function requires that an event loop
 * has been previously registered with virEventRegisterImpl() or
 * virEventRegisterDefaultImpl().
17741
 *
17742
 * If @dom is NULL, then events will be monitored for any domain. If @dom
E
Eric Blake 已提交
17743
 * is non-NULL, then only the specific domain will be monitored.
17744 17745
 *
 * Most types of event have a callback providing a custom set of parameters
17746
 * for the event. When registering an event, it is thus necessary to use
17747 17748 17749 17750 17751
 * the VIR_DOMAIN_EVENT_CALLBACK() macro to cast the supplied function pointer
 * to match the signature of this method.
 *
 * The virDomainPtr object handle passed into the callback upon delivery
 * of an event is only valid for the duration of execution of the callback.
17752
 * If the callback wishes to keep the domain object after the callback returns,
17753
 * it shall take a reference to it, by calling virDomainRef().
17754
 * The reference can be released once the object is no longer required
17755
 * by calling virDomainFree().
17756 17757 17758
 *
 * The return value from this method is a positive integer identifier
 * for the callback. To unregister a callback, this callback ID should
17759
 * be passed to the virConnectDomainEventDeregisterAny() method.
17760
 *
E
Eric Blake 已提交
17761
 * Returns a callback identifier on success, -1 on failure.
17762 17763 17764 17765 17766 17767 17768 17769 17770
 */
int
virConnectDomainEventRegisterAny(virConnectPtr conn,
                                 virDomainPtr dom,
                                 int eventID,
                                 virConnectDomainEventGenericCallback cb,
                                 void *opaque,
                                 virFreeCallback freecb)
{
17771 17772 17773
    VIR_DOMAIN_DEBUG(dom, "conn=%p, eventID=%d, cb=%p, opaque=%p, freecb=%p",
                     conn, eventID, cb, opaque, freecb);

17774 17775
    virResetLastError();

17776
    virCheckConnectReturn(conn, -1);
17777 17778 17779 17780 17781 17782 17783 17784
    if (dom) {
        virCheckDomainGoto(dom, error);
        if (dom->conn != conn) {
            virReportInvalidArg(dom,
                                _("domain '%s' in %s must match connection"),
                                dom->name, __FUNCTION__);
            goto error;
        }
17785
    }
17786 17787 17788 17789 17790 17791
    virCheckNonNullArgGoto(cb, error);
    virCheckNonNegativeArgGoto(eventID, error);
    if (eventID >= VIR_DOMAIN_EVENT_ID_LAST) {
        virReportInvalidArg(eventID,
                            _("eventID in %s must be less than %d"),
                            __FUNCTION__, VIR_DOMAIN_EVENT_ID_LAST);
17792 17793 17794
        goto error;
    }

17795
    if (conn->driver && conn->driver->connectDomainEventRegisterAny) {
17796
        int ret;
17797
        ret = conn->driver->connectDomainEventRegisterAny(conn, dom, eventID, cb, opaque, freecb);
17798 17799 17800 17801 17802
        if (ret < 0)
            goto error;
        return ret;
    }

17803
    virReportUnsupportedError();
17804
 error:
17805 17806 17807
    virDispatchError(conn);
    return -1;
}
17808

17809

17810 17811 17812 17813 17814 17815
/**
 * virConnectDomainEventDeregisterAny:
 * @conn: pointer to the connection
 * @callbackID: the callback identifier
 *
 * Removes an event callback. The callbackID parameter should be the
17816
 * value obtained from a previous virConnectDomainEventRegisterAny() method.
17817
 *
17818 17819 17820
 * Returns 0 on success, -1 on failure.  Older versions of some hypervisors
 * sometimes returned a positive number on success, but without any reliable
 * semantics on what that number represents. */
17821 17822 17823 17824
int
virConnectDomainEventDeregisterAny(virConnectPtr conn,
                                   int callbackID)
{
17825
    VIR_DEBUG("conn=%p, callbackID=%d", conn, callbackID);
17826 17827 17828

    virResetLastError();

17829
    virCheckConnectReturn(conn, -1);
17830 17831
    virCheckNonNegativeArgGoto(callbackID, error);

17832
    if (conn->driver && conn->driver->connectDomainEventDeregisterAny) {
17833
        int ret;
17834
        ret = conn->driver->connectDomainEventDeregisterAny(conn, callbackID);
17835 17836 17837 17838 17839
        if (ret < 0)
            goto error;
        return ret;
    }

17840
    virReportUnsupportedError();
17841
 error:
17842 17843 17844
    virDispatchError(conn);
    return -1;
}
17845

17846

17847 17848 17849 17850 17851 17852 17853 17854 17855 17856
/**
 * virConnectNetworkEventRegisterAny:
 * @conn: pointer to the connection
 * @net: pointer to the network
 * @eventID: the event type to receive
 * @cb: callback to the function handling network events
 * @opaque: opaque data to pass on to the callback
 * @freecb: optional function to deallocate opaque when not used anymore
 *
 * Adds a callback to receive notifications of arbitrary network events
E
Eric Blake 已提交
17857 17858 17859
 * occurring on a network.  This function requires that an event loop
 * has been previously registered with virEventRegisterImpl() or
 * virEventRegisterDefaultImpl().
17860
 *
17861
 * If @net is NULL, then events will be monitored for any network. If @net
E
Eric Blake 已提交
17862
 * is non-NULL, then only the specific network will be monitored.
17863 17864 17865 17866 17867 17868 17869 17870 17871
 *
 * Most types of event have a callback providing a custom set of parameters
 * for the event. When registering an event, it is thus necessary to use
 * the VIR_NETWORK_EVENT_CALLBACK() macro to cast the supplied function pointer
 * to match the signature of this method.
 *
 * The virNetworkPtr object handle passed into the callback upon delivery
 * of an event is only valid for the duration of execution of the callback.
 * If the callback wishes to keep the network object after the callback
17872
 * returns, it shall take a reference to it, by calling virNetworkRef().
17873
 * The reference can be released once the object is no longer required
17874
 * by calling virNetworkFree().
17875 17876 17877
 *
 * The return value from this method is a positive integer identifier
 * for the callback. To unregister a callback, this callback ID should
17878
 * be passed to the virConnectNetworkEventDeregisterAny() method.
17879
 *
E
Eric Blake 已提交
17880
 * Returns a callback identifier on success, -1 on failure.
17881 17882 17883 17884 17885 17886 17887 17888 17889 17890 17891 17892 17893 17894
 */
int
virConnectNetworkEventRegisterAny(virConnectPtr conn,
                                  virNetworkPtr net,
                                  int eventID,
                                  virConnectNetworkEventGenericCallback cb,
                                  void *opaque,
                                  virFreeCallback freecb)
{
    VIR_DEBUG("conn=%p, eventID=%d, cb=%p, opaque=%p, freecb=%p",
              conn, eventID, cb, opaque, freecb);

    virResetLastError();

17895
    virCheckConnectReturn(conn, -1);
17896 17897 17898 17899 17900 17901 17902 17903
    if (net) {
        virCheckNetworkGoto(net, error);
        if (net->conn != conn) {
            virReportInvalidArg(net,
                                _("network '%s' in %s must match connection"),
                                net->name, __FUNCTION__);
            goto error;
        }
17904 17905 17906 17907 17908 17909 17910 17911 17912 17913 17914
    }
    virCheckNonNullArgGoto(cb, error);
    virCheckNonNegativeArgGoto(eventID, error);

    if (eventID >= VIR_NETWORK_EVENT_ID_LAST) {
        virReportInvalidArg(eventID,
                            _("eventID in %s must be less than %d"),
                            __FUNCTION__, VIR_NETWORK_EVENT_ID_LAST);
        goto error;
    }

17915
    if (conn->networkDriver && conn->networkDriver->connectNetworkEventRegisterAny) {
17916 17917 17918 17919 17920 17921 17922 17923 17924 17925
        int ret;
        ret = conn->networkDriver->connectNetworkEventRegisterAny(conn, net,
                                                                  eventID,
                                                                  cb, opaque,
                                                                  freecb);
        if (ret < 0)
            goto error;
        return ret;
    }

17926
    virReportUnsupportedError();
17927
 error:
17928 17929 17930 17931
    virDispatchError(conn);
    return -1;
}

17932

17933 17934 17935 17936 17937 17938
/**
 * virConnectNetworkEventDeregisterAny:
 * @conn: pointer to the connection
 * @callbackID: the callback identifier
 *
 * Removes an event callback. The callbackID parameter should be the
17939
 * value obtained from a previous virConnectNetworkEventRegisterAny() method.
17940 17941 17942 17943 17944 17945 17946 17947 17948 17949 17950
 *
 * Returns 0 on success, -1 on failure
 */
int
virConnectNetworkEventDeregisterAny(virConnectPtr conn,
                                    int callbackID)
{
    VIR_DEBUG("conn=%p, callbackID=%d", conn, callbackID);

    virResetLastError();

17951
    virCheckConnectReturn(conn, -1);
17952 17953
    virCheckNonNegativeArgGoto(callbackID, error);

17954 17955
    if (conn->networkDriver &&
        conn->networkDriver->connectNetworkEventDeregisterAny) {
17956 17957 17958 17959 17960 17961 17962 17963
        int ret;
        ret = conn->networkDriver->connectNetworkEventDeregisterAny(conn,
                                                                    callbackID);
        if (ret < 0)
            goto error;
        return ret;
    }

17964
    virReportUnsupportedError();
17965
 error:
17966 17967 17968 17969
    virDispatchError(conn);
    return -1;
}

17970

17971 17972 17973
/**
 * virDomainManagedSave:
 * @dom: pointer to the domain
17974
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
17975 17976 17977 17978 17979 17980 17981 17982
 *
 * This method will suspend a domain and save its memory contents to
 * a file on disk. After the call, if successful, the domain is not
 * listed as running anymore.
 * The difference from virDomainSave() is that libvirt is keeping track of
 * the saved state itself, and will reuse it once the domain is being
 * restarted (automatically or via an explicit libvirt call).
 * As a result any running domain is sure to not have a managed saved image.
17983 17984 17985
 * This also implies that managed save only works on persistent domains,
 * since the domain must still exist in order to use virDomainCreate() to
 * restart it.
17986
 *
17987 17988 17989 17990 17991
 * If @flags includes VIR_DOMAIN_SAVE_BYPASS_CACHE, then libvirt will
 * attempt to bypass the file system cache while creating the file, or
 * fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
17992 17993 17994 17995 17996 17997
 * Normally, the managed saved state will remember whether the domain
 * was running or paused, and start will resume to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override the default saved into the file.  These two
 * flags are mutually exclusive.
 *
17998 17999
 * Returns 0 in case of success or -1 in case of failure
 */
18000 18001
int
virDomainManagedSave(virDomainPtr dom, unsigned int flags)
18002 18003 18004
{
    virConnectPtr conn;

18005
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);
18006 18007 18008

    virResetLastError();

18009
    virCheckDomainReturn(dom, -1);
18010
    conn = dom->conn;
18011

18012
    virCheckReadOnlyGoto(conn->flags, error);
18013

18014
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
18015
        virReportInvalidArg(flags,
18016 18017
                            _("running and paused flags in %s are mutually "
                              "exclusive"),
18018
                            __FUNCTION__);
18019 18020 18021
        goto error;
    }

18022 18023 18024 18025 18026 18027 18028 18029 18030
    if (conn->driver->domainManagedSave) {
        int ret;

        ret = conn->driver->domainManagedSave(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18031
    virReportUnsupportedError();
18032

18033
 error:
18034 18035 18036 18037
    virDispatchError(conn);
    return -1;
}

18038

18039 18040 18041
/**
 * virDomainHasManagedSaveImage:
 * @dom: pointer to the domain
18042
 * @flags: extra flags; not used yet, so callers should always pass 0
18043 18044 18045 18046 18047 18048 18049 18050
 *
 * Check if a domain has a managed save image as created by
 * virDomainManagedSave(). Note that any running domain should not have
 * such an image, as it should have been removed on restart.
 *
 * Returns 0 if no image is present, 1 if an image is present, and
 *         -1 in case of error
 */
18051 18052
int
virDomainHasManagedSaveImage(virDomainPtr dom, unsigned int flags)
18053 18054 18055
{
    virConnectPtr conn;

18056
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);
18057 18058 18059

    virResetLastError();

18060
    virCheckDomainReturn(dom, -1);
18061 18062 18063 18064 18065 18066 18067 18068 18069 18070 18071
    conn = dom->conn;

    if (conn->driver->domainHasManagedSaveImage) {
        int ret;

        ret = conn->driver->domainHasManagedSaveImage(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18072
    virReportUnsupportedError();
18073

18074
 error:
18075 18076 18077 18078
    virDispatchError(conn);
    return -1;
}

18079

18080 18081 18082
/**
 * virDomainManagedSaveRemove:
 * @dom: pointer to the domain
18083
 * @flags: extra flags; not used yet, so callers should always pass 0
18084
 *
D
Daniel Veillard 已提交
18085
 * Remove any managed save image for this domain.
18086 18087 18088
 *
 * Returns 0 in case of success, and -1 in case of error
 */
18089 18090
int
virDomainManagedSaveRemove(virDomainPtr dom, unsigned int flags)
18091 18092 18093
{
    virConnectPtr conn;

18094
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);
18095 18096 18097

    virResetLastError();

18098
    virCheckDomainReturn(dom, -1);
18099
    conn = dom->conn;
18100

18101
    virCheckReadOnlyGoto(conn->flags, error);
18102 18103 18104 18105 18106 18107 18108 18109 18110 18111

    if (conn->driver->domainManagedSaveRemove) {
        int ret;

        ret = conn->driver->domainManagedSaveRemove(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18112
    virReportUnsupportedError();
18113

18114
 error:
18115 18116 18117
    virDispatchError(conn);
    return -1;
}
C
Chris Lalancette 已提交
18118

18119

18120 18121 18122 18123 18124 18125 18126 18127 18128 18129 18130 18131 18132 18133 18134 18135
/**
 * virDomainSnapshotGetName:
 * @snapshot: a snapshot object
 *
 * Get the public name for that snapshot
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * as its lifetime will be the same as the snapshot object.
 */
const char *
virDomainSnapshotGetName(virDomainSnapshotPtr snapshot)
{
    VIR_DEBUG("snapshot=%p", snapshot);

    virResetLastError();

18136 18137
    virCheckDomainSnapshotReturn(snapshot, NULL);

18138 18139 18140
    return snapshot->name;
}

18141

18142 18143 18144 18145
/**
 * virDomainSnapshotGetDomain:
 * @snapshot: a snapshot object
 *
18146 18147 18148 18149 18150 18151
 * Provides the domain pointer associated with a snapshot.  The
 * reference counter on the domain is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do not use this
 * function.  Instead, store the domain and the snapshot object together.
18152 18153 18154 18155 18156 18157 18158 18159 18160 18161
 *
 * Returns the domain or NULL.
 */
virDomainPtr
virDomainSnapshotGetDomain(virDomainSnapshotPtr snapshot)
{
    VIR_DEBUG("snapshot=%p", snapshot);

    virResetLastError();

18162 18163
    virCheckDomainSnapshotReturn(snapshot, NULL);

18164 18165 18166
    return snapshot->domain;
}

18167

18168 18169 18170 18171
/**
 * virDomainSnapshotGetConnect:
 * @snapshot: a snapshot object
 *
18172 18173 18174 18175 18176 18177
 * Provides the connection pointer associated with a snapshot.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do not use this
 * function.  Instead, store the connection and the snapshot object together.
18178 18179 18180 18181 18182 18183 18184 18185 18186 18187
 *
 * Returns the connection or NULL.
 */
virConnectPtr
virDomainSnapshotGetConnect(virDomainSnapshotPtr snapshot)
{
    VIR_DEBUG("snapshot=%p", snapshot);

    virResetLastError();

18188 18189
    virCheckDomainSnapshotReturn(snapshot, NULL);

18190 18191 18192
    return snapshot->domain->conn;
}

18193

C
Chris Lalancette 已提交
18194 18195 18196 18197
/**
 * virDomainSnapshotCreateXML:
 * @domain: a domain object
 * @xmlDesc: string containing an XML description of the domain
18198
 * @flags: bitwise-OR of virDomainSnapshotCreateFlags
C
Chris Lalancette 已提交
18199 18200 18201 18202
 *
 * Creates a new snapshot of a domain based on the snapshot xml
 * contained in xmlDesc.
 *
18203 18204 18205 18206 18207 18208 18209 18210 18211 18212 18213 18214 18215 18216 18217 18218 18219 18220 18221 18222 18223 18224 18225 18226 18227 18228 18229 18230 18231 18232 18233 18234 18235 18236 18237
 * If @flags is 0, the domain can be active, in which case the
 * snapshot will be a system checkpoint (both disk state and runtime
 * VM state such as RAM contents), where reverting to the snapshot is
 * the same as resuming from hibernation (TCP connections may have
 * timed out, but everything else picks up where it left off); or
 * the domain can be inactive, in which case the snapshot includes
 * just the disk state prior to booting.  The newly created snapshot
 * becomes current (see virDomainSnapshotCurrent()), and is a child
 * of any previous current snapshot.
 *
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE, then this
 * is a request to reinstate snapshot metadata that was previously
 * discarded, rather than creating a new snapshot.  This can be used
 * to recreate a snapshot hierarchy on a destination, then remove it
 * on the source, in order to allow migration (since migration
 * normally fails if snapshot metadata still remains on the source
 * machine).  When redefining snapshot metadata, the current snapshot
 * will not be altered unless the VIR_DOMAIN_SNAPSHOT_CREATE_CURRENT
 * flag is also present.  It is an error to request the
 * VIR_DOMAIN_SNAPSHOT_CREATE_CURRENT flag without
 * VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE.  On some hypervisors,
 * redefining an existing snapshot can be used to alter host-specific
 * portions of the domain XML to be used during revert (such as
 * backing filenames associated with disk devices), but must not alter
 * guest-visible layout.  When redefining a snapshot name that does
 * not exist, the hypervisor may validate that reverting to the
 * snapshot appears to be possible (for example, disk images have
 * snapshot contents by the requested name).  Not all hypervisors
 * support these flags.
 *
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_NO_METADATA, then the
 * domain's disk images are modified according to @xmlDesc, but then
 * the just-created snapshot has its metadata deleted.  This flag is
 * incompatible with VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE.
 *
18238 18239 18240 18241 18242 18243
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_HALT, then the domain
 * will be inactive after the snapshot completes, regardless of whether
 * it was active before; otherwise, a running domain will still be
 * running after the snapshot.  This flag is invalid on transient domains,
 * and is incompatible with VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE.
 *
18244 18245 18246 18247 18248 18249
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_LIVE, then the domain
 * is not paused while creating the snapshot. This increases the size
 * of the memory dump file, but reduces downtime of the guest while
 * taking the snapshot. Some hypervisors only support this flag during
 * external checkpoints.
 *
18250 18251 18252 18253 18254 18255
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_DISK_ONLY, then the
 * snapshot will be limited to the disks described in @xmlDesc, and no
 * VM state will be saved.  For an active guest, the disk image may be
 * inconsistent (as if power had been pulled), and specifying this
 * with the VIR_DOMAIN_SNAPSHOT_CREATE_HALT flag risks data loss.
 *
18256 18257 18258 18259 18260 18261
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_QUIESCE, then the
 * libvirt will attempt to use guest agent to freeze and thaw all
 * file systems in use within domain OS. However, if the guest agent
 * is not present, an error is thrown. Moreover, this flag requires
 * VIR_DOMAIN_SNAPSHOT_CREATE_DISK_ONLY to be passed as well.
 *
18262
 * By default, if the snapshot involves external files, and any of the
18263 18264 18265 18266 18267 18268 18269
 * destination files already exist as a non-empty regular file, the
 * snapshot is rejected to avoid losing contents of those files.
 * However, if @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_REUSE_EXT,
 * then the destination files must already exist and contain content
 * identical to the source files (this allows a management app to
 * pre-create files with relative backing file names, rather than the
 * default of creating with absolute backing file names).
18270 18271
 *
 * Be aware that although libvirt prefers to report errors up front with
E
Eric Blake 已提交
18272 18273 18274 18275 18276 18277 18278 18279 18280 18281 18282 18283 18284
 * no other effect, some hypervisors have certain types of failures where
 * the overall command can easily fail even though the guest configuration
 * was partially altered (for example, if a disk snapshot request for two
 * disks fails on the second disk, but the first disk alteration cannot be
 * rolled back).  If this API call fails, it is therefore normally
 * necessary to follow up with virDomainGetXMLDesc() and check each disk
 * to determine if any partial changes occurred.  However, if @flags
 * contains VIR_DOMAIN_SNAPSHOT_CREATE_ATOMIC, then libvirt guarantees
 * that this command will not alter any disks unless the entire set of
 * changes can be done atomically, making failure recovery simpler (note
 * that it is still possible to fail after disks have changed, but only
 * in the much rarer cases of running out of memory or disk space).
 *
E
Eric Blake 已提交
18285 18286 18287 18288
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation; in that case, use virDomainBlockJobAbort()
 * to stop the block copy first.
 *
E
Eric Blake 已提交
18289
 * Returns an (opaque) virDomainSnapshotPtr on success, NULL on failure.
C
Chris Lalancette 已提交
18290 18291 18292 18293 18294 18295 18296 18297
 */
virDomainSnapshotPtr
virDomainSnapshotCreateXML(virDomainPtr domain,
                           const char *xmlDesc,
                           unsigned int flags)
{
    virConnectPtr conn;

18298
    VIR_DOMAIN_DEBUG(domain, "xmlDesc=%s, flags=%x", xmlDesc, flags);
C
Chris Lalancette 已提交
18299 18300 18301

    virResetLastError();

18302
    virCheckDomainReturn(domain, NULL);
C
Chris Lalancette 已提交
18303
    conn = domain->conn;
18304

18305
    virCheckNonNullArgGoto(xmlDesc, error);
18306
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
18307

18308 18309
    if ((flags & VIR_DOMAIN_SNAPSHOT_CREATE_CURRENT) &&
        !(flags & VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE)) {
18310
        virReportInvalidArg(flags,
18311 18312
                            _("use of 'current' flag in %s requires "
                              "'redefine' flag"),
18313
                            __FUNCTION__);
18314 18315 18316 18317
        goto error;
    }
    if ((flags & VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE) &&
        (flags & VIR_DOMAIN_SNAPSHOT_CREATE_NO_METADATA)) {
18318
        virReportInvalidArg(flags,
18319 18320
                            _("'redefine' and 'no metadata' flags in %s are "
                              "mutually exclusive"),
18321
                            __FUNCTION__);
18322 18323
        goto error;
    }
18324 18325
    if ((flags & VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE) &&
        (flags & VIR_DOMAIN_SNAPSHOT_CREATE_HALT)) {
18326
        virReportInvalidArg(flags,
18327 18328
                            _("'redefine' and 'halt' flags in %s are mutually "
                              "exclusive"),
18329
                            __FUNCTION__);
18330 18331
        goto error;
    }
18332

C
Chris Lalancette 已提交
18333 18334 18335 18336 18337 18338 18339 18340
    if (conn->driver->domainSnapshotCreateXML) {
        virDomainSnapshotPtr ret;
        ret = conn->driver->domainSnapshotCreateXML(domain, xmlDesc, flags);
        if (!ret)
            goto error;
        return ret;
    }

18341
    virReportUnsupportedError();
18342
 error:
C
Chris Lalancette 已提交
18343 18344 18345 18346
    virDispatchError(conn);
    return NULL;
}

18347

C
Chris Lalancette 已提交
18348 18349 18350
/**
 * virDomainSnapshotGetXMLDesc:
 * @snapshot: a domain snapshot object
18351
 * @flags: bitwise-OR of subset of virDomainXMLFlags
C
Chris Lalancette 已提交
18352 18353 18354
 *
 * Provide an XML description of the domain snapshot.
 *
18355 18356 18357 18358 18359
 * No security-sensitive data will be included unless @flags contains
 * VIR_DOMAIN_XML_SECURE; this flag is rejected on read-only
 * connections.  For this API, @flags should not contain either
 * VIR_DOMAIN_XML_INACTIVE or VIR_DOMAIN_XML_UPDATE_CPU.
 *
C
Chris Lalancette 已提交
18360 18361 18362 18363 18364 18365 18366 18367
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
virDomainSnapshotGetXMLDesc(virDomainSnapshotPtr snapshot,
                            unsigned int flags)
{
    virConnectPtr conn;
18368
    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);
C
Chris Lalancette 已提交
18369 18370 18371

    virResetLastError();

18372
    virCheckDomainSnapshotReturn(snapshot, NULL);
C
Chris Lalancette 已提交
18373 18374 18375
    conn = snapshot->domain->conn;

    if ((conn->flags & VIR_CONNECT_RO) && (flags & VIR_DOMAIN_XML_SECURE)) {
18376 18377
        virReportError(VIR_ERR_OPERATION_DENIED, "%s",
                       _("virDomainSnapshotGetXMLDesc with secure flag"));
C
Chris Lalancette 已提交
18378 18379 18380
        goto error;
    }

18381
    if (conn->driver->domainSnapshotGetXMLDesc) {
C
Chris Lalancette 已提交
18382
        char *ret;
18383
        ret = conn->driver->domainSnapshotGetXMLDesc(snapshot, flags);
C
Chris Lalancette 已提交
18384 18385 18386 18387 18388
        if (!ret)
            goto error;
        return ret;
    }

18389
    virReportUnsupportedError();
18390
 error:
C
Chris Lalancette 已提交
18391 18392 18393 18394
    virDispatchError(conn);
    return NULL;
}

18395

C
Chris Lalancette 已提交
18396 18397 18398
/**
 * virDomainSnapshotNum:
 * @domain: a domain object
18399
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
18400 18401
 *
 * Provides the number of domain snapshots for this domain.
C
Chris Lalancette 已提交
18402
 *
18403 18404 18405 18406 18407 18408 18409 18410 18411 18412 18413 18414 18415 18416 18417 18418
 * By default, this command covers all snapshots; it is also possible to
 * limit things to just snapshots with no parents, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_ROOTS.  Additional filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
C
Chris Lalancette 已提交
18419
 *
18420 18421 18422 18423
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
18424
 *
18425 18426 18427 18428 18429 18430 18431 18432 18433 18434
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18435
 * Returns the number of domain snapshots found or -1 in case of error.
C
Chris Lalancette 已提交
18436 18437 18438 18439 18440
 */
int
virDomainSnapshotNum(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;
18441

E
Eric Blake 已提交
18442
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
C
Chris Lalancette 已提交
18443 18444 18445

    virResetLastError();

18446
    virCheckDomainReturn(domain, -1);
C
Chris Lalancette 已提交
18447 18448 18449 18450 18451 18452 18453 18454 18455

    conn = domain->conn;
    if (conn->driver->domainSnapshotNum) {
        int ret = conn->driver->domainSnapshotNum(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18456
    virReportUnsupportedError();
18457
 error:
C
Chris Lalancette 已提交
18458 18459 18460 18461
    virDispatchError(conn);
    return -1;
}

18462

C
Chris Lalancette 已提交
18463 18464 18465 18466 18467
/**
 * virDomainSnapshotListNames:
 * @domain: a domain object
 * @names: array to collect the list of names of snapshots
 * @nameslen: size of @names
18468
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
C
Chris Lalancette 已提交
18469 18470
 *
 * Collect the list of domain snapshots for the given domain, and store
18471 18472
 * their names in @names.  The value to use for @nameslen can be determined
 * by virDomainSnapshotNum() with the same @flags.
18473
 *
18474 18475 18476 18477 18478 18479 18480 18481 18482 18483 18484 18485 18486 18487 18488 18489
 * By default, this command covers all snapshots; it is also possible to
 * limit things to just snapshots with no parents, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_ROOTS.  Additional filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
18490
 *
18491 18492 18493 18494
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
C
Chris Lalancette 已提交
18495
 *
18496 18497 18498 18499 18500 18501 18502 18503 18504 18505
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18506 18507 18508 18509 18510 18511
 * Note that this command is inherently racy: another connection can
 * define a new snapshot between a call to virDomainSnapshotNum() and
 * this call.  You are only guaranteed that all currently defined
 * snapshots were listed if the return is less than @nameslen.  Likewise,
 * you should be prepared for virDomainSnapshotLookupByName() to fail when
 * converting a name from this call into a snapshot object, if another
18512 18513 18514 18515
 * connection deletes the snapshot in the meantime.  For more control over
 * the results, see virDomainListAllSnapshots().
 *
 * Returns the number of domain snapshots found or -1 in case of error.
J
John Ferlan 已提交
18516
 * The caller is responsible to call free() for each member of the array.
C
Chris Lalancette 已提交
18517 18518 18519 18520 18521 18522 18523
 */
int
virDomainSnapshotListNames(virDomainPtr domain, char **names, int nameslen,
                           unsigned int flags)
{
    virConnectPtr conn;

18524
    VIR_DOMAIN_DEBUG(domain, "names=%p, nameslen=%d, flags=%x",
18525
                     names, nameslen, flags);
C
Chris Lalancette 已提交
18526 18527 18528

    virResetLastError();

18529
    virCheckDomainReturn(domain, -1);
C
Chris Lalancette 已提交
18530 18531
    conn = domain->conn;

18532 18533
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(nameslen, error);
C
Chris Lalancette 已提交
18534 18535 18536 18537 18538 18539 18540 18541 18542

    if (conn->driver->domainSnapshotListNames) {
        int ret = conn->driver->domainSnapshotListNames(domain, names,
                                                        nameslen, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18543
    virReportUnsupportedError();
18544
 error:
C
Chris Lalancette 已提交
18545 18546 18547 18548
    virDispatchError(conn);
    return -1;
}

18549

18550 18551 18552 18553 18554 18555 18556 18557 18558 18559 18560 18561 18562 18563 18564 18565 18566 18567 18568 18569 18570 18571 18572 18573 18574 18575 18576 18577 18578 18579 18580 18581 18582 18583
/**
 * virDomainListAllSnapshots:
 * @domain: a domain object
 * @snaps: pointer to variable to store the array containing snapshot objects,
 *         or NULL if the list is not required (just returns number of
 *         snapshots)
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
 *
 * Collect the list of domain snapshots for the given domain, and allocate
 * an array to store those objects.  This API solves the race inherent in
 * virDomainSnapshotListNames().
 *
 * By default, this command covers all snapshots; it is also possible to
 * limit things to just snapshots with no parents, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_ROOTS.  Additional filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
 *
18584 18585 18586 18587 18588 18589 18590 18591 18592 18593
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18594 18595 18596 18597 18598 18599 18600 18601 18602 18603 18604 18605 18606 18607 18608 18609 18610 18611 18612 18613
 * Returns the number of domain snapshots found or -1 and sets @snaps to
 * NULL in case of error.  On success, the array stored into @snaps is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virDomainSnapshotFree() on each array element, then calling
 * free() on @snaps.
 */
int
virDomainListAllSnapshots(virDomainPtr domain, virDomainSnapshotPtr **snaps,
                          unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "snaps=%p, flags=%x", snaps, flags);

    virResetLastError();

    if (snaps)
        *snaps = NULL;

18614
    virCheckDomainReturn(domain, -1);
18615 18616 18617 18618 18619 18620 18621 18622 18623
    conn = domain->conn;

    if (conn->driver->domainListAllSnapshots) {
        int ret = conn->driver->domainListAllSnapshots(domain, snaps, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18624
    virReportUnsupportedError();
18625
 error:
18626 18627 18628 18629
    virDispatchError(conn);
    return -1;
}

18630

18631 18632 18633
/**
 * virDomainSnapshotNumChildren:
 * @snapshot: a domain snapshot object
18634
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
18635 18636 18637
 *
 * Provides the number of child snapshots for this domain snapshot.
 *
18638 18639 18640 18641 18642 18643 18644 18645 18646 18647 18648 18649
 * By default, this command covers only direct children; it is also possible
 * to expand things to cover all descendants, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_DESCENDANTS.  Also, some filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
18650
 *
18651 18652 18653
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
18654
 *
18655 18656 18657 18658
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
18659
 *
18660 18661 18662 18663 18664 18665 18666 18667 18668 18669
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18670 18671 18672 18673 18674 18675 18676 18677 18678 18679 18680
 * Returns the number of domain snapshots found or -1 in case of error.
 */
int
virDomainSnapshotNumChildren(virDomainSnapshotPtr snapshot, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

18681
    virCheckDomainSnapshotReturn(snapshot, -1);
18682
    conn = snapshot->domain->conn;
18683

18684 18685 18686 18687 18688 18689 18690
    if (conn->driver->domainSnapshotNumChildren) {
        int ret = conn->driver->domainSnapshotNumChildren(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18691
    virReportUnsupportedError();
18692
 error:
18693 18694 18695 18696
    virDispatchError(conn);
    return -1;
}

18697

18698 18699 18700 18701 18702
/**
 * virDomainSnapshotListChildrenNames:
 * @snapshot: a domain snapshot object
 * @names: array to collect the list of names of snapshots
 * @nameslen: size of @names
18703
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
18704 18705
 *
 * Collect the list of domain snapshots that are children of the given
18706 18707 18708
 * snapshot, and store their names in @names.  The value to use for
 * @nameslen can be determined by virDomainSnapshotNumChildren() with
 * the same @flags.
18709
 *
18710 18711 18712 18713 18714 18715 18716 18717 18718 18719 18720 18721
 * By default, this command covers only direct children; it is also possible
 * to expand things to cover all descendants, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_DESCENDANTS.  Also, some filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
18722
 *
18723 18724 18725
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
18726
 *
18727 18728 18729 18730
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
18731
 *
18732 18733 18734 18735 18736 18737 18738 18739 18740 18741
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18742
 * Returns the number of domain snapshots found or -1 in case of error.
18743 18744 18745 18746 18747 18748
 * Note that this command is inherently racy: another connection can
 * define a new snapshot between a call to virDomainSnapshotNumChildren()
 * and this call.  You are only guaranteed that all currently defined
 * snapshots were listed if the return is less than @nameslen.  Likewise,
 * you should be prepared for virDomainSnapshotLookupByName() to fail when
 * converting a name from this call into a snapshot object, if another
18749 18750 18751 18752
 * connection deletes the snapshot in the meantime.  For more control over
 * the results, see virDomainSnapshotListAllChildren().
 *
 * Returns the number of domain snapshots found or -1 in case of error.
J
John Ferlan 已提交
18753
 * The caller is responsible to call free() for each member of the array.
18754 18755 18756 18757 18758 18759 18760 18761 18762 18763 18764 18765 18766
 */
int
virDomainSnapshotListChildrenNames(virDomainSnapshotPtr snapshot,
                                   char **names, int nameslen,
                                   unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, names=%p, nameslen=%d, flags=%x",
              snapshot, names, nameslen, flags);

    virResetLastError();

18767
    virCheckDomainSnapshotReturn(snapshot, -1);
18768 18769
    conn = snapshot->domain->conn;

18770 18771
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(nameslen, error);
18772 18773 18774 18775 18776 18777

    if (conn->driver->domainSnapshotListChildrenNames) {
        int ret = conn->driver->domainSnapshotListChildrenNames(snapshot,
                                                                names,
                                                                nameslen,
                                                                flags);
18778 18779 18780 18781 18782
        if (ret < 0)
            goto error;
        return ret;
    }

18783
    virReportUnsupportedError();
18784
 error:
18785 18786 18787 18788
    virDispatchError(conn);
    return -1;
}

18789

18790 18791 18792 18793 18794 18795 18796 18797 18798 18799 18800 18801 18802 18803 18804 18805 18806 18807 18808 18809 18810 18811 18812 18813 18814 18815 18816 18817 18818 18819 18820 18821 18822 18823
/**
 * virDomainSnapshotListAllChildren:
 * @snapshot: a domain snapshot object
 * @snaps: pointer to variable to store the array containing snapshot objects,
 *         or NULL if the list is not required (just returns number of
 *         snapshots)
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
 *
 * Collect the list of domain snapshots that are children of the given
 * snapshot, and allocate an array to store those objects.  This API solves
 * the race inherent in virDomainSnapshotListChildrenNames().
 *
 * By default, this command covers only direct children; it is also possible
 * to expand things to cover all descendants, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_DESCENDANTS.  Also, some filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
 *
18824 18825 18826 18827 18828 18829 18830 18831 18832 18833
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18834 18835 18836 18837 18838 18839 18840 18841 18842 18843 18844 18845 18846 18847 18848 18849 18850 18851 18852 18853 18854
 * Returns the number of domain snapshots found or -1 and sets @snaps to
 * NULL in case of error.  On success, the array stored into @snaps is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virDomainSnapshotFree() on each array element, then calling
 * free() on @snaps.
 */
int
virDomainSnapshotListAllChildren(virDomainSnapshotPtr snapshot,
                                 virDomainSnapshotPtr **snaps,
                                 unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, snaps=%p, flags=%x", snapshot, snaps, flags);

    virResetLastError();

    if (snaps)
        *snaps = NULL;

18855
    virCheckDomainSnapshotReturn(snapshot, -1);
18856 18857 18858 18859 18860
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotListAllChildren) {
        int ret = conn->driver->domainSnapshotListAllChildren(snapshot, snaps,
                                                              flags);
18861 18862 18863 18864 18865
        if (ret < 0)
            goto error;
        return ret;
    }

18866
    virReportUnsupportedError();
18867
 error:
18868 18869 18870 18871
    virDispatchError(conn);
    return -1;
}

18872

C
Chris Lalancette 已提交
18873 18874 18875 18876
/**
 * virDomainSnapshotLookupByName:
 * @domain: a domain object
 * @name: name for the domain snapshot
18877
 * @flags: extra flags; not used yet, so callers should always pass 0
C
Chris Lalancette 已提交
18878 18879 18880 18881 18882 18883 18884 18885 18886 18887 18888 18889 18890
 *
 * Try to lookup a domain snapshot based on its name.
 *
 * Returns a domain snapshot object or NULL in case of failure.  If the
 * domain snapshot cannot be found, then the VIR_ERR_NO_DOMAIN_SNAPSHOT
 * error is raised.
 */
virDomainSnapshotPtr
virDomainSnapshotLookupByName(virDomainPtr domain,
                              const char *name,
                              unsigned int flags)
{
    virConnectPtr conn;
18891

18892
    VIR_DOMAIN_DEBUG(domain, "name=%s, flags=%x", name, flags);
C
Chris Lalancette 已提交
18893 18894 18895

    virResetLastError();

18896
    virCheckDomainReturn(domain, NULL);
C
Chris Lalancette 已提交
18897 18898
    conn = domain->conn;

18899
    virCheckNonNullArgGoto(name, error);
C
Chris Lalancette 已提交
18900 18901 18902 18903 18904 18905 18906 18907 18908

    if (conn->driver->domainSnapshotLookupByName) {
        virDomainSnapshotPtr dom;
        dom = conn->driver->domainSnapshotLookupByName(domain, name, flags);
        if (!dom)
            goto error;
        return dom;
    }

18909
    virReportUnsupportedError();
18910
 error:
C
Chris Lalancette 已提交
18911 18912 18913 18914
    virDispatchError(conn);
    return NULL;
}

18915

C
Chris Lalancette 已提交
18916 18917 18918
/**
 * virDomainHasCurrentSnapshot:
 * @domain: pointer to the domain object
18919
 * @flags: extra flags; not used yet, so callers should always pass 0
C
Chris Lalancette 已提交
18920 18921 18922 18923 18924 18925 18926 18927 18928
 *
 * Determine if the domain has a current snapshot.
 *
 * Returns 1 if such snapshot exists, 0 if it doesn't, -1 on error.
 */
int
virDomainHasCurrentSnapshot(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;
18929

18930
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
C
Chris Lalancette 已提交
18931 18932 18933

    virResetLastError();

18934
    virCheckDomainReturn(domain, -1);
C
Chris Lalancette 已提交
18935 18936 18937 18938 18939 18940 18941 18942 18943
    conn = domain->conn;

    if (conn->driver->domainHasCurrentSnapshot) {
        int ret = conn->driver->domainHasCurrentSnapshot(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18944
    virReportUnsupportedError();
18945
 error:
C
Chris Lalancette 已提交
18946 18947 18948 18949
    virDispatchError(conn);
    return -1;
}

18950

C
Chris Lalancette 已提交
18951 18952 18953
/**
 * virDomainSnapshotCurrent:
 * @domain: a domain object
18954
 * @flags: extra flags; not used yet, so callers should always pass 0
C
Chris Lalancette 已提交
18955 18956 18957 18958 18959 18960 18961 18962 18963 18964 18965 18966
 *
 * Get the current snapshot for a domain, if any.
 *
 * Returns a domain snapshot object or NULL in case of failure.  If the
 * current domain snapshot cannot be found, then the VIR_ERR_NO_DOMAIN_SNAPSHOT
 * error is raised.
 */
virDomainSnapshotPtr
virDomainSnapshotCurrent(virDomainPtr domain,
                         unsigned int flags)
{
    virConnectPtr conn;
18967

18968
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
C
Chris Lalancette 已提交
18969 18970 18971

    virResetLastError();

18972
    virCheckDomainReturn(domain, NULL);
C
Chris Lalancette 已提交
18973 18974 18975 18976 18977 18978 18979 18980 18981 18982
    conn = domain->conn;

    if (conn->driver->domainSnapshotCurrent) {
        virDomainSnapshotPtr snap;
        snap = conn->driver->domainSnapshotCurrent(domain, flags);
        if (!snap)
            goto error;
        return snap;
    }

18983
    virReportUnsupportedError();
18984
 error:
C
Chris Lalancette 已提交
18985 18986 18987 18988
    virDispatchError(conn);
    return NULL;
}

18989

18990 18991 18992
/**
 * virDomainSnapshotGetParent:
 * @snapshot: a snapshot object
18993
 * @flags: extra flags; not used yet, so callers should always pass 0
18994 18995 18996 18997 18998 18999 19000 19001 19002 19003 19004 19005 19006 19007 19008 19009 19010
 *
 * Get the parent snapshot for @snapshot, if any.
 *
 * Returns a domain snapshot object or NULL in case of failure.  If the
 * given snapshot is a root (no parent), then the VIR_ERR_NO_DOMAIN_SNAPSHOT
 * error is raised.
 */
virDomainSnapshotPtr
virDomainSnapshotGetParent(virDomainSnapshotPtr snapshot,
                           unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

19011
    virCheckDomainSnapshotReturn(snapshot, NULL);
19012 19013 19014 19015 19016 19017 19018 19019 19020 19021
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotGetParent) {
        virDomainSnapshotPtr snap;
        snap = conn->driver->domainSnapshotGetParent(snapshot, flags);
        if (!snap)
            goto error;
        return snap;
    }

19022
    virReportUnsupportedError();
19023
 error:
19024 19025 19026 19027
    virDispatchError(conn);
    return NULL;
}

19028

E
Eric Blake 已提交
19029 19030 19031 19032 19033 19034 19035 19036 19037 19038
/**
 * virDomainSnapshotIsCurrent:
 * @snapshot: a snapshot object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Determine if the given snapshot is the domain's current snapshot.  See
 * also virDomainHasCurrentSnapshot().
 *
 * Returns 1 if current, 0 if not current, or -1 on error.
 */
19039 19040 19041
int
virDomainSnapshotIsCurrent(virDomainSnapshotPtr snapshot,
                           unsigned int flags)
E
Eric Blake 已提交
19042 19043 19044 19045 19046 19047 19048
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

19049
    virCheckDomainSnapshotReturn(snapshot, -1);
E
Eric Blake 已提交
19050 19051 19052 19053 19054 19055 19056 19057 19058 19059
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotIsCurrent) {
        int ret;
        ret = conn->driver->domainSnapshotIsCurrent(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19060
    virReportUnsupportedError();
19061
 error:
E
Eric Blake 已提交
19062 19063 19064 19065
    virDispatchError(conn);
    return -1;
}

19066

E
Eric Blake 已提交
19067 19068 19069 19070 19071 19072 19073 19074 19075 19076 19077
/**
 * virDomainSnapshotHasMetadata:
 * @snapshot: a snapshot object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Determine if the given snapshot is associated with libvirt metadata
 * that would prevent the deletion of the domain.
 *
 * Returns 1 if the snapshot has metadata, 0 if the snapshot exists without
 * help from libvirt, or -1 on error.
 */
19078 19079 19080
int
virDomainSnapshotHasMetadata(virDomainSnapshotPtr snapshot,
                             unsigned int flags)
E
Eric Blake 已提交
19081 19082 19083 19084 19085 19086 19087
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

19088
    virCheckDomainSnapshotReturn(snapshot, -1);
E
Eric Blake 已提交
19089 19090 19091 19092 19093 19094 19095 19096 19097 19098
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotHasMetadata) {
        int ret;
        ret = conn->driver->domainSnapshotHasMetadata(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19099
    virReportUnsupportedError();
19100
 error:
E
Eric Blake 已提交
19101 19102 19103 19104
    virDispatchError(conn);
    return -1;
}

19105

C
Chris Lalancette 已提交
19106
/**
19107
 * virDomainRevertToSnapshot:
C
Chris Lalancette 已提交
19108
 * @snapshot: a domain snapshot object
19109
 * @flags: bitwise-OR of virDomainSnapshotRevertFlags
C
Chris Lalancette 已提交
19110 19111 19112
 *
 * Revert the domain to a given snapshot.
 *
19113 19114 19115 19116 19117 19118 19119 19120 19121 19122 19123 19124
 * Normally, the domain will revert to the same state the domain was
 * in while the snapshot was taken (whether inactive, running, or
 * paused), except that disk snapshots default to reverting to
 * inactive state.  Including VIR_DOMAIN_SNAPSHOT_REVERT_RUNNING in
 * @flags overrides the snapshot state to guarantee a running domain
 * after the revert; or including VIR_DOMAIN_SNAPSHOT_REVERT_PAUSED in
 * @flags guarantees a paused domain after the revert.  These two
 * flags are mutually exclusive.  While a persistent domain does not
 * need either flag, it is not possible to revert a transient domain
 * into an inactive state, so transient domains require the use of one
 * of these two flags.
 *
E
Eric Blake 已提交
19125 19126 19127 19128 19129 19130 19131 19132 19133 19134 19135 19136 19137 19138 19139 19140 19141 19142 19143 19144 19145 19146
 * Reverting to any snapshot discards all configuration changes made since
 * the last snapshot.  Additionally, reverting to a snapshot from a running
 * domain is a form of data loss, since it discards whatever is in the
 * guest's RAM at the time.  Since the very nature of keeping snapshots
 * implies the intent to roll back state, no additional confirmation is
 * normally required for these lossy effects.
 *
 * However, there are two particular situations where reverting will
 * be refused by default, and where @flags must include
 * VIR_DOMAIN_SNAPSHOT_REVERT_FORCE to acknowledge the risks.  1) Any
 * attempt to revert to a snapshot that lacks the metadata to perform
 * ABI compatibility checks (generally the case for snapshots that
 * lack a full <domain> when listed by virDomainSnapshotGetXMLDesc(),
 * such as those created prior to libvirt 0.9.5).  2) Any attempt to
 * revert a running domain to an active state that requires starting a
 * new hypervisor instance rather than reusing the existing hypervisor
 * (since this would terminate all connections to the domain, such as
 * such as VNC or Spice graphics) - this condition arises from active
 * snapshots that are provably ABI incomaptible, as well as from
 * inactive snapshots with a @flags request to start the domain after
 * the revert.
 *
C
Chris Lalancette 已提交
19147 19148 19149 19150 19151 19152 19153 19154
 * Returns 0 if the creation is successful, -1 on error.
 */
int
virDomainRevertToSnapshot(virDomainSnapshotPtr snapshot,
                          unsigned int flags)
{
    virConnectPtr conn;

19155
    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);
C
Chris Lalancette 已提交
19156 19157 19158

    virResetLastError();

19159
    virCheckDomainSnapshotReturn(snapshot, -1);
C
Chris Lalancette 已提交
19160
    conn = snapshot->domain->conn;
19161

19162
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
19163

19164 19165
    if ((flags & VIR_DOMAIN_SNAPSHOT_REVERT_RUNNING) &&
        (flags & VIR_DOMAIN_SNAPSHOT_REVERT_PAUSED)) {
19166
        virReportInvalidArg(flags,
19167 19168
                            _("running and paused flags in %s are mutually "
                              "exclusive"),
19169
                            __FUNCTION__);
19170 19171 19172
        goto error;
    }

C
Chris Lalancette 已提交
19173 19174 19175 19176 19177 19178 19179
    if (conn->driver->domainRevertToSnapshot) {
        int ret = conn->driver->domainRevertToSnapshot(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19180
    virReportUnsupportedError();
19181
 error:
C
Chris Lalancette 已提交
19182 19183 19184 19185
    virDispatchError(conn);
    return -1;
}

19186

C
Chris Lalancette 已提交
19187
/**
19188
 * virDomainSnapshotDelete:
C
Chris Lalancette 已提交
19189
 * @snapshot: a domain snapshot object
19190
 * @flags: bitwise-OR of supported virDomainSnapshotDeleteFlags
C
Chris Lalancette 已提交
19191 19192 19193
 *
 * Delete the snapshot.
 *
19194 19195 19196 19197 19198 19199 19200 19201 19202 19203 19204 19205 19206
 * If @flags is 0, then just this snapshot is deleted, and changes
 * from this snapshot are automatically merged into children
 * snapshots.  If @flags includes VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN,
 * then this snapshot and any descendant snapshots are deleted.  If
 * @flags includes VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN_ONLY, then any
 * descendant snapshots are deleted, but this snapshot remains.  These
 * two flags are mutually exclusive.
 *
 * If @flags includes VIR_DOMAIN_SNAPSHOT_DELETE_METADATA_ONLY, then
 * any snapshot metadata tracked by libvirt is removed while keeping
 * the snapshot contents intact; if a hypervisor does not require any
 * libvirt metadata to track snapshots, then this flag is silently
 * ignored.
C
Chris Lalancette 已提交
19207
 *
19208 19209
 * Returns 0 if the selected snapshot(s) were successfully deleted,
 * -1 on error.
C
Chris Lalancette 已提交
19210 19211 19212 19213 19214 19215 19216
 */
int
virDomainSnapshotDelete(virDomainSnapshotPtr snapshot,
                        unsigned int flags)
{
    virConnectPtr conn;

19217
    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);
C
Chris Lalancette 已提交
19218 19219 19220

    virResetLastError();

19221
    virCheckDomainSnapshotReturn(snapshot, -1);
C
Chris Lalancette 已提交
19222
    conn = snapshot->domain->conn;
19223

19224
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
19225

19226 19227
    if ((flags & VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN) &&
        (flags & VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN_ONLY)) {
19228 19229 19230 19231
        virReportInvalidArg(flags,
                            _("children and children_only flags in %s are "
                              "mutually exclusive"),
                            __FUNCTION__);
19232 19233 19234
        goto error;
    }

C
Chris Lalancette 已提交
19235 19236 19237 19238 19239 19240 19241
    if (conn->driver->domainSnapshotDelete) {
        int ret = conn->driver->domainSnapshotDelete(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19242
    virReportUnsupportedError();
19243
 error:
C
Chris Lalancette 已提交
19244 19245 19246 19247
    virDispatchError(conn);
    return -1;
}

19248

19249 19250 19251 19252 19253 19254 19255 19256 19257 19258 19259 19260 19261 19262 19263 19264 19265 19266 19267 19268
/**
 * virDomainSnapshotRef:
 * @snapshot: the snapshot to hold a reference on
 *
 * Increment the reference count on the snapshot. For each
 * additional call to this method, there shall be a corresponding
 * call to virDomainSnapshotFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection and domain remain open until all threads have finished
 * using the snapshot. ie, each new thread using a snapshot would
 * increment the reference count.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSnapshotRef(virDomainSnapshotPtr snapshot)
{
19269 19270 19271
    VIR_DEBUG("snapshot=%p, refs=%d", snapshot,
              snapshot ? snapshot->object.u.s.refs : 0);

19272 19273
    virResetLastError();

19274 19275
    virCheckDomainSnapshotReturn(snapshot, -1);

19276
    virObjectRef(snapshot);
19277 19278 19279
    return 0;
}

19280

C
Chris Lalancette 已提交
19281 19282 19283 19284 19285 19286 19287 19288 19289 19290 19291 19292
/**
 * virDomainSnapshotFree:
 * @snapshot: a domain snapshot object
 *
 * Free the domain snapshot object.  The snapshot itself is not modified.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSnapshotFree(virDomainSnapshotPtr snapshot)
{
19293
    VIR_DEBUG("snapshot=%p", snapshot);
C
Chris Lalancette 已提交
19294 19295 19296

    virResetLastError();

19297 19298
    virCheckDomainSnapshotReturn(snapshot, -1);

19299
    virObjectUnref(snapshot);
C
Chris Lalancette 已提交
19300 19301
    return 0;
}
19302

19303

19304 19305 19306
/**
 * virDomainOpenConsole:
 * @dom: a domain object
19307
 * @dev_name: the console, serial or parallel port device alias, or NULL
19308
 * @st: a stream to associate with the console
19309
 * @flags: bitwise-OR of virDomainConsoleFlags
19310 19311 19312
 *
 * This opens the backend associated with a console, serial or
 * parallel port device on a guest, if the backend is supported.
19313
 * If the @dev_name is omitted, then the first console or serial
19314 19315 19316 19317
 * device is opened. The console is associated with the passed
 * in @st stream, which should have been opened in non-blocking
 * mode for bi-directional I/O.
 *
19318 19319 19320 19321 19322 19323 19324 19325 19326 19327 19328 19329 19330 19331 19332
 * By default, when @flags is 0, the open will fail if libvirt
 * detects that the console is already in use by another client;
 * passing VIR_DOMAIN_CONSOLE_FORCE will cause libvirt to forcefully
 * remove the other client prior to opening this console.
 *
 * If flag VIR_DOMAIN_CONSOLE_SAFE the console is opened only in the
 * case where the hypervisor driver supports safe (mutually exclusive)
 * console handling.
 *
 * Older servers did not support either flag, and also did not forbid
 * simultaneous clients on a console, with potentially confusing results.
 * When passing @flags of 0 in order to support a wider range of server
 * versions, it is up to the client to ensure mutual exclusion.
 *
 * Returns 0 if the console was opened, -1 on error
19333
 */
19334 19335 19336 19337 19338
int
virDomainOpenConsole(virDomainPtr dom,
                     const char *dev_name,
                     virStreamPtr st,
                     unsigned int flags)
19339 19340
{
    virConnectPtr conn;
19341

19342 19343
    VIR_DOMAIN_DEBUG(dom, "dev_name=%s, st=%p, flags=%x",
                     NULLSTR(dev_name), st, flags);
19344 19345 19346

    virResetLastError();

19347
    virCheckDomainReturn(dom, -1);
19348
    conn = dom->conn;
19349

19350
    virCheckStreamGoto(st, error);
19351
    virCheckReadOnlyGoto(conn->flags, error);
19352

19353 19354 19355 19356 19357 19358 19359
    if (conn != st->conn) {
        virReportInvalidArg(st,
                            _("stream in %s must match connection of domain '%s'"),
                            __FUNCTION__, dom->name);
        goto error;
    }

19360 19361
    if (conn->driver->domainOpenConsole) {
        int ret;
19362
        ret = conn->driver->domainOpenConsole(dom, dev_name, st, flags);
19363 19364 19365 19366 19367
        if (ret < 0)
            goto error;
        return ret;
    }

19368
    virReportUnsupportedError();
19369

19370
 error:
19371 19372 19373
    virDispatchError(conn);
    return -1;
}
19374

19375

19376 19377 19378 19379 19380 19381 19382 19383 19384 19385 19386 19387 19388 19389 19390 19391 19392 19393 19394 19395 19396 19397
/**
 * virDomainOpenChannel:
 * @dom: a domain object
 * @name: the channel name, or NULL
 * @st: a stream to associate with the channel
 * @flags: bitwise-OR of virDomainChannelFlags
 *
 * This opens the host interface associated with a channel device on a
 * guest, if the host interface is supported.  If @name is given, it
 * can match either the device alias (e.g. "channel0"), or the virtio
 * target name (e.g. "org.qemu.guest_agent.0").  If @name is omitted,
 * then the first channel is opened. The channel is associated with
 * the passed in @st stream, which should have been opened in
 * non-blocking mode for bi-directional I/O.
 *
 * By default, when @flags is 0, the open will fail if libvirt detects
 * that the channel is already in use by another client; passing
 * VIR_DOMAIN_CHANNEL_FORCE will cause libvirt to forcefully remove the
 * other client prior to opening this channel.
 *
 * Returns 0 if the channel was opened, -1 on error
 */
19398 19399 19400 19401 19402
int
virDomainOpenChannel(virDomainPtr dom,
                     const char *name,
                     virStreamPtr st,
                     unsigned int flags)
19403 19404 19405 19406 19407 19408 19409 19410
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "name=%s, st=%p, flags=%x",
                     NULLSTR(name), st, flags);

    virResetLastError();

19411
    virCheckDomainReturn(dom, -1);
19412
    conn = dom->conn;
19413

19414
    virCheckStreamGoto(st, error);
19415
    virCheckReadOnlyGoto(conn->flags, error);
19416

19417 19418 19419 19420 19421 19422 19423
    if (conn != st->conn) {
        virReportInvalidArg(st,
                            _("stream in %s must match connection of domain '%s'"),
                            __FUNCTION__, dom->name);
        goto error;
    }

19424 19425 19426 19427 19428 19429 19430 19431
    if (conn->driver->domainOpenChannel) {
        int ret;
        ret = conn->driver->domainOpenChannel(dom, name, st, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19432
    virReportUnsupportedError();
19433

19434
 error:
19435 19436 19437 19438
    virDispatchError(conn);
    return -1;
}

19439

19440 19441 19442
/**
 * virDomainBlockJobAbort:
 * @dom: pointer to domain object
19443
 * @disk: path to the block device, or device shorthand
19444
 * @flags: bitwise-OR of virDomainBlockJobAbortFlags
19445 19446 19447
 *
 * Cancel the active block job on the given disk.
 *
19448
 * The @disk parameter is either an unambiguous source name of the
19449 19450 19451 19452 19453 19454
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
E
Eric Blake 已提交
19455 19456
 * If the current block job for @disk is VIR_DOMAIN_BLOCK_JOB_TYPE_PULL, then
 * by default, this function performs a synchronous operation and the caller
19457 19458 19459 19460 19461 19462 19463 19464
 * may assume that the operation has completed when 0 is returned.  However,
 * BlockJob operations may take a long time to cancel, and during this time
 * further domain interactions may be unresponsive.  To avoid this problem,
 * pass VIR_DOMAIN_BLOCK_JOB_ABORT_ASYNC in the @flags argument to enable
 * asynchronous behavior, returning as soon as possible.  When the job has
 * been canceled, a BlockJob event will be emitted, with status
 * VIR_DOMAIN_BLOCK_JOB_CANCELED (even if the ABORT_ASYNC flag was not
 * used); it is also possible to poll virDomainBlockJobInfo() to see if
E
Eric Blake 已提交
19465 19466 19467 19468 19469 19470 19471 19472 19473 19474 19475 19476
 * the job cancellation is still pending.  This type of job can be restarted
 * to pick up from where it left off.
 *
 * If the current block job for @disk is VIR_DOMAIN_BLOCK_JOB_TYPE_COPY, then
 * the default is to abort the mirroring and revert to the source disk;
 * adding @flags of VIR_DOMAIN_BLOCK_JOB_ABORT_PIVOT causes this call to
 * fail with VIR_ERR_BLOCK_COPY_ACTIVE if the copy is not fully populated,
 * otherwise it will swap the disk over to the copy to end the mirroring.  An
 * event will be issued when the job is ended, and it is possible to use
 * VIR_DOMAIN_BLOCK_JOB_ABORT_ASYNC to control whether this command waits
 * for the completion of the job.  Restarting this job requires starting
 * over from the beginning of the first phase.
19477
 *
19478 19479
 * Returns -1 in case of failure, 0 when successful.
 */
19480 19481 19482
int
virDomainBlockJobAbort(virDomainPtr dom, const char *disk,
                       unsigned int flags)
19483 19484 19485
{
    virConnectPtr conn;

19486
    VIR_DOMAIN_DEBUG(dom, "disk=%s, flags=%x", disk, flags);
19487 19488 19489

    virResetLastError();

19490
    virCheckDomainReturn(dom, -1);
19491 19492
    conn = dom->conn;

19493
    virCheckReadOnlyGoto(conn->flags, error);
19494
    virCheckNonNullArgGoto(disk, error);
19495 19496 19497

    if (conn->driver->domainBlockJobAbort) {
        int ret;
19498
        ret = conn->driver->domainBlockJobAbort(dom, disk, flags);
19499 19500 19501 19502 19503
        if (ret < 0)
            goto error;
        return ret;
    }

19504
    virReportUnsupportedError();
19505

19506
 error:
19507 19508 19509 19510
    virDispatchError(dom->conn);
    return -1;
}

19511

19512 19513 19514
/**
 * virDomainGetBlockJobInfo:
 * @dom: pointer to domain object
19515
 * @disk: path to the block device, or device shorthand
19516
 * @info: pointer to a virDomainBlockJobInfo structure
19517
 * @flags: extra flags; not used yet, so callers should always pass 0
19518 19519 19520 19521
 *
 * Request block job information for the given disk.  If an operation is active
 * @info will be updated with the current progress.
 *
19522
 * The @disk parameter is either an unambiguous source name of the
19523 19524 19525 19526 19527 19528
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19529 19530
 * Returns -1 in case of failure, 0 when nothing found, 1 when info was found.
 */
19531 19532 19533
int
virDomainGetBlockJobInfo(virDomainPtr dom, const char *disk,
                         virDomainBlockJobInfoPtr info, unsigned int flags)
19534 19535 19536
{
    virConnectPtr conn;

19537
    VIR_DOMAIN_DEBUG(dom, "disk=%s, info=%p, flags=%x", disk, info, flags);
19538 19539 19540

    virResetLastError();

19541 19542 19543
    if (info)
        memset(info, 0, sizeof(*info));

19544
    virCheckDomainReturn(dom, -1);
19545 19546
    conn = dom->conn;

19547 19548
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(info, error);
19549 19550 19551

    if (conn->driver->domainGetBlockJobInfo) {
        int ret;
19552
        ret = conn->driver->domainGetBlockJobInfo(dom, disk, info, flags);
19553 19554 19555 19556 19557
        if (ret < 0)
            goto error;
        return ret;
    }

19558
    virReportUnsupportedError();
19559

19560
 error:
19561 19562 19563 19564
    virDispatchError(dom->conn);
    return -1;
}

19565

19566 19567 19568
/**
 * virDomainBlockJobSetSpeed:
 * @dom: pointer to domain object
19569
 * @disk: path to the block device, or device shorthand
19570
 * @bandwidth: specify bandwidth limit in MiB/s
19571
 * @flags: extra flags; not used yet, so callers should always pass 0
19572 19573 19574 19575
 *
 * Set the maximimum allowable bandwidth that a block job may consume.  If
 * bandwidth is 0, the limit will revert to the hypervisor default.
 *
19576
 * The @disk parameter is either an unambiguous source name of the
19577 19578 19579 19580 19581 19582
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19583 19584
 * Returns -1 in case of failure, 0 when successful.
 */
19585 19586 19587
int
virDomainBlockJobSetSpeed(virDomainPtr dom, const char *disk,
                          unsigned long bandwidth, unsigned int flags)
19588 19589 19590
{
    virConnectPtr conn;

19591
    VIR_DOMAIN_DEBUG(dom, "disk=%s, bandwidth=%lu, flags=%x",
19592
                     disk, bandwidth, flags);
19593 19594 19595

    virResetLastError();

19596
    virCheckDomainReturn(dom, -1);
19597 19598
    conn = dom->conn;

19599
    virCheckReadOnlyGoto(conn->flags, error);
19600
    virCheckNonNullArgGoto(disk, error);
19601 19602 19603

    if (conn->driver->domainBlockJobSetSpeed) {
        int ret;
19604
        ret = conn->driver->domainBlockJobSetSpeed(dom, disk, bandwidth, flags);
19605 19606 19607 19608 19609
        if (ret < 0)
            goto error;
        return ret;
    }

19610
    virReportUnsupportedError();
19611

19612
 error:
19613 19614 19615 19616
    virDispatchError(dom->conn);
    return -1;
}

19617

19618 19619 19620
/**
 * virDomainBlockPull:
 * @dom: pointer to domain object
19621
 * @disk: path to the block device, or device shorthand
19622
 * @bandwidth: (optional) specify copy bandwidth limit in MiB/s
19623
 * @flags: extra flags; not used yet, so callers should always pass 0
19624 19625 19626 19627 19628 19629
 *
 * Populate a disk image with data from its backing image.  Once all data from
 * its backing image has been pulled, the disk no longer depends on a backing
 * image.  This function pulls data for the entire device in the background.
 * Progress of the operation can be checked with virDomainGetBlockJobInfo() and
 * the operation can be aborted with virDomainBlockJobAbort().  When finished,
E
Eric Blake 已提交
19630 19631
 * an asynchronous event is raised to indicate the final status.  To move
 * data in the opposite direction, see virDomainBlockCommit().
19632
 *
19633
 * The @disk parameter is either an unambiguous source name of the
19634 19635 19636 19637 19638 19639
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19640
 * The maximum bandwidth (in MiB/s) that will be used to do the copy can be
19641 19642
 * specified with the bandwidth parameter.  If set to 0, libvirt will choose a
 * suitable default.  Some hypervisors do not support this feature and will
19643 19644 19645
 * return an error if bandwidth is not 0; in this case, it might still be
 * possible for a later call to virDomainBlockJobSetSpeed() to succeed.
 * The actual speed can be determined with virDomainGetBlockJobInfo().
19646
 *
19647 19648
 * This is shorthand for virDomainBlockRebase() with a NULL base.
 *
19649 19650
 * Returns 0 if the operation has started, -1 on failure.
 */
19651 19652 19653
int
virDomainBlockPull(virDomainPtr dom, const char *disk,
                   unsigned long bandwidth, unsigned int flags)
19654 19655 19656
{
    virConnectPtr conn;

19657
    VIR_DOMAIN_DEBUG(dom, "disk=%s, bandwidth=%lu, flags=%x",
19658
                     disk, bandwidth, flags);
19659 19660 19661

    virResetLastError();

19662
    virCheckDomainReturn(dom, -1);
19663 19664
    conn = dom->conn;

19665
    virCheckReadOnlyGoto(conn->flags, error);
19666
    virCheckNonNullArgGoto(disk, error);
19667 19668 19669

    if (conn->driver->domainBlockPull) {
        int ret;
19670
        ret = conn->driver->domainBlockPull(dom, disk, bandwidth, flags);
19671 19672 19673 19674 19675
        if (ret < 0)
            goto error;
        return ret;
    }

19676
    virReportUnsupportedError();
19677

19678
 error:
19679 19680 19681
    virDispatchError(dom->conn);
    return -1;
}
19682 19683


19684 19685 19686 19687
/**
 * virDomainBlockRebase:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
19688 19689
 * @base: path to backing file to keep, or device shorthand,
 *        or NULL for no backing file
19690
 * @bandwidth: (optional) specify copy bandwidth limit in MiB/s
E
Eric Blake 已提交
19691
 * @flags: bitwise-OR of virDomainBlockRebaseFlags
19692 19693
 *
 * Populate a disk image with data from its backing image chain, and
E
Eric Blake 已提交
19694 19695 19696 19697
 * setting the backing image to @base, or alternatively copy an entire
 * backing chain to a new file @base.
 *
 * When @flags is 0, this starts a pull, where @base must be the absolute
19698 19699 19700 19701 19702
 * path of one of the backing images further up the chain, or NULL to
 * convert the disk image so that it has no backing image.  Once all
 * data from its backing image chain has been pulled, the disk no
 * longer depends on those intermediate backing images.  This function
 * pulls data for the entire device in the background.  Progress of
E
Eric Blake 已提交
19703 19704 19705 19706 19707 19708 19709 19710 19711 19712 19713 19714 19715 19716 19717 19718 19719 19720 19721 19722 19723 19724 19725 19726 19727 19728 19729 19730 19731 19732 19733 19734
 * the operation can be checked with virDomainGetBlockJobInfo() with a
 * job type of VIR_DOMAIN_BLOCK_JOB_TYPE_PULL, and the operation can be
 * aborted with virDomainBlockJobAbort().  When finished, an asynchronous
 * event is raised to indicate the final status, and the job no longer
 * exists.  If the job is aborted, a new one can be started later to
 * resume from the same point.
 *
 * When @flags includes VIR_DOMAIN_BLOCK_REBASE_COPY, this starts a copy,
 * where @base must be the name of a new file to copy the chain to.  By
 * default, the copy will pull the entire source chain into the destination
 * file, but if @flags also contains VIR_DOMAIN_BLOCK_REBASE_SHALLOW, then
 * only the top of the source chain will be copied (the source and
 * destination have a common backing file).  By default, @base will be
 * created with the same file format as the source, but this can be altered
 * by adding VIR_DOMAIN_BLOCK_REBASE_COPY_RAW to force the copy to be raw
 * (does not make sense with the shallow flag unless the source is also raw),
 * or by using VIR_DOMAIN_BLOCK_REBASE_REUSE_EXT to reuse an existing file
 * with initial contents identical to the backing file of the source (this
 * allows a management app to pre-create files with relative backing file
 * names, rather than the default of absolute backing file names; as a
 * security precaution, you should generally only use reuse_ext with the
 * shallow flag and a non-raw destination file).
 *
 * A copy job has two parts; in the first phase, the @bandwidth parameter
 * affects how fast the source is pulled into the destination, and the job
 * can only be canceled by reverting to the source file; progress in this
 * phase can be tracked via the virDomainBlockJobInfo() command, with a
 * job type of VIR_DOMAIN_BLOCK_JOB_TYPE_COPY.  The job transitions to the
 * second phase when the job info states cur == end, and remains alive to
 * mirror all further changes to both source and destination.  The user
 * must call virDomainBlockJobAbort() to end the mirroring while choosing
 * whether to revert to source or pivot to the destination.  An event is
19735 19736 19737 19738
 * issued when the job ends, and depending on the hypervisor, an event may
 * also be issued when the job transitions from pulling to mirroring.  If
 * the job is aborted, a new job will have to start over from the beginning
 * of the first phase.
E
Eric Blake 已提交
19739 19740 19741 19742
 *
 * Some hypervisors will restrict certain actions, such as virDomainSave()
 * or virDomainDetachDevice(), while a copy job is active; they may
 * also restrict a copy job to transient domains.
19743 19744 19745 19746 19747 19748 19749 19750
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the
 * <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19751 19752 19753 19754 19755 19756 19757 19758
 * The @base parameter can be either a path to a file within the backing
 * chain, or the device target shorthand (the <target dev='...'/>
 * sub-element, such as "vda") followed by an index to the backing chain
 * enclosed in square brackets. Backing chain indexes can be found by
 * inspecting //disk//backingStore/@index in the domain XML. Thus, for
 * example, "vda[3]" refers to the backing store with index equal to "3"
 * in the chain of disk "vda".
 *
19759
 * The maximum bandwidth (in MiB/s) that will be used to do the copy can be
19760 19761
 * specified with the bandwidth parameter.  If set to 0, libvirt will choose a
 * suitable default.  Some hypervisors do not support this feature and will
19762 19763 19764
 * return an error if bandwidth is not 0; in this case, it might still be
 * possible for a later call to virDomainBlockJobSetSpeed() to succeed.
 * The actual speed can be determined with virDomainGetBlockJobInfo().
19765
 *
E
Eric Blake 已提交
19766 19767
 * When @base is NULL and @flags is 0, this is identical to
 * virDomainBlockPull().
19768 19769 19770
 *
 * Returns 0 if the operation has started, -1 on failure.
 */
19771 19772 19773 19774
int
virDomainBlockRebase(virDomainPtr dom, const char *disk,
                     const char *base, unsigned long bandwidth,
                     unsigned int flags)
19775 19776 19777
{
    virConnectPtr conn;

E
Eric Blake 已提交
19778
    VIR_DOMAIN_DEBUG(dom, "disk=%s, base=%s, bandwidth=%lu, flags=%x",
19779 19780 19781 19782
                     disk, NULLSTR(base), bandwidth, flags);

    virResetLastError();

19783
    virCheckDomainReturn(dom, -1);
19784 19785
    conn = dom->conn;

19786
    virCheckReadOnlyGoto(conn->flags, error);
19787
    virCheckNonNullArgGoto(disk, error);
19788

E
Eric Blake 已提交
19789
    if (flags & VIR_DOMAIN_BLOCK_REBASE_COPY) {
19790
        virCheckNonNullArgGoto(base, error);
E
Eric Blake 已提交
19791 19792 19793
    } else if (flags & (VIR_DOMAIN_BLOCK_REBASE_SHALLOW |
                        VIR_DOMAIN_BLOCK_REBASE_REUSE_EXT |
                        VIR_DOMAIN_BLOCK_REBASE_COPY_RAW)) {
19794 19795 19796
        virReportInvalidArg(flags,
                            _("use of flags in %s requires a copy job"),
                            __FUNCTION__);
E
Eric Blake 已提交
19797 19798 19799
        goto error;
    }

19800 19801 19802 19803 19804 19805 19806 19807 19808
    if (conn->driver->domainBlockRebase) {
        int ret;
        ret = conn->driver->domainBlockRebase(dom, disk, base, bandwidth,
                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19809
    virReportUnsupportedError();
19810

19811
 error:
19812 19813 19814 19815 19816
    virDispatchError(dom->conn);
    return -1;
}


E
Eric Blake 已提交
19817 19818 19819 19820
/**
 * virDomainBlockCommit:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
19821 19822
 * @base: path to backing file to merge into, or device shorthand,
 *        or NULL for default
E
Eric Blake 已提交
19823
 * @top: path to file within backing chain that contains data to be merged,
19824
 *       or device shorthand, or NULL to merge all possible data
E
Eric Blake 已提交
19825 19826 19827 19828 19829 19830 19831 19832 19833 19834 19835 19836 19837 19838 19839 19840 19841 19842 19843 19844 19845 19846 19847 19848 19849 19850 19851 19852 19853 19854 19855 19856 19857 19858 19859 19860 19861 19862 19863 19864 19865 19866 19867 19868 19869 19870 19871 19872 19873
 * @bandwidth: (optional) specify commit bandwidth limit in MiB/s
 * @flags: bitwise-OR of virDomainBlockCommitFlags
 *
 * Commit changes that were made to temporary top-level files within a disk
 * image backing file chain into a lower-level base file.  In other words,
 * take all the difference between @base and @top, and update @base to contain
 * that difference; after the commit, any portion of the chain that previously
 * depended on @top will now depend on @base, and all files after @base up
 * to and including @top will now be invalidated.  A typical use of this
 * command is to reduce the length of a backing file chain after taking an
 * external disk snapshot.  To move data in the opposite direction, see
 * virDomainBlockPull().
 *
 * This command starts a long-running commit block job, whose status may
 * be tracked by virDomainBlockJobInfo() with a job type of
 * VIR_DOMAIN_BLOCK_JOB_TYPE_COMMIT, and the operation can be aborted with
 * virDomainBlockJobAbort().  When finished, an asynchronous event is
 * raised to indicate the final status, and the job no longer exists.  If
 * the job is aborted, it is up to the hypervisor whether starting a new
 * job will resume from the same point, or start over.
 *
 * Be aware that this command may invalidate files even if it is aborted;
 * the user is cautioned against relying on the contents of invalidated
 * intermediate files such as @top without manually rebasing those files
 * to use a backing file of a read-only copy of @base prior to the point
 * where the commit operation was started (although such a rebase cannot
 * be safely done until the commit has successfully completed).  However,
 * the domain itself will not have any issues; the active layer remains
 * valid throughout the entire commit operation.  As a convenience,
 * if @flags contains VIR_DOMAIN_BLOCK_COMMIT_DELETE, this command will
 * unlink all files that were invalidated, after the commit successfully
 * completes.
 *
 * By default, if @base is NULL, the commit target will be the bottom of
 * the backing chain; if @flags contains VIR_DOMAIN_BLOCK_COMMIT_SHALLOW,
 * then the immediate backing file of @top will be used instead.  If @top
 * is NULL, the active image at the top of the chain will be used.  Some
 * hypervisors place restrictions on how much can be committed, and might
 * fail if @base is not the immediate backing file of @top, or if @top is
 * the active layer in use by a running domain, or if @top is not the
 * top-most file; restrictions may differ for online vs. offline domains.
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the
 * <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19874 19875 19876 19877 19878 19879 19880 19881
 * The @base and @top parameters can be either paths to files within the
 * backing chain, or the device target shorthand (the <target dev='...'/>
 * sub-element, such as "vda") followed by an index to the backing chain
 * enclosed in square brackets. Backing chain indexes can be found by
 * inspecting //disk//backingStore/@index in the domain XML. Thus, for
 * example, "vda[3]" refers to the backing store with index equal to "3"
 * in the chain of disk "vda".
 *
E
Eric Blake 已提交
19882 19883 19884 19885 19886 19887 19888 19889 19890
 * The maximum bandwidth (in MiB/s) that will be used to do the commit can be
 * specified with the bandwidth parameter.  If set to 0, libvirt will choose a
 * suitable default.  Some hypervisors do not support this feature and will
 * return an error if bandwidth is not 0; in this case, it might still be
 * possible for a later call to virDomainBlockJobSetSpeed() to succeed.
 * The actual speed can be determined with virDomainGetBlockJobInfo().
 *
 * Returns 0 if the operation has started, -1 on failure.
 */
19891 19892 19893 19894
int
virDomainBlockCommit(virDomainPtr dom, const char *disk,
                     const char *base, const char *top,
                     unsigned long bandwidth, unsigned int flags)
E
Eric Blake 已提交
19895 19896 19897 19898 19899 19900 19901 19902
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "disk=%s, base=%s, top=%s, bandwidth=%lu, flags=%x",
                     disk, NULLSTR(base), NULLSTR(top), bandwidth, flags);

    virResetLastError();

19903
    virCheckDomainReturn(dom, -1);
E
Eric Blake 已提交
19904 19905
    conn = dom->conn;

19906
    virCheckReadOnlyGoto(conn->flags, error);
E
Eric Blake 已提交
19907 19908 19909 19910 19911 19912 19913 19914 19915 19916 19917
    virCheckNonNullArgGoto(disk, error);

    if (conn->driver->domainBlockCommit) {
        int ret;
        ret = conn->driver->domainBlockCommit(dom, disk, base, top, bandwidth,
                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19918
    virReportUnsupportedError();
E
Eric Blake 已提交
19919

19920
 error:
E
Eric Blake 已提交
19921 19922 19923 19924 19925
    virDispatchError(dom->conn);
    return -1;
}


19926 19927 19928 19929 19930
/**
 * virDomainOpenGraphics:
 * @dom: pointer to domain object
 * @idx: index of graphics config to open
 * @fd: file descriptor to attach graphics to
19931
 * @flags: bitwise-OR of virDomainOpenGraphicsFlags
19932 19933 19934 19935 19936 19937 19938 19939 19940 19941 19942 19943 19944 19945 19946 19947 19948 19949
 *
 * This will attempt to connect the file descriptor @fd, to
 * the graphics backend of @dom. If @dom has multiple graphics
 * backends configured, then @idx will determine which one is
 * opened, starting from @idx 0.
 *
 * To disable any authentication, pass the VIR_DOMAIN_OPEN_GRAPHICS_SKIPAUTH
 * constant for @flags.
 *
 * The caller should use an anonymous socketpair to open
 * @fd before invocation.
 *
 * This method can only be used when connected to a local
 * libvirt hypervisor, over a UNIX domain socket. Attempts
 * to use this method over a TCP connection will always fail
 *
 * Returns 0 on success, -1 on failure
 */
19950 19951 19952 19953 19954
int
virDomainOpenGraphics(virDomainPtr dom,
                      unsigned int idx,
                      int fd,
                      unsigned int flags)
19955 19956 19957 19958 19959 19960 19961
{
    struct stat sb;
    VIR_DOMAIN_DEBUG(dom, "idx=%u, fd=%d, flags=%x",
                     idx, fd, flags);

    virResetLastError();

19962
    virCheckDomainReturn(dom, -1);
19963
    virCheckNonNegativeArgGoto(fd, error);
19964 19965 19966 19967 19968 19969 19970 19971

    if (fstat(fd, &sb) < 0) {
        virReportSystemError(errno,
                             _("Unable to access file descriptor %d"), fd);
        goto error;
    }

    if (!S_ISSOCK(sb.st_mode)) {
19972 19973 19974
        virReportInvalidArg(fd,
                          _("fd %d in %s must be a socket"),
                            fd, __FUNCTION__);
19975 19976 19977
        goto error;
    }

19978
    virCheckReadOnlyGoto(dom->conn->flags, error);
19979 19980 19981

    if (!VIR_DRV_SUPPORTS_FEATURE(dom->conn->driver, dom->conn,
                                  VIR_DRV_FEATURE_FD_PASSING)) {
19982 19983
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("fd passing is not supported by this connection"));
19984 19985 19986 19987 19988 19989 19990 19991 19992 19993 19994
        goto error;
    }

    if (dom->conn->driver->domainOpenGraphics) {
        int ret;
        ret = dom->conn->driver->domainOpenGraphics(dom, idx, fd, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19995
    virReportUnsupportedError();
19996

19997
 error:
19998 19999 20000
    virDispatchError(dom->conn);
    return -1;
}
J
Jiri Denemark 已提交
20001 20002 20003 20004 20005 20006 20007 20008


/**
 * virConnectSetKeepAlive:
 * @conn: pointer to a hypervisor connection
 * @interval: number of seconds of inactivity before a keepalive message is sent
 * @count: number of messages that can be sent in a row
 *
E
Eric Blake 已提交
20009
 * Start sending keepalive messages after @interval seconds of inactivity and
J
Jiri Denemark 已提交
20010
 * consider the connection to be broken when no response is received after
E
Eric Blake 已提交
20011 20012 20013 20014 20015 20016 20017 20018 20019 20020
 * @count keepalive messages sent in a row.  In other words, sending count + 1
 * keepalive message results in closing the connection.  When @interval is
 * <= 0, no keepalive messages will be sent.  When @count is 0, the connection
 * will be automatically closed after @interval seconds of inactivity without
 * sending any keepalive messages.
 *
 * Note: The client has to implement and run an event loop with
 * virEventRegisterImpl() or virEventRegisterDefaultImpl() to be able to
 * use keepalive messages.  Failure to do so may result in connections
 * being closed unexpectedly.
J
Jiri Denemark 已提交
20021
 *
20022 20023 20024 20025
 * Note: This API function controls only keepalive messages sent by the client.
 * If the server is configured to use keepalive you still need to run the event
 * loop to respond to them, even if you disable keepalives by this function.
 *
J
Jiri Denemark 已提交
20026 20027 20028
 * Returns -1 on error, 0 on success, 1 when remote party doesn't support
 * keepalive messages.
 */
20029 20030 20031 20032
int
virConnectSetKeepAlive(virConnectPtr conn,
                       int interval,
                       unsigned int count)
J
Jiri Denemark 已提交
20033 20034 20035 20036 20037 20038 20039
{
    int ret = -1;

    VIR_DEBUG("conn=%p, interval=%d, count=%u", conn, interval, count);

    virResetLastError();

20040
    virCheckConnectReturn(conn, -1);
J
Jiri Denemark 已提交
20041

20042 20043
    if (conn->driver->connectSetKeepAlive) {
        ret = conn->driver->connectSetKeepAlive(conn, interval, count);
J
Jiri Denemark 已提交
20044 20045 20046 20047 20048
        if (ret < 0)
            goto error;
        return ret;
    }

20049
    virReportUnsupportedError();
J
Jiri Denemark 已提交
20050

20051
 error:
J
Jiri Denemark 已提交
20052 20053 20054
    virDispatchError(conn);
    return -1;
}
J
Jiri Denemark 已提交
20055

20056

J
Jiri Denemark 已提交
20057 20058 20059 20060 20061 20062 20063 20064 20065 20066 20067
/**
 * virConnectIsAlive:
 * @conn: pointer to the connection object
 *
 * Determine if the connection to the hypervisor is still alive
 *
 * A connection will be classed as alive if it is either local, or running
 * over a channel (TCP or UNIX socket) which is not closed.
 *
 * Returns 1 if alive, 0 if dead, -1 on error
 */
20068 20069
int
virConnectIsAlive(virConnectPtr conn)
J
Jiri Denemark 已提交
20070 20071 20072 20073 20074
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

20075
    virCheckConnectReturn(conn, -1);
20076
    if (conn->driver->connectIsAlive) {
J
Jiri Denemark 已提交
20077
        int ret;
20078
        ret = conn->driver->connectIsAlive(conn);
J
Jiri Denemark 已提交
20079 20080 20081 20082 20083
        if (ret < 0)
            goto error;
        return ret;
    }

20084
    virReportUnsupportedError();
20085
 error:
J
Jiri Denemark 已提交
20086 20087 20088
    virDispatchError(conn);
    return -1;
}
20089 20090


20091 20092 20093 20094 20095 20096 20097 20098 20099 20100 20101 20102 20103 20104 20105 20106 20107 20108 20109 20110 20111 20112 20113
/**
 * virConnectRegisterCloseCallback:
 * @conn: pointer to connection object
 * @cb: callback to invoke upon close
 * @opaque: user data to pass to @cb
 * @freecb: callback to free @opaque
 *
 * Registers a callback to be invoked when the connection
 * is closed. This callback is invoked when there is any
 * condition that causes the socket connection to the
 * hypervisor to be closed.
 *
 * This function is only applicable to hypervisor drivers
 * which maintain a persistent open connection. Drivers
 * which open a new connection for every operation will
 * not invoke this.
 *
 * The @freecb must not invoke any other libvirt public
 * APIs, since it is not called from a re-entrant safe
 * context.
 *
 * Returns 0 on success, -1 on error
 */
20114 20115 20116 20117 20118
int
virConnectRegisterCloseCallback(virConnectPtr conn,
                                virConnectCloseFunc cb,
                                void *opaque,
                                virFreeCallback freecb)
20119 20120 20121 20122 20123
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

20124
    virCheckConnectReturn(conn, -1);
20125

20126 20127
    virObjectRef(conn);

20128
    virMutexLock(&conn->lock);
20129
    virObjectLock(conn->closeCallback);
20130 20131 20132

    virCheckNonNullArgGoto(cb, error);

20133
    if (conn->closeCallback->callback) {
20134 20135
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("A close callback is already registered"));
20136 20137 20138
        goto error;
    }

20139
    conn->closeCallback->conn = conn;
20140 20141 20142
    conn->closeCallback->callback = cb;
    conn->closeCallback->opaque = opaque;
    conn->closeCallback->freeCallback = freecb;
20143

20144
    virObjectUnlock(conn->closeCallback);
20145 20146 20147 20148
    virMutexUnlock(&conn->lock);

    return 0;

20149
 error:
20150
    virObjectUnlock(conn->closeCallback);
20151
    virMutexUnlock(&conn->lock);
20152
    virDispatchError(conn);
20153
    virObjectUnref(conn);
20154 20155 20156
    return -1;
}

20157

20158 20159 20160 20161 20162 20163 20164 20165 20166 20167 20168 20169 20170
/**
 * virConnectUnregisterCloseCallback:
 * @conn: pointer to connection object
 * @cb: pointer to the current registered callback
 *
 * Unregisters the callback previously set with the
 * virConnectRegisterCloseCallback method. The callback
 * will no longer receive notifications when the connection
 * closes. If a virFreeCallback was provided at time of
 * registration, it will be invoked
 *
 * Returns 0 on success, -1 on error
 */
20171 20172 20173
int
virConnectUnregisterCloseCallback(virConnectPtr conn,
                                  virConnectCloseFunc cb)
20174 20175 20176 20177 20178
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

20179
    virCheckConnectReturn(conn, -1);
20180 20181

    virMutexLock(&conn->lock);
20182
    virObjectLock(conn->closeCallback);
20183 20184 20185

    virCheckNonNullArgGoto(cb, error);

20186
    if (conn->closeCallback->callback != cb) {
20187 20188
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("A different callback was requested"));
20189 20190 20191
        goto error;
    }

20192 20193 20194 20195
    conn->closeCallback->callback = NULL;
    if (conn->closeCallback->freeCallback)
        conn->closeCallback->freeCallback(conn->closeCallback->opaque);
    conn->closeCallback->freeCallback = NULL;
20196

20197
    virObjectUnref(conn);
20198 20199
    virObjectUnlock(conn->closeCallback);
    virMutexUnlock(&conn->lock);
20200

20201 20202
    return 0;

20203
 error:
20204
    virObjectUnlock(conn->closeCallback);
20205
    virMutexUnlock(&conn->lock);
20206
    virDispatchError(conn);
20207 20208 20209
    return -1;
}

20210

20211 20212 20213 20214 20215 20216 20217
/**
 * virDomainSetBlockIoTune:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
 * @params: Pointer to blkio parameter objects
 * @nparams: Number of blkio parameters (this value can be the same or
 *           less than the number of parameters supported)
20218
 * @flags: bitwise-OR of virDomainModificationImpact
20219 20220 20221 20222 20223 20224 20225 20226 20227 20228 20229 20230
 *
 * Change all or a subset of the per-device block IO tunables.
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the <target
 * dev='...'/> sub-element, such as "xvda").  Valid names can be found
 * by calling virDomainGetXMLDesc() and inspecting elements
 * within //domain/devices/disk.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
20231 20232 20233 20234 20235 20236
int
virDomainSetBlockIoTune(virDomainPtr dom,
                        const char *disk,
                        virTypedParameterPtr params,
                        int nparams,
                        unsigned int flags)
20237 20238 20239
{
    virConnectPtr conn;

20240
    VIR_DOMAIN_DEBUG(dom, "disk=%s, params=%p, nparams=%d, flags=%x",
20241
                     disk, params, nparams, flags);
20242
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
20243 20244 20245

    virResetLastError();

20246 20247
    virCheckDomainReturn(dom, -1);
    conn = dom->conn;
20248

20249
    virCheckReadOnlyGoto(conn->flags, error);
20250 20251 20252
    virCheckNonNullArgGoto(disk, error);
    virCheckPositiveArgGoto(nparams, error);
    virCheckNonNullArgGoto(params, error);
20253

20254
    if (virTypedParameterValidateSet(dom->conn, params, nparams) < 0)
20255
        goto error;
20256 20257 20258 20259 20260 20261 20262 20263 20264

    if (conn->driver->domainSetBlockIoTune) {
        int ret;
        ret = conn->driver->domainSetBlockIoTune(dom, disk, params, nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20265
    virReportUnsupportedError();
20266

20267
 error:
20268 20269 20270 20271
    virDispatchError(dom->conn);
    return -1;
}

20272

20273 20274 20275 20276 20277 20278 20279
/**
 * virDomainGetBlockIoTune:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
 * @params: Pointer to blkio parameter object
 *          (return value, allocated by the caller)
 * @nparams: Pointer to number of blkio parameters
20280
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
20281 20282 20283 20284 20285 20286 20287 20288 20289 20290 20291 20292 20293 20294 20295 20296 20297 20298 20299 20300 20301 20302 20303 20304 20305
 *
 * Get all block IO tunable parameters for a given device.  On input,
 * @nparams gives the size of the @params array; on output, @nparams
 * gives how many slots were filled with parameter information, which
 * might be less but will not exceed the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0
 * on input will cause @nparams on output to contain the number of
 * parameters supported by the hypervisor, either for the given @disk
 * (note that block devices of different types might support different
 * parameters), or if @disk is NULL, for all possible disks. The
 * caller should then allocate @params array,
 * i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.  See virDomainGetMemoryParameters() for more details.
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the <target
 * dev='...'/> sub-element, such as "xvda").  Valid names can be found
 * by calling virDomainGetXMLDesc() and inspecting elements
 * within //domain/devices/disk.  This parameter cannot be NULL
 * unless @nparams is 0 on input.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
20306 20307 20308 20309 20310 20311
int
virDomainGetBlockIoTune(virDomainPtr dom,
                        const char *disk,
                        virTypedParameterPtr params,
                        int *nparams,
                        unsigned int flags)
20312 20313 20314
{
    virConnectPtr conn;

20315
    VIR_DOMAIN_DEBUG(dom, "disk=%s, params=%p, nparams=%d, flags=%x",
20316 20317 20318 20319
                     NULLSTR(disk), params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

20320
    virCheckDomainReturn(dom, -1);
20321

20322 20323 20324 20325 20326
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0) {
        virCheckNonNullArgGoto(params, error);
        virCheckNonNullArgGoto(disk, error);
20327 20328 20329 20330 20331 20332 20333 20334 20335
    }

    if (VIR_DRV_SUPPORTS_FEATURE(dom->conn->driver, dom->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
20336
        virReportInvalidArg(flags,
20337 20338
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
20339
                            __FUNCTION__);
20340 20341 20342 20343 20344 20345 20346 20347 20348 20349 20350 20351
        goto error;
    }
    conn = dom->conn;

    if (conn->driver->domainGetBlockIoTune) {
        int ret;
        ret = conn->driver->domainGetBlockIoTune(dom, disk, params, nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20352
    virReportUnsupportedError();
20353

20354
 error:
20355 20356 20357
    virDispatchError(dom->conn);
    return -1;
}
20358

20359

20360 20361 20362 20363 20364 20365 20366
/**
 * virDomainGetCPUStats:
 * @domain: domain to query
 * @params: array to populate on output
 * @nparams: number of parameters per cpu
 * @start_cpu: which cpu to start with, or -1 for summary
 * @ncpus: how many cpus to query
20367
 * @flags: bitwise-OR of virTypedParameterFlags
20368 20369 20370 20371 20372 20373 20374 20375 20376 20377 20378 20379 20380 20381
 *
 * Get statistics relating to CPU usage attributable to a single
 * domain (in contrast to the statistics returned by
 * virNodeGetCPUStats() for all processes on the host).  @dom
 * must be running (an inactive domain has no attributable cpu
 * usage).  On input, @params must contain at least @nparams * @ncpus
 * entries, allocated by the caller.
 *
 * If @start_cpu is -1, then @ncpus must be 1, and the returned
 * results reflect the statistics attributable to the entire
 * domain (such as user and system time for the process as a
 * whole).  Otherwise, @start_cpu represents which cpu to start
 * with, and @ncpus represents how many consecutive processors to
 * query, with statistics attributable per processor (such as
20382 20383 20384
 * per-cpu usage).  If @ncpus is larger than the number of cpus
 * available to query, then the trailing part of the array will
 * be unpopulated.
20385 20386 20387 20388 20389 20390 20391 20392 20393 20394 20395 20396 20397 20398 20399 20400 20401 20402 20403 20404 20405 20406 20407 20408 20409 20410 20411 20412 20413 20414
 *
 * The remote driver imposes a limit of 128 @ncpus and 16 @nparams;
 * the number of parameters per cpu should not exceed 16, but if you
 * have a host with more than 128 CPUs, your program should split
 * the request into multiple calls.
 *
 * As special cases, if @params is NULL and @nparams is 0 and
 * @ncpus is 1, and the return value will be how many
 * statistics are available for the given @start_cpu.  This number
 * may be different for @start_cpu of -1 than for any non-negative
 * value, but will be the same for all non-negative @start_cpu.
 * Likewise, if @params is NULL and @nparams is 0 and @ncpus is 0,
 * the number of cpus available to query is returned.  From the
 * host perspective, this would typically match the cpus member
 * of virNodeGetInfo(), but might be less due to host cpu hotplug.
 *
 * For now, @flags is unused, and the statistics all relate to the
 * usage from the host perspective.  It is possible that a future
 * version will support a flag that queries the cpu usage from the
 * guest's perspective, where the maximum cpu to query would be
 * related to virDomainGetVcpusFlags() rather than virNodeGetInfo().
 * An individual guest vcpu cannot be reliably mapped back to a
 * specific host cpu unless a single-processor vcpu pinning was used,
 * but when @start_cpu is -1, any difference in usage between a host
 * and guest perspective would serve as a measure of hypervisor overhead.
 *
 * Typical use sequence is below.
 *
 * getting total stats: set start_cpu as -1, ncpus 1
 * virDomainGetCPUStats(dom, NULL, 0, -1, 1, 0) => nparams
20415
 * params = calloc(nparams, sizeof(virTypedParameter))
20416 20417 20418 20419 20420
 * virDomainGetCPUStats(dom, params, nparams, -1, 1, 0) => total stats.
 *
 * getting per-cpu stats:
 * virDomainGetCPUStats(dom, NULL, 0, 0, 0, 0) => ncpus
 * virDomainGetCPUStats(dom, NULL, 0, 0, 1, 0) => nparams
20421
 * params = calloc(ncpus * nparams, sizeof(virTypedParameter))
20422 20423 20424 20425 20426 20427 20428
 * virDomainGetCPUStats(dom, params, nparams, 0, ncpus, 0) => per-cpu stats
 *
 * Returns -1 on failure, or the number of statistics that were
 * populated per cpu on success (this will be less than the total
 * number of populated @params, unless @ncpus was 1; and may be
 * less than @nparams).  The populated parameters start at each
 * stride of @nparams, which means the results may be discontiguous;
20429 20430 20431 20432
 * any unpopulated parameters will be zeroed on success (this includes
 * skipped elements if @nparams is too large, and tail elements if
 * @ncpus is too large).  The caller is responsible for freeing any
 * returned string parameters.
20433
 */
20434 20435 20436 20437 20438 20439 20440
int
virDomainGetCPUStats(virDomainPtr domain,
                     virTypedParameterPtr params,
                     unsigned int nparams,
                     int start_cpu,
                     unsigned int ncpus,
                     unsigned int flags)
20441 20442 20443 20444 20445 20446 20447 20448
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain,
                     "params=%p, nparams=%d, start_cpu=%d, ncpus=%u, flags=%x",
                     params, nparams, start_cpu, ncpus, flags);
    virResetLastError();

20449
    virCheckDomainReturn(domain, -1);
20450
    conn = domain->conn;
20451

20452 20453 20454 20455 20456
    /* Special cases:
     * start_cpu must be non-negative, or else -1
     * if start_cpu is -1, ncpus must be 1
     * params == NULL must match nparams == 0
     * ncpus must be non-zero unless params == NULL
20457
     * nparams * ncpus must not overflow (RPC may restrict it even more)
20458
     */
20459 20460 20461 20462 20463 20464 20465 20466 20467
    if (start_cpu == -1) {
        if (ncpus != 1) {
            virReportInvalidArg(start_cpu,
                                _("ncpus in %s must be 1 when start_cpu is -1"),
                                __FUNCTION__);
            goto error;
        }
    } else {
        virCheckNonNegativeArgGoto(start_cpu, error);
20468
    }
20469 20470 20471 20472 20473 20474 20475
    if (nparams)
        virCheckNonNullArgGoto(params, error);
    else
        virCheckNullArgGoto(params, error);
    if (ncpus == 0)
        virCheckNullArgGoto(params, error);

E
Eric Blake 已提交
20476
    if (nparams && ncpus > UINT_MAX / nparams) {
20477 20478
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u * %u"),
                       nparams, ncpus);
E
Eric Blake 已提交
20479 20480
        goto error;
    }
20481 20482 20483
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
20484 20485 20486 20487 20488 20489 20490 20491 20492 20493 20494

    if (conn->driver->domainGetCPUStats) {
        int ret;

        ret = conn->driver->domainGetCPUStats(domain, params, nparams,
                                              start_cpu, ncpus, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20495
    virReportUnsupportedError();
20496

20497
 error:
20498 20499 20500
    virDispatchError(domain->conn);
    return -1;
}
20501

20502

20503 20504 20505 20506 20507 20508 20509 20510 20511 20512 20513 20514 20515 20516 20517 20518 20519 20520 20521 20522 20523 20524 20525 20526 20527 20528 20529 20530 20531 20532 20533 20534 20535 20536 20537 20538 20539 20540 20541
/**
 * virDomainGetDiskErrors:
 * @dom: a domain object
 * @errors: array to populate on output
 * @maxerrors: size of @errors array
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * The function populates @errors array with all disks that encountered an
 * I/O error.  Disks with no error will not be returned in the @errors array.
 * Each disk is identified by its target (the dev attribute of target
 * subelement in domain XML), such as "vda", and accompanied with the error
 * that was seen on it.  The caller is also responsible for calling free()
 * on each disk name returned.
 *
 * In a special case when @errors is NULL and @maxerrors is 0, the function
 * returns preferred size of @errors that the caller should use to get all
 * disk errors.
 *
 * Since calling virDomainGetDiskErrors(dom, NULL, 0, 0) to get preferred size
 * of @errors array and getting the errors are two separate operations, new
 * disks may be hotplugged to the domain and new errors may be encountered
 * between the two calls.  Thus, this function may not return all disk errors
 * because the supplied array is not large enough.  Such errors may, however,
 * be detected by listening to domain events.
 *
 * Returns number of disks with errors filled in the @errors array or -1 on
 * error.
 */
int
virDomainGetDiskErrors(virDomainPtr dom,
                       virDomainDiskErrorPtr errors,
                       unsigned int maxerrors,
                       unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "errors=%p, maxerrors=%u, flags=%x",
                     errors, maxerrors, flags);

    virResetLastError();

20542
    virCheckDomainReturn(dom, -1);
20543

20544 20545 20546 20547
    if (maxerrors)
        virCheckNonNullArgGoto(errors, error);
    else
        virCheckNullArgGoto(errors, error);
20548 20549 20550 20551 20552 20553 20554 20555 20556

    if (dom->conn->driver->domainGetDiskErrors) {
        int ret = dom->conn->driver->domainGetDiskErrors(dom, errors,
                                                         maxerrors, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20557
    virReportUnsupportedError();
20558

20559
 error:
20560 20561 20562
    virDispatchError(dom->conn);
    return -1;
}
G
Guido Günther 已提交
20563

20564

G
Guido Günther 已提交
20565 20566 20567 20568 20569 20570 20571 20572 20573 20574 20575 20576 20577 20578 20579 20580 20581 20582
/**
 * virDomainGetHostname:
 * @domain: a domain object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Get the hostname for that domain.
 *
 * Dependent on hypervisor used, this may require a guest agent to be
 * available.
 *
 * Returns the hostname which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
virDomainGetHostname(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;

20583
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
G
Guido Günther 已提交
20584 20585 20586

    virResetLastError();

20587
    virCheckDomainReturn(domain, NULL);
G
Guido Günther 已提交
20588 20589 20590 20591
    conn = domain->conn;

    if (conn->driver->domainGetHostname) {
        char *ret;
20592
        ret = conn->driver->domainGetHostname(domain, flags);
G
Guido Günther 已提交
20593 20594 20595 20596 20597
        if (!ret)
            goto error;
        return ret;
    }

20598
    virReportUnsupportedError();
G
Guido Günther 已提交
20599

20600
 error:
G
Guido Günther 已提交
20601 20602 20603
    virDispatchError(domain->conn);
    return NULL;
}
20604

20605

20606 20607 20608 20609 20610 20611 20612 20613 20614 20615 20616 20617 20618 20619 20620 20621 20622 20623 20624 20625 20626 20627 20628 20629 20630 20631 20632 20633 20634 20635 20636
/**
 * virNodeGetCPUMap:
 * @conn: pointer to the hypervisor connection
 * @cpumap: optional pointer to a bit map of real CPUs on the host node
 *      (in 8-bit bytes) (OUT)
 *      In case of success each bit set to 1 means that corresponding
 *      CPU is online.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
 *      The bit map is allocated by virNodeGetCPUMap and needs
 *      to be released using free() by the caller.
 * @online: optional number of online CPUs in cpumap (OUT)
 *      Contains the number of online CPUs if the call was successful.
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Get CPU map of host node CPUs.
 *
 * Returns number of CPUs present on the host node,
 * or -1 if there was an error.
 */
int
virNodeGetCPUMap(virConnectPtr conn,
                 unsigned char **cpumap,
                 unsigned int *online,
                 unsigned int flags)
{
    VIR_DEBUG("conn=%p, cpumap=%p, online=%p, flags=%x",
              conn, cpumap, online, flags);

    virResetLastError();

20637
    virCheckConnectReturn(conn, -1);
20638 20639 20640 20641 20642 20643 20644 20645

    if (conn->driver->nodeGetCPUMap) {
        int ret = conn->driver->nodeGetCPUMap(conn, cpumap, online, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20646
    virReportUnsupportedError();
20647

20648
 error:
20649 20650 20651
    virDispatchError(conn);
    return -1;
}
20652

20653

20654 20655 20656
/**
 * virDomainFSTrim:
 * @dom: a domain object
20657
 * @mountPoint: which mount point to trim
20658 20659 20660 20661 20662 20663
 * @minimum: Minimum contiguous free range to discard in bytes
 * @flags: extra flags, not used yet, so callers should always pass 0
 *
 * Calls FITRIM within the guest (hence guest agent may be
 * required depending on hypervisor used). Either call it on each
 * mounted filesystem (@mountPoint is NULL) or just on specified
20664
 * @mountPoint. @minimum hints that free ranges smaller than this
20665 20666 20667 20668
 * may be ignored (this is a hint and the guest may not respect
 * it).  By increasing this value, the fstrim operation will
 * complete more quickly for filesystems with badly fragmented
 * free space, although not all blocks will be discarded.
20669
 * If @minimum is not zero, the command may fail.
20670 20671 20672 20673 20674 20675 20676 20677 20678 20679 20680 20681 20682 20683
 *
 * Returns 0 on success, -1 otherwise.
 */
int
virDomainFSTrim(virDomainPtr dom,
                const char *mountPoint,
                unsigned long long minimum,
                unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "mountPoint=%s, minimum=%llu, flags=%x",
                     mountPoint, minimum, flags);

    virResetLastError();

20684
    virCheckDomainReturn(dom, -1);
20685
    virCheckReadOnlyGoto(dom->conn->flags, error);
20686 20687 20688 20689 20690 20691 20692 20693 20694

    if (dom->conn->driver->domainFSTrim) {
        int ret = dom->conn->driver->domainFSTrim(dom, mountPoint,
                                                  minimum, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20695
    virReportUnsupportedError();
20696

20697
 error:
20698 20699 20700
    virDispatchError(dom->conn);
    return -1;
}
20701 20702 20703 20704 20705 20706 20707 20708 20709 20710 20711 20712 20713 20714 20715 20716 20717 20718 20719 20720 20721 20722 20723 20724 20725 20726 20727 20728 20729 20730 20731 20732 20733 20734 20735 20736 20737 20738 20739 20740 20741 20742 20743 20744 20745 20746 20747 20748 20749 20750 20751 20752 20753 20754 20755 20756 20757 20758 20759 20760 20761 20762 20763 20764 20765 20766 20767 20768 20769 20770 20771 20772 20773 20774 20775 20776 20777 20778 20779 20780 20781 20782 20783 20784 20785 20786 20787 20788 20789 20790 20791 20792 20793

/**
 * virDomainFSFreeze:
 * @dom: a domain object
 * @mountpoints: list of mount points to be frozen
 * @nmountpoints: the number of mount points specified in @mountpoints
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Freeze specified filesystems within the guest (hence guest agent
 * may be required depending on hypervisor used). If @mountpoints is NULL and
 * @nmountpoints is 0, every mounted filesystem on the guest is frozen.
 * In some environments (e.g. QEMU guest with guest agent which doesn't
 * support mountpoints argument), @mountpoints may need to be NULL.
 *
 * Returns the number of frozen filesystems on success, -1 otherwise.
 */
int
virDomainFSFreeze(virDomainPtr dom,
                  const char **mountpoints,
                  unsigned int nmountpoints,
                  unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "mountpoints=%p, nmountpoints=%d, flags=%x",
                     mountpoints, nmountpoints, flags);

    virResetLastError();

    virCheckDomainReturn(dom, -1);
    virCheckReadOnlyGoto(dom->conn->flags, error);
    if (nmountpoints)
        virCheckNonNullArgGoto(mountpoints, error);
    else
        virCheckNullArgGoto(mountpoints, error);

    if (dom->conn->driver->domainFSFreeze) {
        int ret = dom->conn->driver->domainFSFreeze(
            dom, mountpoints, nmountpoints, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

    virReportUnsupportedError();

 error:
    virDispatchError(dom->conn);
    return -1;
}

/**
 * virDomainFSThaw:
 * @dom: a domain object
 * @mountpoints: list of mount points to be thawed
 * @nmountpoints: the number of mount points specified in @mountpoints
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Thaw specified filesystems within the guest. If @mountpoints is NULL and
 * @nmountpoints is 0, every mounted filesystem on the guest is thawed.
 * In some drivers (e.g. QEMU driver), @mountpoints may need to be NULL.
 *
 * Returns the number of thawed filesystems on success, -1 otherwise.
 */
int
virDomainFSThaw(virDomainPtr dom,
                const char **mountpoints,
                unsigned int nmountpoints,
                unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);

    virResetLastError();

    virCheckDomainReturn(dom, -1);
    virCheckReadOnlyGoto(dom->conn->flags, error);
    if (nmountpoints)
        virCheckNonNullArgGoto(mountpoints, error);
    else
        virCheckNullArgGoto(mountpoints, error);

    if (dom->conn->driver->domainFSThaw) {
        int ret = dom->conn->driver->domainFSThaw(
            dom, mountpoints, nmountpoints, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

    virReportUnsupportedError();

 error:
    virDispatchError(dom->conn);
    return -1;
}