qemu_driver.c 265.5 KB
Newer Older
D
Daniel P. Berrange 已提交
1 2 3
/*
 * driver.c: core driver methods for managing qemu guests
 *
4
 * Copyright (C) 2006, 2007, 2008, 2009, 2010 Red Hat, Inc.
D
Daniel P. Berrange 已提交
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307  USA
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

24
#include <config.h>
25

D
Daniel P. Berrange 已提交
26 27
#include <sys/types.h>
#include <sys/poll.h>
28
#include <sys/time.h>
D
Daniel P. Berrange 已提交
29 30 31
#include <dirent.h>
#include <limits.h>
#include <string.h>
32
#include <stdbool.h>
D
Daniel P. Berrange 已提交
33 34 35 36 37 38
#include <stdio.h>
#include <strings.h>
#include <stdarg.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
39
#include <sys/utsname.h>
40 41 42 43
#include <sys/stat.h>
#include <fcntl.h>
#include <signal.h>
#include <paths.h>
44 45
#include <pwd.h>
#include <stdio.h>
46
#include <sys/wait.h>
47
#include <sys/ioctl.h>
48
#include <sys/un.h>
D
Daniel P. Berrange 已提交
49

50
#include "virterror_internal.h"
51
#include "logging.h"
52
#include "datatypes.h"
53 54
#include "qemu_driver.h"
#include "qemu_conf.h"
55
#include "qemu_monitor.h"
56
#include "qemu_monitor_text.h"
57
#include "qemu_bridge_filter.h"
J
Jim Meyering 已提交
58
#include "c-ctype.h"
59
#include "event.h"
60
#include "buf.h"
61
#include "util.h"
62
#include "nodeinfo.h"
63
#include "stats_linux.h"
64
#include "capabilities.h"
65
#include "memory.h"
66
#include "uuid.h"
67
#include "domain_conf.h"
68 69
#include "node_device_conf.h"
#include "pci.h"
70
#include "hostusb.h"
71
#include "processinfo.h"
72 73
#include "qemu_security_stacked.h"
#include "qemu_security_dac.h"
74
#include "cgroup.h"
C
Chris Lalancette 已提交
75
#include "libvirt_internal.h"
76
#include "xml.h"
77
#include "cpu/cpu.h"
78

79

80 81
#define VIR_FROM_THIS VIR_FROM_QEMU

82 83 84
typedef struct _qemuDomainObjPrivate qemuDomainObjPrivate;
typedef qemuDomainObjPrivate *qemuDomainObjPrivatePtr;
struct _qemuDomainObjPrivate {
85 86 87 88 89
    virCond jobCond; /* Use in conjunction with main virDomainObjPtr lock */
    int jobActive; /* Non-zero if a job is active. Only 1 job is allowed at any time
                    * A job includes *all* monitor commands, even those just querying
                    * information, not merely actions */

90
    qemuMonitorPtr mon;
91
    virDomainChrDefPtr monConfig;
D
Daniel P. Berrange 已提交
92
    int monJSON;
93 94 95

    int nvcpupids;
    int *vcpupids;
96 97

    qemuDomainPCIAddressSetPtr pciaddrs;
98 99
};

100 101
static int qemudShutdown(void);

102 103
static void qemuDriverLock(struct qemud_driver *driver)
{
104
    virMutexLock(&driver->lock);
105 106 107
}
static void qemuDriverUnlock(struct qemud_driver *driver)
{
108
    virMutexUnlock(&driver->lock);
109 110
}

111 112 113
static void qemuDomainEventFlush(int timer, void *opaque);
static void qemuDomainEventQueue(struct qemud_driver *driver,
                                 virDomainEventPtr event);
114

115 116
static int qemudStartVMDaemon(virConnectPtr conn,
                              struct qemud_driver *driver,
117
                              virDomainObjPtr vm,
118 119
                              const char *migrateFrom,
                              int stdin_fd);
120

121 122
static void qemudShutdownVMDaemon(virConnectPtr conn,
                                  struct qemud_driver *driver,
123
                                  virDomainObjPtr vm);
124

125
static int qemudDomainGetMaxVcpus(virDomainPtr dom);
126

127
static int qemuDetectVcpuPIDs(virConnectPtr conn,
128
                              struct qemud_driver *driver,
129
                              virDomainObjPtr vm);
130

131 132 133
static int qemuUpdateActivePciHostdevs(struct qemud_driver *driver,
                                       virDomainDefPtr def);

J
Jim Meyering 已提交
134
static struct qemud_driver *qemu_driver = NULL;
135

136 137 138 139 140 141 142 143 144 145 146 147 148 149 150

static void *qemuDomainObjPrivateAlloc(void)
{
    qemuDomainObjPrivatePtr priv;

    if (VIR_ALLOC(priv) < 0)
        return NULL;

    return priv;
}

static void qemuDomainObjPrivateFree(void *data)
{
    qemuDomainObjPrivatePtr priv = data;

151
    qemuDomainPCIAddressSetFree(priv->pciaddrs);
152 153 154
    virDomainChrDefFree(priv->monConfig);
    VIR_FREE(priv->vcpupids);

155 156 157 158 159 160 161 162 163
    /* This should never be non-NULL if we get here, but just in case... */
    if (priv->mon) {
        VIR_ERROR0("Unexpected QEMU monitor still active during domain deletion");
        qemuMonitorClose(priv->mon);
    }
    VIR_FREE(priv);
}


164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181
static int qemuDomainObjPrivateXMLFormat(virBufferPtr buf, void *data)
{
    qemuDomainObjPrivatePtr priv = data;
    const char *monitorpath;

    /* priv->monitor_chr is set only for qemu */
    if (priv->monConfig) {
        switch (priv->monConfig->type) {
        case VIR_DOMAIN_CHR_TYPE_UNIX:
            monitorpath = priv->monConfig->data.nix.path;
            break;
        default:
        case VIR_DOMAIN_CHR_TYPE_PTY:
            monitorpath = priv->monConfig->data.file.path;
            break;
        }

        virBufferEscapeString(buf, "  <monitor path='%s'", monitorpath);
D
Daniel P. Berrange 已提交
182 183
        if (priv->monJSON)
            virBufferAddLit(buf, " json='1'");
184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213
        virBufferVSprintf(buf, " type='%s'/>\n",
                          virDomainChrTypeToString(priv->monConfig->type));
    }


    if (priv->nvcpupids) {
        int i;
        virBufferAddLit(buf, "  <vcpus>\n");
        for (i = 0 ; i < priv->nvcpupids ; i++) {
            virBufferVSprintf(buf, "    <vcpu pid='%d'/>\n", priv->vcpupids[i]);
        }
        virBufferAddLit(buf, "  </vcpus>\n");
    }

    return 0;
}

static int qemuDomainObjPrivateXMLParse(xmlXPathContextPtr ctxt, void *data)
{
    qemuDomainObjPrivatePtr priv = data;
    char *monitorpath;
    char *tmp;
    int n, i;
    xmlNodePtr *nodes = NULL;

    if (VIR_ALLOC(priv->monConfig) < 0) {
        virReportOOMError(NULL);
        goto error;
    }

214 215 216 217 218
    if (!(priv->monConfig->info.alias = strdup("monitor"))) {
        virReportOOMError(NULL);
        goto error;
    }

219 220 221 222 223 224 225 226 227 228 229 230 231 232
    if (!(monitorpath =
          virXPathString(NULL, "string(./monitor[1]/@path)", ctxt))) {
        qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("no monitor path"));
        goto error;
    }

    tmp = virXPathString(NULL, "string(./monitor[1]/@type)", ctxt);
    if (tmp)
        priv->monConfig->type = virDomainChrTypeFromString(tmp);
    else
        priv->monConfig->type = VIR_DOMAIN_CHR_TYPE_PTY;
    VIR_FREE(tmp);

233
    if (virXPathBoolean(NULL, "count(./monitor[@json = '1']) > 0", ctxt)) {
D
Daniel P. Berrange 已提交
234
        priv->monJSON = 1;
235 236 237
    } else {
        priv->monJSON = 0;
    }
D
Daniel P. Berrange 已提交
238

239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280
    switch (priv->monConfig->type) {
    case VIR_DOMAIN_CHR_TYPE_PTY:
        priv->monConfig->data.file.path = monitorpath;
        break;
    case VIR_DOMAIN_CHR_TYPE_UNIX:
        priv->monConfig->data.nix.path = monitorpath;
        break;
    default:
        VIR_FREE(monitorpath);
        qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unsupported monitor type '%s'"),
                         virDomainChrTypeToString(priv->monConfig->type));
        goto error;
    }

    n = virXPathNodeSet(NULL, "./vcpus/vcpu", ctxt, &nodes);
    if (n < 0)
        goto error;
    if (n) {
        priv->nvcpupids = n;
        if (VIR_REALLOC_N(priv->vcpupids, priv->nvcpupids) < 0) {
            virReportOOMError(NULL);
            goto error;
        }

        for (i = 0 ; i < n ; i++) {
            char *pidstr = virXMLPropString(nodes[i], "pid");
            if (!pidstr)
                goto error;

            if (virStrToLong_i(pidstr, NULL, 10, &(priv->vcpupids[i])) < 0) {
                VIR_FREE(pidstr);
                goto error;
            }
            VIR_FREE(pidstr);
        }
        VIR_FREE(nodes);
    }

    return 0;

error:
281 282
    virDomainChrDefFree(priv->monConfig);
    priv->monConfig = NULL;
283 284 285 286 287 288
    VIR_FREE(nodes);
    return -1;
}



289 290 291 292 293 294 295 296 297
/*
 * obj must be locked before calling, qemud_driver must NOT be locked
 *
 * This must be called by anything that will change the VM state
 * in any way, or anything that will use the QEMU monitor.
 *
 * Upon successful return, the object will have its ref count increased,
 * successful calls must be followed by EndJob eventually
 */
298 299 300 301

/* Give up waiting for mutex after 30 seconds */
#define QEMU_JOB_WAIT_TIME (1000ull * 30)

302 303 304 305
static int qemuDomainObjBeginJob(virDomainObjPtr obj) ATTRIBUTE_RETURN_CHECK;
static int qemuDomainObjBeginJob(virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
306 307 308 309 310 311 312 313 314 315
    struct timeval now;
    unsigned long long then;

    if (gettimeofday(&now, NULL) < 0) {
        virReportSystemError(NULL, errno, "%s",
                             _("cannot get time of day"));
        return -1;
    }
    then = (now.tv_sec * 1000ull) + (now.tv_usec / 1000);
    then += QEMU_JOB_WAIT_TIME;
316 317 318 319

    virDomainObjRef(obj);

    while (priv->jobActive) {
320
        if (virCondWaitUntil(&priv->jobCond, &obj->lock, then) < 0) {
321
            virDomainObjUnref(obj);
322 323 324 325 326 327
            if (errno == ETIMEDOUT)
                qemudReportError(NULL, NULL, NULL, VIR_ERR_OPERATION_TIMEOUT,
                                 "%s", _("cannot acquire state change lock"));
            else
                virReportSystemError(NULL, errno,
                                     "%s", _("cannot acquire job mutex"));
328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347
            return -1;
        }
    }
    priv->jobActive = 1;

    return 0;
}

/*
 * obj must be locked before calling, qemud_driver must be locked
 *
 * This must be called by anything that will change the VM state
 * in any way, or anything that will use the QEMU monitor.
 */
static int qemuDomainObjBeginJobWithDriver(struct qemud_driver *driver,
                                           virDomainObjPtr obj) ATTRIBUTE_RETURN_CHECK;
static int qemuDomainObjBeginJobWithDriver(struct qemud_driver *driver,
                                           virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
348 349 350 351 352 353 354 355 356 357
    struct timeval now;
    unsigned long long then;

    if (gettimeofday(&now, NULL) < 0) {
        virReportSystemError(NULL, errno, "%s",
                             _("cannot get time of day"));
        return -1;
    }
    then = (now.tv_sec * 1000ull) + (now.tv_usec / 1000);
    then += QEMU_JOB_WAIT_TIME;
358 359 360 361 362

    virDomainObjRef(obj);
    qemuDriverUnlock(driver);

    while (priv->jobActive) {
363
        if (virCondWaitUntil(&priv->jobCond, &obj->lock, then) < 0) {
364
            virDomainObjUnref(obj);
365 366 367 368 369 370
            if (errno == ETIMEDOUT)
                qemudReportError(NULL, NULL, NULL, VIR_ERR_OPERATION_TIMEOUT,
                                 "%s", _("cannot acquire state change lock"));
            else
                virReportSystemError(NULL, errno,
                                     "%s", _("cannot acquire job mutex"));
M
Matthias Bolte 已提交
371
            qemuDriverLock(driver);
372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388
            return -1;
        }
    }
    priv->jobActive = 1;

    virDomainObjUnlock(obj);
    qemuDriverLock(driver);
    virDomainObjLock(obj);

    return 0;
}

/*
 * obj must be locked before calling, qemud_driver does not matter
 *
 * To be called after completing the work associated with the
 * earlier  qemuDomainBeginJob() call
389 390 391
 *
 * Returns remaining refcount on 'obj', maybe 0 to indicated it
 * was deleted
392
 */
393
static int ATTRIBUTE_RETURN_CHECK qemuDomainObjEndJob(virDomainObjPtr obj)
394 395 396 397 398 399
{
    qemuDomainObjPrivatePtr priv = obj->privateData;

    priv->jobActive = 0;
    virCondSignal(&priv->jobCond);

400
    return virDomainObjUnref(obj);
401 402 403 404 405 406 407 408 409 410 411
}


/*
 * obj must be locked before calling, qemud_driver must be unlocked
 *
 * To be called immediately before any QEMU monitor API call
 * Must have alrady called qemuDomainObjBeginJob().
 *
 * To be followed with qemuDomainObjExitMonitor() once complete
 */
412 413 414 415 416
static void qemuDomainObjEnterMonitor(virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;

    qemuMonitorLock(priv->mon);
417
    qemuMonitorRef(priv->mon);
418
    virDomainObjUnlock(obj);
419 420 421
}


422 423 424 425
/* obj must NOT be locked before calling, qemud_driver must be unlocked
 *
 * Should be paired with an earlier  qemuDomainObjEnterMonitor() call
 */
426 427 428
static void qemuDomainObjExitMonitor(virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
429 430 431 432 433 434
    int refs;

    refs = qemuMonitorUnref(priv->mon);

    if (refs > 0)
        qemuMonitorUnlock(priv->mon);
435

436
    virDomainObjLock(obj);
437 438 439 440 441

    if (refs == 0) {
        virDomainObjUnref(obj);
        priv->mon = NULL;
    }
442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457
}


/*
 * obj must be locked before calling, qemud_driver must be locked
 *
 * To be called immediately before any QEMU monitor API call
 * Must have alrady called qemuDomainObjBeginJob().
 *
 * To be followed with qemuDomainObjExitMonitorWithDriver() once complete
 */
static void qemuDomainObjEnterMonitorWithDriver(struct qemud_driver *driver, virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;

    qemuMonitorLock(priv->mon);
458
    qemuMonitorRef(priv->mon);
459 460 461 462 463 464 465 466 467 468 469 470 471
    virDomainObjUnlock(obj);
    qemuDriverUnlock(driver);
}


/* obj must NOT be locked before calling, qemud_driver must be unlocked,
 * and will be locked after returning
 *
 * Should be paired with an earlier  qemuDomainObjEnterMonitor() call
 */
static void qemuDomainObjExitMonitorWithDriver(struct qemud_driver *driver, virDomainObjPtr obj)
{
    qemuDomainObjPrivatePtr priv = obj->privateData;
472 473 474 475 476 477
    int refs;

    refs = qemuMonitorUnref(priv->mon);

    if (refs > 0)
        qemuMonitorUnlock(priv->mon);
478 479 480

    qemuDriverLock(driver);
    virDomainObjLock(obj);
481 482 483 484 485

    if (refs == 0) {
        virDomainObjUnref(obj);
        priv->mon = NULL;
    }
486 487 488
}


489 490 491 492 493 494 495 496 497
static int qemuCgroupControllerActive(struct qemud_driver *driver,
                                      int controller)
{
    if (driver->cgroup == NULL)
        return 0;
    if (driver->cgroupControllers & (1 << controller))
        return 1;
    return 0;
}
498

499
static int
500
qemudLogFD(virConnectPtr conn, struct qemud_driver *driver, const char* name)
501 502 503
{
    char logfile[PATH_MAX];
    mode_t logmode;
G
Guido Günther 已提交
504
    int ret, fd = -1;
505

506 507
    if ((ret = snprintf(logfile, sizeof(logfile), "%s/%s.log",
                        driver->logDir, name))
G
Guido Günther 已提交
508
        < 0 || ret >= sizeof(logfile)) {
509
        virReportOOMError(conn);
510 511 512 513
        return -1;
    }

    logmode = O_CREAT | O_WRONLY;
514 515
    /* Only logrotate files in /var/log, so only append if running privileged */
    if (driver->privileged)
516
        logmode |= O_APPEND;
517 518 519
    else
        logmode |= O_TRUNC;

520
    if ((fd = open(logfile, logmode, S_IRUSR | S_IWUSR)) < 0) {
521 522 523
        virReportSystemError(conn, errno,
                             _("failed to create logfile %s"),
                             logfile);
524 525
        return -1;
    }
526
    if (virSetCloseExec(fd) < 0) {
527 528
        virReportSystemError(conn, errno, "%s",
                             _("Unable to set VM logfile close-on-exec flag"));
529 530 531 532 533 534 535
        close(fd);
        return -1;
    }
    return fd;
}


536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552
static int
qemudLogReadFD(virConnectPtr conn, const char* logDir, const char* name, off_t pos)
{
    char logfile[PATH_MAX];
    mode_t logmode = O_RDONLY;
    int ret, fd = -1;

    if ((ret = snprintf(logfile, sizeof(logfile), "%s/%s.log", logDir, name))
        < 0 || ret >= sizeof(logfile)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("failed to build logfile name %s/%s.log"),
                         logDir, name);
        return -1;
    }


    if ((fd = open(logfile, logmode)) < 0) {
553 554 555
        virReportSystemError(conn, errno,
                             _("failed to create logfile %s"),
                             logfile);
556 557
        return -1;
    }
558
    if (virSetCloseExec(fd) < 0) {
559 560
        virReportSystemError(conn, errno, "%s",
                             _("Unable to set VM logfile close-on-exec flag"));
561 562 563
        close(fd);
        return -1;
    }
564 565
    if (pos < 0 || lseek(fd, pos, SEEK_SET) < 0) {
      virReportSystemError(conn, pos < 0 ? 0 : errno,
566 567
                             _("Unable to seek to %lld in %s"),
                             (long long) pos, logfile);
568 569 570 571 572 573
        close(fd);
    }
    return fd;
}


574 575 576 577 578 579 580 581 582 583 584 585
struct qemuAutostartData {
    struct qemud_driver *driver;
    virConnectPtr conn;
};
static void
qemuAutostartDomain(void *payload, const char *name ATTRIBUTE_UNUSED, void *opaque)
{
    virDomainObjPtr vm = payload;
    struct qemuAutostartData *data = opaque;

    virDomainObjLock(vm);
    if (vm->autostart &&
D
Daniel P. Berrange 已提交
586
        !virDomainObjIsActive(vm)) {
587 588 589 590 591 592
        int ret;

        virResetLastError();
        ret = qemudStartVMDaemon(data->conn, data->driver, vm, NULL, -1);
        if (ret < 0) {
            virErrorPtr err = virGetLastError();
593
            VIR_ERROR(_("Failed to autostart VM '%s': %s"),
594 595 596 597 598 599 600 601 602 603 604 605 606 607
                      vm->def->name,
                      err ? err->message : "");
        } else {
            virDomainEventPtr event =
                virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STARTED,
                                         VIR_DOMAIN_EVENT_STARTED_BOOTED);
            if (event)
                qemuDomainEventQueue(data->driver, event);
        }
    }
    virDomainObjUnlock(vm);
}

608 609
static void
qemudAutostartConfigs(struct qemud_driver *driver) {
610 611 612 613 614
    /* XXX: Figure out a better way todo this. The domain
     * startup code needs a connection handle in order
     * to lookup the bridge associated with a virtual
     * network
     */
615 616 617
    virConnectPtr conn = virConnectOpen(driver->privileged ?
                                        "qemu:///system" :
                                        "qemu:///session");
618
    /* Ignoring NULL conn which is mostly harmless here */
619
    struct qemuAutostartData data = { driver, conn };
620

621
    qemuDriverLock(driver);
622
    virHashForEach(driver->domains.objs, qemuAutostartDomain, &data);
623
    qemuDriverUnlock(driver);
624

625 626
    if (conn)
        virConnectClose(conn);
627 628
}

629 630 631 632 633 634 635 636 637 638 639 640 641

/**
 * qemudRemoveDomainStatus
 *
 * remove all state files of a domain from statedir
 *
 * Returns 0 on success
 */
static int
qemudRemoveDomainStatus(virConnectPtr conn,
                        struct qemud_driver *driver,
                        virDomainObjPtr vm)
{
642
    char ebuf[1024];
643 644 645
    char *file = NULL;

    if (virAsprintf(&file, "%s/%s.xml", driver->stateDir, vm->def->name) < 0) {
646
        virReportOOMError(conn);
D
Daniel Veillard 已提交
647
        return(-1);
648 649
    }

650 651
    if (unlink(file) < 0 && errno != ENOENT && errno != ENOTDIR)
        VIR_WARN(_("Failed to remove domain XML for %s: %s"),
D
Daniel Veillard 已提交
652 653 654
                 vm->def->name, virStrerror(errno, ebuf, sizeof(ebuf)));
    VIR_FREE(file);

655 656 657
    if (virFileDeletePid(driver->stateDir, vm->def->name) != 0)
        VIR_WARN(_("Failed to remove PID file for %s: %s"),
                 vm->def->name, virStrerror(errno, ebuf, sizeof(ebuf)));
658

D
Daniel Veillard 已提交
659

660
    return 0;
661 662
}

663 664 665 666 667 668 669 670 671 672 673 674 675 676

/*
 * This is a callback registered with a qemuMonitorPtr  instance,
 * and to be invoked when the monitor console hits an end of file
 * condition, or error, thus indicating VM shutdown should be
 * performed
 */
static void
qemuHandleMonitorEOF(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                     virDomainObjPtr vm,
                     int hasError) {
    struct qemud_driver *driver = qemu_driver;
    virDomainEventPtr event = NULL;

677
    VIR_DEBUG("Received EOF on %p '%s'", vm, vm->def->name);
678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699
    virDomainObjLock(vm);

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     hasError ?
                                     VIR_DOMAIN_EVENT_STOPPED_FAILED :
                                     VIR_DOMAIN_EVENT_STOPPED_SHUTDOWN);

    qemudShutdownVMDaemon(NULL, driver, vm);
    if (!vm->persistent)
        virDomainRemoveInactive(&driver->domains, vm);
    else
        virDomainObjUnlock(vm);

    if (event) {
        qemuDriverLock(driver);
        qemuDomainEventQueue(driver, event);
        qemuDriverUnlock(driver);
    }
}


700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741
static virStorageEncryptionPtr
findDomainDiskEncryption(virConnectPtr conn, virDomainObjPtr vm,
                         const char *path)
{
    bool seen_volume;
    int i;

    seen_volume = false;
    for (i = 0; i < vm->def->ndisks; i++) {
        virDomainDiskDefPtr disk;

        disk = vm->def->disks[i];
        if (disk->src != NULL && STREQ(disk->src, path)) {
            seen_volume = true;
            if (disk->encryption != NULL)
                return disk->encryption;
        }
    }
    if (seen_volume)
        qemudReportError(conn, NULL, NULL, VIR_ERR_INVALID_DOMAIN,
                         _("missing <encryption> for volume %s"), path);
    else
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unexpected passphrase request for volume %s"),
                         path);
    return NULL;
}


static int
findVolumeQcowPassphrase(qemuMonitorPtr mon ATTRIBUTE_UNUSED,
                         virConnectPtr conn,
                         virDomainObjPtr vm,
                         const char *path,
                         char **secretRet,
                         size_t *secretLen)
{
    virStorageEncryptionPtr enc;
    virSecretPtr secret;
    char *passphrase;
    unsigned char *data;
    size_t size;
742 743
    int ret = -1;

744
    virDomainObjLock(vm);
745 746 747 748

    if (!conn) {
        qemudReportError(NULL, NULL, NULL, VIR_ERR_NO_SUPPORT,
                         "%s", _("cannot find secrets without a connection"));
749
        goto cleanup;
750 751 752 753 754 755 756
    }

    if (conn->secretDriver == NULL ||
        conn->secretDriver->lookupByUUID == NULL ||
        conn->secretDriver->getValue == NULL) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_NO_SUPPORT, "%s",
                         _("secret storage not supported"));
757
        goto cleanup;
758 759 760 761 762 763 764 765 766 767 768 769
    }

    enc = findDomainDiskEncryption(conn, vm, path);
    if (enc == NULL)
        return -1;

    if (enc->format != VIR_STORAGE_ENCRYPTION_FORMAT_QCOW ||
        enc->nsecrets != 1 ||
        enc->secrets[0]->type !=
        VIR_STORAGE_ENCRYPTION_SECRET_TYPE_PASSPHRASE) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INVALID_DOMAIN,
                         _("invalid <encryption> for volume %s"), path);
770
        goto cleanup;
771 772 773 774 775
    }

    secret = conn->secretDriver->lookupByUUID(conn,
                                              enc->secrets[0]->uuid);
    if (secret == NULL)
776
        goto cleanup;
777 778 779 780
    data = conn->secretDriver->getValue(secret, &size,
                                        VIR_SECRET_GET_VALUE_INTERNAL_CALL);
    virUnrefSecret(secret);
    if (data == NULL)
781
        goto cleanup;
782 783 784 785 786 787 788

    if (memchr(data, '\0', size) != NULL) {
        memset(data, 0, size);
        VIR_FREE(data);
        qemudReportError(conn, NULL, NULL, VIR_ERR_INVALID_SECRET,
                         _("format='qcow' passphrase for %s must not contain a "
                           "'\\0'"), path);
789
        goto cleanup;
790 791 792 793 794 795
    }

    if (VIR_ALLOC_N(passphrase, size + 1) < 0) {
        memset(data, 0, size);
        VIR_FREE(data);
        virReportOOMError(conn);
796
        goto cleanup;
797 798 799 800 801 802 803 804 805 806
    }
    memcpy(passphrase, data, size);
    passphrase[size] = '\0';

    memset(data, 0, size);
    VIR_FREE(data);

    *secretRet = passphrase;
    *secretLen = size;

807 808 809
    ret = 0;

cleanup:
810 811
    virDomainObjUnlock(vm);

812
    return ret;
813 814
}

815 816 817 818 819
static qemuMonitorCallbacks monitorCallbacks = {
    .eofNotify = qemuHandleMonitorEOF,
    .diskSecretLookup = findVolumeQcowPassphrase,
};

820
static int
821
qemuConnectMonitor(virDomainObjPtr vm)
822
{
823
    qemuDomainObjPrivatePtr priv = vm->privateData;
824

825 826 827 828
    /* Hold an extra reference because we can't allow 'vm' to be
     * deleted while the monitor is active */
    virDomainObjRef(vm);

829 830
    if ((priv->mon = qemuMonitorOpen(vm,
                                     priv->monConfig,
D
Daniel P. Berrange 已提交
831
                                     priv->monJSON,
832
                                     &monitorCallbacks)) == NULL) {
833
        VIR_ERROR(_("Failed to connect monitor for %s"), vm->def->name);
834
        return -1;
835
    }
836

837 838
    return 0;
}
839 840 841 842

/*
 * Open an existing VM's monitor, re-detect VCPU threads
 * and re-reserve the security labels in use
843
 */
844 845
static void
qemuReconnectDomain(void *payload, const char *name ATTRIBUTE_UNUSED, void *opaque)
846
{
847 848
    virDomainObjPtr obj = payload;
    struct qemud_driver *driver = opaque;
849
    qemuDomainObjPrivatePtr priv;
850 851

    virDomainObjLock(obj);
852

853 854
    VIR_DEBUG("Reconnect monitor to %p '%s'", obj, obj->def->name);

855 856
    priv = obj->privateData;

857 858
    /* XXX check PID liveliness & EXE path */
    if (qemuConnectMonitor(obj) < 0)
859
        goto error;
860

861 862 863 864
    if (qemuUpdateActivePciHostdevs(driver, obj->def) < 0) {
        goto error;
    }

865 866 867
    if (!(priv->pciaddrs = qemuDomainPCIAddressSetCreate(obj->def)))
        goto error;

868
    if (driver->securityDriver &&
869 870
        driver->securityDriver->domainReserveSecurityLabel &&
        driver->securityDriver->domainReserveSecurityLabel(NULL, obj) < 0)
871
        goto error;
872

873 874
    if (obj->def->id >= driver->nextvmid)
        driver->nextvmid = obj->def->id + 1;
875

876 877
    virDomainObjUnlock(obj);
    return;
878

879
error:
880 881 882 883
    /* We can't get the monitor back, so must kill the VM
     * to remove danger of it ending up running twice if
     * user tries to start it again later */
    qemudShutdownVMDaemon(NULL, driver, obj);
884 885 886 887
    if (!obj->persistent)
        virDomainRemoveInactive(&driver->domains, obj);
    else
        virDomainObjUnlock(obj);
888
}
889

890
/**
891
 * qemudReconnectDomains
892 893 894 895 896 897 898
 *
 * Try to re-open the resources for live VMs that we care
 * about.
 */
static void
qemuReconnectDomains(struct qemud_driver *driver)
{
899
    virHashForEach(driver->domains.objs, qemuReconnectDomain, driver);
900 901
}

902

903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920
static int
qemudSecurityInit(struct qemud_driver *qemud_drv)
{
    int ret;
    virSecurityDriverPtr security_drv;

    ret = virSecurityDriverStartup(&security_drv,
                                   qemud_drv->securityDriverName);
    if (ret == -1) {
        VIR_ERROR0(_("Failed to start security driver"));
        return -1;
    }
    /* No security driver wanted to be enabled: just return */
    if (ret == -2) {
        VIR_INFO0(_("No security driver available"));
        return 0;
    }

921 922 923 924 925 926
    qemuSecurityStackedSetDriver(qemud_drv);
    qemuSecurityDACSetDriver(qemud_drv);

    qemud_drv->securityPrimaryDriver = security_drv;
    qemud_drv->securitySecondaryDriver = &qemuDACSecurityDriver;
    qemud_drv->securityDriver = &qemuStackedSecurityDriver;
927

928
    VIR_INFO("Initialized security driver %s", security_drv->name);
929
    return 0;
930
}
931 932


933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974
static virCapsPtr
qemuCreateCapabilities(virCapsPtr oldcaps,
                       virSecurityDriverPtr secDriver)
{
    virCapsPtr caps;

    /* Basic host arch / guest machine capabilities */
    if (!(caps = qemudCapsInit(oldcaps))) {
        virReportOOMError(NULL);
        return NULL;
    }

    /* Domain XML parser hooks */
    caps->privateDataAllocFunc = qemuDomainObjPrivateAlloc;
    caps->privateDataFreeFunc = qemuDomainObjPrivateFree;
    caps->privateDataXMLFormat = qemuDomainObjPrivateXMLFormat;
    caps->privateDataXMLParse = qemuDomainObjPrivateXMLParse;


    /* Security driver data */
    if (secDriver) {
        const char *doi, *model;

        doi = virSecurityDriverGetDOI(secDriver);
        model = virSecurityDriverGetModel(secDriver);

        if (!(caps->host.secModel.model = strdup(model)))
            goto no_memory;
        if (!(caps->host.secModel.doi = strdup(doi)))
            goto no_memory;

        VIR_DEBUG("Initialized caps for security driver \"%s\" with "
                  "DOI \"%s\"", model, doi);
    }

    return caps;

no_memory:
    virReportOOMError(NULL);
    virCapabilitiesFree(caps);
    return NULL;
}
975

976 977 978 979 980 981
/**
 * qemudStartup:
 *
 * Initialization function for the QEmu daemon
 */
static int
982
qemudStartup(int privileged) {
983
    char *base = NULL;
D
Daniel P. Berrange 已提交
984
    char driverConf[PATH_MAX];
985
    int rc;
986

987
    if (VIR_ALLOC(qemu_driver) < 0)
988 989
        return -1;

990
    if (virMutexInit(&qemu_driver->lock) < 0) {
991
        VIR_ERROR("%s", _("cannot initialize mutex"));
992 993 994
        VIR_FREE(qemu_driver);
        return -1;
    }
995
    qemuDriverLock(qemu_driver);
996
    qemu_driver->privileged = privileged;
997

998 999 1000
    /* Don't have a dom0 so start from 1 */
    qemu_driver->nextvmid = 1;

1001 1002 1003
    if (virDomainObjListInit(&qemu_driver->domains) < 0)
        goto out_of_memory;

1004
    /* Init callback list */
1005
    if (VIR_ALLOC(qemu_driver->domainEventCallbacks) < 0)
1006
        goto out_of_memory;
1007 1008 1009 1010 1011 1012
    if (!(qemu_driver->domainEventQueue = virDomainEventQueueNew()))
        goto out_of_memory;

    if ((qemu_driver->domainEventTimer =
         virEventAddTimeout(-1, qemuDomainEventFlush, qemu_driver, NULL)) < 0)
        goto error;
1013

1014
    if (privileged) {
1015 1016
        if (virAsprintf(&qemu_driver->logDir,
                        "%s/log/libvirt/qemu", LOCAL_STATE_DIR) == -1)
1017
            goto out_of_memory;
1018

D
Daniel P. Berrange 已提交
1019
        if ((base = strdup (SYSCONF_DIR "/libvirt")) == NULL)
1020
            goto out_of_memory;
1021 1022

        if (virAsprintf(&qemu_driver->stateDir,
1023
                      "%s/run/libvirt/qemu", LOCAL_STATE_DIR) == -1)
1024
            goto out_of_memory;
1025 1026 1027 1028 1029 1030 1031 1032

        if (virAsprintf(&qemu_driver->libDir,
                      "%s/lib/libvirt/qemu", LOCAL_STATE_DIR) == -1)
            goto out_of_memory;

        if (virAsprintf(&qemu_driver->cacheDir,
                      "%s/cache/libvirt/qemu", LOCAL_STATE_DIR) == -1)
            goto out_of_memory;
1033
    } else {
1034
        uid_t uid = geteuid();
1035 1036
        char *userdir = virGetUserDirectory(NULL, uid);
        if (!userdir)
1037
            goto error;
1038

1039
        if (virAsprintf(&qemu_driver->logDir,
1040 1041
                        "%s/.libvirt/qemu/log", userdir) == -1) {
            VIR_FREE(userdir);
1042
            goto out_of_memory;
1043
        }
1044

1045 1046
        if (virAsprintf(&base, "%s/.libvirt", userdir) == -1) {
            VIR_FREE(userdir);
1047
            goto out_of_memory;
1048 1049
        }
        VIR_FREE(userdir);
1050 1051 1052

        if (virAsprintf(&qemu_driver->stateDir, "%s/qemu/run", base) == -1)
            goto out_of_memory;
1053 1054 1055 1056
        if (virAsprintf(&qemu_driver->libDir, "%s/qemu/lib", base) == -1)
            goto out_of_memory;
        if (virAsprintf(&qemu_driver->cacheDir, "%s/qemu/cache", base) == -1)
            goto out_of_memory;
1057 1058
    }

L
Laine Stump 已提交
1059
    if (virFileMakePath(qemu_driver->stateDir) != 0) {
1060
        char ebuf[1024];
1061
        VIR_ERROR(_("Failed to create state dir '%s': %s"),
1062
                  qemu_driver->stateDir, virStrerror(errno, ebuf, sizeof ebuf));
1063
        goto error;
1064
    }
L
Laine Stump 已提交
1065
    if (virFileMakePath(qemu_driver->libDir) != 0) {
1066
        char ebuf[1024];
1067
        VIR_ERROR(_("Failed to create lib dir '%s': %s"),
1068 1069 1070
                  qemu_driver->libDir, virStrerror(errno, ebuf, sizeof ebuf));
        goto error;
    }
L
Laine Stump 已提交
1071
    if (virFileMakePath(qemu_driver->cacheDir) != 0) {
1072
        char ebuf[1024];
1073
        VIR_ERROR(_("Failed to create cache dir '%s': %s"),
1074 1075 1076
                  qemu_driver->cacheDir, virStrerror(errno, ebuf, sizeof ebuf));
        goto error;
    }
1077 1078 1079 1080

    /* Configuration paths are either ~/.libvirt/qemu/... (session) or
     * /etc/libvirt/qemu/... (system).
     */
D
Daniel P. Berrange 已提交
1081
    if (snprintf (driverConf, sizeof(driverConf), "%s/qemu.conf", base) == -1)
1082
        goto out_of_memory;
D
Daniel P. Berrange 已提交
1083
    driverConf[sizeof(driverConf)-1] = '\0';
1084

1085
    if (virAsprintf(&qemu_driver->configDir, "%s/qemu", base) == -1)
1086 1087
        goto out_of_memory;

1088
    if (virAsprintf(&qemu_driver->autostartDir, "%s/qemu/autostart", base) == -1)
1089 1090
        goto out_of_memory;

1091
    VIR_FREE(base);
1092

1093 1094 1095 1096 1097 1098 1099
    rc = virCgroupForDriver("qemu", &qemu_driver->cgroup, privileged, 1);
    if (rc < 0) {
        char buf[1024];
        VIR_WARN("Unable to create cgroup for driver: %s",
                 virStrerror(-rc, buf, sizeof(buf)));
    }

1100 1101
    if (qemudSecurityInit(qemu_driver) < 0)
        goto error;
D
Daniel P. Berrange 已提交
1102

1103 1104 1105
    if ((qemu_driver->caps = qemuCreateCapabilities(NULL,
                                                    qemu_driver->securityDriver)) == NULL)
        goto error;
1106

1107 1108 1109
    if ((qemu_driver->activePciHostdevs = pciDeviceListNew(NULL)) == NULL)
        goto error;

1110
    if (qemudLoadDriverConfig(qemu_driver, driverConf) < 0) {
1111 1112 1113
        goto error;
    }

1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128
    if (privileged) {
        if (chown(qemu_driver->libDir, qemu_driver->user, qemu_driver->group) < 0) {
            virReportSystemError(NULL, errno,
                                 _("unable to set ownership of '%s' to user %d:%d"),
                                 qemu_driver->libDir, qemu_driver->user, qemu_driver->group);
            goto error;
        }
        if (chown(qemu_driver->cacheDir, qemu_driver->user, qemu_driver->group) < 0) {
            virReportSystemError(NULL, errno,
                                 _("unable to set ownership of '%s' to %d:%d"),
                                 qemu_driver->cacheDir, qemu_driver->user, qemu_driver->group);
            goto error;
        }
    }

1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159
    /* If hugetlbfs is present, then we need to create a sub-directory within
     * it, since we can't assume the root mount point has permissions that
     * will let our spawned QEMU instances use it.
     *
     * NB the check for '/', since user may config "" to disable hugepages
     * even when mounted
     */
    if (qemu_driver->hugetlbfs_mount &&
        qemu_driver->hugetlbfs_mount[0] == '/') {
        char *mempath = NULL;
        if (virAsprintf(&mempath, "%s/libvirt/qemu", qemu_driver->hugetlbfs_mount) < 0)
            goto out_of_memory;

        if ((rc = virFileMakePath(mempath)) != 0) {
            virReportSystemError(NULL, rc,
                                 _("unable to create hugepage path %s"), mempath);
            VIR_FREE(mempath);
            goto error;
        }
        if (qemu_driver->privileged &&
            chown(mempath, qemu_driver->user, qemu_driver->group) < 0) {
            virReportSystemError(NULL, errno,
                                 _("unable to set ownership on %s to %d:%d"),
                                 mempath, qemu_driver->user, qemu_driver->group);
            VIR_FREE(mempath);
            goto error;
        }

        qemu_driver->hugepage_path = mempath;
    }

1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171
    /* Get all the running persistent or transient configs first */
    if (virDomainLoadAllConfigs(NULL,
                                qemu_driver->caps,
                                &qemu_driver->domains,
                                qemu_driver->stateDir,
                                NULL,
                                1, NULL, NULL) < 0)
        goto error;

    qemuReconnectDomains(qemu_driver);

    /* Then inactive persistent configs */
1172 1173 1174 1175
    if (virDomainLoadAllConfigs(NULL,
                                qemu_driver->caps,
                                &qemu_driver->domains,
                                qemu_driver->configDir,
1176
                                qemu_driver->autostartDir,
1177
                                0, NULL, NULL) < 0)
1178
        goto error;
1179 1180
    qemuDriverUnlock(qemu_driver);

1181 1182
    qemudAutostartConfigs(qemu_driver);

1183

1184 1185
    return 0;

1186
out_of_memory:
1187
    virReportOOMError(NULL);
1188 1189 1190
error:
    if (qemu_driver)
        qemuDriverUnlock(qemu_driver);
1191
    VIR_FREE(base);
1192
    qemudShutdown();
1193 1194 1195
    return -1;
}

1196 1197 1198 1199
static void qemudNotifyLoadDomain(virDomainObjPtr vm, int newVM, void *opaque)
{
    struct qemud_driver *driver = opaque;

1200 1201 1202 1203 1204 1205 1206 1207
    if (newVM) {
        virDomainEventPtr event =
            virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_DEFINED,
                                     VIR_DOMAIN_EVENT_DEFINED_ADDED);
        if (event)
            qemuDomainEventQueue(driver, event);
    }
1208 1209
}

1210 1211 1212 1213 1214 1215 1216 1217
/**
 * qemudReload:
 *
 * Function to restart the QEmu daemon, it will recheck the configuration
 * files and update its state and the networking
 */
static int
qemudReload(void) {
1218 1219 1220
    if (!qemu_driver)
        return 0;

1221
    qemuDriverLock(qemu_driver);
1222 1223 1224 1225
    virDomainLoadAllConfigs(NULL,
                            qemu_driver->caps,
                            &qemu_driver->domains,
                            qemu_driver->configDir,
1226
                            qemu_driver->autostartDir,
1227
                            0, qemudNotifyLoadDomain, qemu_driver);
1228
    qemuDriverUnlock(qemu_driver);
1229

1230
    qemudAutostartConfigs(qemu_driver);
1231 1232

    return 0;
1233 1234
}

1235 1236 1237 1238 1239 1240 1241 1242 1243 1244
/**
 * qemudActive:
 *
 * Checks if the QEmu daemon is active, i.e. has an active domain or
 * an active network
 *
 * Returns 1 if active, 0 otherwise
 */
static int
qemudActive(void) {
1245
    int active = 0;
1246

1247 1248 1249
    if (!qemu_driver)
        return 0;

1250
    /* XXX having to iterate here is not great because it requires many locks */
1251
    qemuDriverLock(qemu_driver);
1252
    active = virDomainObjListNumOfDomains(&qemu_driver->domains, 1);
1253 1254
    qemuDriverUnlock(qemu_driver);
    return active;
1255 1256
}

1257 1258 1259 1260 1261 1262 1263
/**
 * qemudShutdown:
 *
 * Shutdown the QEmu daemon, it will stop all active domains and networks
 */
static int
qemudShutdown(void) {
1264
    int i;
1265

1266
    if (!qemu_driver)
1267
        return -1;
1268

1269
    qemuDriverLock(qemu_driver);
1270
    pciDeviceListFree(NULL, qemu_driver->activePciHostdevs);
1271 1272
    virCapabilitiesFree(qemu_driver->caps);

1273
    virDomainObjListDeinit(&qemu_driver->domains);
1274

1275
    VIR_FREE(qemu_driver->securityDriverName);
1276
    VIR_FREE(qemu_driver->logDir);
1277 1278
    VIR_FREE(qemu_driver->configDir);
    VIR_FREE(qemu_driver->autostartDir);
1279
    VIR_FREE(qemu_driver->stateDir);
1280 1281
    VIR_FREE(qemu_driver->libDir);
    VIR_FREE(qemu_driver->cacheDir);
1282
    VIR_FREE(qemu_driver->vncTLSx509certdir);
J
Jim Meyering 已提交
1283
    VIR_FREE(qemu_driver->vncListen);
1284
    VIR_FREE(qemu_driver->vncPassword);
1285
    VIR_FREE(qemu_driver->vncSASLdir);
1286
    VIR_FREE(qemu_driver->saveImageFormat);
1287 1288
    VIR_FREE(qemu_driver->hugetlbfs_mount);
    VIR_FREE(qemu_driver->hugepage_path);
D
Daniel P. Berrange 已提交
1289

1290 1291 1292 1293 1294 1295
    if (qemu_driver->cgroupDeviceACL) {
        for (i = 0 ; qemu_driver->cgroupDeviceACL[i] != NULL ; i++)
            VIR_FREE(qemu_driver->cgroupDeviceACL[i]);
        VIR_FREE(qemu_driver->cgroupDeviceACL);
    }

1296 1297
    /* Free domain callback list */
    virDomainEventCallbackListFree(qemu_driver->domainEventCallbacks);
1298 1299 1300 1301
    virDomainEventQueueFree(qemu_driver->domainEventQueue);

    if (qemu_driver->domainEventTimer != -1)
        virEventRemoveTimeout(qemu_driver->domainEventTimer);
1302

1303 1304 1305
    if (qemu_driver->brctl)
        brShutdown(qemu_driver->brctl);

1306 1307
    virCgroupFree(&qemu_driver->cgroup);

1308
    qemuDriverUnlock(qemu_driver);
1309
    virMutexDestroy(&qemu_driver->lock);
1310
    VIR_FREE(qemu_driver);
1311 1312

    return 0;
1313 1314
}

1315 1316 1317 1318
typedef int qemuLogHandleOutput(virConnectPtr conn,
                                virDomainObjPtr vm,
                                const char *output,
                                int fd);
1319 1320 1321 1322 1323 1324 1325 1326 1327

/*
 * Returns -1 for error, 0 on success
 */
static int
qemudReadLogOutput(virConnectPtr conn,
                   virDomainObjPtr vm,
                   int fd,
                   char *buf,
G
Guido Günther 已提交
1328
                   size_t buflen,
1329
                   qemuLogHandleOutput func,
1330 1331 1332
                   const char *what,
                   int timeout)
{
1333
    int retries = (timeout*10);
1334
    int got = 0;
1335 1336 1337
    buf[0] = '\0';

    while (retries) {
1338
        ssize_t func_ret, ret;
1339
        int isdead = 0;
G
Guido Günther 已提交
1340

1341 1342
        func_ret = func(conn, vm, buf, fd);

1343 1344
        if (kill(vm->pid, 0) == -1 && errno == ESRCH)
            isdead = 1;
1345

1346 1347
        /* Any failures should be detected before we read the log, so we
         * always have something useful to report on failure. */
1348 1349
        ret = saferead(fd, buf+got, buflen-got-1);
        if (ret < 0) {
1350 1351 1352 1353 1354 1355
            virReportSystemError(conn, errno,
                                 _("Failure while reading %s log output"),
                                 what);
            return -1;
        }

1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371
        got += ret;
        buf[got] = '\0';
        if (got == buflen-1) {
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("Out of space while reading %s log output"),
                             what);
            return -1;
        }

        if (isdead) {
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("Process exited while reading %s log output"),
                             what);
            return -1;
        }

1372 1373
        if (func_ret <= 0)
            return func_ret;
1374 1375 1376 1377

        usleep(100*1000);
        retries--;
    }
1378 1379 1380

    qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                     _("Timed out while reading %s log output"), what);
1381 1382 1383
    return -1;
}

1384

1385 1386 1387 1388 1389 1390 1391 1392
/*
 * Look at a chunk of data from the QEMU stdout logs and try to
 * find a TTY device, as indicated by a line like
 *
 * char device redirected to /dev/pts/3
 *
 * Returns -1 for error, 0 success, 1 continue reading
 */
1393
static int
1394 1395 1396 1397
qemudExtractTTYPath(virConnectPtr conn,
                    const char *haystack,
                    size_t *offset,
                    char **path)
1398
{
1399
    static const char needle[] = "char device redirected to";
1400
    char *tmp, *dev;
1401

1402
    VIR_FREE(*path);
1403
    /* First look for our magic string */
1404 1405 1406 1407 1408
    if (!(tmp = strstr(haystack + *offset, needle))) {
        return 1;
    }
    tmp += sizeof(needle);
    dev = tmp;
1409

1410 1411 1412 1413 1414
    /*
     * And look for first whitespace character and nul terminate
     * to mark end of the pty path
     */
    while (*tmp) {
1415
        if (c_isspace(*tmp)) {
1416 1417
            *path = strndup(dev, tmp-dev);
            if (*path == NULL) {
1418
                virReportOOMError(conn);
1419 1420
                return -1;
            }
1421

1422
            /* ... now further update offset till we get EOL */
1423
            *offset = tmp - haystack;
1424 1425
            return 0;
        }
1426
        tmp++;
1427 1428 1429 1430 1431
    }

    /*
     * We found a path, but didn't find any whitespace,
     * so it must be still incomplete - we should at
1432 1433
     * least see a \n - indicate that we want to carry
     * on trying again
1434
     */
1435
    return 1;
1436 1437
}

1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455
static int
qemudFindCharDevicePTYsMonitor(virConnectPtr conn,
                               virDomainObjPtr vm,
                               virHashTablePtr paths)
{
    int i;

#define LOOKUP_PTYS(array, arraylen, idprefix)                            \
    for (i = 0 ; i < (arraylen) ; i++) {                                  \
        virDomainChrDefPtr chr = (array)[i];                              \
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {                       \
            char id[16];                                                  \
                                                                          \
            if (snprintf(id, sizeof(id), idprefix "%i", i) >= sizeof(id)) \
                return -1;                                                \
                                                                          \
            const char *path = (const char *) virHashLookup(paths, id);   \
            if (path == NULL) {                                           \
1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466
                if (chr->data.file.path == NULL) {                        \
                    /* neither the log output nor 'info chardev' had a */ \
                    /* pty path for this chardev, report an error */      \
                    qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, \
                                     _("no assigned pty for device %s"), id);  \
                    return -1;                                                 \
                } else {                                                  \
                    /* 'info chardev' had no pty path for this chardev, */\
                    /* but the log output had, so we're fine */           \
                    continue;                                             \
                }                                                         \
1467 1468
            }                                                             \
                                                                          \
1469
            VIR_FREE(chr->data.file.path);                                \
1470
            chr->data.file.path = strdup(path);                           \
1471 1472 1473 1474 1475
                                                                          \
            if (chr->data.file.path == NULL) {                            \
                virReportOOMError(conn);                                  \
                return -1;                                                \
            }                                                             \
1476 1477 1478 1479 1480 1481
        }                                                                 \
    }

    LOOKUP_PTYS(vm->def->serials,   vm->def->nserials,   "serial");
    LOOKUP_PTYS(vm->def->parallels, vm->def->nparallels, "parallel");
    LOOKUP_PTYS(vm->def->channels,  vm->def->nchannels,  "channel");
1482
#undef LOOKUP_PTYS
1483 1484 1485 1486

    return 0;
}

1487
static int
1488
qemudFindCharDevicePTYs(virConnectPtr conn,
1489
                        virDomainObjPtr vm,
1490 1491
                        const char *output,
                        int fd ATTRIBUTE_UNUSED)
1492
{
1493
    size_t offset = 0;
1494
    int ret, i;
1495 1496

    /* The order in which QEMU prints out the PTY paths is
1497 1498
       the order in which it procsses its serial and parallel
       device args. This code must match that ordering.... */
1499

1500
    /* first comes the serial devices */
1501 1502
    for (i = 0 ; i < vm->def->nserials ; i++) {
        virDomainChrDefPtr chr = vm->def->serials[i];
1503
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {
1504 1505
            if ((ret = qemudExtractTTYPath(conn, output, &offset,
                                           &chr->data.file.path)) != 0)
1506
                return ret;
1507 1508 1509
        }
    }

1510
    /* then the parallel devices */
1511 1512
    for (i = 0 ; i < vm->def->nparallels ; i++) {
        virDomainChrDefPtr chr = vm->def->parallels[i];
1513
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {
1514 1515
            if ((ret = qemudExtractTTYPath(conn, output, &offset,
                                           &chr->data.file.path)) != 0)
1516
                return ret;
1517 1518 1519
        }
    }

1520 1521 1522 1523 1524 1525 1526 1527 1528 1529
    /* then the channel devices */
    for (i = 0 ; i < vm->def->nchannels ; i++) {
        virDomainChrDefPtr chr = vm->def->channels[i];
        if (chr->type == VIR_DOMAIN_CHR_TYPE_PTY) {
            if ((ret = qemudExtractTTYPath(conn, output, &offset,
                                           &chr->data.file.path)) != 0)
                return ret;
        }
    }

1530
    return 0;
1531 1532
}

1533 1534 1535 1536 1537
static void qemudFreePtyPath(void *payload, const char *name ATTRIBUTE_UNUSED)
{
    VIR_FREE(payload);
}

1538 1539 1540 1541
static int
qemudWaitForMonitor(virConnectPtr conn,
                    struct qemud_driver* driver,
                    virDomainObjPtr vm, off_t pos)
1542
{
1543
    char buf[4096]; /* Plenty of space to get startup greeting */
1544
    int logfd;
1545
    int ret = -1;
1546 1547 1548

    if ((logfd = qemudLogReadFD(conn, driver->logDir, vm->def->name, pos))
        < 0)
1549
        return -1;
1550

1551 1552 1553
    ret = qemudReadLogOutput(conn, vm, logfd, buf, sizeof(buf),
                             qemudFindCharDevicePTYs,
                             "console", 3);
1554
    if (close(logfd) < 0) {
1555
        char ebuf[4096];
1556
        VIR_WARN(_("Unable to close logfile: %s"),
1557 1558
                 virStrerror(errno, ebuf, sizeof ebuf));
    }
1559

1560 1561 1562 1563 1564 1565
    if (ret < 0) {
        /* Unexpected end of file - inform user of QEMU log data */
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unable to start guest: %s"), buf);
        return -1;
    }
1566

1567 1568
    VIR_DEBUG("Connect monitor to %p '%s'", vm, vm->def->name);
    if (qemuConnectMonitor(vm) < 0)
1569 1570
        return -1;

1571 1572 1573 1574 1575 1576 1577 1578 1579 1580
    /* Try to get the pty path mappings again via the monitor. This is much more
     * reliable if it's available.
     * Note that the monitor itself can be on a pty, so we still need to try the
     * log output method. */
    virHashTablePtr paths = virHashCreate(0);
    if (paths == NULL) {
        virReportOOMError(NULL);
        goto cleanup;
    }

1581
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
1582 1583
    qemuDomainObjPrivatePtr priv = vm->privateData;
    ret = qemuMonitorGetPtyPaths(priv->mon, paths);
1584
    qemuDomainObjExitMonitorWithDriver(driver, vm);
1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596

    VIR_DEBUG("qemuMonitorGetPtyPaths returned %i", ret);
    if (ret == 0) {
        ret = qemudFindCharDevicePTYsMonitor(conn, vm, paths);
    }

cleanup:
    if (paths) {
        virHashFree(paths, qemudFreePtyPath);
    }

    return ret;
1597 1598
}

1599
static int
1600
qemuDetectVcpuPIDs(virConnectPtr conn,
1601
                   struct qemud_driver *driver,
1602 1603 1604
                   virDomainObjPtr vm) {
    pid_t *cpupids = NULL;
    int ncpupids;
1605
    qemuDomainObjPrivatePtr priv = vm->privateData;
1606

1607
    if (vm->def->virtType != VIR_DOMAIN_VIRT_KVM) {
1608 1609
        priv->nvcpupids = 1;
        if (VIR_ALLOC_N(priv->vcpupids, priv->nvcpupids) < 0) {
1610 1611 1612
            virReportOOMError(conn);
            return -1;
        }
1613
        priv->vcpupids[0] = vm->pid;
1614 1615 1616
        return 0;
    }

1617
    /* What follows is now all KVM specific */
1618

1619
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
1620
    if ((ncpupids = qemuMonitorGetCPUInfo(priv->mon, &cpupids)) < 0) {
1621
        qemuDomainObjExitMonitorWithDriver(driver, vm);
1622
        return -1;
1623
    }
1624
    qemuDomainObjExitMonitorWithDriver(driver, vm);
1625

1626 1627 1628
    /* Treat failure to get VCPU<->PID mapping as non-fatal */
    if (ncpupids == 0)
        return 0;
1629

1630 1631 1632 1633 1634 1635 1636
    if (ncpupids != vm->def->vcpus) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("got wrong number of vCPU pids from QEMU monitor. got %d, wanted %d"),
                         ncpupids, (int)vm->def->vcpus);
        VIR_FREE(cpupids);
        return -1;
    }
1637

1638 1639
    priv->nvcpupids = ncpupids;
    priv->vcpupids = cpupids;
1640 1641 1642
    return 0;
}

1643
static int
1644 1645
qemudInitCpuAffinity(virConnectPtr conn,
                     virDomainObjPtr vm) {
1646
    int i, hostcpus, maxcpu = QEMUD_CPUMASK_LEN;
1647
    virNodeInfo nodeinfo;
1648 1649
    unsigned char *cpumap;
    int cpumaplen;
1650
    qemuDomainObjPrivatePtr priv = vm->privateData;
1651

1652
    if (nodeGetInfo(conn, &nodeinfo) < 0)
1653 1654 1655 1656
        return -1;

    /* setaffinity fails if you set bits for CPUs which
     * aren't present, so we have to limit ourselves */
1657 1658 1659
    hostcpus = VIR_NODEINFO_MAXCPUS(nodeinfo);
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;
1660

1661 1662 1663 1664 1665 1666
    cpumaplen = VIR_CPU_MAPLEN(maxcpu);
    if (VIR_ALLOC_N(cpumap, cpumaplen) < 0) {
        virReportOOMError(conn);
        return -1;
    }

D
Daniel P. Berrange 已提交
1667
    if (vm->def->cpumask) {
1668 1669 1670
        /* XXX why don't we keep 'cpumask' in the libvirt cpumap
         * format to start with ?!?! */
        for (i = 0 ; i < maxcpu && i < vm->def->cpumasklen ; i++)
D
Daniel P. Berrange 已提交
1671
            if (vm->def->cpumask[i])
1672
                VIR_USE_CPU(cpumap, i);
D
Daniel P. Berrange 已提交
1673
    } else {
1674 1675 1676 1677
        /* You may think this is redundant, but we can't assume libvirtd
         * itself is running on all pCPUs, so we need to explicitly set
         * the spawned QEMU instance to all pCPUs if no map is given in
         * its config file */
D
Daniel P. Berrange 已提交
1678
        for (i = 0 ; i < maxcpu ; i++)
1679
            VIR_USE_CPU(cpumap, i);
D
Daniel P. Berrange 已提交
1680
    }
1681

1682 1683
    /* The XML config only gives a per-VM affinity, so we apply
     * the same mapping to all vCPUs */
1684 1685
    for (i = 0 ; i < priv->nvcpupids ; i++) {
        if (virProcessInfoSetAffinity(priv->vcpupids[i],
1686 1687
                                      cpumap, cpumaplen, maxcpu) < 0) {
            VIR_FREE(cpumap);
1688 1689 1690
            return -1;
        }
    }
1691
    VIR_FREE(cpumap);
1692 1693 1694 1695 1696

    return 0;
}


1697
static int
1698 1699
qemuInitPasswords(struct qemud_driver *driver,
                  virDomainObjPtr vm) {
1700
    int ret = 0;
1701
    qemuDomainObjPrivatePtr priv = vm->privateData;
1702

1703 1704 1705
    if ((vm->def->ngraphics == 1) &&
        vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
        (vm->def->graphics[0]->data.vnc.passwd || driver->vncPassword)) {
1706

1707
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
1708
        ret = qemuMonitorSetVNCPassword(priv->mon,
1709 1710 1711
                                        vm->def->graphics[0]->data.vnc.passwd ?
                                        vm->def->graphics[0]->data.vnc.passwd :
                                        driver->vncPassword);
1712
        qemuDomainObjExitMonitorWithDriver(driver, vm);
1713 1714
    }

1715
    return ret;
1716 1717 1718
}


1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076
#define QEMU_PCI_VENDOR_INTEL     0x8086
#define QEMU_PCI_VENDOR_LSI_LOGIC 0x1000
#define QEMU_PCI_VENDOR_REDHAT    0x1af4
#define QEMU_PCI_VENDOR_CIRRUS    0x1013
#define QEMU_PCI_VENDOR_REALTEK   0x10ec
#define QEMU_PCI_VENDOR_AMD       0x1022
#define QEMU_PCI_VENDOR_ENSONIQ   0x1274
#define QEMU_PCI_VENDOR_VMWARE    0x15ad
#define QEMU_PCI_VENDOR_QEMU      0x1234

#define QEMU_PCI_PRODUCT_DISK_VIRTIO 0x1001

#define QEMU_PCI_PRODUCT_NIC_NE2K     0x8029
#define QEMU_PCI_PRODUCT_NIC_PCNET    0x2000
#define QEMU_PCI_PRODUCT_NIC_RTL8139  0x8139
#define QEMU_PCI_PRODUCT_NIC_E1000    0x100E
#define QEMU_PCI_PRODUCT_NIC_VIRTIO   0x1000

#define QEMU_PCI_PRODUCT_VGA_CIRRUS 0x00b8
#define QEMU_PCI_PRODUCT_VGA_VMWARE 0x0405
#define QEMU_PCI_PRODUCT_VGA_STDVGA 0x1111

#define QEMU_PCI_PRODUCT_AUDIO_AC97    0x2415
#define QEMU_PCI_PRODUCT_AUDIO_ES1370  0x5000

#define QEMU_PCI_PRODUCT_CONTROLLER_PIIX 0x7010
#define QEMU_PCI_PRODUCT_CONTROLLER_LSI  0x0012

#define QEMU_PCI_PRODUCT_WATCHDOG_I63000ESB 0x25ab

static int
qemuAssignNextPCIAddress(virDomainDeviceInfo *info,
                         int vendor,
                         int product,
                         qemuMonitorPCIAddress *addrs,
                         int naddrs)
{
    int found = 0;
    int i;

    VIR_DEBUG("Look for %x:%x out of %d", vendor, product, naddrs);

    for (i = 0 ; (i < naddrs) && !found; i++) {
        VIR_DEBUG("Maybe %x:%x", addrs[i].vendor, addrs[i].product);
        if (addrs[i].vendor == vendor &&
            addrs[i].product == product) {
            VIR_DEBUG("Match %d", i);
            found = 1;
            break;
        }
    }
    if (!found) {
        return -1;
    }

    /* Blank it out so this device isn't matched again */
    addrs[i].vendor = 0;
    addrs[i].product = 0;

    if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE)
        info->type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;

    if (info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
        info->addr.pci.domain = addrs[i].addr.domain;
        info->addr.pci.bus = addrs[i].addr.bus;
        info->addr.pci.slot = addrs[i].addr.slot;
        info->addr.pci.function = addrs[i].addr.function;
    }

    return 0;
}

static int
qemuGetPCIDiskVendorProduct(virDomainDiskDefPtr def,
                            unsigned *vendor,
                            unsigned *product)
{
    switch (def->bus) {
    case VIR_DOMAIN_DISK_BUS_VIRTIO:
        *vendor = QEMU_PCI_VENDOR_REDHAT;
        *product = QEMU_PCI_PRODUCT_DISK_VIRTIO;
        break;

    default:
        return -1;
    }

    return 0;
}

static int
qemuGetPCINetVendorProduct(virDomainNetDefPtr def,
                            unsigned *vendor,
                            unsigned *product)
{
    if (!def->model)
        return -1;

    if (STREQ(def->model, "ne2k_pci")) {
        *vendor = QEMU_PCI_VENDOR_REALTEK;
        *product = QEMU_PCI_PRODUCT_NIC_NE2K;
    } else if (STREQ(def->model, "pcnet")) {
        *vendor = QEMU_PCI_VENDOR_AMD;
        *product = QEMU_PCI_PRODUCT_NIC_PCNET;
    } else if (STREQ(def->model, "rtl8139")) {
        *vendor = QEMU_PCI_VENDOR_REALTEK;
        *product = QEMU_PCI_PRODUCT_NIC_RTL8139;
    } else if (STREQ(def->model, "e1000")) {
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_NIC_E1000;
    } else if (STREQ(def->model, "virtio")) {
        *vendor = QEMU_PCI_VENDOR_REDHAT;
        *product = QEMU_PCI_PRODUCT_NIC_VIRTIO;
    } else {
        VIR_INFO("Unexpected NIC model %s, cannot get PCI address",
                 def->model);
        return -1;
    }
    return 0;
}

static int
qemuGetPCIControllerVendorProduct(virDomainControllerDefPtr def,
                                  unsigned *vendor,
                                  unsigned *product)
{
    switch (def->type) {
    case VIR_DOMAIN_CONTROLLER_TYPE_SCSI:
        *vendor = QEMU_PCI_VENDOR_LSI_LOGIC;
        *product = QEMU_PCI_PRODUCT_CONTROLLER_LSI;
        break;

    case VIR_DOMAIN_CONTROLLER_TYPE_FDC:
        /* XXX we could put in the ISA bridge address, but
           that's not technically the FDC's address */
        return -1;

    case VIR_DOMAIN_CONTROLLER_TYPE_IDE:
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_CONTROLLER_PIIX;
        break;

    default:
        VIR_INFO("Unexpected controller type %s, cannot get PCI address",
                 virDomainControllerTypeToString(def->type));
        return -1;
    }

    return 0;
}

static int
qemuGetPCIVideoVendorProduct(virDomainVideoDefPtr def,
                             unsigned *vendor,
                             unsigned *product)
{
    switch (def->type) {
    case VIR_DOMAIN_VIDEO_TYPE_CIRRUS:
        *vendor = QEMU_PCI_VENDOR_CIRRUS;
        *product = QEMU_PCI_PRODUCT_VGA_CIRRUS;
        break;

    case VIR_DOMAIN_VIDEO_TYPE_VGA:
        *vendor = QEMU_PCI_VENDOR_QEMU;
        *product = QEMU_PCI_PRODUCT_VGA_STDVGA;
        break;

    case VIR_DOMAIN_VIDEO_TYPE_VMVGA:
        *vendor = QEMU_PCI_VENDOR_VMWARE;
        *product = QEMU_PCI_PRODUCT_VGA_VMWARE;
        break;

    default:
        return -1;
    }
    return 0;
}

static int
qemuGetPCISoundVendorProduct(virDomainSoundDefPtr def,
                             unsigned *vendor,
                             unsigned *product)
{
    switch (def->model) {
    case VIR_DOMAIN_SOUND_MODEL_ES1370:
        *vendor = QEMU_PCI_VENDOR_ENSONIQ;
        *product = QEMU_PCI_PRODUCT_AUDIO_ES1370;
        break;

    case VIR_DOMAIN_SOUND_MODEL_AC97:
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_AUDIO_AC97;
        break;

    default:
        return -1;
    }

    return 0;
}

static int
qemuGetPCIWatchdogVendorProduct(virDomainWatchdogDefPtr def,
                                unsigned *vendor,
                                unsigned *product)
{
    switch (def->model) {
    case VIR_DOMAIN_WATCHDOG_MODEL_I6300ESB:
        *vendor = QEMU_PCI_VENDOR_INTEL;
        *product = QEMU_PCI_PRODUCT_WATCHDOG_I63000ESB;
        break;

    default:
        return -1;
    }

    return 0;
}


/*
 * This entire method assumes that PCI devices in 'info pci'
 * match ordering of devices specified on the command line
 * wrt to devices of matching vendor+product
 *
 * XXXX this might not be a valid assumption if we assign
 * some static addrs on CLI. Have to check that...
 */
static int
qemuAssignPCIAddresses(virDomainObjPtr vm,
                       qemuMonitorPCIAddress *addrs,
                       int naddrs)
{
    unsigned int vendor = 0, product = 0;
    int i;

    /* XXX should all these vendor/product IDs be kept in the
     * actual device data structure instead ?
     */

    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (qemuGetPCIDiskVendorProduct(vm->def->disks[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->disks[i]->info),
                                     vendor, product,
                                     addrs, naddrs) < 0) {
            qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("cannot find PCI address for VirtIO disk %s"),
                             vm->def->disks[i]->dst);
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->nnets ; i++) {
        if (qemuGetPCINetVendorProduct(vm->def->nets[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->nets[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
            qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("cannot find PCI address for %s NIC"),
                             vm->def->nets[i]->model);
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
        if (qemuGetPCIControllerVendorProduct(vm->def->controllers[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->controllers[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
            qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("cannot find PCI address for controller %s"),
                             virDomainControllerTypeToString(vm->def->controllers[i]->type));
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->nvideos ; i++) {
        if (qemuGetPCIVideoVendorProduct(vm->def->videos[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->videos[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
            qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("cannot find PCI address for video adapter %s"),
                             virDomainVideoTypeToString(vm->def->videos[i]->type));
            return -1;
        }
    }

    for (i = 0 ; i < vm->def->nsounds ; i++) {
        if (qemuGetPCISoundVendorProduct(vm->def->sounds[i], &vendor, &product) < 0)
            continue;

        if (qemuAssignNextPCIAddress(&(vm->def->sounds[i]->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
            qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("cannot find PCI address for sound adapter %s"),
                             virDomainSoundModelTypeToString(vm->def->sounds[i]->model));
            return -1;
        }
    }


    if (vm->def->watchdog &&
        qemuGetPCIWatchdogVendorProduct(vm->def->watchdog, &vendor, &product) == 0) {
        if (qemuAssignNextPCIAddress(&(vm->def->watchdog->info),
                                     vendor, product,
                                     addrs,  naddrs) < 0) {
            qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("cannot find PCI address for watchdog %s"),
                             virDomainWatchdogModelTypeToString(vm->def->watchdog->model));
            return -1;
        }
    }

    /* XXX console (virtio) */


    /* ... and now things we don't have in our xml */

    /* XXX USB controller ? */

    /* XXXX virtio balloon ? */

    /* XXX what about other PCI devices (ie bridges) */

    return 0;
}

static int
qemuInitPCIAddresses(struct qemud_driver *driver,
                     virDomainObjPtr vm)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    int naddrs;
    int ret;
    qemuMonitorPCIAddress *addrs = NULL;

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    naddrs = qemuMonitorGetAllPCIAddresses(priv->mon,
                                           &addrs);
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    ret = qemuAssignPCIAddresses(vm, addrs, naddrs);

    VIR_FREE(addrs);

    return ret;
}

2077
static int qemudNextFreeVNCPort(struct qemud_driver *driver ATTRIBUTE_UNUSED) {
2078 2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112
    int i;

    for (i = 5900 ; i < 6000 ; i++) {
        int fd;
        int reuse = 1;
        struct sockaddr_in addr;
        addr.sin_family = AF_INET;
        addr.sin_port = htons(i);
        addr.sin_addr.s_addr = htonl(INADDR_ANY);
        fd = socket(PF_INET, SOCK_STREAM, 0);
        if (fd < 0)
            return -1;

        if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, (void*)&reuse, sizeof(reuse)) < 0) {
            close(fd);
            break;
        }

        if (bind(fd, (struct sockaddr*)&addr, sizeof(addr)) == 0) {
            /* Not in use, lets grab it */
            close(fd);
            return i;
        }
        close(fd);

        if (errno == EADDRINUSE) {
            /* In use, try next */
            continue;
        }
        /* Some other bad failure, get out.. */
        break;
    }
    return -1;
}

2113 2114 2115 2116 2117
static pciDeviceList *
qemuGetPciHostDeviceList(virConnectPtr conn,
                         virDomainDefPtr def)
{
    pciDeviceList *list;
2118 2119
    int i;

2120 2121
    if (!(list = pciDeviceListNew(conn)))
        return NULL;
2122 2123 2124 2125 2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136

    for (i = 0 ; i < def->nhostdevs ; i++) {
        virDomainHostdevDefPtr hostdev = def->hostdevs[i];
        pciDevice *dev;

        if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
            continue;
        if (hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI)
            continue;

        dev = pciGetDevice(conn,
                           hostdev->source.subsys.u.pci.domain,
                           hostdev->source.subsys.u.pci.bus,
                           hostdev->source.subsys.u.pci.slot,
                           hostdev->source.subsys.u.pci.function);
2137 2138 2139 2140
        if (!dev) {
            pciDeviceListFree(conn, list);
            return NULL;
        }
2141

2142
        if (pciDeviceListAdd(conn, list, dev) < 0) {
2143
            pciFreeDevice(conn, dev);
2144 2145
            pciDeviceListFree(conn, list);
            return NULL;
2146 2147
        }

2148
        pciDeviceSetManaged(dev, hostdev->managed);
2149 2150
    }

2151 2152 2153 2154
    return list;
}

static int
2155 2156 2157 2158
qemuUpdateActivePciHostdevs(struct qemud_driver *driver,
                            virDomainDefPtr def)
{
    pciDeviceList *pcidevs;
2159
    int i;
2160
    int ret = -1;
2161 2162 2163 2164 2165 2166 2167

    if (!def->nhostdevs)
        return 0;

    if (!(pcidevs = qemuGetPciHostDeviceList(NULL, def)))
        return -1;

2168 2169 2170
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
        pciDeviceListSteal(NULL, pcidevs, dev);
2171 2172
        if (pciDeviceListAdd(NULL,
                             driver->activePciHostdevs,
2173 2174 2175
                             dev) < 0) {
            pciFreeDevice(NULL, dev);
            goto cleanup;
2176 2177 2178
        }
    }

2179 2180 2181
    ret = 0;

cleanup:
2182 2183 2184 2185 2186 2187 2188 2189
    pciDeviceListFree(NULL, pcidevs);
    return ret;
}

static int
qemuPrepareHostDevices(virConnectPtr conn,
                       struct qemud_driver *driver,
                       virDomainDefPtr def)
2190 2191 2192
{
    pciDeviceList *pcidevs;
    int i;
2193
    int ret = -1;
2194 2195 2196 2197 2198 2199 2200

    if (!def->nhostdevs)
        return 0;

    if (!(pcidevs = qemuGetPciHostDeviceList(conn, def)))
        return -1;

2201
    /* We have to use 3 loops here. *All* devices must
2202 2203
     * be detached before we reset any of them, because
     * in some cases you have to reset the whole PCI,
2204 2205
     * which impacts all devices on it. Also, all devices
     * must be reset before being marked as active.
2206 2207 2208 2209 2210 2211 2212
     */

    /* XXX validate that non-managed device isn't in use, eg
     * by checking that device is either un-bound, or bound
     * to pci-stub.ko
     */

2213 2214
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2215 2216 2217
        if (!pciDeviceIsAssignable(conn, dev, !driver->relaxedACS))
            goto cleanup;

2218 2219 2220 2221
        if (pciDeviceGetManaged(dev) &&
            pciDettachDevice(conn, dev) < 0)
            goto cleanup;
    }
2222 2223 2224

    /* Now that all the PCI hostdevs have be dettached, we can safely
     * reset them */
2225 2226 2227
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
        if (pciResetDevice(conn, dev,
2228
                           driver->activePciHostdevs) < 0)
2229 2230
            goto cleanup;
    }
2231

2232
    /* Now mark all the devices as active */
2233 2234 2235
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
        pciDeviceListSteal(NULL, pcidevs, dev);
2236 2237
        if (pciDeviceListAdd(conn,
                             driver->activePciHostdevs,
2238 2239 2240 2241
                             dev) < 0) {
            pciFreeDevice(NULL, dev);
            goto cleanup;
        }
2242 2243
    }

2244
    ret = 0;
2245

2246
cleanup:
2247
    pciDeviceListFree(conn, pcidevs);
2248
    return ret;
2249 2250
}

2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270
static void
qemudReattachManagedDevice(pciDevice *dev)
{
    int retries = 100;

    if (pciDeviceGetManaged(dev)) {
        while (pciWaitForDeviceCleanup(dev, "kvm_assigned_device")
               && retries) {
            usleep(100*1000);
            retries--;
        }
        if (pciReAttachDevice(NULL, dev) < 0) {
            virErrorPtr err = virGetLastError();
            VIR_ERROR(_("Failed to re-attach PCI device: %s"),
                      err ? err->message : "");
            virResetError(err);
        }
    }
}

2271
static void
2272 2273 2274
qemuDomainReAttachHostDevices(virConnectPtr conn,
                              struct qemud_driver *driver,
                              virDomainDefPtr def)
2275
{
2276
    pciDeviceList *pcidevs;
2277 2278
    int i;

2279 2280
    if (!def->nhostdevs)
        return;
2281

2282 2283
    if (!(pcidevs = qemuGetPciHostDeviceList(conn, def))) {
        virErrorPtr err = virGetLastError();
2284
        VIR_ERROR(_("Failed to allocate pciDeviceList: %s"),
2285 2286 2287
                  err ? err->message : "");
        virResetError(err);
        return;
2288 2289
    }

2290 2291
    /* Again 3 loops; mark all devices as inactive before reset
     * them and reset all the devices before re-attach */
2292

2293 2294 2295 2296
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
        pciDeviceListDel(conn, driver->activePciHostdevs, dev);
    }
2297

2298 2299 2300
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
        if (pciResetDevice(conn, dev,
2301
                           driver->activePciHostdevs) < 0) {
2302
            virErrorPtr err = virGetLastError();
2303
            VIR_ERROR(_("Failed to reset PCI device: %s"),
2304 2305 2306
                      err ? err->message : "");
            virResetError(err);
        }
2307
    }
2308

2309 2310
    for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
        pciDevice *dev = pciDeviceListGet(pcidevs, i);
2311
        qemudReattachManagedDevice(dev);
2312
    }
2313

2314
    pciDeviceListFree(conn, pcidevs);
2315 2316
}

2317 2318 2319 2320 2321 2322 2323 2324 2325 2326
static const char *const defaultDeviceACL[] = {
    "/dev/null", "/dev/full", "/dev/zero",
    "/dev/random", "/dev/urandom",
    "/dev/ptmx", "/dev/kvm", "/dev/kqemu",
    "/dev/rtc", "/dev/hpet", "/dev/net/tun",
    NULL,
};
#define DEVICE_PTY_MAJOR 136
#define DEVICE_SND_MAJOR 116

2327 2328 2329 2330 2331 2332
static int qemuSetupCgroup(virConnectPtr conn,
                           struct qemud_driver *driver,
                           virDomainObjPtr vm)
{
    virCgroupPtr cgroup = NULL;
    int rc;
2333
    unsigned int i;
2334 2335 2336 2337
    const char *const *deviceACL =
        driver->cgroupDeviceACL ?
        (const char *const *)driver->cgroupDeviceACL :
        defaultDeviceACL;
2338 2339 2340 2341 2342 2343 2344 2345 2346 2347 2348 2349

    if (driver->cgroup == NULL)
        return 0; /* Not supported, so claim success */

    rc = virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 1);
    if (rc != 0) {
        virReportSystemError(conn, -rc,
                             _("Unable to create cgroup for %s"),
                             vm->def->name);
        goto cleanup;
    }

2350 2351
    if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
        rc = virCgroupDenyAllDevices(cgroup);
2352
        if (rc != 0) {
2353 2354 2355 2356 2357
            if (rc == -EPERM) {
                VIR_WARN0("Group devices ACL is not accessible, disabling whitelisting");
                goto done;
            }

2358
            virReportSystemError(conn, -rc,
2359
                                 _("Unable to deny all devices for %s"), vm->def->name);
2360 2361 2362
            goto cleanup;
        }

2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376
        for (i = 0; i < vm->def->ndisks ; i++) {
            if (vm->def->disks[i]->type != VIR_DOMAIN_DISK_TYPE_BLOCK ||
                vm->def->disks[i]->src == NULL)
                continue;

            rc = virCgroupAllowDevicePath(cgroup,
                                          vm->def->disks[i]->src);
            if (rc != 0) {
                virReportSystemError(conn, -rc,
                                     _("Unable to allow device %s for %s"),
                                     vm->def->disks[i]->src, vm->def->name);
                goto cleanup;
            }
        }
2377

2378
        rc = virCgroupAllowDeviceMajor(cgroup, 'c', DEVICE_PTY_MAJOR);
2379 2380
        if (rc != 0) {
            virReportSystemError(conn, -rc, "%s",
2381
                                 _("unable to allow /dev/pts/ devices"));
2382 2383 2384
            goto cleanup;
        }

2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403
        if (vm->def->nsounds) {
            rc = virCgroupAllowDeviceMajor(cgroup, 'c', DEVICE_SND_MAJOR);
            if (rc != 0) {
                virReportSystemError(conn, -rc, "%s",
                                     _("unable to allow /dev/snd/ devices"));
                goto cleanup;
            }
        }

        for (i = 0; deviceACL[i] != NULL ; i++) {
            rc = virCgroupAllowDevicePath(cgroup,
                                          deviceACL[i]);
            if (rc < 0 &&
                rc != -ENOENT) {
                virReportSystemError(conn, -rc,
                                     _("unable to allow device %s"),
                                     deviceACL[i]);
                goto cleanup;
            }
2404 2405 2406 2407
        }
    }

done:
2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421
    virCgroupFree(&cgroup);
    return 0;

cleanup:
    if (cgroup) {
        virCgroupRemove(cgroup);
        virCgroupFree(&cgroup);
    }
    return -1;
}


static int qemuRemoveCgroup(virConnectPtr conn,
                            struct qemud_driver *driver,
2422 2423
                            virDomainObjPtr vm,
                            int quiet)
2424 2425 2426 2427 2428 2429 2430 2431 2432
{
    virCgroupPtr cgroup;
    int rc;

    if (driver->cgroup == NULL)
        return 0; /* Not supported, so claim success */

    rc = virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0);
    if (rc != 0) {
2433 2434 2435 2436
        if (!quiet)
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("Unable to find cgroup for %s\n"),
                             vm->def->name);
2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482
        return rc;
    }

    rc = virCgroupRemove(cgroup);
    virCgroupFree(&cgroup);
    return rc;
}

static int qemuAddToCgroup(struct qemud_driver *driver,
                           virDomainDefPtr def)
{
    virCgroupPtr cgroup = NULL;
    int ret = -1;
    int rc;

    if (driver->cgroup == NULL)
        return 0; /* Not supported, so claim success */

    rc = virCgroupForDomain(driver->cgroup, def->name, &cgroup, 0);
    if (rc != 0) {
        virReportSystemError(NULL, -rc,
                             _("unable to find cgroup for domain %s"),
                             def->name);
        goto cleanup;
    }

    rc = virCgroupAddTask(cgroup, getpid());
    if (rc != 0) {
        virReportSystemError(NULL, -rc,
                             _("unable to add domain %s task %d to cgroup"),
                             def->name, getpid());
        goto cleanup;
    }

    ret = 0;

cleanup:
    virCgroupFree(&cgroup);
    return ret;
}


struct qemudHookData {
    virConnectPtr conn;
    virDomainObjPtr vm;
    struct qemud_driver *driver;
2483 2484 2485
};

static int qemudSecurityHook(void *data) {
2486 2487 2488 2489
    struct qemudHookData *h = data;

    if (qemuAddToCgroup(h->driver, h->vm->def) < 0)
        return -1;
2490

2491 2492 2493
    if (h->driver->securityDriver &&
        h->driver->securityDriver->domainSetSecurityProcessLabel &&
        h->driver->securityDriver->domainSetSecurityProcessLabel(h->conn, h->driver->securityDriver, h->vm) < 0)
2494 2495 2496
        return -1;

    return 0;
2497 2498
}

2499 2500 2501
static int
qemuPrepareMonitorChr(virConnectPtr conn,
                      struct qemud_driver *driver,
2502
                      virDomainChrDefPtr monConfig,
2503 2504
                      const char *vm)
{
2505
    monConfig->targetType = VIR_DOMAIN_CHR_TARGET_TYPE_MONITOR;
2506

2507 2508
    monConfig->type = VIR_DOMAIN_CHR_TYPE_UNIX;
    monConfig->data.nix.listen = 1;
2509

D
Daniel P. Berrange 已提交
2510 2511 2512 2513 2514
    if (!(monConfig->info.alias = strdup("monitor"))) {
        virReportOOMError(conn);
        return -1;
    }

2515
    if (virAsprintf(&monConfig->data.nix.path, "%s/%s.monitor",
2516
                    driver->libDir, vm) < 0) {
2517 2518 2519 2520 2521 2522 2523
        virReportOOMError(conn);
        return -1;
    }

    return 0;
}

2524 2525
static int qemudStartVMDaemon(virConnectPtr conn,
                              struct qemud_driver *driver,
2526
                              virDomainObjPtr vm,
2527 2528
                              const char *migrateFrom,
                              int stdin_fd) {
2529
    const char **argv = NULL, **tmp;
2530
    const char **progenv = NULL;
2531
    int i, ret;
2532
    struct stat sb;
2533 2534
    int *tapfds = NULL;
    int ntapfds = 0;
2535
    unsigned int qemuCmdFlags;
2536
    fd_set keepfd;
2537
    const char *emulator;
G
Guido Günther 已提交
2538
    pid_t child;
2539
    int pos = -1;
2540
    char ebuf[1024];
2541
    char *pidfile = NULL;
2542
    int logfile;
2543
    qemuDomainObjPrivatePtr priv = vm->privateData;
2544

2545
    struct qemudHookData hookData;
2546 2547 2548 2549
    hookData.conn = conn;
    hookData.vm = vm;
    hookData.driver = driver;

2550
    FD_ZERO(&keepfd);
2551

D
Daniel P. Berrange 已提交
2552
    if (virDomainObjIsActive(vm)) {
2553
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_INVALID,
2554
                         "%s", _("VM is already active"));
2555 2556 2557
        return -1;
    }

2558 2559
    /* If you are using a SecurityDriver with dynamic labelling,
       then generate a security label for isolation */
2560
    if (driver->securityDriver &&
2561 2562 2563 2564
        driver->securityDriver->domainGenSecurityLabel &&
        driver->securityDriver->domainGenSecurityLabel(conn, vm) < 0)
        return -1;

2565 2566 2567 2568 2569
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityAllLabel &&
        driver->securityDriver->domainSetSecurityAllLabel(conn, vm) < 0)
        goto cleanup;

2570
    /* Ensure no historical cgroup for this VM is lieing around bogus settings */
2571
    qemuRemoveCgroup(conn, driver, vm, 1);
2572

2573 2574 2575
    if ((vm->def->ngraphics == 1) &&
        vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
        vm->def->graphics[0]->data.vnc.autoport) {
2576
        int port = qemudNextFreeVNCPort(driver);
2577
        if (port < 0) {
2578
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
2579
                             "%s", _("Unable to find an unused VNC port"));
2580
            goto cleanup;
2581
        }
2582
        vm->def->graphics[0]->data.vnc.port = port;
2583
    }
2584

L
Laine Stump 已提交
2585
    if (virFileMakePath(driver->logDir) != 0) {
2586 2587 2588
        virReportSystemError(conn, errno,
                             _("cannot create log directory %s"),
                             driver->logDir);
2589
        goto cleanup;
2590 2591
    }

2592
    if ((logfile = qemudLogFD(conn, driver, vm->def->name)) < 0)
2593
        goto cleanup;
2594

2595 2596
    emulator = vm->def->emulator;

2597 2598 2599 2600
    /* Make sure the binary we are about to try exec'ing exists.
     * Technically we could catch the exec() failure, but that's
     * in a sub-process so its hard to feed back a useful error
     */
2601
    if (stat(emulator, &sb) < 0) {
2602 2603 2604
        virReportSystemError(conn, errno,
                             _("Cannot find QEMU binary %s"),
                             emulator);
2605
        goto cleanup;
2606 2607
    }

2608
    if (qemudExtractVersionInfo(emulator,
2609
                                NULL,
2610
                                &qemuCmdFlags) < 0)
2611
        goto cleanup;
2612

2613 2614 2615
    if (qemuSetupCgroup(conn, driver, vm) < 0)
        goto cleanup;

2616
    if (qemuPrepareHostDevices(conn, driver, vm->def) < 0)
2617
        goto cleanup;
2618

2619
    if (VIR_ALLOC(priv->monConfig) < 0) {
2620 2621 2622 2623
        virReportOOMError(conn);
        goto cleanup;
    }

2624
    if (qemuPrepareMonitorChr(conn, driver, priv->monConfig, vm->def->name) < 0)
2625
        goto cleanup;
2626

D
Daniel P. Berrange 已提交
2627 2628 2629
#if HAVE_YAJL
    if (qemuCmdFlags & QEMUD_CMD_FLAG_MONITOR_JSON)
        priv->monJSON = 1;
2630
    else
D
Daniel P. Berrange 已提交
2631
#endif
2632
        priv->monJSON = 0;
D
Daniel P. Berrange 已提交
2633

D
Daniel P. Berrange 已提交
2634 2635 2636 2637 2638 2639 2640
    if ((ret = virFileDeletePid(driver->stateDir, vm->def->name)) != 0) {
        virReportSystemError(conn, ret,
                             _("Cannot remove stale PID file for %s"),
                             vm->def->name);
        goto cleanup;
    }

2641 2642 2643 2644 2645
    if (!(pidfile = virFilePid(driver->stateDir, vm->def->name))) {
        virReportSystemError(conn, errno,
                             "%s", _("Failed to build pidfile path."));
        goto cleanup;
    }
D
Daniel P. Berrange 已提交
2646

2647 2648 2649 2650 2651 2652 2653 2654 2655 2656 2657 2658
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (priv->pciaddrs) {
            qemuDomainPCIAddressSetFree(priv->pciaddrs);
            priv->pciaddrs = NULL;
        }
        if (!(priv->pciaddrs = qemuDomainPCIAddressSetCreate(vm->def)))
            goto cleanup;

        if (qemuAssignDevicePCISlots(vm->def, priv->pciaddrs) < 0)
            goto cleanup;
    }

2659
    vm->def->id = driver->nextvmid++;
2660
    if (qemudBuildCommandLine(conn, driver, vm->def, priv->monConfig,
D
Daniel P. Berrange 已提交
2661
                              priv->monJSON, qemuCmdFlags, &argv, &progenv,
2662 2663
                              &tapfds, &ntapfds, migrateFrom) < 0)
        goto cleanup;
2664

2665 2666
    tmp = progenv;
    while (*tmp) {
2667
        if (safewrite(logfile, *tmp, strlen(*tmp)) < 0)
2668
            VIR_WARN(_("Unable to write envv to logfile: %s"),
2669
                     virStrerror(errno, ebuf, sizeof ebuf));
2670
        if (safewrite(logfile, " ", 1) < 0)
2671
            VIR_WARN(_("Unable to write envv to logfile: %s"),
2672
                     virStrerror(errno, ebuf, sizeof ebuf));
2673 2674
        tmp++;
    }
2675 2676
    tmp = argv;
    while (*tmp) {
2677
        if (safewrite(logfile, *tmp, strlen(*tmp)) < 0)
2678
            VIR_WARN(_("Unable to write argv to logfile: %s"),
2679
                     virStrerror(errno, ebuf, sizeof ebuf));
2680
        if (safewrite(logfile, " ", 1) < 0)
2681
            VIR_WARN(_("Unable to write argv to logfile: %s"),
2682
                     virStrerror(errno, ebuf, sizeof ebuf));
2683 2684
        tmp++;
    }
2685
    if (safewrite(logfile, "\n", 1) < 0)
2686
        VIR_WARN(_("Unable to write argv to logfile: %s"),
2687
                 virStrerror(errno, ebuf, sizeof ebuf));
2688

2689
    if ((pos = lseek(logfile, 0, SEEK_END)) < 0)
2690
        VIR_WARN(_("Unable to seek to end of logfile: %s"),
2691
                 virStrerror(errno, ebuf, sizeof ebuf));
2692

2693 2694 2695
    for (i = 0 ; i < ntapfds ; i++)
        FD_SET(tapfds[i], &keepfd);

2696
    ret = virExecDaemonize(conn, argv, progenv, &keepfd, &child,
2697
                           stdin_fd, &logfile, &logfile,
2698
                           VIR_EXEC_NONBLOCK | VIR_EXEC_CLEAR_CAPS,
2699 2700 2701
                           qemudSecurityHook, &hookData,
                           pidfile);
    VIR_FREE(pidfile);
G
Guido Günther 已提交
2702 2703 2704

    /* wait for qemu process to to show up */
    if (ret == 0) {
2705
        if (virFileReadPid(driver->stateDir, vm->def->name, &vm->pid)) {
2706
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
2707
                             _("Domain %s didn't show up\n"), vm->def->name);
2708
            ret = -1;
G
Guido Günther 已提交
2709
        }
2710 2711 2712 2713 2714 2715 2716 2717 2718 2719 2720
    } else if (ret == -2) {
        /* The virExec process that launches the daemon failed. Pending on
         * when it failed (we can't determine for sure), there may be
         * extra info in the domain log (if the hook failed for example).
         *
         * Pretend like things succeeded, and let 'WaitForMonitor' report
         * the log contents for us.
         */
        vm->pid = child;
        ret = 0;
    }
2721 2722

    vm->state = migrateFrom ? VIR_DOMAIN_PAUSED : VIR_DOMAIN_RUNNING;
2723

2724
    for (i = 0 ; argv[i] ; i++)
2725 2726
        VIR_FREE(argv[i]);
    VIR_FREE(argv);
2727

2728 2729 2730 2731
    for (i = 0 ; progenv[i] ; i++)
        VIR_FREE(progenv[i]);
    VIR_FREE(progenv);

2732 2733 2734
    if (tapfds) {
        for (i = 0 ; i < ntapfds ; i++) {
            close(tapfds[i]);
2735
        }
2736
        VIR_FREE(tapfds);
2737 2738
    }

2739
    if (ret == -1) /* The VM failed to start */
2740 2741
        goto cleanup;

2742 2743 2744
    if (qemudWaitForMonitor(conn, driver, vm, pos) < 0)
        goto abort;

2745
    if (qemuDetectVcpuPIDs(conn, driver, vm) < 0)
2746 2747
        goto abort;

2748
    if (qemudInitCpuAffinity(conn, vm) < 0)
2749 2750 2751 2752 2753
        goto abort;

    if (qemuInitPasswords(driver, vm) < 0)
        goto abort;

D
Daniel P. Berrange 已提交
2754 2755 2756 2757 2758 2759
    /* If we have -device, then addresses are assigned explicitly.
     * If not, then we have to detect dynamic ones here */
    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
        if (qemuInitPCIAddresses(driver, vm) < 0)
            goto abort;
    }
2760

2761
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
2762
    if (qemuMonitorSetBalloon(priv->mon, vm->def->memory) < 0) {
2763
        qemuDomainObjExitMonitorWithDriver(driver, vm);
2764
        goto abort;
2765
    }
2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776

    if (migrateFrom == NULL) {
        /* Allow the CPUS to start executing */
        if (qemuMonitorStartCPUs(priv->mon, conn) < 0) {
            if (virGetLastError() == NULL)
                qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                 "%s", _("resume operation failed"));
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            goto abort;
        }
    }
2777
    qemuDomainObjExitMonitorWithDriver(driver, vm);
2778

2779

2780
    if (virDomainSaveStatus(conn, driver->caps, driver->stateDir, vm) < 0)
2781
        goto abort;
2782

2783
    return 0;
2784 2785

cleanup:
2786 2787 2788
    /* We jump here if we failed to start the VM for any reason
     * XXX investigate if we can kill this block and safely call
     * qemudShutdownVMDaemon even though no PID is running */
2789 2790
    qemuDomainReAttachHostDevices(conn, driver, vm->def);

2791 2792 2793
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityAllLabel)
        driver->securityDriver->domainRestoreSecurityAllLabel(conn, vm);
2794 2795 2796
    if (driver->securityDriver &&
        driver->securityDriver->domainReleaseSecurityLabel)
        driver->securityDriver->domainReleaseSecurityLabel(conn, vm);
2797
    qemuRemoveCgroup(conn, driver, vm, 0);
2798 2799 2800 2801
    if ((vm->def->ngraphics == 1) &&
        vm->def->graphics[0]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
        vm->def->graphics[0]->data.vnc.autoport)
        vm->def->graphics[0]->data.vnc.port = -1;
2802 2803
    if (logfile != -1)
        close(logfile);
2804 2805
    vm->def->id = -1;
    return -1;
2806 2807 2808 2809 2810 2811 2812 2813 2814 2815

abort:
    /* We jump here if we failed to initialize the now running VM
     * killing it off and pretend we never started it */
    qemudShutdownVMDaemon(conn, driver, vm);

    if (logfile != -1)
        close(logfile);

    return -1;
2816 2817 2818
}


2819
static void qemudShutdownVMDaemon(virConnectPtr conn,
2820 2821
                                  struct qemud_driver *driver,
                                  virDomainObjPtr vm) {
D
Daniel P. Berrange 已提交
2822
    int ret;
2823
    int retries = 0;
2824
    qemuDomainObjPrivatePtr priv = vm->privateData;
2825
    virErrorPtr orig_err;
D
Daniel P. Berrange 已提交
2826

D
Daniel P. Berrange 已提交
2827
    if (!virDomainObjIsActive(vm))
2828
        return;
2829

2830
    VIR_DEBUG("Shutting down VM '%s'", vm->def->name);
2831

2832 2833 2834 2835
    /* This method is routinely used in clean up paths. Disable error
     * reporting so we don't squash a legit error. */
    orig_err = virSaveLastError();

2836 2837 2838 2839 2840 2841 2842 2843 2844 2845 2846 2847 2848 2849 2850 2851
    if (driver->macFilter) {
        int i;
        virDomainDefPtr def = vm->def;
        for (i = 0 ; i < def->nnets ; i++) {
            virDomainNetDefPtr net = def->nets[i];
            if (net->ifname == NULL)
                continue;
            if ((errno = networkDisallowMacOnPort(conn, driver, net->ifname,
                                                  net->mac))) {
                virReportSystemError(conn, errno,
             _("failed to remove ebtables rule to allow MAC address on  '%s'"),
                                     net->ifname);
            }
        }
    }

G
Guido Günther 已提交
2852 2853
    if (virKillProcess(vm->pid, 0) == 0 &&
        virKillProcess(vm->pid, SIGTERM) < 0)
2854 2855 2856
        virReportSystemError(conn, errno,
                             _("Failed to send SIGTERM to %s (%d)"),
                             vm->def->name, vm->pid);
2857

2858 2859 2860
    if (priv->mon &&
        qemuMonitorClose(priv->mon) == 0) {
        virDomainObjUnref(vm);
2861
        priv->mon = NULL;
2862
    }
2863

2864 2865 2866 2867 2868
    if (priv->monConfig) {
        if (priv->monConfig->type == VIR_DOMAIN_CHR_TYPE_UNIX)
            unlink(priv->monConfig->data.nix.path);
        virDomainChrDefFree(priv->monConfig);
        priv->monConfig = NULL;
2869 2870
    }

G
Guido Günther 已提交
2871 2872
    /* shut it off for sure */
    virKillProcess(vm->pid, SIGKILL);
2873

2874
    /* Reset Security Labels */
2875
    if (driver->securityDriver &&
2876 2877 2878 2879 2880
        driver->securityDriver->domainRestoreSecurityAllLabel)
        driver->securityDriver->domainRestoreSecurityAllLabel(conn, vm);
    if (driver->securityDriver &&
        driver->securityDriver->domainReleaseSecurityLabel)
        driver->securityDriver->domainReleaseSecurityLabel(conn, vm);
2881

2882 2883 2884 2885 2886 2887 2888
    /* Clear out dynamically assigned labels */
    if (vm->def->seclabel.type == VIR_DOMAIN_SECLABEL_DYNAMIC) {
        VIR_FREE(vm->def->seclabel.model);
        VIR_FREE(vm->def->seclabel.label);
        VIR_FREE(vm->def->seclabel.imagelabel);
    }

2889
    virDomainDefClearPCIAddresses(vm->def);
D
Daniel P. Berrange 已提交
2890
    virDomainDefClearDeviceAliases(vm->def);
2891 2892
    qemuDomainPCIAddressSetFree(priv->pciaddrs);
    priv->pciaddrs = NULL;
2893

2894
    qemuDomainReAttachHostDevices(conn, driver, vm->def);
2895

2896
retry:
2897
    if ((ret = qemuRemoveCgroup(conn, driver, vm, 0)) < 0) {
2898 2899 2900 2901 2902 2903 2904 2905
        if (ret == -EBUSY && (retries++ < 5)) {
            usleep(200*1000);
            goto retry;
        }
        VIR_WARN("Failed to remove cgroup for %s",
                 vm->def->name);
    }

2906
    qemudRemoveDomainStatus(conn, driver, vm);
D
Daniel P. Berrange 已提交
2907

2908
    vm->pid = -1;
2909
    vm->def->id = -1;
2910
    vm->state = VIR_DOMAIN_SHUTOFF;
2911 2912
    VIR_FREE(priv->vcpupids);
    priv->nvcpupids = 0;
2913 2914

    if (vm->newDef) {
2915
        virDomainDefFree(vm->def);
2916
        vm->def = vm->newDef;
2917
        vm->def->id = -1;
2918 2919
        vm->newDef = NULL;
    }
2920 2921 2922 2923 2924

    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
2925 2926 2927
}


2928
static virDrvOpenStatus qemudOpen(virConnectPtr conn,
2929
                                  virConnectAuthPtr auth ATTRIBUTE_UNUSED,
2930
                                  int flags ATTRIBUTE_UNUSED) {
2931
    if (conn->uri == NULL) {
2932 2933 2934
        if (qemu_driver == NULL)
            return VIR_DRV_OPEN_DECLINED;

2935
        conn->uri = xmlParseURI(qemu_driver->privileged ?
2936 2937
                                "qemu:///system" :
                                "qemu:///session");
2938
        if (!conn->uri) {
2939
            virReportOOMError(conn);
2940 2941
            return VIR_DRV_OPEN_ERROR;
        }
2942 2943 2944 2945 2946 2947 2948 2949 2950 2951
    } else {
        /* If URI isn't 'qemu' its definitely not for us */
        if (conn->uri->scheme == NULL ||
            STRNEQ(conn->uri->scheme, "qemu"))
            return VIR_DRV_OPEN_DECLINED;

        /* Allow remote driver to deal with URIs with hostname server */
        if (conn->uri->server != NULL)
            return VIR_DRV_OPEN_DECLINED;

2952 2953 2954 2955 2956 2957
        if (qemu_driver == NULL) {
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, "%s",
                             _("qemu state driver is not active"));
            return VIR_DRV_OPEN_ERROR;
        }

2958 2959 2960 2961 2962 2963 2964 2965 2966
        if (conn->uri->path == NULL) {
            qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                             _("no QEMU URI path given, try %s"),
                             qemu_driver->privileged
                               ? "qemu:///system"
                               : "qemu:///session");
                return VIR_DRV_OPEN_ERROR;
        }

2967
        if (qemu_driver->privileged) {
2968 2969 2970 2971 2972 2973 2974 2975 2976 2977 2978 2979 2980 2981 2982
            if (STRNEQ (conn->uri->path, "/system") &&
                STRNEQ (conn->uri->path, "/session")) {
                qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                 _("unexpected QEMU URI path '%s', try qemu:///system"),
                                 conn->uri->path);
                return VIR_DRV_OPEN_ERROR;
            }
        } else {
            if (STRNEQ (conn->uri->path, "/session")) {
                qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                 _("unexpected QEMU URI path '%s', try qemu:///session"),
                                 conn->uri->path);
                return VIR_DRV_OPEN_ERROR;
            }
        }
2983 2984 2985 2986 2987 2988 2989
    }
    conn->privateData = qemu_driver;

    return VIR_DRV_OPEN_SUCCESS;
}

static int qemudClose(virConnectPtr conn) {
2990
    struct qemud_driver *driver = conn->privateData;
2991 2992

    /* Get rid of callbacks registered for this conn */
2993
    qemuDriverLock(driver);
2994
    virDomainEventCallbackListRemoveConn(conn, driver->domainEventCallbacks);
2995
    qemuDriverUnlock(driver);
2996 2997 2998 2999 3000 3001

    conn->privateData = NULL;

    return 0;
}

D
Daniel Veillard 已提交
3002 3003 3004 3005 3006
/* Which features are supported by this driver? */
static int
qemudSupportsFeature (virConnectPtr conn ATTRIBUTE_UNUSED, int feature)
{
    switch (feature) {
3007 3008 3009 3010 3011
    case VIR_DRV_FEATURE_MIGRATION_V2:
    case VIR_DRV_FEATURE_MIGRATION_P2P:
        return 1;
    default:
        return 0;
D
Daniel Veillard 已提交
3012 3013 3014
    }
}

3015
static const char *qemudGetType(virConnectPtr conn ATTRIBUTE_UNUSED) {
3016
    return "QEMU";
3017 3018
}

3019

3020 3021 3022 3023 3024 3025 3026 3027 3028 3029 3030 3031 3032
static int qemuIsSecure(virConnectPtr conn ATTRIBUTE_UNUSED)
{
    /* Trivially secure, since always inside the daemon */
    return 1;
}

static int qemuIsEncrypted(virConnectPtr conn ATTRIBUTE_UNUSED)
{
    /* Not encrypted, but remote driver takes care of that */
    return 0;
}


3033 3034 3035 3036
static int kvmGetMaxVCPUs(void) {
    int maxvcpus = 1;

    int r, fd;
3037

3038 3039
    fd = open(KVM_DEVICE, O_RDONLY);
    if (fd < 0) {
3040 3041
        virReportSystemError(NULL, errno, _("Unable to open %s"), KVM_DEVICE);
        return -1;
3042 3043 3044 3045 3046 3047 3048 3049 3050 3051 3052
    }

    r = ioctl(fd, KVM_CHECK_EXTENSION, KVM_CAP_NR_VCPUS);
    if (r > 0)
        maxvcpus = r;

    close(fd);
    return maxvcpus;
}


3053
static int qemudGetMaxVCPUs(virConnectPtr conn, const char *type) {
3054 3055 3056
    if (!type)
        return 16;

3057
    if (STRCASEEQ(type, "qemu"))
3058 3059
        return 16;

3060
    if (STRCASEEQ(type, "kvm"))
3061
        return kvmGetMaxVCPUs();
3062

3063
    if (STRCASEEQ(type, "kqemu"))
3064
        return 1;
3065 3066 3067

    qemudReportError(conn, NULL, NULL, VIR_ERR_INVALID_ARG,
                     _("unknown type '%s'"), type);
3068 3069 3070
    return -1;
}

3071

3072
static char *qemudGetCapabilities(virConnectPtr conn) {
3073
    struct qemud_driver *driver = conn->privateData;
3074
    virCapsPtr caps = NULL;
3075
    char *xml = NULL;
3076

3077
    qemuDriverLock(driver);
3078

3079 3080 3081 3082 3083
    if ((caps = qemuCreateCapabilities(qemu_driver->caps,
                                       qemu_driver->securityDriver)) == NULL) {
        virCapabilitiesFree(caps);
        goto cleanup;
    }
3084

3085
    virCapabilitiesFree(qemu_driver->caps);
3086 3087 3088
    qemu_driver->caps = caps;

    if ((xml = virCapabilitiesFormatXML(driver->caps)) == NULL)
3089
        virReportOOMError(conn);
3090 3091

cleanup:
3092
    qemuDriverUnlock(driver);
3093

3094
    return xml;
3095 3096 3097
}


3098
static int qemudGetProcessInfo(unsigned long long *cpuTime, int *lastCpu, int pid, int tid) {
D
Daniel P. Berrange 已提交
3099 3100
    char proc[PATH_MAX];
    FILE *pidinfo;
3101
    unsigned long long usertime, systime;
3102 3103
    int cpu;
    int ret;
D
Daniel P. Berrange 已提交
3104

3105 3106 3107 3108 3109 3110
    if (tid)
        ret = snprintf(proc, sizeof(proc), "/proc/%d/task/%d/stat", pid, tid);
    else
        ret = snprintf(proc, sizeof(proc), "/proc/%d/stat", pid);
    if (ret >= (int)sizeof(proc)) {
        errno = E2BIG;
D
Daniel P. Berrange 已提交
3111 3112 3113 3114
        return -1;
    }

    if (!(pidinfo = fopen(proc, "r"))) {
3115
        /*printf("cannot read pid info");*/
D
Daniel P. Berrange 已提交
3116
        /* VM probably shut down, so fake 0 */
3117 3118 3119 3120
        if (cpuTime)
            *cpuTime = 0;
        if (lastCpu)
            *lastCpu = 0;
D
Daniel P. Berrange 已提交
3121 3122 3123
        return 0;
    }

3124 3125 3126 3127 3128 3129 3130 3131 3132 3133
    /* See 'man proc' for information about what all these fields are. We're
     * only interested in a very few of them */
    if (fscanf(pidinfo,
               /* pid -> stime */
               "%*d %*s %*c %*d %*d %*d %*d %*d %*u %*u %*u %*u %*u %llu %llu"
               /* cutime -> endcode */
               "%*d %*d %*d %*d %*d %*u %*u %*d %*u %*u %*u %*u"
               /* startstack -> processor */
               "%*u %*u %*u %*u %*u %*u %*u %*u %*u %*u %*d %d",
               &usertime, &systime, &cpu) != 3) {
3134
        fclose(pidinfo);
3135 3136
        VIR_WARN0("cannot parse process status data");
        errno = -EINVAL;
D
Daniel P. Berrange 已提交
3137 3138 3139 3140 3141 3142 3143 3144
        return -1;
    }

    /* We got jiffies
     * We want nanoseconds
     * _SC_CLK_TCK is jiffies per second
     * So calulate thus....
     */
3145 3146 3147 3148 3149
    if (cpuTime)
        *cpuTime = 1000ull * 1000ull * 1000ull * (usertime + systime) / (unsigned long long)sysconf(_SC_CLK_TCK);
    if (lastCpu)
        *lastCpu = cpu;

D
Daniel P. Berrange 已提交
3150

3151 3152
    VIR_DEBUG("Got status for %d/%d user=%llu sys=%llu cpu=%d",
              pid, tid, usertime, systime, cpu);
D
Daniel P. Berrange 已提交
3153 3154 3155 3156 3157 3158 3159

    fclose(pidinfo);

    return 0;
}


3160
static virDomainPtr qemudDomainLookupByID(virConnectPtr conn,
3161
                                          int id) {
3162 3163 3164 3165
    struct qemud_driver *driver = conn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;

3166
    qemuDriverLock(driver);
3167
    vm  = virDomainFindByID(&driver->domains, id);
3168
    qemuDriverUnlock(driver);
3169 3170

    if (!vm) {
3171 3172
        qemudReportError(conn, NULL, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching id %d"), id);
3173
        goto cleanup;
3174 3175
    }

3176
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
3177
    if (dom) dom->id = vm->def->id;
3178 3179

cleanup:
3180 3181
    if (vm)
        virDomainObjUnlock(vm);
3182 3183
    return dom;
}
3184

3185
static virDomainPtr qemudDomainLookupByUUID(virConnectPtr conn,
3186
                                            const unsigned char *uuid) {
3187 3188 3189
    struct qemud_driver *driver = conn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;
3190

3191
    qemuDriverLock(driver);
3192
    vm = virDomainFindByUUID(&driver->domains, uuid);
3193 3194
    qemuDriverUnlock(driver);

3195
    if (!vm) {
3196 3197 3198
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(uuid, uuidstr);
        qemudReportError(conn, NULL, NULL, VIR_ERR_NO_DOMAIN,
3199
                         _("no domain with matching uuid '%s'"), uuidstr);
3200
        goto cleanup;
3201 3202
    }

3203
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
3204
    if (dom) dom->id = vm->def->id;
3205 3206

cleanup:
3207 3208
    if (vm)
        virDomainObjUnlock(vm);
3209 3210
    return dom;
}
3211

3212
static virDomainPtr qemudDomainLookupByName(virConnectPtr conn,
3213
                                            const char *name) {
3214 3215 3216
    struct qemud_driver *driver = conn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;
3217

3218
    qemuDriverLock(driver);
3219
    vm = virDomainFindByName(&driver->domains, name);
3220 3221
    qemuDriverUnlock(driver);

3222
    if (!vm) {
3223 3224
        qemudReportError(conn, NULL, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching name '%s'"), name);
3225
        goto cleanup;
3226 3227
    }

3228
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
3229
    if (dom) dom->id = vm->def->id;
3230 3231

cleanup:
3232 3233
    if (vm)
        virDomainObjUnlock(vm);
3234 3235 3236
    return dom;
}

3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277 3278 3279 3280

static int qemuDomainIsActive(virDomainPtr dom)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr obj;
    int ret = -1;

    qemuDriverLock(driver);
    obj = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!obj) {
        qemudReportError(dom->conn, NULL, NULL, VIR_ERR_NO_DOMAIN, NULL);
        goto cleanup;
    }
    ret = virDomainObjIsActive(obj);

cleanup:
    if (obj)
        virDomainObjUnlock(obj);
    return ret;
}

static int qemuDomainIsPersistent(virDomainPtr dom)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr obj;
    int ret = -1;

    qemuDriverLock(driver);
    obj = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);
    if (!obj) {
        qemudReportError(dom->conn, NULL, NULL, VIR_ERR_NO_DOMAIN, NULL);
        goto cleanup;
    }
    ret = obj->persistent;

cleanup:
    if (obj)
        virDomainObjUnlock(obj);
    return ret;
}


3281
static int qemudGetVersion(virConnectPtr conn, unsigned long *version) {
3282 3283 3284
    struct qemud_driver *driver = conn->privateData;
    int ret = -1;

3285
    qemuDriverLock(driver);
3286
    if (qemudExtractVersion(conn, driver) < 0)
3287
        goto cleanup;
3288

3289
    *version = qemu_driver->qemuVersion;
3290 3291 3292
    ret = 0;

cleanup:
3293
    qemuDriverUnlock(driver);
3294
    return ret;
D
Daniel P. Berrange 已提交
3295 3296
}

3297
static int qemudListDomains(virConnectPtr conn, int *ids, int nids) {
3298
    struct qemud_driver *driver = conn->privateData;
3299
    int n;
3300

3301
    qemuDriverLock(driver);
3302
    n = virDomainObjListGetActiveIDs(&driver->domains, ids, nids);
3303
    qemuDriverUnlock(driver);
3304

3305
    return n;
D
Daniel P. Berrange 已提交
3306
}
3307

3308
static int qemudNumDomains(virConnectPtr conn) {
3309
    struct qemud_driver *driver = conn->privateData;
3310
    int n;
3311

3312
    qemuDriverLock(driver);
3313
    n = virDomainObjListNumOfDomains(&driver->domains, 1);
3314
    qemuDriverUnlock(driver);
3315

3316
    return n;
D
Daniel P. Berrange 已提交
3317
}
3318

3319
static virDomainPtr qemudDomainCreate(virConnectPtr conn, const char *xml,
3320
                                      unsigned int flags ATTRIBUTE_UNUSED) {
3321
    struct qemud_driver *driver = conn->privateData;
3322
    virDomainDefPtr def;
3323
    virDomainObjPtr vm = NULL;
3324
    virDomainPtr dom = NULL;
3325
    virDomainEventPtr event = NULL;
D
Daniel P. Berrange 已提交
3326

3327
    qemuDriverLock(driver);
3328 3329
    if (!(def = virDomainDefParseString(conn, driver->caps, xml,
                                        VIR_DOMAIN_XML_INACTIVE)))
3330
        goto cleanup;
3331

3332 3333 3334
    if (virSecurityDriverVerify(conn, def) < 0)
        goto cleanup;

3335 3336
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
3337

3338
    if (!(vm = virDomainAssignDef(conn,
3339
                                  driver->caps,
3340
                                  &driver->domains,
3341 3342 3343 3344
                                  def)))
        goto cleanup;

    def = NULL;
D
Daniel P. Berrange 已提交
3345

3346 3347 3348
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup; /* XXXX free the 'vm' we created ? */

3349
    if (qemudStartVMDaemon(conn, driver, vm, NULL, -1) < 0) {
3350 3351 3352
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains,
                                    vm);
3353
        vm = NULL;
3354
        goto endjob;
D
Daniel P. Berrange 已提交
3355
    }
3356 3357 3358 3359

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_BOOTED);
D
Daniel P. Berrange 已提交
3360

3361
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
3362
    if (dom) dom->id = vm->def->id;
3363

3364
endjob:
3365 3366 3367
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3368

3369 3370
cleanup:
    virDomainDefFree(def);
3371 3372
    if (vm)
        virDomainObjUnlock(vm);
3373 3374
    if (event)
        qemuDomainEventQueue(driver, event);
3375
    qemuDriverUnlock(driver);
3376
    return dom;
D
Daniel P. Berrange 已提交
3377 3378 3379
}


3380
static int qemudDomainSuspend(virDomainPtr dom) {
3381 3382 3383
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3384
    virDomainEventPtr event = NULL;
3385

3386
    qemuDriverLock(driver);
3387
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3388

D
Daniel P. Berrange 已提交
3389
    if (!vm) {
3390 3391 3392 3393
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3394
        goto cleanup;
D
Daniel P. Berrange 已提交
3395
    }
3396 3397 3398
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3399
    if (!virDomainObjIsActive(vm)) {
3400
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
3401
                         "%s", _("domain is not running"));
3402
        goto endjob;
D
Daniel P. Berrange 已提交
3403
    }
3404
    if (vm->state != VIR_DOMAIN_PAUSED) {
3405
        qemuDomainObjPrivatePtr priv = vm->privateData;
3406
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
3407
        if (qemuMonitorStopCPUs(priv->mon) < 0) {
3408 3409
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            goto endjob;
3410
        }
3411
        qemuDomainObjExitMonitorWithDriver(driver, vm);
3412
        vm->state = VIR_DOMAIN_PAUSED;
3413 3414 3415
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_SUSPENDED,
                                         VIR_DOMAIN_EVENT_SUSPENDED_PAUSED);
D
Daniel P. Berrange 已提交
3416
    }
3417
    if (virDomainSaveStatus(dom->conn, driver->caps, driver->stateDir, vm) < 0)
3418
        goto endjob;
3419 3420
    ret = 0;

3421
endjob:
3422 3423
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3424

3425
cleanup:
3426 3427
    if (vm)
        virDomainObjUnlock(vm);
3428

3429
    if (event)
3430
        qemuDomainEventQueue(driver, event);
3431
    qemuDriverUnlock(driver);
3432
    return ret;
D
Daniel P. Berrange 已提交
3433 3434 3435
}


3436
static int qemudDomainResume(virDomainPtr dom) {
3437 3438 3439
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3440
    virDomainEventPtr event = NULL;
3441

3442
    qemuDriverLock(driver);
3443
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3444

D
Daniel P. Berrange 已提交
3445
    if (!vm) {
3446 3447 3448 3449
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3450
        goto cleanup;
D
Daniel P. Berrange 已提交
3451
    }
3452 3453 3454 3455

    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3456
    if (!virDomainObjIsActive(vm)) {
3457
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
3458
                         "%s", _("domain is not running"));
3459
        goto endjob;
D
Daniel P. Berrange 已提交
3460
    }
3461
    if (vm->state == VIR_DOMAIN_PAUSED) {
3462
        qemuDomainObjPrivatePtr priv = vm->privateData;
3463
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
3464
        if (qemuMonitorStartCPUs(priv->mon, dom->conn) < 0) {
3465
            qemuDomainObjExitMonitorWithDriver(driver, vm);
3466 3467 3468
            if (virGetLastError() == NULL)
                qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                                 "%s", _("resume operation failed"));
3469
            goto endjob;
3470
        }
3471
        qemuDomainObjExitMonitorWithDriver(driver, vm);
3472
        vm->state = VIR_DOMAIN_RUNNING;
3473 3474 3475
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_RESUMED,
                                         VIR_DOMAIN_EVENT_RESUMED_UNPAUSED);
D
Daniel P. Berrange 已提交
3476
    }
3477
    if (virDomainSaveStatus(dom->conn, driver->caps, driver->stateDir, vm) < 0)
3478
        goto endjob;
3479 3480
    ret = 0;

3481
endjob:
3482 3483
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3484

3485
cleanup:
3486 3487
    if (vm)
        virDomainObjUnlock(vm);
3488
    if (event)
3489
        qemuDomainEventQueue(driver, event);
3490
    qemuDriverUnlock(driver);
3491
    return ret;
D
Daniel P. Berrange 已提交
3492 3493 3494
}


3495
static int qemudDomainShutdown(virDomainPtr dom) {
3496 3497 3498
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3499

3500
    qemuDriverLock(driver);
3501
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3502 3503
    qemuDriverUnlock(driver);

3504
    if (!vm) {
3505 3506 3507 3508
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3509
        goto cleanup;
3510 3511
    }

3512 3513 3514
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3515
    if (!virDomainObjIsActive(vm)) {
3516 3517
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
                         "%s", _("domain is not running"));
3518
        goto endjob;
3519 3520
    }

3521
    qemuDomainObjPrivatePtr priv = vm->privateData;
3522 3523 3524
    qemuDomainObjEnterMonitor(vm);
    ret = qemuMonitorSystemPowerdown(priv->mon);
    qemuDomainObjExitMonitor(vm);
3525

3526
endjob:
3527 3528
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3529

3530
cleanup:
3531 3532
    if (vm)
        virDomainObjUnlock(vm);
3533
    return ret;
3534 3535 3536
}


3537
static int qemudDomainDestroy(virDomainPtr dom) {
3538 3539 3540
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3541
    virDomainEventPtr event = NULL;
3542

3543
    qemuDriverLock(driver);
3544
    vm  = virDomainFindByUUID(&driver->domains, dom->uuid);
D
Daniel P. Berrange 已提交
3545
    if (!vm) {
3546 3547 3548 3549
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3550
        goto cleanup;
D
Daniel P. Berrange 已提交
3551
    }
3552 3553 3554 3555

    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3556
    if (!virDomainObjIsActive(vm)) {
3557
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
3558
                         "%s", _("domain is not running"));
3559
        goto endjob;
3560
    }
3561

3562
    qemudShutdownVMDaemon(dom->conn, driver, vm);
3563 3564 3565
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     VIR_DOMAIN_EVENT_STOPPED_DESTROYED);
3566
    if (!vm->persistent) {
3567 3568 3569
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains,
                                    vm);
3570 3571
        vm = NULL;
    }
3572 3573
    ret = 0;

3574
endjob:
3575 3576 3577
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3578

3579
cleanup:
3580 3581
    if (vm)
        virDomainObjUnlock(vm);
3582 3583
    if (event)
        qemuDomainEventQueue(driver, event);
3584
    qemuDriverUnlock(driver);
3585
    return ret;
D
Daniel P. Berrange 已提交
3586 3587 3588
}


3589
static char *qemudDomainGetOSType(virDomainPtr dom) {
3590 3591 3592
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    char *type = NULL;
3593

3594
    qemuDriverLock(driver);
3595
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3596
    qemuDriverUnlock(driver);
3597
    if (!vm) {
3598 3599 3600 3601
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3602
        goto cleanup;
3603 3604
    }

3605
    if (!(type = strdup(vm->def->os.type)))
3606
        virReportOOMError(dom->conn);
3607 3608

cleanup:
3609 3610
    if (vm)
        virDomainObjUnlock(vm);
3611 3612 3613
    return type;
}

3614 3615
/* Returns max memory in kb, 0 if error */
static unsigned long qemudDomainGetMaxMemory(virDomainPtr dom) {
3616 3617 3618
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    unsigned long ret = 0;
3619

3620
    qemuDriverLock(driver);
3621
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3622 3623
    qemuDriverUnlock(driver);

3624
    if (!vm) {
3625 3626
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3627
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
3628
                         _("no domain with matching uuid '%s'"), uuidstr);
3629
        goto cleanup;
3630 3631
    }

3632 3633 3634
    ret = vm->def->maxmem;

cleanup:
3635 3636
    if (vm)
        virDomainObjUnlock(vm);
3637
    return ret;
3638 3639 3640
}

static int qemudDomainSetMaxMemory(virDomainPtr dom, unsigned long newmax) {
3641 3642 3643
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3644

3645
    qemuDriverLock(driver);
3646
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3647 3648
    qemuDriverUnlock(driver);

3649
    if (!vm) {
3650 3651
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3652
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
3653
                         _("no domain with matching uuid '%s'"), uuidstr);
3654
        goto cleanup;
3655 3656 3657 3658
    }

    if (newmax < vm->def->memory) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
3659
                         "%s", _("cannot set max memory lower than current memory"));
3660
        goto cleanup;;
3661 3662 3663
    }

    vm->def->maxmem = newmax;
3664 3665 3666
    ret = 0;

cleanup:
3667 3668
    if (vm)
        virDomainObjUnlock(vm);
3669
    return ret;
3670 3671
}

3672

3673
static int qemudDomainSetMemory(virDomainPtr dom, unsigned long newmem) {
3674 3675 3676
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3677

3678
    qemuDriverLock(driver);
3679
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3680
    qemuDriverUnlock(driver);
3681
    if (!vm) {
3682 3683
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
3684
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
3685
                         _("no domain with matching uuid '%s'"), uuidstr);
3686
        goto cleanup;
3687 3688 3689 3690
    }

    if (newmem > vm->def->maxmem) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
3691
                         "%s", _("cannot set memory higher than max memory"));
3692
        goto cleanup;
3693 3694
    }

3695 3696 3697
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3698
    if (virDomainObjIsActive(vm)) {
3699
        qemuDomainObjPrivatePtr priv = vm->privateData;
3700
        qemuDomainObjEnterMonitor(vm);
3701
        int r = qemuMonitorSetBalloon(priv->mon, newmem);
3702
        qemuDomainObjExitMonitor(vm);
3703
        if (r < 0)
3704
            goto endjob;
3705 3706 3707

        /* Lack of balloon support is a fatal error */
        if (r == 0) {
3708 3709
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                             "%s", _("cannot set memory of an active domain"));
3710
            goto endjob;
3711
        }
3712 3713 3714
    } else {
        vm->def->memory = newmem;
    }
3715
    ret = 0;
3716

3717
endjob:
3718 3719
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3720

3721
cleanup:
3722 3723
    if (vm)
        virDomainObjUnlock(vm);
3724
    return ret;
3725 3726
}

3727
static int qemudDomainGetInfo(virDomainPtr dom,
3728
                              virDomainInfoPtr info) {
3729 3730 3731
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
3732 3733
    int err;
    unsigned long balloon;
3734

3735
    qemuDriverLock(driver);
3736
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3737
    qemuDriverUnlock(driver);
D
Daniel P. Berrange 已提交
3738
    if (!vm) {
3739 3740 3741 3742
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3743
        goto cleanup;
D
Daniel P. Berrange 已提交
3744 3745
    }

3746
    info->state = vm->state;
D
Daniel P. Berrange 已提交
3747

D
Daniel P. Berrange 已提交
3748
    if (!virDomainObjIsActive(vm)) {
3749
        info->cpuTime = 0;
D
Daniel P. Berrange 已提交
3750
    } else {
3751
        if (qemudGetProcessInfo(&(info->cpuTime), NULL, vm->pid, 0) < 0) {
3752
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED, ("cannot read cputime for domain"));
3753
            goto cleanup;
D
Daniel P. Berrange 已提交
3754 3755 3756
        }
    }

3757
    info->maxMem = vm->def->maxmem;
3758

D
Daniel P. Berrange 已提交
3759
    if (virDomainObjIsActive(vm)) {
3760
        qemuDomainObjPrivatePtr priv = vm->privateData;
3761 3762 3763
        if (!priv->jobActive) {
            if (qemuDomainObjBeginJob(vm) < 0)
                goto cleanup;
3764

3765 3766 3767 3768
            qemuDomainObjEnterMonitor(vm);
            err = qemuMonitorGetBalloonInfo(priv->mon, &balloon);
            qemuDomainObjExitMonitor(vm);
            if (err < 0) {
3769 3770
                if (qemuDomainObjEndJob(vm) == 0)
                    vm = NULL;
3771 3772 3773 3774 3775 3776 3777 3778 3779
                goto cleanup;
            }

            if (err == 0)
                /* Balloon not supported, so maxmem is always the allocation */
                info->memory = vm->def->maxmem;
            else
                info->memory = balloon;

3780 3781 3782 3783
            if (qemuDomainObjEndJob(vm) == 0) {
                vm = NULL;
                goto cleanup;
            }
3784 3785 3786
        } else {
            info->memory = vm->def->memory;
        }
3787 3788 3789 3790
    } else {
        info->memory = vm->def->memory;
    }

3791
    info->nrVirtCpu = vm->def->vcpus;
3792 3793 3794
    ret = 0;

cleanup:
3795 3796
    if (vm)
        virDomainObjUnlock(vm);
3797
    return ret;
D
Daniel P. Berrange 已提交
3798 3799 3800
}


3801
#define QEMUD_SAVE_MAGIC "LibvirtQemudSave"
3802 3803 3804
#define QEMUD_SAVE_VERSION 2

enum qemud_save_formats {
3805 3806 3807
    QEMUD_SAVE_FORMAT_RAW = 0,
    QEMUD_SAVE_FORMAT_GZIP = 1,
    QEMUD_SAVE_FORMAT_BZIP2 = 2,
3808 3809
    /*
     * Deprecated by xz and never used as part of a release
3810
     * QEMUD_SAVE_FORMAT_LZMA
3811 3812
     */
    QEMUD_SAVE_FORMAT_XZ = 3,
3813
    QEMUD_SAVE_FORMAT_LZOP = 4,
3814 3815 3816
    /* Note: add new members only at the end.
       These values are used in the on-disk format.
       Do not change or re-use numbers. */
3817 3818

    QEMUD_SAVE_FORMAT_LAST
3819
};
3820

3821 3822 3823 3824 3825
VIR_ENUM_DECL(qemudSaveCompression)
VIR_ENUM_IMPL(qemudSaveCompression, QEMUD_SAVE_FORMAT_LAST,
              "raw",
              "gzip",
              "bzip2",
3826 3827
              "xz",
              "lzop")
3828

3829 3830 3831 3832 3833
struct qemud_save_header {
    char magic[sizeof(QEMUD_SAVE_MAGIC)-1];
    int version;
    int xml_len;
    int was_running;
3834 3835
    int compressed;
    int unused[15];
3836 3837
};

3838
static int qemudDomainSave(virDomainPtr dom,
3839 3840
                           const char *path)
{
3841
    struct qemud_driver *driver = dom->conn->privateData;
3842
    virDomainObjPtr vm = NULL;
3843 3844
    int fd = -1;
    char *xml = NULL;
3845
    struct qemud_save_header header;
3846
    int ret = -1;
3847
    int rc;
3848
    virDomainEventPtr event = NULL;
3849 3850 3851 3852 3853

    memset(&header, 0, sizeof(header));
    memcpy(header.magic, QEMUD_SAVE_MAGIC, sizeof(header.magic));
    header.version = QEMUD_SAVE_VERSION;

3854
    qemuDriverLock(driver);
3855 3856 3857
    if (driver->saveImageFormat == NULL)
        header.compressed = QEMUD_SAVE_FORMAT_RAW;
    else {
3858 3859 3860 3861 3862 3863
        header.compressed =
            qemudSaveCompressionTypeFromString(driver->saveImageFormat);
        if (header.compressed < 0) {
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                             "%s", _("Invalid save image format specified "
                                     "in configuration file"));
3864
            goto cleanup;
3865
        }
3866 3867
    }

3868
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
3869

D
Daniel P. Berrange 已提交
3870
    if (!vm) {
3871 3872 3873 3874
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
3875
        goto cleanup;
D
Daniel P. Berrange 已提交
3876
    }
3877

3878 3879 3880
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
3881
    if (!virDomainObjIsActive(vm)) {
3882
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
3883
                         "%s", _("domain is not running"));
3884
        goto endjob;
D
Daniel P. Berrange 已提交
3885
    }
3886 3887 3888

    /* Pause */
    if (vm->state == VIR_DOMAIN_RUNNING) {
3889
        qemuDomainObjPrivatePtr priv = vm->privateData;
3890
        header.was_running = 1;
3891
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
3892
        if (qemuMonitorStopCPUs(priv->mon) < 0) {
3893 3894
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            goto endjob;
3895
        }
3896
        qemuDomainObjExitMonitorWithDriver(driver, vm);
3897
        vm->state = VIR_DOMAIN_PAUSED;
3898 3899 3900
    }

    /* Get XML for the domain */
3901
    xml = virDomainDefFormat(dom->conn, vm->def, VIR_DOMAIN_XML_SECURE);
3902 3903
    if (!xml) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
3904
                         "%s", _("failed to get domain xml"));
3905
        goto endjob;
3906 3907 3908 3909 3910 3911
    }
    header.xml_len = strlen(xml) + 1;

    /* Write header to file, followed by XML */
    if ((fd = open(path, O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR)) < 0) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
3912
                         _("failed to create '%s'"), path);
3913
        goto endjob;
3914 3915 3916 3917
    }

    if (safewrite(fd, &header, sizeof(header)) != sizeof(header)) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
3918
                         "%s", _("failed to write save header"));
3919
        goto endjob;
3920 3921 3922 3923
    }

    if (safewrite(fd, xml, header.xml_len) != header.xml_len) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
3924
                         "%s", _("failed to write xml"));
3925
        goto endjob;
3926 3927
    }

3928
    if (close(fd) < 0) {
3929 3930 3931
        virReportSystemError(dom->conn, errno,
                             _("unable to save file %s"),
                             path);
3932
        goto endjob;
3933 3934
    }
    fd = -1;
3935

3936 3937 3938 3939 3940
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSavedStateLabel &&
        driver->securityDriver->domainSetSavedStateLabel(dom->conn, vm, path) == -1)
        goto endjob;

3941 3942
    if (header.compressed == QEMUD_SAVE_FORMAT_RAW) {
        const char *args[] = { "cat", NULL };
3943
        qemuDomainObjPrivatePtr priv = vm->privateData;
M
Matthias Bolte 已提交
3944
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
3945
        rc = qemuMonitorMigrateToCommand(priv->mon, 0, args, path);
M
Matthias Bolte 已提交
3946
        qemuDomainObjExitMonitorWithDriver(driver, vm);
3947
    } else {
3948
        const char *prog = qemudSaveCompressionTypeToString(header.compressed);
3949
        qemuDomainObjPrivatePtr priv = vm->privateData;
3950 3951 3952 3953 3954
        const char *args[] = {
            prog,
            "-c",
            NULL
        };
M
Matthias Bolte 已提交
3955
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
3956
        rc = qemuMonitorMigrateToCommand(priv->mon, 0, args, path);
M
Matthias Bolte 已提交
3957
        qemuDomainObjExitMonitorWithDriver(driver, vm);
3958 3959
    }

3960
    if (rc < 0)
3961
        goto endjob;
3962

3963 3964
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSavedStateLabel &&
3965
        driver->securityDriver->domainRestoreSavedStateLabel(dom->conn, vm, path) == -1)
3966 3967 3968 3969
        goto endjob;

    ret = 0;

3970 3971
    /* Shut it down */
    qemudShutdownVMDaemon(dom->conn, driver, vm);
3972 3973 3974
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     VIR_DOMAIN_EVENT_STOPPED_SAVED);
3975
    if (!vm->persistent) {
3976 3977 3978
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains,
                                    vm);
3979 3980
        vm = NULL;
    }
3981

3982
endjob:
3983 3984 3985
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
3986

3987 3988 3989 3990 3991 3992
cleanup:
    if (fd != -1)
        close(fd);
    VIR_FREE(xml);
    if (ret != 0)
        unlink(path);
3993 3994
    if (vm)
        virDomainObjUnlock(vm);
3995 3996
    if (event)
        qemuDomainEventQueue(driver, event);
3997
    qemuDriverUnlock(driver);
3998
    return ret;
D
Daniel P. Berrange 已提交
3999 4000 4001
}


P
Paolo Bonzini 已提交
4002 4003 4004 4005 4006 4007
static int qemudDomainCoreDump(virDomainPtr dom,
                               const char *path,
                               int flags ATTRIBUTE_UNUSED) {
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int resume = 0, paused = 0;
4008
    int ret = -1, fd = -1;
4009
    virDomainEventPtr event = NULL;
4010 4011 4012 4013
    const char *args[] = {
        "cat",
        NULL,
    };
P
Paolo Bonzini 已提交
4014 4015 4016 4017 4018 4019 4020 4021 4022 4023 4024 4025 4026

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);

    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

4027 4028 4029
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
4030
    if (!virDomainObjIsActive(vm)) {
P
Paolo Bonzini 已提交
4031 4032
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
                         "%s", _("domain is not running"));
4033
        goto endjob;
P
Paolo Bonzini 已提交
4034 4035
    }

4036 4037 4038 4039 4040 4041 4042 4043 4044 4045 4046 4047 4048 4049 4050 4051 4052 4053 4054
    /* Create an empty file with appropriate ownership.  */
    if ((fd = open(path, O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR)) < 0) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                         _("failed to create '%s'"), path);
        goto endjob;
    }

    if (close(fd) < 0) {
        virReportSystemError(dom->conn, errno,
                             _("unable to save file %s"),
                             path);
        goto endjob;
    }

    if (driver->securityDriver &&
        driver->securityDriver->domainSetSavedStateLabel &&
        driver->securityDriver->domainSetSavedStateLabel(dom->conn, vm, path) == -1)
        goto endjob;

P
Paolo Bonzini 已提交
4055 4056
    /* Migrate will always stop the VM, so the resume condition is
       independent of whether the stop command is issued.  */
P
Paolo Bonzini 已提交
4057 4058
    resume = (vm->state == VIR_DOMAIN_RUNNING);

4059 4060
    qemuDomainObjPrivatePtr priv = vm->privateData;

P
Paolo Bonzini 已提交
4061
    /* Pause domain for non-live dump */
P
Paolo Bonzini 已提交
4062
    if (!(flags & VIR_DUMP_LIVE) && vm->state == VIR_DOMAIN_RUNNING) {
4063 4064 4065
        qemuDomainObjEnterMonitor(vm);
        if (qemuMonitorStopCPUs(priv->mon) < 0) {
            qemuDomainObjExitMonitor(vm);
4066
            goto endjob;
4067 4068
        }
        qemuDomainObjExitMonitor(vm);
P
Paolo Bonzini 已提交
4069 4070 4071
        paused = 1;
    }

4072
    qemuDomainObjEnterMonitor(vm);
4073
    ret = qemuMonitorMigrateToCommand(priv->mon, 0, args, path);
4074
    qemuDomainObjExitMonitor(vm);
4075 4076 4077 4078
    paused |= (ret == 0);

    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSavedStateLabel &&
4079
        driver->securityDriver->domainRestoreSavedStateLabel(dom->conn, vm, path) == -1)
4080 4081 4082
        goto endjob;

endjob:
4083 4084 4085 4086 4087 4088 4089
    if ((ret == 0) && (flags & VIR_DUMP_CRASH)) {
        qemudShutdownVMDaemon(dom->conn, driver, vm);
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STOPPED,
                                         VIR_DOMAIN_EVENT_STOPPED_CRASHED);
    }

P
Paolo Bonzini 已提交
4090 4091 4092
    /* Since the monitor is always attached to a pty for libvirt, it
       will support synchronous operations so we always get here after
       the migration is complete.  */
4093
    else if (resume && paused) {
4094
        qemuDomainObjEnterMonitor(vm);
4095
        if (qemuMonitorStartCPUs(priv->mon, dom->conn) < 0) {
4096 4097 4098
            if (virGetLastError() == NULL)
                qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                                 "%s", _("resuming after dump failed"));
P
Paolo Bonzini 已提交
4099
        }
4100
        qemuDomainObjExitMonitor(vm);
P
Paolo Bonzini 已提交
4101
    }
4102

4103 4104
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4105
    else if ((ret == 0) && (flags & VIR_DUMP_CRASH) && !vm->persistent) {
4106 4107 4108 4109
        virDomainRemoveInactive(&driver->domains,
                                vm);
        vm = NULL;
    }
4110 4111

cleanup:
4112 4113
    if (ret != 0)
        unlink(path);
P
Paolo Bonzini 已提交
4114 4115
    if (vm)
        virDomainObjUnlock(vm);
4116 4117
    if (event)
        qemuDomainEventQueue(driver, event);
P
Paolo Bonzini 已提交
4118 4119 4120 4121
    return ret;
}


4122
static int qemudDomainSetVcpus(virDomainPtr dom, unsigned int nvcpus) {
4123 4124
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
4125
    int max;
4126
    int ret = -1;
4127
    const char *type;
4128

4129
    qemuDriverLock(driver);
4130
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4131 4132
    qemuDriverUnlock(driver);

4133
    if (!vm) {
4134 4135
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4136
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
4137
                         _("no domain with matching uuid '%s'"), uuidstr);
4138
        goto cleanup;
4139 4140
    }

4141 4142 4143
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
4144
    if (virDomainObjIsActive(vm)) {
4145
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID, "%s",
4146
                         _("cannot change vcpu count of an active domain"));
4147
        goto endjob;
4148 4149
    }

4150 4151 4152 4153
    if (!(type = virDomainVirtTypeToString(vm->def->virtType))) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unknown virt type in domain definition '%d'"),
                         vm->def->virtType);
4154
        goto endjob;
4155 4156 4157
    }

    if ((max = qemudGetMaxVCPUs(dom->conn, type)) < 0) {
4158 4159
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR, "%s",
                         _("could not determine max vcpus for the domain"));
4160
        goto endjob;
4161 4162 4163 4164 4165 4166
    }

    if (nvcpus > max) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
                         _("requested vcpus is greater than max allowable"
                           " vcpus for the domain: %d > %d"), nvcpus, max);
4167
        goto endjob;
4168 4169 4170
    }

    vm->def->vcpus = nvcpus;
4171 4172
    ret = 0;

4173
endjob:
4174 4175
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4176

4177
cleanup:
4178 4179
    if (vm)
        virDomainObjUnlock(vm);
4180
    return ret;
4181 4182
}

4183 4184 4185 4186 4187 4188

static int
qemudDomainPinVcpu(virDomainPtr dom,
                   unsigned int vcpu,
                   unsigned char *cpumap,
                   int maplen) {
4189 4190
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
4191
    int maxcpu, hostcpus;
4192
    virNodeInfo nodeinfo;
4193
    int ret = -1;
4194
    qemuDomainObjPrivatePtr priv;
4195

4196
    qemuDriverLock(driver);
4197
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4198 4199
    qemuDriverUnlock(driver);

4200 4201 4202 4203 4204 4205 4206 4207
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

D
Daniel P. Berrange 已提交
4208
    if (!virDomainObjIsActive(vm)) {
4209
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
4210
                         "%s",_("cannot pin vcpus on an inactive domain"));
4211
        goto cleanup;
4212 4213
    }

4214 4215 4216
    priv = vm->privateData;

    if (vcpu > (priv->nvcpupids-1)) {
4217 4218
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
                         _("vcpu number out of range %d > %d"),
4219
                         vcpu, priv->nvcpupids);
4220
        goto cleanup;
4221 4222
    }

4223
    if (nodeGetInfo(dom->conn, &nodeinfo) < 0)
4224
        goto cleanup;
4225

4226
    hostcpus = VIR_NODEINFO_MAXCPUS(nodeinfo);
4227
    maxcpu = maplen * 8;
4228 4229
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;
4230

4231 4232
    if (priv->vcpupids != NULL) {
        if (virProcessInfoSetAffinity(priv->vcpupids[vcpu],
4233
                                      cpumap, maplen, maxcpu) < 0)
4234
            goto cleanup;
4235 4236 4237
    } else {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         "%s", _("cpu affinity is not supported"));
4238
        goto cleanup;
4239
    }
4240
    ret = 0;
4241

4242
cleanup:
4243 4244
    if (vm)
        virDomainObjUnlock(vm);
4245
    return ret;
4246 4247 4248 4249 4250 4251 4252 4253
}

static int
qemudDomainGetVcpus(virDomainPtr dom,
                    virVcpuInfoPtr info,
                    int maxinfo,
                    unsigned char *cpumaps,
                    int maplen) {
4254 4255
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
4256
    virNodeInfo nodeinfo;
4257
    int i, v, maxcpu, hostcpus;
4258
    int ret = -1;
4259
    qemuDomainObjPrivatePtr priv;
4260

4261
    qemuDriverLock(driver);
4262
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4263 4264
    qemuDriverUnlock(driver);

4265 4266 4267 4268 4269 4270 4271 4272
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

D
Daniel P. Berrange 已提交
4273
    if (!virDomainObjIsActive(vm)) {
4274
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
4275 4276
                         "%s",
                         _("cannot list vcpu pinning for an inactive domain"));
4277
        goto cleanup;
4278 4279
    }

4280 4281
    priv = vm->privateData;

4282
    if (nodeGetInfo(dom->conn, &nodeinfo) < 0)
4283
        goto cleanup;
4284

4285
    hostcpus = VIR_NODEINFO_MAXCPUS(nodeinfo);
4286
    maxcpu = maplen * 8;
4287 4288
    if (maxcpu > hostcpus)
        maxcpu = hostcpus;
4289 4290

    /* Clamp to actual number of vcpus */
4291 4292
    if (maxinfo > priv->nvcpupids)
        maxinfo = priv->nvcpupids;
4293

4294 4295 4296 4297 4298 4299
    if (maxinfo >= 1) {
        if (info != NULL) {
            memset(info, 0, sizeof(*info) * maxinfo);
            for (i = 0 ; i < maxinfo ; i++) {
                info[i].number = i;
                info[i].state = VIR_VCPU_RUNNING;
4300

4301
                if (priv->vcpupids != NULL &&
4302 4303 4304
                    qemudGetProcessInfo(&(info[i].cpuTime),
                                        &(info[i].cpu),
                                        vm->pid,
4305
                                        priv->vcpupids[i]) < 0) {
4306 4307 4308 4309
                    virReportSystemError(dom->conn, errno, "%s",
                                         _("cannot get vCPU placement & pCPU time"));
                    goto cleanup;
                }
4310
            }
4311 4312
        }

4313 4314
        if (cpumaps != NULL) {
            memset(cpumaps, 0, maplen * maxinfo);
4315
            if (priv->vcpupids != NULL) {
4316 4317 4318
                for (v = 0 ; v < maxinfo ; v++) {
                    unsigned char *cpumap = VIR_GET_CPUMAP(cpumaps, maplen, v);

4319
                    if (virProcessInfoGetAffinity(priv->vcpupids[v],
4320
                                                  cpumap, maplen, maxcpu) < 0)
4321
                        goto cleanup;
4322
                }
4323 4324 4325 4326
            } else {
                qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                                 "%s", _("cpu affinity is not available"));
                goto cleanup;
4327 4328 4329
            }
        }
    }
4330
    ret = maxinfo;
4331

4332
cleanup:
4333 4334
    if (vm)
        virDomainObjUnlock(vm);
4335
    return ret;
4336 4337 4338
}


4339
static int qemudDomainGetMaxVcpus(virDomainPtr dom) {
4340 4341
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
4342
    const char *type;
4343
    int ret = -1;
4344

4345
    qemuDriverLock(driver);
4346
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4347 4348
    qemuDriverUnlock(driver);

4349
    if (!vm) {
4350 4351
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4352
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
4353
                         _("no domain with matching uuid '%s'"), uuidstr);
4354
        goto cleanup;
4355 4356
    }

4357
    if (!(type = virDomainVirtTypeToString(vm->def->virtType))) {
4358 4359 4360
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unknown virt type in domain definition '%d'"),
                         vm->def->virtType);
4361
        goto cleanup;
4362 4363
    }

4364
    ret = qemudGetMaxVCPUs(dom->conn, type);
4365

4366
cleanup:
4367 4368
    if (vm)
        virDomainObjUnlock(vm);
4369 4370 4371
    return ret;
}

4372 4373 4374 4375 4376 4377 4378 4379 4380 4381
static int qemudDomainGetSecurityLabel(virDomainPtr dom, virSecurityLabelPtr seclabel)
{
    struct qemud_driver *driver = (struct qemud_driver *)dom->conn->privateData;
    virDomainObjPtr vm;
    const char *type;
    int ret = -1;

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

4382 4383
    memset(seclabel, 0, sizeof(*seclabel));

4384 4385 4386
    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
4387
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
4388 4389 4390 4391 4392 4393 4394 4395 4396 4397 4398 4399 4400 4401 4402 4403 4404 4405 4406 4407 4408 4409 4410 4411 4412
                         _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    if (!(type = virDomainVirtTypeToString(vm->def->virtType))) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unknown virt type in domain definition '%d'"),
                         vm->def->virtType);
        goto cleanup;
    }

    /*
     * Theoretically, the pid can be replaced during this operation and
     * return the label of a different process.  If atomicity is needed,
     * further validation will be required.
     *
     * Comment from Dan Berrange:
     *
     *   Well the PID as stored in the virDomainObjPtr can't be changed
     *   because you've got a locked object.  The OS level PID could have
     *   exited, though and in extreme circumstances have cycled through all
     *   PIDs back to ours. We could sanity check that our PID still exists
     *   after reading the label, by checking that our FD connecting to the
     *   QEMU monitor hasn't seen SIGHUP/ERR on poll().
     */
D
Daniel P. Berrange 已提交
4413
    if (virDomainObjIsActive(vm)) {
4414 4415
        if (driver->securityDriver && driver->securityDriver->domainGetSecurityProcessLabel) {
            if (driver->securityDriver->domainGetSecurityProcessLabel(dom->conn, vm, seclabel) == -1) {
4416
                qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
4417
                                 "%s", _("Failed to get security label"));
4418 4419 4420 4421 4422 4423 4424 4425 4426 4427
                goto cleanup;
            }
        }
    }

    ret = 0;

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
4428
    qemuDriverUnlock(driver);
4429 4430 4431
    return ret;
}

4432 4433
static int qemudNodeGetSecurityModel(virConnectPtr conn,
                                     virSecurityModelPtr secmodel)
4434 4435 4436
{
    struct qemud_driver *driver = (struct qemud_driver *)conn->privateData;
    char *p;
4437
    int ret = 0;
4438

4439 4440
    qemuDriverLock(driver);
    if (!driver->securityDriver) {
4441
        memset(secmodel, 0, sizeof (*secmodel));
4442 4443
        goto cleanup;
    }
4444

4445 4446 4447 4448 4449
    p = driver->caps->host.secModel.model;
    if (strlen(p) >= VIR_SECURITY_MODEL_BUFLEN-1) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("security model string exceeds max %d bytes"),
                         VIR_SECURITY_MODEL_BUFLEN-1);
4450 4451
        ret = -1;
        goto cleanup;
4452 4453 4454 4455 4456 4457 4458 4459
    }
    strcpy(secmodel->model, p);

    p = driver->caps->host.secModel.doi;
    if (strlen(p) >= VIR_SECURITY_DOI_BUFLEN-1) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("security DOI string exceeds max %d bytes"),
                         VIR_SECURITY_DOI_BUFLEN-1);
4460 4461
        ret = -1;
        goto cleanup;
4462 4463
    }
    strcpy(secmodel->doi, p);
4464 4465 4466 4467

cleanup:
    qemuDriverUnlock(driver);
    return ret;
4468 4469 4470
}

/* TODO: check seclabel restore */
4471
static int qemudDomainRestore(virConnectPtr conn,
4472 4473 4474
                              const char *path) {
    struct qemud_driver *driver = conn->privateData;
    virDomainDefPtr def = NULL;
4475
    virDomainObjPtr vm = NULL;
4476 4477 4478
    int fd = -1;
    int ret = -1;
    char *xml = NULL;
4479
    struct qemud_save_header header;
4480
    virDomainEventPtr event = NULL;
4481 4482 4483
    int intermediatefd = -1;
    pid_t intermediate_pid = -1;
    int childstat;
4484

4485
    qemuDriverLock(driver);
4486 4487 4488
    /* Verify the header and read the XML */
    if ((fd = open(path, O_RDONLY)) < 0) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4489
                         "%s", _("cannot read domain image"));
4490
        goto cleanup;
4491 4492 4493 4494
    }

    if (saferead(fd, &header, sizeof(header)) != sizeof(header)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4495
                         "%s", _("failed to read qemu header"));
4496
        goto cleanup;
4497 4498 4499 4500
    }

    if (memcmp(header.magic, QEMUD_SAVE_MAGIC, sizeof(header.magic)) != 0) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4501
                         "%s", _("image magic is incorrect"));
4502
        goto cleanup;
4503 4504 4505 4506
    }

    if (header.version > QEMUD_SAVE_VERSION) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4507
                         _("image version is not supported (%d > %d)"),
4508
                         header.version, QEMUD_SAVE_VERSION);
4509
        goto cleanup;
4510 4511
    }

4512
    if (VIR_ALLOC_N(xml, header.xml_len) < 0) {
4513
        virReportOOMError(conn);
4514
        goto cleanup;
4515 4516 4517 4518
    }

    if (saferead(fd, xml, header.xml_len) != header.xml_len) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4519
                         "%s", _("failed to read XML"));
4520
        goto cleanup;
4521 4522 4523
    }

    /* Create a domain from this XML */
4524 4525
    if (!(def = virDomainDefParseString(conn, driver->caps, xml,
                                        VIR_DOMAIN_XML_INACTIVE))) {
4526
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4527
                         "%s", _("failed to parse XML"));
4528
        goto cleanup;
4529 4530
    }

4531 4532
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
4533

4534
    if (!(vm = virDomainAssignDef(conn,
4535
                                  driver->caps,
4536 4537
                                  &driver->domains,
                                  def))) {
4538
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4539
                         "%s", _("failed to assign new VM"));
4540
        goto cleanup;
4541
    }
4542
    def = NULL;
4543

4544 4545 4546
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

4547 4548
    if (header.version == 2) {
        const char *intermediate_argv[3] = { NULL, "-dc", NULL };
4549 4550
        const char *prog = qemudSaveCompressionTypeToString(header.compressed);
        if (prog == NULL) {
4551
            qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
4552
                             _("Invalid compressed save format %d"),
4553
                             header.compressed);
4554
            goto endjob;
4555
        }
4556

4557
        if (header.compressed != QEMUD_SAVE_FORMAT_RAW) {
4558
            intermediate_argv[0] = prog;
4559 4560 4561 4562 4563 4564 4565
            intermediatefd = fd;
            fd = -1;
            if (virExec(conn, intermediate_argv, NULL, NULL,
                        &intermediate_pid, intermediatefd, &fd, NULL, 0) < 0) {
                qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                 _("Failed to start decompression binary %s"),
                                 intermediate_argv[0]);
4566
                goto endjob;
4567 4568 4569
            }
        }
    }
4570
    /* Set the migration source and start it up. */
4571
    ret = qemudStartVMDaemon(conn, driver, vm, "stdio", fd);
4572 4573 4574 4575 4576 4577 4578
    if (intermediate_pid != -1) {
        /* Wait for intermediate process to exit */
        while (waitpid(intermediate_pid, &childstat, 0) == -1 &&
               errno == EINTR);
    }
    if (intermediatefd != -1)
        close(intermediatefd);
4579
    close(fd);
4580
    fd = -1;
4581
    if (ret < 0) {
4582
        if (!vm->persistent) {
4583 4584 4585
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains,
                                        vm);
4586 4587
            vm = NULL;
        }
4588
        goto endjob;
4589 4590
    }

4591 4592 4593
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_RESTORED);
4594

4595 4596
    /* If it was running before, resume it now. */
    if (header.was_running) {
4597
        qemuDomainObjPrivatePtr priv = vm->privateData;
4598
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
4599
        if (qemuMonitorStartCPUs(priv->mon, conn) < 0) {
4600 4601 4602
            if (virGetLastError() == NULL)
                qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                                 "%s", _("failed to resume domain"));
4603 4604
            qemuDomainObjExitMonitorWithDriver(driver,vm);
            goto endjob;
4605
        }
4606
        qemuDomainObjExitMonitorWithDriver(driver, vm);
4607
        vm->state = VIR_DOMAIN_RUNNING;
4608
        virDomainSaveStatus(conn, driver->caps, driver->stateDir, vm);
4609
    }
4610
    ret = 0;
4611

4612
endjob:
4613 4614 4615
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4616

4617 4618 4619 4620 4621
cleanup:
    virDomainDefFree(def);
    VIR_FREE(xml);
    if (fd != -1)
        close(fd);
4622 4623
    if (vm)
        virDomainObjUnlock(vm);
4624 4625
    if (event)
        qemuDomainEventQueue(driver, event);
4626
    qemuDriverUnlock(driver);
4627
    return ret;
D
Daniel P. Berrange 已提交
4628 4629 4630
}


4631
static char *qemudDomainDumpXML(virDomainPtr dom,
4632
                                int flags) {
4633 4634 4635
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    char *ret = NULL;
4636 4637
    unsigned long balloon;
    int err;
4638

4639
    qemuDriverLock(driver);
4640
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4641 4642
    qemuDriverUnlock(driver);

D
Daniel P. Berrange 已提交
4643
    if (!vm) {
4644 4645 4646 4647
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
4648
        goto cleanup;
D
Daniel P. Berrange 已提交
4649 4650
    }

4651
    /* Refresh current memory based on balloon info */
D
Daniel P. Berrange 已提交
4652
    if (virDomainObjIsActive(vm)) {
4653
        qemuDomainObjPrivatePtr priv = vm->privateData;
4654 4655 4656 4657 4658 4659 4660 4661 4662
        /* Don't delay if someone's using the monitor, just use
         * existing most recent data instead */
        if (!priv->jobActive) {
            if (qemuDomainObjBeginJob(vm) < 0)
                goto cleanup;

            qemuDomainObjEnterMonitor(vm);
            err = qemuMonitorGetBalloonInfo(priv->mon, &balloon);
            qemuDomainObjExitMonitor(vm);
4663 4664 4665 4666
            if (qemuDomainObjEndJob(vm) == 0) {
                vm = NULL;
                goto cleanup;
            }
4667 4668 4669 4670 4671 4672
            if (err < 0)
                goto cleanup;
            if (err > 0)
                vm->def->memory = balloon;
            /* err == 0 indicates no balloon support, so ignore it */
        }
4673
    }
4674

4675 4676 4677 4678 4679 4680
    ret = virDomainDefFormat(dom->conn,
                             (flags & VIR_DOMAIN_XML_INACTIVE) && vm->newDef ?
                             vm->newDef : vm->def,
                             flags);

cleanup:
4681 4682
    if (vm)
        virDomainObjUnlock(vm);
4683
    return ret;
D
Daniel P. Berrange 已提交
4684 4685 4686
}


4687 4688 4689 4690
static char *qemuDomainXMLFromNative(virConnectPtr conn,
                                     const char *format,
                                     const char *config,
                                     unsigned int flags ATTRIBUTE_UNUSED) {
4691
    struct qemud_driver *driver = conn->privateData;
4692 4693 4694 4695 4696 4697 4698 4699 4700
    virDomainDefPtr def = NULL;
    char *xml = NULL;

    if (STRNEQ(format, QEMU_CONFIG_FORMAT_ARGV)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INVALID_ARG,
                         _("unsupported config type %s"), format);
        goto cleanup;
    }

4701
    qemuDriverLock(driver);
4702
    def = qemuParseCommandLineString(conn, driver->caps, config);
4703
    qemuDriverUnlock(driver);
4704 4705 4706 4707 4708 4709 4710 4711 4712 4713
    if (!def)
        goto cleanup;

    xml = virDomainDefFormat(conn, def, VIR_DOMAIN_XML_INACTIVE);

cleanup:
    virDomainDefFree(def);
    return xml;
}

4714 4715 4716 4717 4718 4719
static char *qemuDomainXMLToNative(virConnectPtr conn,
                                   const char *format,
                                   const char *xmlData,
                                   unsigned int flags ATTRIBUTE_UNUSED) {
    struct qemud_driver *driver = conn->privateData;
    virDomainDefPtr def = NULL;
4720
    virDomainChrDef monConfig;
4721 4722 4723 4724 4725 4726 4727 4728 4729 4730
    const char *emulator;
    unsigned int qemuCmdFlags;
    struct stat sb;
    const char **retargv = NULL;
    const char **retenv = NULL;
    const char **tmp;
    virBuffer buf = VIR_BUFFER_INITIALIZER;
    char *ret = NULL;
    int i;

4731 4732
    qemuDriverLock(driver);

4733 4734 4735 4736 4737 4738 4739 4740 4741 4742 4743 4744 4745 4746 4747 4748 4749 4750 4751 4752 4753 4754 4755 4756 4757 4758 4759 4760 4761 4762 4763 4764 4765 4766 4767 4768 4769 4770 4771 4772 4773 4774 4775 4776 4777 4778 4779 4780 4781 4782 4783 4784 4785 4786 4787 4788 4789 4790 4791 4792 4793 4794 4795 4796 4797 4798
    if (STRNEQ(format, QEMU_CONFIG_FORMAT_ARGV)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INVALID_ARG,
                         _("unsupported config type %s"), format);
        goto cleanup;
    }

    def = virDomainDefParseString(conn, driver->caps, xmlData, 0);
    if (!def)
        goto cleanup;

    /* Since we're just exporting args, we can't do bridge/network
     * setups, since libvirt will normally create TAP devices
     * directly. We convert those configs into generic 'ethernet'
     * config and assume the user has suitable 'ifup-qemu' scripts
     */
    for (i = 0 ; i < def->nnets ; i++) {
        virDomainNetDefPtr net = def->nets[i];
        if (net->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
            VIR_FREE(net->data.network.name);

            memset(net, 0, sizeof *net);

            net->type = VIR_DOMAIN_NET_TYPE_ETHERNET;
            net->data.ethernet.dev = NULL;
            net->data.ethernet.script = NULL;
            net->data.ethernet.ipaddr = NULL;
        } else if (net->type == VIR_DOMAIN_NET_TYPE_BRIDGE) {
            char *brname = net->data.bridge.brname;
            char *script = net->data.bridge.script;
            char *ipaddr = net->data.bridge.ipaddr;

            memset(net, 0, sizeof *net);

            net->type = VIR_DOMAIN_NET_TYPE_ETHERNET;
            net->data.ethernet.dev = brname;
            net->data.ethernet.script = script;
            net->data.ethernet.ipaddr = ipaddr;
        }
    }
    for (i = 0 ; i < def->ngraphics ; i++) {
        if (def->graphics[i]->type == VIR_DOMAIN_GRAPHICS_TYPE_VNC &&
            def->graphics[i]->data.vnc.autoport)
            def->graphics[i]->data.vnc.port = 5900;
    }
    emulator = def->emulator;

    /* Make sure the binary we are about to try exec'ing exists.
     * Technically we could catch the exec() failure, but that's
     * in a sub-process so its hard to feed back a useful error
     */
    if (stat(emulator, &sb) < 0) {
        virReportSystemError(conn, errno,
                             _("Cannot find QEMU binary %s"),
                             emulator);
        goto cleanup;
    }

    if (qemudExtractVersionInfo(emulator,
                                NULL,
                                &qemuCmdFlags) < 0) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("Cannot determine QEMU argv syntax %s"),
                         emulator);
        goto cleanup;
    }

4799
    if (qemuPrepareMonitorChr(conn, driver, &monConfig, def->name) < 0)
4800
        goto cleanup;
4801 4802

    if (qemudBuildCommandLine(conn, driver, def,
D
Daniel P. Berrange 已提交
4803
                              &monConfig, 0, qemuCmdFlags,
4804 4805 4806 4807 4808 4809 4810 4811 4812 4813 4814 4815 4816 4817 4818 4819 4820 4821 4822
                              &retargv, &retenv,
                              NULL, NULL, /* Don't want it to create TAP devices */
                              NULL) < 0) {
        goto cleanup;
    }

    tmp = retenv;
    while (*tmp) {
        virBufferAdd(&buf, *tmp, strlen(*tmp));
        virBufferAddLit(&buf, " ");
        tmp++;
    }
    tmp = retargv;
    while (*tmp) {
        virBufferAdd(&buf, *tmp, strlen(*tmp));
        virBufferAddLit(&buf, " ");
        tmp++;
    }

4823 4824 4825
    if (virBufferError(&buf)) {
        virBufferFreeAndReset(&buf);
        virReportOOMError(conn);
4826
        goto cleanup;
4827
    }
4828 4829 4830 4831

    ret = virBufferContentAndReset(&buf);

cleanup:
4832
    qemuDriverUnlock(driver);
4833 4834 4835 4836 4837 4838 4839 4840 4841 4842 4843 4844 4845
    for (tmp = retargv ; tmp && *tmp ; tmp++)
        VIR_FREE(*tmp);
    VIR_FREE(retargv);

    for (tmp = retenv ; tmp && *tmp ; tmp++)
        VIR_FREE(*tmp);
    VIR_FREE(retenv);

    virDomainDefFree(def);
    return ret;
}


4846
static int qemudListDefinedDomains(virConnectPtr conn,
4847
                            char **const names, int nnames) {
4848
    struct qemud_driver *driver = conn->privateData;
4849
    int n;
4850

4851
    qemuDriverLock(driver);
4852
    n = virDomainObjListGetInactiveNames(&driver->domains, names, nnames);
4853
    qemuDriverUnlock(driver);
4854
    return n;
D
Daniel P. Berrange 已提交
4855 4856
}

4857
static int qemudNumDefinedDomains(virConnectPtr conn) {
4858
    struct qemud_driver *driver = conn->privateData;
4859
    int n;
4860

4861
    qemuDriverLock(driver);
4862
    n = virDomainObjListNumOfDomains(&driver->domains, 0);
4863
    qemuDriverUnlock(driver);
4864

4865
    return n;
D
Daniel P. Berrange 已提交
4866 4867 4868
}


4869
static int qemudDomainStart(virDomainPtr dom) {
4870 4871 4872
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
4873
    virDomainEventPtr event = NULL;
4874

4875
    qemuDriverLock(driver);
4876
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
4877

4878
    if (!vm) {
4879 4880 4881 4882
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
4883
        goto cleanup;
4884 4885
    }

4886 4887 4888 4889 4890 4891 4892 4893 4894
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

    if (virDomainObjIsActive(vm)) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
                         "%s", _("domain is already running"));
        goto endjob;
    }

4895
    ret = qemudStartVMDaemon(dom->conn, driver, vm, NULL, -1);
4896
    if (ret != -1)
4897 4898 4899
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STARTED,
                                         VIR_DOMAIN_EVENT_STARTED_BOOTED);
4900

4901
endjob:
4902 4903
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
4904

4905
cleanup:
4906 4907
    if (vm)
        virDomainObjUnlock(vm);
4908
    if (event)
4909
        qemuDomainEventQueue(driver, event);
4910
    qemuDriverUnlock(driver);
4911
    return ret;
D
Daniel P. Berrange 已提交
4912 4913
}

4914 4915 4916 4917 4918 4919 4920 4921 4922 4923 4924 4925 4926 4927 4928
static int
qemudCanonicalizeMachineFromInfo(virDomainDefPtr def,
                                 virCapsGuestDomainInfoPtr info,
                                 char **canonical)
{
    int i;

    *canonical = NULL;

    for (i = 0; i < info->nmachines; i++) {
        virCapsGuestMachinePtr machine = info->machines[i];

        if (!machine->canonical)
            continue;

4929
        if (STRNEQ(def->os.machine, machine->name))
4930 4931 4932 4933 4934 4935 4936 4937 4938 4939 4940 4941 4942
            continue;

        if (!(*canonical = strdup(machine->canonical))) {
            virReportOOMError(NULL);
            return -1;
        }

        break;
    }

    return 0;
}

4943 4944 4945 4946 4947 4948 4949 4950 4951 4952 4953 4954 4955 4956 4957
static int
qemudCanonicalizeMachineDirect(virDomainDefPtr def, char **canonical)
{
    virCapsGuestMachinePtr *machines = NULL;
    int i, nmachines = 0;

    if (qemudProbeMachineTypes(def->emulator, &machines, &nmachines) < 0) {
        virReportOOMError(NULL);
        return -1;
    }

    for (i = 0; i < nmachines; i++) {
        if (!machines[i]->canonical)
            continue;

4958
        if (STRNEQ(def->os.machine, machines[i]->name))
4959 4960 4961 4962 4963 4964 4965 4966 4967 4968 4969 4970
            continue;

        *canonical = machines[i]->canonical;
        machines[i]->canonical = NULL;
        break;
    }

    virCapabilitiesFreeMachines(machines, nmachines);

    return 0;
}

4971 4972
int
qemudCanonicalizeMachine(struct qemud_driver *driver, virDomainDefPtr def)
4973 4974 4975 4976 4977 4978
{
    char *canonical = NULL;
    int i;

    for (i = 0; i < driver->caps->nguests; i++) {
        virCapsGuestPtr guest = driver->caps->guests[i];
4979
        virCapsGuestDomainInfoPtr info;
4980 4981 4982
        int j;

        for (j = 0; j < guest->arch.ndomains; j++) {
4983
            info = &guest->arch.domains[j]->info;
4984

4985 4986 4987 4988 4989 4990 4991 4992 4993
            if (!info->emulator || !STREQ(info->emulator, def->emulator))
                continue;

            if (!info->nmachines)
                info = &guest->arch.defaultInfo;

            if (qemudCanonicalizeMachineFromInfo(def, info, &canonical) < 0)
                return -1;
            goto out;
4994 4995
        }

4996 4997 4998 4999
        info = &guest->arch.defaultInfo;

        if (info->emulator && STREQ(info->emulator, def->emulator)) {
            if (qemudCanonicalizeMachineFromInfo(def, info, &canonical) < 0)
5000 5001 5002 5003
                return -1;
            goto out;
        }
    }
5004 5005 5006 5007

    if (qemudCanonicalizeMachineDirect(def, &canonical) < 0)
        return -1;

5008 5009 5010 5011 5012 5013 5014
out:
    if (canonical) {
        VIR_FREE(def->os.machine);
        def->os.machine = canonical;
    }
    return 0;
}
D
Daniel P. Berrange 已提交
5015

5016
static virDomainPtr qemudDomainDefine(virConnectPtr conn, const char *xml) {
5017
    struct qemud_driver *driver = conn->privateData;
5018
    virDomainDefPtr def;
5019
    virDomainObjPtr vm = NULL;
5020
    virDomainPtr dom = NULL;
5021
    virDomainEventPtr event = NULL;
5022
    int dupVM;
5023

5024
    qemuDriverLock(driver);
5025 5026
    if (!(def = virDomainDefParseString(conn, driver->caps, xml,
                                        VIR_DOMAIN_XML_INACTIVE)))
5027
        goto cleanup;
5028

5029 5030 5031
    if (virSecurityDriverVerify(conn, def) < 0)
        goto cleanup;

5032 5033
    if ((dupVM = virDomainObjIsDuplicate(&driver->domains, def, 0)) < 0)
        goto cleanup;
5034

5035
    if (qemudCanonicalizeMachine(driver, def) < 0)
5036 5037
        goto cleanup;

5038
    if (!(vm = virDomainAssignDef(conn,
5039
                                  driver->caps,
5040 5041
                                  &driver->domains,
                                  def))) {
5042
        goto cleanup;
5043
    }
5044
    def = NULL;
5045
    vm->persistent = 1;
5046

5047 5048
    if (virDomainSaveConfig(conn,
                            driver->configDir,
5049
                            vm->newDef ? vm->newDef : vm->def) < 0) {
5050 5051
        virDomainRemoveInactive(&driver->domains,
                                vm);
5052
        vm = NULL;
5053
        goto cleanup;
5054 5055
    }

5056 5057
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_DEFINED,
5058
                                     !dupVM ?
5059 5060
                                     VIR_DOMAIN_EVENT_DEFINED_ADDED :
                                     VIR_DOMAIN_EVENT_DEFINED_UPDATED);
5061

5062
    dom = virGetDomain(conn, vm->def->name, vm->def->uuid);
5063
    if (dom) dom->id = vm->def->id;
5064 5065

cleanup:
5066
    virDomainDefFree(def);
5067 5068
    if (vm)
        virDomainObjUnlock(vm);
5069 5070
    if (event)
        qemuDomainEventQueue(driver, event);
5071
    qemuDriverUnlock(driver);
5072
    return dom;
D
Daniel P. Berrange 已提交
5073 5074
}

5075
static int qemudDomainUndefine(virDomainPtr dom) {
5076 5077
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
5078
    virDomainEventPtr event = NULL;
5079
    int ret = -1;
D
Daniel P. Berrange 已提交
5080

5081
    qemuDriverLock(driver);
5082
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
5083

D
Daniel P. Berrange 已提交
5084
    if (!vm) {
5085 5086 5087 5088
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
5089
        goto cleanup;
D
Daniel P. Berrange 已提交
5090 5091
    }

D
Daniel P. Berrange 已提交
5092
    if (virDomainObjIsActive(vm)) {
5093
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
5094
                         "%s", _("cannot delete active domain"));
5095
        goto cleanup;
D
Daniel P. Berrange 已提交
5096 5097
    }

5098 5099 5100
    if (!vm->persistent) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("cannot undefine transient domain"));
5101
        goto cleanup;
5102 5103 5104
    }

    if (virDomainDeleteConfig(dom->conn, driver->configDir, driver->autostartDir, vm) < 0)
5105
        goto cleanup;
D
Daniel P. Berrange 已提交
5106

5107 5108 5109
    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_UNDEFINED,
                                     VIR_DOMAIN_EVENT_UNDEFINED_REMOVED);
5110

5111 5112
    virDomainRemoveInactive(&driver->domains,
                            vm);
5113
    vm = NULL;
5114
    ret = 0;
D
Daniel P. Berrange 已提交
5115

5116
cleanup:
5117 5118
    if (vm)
        virDomainObjUnlock(vm);
5119 5120
    if (event)
        qemuDomainEventQueue(driver, event);
5121
    qemuDriverUnlock(driver);
5122
    return ret;
D
Daniel P. Berrange 已提交
5123 5124
}

5125

5126
static int qemudDomainChangeEjectableMedia(virConnectPtr conn,
5127
                                           struct qemud_driver *driver,
5128
                                           virDomainObjPtr vm,
5129
                                           virDomainDiskDefPtr disk)
5130
{
5131
    virDomainDiskDefPtr origdisk = NULL;
5132
    int i;
5133
    int ret;
5134

5135
    origdisk = NULL;
5136
    for (i = 0 ; i < vm->def->ndisks ; i++) {
5137 5138
        if (vm->def->disks[i]->bus == disk->bus &&
            STREQ(vm->def->disks[i]->dst, disk->dst)) {
5139
            origdisk = vm->def->disks[i];
5140
            break;
5141
        }
5142 5143 5144
    }

    if (!origdisk) {
5145
        qemudReportError(conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
5146
                         _("No device with bus '%s' and target '%s'"),
5147 5148
                         virDomainDiskBusTypeToString(disk->bus),
                         disk->dst);
5149 5150 5151
        return -1;
    }

5152 5153 5154 5155 5156
    if (!origdisk->info.alias) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("missing disk device alias name for %s"), origdisk->dst);
        return -1;
    }
5157

5158 5159 5160 5161
    if (origdisk->device != VIR_DOMAIN_DISK_DEVICE_FLOPPY &&
        origdisk->device != VIR_DOMAIN_DISK_DEVICE_CDROM) {
        qemudReportError(conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("Removable media not supported for %s device"),
5162
                         virDomainDiskDeviceTypeToString(disk->device));
5163
        return -1;
5164
    }
5165

5166 5167
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
5168
        driver->securityDriver->domainSetSecurityImageLabel(conn, vm, disk) < 0)
5169 5170
        return -1;

5171
    qemuDomainObjPrivatePtr priv = vm->privateData;
5172
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5173
    if (disk->src) {
5174
        const char *format = NULL;
5175 5176 5177
        if (disk->type != VIR_DOMAIN_DISK_TYPE_DIR) {
            if (disk->driverType)
                format = disk->driverType;
5178 5179 5180
            else if (origdisk->driverType)
                format = origdisk->driverType;
        }
5181 5182
        ret = qemuMonitorChangeMedia(priv->mon,
                                     origdisk->info.alias,
5183
                                     disk->src, format);
5184
    } else {
5185
        ret = qemuMonitorEjectMedia(priv->mon, origdisk->info.alias);
5186
    }
5187
    qemuDomainObjExitMonitorWithDriver(driver, vm);
5188

5189 5190 5191 5192 5193 5194 5195 5196 5197
    if (ret < 0)
        goto error;

    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
        driver->securityDriver->domainRestoreSecurityImageLabel(conn, vm, origdisk) < 0)
        VIR_WARN("Unable to restore security label on ejected image %s", origdisk->src);

    VIR_FREE(origdisk->src);
5198 5199 5200 5201 5202
    origdisk->src = disk->src;
    disk->src = NULL;
    origdisk->type = disk->type;

    virDomainDiskDefFree(disk);
5203

5204
    return ret;
5205 5206 5207 5208

error:
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
5209 5210
        driver->securityDriver->domainRestoreSecurityImageLabel(conn, vm, disk) < 0)
        VIR_WARN("Unable to restore security label on new media %s", disk->src);
5211
    return -1;
5212 5213
}

5214

5215
static int qemudDomainAttachPciDiskDevice(virConnectPtr conn,
5216
                                          struct qemud_driver *driver,
5217
                                          virDomainObjPtr vm,
5218 5219
                                          virDomainDiskDefPtr disk,
                                          int qemuCmdFlags)
5220
{
5221
    int i, ret;
5222
    const char* type = virDomainDiskBusTypeToString(disk->bus);
5223
    qemuDomainObjPrivatePtr priv = vm->privateData;
5224 5225
    char *devstr = NULL;
    char *drivestr = NULL;
5226 5227

    for (i = 0 ; i < vm->def->ndisks ; i++) {
5228
        if (STREQ(vm->def->disks[i]->dst, disk->dst)) {
5229
            qemudReportError(conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
5230
                           _("target %s already exists"), disk->dst);
5231 5232 5233 5234
            return -1;
        }
    }

5235 5236
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
5237
        driver->securityDriver->domainSetSecurityImageLabel(conn, vm, disk) < 0)
5238 5239
        return -1;

5240
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
5241 5242 5243
        if (qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &disk->info) < 0)
            goto error;

5244 5245 5246 5247 5248 5249 5250
        if (!(drivestr = qemuBuildDriveStr(disk, 0, qemuCmdFlags)))
            goto error;

        if (!(devstr = qemuBuildDriveDevStr(NULL, disk)))
            goto error;
    }

5251
    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0) {
5252
        virReportOOMError(conn);
5253
        goto error;
5254 5255
    }

5256
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5257 5258 5259 5260 5261 5262 5263 5264 5265 5266 5267 5268 5269 5270 5271 5272
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDrive(priv->mon, drivestr);
        if (ret == 0)
            qemuMonitorAddDevice(priv->mon, devstr);
            /* XXX remove the drive upon fail */
    } else {
        virDomainDevicePCIAddress guestAddr;
        ret = qemuMonitorAddPCIDisk(priv->mon,
                                    disk->src,
                                    type,
                                    &guestAddr);
        if (ret == 0) {
            disk->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
            memcpy(&disk->info.addr.pci, &guestAddr, sizeof(guestAddr));
        }
    }
5273
    qemuDomainObjExitMonitorWithDriver(driver, vm);
5274

5275 5276
    if (ret < 0)
        goto error;
5277

5278
    virDomainDiskInsertPreAlloced(vm->def, disk);
5279

5280 5281 5282
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

5283 5284 5285
    return 0;

error:
5286 5287 5288
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

5289 5290 5291 5292 5293
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (disk->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &disk->info) < 0)
        VIR_WARN("Unable to release PCI address on %s", disk->src);

5294 5295
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
5296 5297
        driver->securityDriver->domainRestoreSecurityImageLabel(conn, vm, disk) < 0)
        VIR_WARN("Unable to restore security label on %s", disk->src);
5298 5299

    return -1;
5300
}
5301

5302

5303 5304 5305
static int qemudDomainAttachPciControllerDevice(virConnectPtr conn,
                                                struct qemud_driver *driver,
                                                virDomainObjPtr vm,
5306 5307
                                                virDomainControllerDefPtr controller,
                                                int qemuCmdFlags)
5308
{
5309 5310
    int i;
    int ret = -1;
5311
    const char* type = virDomainControllerTypeToString(controller->type);
5312
    char *devstr = NULL;
5313 5314 5315
    qemuDomainObjPrivatePtr priv = vm->privateData;

    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
5316 5317
        if ((vm->def->controllers[i]->type == controller->type) &&
            (vm->def->controllers[i]->idx == controller->idx)) {
5318 5319
            qemudReportError(conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                             _("target %s:%d already exists"),
5320
                             type, controller->idx);
5321 5322 5323 5324
            return -1;
        }
    }

5325 5326 5327 5328
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &controller->info) < 0)
        goto cleanup;

5329 5330 5331 5332 5333
    if (!(devstr = qemuBuildControllerDevStr(controller))) {
        virReportOOMError(NULL);
        goto cleanup;
    }

5334
    if (VIR_REALLOC_N(vm->def->controllers, vm->def->ncontrollers+1) < 0) {
5335 5336
        virReportOOMError(NULL);
        goto cleanup;
5337 5338 5339
    }

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5340 5341 5342 5343 5344 5345 5346
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDevice(priv->mon, devstr);
    } else {
        ret = qemuMonitorAttachPCIDiskController(priv->mon,
                                                 type,
                                                 &controller->info.addr.pci);
    }
5347 5348 5349
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    if (ret == 0) {
5350 5351
        controller->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
        virDomainControllerInsertPreAlloced(vm->def, controller);
5352 5353
    }

5354
cleanup:
5355 5356 5357 5358 5359 5360
    if ((ret != 0) &&
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (controller->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &controller->info) < 0)
        VIR_WARN0("Unable to release PCI address on controller");

5361
    VIR_FREE(devstr);
5362 5363 5364
    return ret;
}

5365

5366 5367 5368 5369
static virDomainControllerDefPtr
qemuDomainFindOrCreateSCSIDiskController(virConnectPtr conn,
                                         struct qemud_driver *driver,
                                         virDomainObjPtr vm,
5370 5371
                                         int controller,
                                         int qemuCmdFlags)
5372 5373 5374 5375 5376 5377 5378 5379 5380 5381 5382 5383 5384 5385 5386 5387 5388 5389 5390 5391 5392 5393 5394 5395
{
    int i;
    virDomainControllerDefPtr cont;
    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
        cont = vm->def->controllers[i];

        if (cont->type != VIR_DOMAIN_CONTROLLER_TYPE_SCSI)
            continue;

        if (cont->idx == controller)
            return cont;
    }

    /* No SCSI controller present, for back compatability we
     * now hotplug a controller */
    if (VIR_ALLOC(cont) < 0) {
        virReportOOMError(conn);
        return NULL;
    }
    cont->type = VIR_DOMAIN_CONTROLLER_TYPE_SCSI;
    cont->idx = 0;

    VIR_INFO0("No SCSI controller present, hotplugging one");
    if (qemudDomainAttachPciControllerDevice(conn, driver,
5396
                                             vm, cont, qemuCmdFlags) < 0) {
5397 5398 5399 5400 5401 5402
        VIR_FREE(cont);
        return NULL;
    }
    return cont;
}

5403

5404 5405 5406
static int qemudDomainAttachSCSIDisk(virConnectPtr conn,
                                     struct qemud_driver *driver,
                                     virDomainObjPtr vm,
5407
                                     virDomainDiskDefPtr disk,
5408 5409 5410 5411 5412 5413
                                     int qemuCmdFlags)
{
    int i;
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainControllerDefPtr cont;
    char *drivestr = NULL;
5414
    char *devstr = NULL;
5415 5416 5417
    int ret = -1;

    for (i = 0 ; i < vm->def->ndisks ; i++) {
5418
        if (STREQ(vm->def->disks[i]->dst, disk->dst)) {
5419
            qemudReportError(conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
5420
                           _("target %s already exists"), disk->dst);
5421
            return -1;
5422 5423 5424
        }
    }

5425 5426 5427

    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
5428
        driver->securityDriver->domainSetSecurityImageLabel(conn, vm, disk) < 0)
5429 5430
        return -1;

5431 5432 5433
    /* This func allocates the bus/unit IDs so must be before
     * we search for controller
     */
5434
    if (!(drivestr = qemuBuildDriveStr(disk, 0, qemuCmdFlags)))
5435
        goto error;
5436

5437 5438 5439
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        !(devstr = qemuBuildDriveDevStr(NULL, disk)))
        goto error;
5440 5441

    /* We should have an adddress now, so make sure */
5442
    if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE) {
5443 5444
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("unexpected disk address type %s"),
5445
                         virDomainDeviceAddressTypeToString(disk->info.type));
5446
        goto error;
5447 5448
    }

5449
    for (i = 0 ; i <= disk->info.addr.drive.controller ; i++) {
5450
        cont = qemuDomainFindOrCreateSCSIDiskController(conn, driver, vm, i, qemuCmdFlags);
5451
        if (!cont)
5452
            goto error;
5453 5454 5455 5456 5457
    }

    if (cont->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("SCSI controller %d was missing its PCI address"), cont->idx);
5458
        goto error;
5459 5460 5461 5462
    }

    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0) {
        virReportOOMError(conn);
5463
        goto error;
5464 5465 5466
    }

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5467 5468 5469 5470 5471 5472 5473 5474 5475 5476 5477 5478 5479 5480 5481 5482 5483 5484 5485 5486
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDrive(priv->mon,
                                  drivestr);
        if (ret == 0)
            ret = qemuMonitorAddDevice(priv->mon,
                                       devstr);
            /* XXX should call 'drive_del' on error but this does not exist yet */
    } else {
        virDomainDeviceDriveAddress driveAddr;
        ret = qemuMonitorAttachDrive(priv->mon,
                                     drivestr,
                                     &cont->info.addr.pci,
                                     &driveAddr);
        if (ret == 0) {
            /* XXX we should probably validate that the addr matches
             * our existing defined addr instead of overwriting */
            disk->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE;
            memcpy(&disk->info.addr.drive, &driveAddr, sizeof(driveAddr));
        }
    }
5487 5488
    qemuDomainObjExitMonitorWithDriver(driver, vm);

5489 5490
    if (ret < 0)
        goto error;
5491

5492
    virDomainDiskInsertPreAlloced(vm->def, disk);
5493 5494

    VIR_FREE(devstr);
5495
    VIR_FREE(drivestr);
5496 5497 5498 5499

    return 0;

error:
5500
    VIR_FREE(devstr);
5501
    VIR_FREE(drivestr);
5502

5503 5504
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
5505 5506
        driver->securityDriver->domainRestoreSecurityImageLabel(conn, vm, disk) < 0)
        VIR_WARN("Unable to restore security label on %s", disk->src);
5507 5508

    return -1;
5509 5510
}

5511

5512
static int qemudDomainAttachUsbMassstorageDevice(virConnectPtr conn,
5513
                                                 struct qemud_driver *driver,
5514
                                                 virDomainObjPtr vm,
5515 5516
                                                 virDomainDiskDefPtr disk,
                                                 int qemuCmdFlags)
5517
{
5518
    qemuDomainObjPrivatePtr priv = vm->privateData;
5519
    int i, ret;
5520 5521
    char *drivestr = NULL;
    char *devstr = NULL;
5522

5523
    for (i = 0 ; i < vm->def->ndisks ; i++) {
5524
        if (STREQ(vm->def->disks[i]->dst, disk->dst)) {
5525
            qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
5526
                           _("target %s already exists"), disk->dst);
5527 5528 5529 5530
            return -1;
        }
    }

5531 5532
    if (driver->securityDriver &&
        driver->securityDriver->domainSetSecurityImageLabel &&
5533
        driver->securityDriver->domainSetSecurityImageLabel(conn, vm, disk) < 0)
5534 5535
        return -1;

5536
    if (!disk->src) {
5537 5538
        qemudReportError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("disk source path is missing"));
5539
        goto error;
5540 5541
    }

5542 5543 5544 5545 5546 5547 5548
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (!(drivestr = qemuBuildDriveStr(disk, 0, qemuCmdFlags)))
            goto error;
        if (!(devstr = qemuBuildDriveDevStr(NULL, disk)))
            goto error;
    }

5549
    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks+1) < 0) {
5550
        virReportOOMError(conn);
5551
        goto error;
5552 5553
    }

5554
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5555 5556 5557 5558 5559 5560 5561 5562 5563 5564
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        ret = qemuMonitorAddDrive(priv->mon,
                                  drivestr);
        if (ret == 0)
            ret = qemuMonitorAddDevice(priv->mon,
                                       devstr);
            /* XXX should call 'drive_del' on error but this does not exist yet */
    } else {
        ret = qemuMonitorAddUSBDisk(priv->mon, disk->src);
    }
5565
    qemuDomainObjExitMonitorWithDriver(driver, vm);
5566

5567 5568 5569
    if (ret < 0)
        goto error;

5570
    virDomainDiskInsertPreAlloced(vm->def, disk);
5571

5572 5573 5574
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

5575 5576 5577
    return 0;

error:
5578 5579 5580
    VIR_FREE(devstr);
    VIR_FREE(drivestr);

5581 5582
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
5583 5584
        driver->securityDriver->domainRestoreSecurityImageLabel(conn, vm, disk) < 0)
        VIR_WARN("Unable to restore security label on %s", disk->src);
5585 5586

    return -1;
5587 5588
}

5589

M
Mark McLoughlin 已提交
5590
static int qemudDomainAttachNetDevice(virConnectPtr conn,
5591
                                      struct qemud_driver *driver,
M
Mark McLoughlin 已提交
5592
                                      virDomainObjPtr vm,
5593
                                      virDomainNetDefPtr net,
M
Mark McLoughlin 已提交
5594 5595
                                      unsigned int qemuCmdFlags)
{
5596
    qemuDomainObjPrivatePtr priv = vm->privateData;
5597
    char *tapfd_name = NULL;
5598
    int tapfd = -1;
5599
    char *nicstr = NULL;
5600
    char *netstr = NULL;
5601
    int ret = -1;
5602
    virDomainDevicePCIAddress guestAddr;
5603
    int vlan;
M
Mark McLoughlin 已提交
5604 5605 5606 5607 5608 5609 5610 5611 5612

    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_HOST_NET_ADD)) {
        qemudReportError(conn, dom, NULL, VIR_ERR_NO_SUPPORT, "%s",
                         _("installed qemu version does not support host_net_add"));
        return -1;
    }

    if (net->type == VIR_DOMAIN_NET_TYPE_BRIDGE ||
        net->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
5613
        if (priv->monConfig->type != VIR_DOMAIN_CHR_TYPE_UNIX) {
5614 5615 5616 5617 5618 5619 5620 5621 5622
            qemudReportError(conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                             _("network device type '%s' cannot be attached: "
                               "qemu is not using a unix socket monitor"),
                             virDomainNetTypeToString(net->type));
            return -1;
        }

        if ((tapfd = qemudNetworkIfaceConnect(conn, driver, net, qemuCmdFlags)) < 0)
            return -1;
M
Mark McLoughlin 已提交
5623 5624
    }

5625 5626
    if (VIR_REALLOC_N(vm->def->nets, vm->def->nnets+1) < 0)
        goto no_memory;
M
Mark McLoughlin 已提交
5627

5628 5629 5630 5631 5632
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_NET_NAME) ||
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)) {
        if (qemuAssignDeviceNetAlias(vm->def, net, -1) < 0)
            goto cleanup;
    }
M
Mark McLoughlin 已提交
5633

5634 5635 5636 5637
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &net->info) < 0)
        goto cleanup;

5638
    vlan = qemuDomainNetVLAN(net);
M
Mark McLoughlin 已提交
5639

5640 5641 5642 5643 5644 5645
    if (vlan < 0) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_NO_SUPPORT, "%s",
                         _("Unable to attach network devices without vlan"));
        goto cleanup;
    }

5646
    if (tapfd != -1) {
5647
        if (virAsprintf(&tapfd_name, "fd-%s", net->info.alias) < 0)
5648 5649
            goto no_memory;

5650
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
5651
        if (qemuMonitorSendFileHandle(priv->mon, tapfd_name, tapfd) < 0) {
5652
            qemuDomainObjExitMonitorWithDriver(driver, vm);
5653
            goto cleanup;
5654
        }
5655
        qemuDomainObjExitMonitorWithDriver(driver, vm);
5656 5657
    }

5658
    if (!(netstr = qemuBuildHostNetStr(conn, net, ' ',
5659
                                       vlan, tapfd_name)))
5660
        goto try_tapfd_close;
M
Mark McLoughlin 已提交
5661

5662
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5663
    if (qemuMonitorAddHostNetwork(priv->mon, netstr) < 0) {
5664
        qemuDomainObjExitMonitorWithDriver(driver, vm);
5665
        goto try_tapfd_close;
5666
    }
5667
    qemuDomainObjExitMonitorWithDriver(driver, vm);
M
Mark McLoughlin 已提交
5668

5669 5670 5671
    if (tapfd != -1)
        close(tapfd);
    tapfd = -1;
M
Mark McLoughlin 已提交
5672

5673
    if (!(nicstr = qemuBuildNicStr(conn, net, NULL, vlan)))
5674
        goto try_remove;
M
Mark McLoughlin 已提交
5675

5676
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5677
    if (qemuMonitorAddPCINetwork(priv->mon, nicstr,
5678
                                 &guestAddr) < 0) {
5679
        qemuDomainObjExitMonitorWithDriver(driver, vm);
5680
        goto try_remove;
5681
    }
5682
    net->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
5683
    memcpy(&net->info.addr.pci, &guestAddr, sizeof(guestAddr));
5684
    qemuDomainObjExitMonitorWithDriver(driver, vm);
5685

5686
    ret = 0;
M
Mark McLoughlin 已提交
5687 5688 5689

    vm->def->nets[vm->def->nnets++] = net;

5690
cleanup:
5691 5692 5693 5694 5695 5696
    if ((ret != 0) &&
        (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (net->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &net->info) < 0)
        VIR_WARN0("Unable to release PCI address on NIC");

5697 5698 5699 5700 5701
    VIR_FREE(nicstr);
    VIR_FREE(netstr);
    VIR_FREE(tapfd_name);
    if (tapfd != -1)
        close(tapfd);
5702

5703
    return ret;
5704

5705
try_remove:
5706
    if (vlan < 0) {
5707
        VIR_WARN0(_("Unable to remove network backend"));
5708 5709 5710 5711
    } else {
        char *hostnet_name;
        if (virAsprintf(&hostnet_name, "host%s", net->info.alias) < 0)
            goto no_memory;
5712
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
5713
        if (qemuMonitorRemoveHostNetwork(priv->mon, vlan, hostnet_name) < 0)
5714
            VIR_WARN(_("Failed to remove network backend for vlan %d, net %s"),
5715
                     vlan, hostnet_name);
5716
        qemuDomainObjExitMonitorWithDriver(driver, vm);
5717
        VIR_FREE(hostnet_name);
5718
    }
5719
    goto cleanup;
5720

5721
try_tapfd_close:
5722
    if (tapfd_name) {
5723
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
5724
        if (qemuMonitorCloseFileHandle(priv->mon, tapfd_name) < 0)
5725
            VIR_WARN(_("Failed to close tapfd with '%s'"), tapfd_name);
5726
        qemuDomainObjExitMonitorWithDriver(driver, vm);
5727
    }
5728

5729 5730
    goto cleanup;

5731 5732
no_memory:
    virReportOOMError(conn);
5733
    goto cleanup;
M
Mark McLoughlin 已提交
5734 5735
}

5736

5737
static int qemudDomainAttachHostPciDevice(virConnectPtr conn,
5738
                                          struct qemud_driver *driver,
5739
                                          virDomainObjPtr vm,
5740 5741
                                          virDomainHostdevDefPtr hostdev,
                                          int qemuCmdFlags)
5742
{
5743
    qemuDomainObjPrivatePtr priv = vm->privateData;
5744
    pciDevice *pci;
5745
    int ret;
5746
    virDomainDevicePCIAddress guestAddr;
5747
    char *devstr = NULL;
5748 5749 5750 5751 5752 5753

    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs+1) < 0) {
        virReportOOMError(conn);
        return -1;
    }

5754 5755 5756 5757 5758
    pci = pciGetDevice(conn,
                       hostdev->source.subsys.u.pci.domain,
                       hostdev->source.subsys.u.pci.bus,
                       hostdev->source.subsys.u.pci.slot,
                       hostdev->source.subsys.u.pci.function);
5759
    if (!pci)
5760
        return -1;
5761

5762 5763
    if (!pciDeviceIsAssignable(conn, pci, !driver->relaxedACS) ||
        (hostdev->managed && pciDettachDevice(conn, pci) < 0) ||
5764 5765 5766 5767 5768 5769
        pciResetDevice(conn, pci, driver->activePciHostdevs) < 0) {
        pciFreeDevice(conn, pci);
        return -1;
    }

    if (pciDeviceListAdd(conn, driver->activePciHostdevs, pci) < 0) {
5770
        pciFreeDevice(conn, pci);
5771
        return -1;
5772 5773
    }

5774 5775 5776 5777 5778 5779 5780
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) {
        if (qemuDomainPCIAddressEnsureAddr(priv->pciaddrs, &hostdev->info) < 0)
            goto error;

        if (!(devstr = qemuBuildPCIHostdevDevStr(hostdev)))
            goto error;
    }
5781

5782
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5783 5784 5785 5786 5787 5788
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)
        ret = qemuMonitorAddDevice(priv->mon, devstr);
    else
        ret = qemuMonitorAddPCIHostDevice(priv->mon,
                                          &hostdev->source.subsys.u.pci,
                                          &guestAddr);
5789
    qemuDomainObjExitMonitorWithDriver(driver, vm);
5790
    if (ret < 0)
5791
        goto error;
5792
    hostdev->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI;
5793
    memcpy(&hostdev->info.addr.pci, &guestAddr, sizeof(guestAddr));
5794 5795 5796

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;

5797 5798
    VIR_FREE(devstr);

5799
    return 0;
5800 5801

error:
5802 5803 5804 5805 5806
    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        (hostdev->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
        qemuDomainPCIAddressReleaseAddr(priv->pciaddrs, &hostdev->info) < 0)
        VIR_WARN0("Unable to release PCI address on host device");

5807
    VIR_FREE(devstr);
5808 5809 5810
    pciDeviceListDel(conn, driver->activePciHostdevs, pci);

    return -1;
5811 5812
}

5813

M
Mark McLoughlin 已提交
5814
static int qemudDomainAttachHostUsbDevice(virConnectPtr conn,
5815
                                          struct qemud_driver *driver,
M
Mark McLoughlin 已提交
5816
                                          virDomainObjPtr vm,
5817 5818
                                          virDomainHostdevDefPtr hostdev,
                                          int qemuCmdFlags)
5819 5820
{
    int ret;
5821
    qemuDomainObjPrivatePtr priv = vm->privateData;
5822 5823 5824 5825 5826
    char *devstr = NULL;

    if ((qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE) &&
        !(devstr = qemuBuildPCIHostdevDevStr(hostdev)))
        goto error;
5827

5828
    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs+1) < 0) {
5829
        virReportOOMError(conn);
5830
        goto error;
5831
    }
5832

5833
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
5834 5835 5836
    if (qemuCmdFlags & QEMUD_CMD_FLAG_DEVICE)
        ret = qemuMonitorAddDevice(priv->mon, devstr);
    else
5837
        ret = qemuMonitorAddUSBDeviceExact(priv->mon,
5838 5839
                                           hostdev->source.subsys.u.usb.bus,
                                           hostdev->source.subsys.u.usb.device);
5840
    qemuDomainObjExitMonitorWithDriver(driver, vm);
5841 5842 5843 5844
    if (ret < 0)
        goto error;

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;
5845

5846
    VIR_FREE(devstr);
5847

5848 5849 5850 5851 5852
    return 0;

error:
    VIR_FREE(devstr);
    return -1;
5853 5854
}

5855

M
Mark McLoughlin 已提交
5856 5857 5858
static int qemudDomainAttachHostDevice(virConnectPtr conn,
                                       struct qemud_driver *driver,
                                       virDomainObjPtr vm,
5859 5860
                                       virDomainHostdevDefPtr hostdev,
                                       int qemuCmdFlags)
M
Mark McLoughlin 已提交
5861 5862 5863 5864 5865 5866 5867 5868
{
    if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS) {
        qemudReportError(conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         _("hostdev mode '%s' not supported"),
                         virDomainHostdevModeTypeToString(hostdev->mode));
        return -1;
    }

5869
    if (driver->securityDriver &&
5870
        driver->securityDriver->domainSetSecurityHostdevLabel &&
5871
        driver->securityDriver->domainSetSecurityHostdevLabel(conn, vm, hostdev) < 0)
5872
        return -1;
M
Mark McLoughlin 已提交
5873 5874

    switch (hostdev->source.subsys.type) {
5875
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
5876 5877
        if (qemudDomainAttachHostPciDevice(conn, driver, vm,
                                           hostdev, qemuCmdFlags) < 0)
5878 5879 5880
            goto error;
        break;

M
Mark McLoughlin 已提交
5881
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
5882 5883
        if (qemudDomainAttachHostUsbDevice(conn, driver, vm,
                                           hostdev, qemuCmdFlags) < 0)
5884 5885 5886
            goto error;
        break;

M
Mark McLoughlin 已提交
5887 5888 5889 5890
    default:
        qemudReportError(conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         _("hostdev subsys type '%s' not supported"),
                         virDomainHostdevSubsysTypeToString(hostdev->source.subsys.type));
5891
        goto error;
M
Mark McLoughlin 已提交
5892
    }
5893 5894 5895 5896 5897 5898

    return 0;

error:
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityHostdevLabel &&
5899
        driver->securityDriver->domainRestoreSecurityHostdevLabel(conn, vm, hostdev) < 0)
5900 5901 5902
        VIR_WARN0("Unable to restore host device labelling on hotplug fail");

    return -1;
M
Mark McLoughlin 已提交
5903 5904
}

5905

5906
static int qemudDomainAttachDevice(virDomainPtr dom,
5907 5908
                                   const char *xml)
{
5909 5910 5911
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    virDomainDeviceDefPtr dev = NULL;
5912
    unsigned int qemuCmdFlags;
5913
    virCgroupPtr cgroup = NULL;
5914
    int ret = -1;
5915

5916
    qemuDriverLock(driver);
5917
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
5918
    if (!vm) {
5919 5920 5921 5922
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
5923
        goto cleanup;
5924 5925
    }

5926 5927 5928
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
5929
    if (!virDomainObjIsActive(vm)) {
5930
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
5931
                         "%s", _("cannot attach device on inactive domain"));
5932
        goto endjob;
5933 5934
    }

5935 5936
    dev = virDomainDeviceDefParse(dom->conn, driver->caps, vm->def, xml,
                                  VIR_DOMAIN_XML_INACTIVE);
5937
    if (dev == NULL)
5938
        goto endjob;
5939

5940 5941 5942
    if (qemudExtractVersionInfo(vm->def->emulator,
                                NULL,
                                &qemuCmdFlags) < 0)
5943
        goto endjob;
5944

5945
    if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
5946
        if (qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_DEVICES)) {
5947 5948 5949 5950
            if (virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0) !=0 ) {
                qemudReportError(dom->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                 _("Unable to find cgroup for %s\n"),
                                 vm->def->name);
5951
                goto endjob;
5952 5953 5954 5955 5956 5957 5958 5959
            }
            if (dev->data.disk->src != NULL &&
                dev->data.disk->type == VIR_DOMAIN_DISK_TYPE_BLOCK &&
                virCgroupAllowDevicePath(cgroup,
                                         dev->data.disk->src) < 0) {
                qemudReportError(dom->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                 _("unable to allow device %s"),
                                 dev->data.disk->src);
5960
                goto endjob;
5961 5962 5963
            }
        }

5964
        switch (dev->data.disk->device) {
5965 5966
        case VIR_DOMAIN_DISK_DEVICE_CDROM:
        case VIR_DOMAIN_DISK_DEVICE_FLOPPY:
5967 5968 5969
            ret = qemudDomainChangeEjectableMedia(dom->conn, driver, vm, dev->data.disk);
            if (ret == 0)
                dev->data.disk = NULL;
5970
            break;
5971

5972 5973
        case VIR_DOMAIN_DISK_DEVICE_DISK:
            if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_USB) {
5974 5975
                ret = qemudDomainAttachUsbMassstorageDevice(dom->conn, driver, vm,
                                                            dev->data.disk, qemuCmdFlags);
5976 5977
                if (ret == 0)
                    dev->data.disk = NULL;
5978
            } else if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_VIRTIO) {
5979 5980
                ret = qemudDomainAttachPciDiskDevice(dom->conn, driver, vm,
                                                     dev->data.disk, qemuCmdFlags);
5981 5982
                if (ret == 0)
                    dev->data.disk = NULL;
5983
            } else if (dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_SCSI) {
5984 5985
                ret = qemudDomainAttachSCSIDisk(dom->conn, driver, vm,
                                                dev->data.disk, qemuCmdFlags);
5986 5987
                if (ret == 0)
                    dev->data.disk = NULL;
5988 5989 5990 5991
            } else {
                qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                                 _("disk bus '%s' cannot be hotplugged."),
                                 virDomainDiskBusTypeToString(dev->data.disk->bus));
5992
                /* fallthrough */
5993 5994
            }
            break;
5995

5996 5997
        default:
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
5998 5999
                             _("disk device type '%s' cannot be hotplugged"),
                             virDomainDiskDeviceTypeToString(dev->data.disk->device));
6000 6001
            /* Fallthrough */
        }
6002
        if (ret != 0 && cgroup) {
6003 6004
            virCgroupDenyDevicePath(cgroup,
                                    dev->data.disk->src);
6005
        }
6006 6007
    } else if (dev->type == VIR_DOMAIN_DEVICE_CONTROLLER) {
        if (dev->data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_SCSI) {
6008 6009
            ret = qemudDomainAttachPciControllerDevice(dom->conn, driver, vm,
                                                       dev->data.controller, qemuCmdFlags);
6010 6011 6012 6013 6014 6015
        } else {
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                             _("disk controller bus '%s' cannot be hotplugged."),
                             virDomainControllerTypeToString(dev->data.controller->type));
            /* fallthrough */
        }
M
Mark McLoughlin 已提交
6016
    } else if (dev->type == VIR_DOMAIN_DEVICE_NET) {
6017 6018
        ret = qemudDomainAttachNetDevice(dom->conn, driver, vm,
                                         dev->data.net, qemuCmdFlags);
6019 6020
        if (ret == 0)
            dev->data.net = NULL;
M
Mark McLoughlin 已提交
6021
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
6022 6023
        ret = qemudDomainAttachHostDevice(dom->conn, driver, vm,
                                          dev->data.hostdev, qemuCmdFlags);
6024 6025
        if (ret == 0)
            dev->data.hostdev = NULL;
6026
    } else {
6027
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
6028 6029
                         _("device type '%s' cannot be attached"),
                         virDomainDeviceTypeToString(dev->type));
6030
        goto endjob;
6031 6032
    }

6033
    if (!ret && virDomainSaveStatus(dom->conn, driver->caps, driver->stateDir, vm) < 0)
6034 6035
        ret = -1;

6036
endjob:
6037 6038
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
6039

6040
cleanup:
6041 6042 6043
    if (cgroup)
        virCgroupFree(&cgroup);

6044
    virDomainDeviceDefFree(dev);
6045 6046
    if (vm)
        virDomainObjUnlock(vm);
6047
    qemuDriverUnlock(driver);
6048 6049 6050
    return ret;
}

6051
static int qemudDomainDetachPciDiskDevice(virConnectPtr conn,
6052 6053 6054
                                          struct qemud_driver *driver,
                                          virDomainObjPtr vm,
                                          virDomainDeviceDefPtr dev)
6055 6056 6057
{
    int i, ret = -1;
    virDomainDiskDefPtr detach = NULL;
6058
    qemuDomainObjPrivatePtr priv = vm->privateData;
6059 6060 6061 6062 6063 6064 6065 6066 6067

    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (STREQ(vm->def->disks[i]->dst, dev->data.disk->dst)) {
            detach = vm->def->disks[i];
            break;
        }
    }

    if (!detach) {
6068
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
6069
                         _("disk %s not found"), dev->data.disk->dst);
6070
        goto cleanup;
6071 6072
    }

6073 6074 6075 6076
    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED, "%s",
                         _("device cannot be detached without a PCI address"));
6077
        goto cleanup;
6078 6079
    }

6080
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6081
    if (qemuMonitorRemovePCIDevice(priv->mon,
6082
                                   &detach->info.addr.pci) < 0) {
6083
        qemuDomainObjExitMonitor(vm);
6084
        goto cleanup;
6085
    }
6086
    qemuDomainObjExitMonitorWithDriver(driver, vm);
6087

6088 6089 6090 6091 6092 6093 6094 6095 6096 6097
    if (vm->def->ndisks > 1) {
        memmove(vm->def->disks + i,
                vm->def->disks + i + 1,
                sizeof(*vm->def->disks) *
                (vm->def->ndisks - (i + 1)));
        vm->def->ndisks--;
        if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks) < 0) {
            /* ignore, harmless */
        }
    } else {
6098
        VIR_FREE(vm->def->disks);
6099
        vm->def->ndisks = 0;
6100
    }
6101
    virDomainDiskDefFree(detach);
6102

6103 6104 6105 6106 6107
    if (driver->securityDriver &&
        driver->securityDriver->domainRestoreSecurityImageLabel &&
        driver->securityDriver->domainRestoreSecurityImageLabel(conn, vm, dev->data.disk) < 0)
        VIR_WARN("Unable to restore security label on %s", dev->data.disk->src);

6108
    ret = 0;
6109 6110

cleanup:
6111 6112 6113
    return ret;
}

6114 6115 6116 6117 6118 6119 6120 6121 6122 6123 6124 6125 6126 6127 6128 6129 6130 6131 6132 6133 6134 6135 6136 6137 6138 6139 6140 6141 6142 6143 6144 6145 6146 6147 6148 6149 6150 6151 6152 6153 6154 6155 6156 6157 6158 6159 6160 6161 6162 6163 6164 6165 6166 6167 6168 6169 6170 6171 6172 6173 6174
static int qemudDomainDetachPciControllerDevice(virConnectPtr conn,
                                                struct qemud_driver *driver,
                                                virDomainObjPtr vm,
                                                virDomainDeviceDefPtr dev)
{
    int i, ret = -1;
    virDomainControllerDefPtr detach = NULL;
    qemuDomainObjPrivatePtr priv = vm->privateData;

    for (i = 0 ; i < vm->def->ncontrollers ; i++) {
        if ((vm->def->controllers[i]->type == dev->data.controller->type) &&
            (vm->def->controllers[i]->idx == dev->data.controller->idx)) {
            detach = vm->def->controllers[i];
            break;
        }
    }

    if (!detach) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         _("disk controller %s:%d not found"),
                         virDomainControllerTypeToString(dev->data.controller->type),
                         dev->data.controller->idx);
        goto cleanup;
    }

    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED, "%s",
                         _("device cannot be detached without a PCI address"));
        goto cleanup;
    }

    qemuDomainObjEnterMonitorWithDriver(driver, vm);
    if (qemuMonitorRemovePCIDevice(priv->mon,
                                   &detach->info.addr.pci) < 0) {
        qemuDomainObjExitMonitor(vm);
        goto cleanup;
    }
    qemuDomainObjExitMonitorWithDriver(driver, vm);

    if (vm->def->ncontrollers > 1) {
        memmove(vm->def->controllers + i,
                vm->def->controllers + i + 1,
                sizeof(*vm->def->controllers) *
                (vm->def->ncontrollers - (i + 1)));
        vm->def->ncontrollers--;
        if (VIR_REALLOC_N(vm->def->controllers, vm->def->ncontrollers) < 0) {
            /* ignore, harmless */
        }
    } else {
        VIR_FREE(vm->def->controllers);
        vm->def->ncontrollers = 0;
    }
    virDomainControllerDefFree(detach);

    ret = 0;

cleanup:
    return ret;
}

6175 6176
static int
qemudDomainDetachNetDevice(virConnectPtr conn,
6177
                           struct qemud_driver *driver,
6178 6179 6180 6181 6182
                           virDomainObjPtr vm,
                           virDomainDeviceDefPtr dev)
{
    int i, ret = -1;
    virDomainNetDefPtr detach = NULL;
6183
    qemuDomainObjPrivatePtr priv = vm->privateData;
6184 6185
    int vlan;
    char *hostnet_name = NULL;
6186 6187 6188 6189 6190 6191 6192 6193 6194 6195 6196 6197 6198 6199 6200 6201 6202 6203 6204

    for (i = 0 ; i < vm->def->nnets ; i++) {
        virDomainNetDefPtr net = vm->def->nets[i];

        if (!memcmp(net->mac, dev->data.net->mac,  sizeof(net->mac))) {
            detach = net;
            break;
        }
    }

    if (!detach) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         _("network device %02x:%02x:%02x:%02x:%02x:%02x not found"),
                         dev->data.net->mac[0], dev->data.net->mac[1],
                         dev->data.net->mac[2], dev->data.net->mac[3],
                         dev->data.net->mac[4], dev->data.net->mac[5]);
        goto cleanup;
    }

6205 6206 6207 6208 6209 6210 6211
    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("device cannot be detached without a PCI address"));
        goto cleanup;
    }

6212
    if ((vlan = qemuDomainNetVLAN(detach)) < 0) {
6213
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
6214 6215 6216 6217 6218 6219
                         "%s", _("unable to determine original VLAN"));
        goto cleanup;
    }

    if (virAsprintf(&hostnet_name, "host%s", detach->info.alias) < 0) {
        virReportOOMError(NULL);
6220 6221 6222
        goto cleanup;
    }

6223
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6224
    if (qemuMonitorRemovePCIDevice(priv->mon,
6225
                                   &detach->info.addr.pci) < 0) {
6226
        qemuDomainObjExitMonitorWithDriver(driver, vm);
6227
        goto cleanup;
6228
    }
6229

6230
    if (qemuMonitorRemoveHostNetwork(priv->mon, vlan, hostnet_name) < 0) {
6231
        qemuDomainObjExitMonitorWithDriver(driver, vm);
6232
        goto cleanup;
6233
    }
6234
    qemuDomainObjExitMonitorWithDriver(driver, vm);
6235

6236 6237 6238 6239 6240 6241 6242 6243 6244 6245 6246
    if ((driver->macFilter) && (detach->ifname != NULL)) {
        if ((errno = networkDisallowMacOnPort(conn,
                                              driver,
                                              detach->ifname,
                                              detach->mac))) {
            virReportSystemError(conn, errno,
             _("failed to remove ebtables rule on  '%s'"),
                                 detach->ifname);
        }
    }

6247 6248 6249 6250 6251 6252 6253 6254 6255 6256
    if (vm->def->nnets > 1) {
        memmove(vm->def->nets + i,
                vm->def->nets + i + 1,
                sizeof(*vm->def->nets) *
                (vm->def->nnets - (i + 1)));
        vm->def->nnets--;
        if (VIR_REALLOC_N(vm->def->nets, vm->def->nnets) < 0) {
            /* ignore, harmless */
        }
    } else {
6257
        VIR_FREE(vm->def->nets);
6258
        vm->def->nnets = 0;
6259
    }
6260
    virDomainNetDefFree(detach);
6261

6262 6263 6264
    ret = 0;

cleanup:
6265
    VIR_FREE(hostnet_name);
6266 6267 6268
    return ret;
}

6269
static int qemudDomainDetachHostPciDevice(virConnectPtr conn,
6270
                                          struct qemud_driver *driver,
6271 6272 6273
                                          virDomainObjPtr vm,
                                          virDomainDeviceDefPtr dev)
{
6274
    virDomainHostdevDefPtr detach = NULL;
6275
    qemuDomainObjPrivatePtr priv = vm->privateData;
6276
    int i, ret;
6277
    pciDevice *pci;
6278 6279 6280 6281 6282 6283 6284 6285 6286 6287 6288 6289 6290 6291 6292 6293 6294 6295 6296 6297 6298 6299 6300 6301 6302 6303

    for (i = 0 ; i < vm->def->nhostdevs ; i++) {
        unsigned domain   = vm->def->hostdevs[i]->source.subsys.u.pci.domain;
        unsigned bus      = vm->def->hostdevs[i]->source.subsys.u.pci.bus;
        unsigned slot     = vm->def->hostdevs[i]->source.subsys.u.pci.slot;
        unsigned function = vm->def->hostdevs[i]->source.subsys.u.pci.function;

        if (dev->data.hostdev->source.subsys.u.pci.domain   == domain &&
            dev->data.hostdev->source.subsys.u.pci.bus      == bus &&
            dev->data.hostdev->source.subsys.u.pci.slot     == slot &&
            dev->data.hostdev->source.subsys.u.pci.function == function) {
            detach = vm->def->hostdevs[i];
            break;
        }
    }

    if (!detach) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         _("host pci device %.4x:%.2x:%.2x.%.1x not found"),
                         dev->data.hostdev->source.subsys.u.pci.domain,
                         dev->data.hostdev->source.subsys.u.pci.bus,
                         dev->data.hostdev->source.subsys.u.pci.slot,
                         dev->data.hostdev->source.subsys.u.pci.function);
        return -1;
    }

6304 6305
    if (!virDomainDeviceAddressIsValid(&detach->info,
                                       VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)) {
6306
        qemudReportError(conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
6307
                         "%s", _("device cannot be detached without a PCI address"));
6308 6309 6310
        return -1;
    }

6311
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
6312
    if (qemuMonitorRemovePCIDevice(priv->mon,
6313
                                   &detach->info.addr.pci) < 0) {
6314
        qemuDomainObjExitMonitorWithDriver(driver, vm);
6315
        return -1;
6316
    }
6317
    qemuDomainObjExitMonitorWithDriver(driver, vm);
6318 6319 6320

    ret = 0;

6321 6322 6323 6324 6325 6326 6327 6328
    pci = pciGetDevice(conn,
                       detach->source.subsys.u.pci.domain,
                       detach->source.subsys.u.pci.bus,
                       detach->source.subsys.u.pci.slot,
                       detach->source.subsys.u.pci.function);
    if (!pci)
        ret = -1;
    else {
6329
        pciDeviceSetManaged(pci, detach->managed);
6330 6331
        pciDeviceListDel(conn, driver->activePciHostdevs, pci);
        if (pciResetDevice(conn, pci, driver->activePciHostdevs) < 0)
6332
            ret = -1;
6333
        qemudReattachManagedDevice(pci);
6334
        pciFreeDevice(conn, pci);
6335 6336
    }

6337 6338 6339 6340 6341 6342 6343 6344 6345 6346 6347 6348
    if (vm->def->nhostdevs > 1) {
        memmove(vm->def->hostdevs + i,
                vm->def->hostdevs + i + 1,
                sizeof(*vm->def->hostdevs) *
                (vm->def->nhostdevs - (i + 1)));
        vm->def->nhostdevs--;
        if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs) < 0) {
            /* ignore, harmless */
        }
    } else {
        VIR_FREE(vm->def->hostdevs);
        vm->def->nhostdevs = 0;
6349
    }
6350
    virDomainHostdevDefFree(detach);
6351 6352 6353 6354 6355 6356 6357 6358 6359 6360 6361 6362 6363 6364 6365 6366 6367 6368 6369 6370 6371

    return ret;
}

static int qemudDomainDetachHostDevice(virConnectPtr conn,
                                       struct qemud_driver *driver,
                                       virDomainObjPtr vm,
                                       virDomainDeviceDefPtr dev)
{
    virDomainHostdevDefPtr hostdev = dev->data.hostdev;
    int ret;

    if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS) {
        qemudReportError(conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         _("hostdev mode '%s' not supported"),
                         virDomainHostdevModeTypeToString(hostdev->mode));
        return -1;
    }

    switch (hostdev->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
6372
        ret = qemudDomainDetachHostPciDevice(conn, driver, vm, dev);
6373
        break;
6374 6375 6376 6377 6378 6379 6380
    default:
        qemudReportError(conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         _("hostdev subsys type '%s' not supported"),
                         virDomainHostdevSubsysTypeToString(hostdev->source.subsys.type));
        return -1;
    }

6381
    if (driver->securityDriver &&
6382 6383 6384
        driver->securityDriver->domainRestoreSecurityHostdevLabel &&
        driver->securityDriver->domainRestoreSecurityHostdevLabel(conn, vm, dev->data.hostdev) < 0)
        VIR_WARN0("Failed to restore host device labelling");
6385

6386 6387 6388
    return ret;
}

6389 6390
static int qemudDomainDetachDevice(virDomainPtr dom,
                                   const char *xml) {
6391 6392 6393 6394
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    virDomainDeviceDefPtr dev = NULL;
    int ret = -1;
6395

6396
    qemuDriverLock(driver);
6397
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6398
    if (!vm) {
6399 6400 6401 6402
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6403
        goto cleanup;
6404 6405
    }

6406 6407 6408
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
6409
    if (!virDomainObjIsActive(vm)) {
6410
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
G
Guido Günther 已提交
6411
                         "%s", _("cannot detach device on inactive domain"));
6412
        goto endjob;
6413 6414
    }

6415 6416
    dev = virDomainDeviceDefParse(dom->conn, driver->caps, vm->def, xml,
                                  VIR_DOMAIN_XML_INACTIVE);
6417
    if (dev == NULL)
6418
        goto endjob;
6419

6420 6421 6422

    if (dev->type == VIR_DOMAIN_DEVICE_DISK &&
        dev->data.disk->device == VIR_DOMAIN_DISK_DEVICE_DISK &&
6423
        dev->data.disk->bus == VIR_DOMAIN_DISK_BUS_VIRTIO) {
6424
        ret = qemudDomainDetachPciDiskDevice(dom->conn, driver, vm, dev);
6425
    } else if (dev->type == VIR_DOMAIN_DEVICE_NET) {
6426
        ret = qemudDomainDetachNetDevice(dom->conn, driver, vm, dev);
6427 6428 6429 6430 6431 6432 6433 6434 6435
    } else if (dev->type == VIR_DOMAIN_DEVICE_CONTROLLER) {
        if (dev->data.controller->type == VIR_DOMAIN_CONTROLLER_TYPE_SCSI) {
            ret = qemudDomainDetachPciControllerDevice(dom->conn, driver, vm, dev);
        } else {
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                             _("disk controller bus '%s' cannot be hotunplugged."),
                             virDomainControllerTypeToString(dev->data.controller->type));
            /* fallthrough */
        }
6436 6437
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
        ret = qemudDomainDetachHostDevice(dom->conn, driver, vm, dev);
6438
    } else {
6439
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
6440 6441
                         "%s", _("This type of device cannot be hot unplugged"));
    }
6442

6443
    if (!ret && virDomainSaveStatus(dom->conn, driver->caps, driver->stateDir, vm) < 0)
6444 6445
        ret = -1;

6446
endjob:
6447 6448
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
6449

6450 6451
cleanup:
    virDomainDeviceDefFree(dev);
6452 6453
    if (vm)
        virDomainObjUnlock(vm);
6454
    qemuDriverUnlock(driver);
6455 6456 6457
    return ret;
}

6458
static int qemudDomainGetAutostart(virDomainPtr dom,
6459
                                   int *autostart) {
6460 6461 6462
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int ret = -1;
6463

6464
    qemuDriverLock(driver);
6465
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6466 6467
    qemuDriverUnlock(driver);

6468
    if (!vm) {
6469 6470 6471 6472
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6473
        goto cleanup;
6474 6475 6476
    }

    *autostart = vm->autostart;
6477
    ret = 0;
6478

6479
cleanup:
6480 6481
    if (vm)
        virDomainObjUnlock(vm);
6482
    return ret;
6483 6484
}

6485
static int qemudDomainSetAutostart(virDomainPtr dom,
6486
                                   int autostart) {
6487 6488
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
6489 6490
    char *configFile = NULL, *autostartLink = NULL;
    int ret = -1;
6491

6492
    qemuDriverLock(driver);
6493
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6494

6495
    if (!vm) {
6496 6497 6498 6499
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6500
        goto cleanup;
6501 6502
    }

6503 6504 6505
    if (!vm->persistent) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("cannot set autostart for transient domain"));
6506
        goto cleanup;
6507 6508
    }

6509 6510
    autostart = (autostart != 0);

6511 6512 6513 6514 6515
    if (vm->autostart != autostart) {
        if ((configFile = virDomainConfigFile(dom->conn, driver->configDir, vm->def->name)) == NULL)
            goto cleanup;
        if ((autostartLink = virDomainConfigFile(dom->conn, driver->autostartDir, vm->def->name)) == NULL)
            goto cleanup;
6516

6517 6518
        if (autostart) {
            int err;
6519

6520
            if ((err = virFileMakePath(driver->autostartDir))) {
6521 6522 6523
                virReportSystemError(dom->conn, err,
                                     _("cannot create autostart directory %s"),
                                     driver->autostartDir);
6524 6525
                goto cleanup;
            }
6526

6527
            if (symlink(configFile, autostartLink) < 0) {
6528 6529 6530
                virReportSystemError(dom->conn, errno,
                                     _("Failed to create symlink '%s to '%s'"),
                                     autostartLink, configFile);
6531 6532 6533 6534
                goto cleanup;
            }
        } else {
            if (unlink(autostartLink) < 0 && errno != ENOENT && errno != ENOTDIR) {
6535 6536 6537
                virReportSystemError(dom->conn, errno,
                                     _("Failed to delete symlink '%s'"),
                                     autostartLink);
6538 6539
                goto cleanup;
            }
6540 6541
        }

6542
        vm->autostart = autostart;
6543
    }
6544
    ret = 0;
6545

6546 6547 6548
cleanup:
    VIR_FREE(configFile);
    VIR_FREE(autostartLink);
6549 6550
    if (vm)
        virDomainObjUnlock(vm);
6551
    qemuDriverUnlock(driver);
6552
    return ret;
6553 6554
}

6555 6556 6557 6558 6559

static char *qemuGetSchedulerType(virDomainPtr dom,
                                  int *nparams)
{
    struct qemud_driver *driver = dom->conn->privateData;
6560
    char *ret = NULL;
6561

6562
    qemuDriverLock(driver);
6563
    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
6564 6565
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         __FUNCTION__);
6566
        goto cleanup;
6567 6568 6569 6570 6571 6572 6573 6574
    }

    if (nparams)
        *nparams = 1;

    ret = strdup("posix");
    if (!ret)
        virReportOOMError(dom->conn);
6575 6576 6577

cleanup:
    qemuDriverUnlock(driver);
6578 6579 6580 6581 6582 6583 6584 6585 6586 6587 6588 6589 6590
    return ret;
}

static int qemuSetSchedulerParameters(virDomainPtr dom,
                                      virSchedParameterPtr params,
                                      int nparams)
{
    struct qemud_driver *driver = dom->conn->privateData;
    int i;
    virCgroupPtr group = NULL;
    virDomainObjPtr vm = NULL;
    int ret = -1;

6591
    qemuDriverLock(driver);
6592
    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
6593 6594
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         __FUNCTION__);
6595
        goto cleanup;
6596 6597 6598 6599 6600 6601 6602 6603 6604 6605 6606 6607 6608 6609 6610 6611 6612 6613 6614 6615 6616 6617
    }

    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (vm == NULL) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("No such domain %s"), dom->uuid);
        goto cleanup;
    }

    if (virCgroupForDomain(driver->cgroup, vm->def->name, &group, 0) != 0) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("cannot find cgroup for domain %s"), vm->def->name);
        goto cleanup;
    }

    for (i = 0; i < nparams; i++) {
        virSchedParameterPtr param = &params[i];

        if (STREQ(param->field, "cpu_shares")) {
            int rc;
            if (param->type != VIR_DOMAIN_SCHED_FIELD_ULLONG) {
C
Chris Lalancette 已提交
6618
                qemudReportError(dom->conn, dom, NULL, VIR_ERR_INVALID_ARG, "%s",
6619 6620 6621 6622 6623 6624 6625 6626 6627 6628 6629 6630 6631 6632 6633 6634 6635 6636 6637 6638 6639 6640
                                 _("invalid type for cpu_shares tunable, expected a 'ullong'"));
                goto cleanup;
            }

            rc = virCgroupSetCpuShares(group, params[i].value.ul);
            if (rc != 0) {
                virReportSystemError(dom->conn, -rc, "%s",
                                     _("unable to set cpu shares tunable"));
                goto cleanup;
            }
        } else {
            qemudReportError(dom->conn, domain, NULL, VIR_ERR_INVALID_ARG,
                             _("Invalid parameter `%s'"), param->field);
            goto cleanup;
        }
    }
    ret = 0;

cleanup:
    virCgroupFree(&group);
    if (vm)
        virDomainObjUnlock(vm);
6641
    qemuDriverUnlock(driver);
6642 6643 6644 6645 6646 6647 6648 6649 6650 6651 6652 6653 6654 6655
    return ret;
}

static int qemuGetSchedulerParameters(virDomainPtr dom,
                                      virSchedParameterPtr params,
                                      int *nparams)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virCgroupPtr group = NULL;
    virDomainObjPtr vm = NULL;
    unsigned long long val;
    int ret = -1;
    int rc;

6656
    qemuDriverLock(driver);
6657
    if (!qemuCgroupControllerActive(driver, VIR_CGROUP_CONTROLLER_CPU)) {
6658 6659
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                         __FUNCTION__);
6660
        goto cleanup;
6661 6662 6663 6664 6665
    }

    if ((*nparams) != 1) {
        qemudReportError(dom->conn, domain, NULL, VIR_ERR_INVALID_ARG,
                         "%s", _("Invalid parameter count"));
6666
        goto cleanup;
6667 6668 6669 6670 6671 6672 6673 6674 6675 6676 6677 6678 6679 6680 6681 6682 6683 6684 6685 6686 6687 6688 6689 6690
    }

    vm = virDomainFindByUUID(&driver->domains, dom->uuid);

    if (vm == NULL) {
        qemudReportError(dom->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("No such domain %s"), dom->uuid);
        goto cleanup;
    }

    if (virCgroupForDomain(driver->cgroup, vm->def->name, &group, 0) != 0) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("cannot find cgroup for domain %s"), vm->def->name);
        goto cleanup;
    }

    rc = virCgroupGetCpuShares(group, &val);
    if (rc != 0) {
        virReportSystemError(dom->conn, -rc, "%s",
                             _("unable to get cpu shares tunable"));
        goto cleanup;
    }
    params[0].value.ul = val;
    params[0].type = VIR_DOMAIN_SCHED_FIELD_ULLONG;
C
Chris Lalancette 已提交
6691 6692 6693 6694 6695
    if (virStrcpyStatic(params[0].field, "cpu_shares") == NULL) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("Field cpu_shares too long for destination"));
        goto cleanup;
    }
6696 6697 6698 6699 6700 6701 6702

    ret = 0;

cleanup:
    virCgroupFree(&group);
    if (vm)
        virDomainObjUnlock(vm);
6703
    qemuDriverUnlock(driver);
6704 6705 6706 6707
    return ret;
}


6708 6709 6710 6711 6712 6713 6714 6715 6716
/* This uses the 'info blockstats' monitor command which was
 * integrated into both qemu & kvm in late 2007.  If the command is
 * not supported we detect this and return the appropriate error.
 */
static int
qemudDomainBlockStats (virDomainPtr dom,
                       const char *path,
                       struct _virDomainBlockStats *stats)
{
6717
    struct qemud_driver *driver = dom->conn->privateData;
6718
    int i, ret = -1;
6719
    virDomainObjPtr vm;
6720
    virDomainDiskDefPtr disk = NULL;
6721

6722
    qemuDriverLock(driver);
6723
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6724
    qemuDriverUnlock(driver);
6725
    if (!vm) {
6726 6727 6728 6729
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6730
        goto cleanup;
6731
    }
6732 6733 6734 6735

    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
6736
    if (!virDomainObjIsActive (vm)) {
6737
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
6738
                          "%s", _("domain is not running"));
6739
        goto endjob;
6740 6741
    }

6742 6743 6744 6745 6746 6747 6748 6749
    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (STREQ(path, vm->def->disks[i]->dst)) {
            disk = vm->def->disks[i];
            break;
        }
    }

    if (!disk) {
6750 6751
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
                          _("invalid path: %s"), path);
6752
        goto endjob;
6753 6754
    }

6755 6756 6757
    if (!disk->info.alias) {
        qemudReportError(dom->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("missing disk device alias name for %s"), disk->dst);
6758
        goto endjob;
6759
    }
6760

6761
    qemuDomainObjPrivatePtr priv = vm->privateData;
6762 6763
    qemuDomainObjEnterMonitor(vm);
    ret = qemuMonitorGetBlockStatsInfo(priv->mon,
6764
                                       disk->info.alias,
6765 6766 6767 6768 6769 6770
                                       &stats->rd_req,
                                       &stats->rd_bytes,
                                       &stats->wr_req,
                                       &stats->wr_bytes,
                                       &stats->errs);
    qemuDomainObjExitMonitor(vm);
6771

6772
endjob:
6773 6774
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
6775

6776
cleanup:
6777 6778
    if (vm)
        virDomainObjUnlock(vm);
6779
    return ret;
6780 6781
}

6782
#ifdef __linux__
6783 6784 6785 6786 6787
static int
qemudDomainInterfaceStats (virDomainPtr dom,
                           const char *path,
                           struct _virDomainInterfaceStats *stats)
{
6788 6789
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
6790
    int i;
6791
    int ret = -1;
6792

6793
    qemuDriverLock(driver);
6794
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6795 6796
    qemuDriverUnlock(driver);

6797
    if (!vm) {
6798 6799 6800 6801
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6802
        goto cleanup;
6803 6804
    }

D
Daniel P. Berrange 已提交
6805
    if (!virDomainObjIsActive(vm)) {
6806
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
6807
                         "%s", _("domain is not running"));
6808
        goto cleanup;
6809 6810 6811
    }

    /* Check the path is one of the domain's network interfaces. */
6812 6813
    for (i = 0 ; i < vm->def->nnets ; i++) {
        if (vm->def->nets[i]->ifname &&
6814 6815 6816 6817
            STREQ (vm->def->nets[i]->ifname, path)) {
            ret = 0;
            break;
        }
6818 6819
    }

6820 6821 6822 6823 6824
    if (ret == 0)
        ret = linuxDomainInterfaceStats (dom->conn, path, stats);
    else
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
                          _("invalid path, '%s' is not a known interface"), path);
6825

6826
cleanup:
6827 6828
    if (vm)
        virDomainObjUnlock(vm);
6829 6830
    return ret;
}
6831
#else
6832 6833 6834 6835
static int
qemudDomainInterfaceStats (virDomainPtr dom,
                           const char *path ATTRIBUTE_UNUSED,
                           struct _virDomainInterfaceStats *stats ATTRIBUTE_UNUSED)
6836 6837 6838 6839
    qemudReportError (dom->conn, dom, NULL, VIR_ERR_NO_SUPPORT,
                      "%s", __FUNCTION__);
    return -1;
}
6840
#endif
6841

6842 6843 6844 6845 6846 6847 6848 6849 6850 6851 6852 6853 6854 6855 6856 6857 6858 6859 6860 6861 6862 6863 6864 6865 6866 6867 6868 6869 6870 6871 6872 6873 6874 6875 6876 6877 6878
static int
qemudDomainMemoryStats (virDomainPtr dom,
                        struct _virDomainMemoryStat *stats,
                        unsigned int nr_stats)
{
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    unsigned int ret = -1;

    qemuDriverLock(driver);
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
    qemuDriverUnlock(driver);

    if (!vm) {
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
        goto cleanup;
    }

    if (virDomainObjIsActive(vm)) {
        qemuDomainObjPrivatePtr priv = vm->privateData;
        qemuDomainObjEnterMonitor(vm);
        ret = qemuMonitorTextGetMemoryStats(priv->mon, stats, nr_stats);
        qemuDomainObjExitMonitor(vm);
    } else {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
                         "%s", _("domain is not running"));
    }

cleanup:
    if (vm)
        virDomainObjUnlock(vm);
    return ret;
}

6879 6880 6881 6882 6883 6884 6885
static int
qemudDomainBlockPeek (virDomainPtr dom,
                      const char *path,
                      unsigned long long offset, size_t size,
                      void *buffer,
                      unsigned int flags ATTRIBUTE_UNUSED)
{
6886 6887 6888
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
    int fd = -1, ret = -1, i;
6889

6890
    qemuDriverLock(driver);
6891
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6892 6893
    qemuDriverUnlock(driver);

6894
    if (!vm) {
6895 6896 6897 6898
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6899
        goto cleanup;
6900 6901 6902 6903
    }

    if (!path || path[0] == '\0') {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
J
Jim Meyering 已提交
6904
                         "%s", _("NULL or empty path"));
6905
        goto cleanup;
6906 6907 6908
    }

    /* Check the path belongs to this domain. */
6909 6910
    for (i = 0 ; i < vm->def->ndisks ; i++) {
        if (vm->def->disks[i]->src != NULL &&
6911 6912 6913 6914
            STREQ (vm->def->disks[i]->src, path)) {
            ret = 0;
            break;
        }
6915 6916
    }

6917 6918 6919 6920 6921
    if (ret == 0) {
        ret = -1;
        /* The path is correct, now try to open it and get its size. */
        fd = open (path, O_RDONLY);
        if (fd == -1) {
6922 6923
            virReportSystemError (dom->conn, errno,
                                  _("%s: failed to open"), path);
6924 6925
            goto cleanup;
        }
6926

6927 6928 6929 6930 6931 6932
        /* Seek and read. */
        /* NB. Because we configure with AC_SYS_LARGEFILE, off_t should
         * be 64 bits on all platforms.
         */
        if (lseek (fd, offset, SEEK_SET) == (off_t) -1 ||
            saferead (fd, buffer, size) == (ssize_t) -1) {
6933 6934
            virReportSystemError (dom->conn, errno,
                                  _("%s: failed to seek or read"), path);
6935 6936 6937 6938 6939 6940 6941
            goto cleanup;
        }

        ret = 0;
    } else {
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
                          "%s", _("invalid path"));
6942 6943
    }

6944 6945 6946
cleanup:
    if (fd >= 0)
        close (fd);
6947 6948
    if (vm)
        virDomainObjUnlock(vm);
6949 6950 6951
    return ret;
}

R
Richard W.M. Jones 已提交
6952 6953 6954 6955 6956 6957
static int
qemudDomainMemoryPeek (virDomainPtr dom,
                       unsigned long long offset, size_t size,
                       void *buffer,
                       unsigned int flags)
{
6958 6959
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
6960
    char *tmp = NULL;
R
Richard W.M. Jones 已提交
6961 6962
    int fd = -1, ret = -1;

6963
    qemuDriverLock(driver);
6964
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
6965
    qemuDriverUnlock(driver);
R
Richard W.M. Jones 已提交
6966 6967

    if (!vm) {
6968 6969 6970 6971
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
6972 6973 6974
        goto cleanup;
    }

6975
    if (flags != VIR_MEMORY_VIRTUAL && flags != VIR_MEMORY_PHYSICAL) {
6976
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_INVALID_ARG,
6977
                     "%s", _("flags parameter must be VIR_MEMORY_VIRTUAL or VIR_MEMORY_PHYSICAL"));
6978
        goto cleanup;
R
Richard W.M. Jones 已提交
6979 6980
    }

6981 6982 6983
    if (qemuDomainObjBeginJob(vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
6984
    if (!virDomainObjIsActive(vm)) {
6985
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
R
Richard W.M. Jones 已提交
6986
                         "%s", _("domain is not running"));
6987
        goto endjob;
R
Richard W.M. Jones 已提交
6988 6989
    }

6990 6991
    if (virAsprintf(&tmp, driver->cacheDir,  "/qemu.mem.XXXXXX") < 0) {
        virReportOOMError(dom->conn);
6992
        goto endjob;
6993 6994
    }

R
Richard W.M. Jones 已提交
6995 6996
    /* Create a temporary filename. */
    if ((fd = mkstemp (tmp)) == -1) {
6997 6998
        virReportSystemError (dom->conn, errno,
                              _("mkstemp(\"%s\") failed"), tmp);
6999
        goto endjob;
R
Richard W.M. Jones 已提交
7000 7001
    }

7002
    qemuDomainObjPrivatePtr priv = vm->privateData;
7003
    qemuDomainObjEnterMonitor(vm);
7004
    if (flags == VIR_MEMORY_VIRTUAL) {
7005 7006
        if (qemuMonitorSaveVirtualMemory(priv->mon, offset, size, tmp) < 0) {
            qemuDomainObjExitMonitor(vm);
7007
            goto endjob;
7008
        }
7009
    } else {
7010 7011
        if (qemuMonitorSavePhysicalMemory(priv->mon, offset, size, tmp) < 0) {
            qemuDomainObjExitMonitor(vm);
7012
            goto endjob;
7013
        }
R
Richard W.M. Jones 已提交
7014
    }
7015
    qemuDomainObjExitMonitor(vm);
R
Richard W.M. Jones 已提交
7016 7017 7018

    /* Read the memory file into buffer. */
    if (saferead (fd, buffer, size) == (ssize_t) -1) {
7019 7020 7021
        virReportSystemError (dom->conn, errno,
                              _("failed to read temporary file "
                                "created with template %s"), tmp);
7022
        goto endjob;
R
Richard W.M. Jones 已提交
7023 7024 7025
    }

    ret = 0;
7026

7027
endjob:
7028 7029
    if (qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
7030

7031
cleanup:
7032
    VIR_FREE(tmp);
R
Richard W.M. Jones 已提交
7033 7034
    if (fd >= 0) close (fd);
    unlink (tmp);
7035 7036
    if (vm)
        virDomainObjUnlock(vm);
R
Richard W.M. Jones 已提交
7037 7038 7039
    return ret;
}

7040

7041 7042
static int
qemudDomainEventRegister (virConnectPtr conn,
7043
                          virConnectDomainEventCallback callback,
7044 7045
                          void *opaque,
                          virFreeCallback freecb)
7046
{
7047 7048 7049
    struct qemud_driver *driver = conn->privateData;
    int ret;

7050
    qemuDriverLock(driver);
7051 7052
    ret = virDomainEventCallbackListAdd(conn, driver->domainEventCallbacks,
                                        callback, opaque, freecb);
7053
    qemuDriverUnlock(driver);
7054

7055
    return ret;
7056 7057 7058 7059
}

static int
qemudDomainEventDeregister (virConnectPtr conn,
7060
                            virConnectDomainEventCallback callback)
7061
{
7062 7063 7064
    struct qemud_driver *driver = conn->privateData;
    int ret;

7065
    qemuDriverLock(driver);
7066 7067 7068 7069 7070 7071
    if (driver->domainEventDispatching)
        ret = virDomainEventCallbackListMarkDelete(conn, driver->domainEventCallbacks,
                                                   callback);
    else
        ret = virDomainEventCallbackListRemove(conn, driver->domainEventCallbacks,
                                               callback);
7072
    qemuDriverUnlock(driver);
7073

7074
    return ret;
7075 7076
}

7077 7078 7079 7080 7081
static void qemuDomainEventDispatchFunc(virConnectPtr conn,
                                        virDomainEventPtr event,
                                        virConnectDomainEventCallback cb,
                                        void *cbopaque,
                                        void *opaque)
7082
{
7083
    struct qemud_driver *driver = opaque;
7084

7085 7086 7087 7088 7089 7090 7091 7092 7093 7094 7095 7096 7097 7098 7099 7100 7101 7102 7103 7104 7105 7106 7107 7108 7109 7110 7111 7112 7113 7114 7115 7116 7117 7118 7119 7120 7121 7122 7123 7124 7125 7126 7127 7128
    /* Drop the lock whle dispatching, for sake of re-entrancy */
    qemuDriverUnlock(driver);
    virDomainEventDispatchDefaultFunc(conn, event, cb, cbopaque, NULL);
    qemuDriverLock(driver);
}

static void qemuDomainEventFlush(int timer ATTRIBUTE_UNUSED, void *opaque)
{
    struct qemud_driver *driver = opaque;
    virDomainEventQueue tempQueue;

    qemuDriverLock(driver);

    driver->domainEventDispatching = 1;

    /* Copy the queue, so we're reentrant safe */
    tempQueue.count = driver->domainEventQueue->count;
    tempQueue.events = driver->domainEventQueue->events;
    driver->domainEventQueue->count = 0;
    driver->domainEventQueue->events = NULL;

    virEventUpdateTimeout(driver->domainEventTimer, -1);
    virDomainEventQueueDispatch(&tempQueue,
                                driver->domainEventCallbacks,
                                qemuDomainEventDispatchFunc,
                                driver);

    /* Purge any deleted callbacks */
    virDomainEventCallbackListPurgeMarked(driver->domainEventCallbacks);

    driver->domainEventDispatching = 0;
    qemuDriverUnlock(driver);
}


/* driver must be locked before calling */
static void qemuDomainEventQueue(struct qemud_driver *driver,
                                 virDomainEventPtr event)
{
    if (virDomainEventQueuePush(driver->domainEventQueue,
                                event) < 0)
        virDomainEventFree(event);
    if (qemu_driver->domainEventQueue->count == 1)
        virEventUpdateTimeout(driver->domainEventTimer, 0);
7129 7130
}

D
Daniel Veillard 已提交
7131 7132
/* Migration support. */

C
Chris Lalancette 已提交
7133 7134 7135 7136 7137 7138 7139 7140 7141 7142 7143 7144 7145 7146 7147 7148 7149 7150 7151 7152 7153 7154 7155 7156 7157 7158 7159 7160 7161 7162 7163 7164 7165 7166 7167 7168 7169 7170 7171 7172 7173 7174 7175 7176 7177 7178 7179 7180 7181 7182 7183 7184 7185 7186 7187 7188 7189 7190 7191 7192 7193 7194 7195 7196 7197 7198 7199 7200 7201 7202 7203 7204 7205 7206 7207 7208 7209 7210 7211 7212 7213 7214 7215 7216 7217 7218 7219 7220 7221 7222 7223 7224 7225 7226 7227 7228 7229 7230 7231 7232 7233 7234 7235 7236 7237 7238 7239 7240 7241 7242 7243 7244 7245 7246 7247 7248 7249 7250 7251 7252 7253 7254 7255 7256 7257 7258 7259 7260 7261 7262 7263 7264 7265 7266 7267 7268 7269 7270 7271 7272 7273 7274 7275 7276 7277 7278 7279 7280 7281 7282 7283 7284 7285 7286 7287 7288 7289 7290 7291 7292 7293 7294 7295 7296 7297 7298 7299 7300 7301 7302 7303 7304 7305
/* Tunnelled migration stream support */
struct qemuStreamMigFile {
    int fd;

    int watch;
    unsigned int cbRemoved;
    unsigned int dispatching;
    virStreamEventCallback cb;
    void *opaque;
    virFreeCallback ff;
};

static int qemuStreamMigRemoveCallback(virStreamPtr stream)
{
    struct qemud_driver *driver = stream->conn->privateData;
    struct qemuStreamMigFile *qemust = stream->privateData;
    int ret = -1;

    if (!qemust) {
        qemudReportError(stream->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream is not open"));
        return -1;
    }

    qemuDriverLock(driver);
    if (qemust->watch == 0) {
        qemudReportError(stream->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream does not have a callback registered"));
        goto cleanup;
    }

    virEventRemoveHandle(qemust->watch);
    if (qemust->dispatching)
        qemust->cbRemoved = 1;
    else if (qemust->ff)
        (qemust->ff)(qemust->opaque);

    qemust->watch = 0;
    qemust->ff = NULL;
    qemust->cb = NULL;
    qemust->opaque = NULL;

    ret = 0;

cleanup:
    qemuDriverUnlock(driver);
    return ret;
}

static int qemuStreamMigUpdateCallback(virStreamPtr stream, int events)
{
    struct qemud_driver *driver = stream->conn->privateData;
    struct qemuStreamMigFile *qemust = stream->privateData;
    int ret = -1;

    if (!qemust) {
        qemudReportError(stream->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream is not open"));
        return -1;
    }

    qemuDriverLock(driver);
    if (qemust->watch == 0) {
        qemudReportError(stream->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream does not have a callback registered"));
        goto cleanup;
    }

    virEventUpdateHandle(qemust->watch, events);

    ret = 0;

cleanup:
    qemuDriverUnlock(driver);
    return ret;
}

static void qemuStreamMigEvent(int watch ATTRIBUTE_UNUSED,
                               int fd ATTRIBUTE_UNUSED,
                               int events,
                               void *opaque)
{
    virStreamPtr stream = opaque;
    struct qemud_driver *driver = stream->conn->privateData;
    struct qemuStreamMigFile *qemust = stream->privateData;
    virStreamEventCallback cb;
    void *cbopaque;
    virFreeCallback ff;

    qemuDriverLock(driver);
    if (!qemust || !qemust->cb) {
        qemuDriverUnlock(driver);
        return;
    }

    cb = qemust->cb;
    cbopaque = qemust->opaque;
    ff = qemust->ff;
    qemust->dispatching = 1;
    qemuDriverUnlock(driver);

    cb(stream, events, cbopaque);

    qemuDriverLock(driver);
    qemust->dispatching = 0;
    if (qemust->cbRemoved && ff)
        (ff)(cbopaque);
    qemuDriverUnlock(driver);
}

static int
qemuStreamMigAddCallback(virStreamPtr st,
                         int events,
                         virStreamEventCallback cb,
                         void *opaque,
                         virFreeCallback ff)
{
    struct qemud_driver *driver = st->conn->privateData;
    struct qemuStreamMigFile *qemust = st->privateData;
    int ret = -1;

    if (!qemust) {
        qemudReportError(st->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream is not open"));
        return -1;
    }

    qemuDriverLock(driver);
    if (qemust->watch != 0) {
        qemudReportError(st->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream already has a callback registered"));
        goto cleanup;
    }

    if ((qemust->watch = virEventAddHandle(qemust->fd,
                                           events,
                                           qemuStreamMigEvent,
                                           st,
                                           NULL)) < 0) {
        qemudReportError(st->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("cannot register file watch on stream"));
        goto cleanup;
    }

    qemust->cbRemoved = 0;
    qemust->cb = cb;
    qemust->opaque = opaque;
    qemust->ff = ff;
    virStreamRef(st);

    ret = 0;

cleanup:
    qemuDriverUnlock(driver);
    return ret;
}

static void qemuStreamMigFree(struct qemuStreamMigFile *qemust)
{
    if (qemust->fd != -1)
        close(qemust->fd);
    VIR_FREE(qemust);
}

static struct qemuStreamMigFile *qemuStreamMigOpen(virStreamPtr st,
                                                   const char *unixfile)
{
    struct qemuStreamMigFile *qemust = NULL;
    struct sockaddr_un sa_qemu;
    int i = 0;
    int timeout = 3;
    int ret;

7306 7307
    if (VIR_ALLOC(qemust) < 0) {
        virReportOOMError(st->conn);
C
Chris Lalancette 已提交
7308
        return NULL;
7309
    }
C
Chris Lalancette 已提交
7310 7311 7312 7313 7314 7315 7316 7317 7318 7319 7320 7321 7322 7323 7324 7325 7326 7327 7328 7329 7330 7331 7332 7333 7334 7335 7336 7337 7338 7339 7340 7341 7342 7343 7344 7345 7346 7347 7348 7349 7350 7351 7352 7353 7354 7355 7356 7357 7358 7359 7360 7361 7362 7363 7364 7365 7366 7367 7368 7369 7370 7371 7372 7373 7374 7375 7376 7377 7378 7379 7380 7381 7382 7383 7384 7385 7386 7387 7388 7389 7390 7391 7392 7393 7394 7395 7396 7397 7398 7399 7400 7401 7402 7403 7404 7405 7406 7407 7408 7409 7410 7411 7412 7413 7414 7415 7416 7417 7418 7419 7420 7421 7422 7423 7424 7425 7426 7427 7428 7429 7430 7431 7432 7433 7434 7435 7436 7437 7438 7439 7440 7441 7442 7443 7444 7445 7446 7447 7448 7449 7450 7451 7452 7453 7454 7455 7456

    qemust->fd = socket(AF_UNIX, SOCK_STREAM, 0);
    if (qemust->fd < 0)
        goto cleanup;

    memset(&sa_qemu, 0, sizeof(sa_qemu));
    sa_qemu.sun_family = AF_UNIX;
    if (virStrcpy(sa_qemu.sun_path, unixfile, sizeof(sa_qemu.sun_path)) == NULL)
        goto cleanup;

    do {
        ret = connect(qemust->fd, (struct sockaddr *)&sa_qemu, sizeof(sa_qemu));
        if (ret == 0)
            break;

        if (errno == ENOENT || errno == ECONNREFUSED) {
            /* ENOENT       : Socket may not have shown up yet
             * ECONNREFUSED : Leftover socket hasn't been removed yet */
            continue;
        }

        goto cleanup;
    } while ((++i <= timeout*5) && (usleep(.2 * 1000000) <= 0));

    if ((st->flags & VIR_STREAM_NONBLOCK) && virSetNonBlock(qemust->fd) < 0)
        goto cleanup;

    return qemust;

cleanup:
    qemuStreamMigFree(qemust);
    return NULL;
}

static int
qemuStreamMigClose(virStreamPtr st)
{
    struct qemud_driver *driver = st->conn->privateData;
    struct qemuStreamMigFile *qemust = st->privateData;

    if (!qemust)
        return 0;

    qemuDriverLock(driver);

    qemuStreamMigFree(qemust);

    st->privateData = NULL;

    qemuDriverUnlock(driver);

    return 0;
}

static int qemuStreamMigWrite(virStreamPtr st, const char *bytes, size_t nbytes)
{
    struct qemud_driver *driver = st->conn->privateData;
    struct qemuStreamMigFile *qemust = st->privateData;
    int ret;

    if (!qemust) {
        qemudReportError(st->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("stream is not open"));
        return -1;
    }

    qemuDriverLock(driver);

retry:
    ret = write(qemust->fd, bytes, nbytes);
    if (ret < 0) {
        if (errno == EAGAIN || errno == EWOULDBLOCK) {
            ret = -2;
        } else if (errno == EINTR) {
            goto retry;
        } else {
            ret = -1;
            virReportSystemError(st->conn, errno, "%s",
                                 _("cannot write to stream"));
        }
    }

    qemuDriverUnlock(driver);
    return ret;
}

static virStreamDriver qemuStreamMigDrv = {
    .streamSend = qemuStreamMigWrite,
    .streamFinish = qemuStreamMigClose,
    .streamAbort = qemuStreamMigClose,
    .streamAddCallback = qemuStreamMigAddCallback,
    .streamUpdateCallback = qemuStreamMigUpdateCallback,
    .streamRemoveCallback = qemuStreamMigRemoveCallback
};

/* Prepare is the first step, and it runs on the destination host.
 *
 * This version starts an empty VM listening on a localhost TCP port, and
 * sets up the corresponding virStream to handle the incoming data.
 */
static int
qemudDomainMigratePrepareTunnel(virConnectPtr dconn,
                                virStreamPtr st,
                                unsigned long flags,
                                const char *dname,
                                unsigned long resource ATTRIBUTE_UNUSED,
                                const char *dom_xml)
{
    struct qemud_driver *driver = dconn->privateData;
    virDomainDefPtr def = NULL;
    virDomainObjPtr vm = NULL;
    char *migrateFrom;
    virDomainEventPtr event = NULL;
    int ret = -1;
    int internalret;
    char *unixfile = NULL;
    unsigned int qemuCmdFlags;
    struct qemuStreamMigFile *qemust = NULL;

    qemuDriverLock(driver);
    if (!dom_xml) {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("no domain XML passed"));
        goto cleanup;
    }
    if (!(flags & VIR_MIGRATE_TUNNELLED)) {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("PrepareTunnel called but no TUNNELLED flag set"));
        goto cleanup;
    }
    if (st == NULL) {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("tunnelled migration requested but NULL stream passed"));
        goto cleanup;
    }

    /* Parse the domain XML. */
    if (!(def = virDomainDefParseString(dconn, driver->caps, dom_xml,
                                        VIR_DOMAIN_XML_INACTIVE))) {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("failed to parse XML"));
        goto cleanup;
    }

    /* Target domain name, maybe renamed. */
    dname = dname ? dname : def->name;

7457 7458
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
C
Chris Lalancette 已提交
7459 7460

    if (!(vm = virDomainAssignDef(dconn,
7461
                                  driver->caps,
C
Chris Lalancette 已提交
7462 7463 7464 7465 7466 7467 7468 7469
                                  &driver->domains,
                                  def))) {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("failed to assign new VM"));
        goto cleanup;
    }
    def = NULL;

7470 7471 7472
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

C
Chris Lalancette 已提交
7473 7474 7475 7476 7477 7478
    /* Domain starts inactive, even if the domain XML had an id field. */
    vm->def->id = -1;

    if (virAsprintf(&unixfile, "%s/qemu.tunnelmigrate.dest.%s",
                    driver->stateDir, vm->def->name) < 0) {
        virReportOOMError (dconn);
7479
        goto endjob;
C
Chris Lalancette 已提交
7480 7481 7482 7483 7484 7485 7486 7487
    }
    unlink(unixfile);

    /* check that this qemu version supports the interactive exec */
    if (qemudExtractVersionInfo(vm->def->emulator, NULL, &qemuCmdFlags) < 0) {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("Cannot determine QEMU argv syntax %s"),
                         vm->def->emulator);
7488
        goto endjob;
C
Chris Lalancette 已提交
7489 7490 7491 7492 7493 7494 7495 7496
    }
    if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_UNIX)
        internalret = virAsprintf(&migrateFrom, "unix:%s", unixfile);
    else if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_EXEC)
        internalret = virAsprintf(&migrateFrom, "exec:nc -U -l %s", unixfile);
    else {
        qemudReportError(dconn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("Destination qemu is too old to support tunnelled migration"));
7497
        goto endjob;
C
Chris Lalancette 已提交
7498 7499 7500
    }
    if (internalret < 0) {
        virReportOOMError(dconn);
7501
        goto endjob;
C
Chris Lalancette 已提交
7502 7503 7504 7505 7506 7507 7508 7509 7510 7511 7512 7513 7514 7515
    }
    /* Start the QEMU daemon, with the same command-line arguments plus
     * -incoming unix:/path/to/file or exec:nc -U /path/to/file
     */
    internalret = qemudStartVMDaemon(dconn, driver, vm, migrateFrom, -1);
    VIR_FREE(migrateFrom);
    if (internalret < 0) {
        /* Note that we don't set an error here because qemudStartVMDaemon
         * should have already done that.
         */
        if (!vm->persistent) {
            virDomainRemoveInactive(&driver->domains, vm);
            vm = NULL;
        }
7516
        goto endjob;
C
Chris Lalancette 已提交
7517 7518 7519 7520 7521
    }

    qemust = qemuStreamMigOpen(st, unixfile);
    if (qemust == NULL) {
        qemudShutdownVMDaemon(NULL, driver, vm);
7522
        if (!vm->persistent) {
7523 7524
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains, vm);
7525 7526
            vm = NULL;
        }
C
Chris Lalancette 已提交
7527 7528 7529
        virReportSystemError(dconn, errno,
                             _("cannot open unix socket '%s' for tunnelled migration"),
                             unixfile);
7530
        goto endjob;
C
Chris Lalancette 已提交
7531 7532 7533 7534 7535 7536 7537 7538 7539 7540
    }

    st->driver = &qemuStreamMigDrv;
    st->privateData = qemust;

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_MIGRATED);
    ret = 0;

7541
endjob:
7542 7543 7544
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
7545

C
Chris Lalancette 已提交
7546 7547
cleanup:
    virDomainDefFree(def);
7548 7549
    if (unixfile)
        unlink(unixfile);
C
Chris Lalancette 已提交
7550 7551 7552 7553 7554 7555 7556 7557 7558
    VIR_FREE(unixfile);
    if (vm)
        virDomainObjUnlock(vm);
    if (event)
        qemuDomainEventQueue(driver, event);
    qemuDriverUnlock(driver);
    return ret;
}

D
Daniel Veillard 已提交
7559 7560 7561 7562
/* Prepare is the first step, and it runs on the destination host.
 *
 * This starts an empty VM listening on a TCP port.
 */
7563
static int ATTRIBUTE_NONNULL (5)
D
Daniel Veillard 已提交
7564 7565 7566 7567 7568
qemudDomainMigratePrepare2 (virConnectPtr dconn,
                            char **cookie ATTRIBUTE_UNUSED,
                            int *cookielen ATTRIBUTE_UNUSED,
                            const char *uri_in,
                            char **uri_out,
C
Chris Lalancette 已提交
7569
                            unsigned long flags,
D
Daniel Veillard 已提交
7570 7571 7572 7573 7574
                            const char *dname,
                            unsigned long resource ATTRIBUTE_UNUSED,
                            const char *dom_xml)
{
    static int port = 0;
7575 7576
    struct qemud_driver *driver = dconn->privateData;
    virDomainDefPtr def = NULL;
D
Daniel Veillard 已提交
7577 7578
    virDomainObjPtr vm = NULL;
    int this_port;
7579
    char *hostname;
D
Daniel Veillard 已提交
7580 7581
    char migrateFrom [64];
    const char *p;
7582
    virDomainEventPtr event = NULL;
7583
    int ret = -1;
7584
    int internalret;
7585 7586

    *uri_out = NULL;
D
Daniel Veillard 已提交
7587

7588
    qemuDriverLock(driver);
C
Chris Lalancette 已提交
7589 7590 7591 7592 7593 7594 7595 7596 7597
    if (flags & VIR_MIGRATE_TUNNELLED) {
        /* this is a logical error; we never should have gotten here with
         * VIR_MIGRATE_TUNNELLED set
         */
        qemudReportError(dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         "%s", _("Tunnelled migration requested but invalid RPC method called"));
        goto cleanup;
    }

D
Daniel Veillard 已提交
7598 7599 7600
    if (!dom_xml) {
        qemudReportError (dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                          "%s", _("no domain XML passed"));
7601
        goto cleanup;
D
Daniel Veillard 已提交
7602 7603 7604 7605 7606 7607 7608 7609 7610 7611 7612 7613 7614 7615 7616 7617 7618
    }

    /* The URI passed in may be NULL or a string "tcp://somehostname:port".
     *
     * If the URI passed in is NULL then we allocate a port number
     * from our pool of port numbers and return a URI of
     * "tcp://ourhostname:port".
     *
     * If the URI passed in is not NULL then we try to parse out the
     * port number and use that (note that the hostname is assumed
     * to be a correct hostname which refers to the target machine).
     */
    if (uri_in == NULL) {
        this_port = QEMUD_MIGRATION_FIRST_PORT + port++;
        if (port == QEMUD_MIGRATION_NUM_PORTS) port = 0;

        /* Get hostname */
7619
        if ((hostname = virGetHostname(dconn)) == NULL)
7620
            goto cleanup;
D
Daniel Veillard 已提交
7621

7622 7623 7624 7625 7626
        /* XXX this really should have been a properly well-formed
         * URI, but we can't add in tcp:// now without breaking
         * compatability with old targets. We at least make the
         * new targets accept both syntaxes though.
         */
D
Daniel Veillard 已提交
7627
        /* Caller frees */
7628 7629 7630
        internalret = virAsprintf(uri_out, "tcp:%s:%d", hostname, this_port);
        VIR_FREE(hostname);
        if (internalret < 0) {
7631
            virReportOOMError (dconn);
7632
            goto cleanup;
D
Daniel Veillard 已提交
7633 7634 7635 7636 7637 7638
        }
    } else {
        /* Check the URI starts with "tcp:".  We will escape the
         * URI when passing it to the qemu monitor, so bad
         * characters in hostname part don't matter.
         */
7639
        if (!STRPREFIX (uri_in, "tcp:")) {
D
Daniel Veillard 已提交
7640
            qemudReportError (dconn, NULL, NULL, VIR_ERR_INVALID_ARG,
7641
                  "%s", _("only tcp URIs are supported for KVM/QEMU migrations"));
7642
            goto cleanup;
D
Daniel Veillard 已提交
7643 7644 7645 7646
        }

        /* Get the port number. */
        p = strrchr (uri_in, ':');
7647 7648 7649 7650 7651 7652 7653 7654 7655 7656 7657 7658 7659 7660 7661 7662 7663 7664 7665 7666
        if (p == strchr(uri_in, ':')) {
            /* Generate a port */
            this_port = QEMUD_MIGRATION_FIRST_PORT + port++;
            if (port == QEMUD_MIGRATION_NUM_PORTS)
                port = 0;

            /* Caller frees */
            if (virAsprintf(uri_out, "%s:%d", uri_in, this_port) < 0) {
                virReportOOMError (dconn);
                goto cleanup;
            }

        } else {
            p++; /* definitely has a ':' in it, see above */
            this_port = virParseNumber (&p);
            if (this_port == -1 || p-uri_in != strlen (uri_in)) {
                qemudReportError (dconn, NULL, NULL, VIR_ERR_INVALID_ARG,
                                  "%s", _("URI ended with incorrect ':port'"));
                goto cleanup;
            }
D
Daniel Veillard 已提交
7667 7668 7669
        }
    }

7670
    if (*uri_out)
7671 7672
        VIR_DEBUG("Generated uri_out=%s", *uri_out);

D
Daniel Veillard 已提交
7673
    /* Parse the domain XML. */
7674 7675
    if (!(def = virDomainDefParseString(dconn, driver->caps, dom_xml,
                                        VIR_DOMAIN_XML_INACTIVE))) {
D
Daniel Veillard 已提交
7676 7677
        qemudReportError (dconn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                          "%s", _("failed to parse XML"));
7678
        goto cleanup;
D
Daniel Veillard 已提交
7679 7680 7681 7682 7683
    }

    /* Target domain name, maybe renamed. */
    dname = dname ? dname : def->name;

7684 7685
    if (virDomainObjIsDuplicate(&driver->domains, def, 1) < 0)
        goto cleanup;
D
Daniel Veillard 已提交
7686 7687

    if (!(vm = virDomainAssignDef(dconn,
7688
                                  driver->caps,
D
Daniel Veillard 已提交
7689 7690 7691 7692
                                  &driver->domains,
                                  def))) {
        qemudReportError (dconn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                          "%s", _("failed to assign new VM"));
7693
        goto cleanup;
D
Daniel Veillard 已提交
7694
    }
7695
    def = NULL;
D
Daniel Veillard 已提交
7696

7697 7698 7699
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel Veillard 已提交
7700 7701 7702 7703 7704 7705 7706
    /* Domain starts inactive, even if the domain XML had an id field. */
    vm->def->id = -1;

    /* Start the QEMU daemon, with the same command-line arguments plus
     * -incoming tcp:0.0.0.0:port
     */
    snprintf (migrateFrom, sizeof (migrateFrom), "tcp:0.0.0.0:%d", this_port);
7707
    if (qemudStartVMDaemon (dconn, driver, vm, migrateFrom, -1) < 0) {
7708 7709 7710
        /* Note that we don't set an error here because qemudStartVMDaemon
         * should have already done that.
         */
7711
        if (!vm->persistent) {
7712 7713
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains, vm);
7714 7715
            vm = NULL;
        }
7716
        goto endjob;
D
Daniel Veillard 已提交
7717
    }
7718 7719 7720 7721

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STARTED,
                                     VIR_DOMAIN_EVENT_STARTED_MIGRATED);
7722
    ret = 0;
D
Daniel Veillard 已提交
7723

7724
endjob:
7725 7726 7727
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
7728

7729 7730 7731 7732 7733
cleanup:
    virDomainDefFree(def);
    if (ret != 0) {
        VIR_FREE(*uri_out);
    }
7734 7735
    if (vm)
        virDomainObjUnlock(vm);
7736 7737
    if (event)
        qemuDomainEventQueue(driver, event);
7738
    qemuDriverUnlock(driver);
7739
    return ret;
C
Chris Lalancette 已提交
7740 7741 7742

}

7743 7744 7745 7746 7747

/* Perform migration using QEMU's native TCP migrate support,
 * not encrypted obviously
 */
static int doNativeMigrate(virDomainPtr dom,
7748
                           struct qemud_driver *driver,
7749 7750 7751 7752 7753 7754 7755
                           virDomainObjPtr vm,
                           const char *uri,
                           unsigned long flags ATTRIBUTE_UNUSED,
                           const char *dname ATTRIBUTE_UNUSED,
                           unsigned long resource)
{
    int ret = -1;
7756
    xmlURIPtr uribits = NULL;
7757 7758
    int status;
    unsigned long long transferred, remaining, total;
7759
    qemuDomainObjPrivatePtr priv = vm->privateData;
7760 7761 7762 7763 7764 7765 7766 7767 7768 7769 7770 7771 7772 7773 7774 7775 7776 7777 7778 7779

    /* Issue the migrate command. */
    if (STRPREFIX(uri, "tcp:") && !STRPREFIX(uri, "tcp://")) {
        /* HACK: source host generates bogus URIs, so fix them up */
        char *tmpuri;
        if (virAsprintf(&tmpuri, "tcp://%s", uri + strlen("tcp:")) < 0) {
            virReportOOMError(dom->conn);
            goto cleanup;
        }
        uribits = xmlParseURI(tmpuri);
        VIR_FREE(tmpuri);
    } else {
        uribits = xmlParseURI(uri);
    }
    if (!uribits) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("cannot parse URI %s"), uri);
        goto cleanup;
    }

7780
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
7781
    if (resource > 0 &&
7782
        qemuMonitorSetMigrationSpeed(priv->mon, resource) < 0) {
7783
        qemuDomainObjExitMonitorWithDriver(driver, vm);
7784
        goto cleanup;
7785
    }
7786

7787
    if (qemuMonitorMigrateToHost(priv->mon, 0, uribits->server, uribits->port) < 0) {
7788
        qemuDomainObjExitMonitorWithDriver(driver, vm);
7789
        goto cleanup;
7790
    }
7791 7792 7793 7794

    /* it is also possible that the migrate didn't fail initially, but
     * rather failed later on.  Check the output of "info migrate"
     */
7795 7796
    if (qemuMonitorGetMigrationStatus(priv->mon,
                                      &status,
7797 7798 7799
                                      &transferred,
                                      &remaining,
                                      &total) < 0) {
7800
        qemuDomainObjExitMonitorWithDriver(driver, vm);
7801 7802
        goto cleanup;
    }
7803
    qemuDomainObjExitMonitorWithDriver(driver, vm);
7804 7805 7806 7807 7808 7809 7810 7811 7812 7813 7814 7815 7816 7817 7818

    if (status != QEMU_MONITOR_MIGRATION_STATUS_COMPLETED) {
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                          "%s", _("migrate did not successfully complete"));
        goto cleanup;
    }

    ret = 0;

cleanup:
    xmlFreeURI(uribits);
    return ret;
}


7819 7820 7821 7822 7823 7824 7825 7826 7827 7828 7829 7830 7831 7832 7833 7834 7835 7836 7837 7838 7839
static int doTunnelSendAll(virDomainPtr dom,
                           virStreamPtr st,
                           int sock)
{
    char buffer[65536];
    int nbytes = sizeof(buffer);

    /* XXX should honour the 'resource' parameter here */
    for (;;) {
        nbytes = saferead(sock, buffer, nbytes);
        if (nbytes < 0) {
            virStreamAbort(st);
            virReportSystemError(dom->conn, errno, "%s",
                                 _("tunnelled migration failed to read from qemu"));
            return -1;
        }
        else if (nbytes == 0)
            /* EOF; get out of here */
            break;

        if (virStreamSend(st, buffer, nbytes) < 0) {
C
Chris Lalancette 已提交
7840
            qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED, "%s",
7841 7842 7843 7844 7845 7846 7847 7848 7849 7850 7851 7852
                             _("Failed to write migration data to remote libvirtd"));
            return -1;
        }
    }

    if (virStreamFinish(st) < 0)
        /* virStreamFinish set the error for us */
        return -1;

    return 0;
}

C
Chris Lalancette 已提交
7853
static int doTunnelMigrate(virDomainPtr dom,
7854
                           struct qemud_driver *driver,
7855
                           virConnectPtr dconn,
C
Chris Lalancette 已提交
7856
                           virDomainObjPtr vm,
7857
                           const char *dom_xml,
C
Chris Lalancette 已提交
7858 7859 7860 7861 7862
                           const char *uri,
                           unsigned long flags,
                           const char *dname,
                           unsigned long resource)
{
7863
    qemuDomainObjPrivatePtr priv = vm->privateData;
7864 7865
    int client_sock = -1;
    int qemu_sock = -1;
C
Chris Lalancette 已提交
7866 7867
    struct sockaddr_un sa_qemu, sa_client;
    socklen_t addrlen;
7868
    virDomainPtr ddomain = NULL;
C
Chris Lalancette 已提交
7869
    int retval = -1;
7870
    virStreamPtr st = NULL;
C
Chris Lalancette 已提交
7871 7872 7873 7874 7875 7876
    char *unixfile = NULL;
    int internalret;
    unsigned int qemuCmdFlags;
    int status;
    unsigned long long transferred, remaining, total;

7877 7878 7879 7880 7881 7882 7883 7884
    /*
     * The order of operations is important here to avoid touching
     * the source VM until we are very sure we can successfully
     * start the migration operation.
     *
     *   1. setup local support infrastructure (eg sockets)
     *   2. setup destination fully
     *   3. start migration on source
C
Chris Lalancette 已提交
7885 7886
     */

7887

7888
    /* Stage 1. setup local support infrastructure */
C
Chris Lalancette 已提交
7889 7890 7891 7892

    if (virAsprintf(&unixfile, "%s/qemu.tunnelmigrate.src.%s",
                    driver->stateDir, vm->def->name) < 0) {
        virReportOOMError(dom->conn);
7893
        goto cleanup;
C
Chris Lalancette 已提交
7894 7895 7896 7897 7898 7899
    }

    qemu_sock = socket(AF_UNIX, SOCK_STREAM, 0);
    if (qemu_sock < 0) {
        virReportSystemError(dom->conn, errno, "%s",
                             _("cannot open tunnelled migration socket"));
7900
        goto cleanup;
C
Chris Lalancette 已提交
7901 7902 7903 7904 7905 7906 7907 7908
    }
    memset(&sa_qemu, 0, sizeof(sa_qemu));
    sa_qemu.sun_family = AF_UNIX;
    if (virStrcpy(sa_qemu.sun_path, unixfile,
                  sizeof(sa_qemu.sun_path)) == NULL) {
        qemudReportError(dom->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("Unix socket '%s' too big for destination"),
                         unixfile);
7909
        goto cleanup;
C
Chris Lalancette 已提交
7910 7911 7912 7913 7914 7915
    }
    unlink(unixfile);
    if (bind(qemu_sock, (struct sockaddr *)&sa_qemu, sizeof(sa_qemu)) < 0) {
        virReportSystemError(dom->conn, errno,
                             _("Cannot bind to unix socket '%s' for tunnelled migration"),
                             unixfile);
7916
        goto cleanup;
C
Chris Lalancette 已提交
7917 7918 7919 7920 7921
    }
    if (listen(qemu_sock, 1) < 0) {
        virReportSystemError(dom->conn, errno,
                             _("Cannot listen on unix socket '%s' for tunnelled migration"),
                             unixfile);
7922
        goto cleanup;
C
Chris Lalancette 已提交
7923 7924 7925 7926 7927 7928 7929
    }

    /* check that this qemu version supports the unix migration */
    if (qemudExtractVersionInfo(vm->def->emulator, NULL, &qemuCmdFlags) < 0) {
        qemudReportError(dom->conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                         _("Cannot extract Qemu version from '%s'"),
                         vm->def->emulator);
7930 7931 7932 7933 7934 7935 7936 7937
        goto cleanup;
    }

    if (!(qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_UNIX) &&
        !(qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_EXEC)) {
        qemudReportError(dom->conn, NULL, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("Source qemu is too old to support tunnelled migration"));
        goto cleanup;
C
Chris Lalancette 已提交
7938
    }
7939 7940 7941 7942 7943 7944 7945 7946 7947 7948 7949 7950 7951 7952 7953 7954 7955 7956 7957 7958 7959


    /* Stage 2. setup destination fully
     *
     * Once stage 2 has completed successfully, we *must* call finish
     * to cleanup the target whether we succeed or fail
     */
    st = virStreamNew(dconn, 0);
    if (st == NULL)
        /* virStreamNew only fails on OOM, and it reports the error itself */
        goto cleanup;

    internalret = dconn->driver->domainMigratePrepareTunnel(dconn, st,
                                                            flags, dname,
                                                            resource, dom_xml);

    if (internalret < 0)
        /* domainMigratePrepareTunnel sets the error for us */
        goto cleanup;

    /*   3. start migration on source */
7960
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
C
Chris Lalancette 已提交
7961
    if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_UNIX)
7962
        internalret = qemuMonitorMigrateToUnix(priv->mon, 1, unixfile);
C
Chris Lalancette 已提交
7963 7964
    else if (qemuCmdFlags & QEMUD_CMD_FLAG_MIGRATE_QEMU_EXEC) {
        const char *args[] = { "nc", "-U", unixfile, NULL };
7965
        internalret = qemuMonitorMigrateToCommand(priv->mon, 1, args, "/dev/null");
7966 7967
    } else {
        internalret = -1;
C
Chris Lalancette 已提交
7968
    }
7969
    qemuDomainObjExitMonitorWithDriver(driver, vm);
C
Chris Lalancette 已提交
7970 7971 7972
    if (internalret < 0) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("tunnelled migration monitor command failed"));
7973
        goto finish;
C
Chris Lalancette 已提交
7974 7975
    }

7976 7977 7978
    /* From this point onwards we *must* call cancel to abort the
     * migration on source if anything goes wrong */

C
Chris Lalancette 已提交
7979 7980 7981
    /* it is also possible that the migrate didn't fail initially, but
     * rather failed later on.  Check the output of "info migrate"
     */
7982
    qemuDomainObjEnterMonitorWithDriver(driver, vm);
7983 7984
    if (qemuMonitorGetMigrationStatus(priv->mon,
                                      &status,
C
Chris Lalancette 已提交
7985 7986 7987
                                      &transferred,
                                      &remaining,
                                      &total) < 0) {
7988
        qemuDomainObjExitMonitorWithDriver(driver, vm);
7989
        goto cancel;
C
Chris Lalancette 已提交
7990
    }
7991
    qemuDomainObjExitMonitorWithDriver(driver, vm);
C
Chris Lalancette 已提交
7992 7993 7994 7995

    if (status == QEMU_MONITOR_MIGRATION_STATUS_ERROR) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s",_("migrate failed"));
7996
        goto cancel;
C
Chris Lalancette 已提交
7997 7998 7999 8000 8001 8002 8003 8004
    }

    addrlen = sizeof(sa_client);
    while ((client_sock = accept(qemu_sock, (struct sockaddr *)&sa_client, &addrlen)) < 0) {
        if (errno == EAGAIN || errno == EINTR)
            continue;
        virReportSystemError(dom->conn, errno, "%s",
                             _("tunnelled migration failed to accept from qemu"));
8005
        goto cancel;
C
Chris Lalancette 已提交
8006 8007
    }

8008
    retval = doTunnelSendAll(dom, st, client_sock);
8009

8010
cancel:
8011
    if (retval != 0) {
8012
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
8013
        qemuMonitorMigrateCancel(priv->mon);
8014
        qemuDomainObjExitMonitorWithDriver(driver, vm);
8015
    }
C
Chris Lalancette 已提交
8016

8017
finish:
C
Chris Lalancette 已提交
8018 8019 8020
    dname = dname ? dname : dom->name;
    ddomain = dconn->driver->domainMigrateFinish2
        (dconn, dname, NULL, 0, uri, flags, retval);
8021 8022 8023 8024 8025 8026 8027

cleanup:
    if (client_sock != -1)
        close(client_sock);
    if (qemu_sock != -1)
        close(qemu_sock);

C
Chris Lalancette 已提交
8028 8029 8030
    if (ddomain)
        virUnrefDomain(ddomain);

8031 8032 8033 8034
    if (unixfile) {
        unlink(unixfile);
        VIR_FREE(unixfile);
    }
C
Chris Lalancette 已提交
8035

8036 8037 8038
    if (st)
        /* don't call virStreamFree(), because that resets any pending errors */
        virUnrefStream(st);
8039 8040 8041 8042
    return retval;
}


8043 8044 8045 8046
/* This is essentially a simplified re-impl of
 * virDomainMigrateVersion2 from libvirt.c, but running in source
 * libvirtd context, instead of client app context */
static int doNonTunnelMigrate(virDomainPtr dom,
8047
                              struct qemud_driver *driver,
8048 8049 8050 8051 8052 8053 8054 8055 8056 8057 8058 8059 8060 8061 8062 8063 8064 8065 8066 8067 8068 8069 8070 8071 8072
                              virConnectPtr dconn,
                              virDomainObjPtr vm,
                              const char *dom_xml,
                              const char *uri ATTRIBUTE_UNUSED,
                              unsigned long flags,
                              const char *dname,
                              unsigned long resource)
{
    virDomainPtr ddomain = NULL;
    int retval = -1;
    char *uri_out = NULL;

    /* NB we don't pass 'uri' into this, since that's the libvirtd
     * URI in this context - so we let dest pick it */
    if (dconn->driver->domainMigratePrepare2(dconn,
                                             NULL, /* cookie */
                                             0, /* cookielen */
                                             NULL, /* uri */
                                             &uri_out,
                                             flags, dname,
                                             resource, dom_xml) < 0)
        /* domainMigratePrepare2 sets the error for us */
        goto cleanup;

    if (uri_out == NULL) {
C
Chris Lalancette 已提交
8073
        qemudReportError(NULL, NULL, NULL, VIR_ERR_INTERNAL_ERROR, "%s",
8074
                         _("domainMigratePrepare2 did not set uri"));
8075
        goto cleanup;
8076 8077
    }

8078
    if (doNativeMigrate(dom, driver, vm, uri_out, flags, dname, resource) < 0)
8079 8080 8081 8082 8083 8084 8085 8086 8087 8088 8089 8090 8091 8092 8093 8094 8095
        goto finish;

    retval = 0;

finish:
    dname = dname ? dname : dom->name;
    ddomain = dconn->driver->domainMigrateFinish2
        (dconn, dname, NULL, 0, uri_out, flags, retval);

    if (ddomain)
        virUnrefDomain(ddomain);

cleanup:
    return retval;
}


8096
static int doPeer2PeerMigrate(virDomainPtr dom,
8097
                              struct qemud_driver *driver,
8098 8099 8100 8101 8102 8103 8104 8105 8106 8107 8108 8109 8110 8111 8112 8113 8114 8115 8116 8117 8118
                              virDomainObjPtr vm,
                              const char *uri,
                              unsigned long flags,
                              const char *dname,
                              unsigned long resource)
{
    int ret = -1;
    virConnectPtr dconn = NULL;
    char *dom_xml;

    /* the order of operations is important here; we make sure the
     * destination side is completely setup before we touch the source
     */

    dconn = virConnectOpen(uri);
    if (dconn == NULL) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                         _("Failed to connect to remote libvirt URI %s"), uri);
        return -1;
    }
    if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
8119
                                  VIR_DRV_FEATURE_MIGRATION_P2P)) {
8120
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED, "%s",
8121
                         _("Destination libvirt does not support peer-to-peer migration protocol"));
8122 8123 8124 8125 8126 8127 8128 8129 8130 8131
        goto cleanup;
    }

    dom_xml = virDomainDefFormat(dom->conn, vm->def, VIR_DOMAIN_XML_SECURE);
    if (!dom_xml) {
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_OPERATION_FAILED,
                         "%s", _("failed to get domain xml"));
        goto cleanup;
    }

8132
    if (flags & VIR_MIGRATE_TUNNELLED)
8133
        ret = doTunnelMigrate(dom, driver, dconn, vm, dom_xml, uri, flags, dname, resource);
8134
    else
8135
        ret = doNonTunnelMigrate(dom, driver, dconn, vm, dom_xml, uri, flags, dname, resource);
8136 8137 8138

cleanup:
    VIR_FREE(dom_xml);
C
Chris Lalancette 已提交
8139 8140 8141
    /* don't call virConnectClose(), because that resets any pending errors */
    virUnrefConnect(dconn);

8142
    return ret;
D
Daniel Veillard 已提交
8143 8144
}

8145

D
Daniel Veillard 已提交
8146 8147 8148 8149 8150 8151
/* Perform is the second step, and it runs on the source host. */
static int
qemudDomainMigratePerform (virDomainPtr dom,
                           const char *cookie ATTRIBUTE_UNUSED,
                           int cookielen ATTRIBUTE_UNUSED,
                           const char *uri,
8152
                           unsigned long flags,
8153
                           const char *dname,
D
Daniel Veillard 已提交
8154 8155
                           unsigned long resource)
{
8156 8157
    struct qemud_driver *driver = dom->conn->privateData;
    virDomainObjPtr vm;
8158
    virDomainEventPtr event = NULL;
8159
    int ret = -1;
8160
    int paused = 0;
D
Daniel Veillard 已提交
8161

8162
    qemuDriverLock(driver);
8163
    vm = virDomainFindByUUID(&driver->domains, dom->uuid);
D
Daniel Veillard 已提交
8164
    if (!vm) {
8165 8166 8167 8168
        char uuidstr[VIR_UUID_STRING_BUFLEN];
        virUUIDFormat(dom->uuid, uuidstr);
        qemudReportError(dom->conn, dom, NULL, VIR_ERR_NO_DOMAIN,
                         _("no domain with matching uuid '%s'"), uuidstr);
8169
        goto cleanup;
D
Daniel Veillard 已提交
8170 8171
    }

8172 8173 8174
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel P. Berrange 已提交
8175
    if (!virDomainObjIsActive(vm)) {
8176
        qemudReportError (dom->conn, dom, NULL, VIR_ERR_OPERATION_INVALID,
D
Daniel Veillard 已提交
8177
                          "%s", _("domain is not running"));
8178
        goto endjob;
D
Daniel Veillard 已提交
8179 8180
    }

8181
    if (!(flags & VIR_MIGRATE_LIVE) && vm->state == VIR_DOMAIN_RUNNING) {
8182
        qemuDomainObjPrivatePtr priv = vm->privateData;
8183
        /* Pause domain for non-live migration */
8184
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
8185
        if (qemuMonitorStopCPUs(priv->mon) < 0) {
8186 8187
            qemuDomainObjExitMonitorWithDriver(driver, vm);
            goto endjob;
8188
        }
8189
        qemuDomainObjExitMonitorWithDriver(driver, vm);
8190
        paused = 1;
8191

8192
        vm->state = VIR_DOMAIN_PAUSED;
8193 8194 8195 8196 8197 8198
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_SUSPENDED,
                                         VIR_DOMAIN_EVENT_SUSPENDED_MIGRATED);
        if (event)
            qemuDomainEventQueue(driver, event);
        event = NULL;
8199 8200
    }

8201
    if ((flags & (VIR_MIGRATE_TUNNELLED | VIR_MIGRATE_PEER2PEER))) {
8202
        if (doPeer2PeerMigrate(dom, driver, vm, uri, flags, dname, resource) < 0)
8203
            /* doPeer2PeerMigrate already set the error, so just get out */
8204
            goto endjob;
8205
    } else {
8206 8207
        if (doNativeMigrate(dom, driver, vm, uri, flags, dname, resource) < 0)
            goto endjob;
8208 8209
    }

D
Daniel Veillard 已提交
8210 8211
    /* Clean up the source domain. */
    qemudShutdownVMDaemon (dom->conn, driver, vm);
8212
    paused = 0;
8213 8214 8215 8216

    event = virDomainEventNewFromObj(vm,
                                     VIR_DOMAIN_EVENT_STOPPED,
                                     VIR_DOMAIN_EVENT_STOPPED_MIGRATED);
C
Chris Lalancette 已提交
8217 8218
    if (!vm->persistent || (flags & VIR_MIGRATE_UNDEFINE_SOURCE)) {
        virDomainDeleteConfig(dom->conn, driver->configDir, driver->autostartDir, vm);
8219 8220
        if (qemuDomainObjEndJob(vm) > 0)
            virDomainRemoveInactive(&driver->domains, vm);
8221 8222
        vm = NULL;
    }
8223
    ret = 0;
D
Daniel Veillard 已提交
8224

8225
endjob:
8226
    if (paused) {
8227
        qemuDomainObjPrivatePtr priv = vm->privateData;
8228
        /* we got here through some sort of failure; start the domain again */
8229
        qemuDomainObjEnterMonitorWithDriver(driver, vm);
8230
        if (qemuMonitorStartCPUs(priv->mon, dom->conn) < 0) {
8231 8232 8233 8234
            /* Hm, we already know we are in error here.  We don't want to
             * overwrite the previous error, though, so we just throw something
             * to the logs and hope for the best
             */
8235
            VIR_ERROR(_("Failed to resume guest %s after failure"),
8236
                      vm->def->name);
8237
        }
8238
        qemuDomainObjExitMonitorWithDriver(driver, vm);
8239

8240
        vm->state = VIR_DOMAIN_RUNNING;
8241 8242 8243 8244
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_RESUMED,
                                         VIR_DOMAIN_EVENT_RESUMED_MIGRATED);
    }
8245 8246 8247
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
8248

8249
cleanup:
8250 8251
    if (vm)
        virDomainObjUnlock(vm);
8252 8253
    if (event)
        qemuDomainEventQueue(driver, event);
8254
    qemuDriverUnlock(driver);
8255
    return ret;
D
Daniel Veillard 已提交
8256 8257 8258 8259 8260 8261 8262 8263 8264
}

/* Finish is the third and final step, and it runs on the destination host. */
static virDomainPtr
qemudDomainMigrateFinish2 (virConnectPtr dconn,
                           const char *dname,
                           const char *cookie ATTRIBUTE_UNUSED,
                           int cookielen ATTRIBUTE_UNUSED,
                           const char *uri ATTRIBUTE_UNUSED,
C
Chris Lalancette 已提交
8265
                           unsigned long flags,
D
Daniel Veillard 已提交
8266 8267
                           int retcode)
{
8268 8269 8270
    struct qemud_driver *driver = dconn->privateData;
    virDomainObjPtr vm;
    virDomainPtr dom = NULL;
8271
    virDomainEventPtr event = NULL;
8272
    virErrorPtr orig_err;
C
Chris Lalancette 已提交
8273
    int newVM = 1;
D
Daniel Veillard 已提交
8274

8275 8276 8277
    /* Migration failed. Save the current error so nothing squashes it */
    orig_err = virSaveLastError();

8278
    qemuDriverLock(driver);
8279
    vm = virDomainFindByName(&driver->domains, dname);
D
Daniel Veillard 已提交
8280
    if (!vm) {
8281 8282
        qemudReportError (dconn, NULL, NULL, VIR_ERR_NO_DOMAIN,
                          _("no domain with matching name '%s'"), dname);
8283
        goto cleanup;
D
Daniel Veillard 已提交
8284 8285
    }

8286 8287 8288
    if (qemuDomainObjBeginJobWithDriver(driver, vm) < 0)
        goto cleanup;

D
Daniel Veillard 已提交
8289 8290 8291 8292
    /* Did the migration go as planned?  If yes, return the domain
     * object, but if no, clean up the empty qemu process.
     */
    if (retcode == 0) {
C
Chris Lalancette 已提交
8293 8294 8295 8296 8297 8298 8299 8300 8301 8302 8303 8304 8305 8306 8307 8308
        if (flags & VIR_MIGRATE_PERSIST_DEST) {
            if (vm->persistent)
                newVM = 0;
            vm->persistent = 1;

            if (virDomainSaveConfig(dconn, driver->configDir, vm->def) < 0) {
                /* Hmpf.  Migration was successful, but making it persistent
                 * was not.  If we report successful, then when this domain
                 * shuts down, management tools are in for a surprise.  On the
                 * other hand, if we report failure, then the management tools
                 * might try to restart the domain on the source side, even
                 * though the domain is actually running on the destination.
                 * Return a NULL dom pointer, and hope that this is a rare
                 * situation and management tools are smart.
                 */
                vm = NULL;
8309
                goto endjob;
C
Chris Lalancette 已提交
8310 8311 8312 8313 8314 8315 8316 8317 8318
            }

            event = virDomainEventNewFromObj(vm,
                                             VIR_DOMAIN_EVENT_DEFINED,
                                             newVM ?
                                             VIR_DOMAIN_EVENT_DEFINED_ADDED :
                                             VIR_DOMAIN_EVENT_DEFINED_UPDATED);
            if (event)
                qemuDomainEventQueue(driver, event);
8319
            event = NULL;
C
Chris Lalancette 已提交
8320 8321

        }
8322
        qemuDomainObjPrivatePtr priv = vm->privateData;
D
Daniel Veillard 已提交
8323
        dom = virGetDomain (dconn, vm->def->name, vm->def->uuid);
8324

8325 8326 8327 8328 8329 8330 8331 8332 8333 8334 8335 8336 8337
        if (!(flags & VIR_MIGRATE_PAUSED)) {
            /* run 'cont' on the destination, which allows migration on qemu
             * >= 0.10.6 to work properly.  This isn't strictly necessary on
             * older qemu's, but it also doesn't hurt anything there
             */
            qemuDomainObjEnterMonitorWithDriver(driver, vm);
            if (qemuMonitorStartCPUs(priv->mon, dconn) < 0) {
                if (virGetLastError() == NULL)
                    qemudReportError(dconn, NULL, NULL, VIR_ERR_INTERNAL_ERROR,
                                     "%s", _("resume operation failed"));
                qemuDomainObjExitMonitorWithDriver(driver, vm);
                goto endjob;
            }
8338
            qemuDomainObjExitMonitorWithDriver(driver, vm);
8339 8340

            vm->state = VIR_DOMAIN_RUNNING;
8341 8342
        }

8343 8344 8345
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_RESUMED,
                                         VIR_DOMAIN_EVENT_RESUMED_MIGRATED);
8346 8347 8348 8349 8350 8351
        if (vm->state == VIR_DOMAIN_PAUSED) {
            qemuDomainEventQueue(driver, event);
            event = virDomainEventNewFromObj(vm,
                                             VIR_DOMAIN_EVENT_SUSPENDED,
                                             VIR_DOMAIN_EVENT_SUSPENDED_PAUSED);
        }
8352
        virDomainSaveStatus(dconn, driver->caps, driver->stateDir, vm);
D
Daniel Veillard 已提交
8353 8354
    } else {
        qemudShutdownVMDaemon (dconn, driver, vm);
8355 8356 8357
        event = virDomainEventNewFromObj(vm,
                                         VIR_DOMAIN_EVENT_STOPPED,
                                         VIR_DOMAIN_EVENT_STOPPED_FAILED);
8358
        if (!vm->persistent) {
8359 8360
            if (qemuDomainObjEndJob(vm) > 0)
                virDomainRemoveInactive(&driver->domains, vm);
8361 8362
            vm = NULL;
        }
D
Daniel Veillard 已提交
8363
    }
8364

8365
endjob:
8366 8367 8368
    if (vm &&
        qemuDomainObjEndJob(vm) == 0)
        vm = NULL;
8369

8370
cleanup:
8371 8372 8373 8374
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
8375 8376
    if (vm)
        virDomainObjUnlock(vm);
8377 8378
    if (event)
        qemuDomainEventQueue(driver, event);
8379
    qemuDriverUnlock(driver);
8380
    return dom;
D
Daniel Veillard 已提交
8381 8382
}

8383 8384 8385 8386 8387 8388 8389 8390 8391 8392 8393 8394 8395 8396 8397 8398
static int
qemudNodeDeviceGetPciInfo (virNodeDevicePtr dev,
                           unsigned *domain,
                           unsigned *bus,
                           unsigned *slot,
                           unsigned *function)
{
    virNodeDeviceDefPtr def = NULL;
    virNodeDevCapsDefPtr cap;
    char *xml = NULL;
    int ret = -1;

    xml = virNodeDeviceGetXMLDesc(dev, 0);
    if (!xml)
        goto out;

8399
    def = virNodeDeviceDefParseString(dev->conn, xml, EXISTING_DEVICE);
8400 8401 8402 8403 8404 8405 8406 8407 8408 8409 8410 8411 8412 8413 8414 8415 8416 8417 8418 8419 8420 8421 8422 8423 8424 8425 8426 8427 8428 8429 8430 8431 8432 8433 8434 8435 8436 8437 8438 8439 8440 8441 8442 8443 8444 8445 8446 8447 8448 8449 8450 8451 8452 8453 8454 8455 8456 8457 8458 8459 8460 8461 8462 8463 8464 8465 8466 8467 8468 8469 8470 8471 8472 8473 8474 8475 8476 8477
    if (!def)
        goto out;

    cap = def->caps;
    while (cap) {
        if (cap->type == VIR_NODE_DEV_CAP_PCI_DEV) {
            *domain   = cap->data.pci_dev.domain;
            *bus      = cap->data.pci_dev.bus;
            *slot     = cap->data.pci_dev.slot;
            *function = cap->data.pci_dev.function;
            break;
        }

        cap = cap->next;
    }

    if (!cap) {
        qemudReportError(dev->conn, NULL, NULL, VIR_ERR_INVALID_ARG,
                         _("device %s is not a PCI device"), dev->name);
        goto out;
    }

    ret = 0;
out:
    virNodeDeviceDefFree(def);
    VIR_FREE(xml);
    return ret;
}

static int
qemudNodeDeviceDettach (virNodeDevicePtr dev)
{
    pciDevice *pci;
    unsigned domain, bus, slot, function;
    int ret = -1;

    if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0)
        return -1;

    pci = pciGetDevice(dev->conn, domain, bus, slot, function);
    if (!pci)
        return -1;

    if (pciDettachDevice(dev->conn, pci) < 0)
        goto out;

    ret = 0;
out:
    pciFreeDevice(dev->conn, pci);
    return ret;
}

static int
qemudNodeDeviceReAttach (virNodeDevicePtr dev)
{
    pciDevice *pci;
    unsigned domain, bus, slot, function;
    int ret = -1;

    if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0)
        return -1;

    pci = pciGetDevice(dev->conn, domain, bus, slot, function);
    if (!pci)
        return -1;

    if (pciReAttachDevice(dev->conn, pci) < 0)
        goto out;

    ret = 0;
out:
    pciFreeDevice(dev->conn, pci);
    return ret;
}

static int
qemudNodeDeviceReset (virNodeDevicePtr dev)
{
8478
    struct qemud_driver *driver = dev->conn->privateData;
8479 8480 8481 8482 8483 8484 8485 8486 8487 8488 8489
    pciDevice *pci;
    unsigned domain, bus, slot, function;
    int ret = -1;

    if (qemudNodeDeviceGetPciInfo(dev, &domain, &bus, &slot, &function) < 0)
        return -1;

    pci = pciGetDevice(dev->conn, domain, bus, slot, function);
    if (!pci)
        return -1;

8490 8491 8492
    qemuDriverLock(driver);

    if (pciResetDevice(dev->conn, pci, driver->activePciHostdevs) < 0)
8493 8494 8495 8496
        goto out;

    ret = 0;
out:
8497
    qemuDriverUnlock(driver);
8498 8499 8500 8501
    pciFreeDevice(dev->conn, pci);
    return ret;
}

8502 8503 8504 8505 8506 8507 8508 8509 8510 8511 8512 8513 8514 8515 8516 8517 8518 8519 8520 8521 8522 8523
static int
qemuCPUCompare(virConnectPtr conn,
               const char *xmlDesc,
               unsigned int flags ATTRIBUTE_UNUSED)
{
    struct qemud_driver *driver = conn->privateData;
    int ret = VIR_CPU_COMPARE_ERROR;

    qemuDriverLock(driver);

    if (!driver->caps || !driver->caps->host.cpu) {
        qemudReportError(conn, NULL, NULL, VIR_ERR_NO_SUPPORT,
                         "%s", _("cannot get host CPU capabilities"));
    }
    else
        ret = cpuCompareXML(conn, driver->caps->host.cpu, xmlDesc);

    qemuDriverUnlock(driver);

    return ret;
}

8524 8525 8526 8527 8528
static virDriver qemuDriver = {
    VIR_DRV_QEMU,
    "QEMU",
    qemudOpen, /* open */
    qemudClose, /* close */
D
Daniel Veillard 已提交
8529
    qemudSupportsFeature, /* supports_feature */
8530 8531
    qemudGetType, /* type */
    qemudGetVersion, /* version */
8532
    NULL, /* libvirtVersion (impl. in libvirt.c) */
8533
    virGetHostname, /* getHostname */
8534
    qemudGetMaxVCPUs, /* getMaxVcpus */
8535
    nodeGetInfo, /* nodeGetInfo */
8536 8537 8538
    qemudGetCapabilities, /* getCapabilities */
    qemudListDomains, /* listDomains */
    qemudNumDomains, /* numOfDomains */
8539
    qemudDomainCreate, /* domainCreateXML */
8540 8541 8542 8543 8544
    qemudDomainLookupByID, /* domainLookupByID */
    qemudDomainLookupByUUID, /* domainLookupByUUID */
    qemudDomainLookupByName, /* domainLookupByName */
    qemudDomainSuspend, /* domainSuspend */
    qemudDomainResume, /* domainResume */
8545
    qemudDomainShutdown, /* domainShutdown */
8546 8547 8548
    NULL, /* domainReboot */
    qemudDomainDestroy, /* domainDestroy */
    qemudDomainGetOSType, /* domainGetOSType */
8549 8550 8551
    qemudDomainGetMaxMemory, /* domainGetMaxMemory */
    qemudDomainSetMaxMemory, /* domainSetMaxMemory */
    qemudDomainSetMemory, /* domainSetMemory */
8552 8553 8554
    qemudDomainGetInfo, /* domainGetInfo */
    qemudDomainSave, /* domainSave */
    qemudDomainRestore, /* domainRestore */
P
Paolo Bonzini 已提交
8555
    qemudDomainCoreDump, /* domainCoreDump */
8556
    qemudDomainSetVcpus, /* domainSetVcpus */
8557 8558
    qemudDomainPinVcpu, /* domainPinVcpu */
    qemudDomainGetVcpus, /* domainGetVcpus */
8559
    qemudDomainGetMaxVcpus, /* domainGetMaxVcpus */
8560 8561
    qemudDomainGetSecurityLabel, /* domainGetSecurityLabel */
    qemudNodeGetSecurityModel, /* nodeGetSecurityModel */
8562
    qemudDomainDumpXML, /* domainDumpXML */
8563
    qemuDomainXMLFromNative, /* domainXmlFromNative */
8564
    qemuDomainXMLToNative, /* domainXMLToNative */
8565 8566
    qemudListDefinedDomains, /* listDefinedDomains */
    qemudNumDefinedDomains, /* numOfDefinedDomains */
8567 8568 8569
    qemudDomainStart, /* domainCreate */
    qemudDomainDefine, /* domainDefineXML */
    qemudDomainUndefine, /* domainUndefine */
8570
    qemudDomainAttachDevice, /* domainAttachDevice */
8571
    qemudDomainDetachDevice, /* domainDetachDevice */
8572 8573
    qemudDomainGetAutostart, /* domainGetAutostart */
    qemudDomainSetAutostart, /* domainSetAutostart */
8574 8575 8576
    qemuGetSchedulerType, /* domainGetSchedulerType */
    qemuGetSchedulerParameters, /* domainGetSchedulerParameters */
    qemuSetSchedulerParameters, /* domainSetSchedulerParameters */
D
Daniel Veillard 已提交
8577 8578
    NULL, /* domainMigratePrepare (v1) */
    qemudDomainMigratePerform, /* domainMigratePerform */
8579
    NULL, /* domainMigrateFinish */
8580
    qemudDomainBlockStats, /* domainBlockStats */
8581
    qemudDomainInterfaceStats, /* domainInterfaceStats */
8582
    qemudDomainMemoryStats, /* domainMemoryStats */
8583
    qemudDomainBlockPeek, /* domainBlockPeek */
R
Richard W.M. Jones 已提交
8584
    qemudDomainMemoryPeek, /* domainMemoryPeek */
8585 8586
    nodeGetCellsFreeMemory, /* nodeGetCellsFreeMemory */
    nodeGetFreeMemory,  /* getFreeMemory */
8587 8588
    qemudDomainEventRegister, /* domainEventRegister */
    qemudDomainEventDeregister, /* domainEventDeregister */
D
Daniel Veillard 已提交
8589 8590
    qemudDomainMigratePrepare2, /* domainMigratePrepare2 */
    qemudDomainMigrateFinish2, /* domainMigrateFinish2 */
8591 8592 8593
    qemudNodeDeviceDettach, /* nodeDeviceDettach */
    qemudNodeDeviceReAttach, /* nodeDeviceReAttach */
    qemudNodeDeviceReset, /* nodeDeviceReset */
C
Chris Lalancette 已提交
8594
    qemudDomainMigratePrepareTunnel, /* domainMigratePrepareTunnel */
8595 8596 8597 8598
    qemuIsEncrypted,
    qemuIsSecure,
    qemuDomainIsActive,
    qemuDomainIsPersistent,
8599
    qemuCPUCompare, /* cpuCompare */
8600 8601 8602
};


8603
static virStateDriver qemuStateDriver = {
8604
    .name = "QEMU",
8605 8606 8607 8608
    .initialize = qemudStartup,
    .cleanup = qemudShutdown,
    .reload = qemudReload,
    .active = qemudActive,
8609
};
8610

8611
int qemuRegister(void) {
8612 8613 8614 8615
    virRegisterDriver(&qemuDriver);
    virRegisterStateDriver(&qemuStateDriver);
    return 0;
}