qemu_hotplug.c 209.9 KB
Newer Older
1
/*
2
 * qemu_hotplug.c: QEMU device hotplug management
3
 *
4
 * Copyright (C) 2006-2016 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
20 21 22 23 24 25
 */


#include <config.h>

#include "qemu_hotplug.h"
26
#include "qemu_alias.h"
27 28
#include "qemu_capabilities.h"
#include "qemu_domain.h"
29
#include "qemu_domain_address.h"
30 31
#include "qemu_command.h"
#include "qemu_hostdev.h"
32
#include "qemu_interface.h"
33
#include "qemu_process.h"
34
#include "qemu_security.h"
35
#include "qemu_block.h"
36
#include "domain_audit.h"
37
#include "netdev_bandwidth_conf.h"
38
#include "domain_nwfilter.h"
39
#include "virlog.h"
40
#include "datatypes.h"
41
#include "virerror.h"
42
#include "viralloc.h"
43
#include "virpci.h"
E
Eric Blake 已提交
44
#include "virfile.h"
45
#include "virprocess.h"
46
#include "qemu_cgroup.h"
47
#include "locking/domain_lock.h"
48 49
#include "virnetdev.h"
#include "virnetdevbridge.h"
A
Ansis Atteka 已提交
50
#include "virnetdevtap.h"
51
#include "virnetdevopenvswitch.h"
52
#include "virnetdevmidonet.h"
53
#include "device_conf.h"
54
#include "virstoragefile.h"
55
#include "virstring.h"
56
#include "virtime.h"
57 58

#define VIR_FROM_THIS VIR_FROM_QEMU
59 60 61

VIR_LOG_INIT("qemu.qemu_hotplug");

62
#define CHANGE_MEDIA_TIMEOUT 5000
63

64 65 66 67 68 69 70
/* Timeout in miliseconds for device removal. PPC64 domains
 * can experience a bigger delay in unplug operations during
 * heavy guest activity (vcpu being the most notable case), thus
 * the timeout for PPC64 is also bigger. */
#define QEMU_UNPLUG_TIMEOUT 1000ull * 5
#define QEMU_UNPLUG_TIMEOUT_PPC64 1000ull * 10

71

72 73 74
static void
qemuDomainResetDeviceRemoval(virDomainObjPtr vm);

75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106
/**
 * qemuDomainDeleteDevice:
 * @vm: domain object
 * @alias: device to remove
 *
 * This is a wrapper over qemuMonitorDelDevice() plus enter/exit
 * monitor calls.  This function MUST be used instead of plain
 * qemuMonitorDelDevice() in all places where @alias represents a
 * device from domain XML, i.e. caller marks the device for
 * removal and then calls qemuDomainWaitForDeviceRemoval()
 * followed by qemuDomainRemove*Device().
 *
 * For collateral devices (e.g. extension devices like zPCI) it
 * is safe to use plain qemuMonitorDelDevice().
 *
 * Upon entry, @vm must be locked.
 *
 * Returns: 0 on success,
 *         -1 otherwise.
 */
static int
qemuDomainDeleteDevice(virDomainObjPtr vm,
                       const char *alias)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virQEMUDriverPtr driver = priv->driver;
    int rc;

    qemuDomainObjEnterMonitor(driver, vm);

    rc = qemuMonitorDelDevice(priv->mon, alias);

107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        /* Domain is no longer running. No cleanup needed. */
        return -1;
    }

    if (rc < 0) {
        /* Deleting device failed. Let's check if DEVICE_DELETED
         * even arrived. If it did, we need to claim success to
         * make the caller remove device from domain XML. */

        if (priv->unplug.eventSeen) {
            /* The event arrived. Return success. */
            VIR_DEBUG("Detaching of device %s failed, but event arrived", alias);
            qemuDomainResetDeviceRemoval(vm);
            rc = 0;
        } else if (rc == -2) {
            /* The device does not exist in qemu, but it still
             * exists in libvirt. Claim success to make caller
             * qemuDomainWaitForDeviceRemoval(). Otherwise if
             * domain XML is queried right after detach API the
             * device would still be there.  */
            VIR_DEBUG("Detaching of device %s failed and no event arrived", alias);
            rc = 0;
        }
    }
132 133 134 135 136

    return rc;
}


137 138 139 140
static int
qemuDomainAttachZPCIDevice(qemuMonitorPtr mon,
                           virDomainDeviceInfoPtr info)
{
141
    g_autofree char *devstr_zpci = NULL;
142 143

    if (!(devstr_zpci = qemuBuildZPCIDevStr(info)))
144
        return -1;
145 146

    if (qemuMonitorAddDevice(mon, devstr_zpci) < 0)
147
        return -1;
148

149
    return 0;
150 151 152 153 154 155 156
}


static int
qemuDomainDetachZPCIDevice(qemuMonitorPtr mon,
                           virDomainDeviceInfoPtr info)
{
157
    g_autofree char *zpciAlias = NULL;
158

159
    zpciAlias = g_strdup_printf("zpci%d", info->addr.pci.zpci.uid);
160 161

    if (qemuMonitorDelDevice(mon, zpciAlias) < 0)
162
        return -1;
163

164
    return 0;
165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199
}


static int
qemuDomainAttachExtensionDevice(qemuMonitorPtr mon,
                                virDomainDeviceInfoPtr info)
{
    if (info->type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI ||
        info->addr.pci.extFlags == VIR_PCI_ADDRESS_EXTENSION_NONE) {
        return 0;
    }

    if (info->addr.pci.extFlags & VIR_PCI_ADDRESS_EXTENSION_ZPCI)
        return qemuDomainAttachZPCIDevice(mon, info);

    return 0;
}


static int
qemuDomainDetachExtensionDevice(qemuMonitorPtr mon,
                                virDomainDeviceInfoPtr info)
{
    if (info->type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI ||
        info->addr.pci.extFlags == VIR_PCI_ADDRESS_EXTENSION_NONE) {
        return 0;
    }

    if (info->addr.pci.extFlags & VIR_PCI_ADDRESS_EXTENSION_ZPCI)
        return qemuDomainDetachZPCIDevice(mon, info);

    return 0;
}


200
static int
201 202
qemuHotplugWaitForTrayEject(virDomainObjPtr vm,
                            virDomainDiskDefPtr disk)
203 204 205 206 207 208 209 210 211 212 213 214
{
    unsigned long long now;
    int rc;

    if (virTimeMillisNow(&now) < 0)
        return -1;

    while (disk->tray_status != VIR_DOMAIN_DISK_TRAY_OPEN) {
        if ((rc = virDomainObjWaitUntil(vm, now + CHANGE_MEDIA_TIMEOUT)) < 0)
            return -1;

        if (rc > 0) {
215 216
            /* the caller called qemuMonitorEjectMedia which usually reports an
             * error. Report the failure in an off-chance that it didn't. */
217
            if (virGetLastErrorCode() == VIR_ERR_OK) {
218 219 220
                virReportError(VIR_ERR_OPERATION_FAILED,
                               _("timed out waiting to open tray of '%s'"),
                               disk->dst);
221
            }
222 223 224 225 226 227 228 229
            return -1;
        }
    }

    return 0;
}


230
/**
231
 * qemuDomainChangeMediaLegacy:
232 233 234 235 236 237 238 239 240 241 242 243 244
 * @driver: qemu driver structure
 * @vm: domain definition
 * @disk: disk definition to change the source of
 * @newsrc: new disk source to change to
 * @force: force the change of media
 *
 * Change the media in an ejectable device to the one described by
 * @newsrc. This function also removes the old source from the
 * shared device table if appropriate. Note that newsrc is consumed
 * on success and the old source is freed on success.
 *
 * Returns 0 on success, -1 on error and reports libvirt error
 */
245 246 247 248 249 250
static int
qemuDomainChangeMediaLegacy(virQEMUDriverPtr driver,
                            virDomainObjPtr vm,
                            virDomainDiskDefPtr disk,
                            virStorageSourcePtr newsrc,
                            bool force)
251
{
252
    int rc;
253
    g_autofree char *driveAlias = NULL;
254
    qemuDomainObjPrivatePtr priv = vm->privateData;
255
    qemuDomainDiskPrivatePtr diskPriv = QEMU_DOMAIN_DISK_PRIVATE(disk);
256
    const char *format = NULL;
257
    g_autofree char *sourcestr = NULL;
258

259
    if (!disk->info.alias) {
260
        virReportError(VIR_ERR_INTERNAL_ERROR,
261
                       _("missing disk device alias name for %s"), disk->dst);
262
        return -1;
263 264
    }

265
    if (!(driveAlias = qemuAliasDiskDriveFromDisk(disk)))
266
        return -1;
267

268 269 270
    qemuDomainObjEnterMonitor(driver, vm);
    rc = qemuMonitorEjectMedia(priv->mon, driveAlias, force);
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
271
        return -1;
272

273 274
    /* If the tray is present wait for it to open. */
    if (!force && diskPriv->tray) {
275
        rc = qemuHotplugWaitForTrayEject(vm, disk);
276
        if (rc < 0)
277
            return -1;
278 279 280 281 282

        /* re-issue ejection command to pop out the media */
        qemuDomainObjEnterMonitor(driver, vm);
        rc = qemuMonitorEjectMedia(priv->mon, driveAlias, false);
        if (qemuDomainObjExitMonitor(driver, vm) < 0 || rc < 0)
283
            return -1;
284

285
    } else  {
J
Ján Tomko 已提交
286
        /* otherwise report possible errors from the attempt to eject the media */
287
        if (rc < 0)
288
            return -1;
289
    }
290

291
    if (!virStorageSourceIsEmpty(newsrc)) {
292
        if (qemuGetDriveSourceString(newsrc, NULL, &sourcestr) < 0)
293
            return -1;
294

295 296 297
        if (virStorageSourceGetActualType(newsrc) != VIR_STORAGE_TYPE_DIR)
            format = virStorageFileFormatTypeToString(newsrc->format);

298
        qemuDomainObjEnterMonitor(driver, vm);
299 300 301 302 303
        rc = qemuMonitorChangeMedia(priv->mon,
                                    driveAlias,
                                    sourcestr,
                                    format);
        if (qemuDomainObjExitMonitor(driver, vm) < 0)
304
            return -1;
305
    }
306

307
    if (rc < 0)
308
        return -1;
309

310
    return 0;
311 312
}

313

314
/**
315 316
 * qemuHotplugAttachManagedPR:
 * @driver: QEMU driver object
317
 * @vm: domain object
318 319
 * @src: new disk source to be attached to @vm
 * @asyncJob: asynchronous job identifier
320
 *
321 322
 * Checks if it's needed to start qemu-pr-helper and add the corresponding
 * pr-manager-helper object.
323
 *
324
 * Returns: 0 on success, -1 on error.
325 326
 */
static int
327 328 329 330
qemuHotplugAttachManagedPR(virQEMUDriverPtr driver,
                           virDomainObjPtr vm,
                           virStorageSourcePtr src,
                           qemuDomainAsyncJob asyncJob)
331 332
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
333
    virJSONValuePtr props = NULL;
334
    bool daemonStarted = false;
335
    int ret = -1;
336
    int rc;
337

338
    if (priv->prDaemonRunning ||
339
        !virStorageSourceChainHasManagedPR(src))
340 341
        return 0;

342
    if (!(props = qemuBuildPRManagedManagerInfoProps(priv)))
343 344
        return -1;

345 346
    if (qemuProcessStartManagedPRDaemon(vm) < 0)
        goto cleanup;
347

348 349 350 351 352 353 354 355 356 357
    daemonStarted = true;

    if (qemuDomainObjEnterMonitorAsync(driver, vm, asyncJob) < 0)
        goto cleanup;

    rc = qemuMonitorAddObject(priv->mon, &props, NULL);

    if (qemuDomainObjExitMonitor(driver, vm) < 0 || rc < 0)
        goto cleanup;

358
    ret = 0;
359

360
 cleanup:
361 362
    if (ret < 0 && daemonStarted)
        qemuProcessKillManagedPRDaemon(vm);
363 364
    virJSONValueFree(props);
    return ret;
365 366 367
}


368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383
/**
 * qemuHotplugRemoveManagedPR:
 * @driver: QEMU driver object
 * @vm: domain object
 * @asyncJob: asynchronous job identifier
 *
 * Removes the managed PR object from @vm if the configuration does not require
 * it any more.
 */
static int
qemuHotplugRemoveManagedPR(virQEMUDriverPtr driver,
                           virDomainObjPtr vm,
                           qemuDomainAsyncJob asyncJob)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virErrorPtr orig_err;
384
    int ret = -1;
385

386
    if (qemuDomainDefHasManagedPR(vm))
387 388
        return 0;

389 390
    virErrorPreserveLast(&orig_err);

391
    if (qemuDomainObjEnterMonitorAsync(driver, vm, asyncJob) < 0)
392
        goto cleanup;
393 394
    ignore_value(qemuMonitorDelObject(priv->mon, qemuDomainGetManagedPRAlias()));
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
395
        goto cleanup;
396 397 398

    qemuProcessKillManagedPRDaemon(vm);

399 400 401 402
    ret = 0;
 cleanup:
    virErrorRestore(&orig_err);
    return ret;
403 404 405
}


M
Marc-André Lureau 已提交
406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425
/**
 * qemuDomainAttachDBusVMState:
 * @driver: QEMU driver object
 * @vm: domain object
 * @id
 * @addr
 * @asyncJob: asynchronous job identifier
 *
 * Add dbus-vmstate object.
 *
 * Returns: 0 on success, -1 on error.
 */
int
qemuDomainAttachDBusVMState(virQEMUDriverPtr driver,
                            virDomainObjPtr vm,
                            const char *id,
                            const char *addr,
                            qemuDomainAsyncJob asyncJob)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
J
Ján Tomko 已提交
426
    g_autoptr(virJSONValue) props = NULL;
M
Marc-André Lureau 已提交
427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466
    int ret;

    if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_DBUS_VMSTATE)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("dbus-vmstate object is not supported by this QEMU binary"));
        return -1;
    }

    if (!(props = qemuBuildDBusVMStateInfoProps(id, addr)))
        return -1;

    if (qemuDomainObjEnterMonitorAsync(driver, vm, asyncJob) < 0)
        return -1;

    ret = qemuMonitorAddObject(priv->mon, &props, NULL);

    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        return -1;

    return ret;
}


/**
 * qemuDomainDetachDBusVMState:
 * @driver: QEMU driver object
 * @vm: domain object
 * @asyncJob: asynchronous job identifier
 *
 * Remove dbus-vmstate object from @vm.
 *
 * Returns: 0 on success, -1 on error.
 */
int
qemuDomainDetachDBusVMState(virQEMUDriverPtr driver,
                            virDomainObjPtr vm,
                            const char *id,
                            qemuDomainAsyncJob asyncJob)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
467
    g_autofree char *alias = qemuAliasDBusVMStateFromId(id);
M
Marc-André Lureau 已提交
468 469 470 471 472 473 474 475 476 477 478 479 480 481 482
    int ret;

    if (!alias ||
        qemuDomainObjEnterMonitorAsync(driver, vm, asyncJob) < 0)
        return -1;

    ret = qemuMonitorDelObject(priv->mon, alias);

    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        return -1;

    return ret;
}


483 484 485 486 487
/**
 * qemuDomainChangeMediaBlockdev:
 * @driver: qemu driver structure
 * @vm: domain definition
 * @disk: disk definition to change the source of
488
 * @oldsrc: old source definition
489 490 491 492 493 494 495 496 497 498 499 500 501 502
 * @newsrc: new disk source to change to
 * @force: force the change of media
 *
 * Change the media in an ejectable device to the one described by
 * @newsrc. This function also removes the old source from the
 * shared device table if appropriate. Note that newsrc is consumed
 * on success and the old source is freed on success.
 *
 * Returns 0 on success, -1 on error and reports libvirt error
 */
static int
qemuDomainChangeMediaBlockdev(virQEMUDriverPtr driver,
                              virDomainObjPtr vm,
                              virDomainDiskDefPtr disk,
503
                              virStorageSourcePtr oldsrc,
504 505 506 507 508
                              virStorageSourcePtr newsrc,
                              bool force)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    qemuDomainDiskPrivatePtr diskPriv = QEMU_DOMAIN_DISK_PRIVATE(disk);
J
Ján Tomko 已提交
509 510
    g_autoptr(qemuBlockStorageSourceChainData) newbackend = NULL;
    g_autoptr(qemuBlockStorageSourceChainData) oldbackend = NULL;
511
    g_autofree char *nodename = NULL;
512 513
    int rc;

514
    if (!virStorageSourceIsEmpty(oldsrc) &&
515
        !(oldbackend = qemuBlockStorageSourceChainDetachPrepareBlockdev(oldsrc)))
516
        return -1;
517

518
    if (!virStorageSourceIsEmpty(newsrc)) {
519 520
        if (!(newbackend = qemuBuildStorageSourceChainAttachPrepareBlockdev(newsrc,
                                                                            priv->qemuCaps)))
521
            return -1;
522 523

        if (qemuDomainDiskGetBackendAlias(disk, priv->qemuCaps, &nodename) < 0)
524
            return -1;
525 526 527 528 529 530
    }

    if (diskPriv->tray && disk->tray_status != VIR_DOMAIN_DISK_TRAY_OPEN) {
        qemuDomainObjEnterMonitor(driver, vm);
        rc = qemuMonitorBlockdevTrayOpen(priv->mon, diskPriv->qomName, force);
        if (qemuDomainObjExitMonitor(driver, vm) < 0 || rc < 0)
531
            return -1;
532 533

        if (!force && qemuHotplugWaitForTrayEject(vm, disk) < 0)
534
            return -1;
535 536 537 538 539 540 541
    }

    qemuDomainObjEnterMonitor(driver, vm);

    rc = qemuMonitorBlockdevMediumRemove(priv->mon, diskPriv->qomName);

    if (rc == 0 && oldbackend)
542
        qemuBlockStorageSourceChainDetach(priv->mon, oldbackend);
543 544 545

    if (newbackend && nodename) {
        if (rc == 0)
546
            rc = qemuBlockStorageSourceChainAttach(priv->mon, newbackend);
547 548 549 550 551 552 553 554 555

        if (rc == 0)
            rc = qemuMonitorBlockdevMediumInsert(priv->mon, diskPriv->qomName,
                                                 nodename);
    }

    if (rc == 0)
        rc = qemuMonitorBlockdevTrayClose(priv->mon, diskPriv->qomName);

556 557 558
    if (rc < 0 && newbackend)
        qemuBlockStorageSourceChainDetach(priv->mon, newbackend);

559
    if (qemuDomainObjExitMonitor(driver, vm) < 0 || rc < 0)
560
        return -1;
561

562
    return 0;
563 564 565
}


566 567 568 569 570 571 572 573 574 575 576 577 578 579 580
/**
 * qemuDomainChangeEjectableMedia:
 * @driver: qemu driver structure
 * @vm: domain definition
 * @disk: disk definition to change the source of
 * @newsrc: new disk source to change to
 * @force: force the change of media
 *
 * Change the media in an ejectable device to the one described by
 * @newsrc. This function also removes the old source from the
 * shared device table if appropriate. Note that newsrc is consumed
 * on success and the old source is freed on success.
 *
 * Returns 0 on success, -1 on error and reports libvirt error
 */
581
int
582 583 584 585 586 587
qemuDomainChangeEjectableMedia(virQEMUDriverPtr driver,
                               virDomainObjPtr vm,
                               virDomainDiskDefPtr disk,
                               virStorageSourcePtr newsrc,
                               bool force)
{
588
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
589
    qemuDomainObjPrivatePtr priv = vm->privateData;
590
    virStorageSourcePtr oldsrc = disk->src;
591
    qemuDomainDiskPrivatePtr diskPriv = QEMU_DOMAIN_DISK_PRIVATE(disk);
592
    bool sharedAdded = false;
593 594 595
    int ret = -1;
    int rc;

596 597 598 599 600 601
    if (diskPriv->blockjob && qemuBlockJobIsRunning(diskPriv->blockjob)) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                       _("can't change media while a block job is running on the device"));
        return -1;
    }

602 603
    disk->src = newsrc;

604 605 606 607 608 609 610 611
    if (virDomainDiskTranslateSourcePool(disk) < 0)
        goto cleanup;

    if (qemuAddSharedDisk(driver, disk, vm->def->name) < 0)
        goto cleanup;

    sharedAdded = true;

612
    if (qemuDomainDetermineDiskChain(driver, vm, disk, NULL, true) < 0)
613 614
        goto cleanup;

615 616 617
    if (qemuDomainPrepareDiskSource(disk, priv, cfg) < 0)
        goto cleanup;

618
    if (qemuDomainStorageSourceChainAccessAllow(driver, vm, newsrc) < 0)
619 620
        goto cleanup;

621 622 623
    if (qemuHotplugAttachManagedPR(driver, vm, newsrc, QEMU_ASYNC_JOB_NONE) < 0)
        goto cleanup;

624
    if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_BLOCKDEV))
625
        rc = qemuDomainChangeMediaBlockdev(driver, vm, disk, oldsrc, newsrc, force);
626 627
    else
        rc = qemuDomainChangeMediaLegacy(driver, vm, disk, newsrc, force);
628

629
    virDomainAuditDisk(vm, oldsrc, newsrc, "update", rc >= 0);
630

631
    if (rc < 0)
632 633 634
        goto cleanup;

    /* remove the old source from shared device list */
635
    disk->src = oldsrc;
636
    ignore_value(qemuRemoveSharedDisk(driver, disk, vm->def->name));
637
    ignore_value(qemuDomainStorageSourceChainAccessRevoke(driver, vm, oldsrc));
638

639
    /* media was changed, so we can remove the old media definition now */
640
    virObjectUnref(oldsrc);
641 642
    oldsrc = NULL;
    disk->src = newsrc;
643

644 645 646
    ret = 0;

 cleanup:
647 648 649 650 651
    /* undo changes to the new disk */
    if (ret < 0) {
        if (sharedAdded)
            ignore_value(qemuRemoveSharedDisk(driver, disk, vm->def->name));

652
        ignore_value(qemuDomainStorageSourceChainAccessRevoke(driver, vm, newsrc));
653 654 655 656 657 658
    }

    /* remove PR manager object if unneeded */
    ignore_value(qemuHotplugRemoveManagedPR(driver, vm, QEMU_ASYNC_JOB_NONE));

    /* revert old image do the disk definition */
659 660 661
    if (oldsrc)
        disk->src = oldsrc;

662 663 664 665
    return ret;
}


666 667 668 669 670
/**
 * qemuDomainAttachDiskGeneric:
 *
 * Attaches disk to a VM. This function aggregates common code for all bus types.
 * In cases when the VM crashed while adding the disk, -2 is returned. */
671
static int
672
qemuDomainAttachDiskGeneric(virQEMUDriverPtr driver,
673 674
                            virDomainObjPtr vm,
                            virDomainDiskDefPtr disk)
675
{
J
Ján Tomko 已提交
676
    g_autoptr(qemuBlockStorageSourceChainData) data = NULL;
677
    int ret = -1;
678
    qemuDomainObjPrivatePtr priv = vm->privateData;
679
    g_autofree char *devstr = NULL;
680
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
J
Ján Tomko 已提交
681
    g_autoptr(virJSONValue) corProps = NULL;
682
    g_autofree char *corAlias = NULL;
683
    bool corAdded = false;
684
    bool blockdev = virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_BLOCKDEV);
685

686
    if (qemuDomainStorageSourceChainAccessAllow(driver, vm, disk->src) < 0)
687
        return -1;
688

689
    if (qemuAssignDeviceDiskAlias(vm->def, disk, priv->qemuCaps) < 0)
690
        goto cleanup;
691

692
    if (qemuDomainPrepareDiskSource(disk, priv, cfg) < 0)
693
        goto cleanup;
694

695
    if (blockdev) {
696 697 698 699 700 701
        if (disk->copy_on_read == VIR_TRISTATE_SWITCH_ON) {
            if (!(corProps = qemuBlockStorageGetCopyOnReadProps(disk)))
                goto cleanup;

            corAlias = g_strdup(QEMU_DOMAIN_DISK_PRIVATE(disk)->nodeCopyOnRead);
        }
702

703 704 705 706
        if (!(data = qemuBuildStorageSourceChainAttachPrepareBlockdev(disk->src,
                                                                      priv->qemuCaps)))
            goto cleanup;
    } else {
707
        if (!(data = qemuBuildStorageSourceChainAttachPrepareDrive(disk, vm->def,
708 709 710
                                                                   priv->qemuCaps)))
            goto cleanup;
    }
711

712
    if (!(devstr = qemuBuildDiskDeviceStr(vm->def, disk, 0, priv->qemuCaps)))
713
        goto cleanup;
714

715
    if (VIR_REALLOC_N(vm->def->disks, vm->def->ndisks + 1) < 0)
716
        goto cleanup;
717

718
    if (qemuHotplugAttachManagedPR(driver, vm, disk->src, QEMU_ASYNC_JOB_NONE) < 0)
719
        goto cleanup;
720

721
    qemuDomainObjEnterMonitor(driver, vm);
722

723
    if (qemuBlockStorageSourceChainAttach(priv->mon, data) < 0)
724
        goto exit_monitor;
725

726 727 728 729 730 731
    if (corProps) {
        if (qemuMonitorBlockdevAdd(priv->mon, &corProps) < 0)
            goto exit_monitor;

        corAdded = true;
    }
732

733 734 735 736 737
    if (qemuDomainAttachExtensionDevice(priv->mon, &disk->info) < 0)
        goto exit_monitor;

    if (qemuMonitorAddDevice(priv->mon, devstr) < 0) {
        ignore_value(qemuDomainDetachExtensionDevice(priv->mon, &disk->info));
738
        goto exit_monitor;
739
    }
740

741 742 743 744 745 746 747 748 749 750 751 752 753 754 755
    /* Setup throttling of disk via block_set_io_throttle QMP command. This
     * is a hack until the 'throttle' blockdev driver will support modification
     * of the trhottle group. See also qemuProcessSetupDiskThrottlingBlockdev.
     * As there isn't anything sane to do if this fails, let's just return
     * success.
     */
    if (blockdev &&
        qemuDiskConfigBlkdeviotuneEnabled(disk)) {
        qemuDomainDiskPrivatePtr diskPriv = QEMU_DOMAIN_DISK_PRIVATE(disk);
        if (qemuMonitorSetBlockIoThrottle(priv->mon, NULL, diskPriv->qomName,
                                          &disk->blkdeviotune,
                                          true, true, true) < 0)
            VIR_WARN("failed to set blkdeviotune for '%s' of '%s'", disk->dst, vm->def->name);
    }

756
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
757
        ret = -2;
758
        goto cleanup;
759
    }
760

761
    virDomainAuditDisk(vm, NULL, disk->src, "attach", true);
762 763

    virDomainDiskInsertPreAlloced(vm->def, disk);
764
    ret = 0;
765

766
 cleanup:
767 768
    if (ret < 0)
        ignore_value(qemuDomainStorageSourceChainAccessRevoke(driver, vm, disk->src));
769
    qemuDomainSecretDiskDestroy(disk);
770
    return ret;
771

772
 exit_monitor:
773 774
    if (corAdded)
        ignore_value(qemuMonitorBlockdevDel(priv->mon, corAlias));
775
    qemuBlockStorageSourceChainDetach(priv->mon, data);
776

777
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
778
        ret = -2;
779 780 781

    if (virStorageSourceChainHasManagedPR(disk->src) &&
        qemuHotplugRemoveManagedPR(driver, vm, QEMU_ASYNC_JOB_NONE) < 0)
782
        ret = -2;
783 784

    virDomainAuditDisk(vm, NULL, disk->src, "attach", false);
785
    goto cleanup;
786 787 788
}


789
static int
790
qemuDomainAttachVirtioDiskDevice(virQEMUDriverPtr driver,
791 792 793 794 795 796 797 798 799 800
                                 virDomainObjPtr vm,
                                 virDomainDiskDefPtr disk)
{
    virDomainDeviceDef dev = { VIR_DOMAIN_DEVICE_DISK, { .disk = disk } };
    bool releaseaddr = false;
    int rv;

    if (qemuDomainEnsureVirtioAddress(&releaseaddr, vm, &dev, disk->dst) < 0)
        return -1;

801
    if ((rv = qemuDomainAttachDiskGeneric(driver, vm, disk)) < 0) {
802
        if (rv == -1 && releaseaddr)
803
            qemuDomainReleaseDeviceAddress(vm, &disk->info);
804 805 806 807 808 809 810 811

        return -1;
    }

    return 0;
}


812 813 814
int qemuDomainAttachControllerDevice(virQEMUDriverPtr driver,
                                     virDomainObjPtr vm,
                                     virDomainControllerDefPtr controller)
815 816 817
{
    int ret = -1;
    const char* type = virDomainControllerTypeToString(controller->type);
818
    g_autofree char *devstr = NULL;
819
    qemuDomainObjPrivatePtr priv = vm->privateData;
820 821
    virDomainDeviceDef dev = { VIR_DOMAIN_DEVICE_CONTROLLER,
                               { .controller = controller } };
822
    bool releaseaddr = false;
823

824 825 826 827 828 829 830
    if (controller->type != VIR_DOMAIN_CONTROLLER_TYPE_SCSI) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("'%s' controller cannot be hot plugged."),
                       virDomainControllerTypeToString(controller->type));
        return -1;
    }

831 832 833 834 835 836 837 838
    /* default idx would normally be set by virDomainDefPostParse(),
     * which isn't called in the case of live attach of a single
     * device.
     */
    if (controller->idx == -1)
       controller->idx = virDomainControllerFindUnusedIndex(vm->def,
                                                            controller->type);

839
    if (virDomainControllerFind(vm->def, controller->type, controller->idx) >= 0) {
840 841 842 843
        virReportError(VIR_ERR_OPERATION_FAILED,
                       _("target %s:%d already exists"),
                       type, controller->idx);
        return -1;
844 845
    }

846 847
    if (qemuDomainEnsureVirtioAddress(&releaseaddr, vm, &dev, "controller") < 0)
        return -1;
848

849 850 851
    if (qemuAssignDeviceControllerAlias(vm->def, priv->qemuCaps, controller) < 0)
        goto cleanup;

852
    if (qemuBuildControllerDevStr(vm->def, controller, priv->qemuCaps, &devstr) < 0)
853 854 855
        goto cleanup;

    if (!devstr)
856
        goto cleanup;
857

858
    if (VIR_REALLOC_N(vm->def->controllers, vm->def->ncontrollers+1) < 0)
859 860
        goto cleanup;

861
    qemuDomainObjEnterMonitor(driver, vm);
862 863 864 865 866 867 868 869 870 871

    if ((ret = qemuDomainAttachExtensionDevice(priv->mon,
                                               &controller->info)) < 0) {
        goto exit_monitor;
    }

    if ((ret = qemuMonitorAddDevice(priv->mon, devstr)) < 0)
        ignore_value(qemuDomainDetachExtensionDevice(priv->mon, &controller->info));

 exit_monitor:
872 873 874 875 876
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        releaseaddr = false;
        ret = -1;
        goto cleanup;
    }
877

878
    if (ret == 0)
879 880
        virDomainControllerInsertPreAlloced(vm->def, controller);

881
 cleanup:
882
    if (ret != 0 && releaseaddr)
883
        qemuDomainReleaseDeviceAddress(vm, &controller->info);
884 885 886 887 888

    return ret;
}

static virDomainControllerDefPtr
889
qemuDomainFindOrCreateSCSIDiskController(virQEMUDriverPtr driver,
890
                                         virDomainObjPtr vm,
891
                                         int controller)
892
{
893
    size_t i;
894
    virDomainControllerDefPtr cont;
895
    qemuDomainObjPrivatePtr priv = vm->privateData;
896
    int model = -1;
897

898
    for (i = 0; i < vm->def->ncontrollers; i++) {
899 900 901 902 903 904 905
        cont = vm->def->controllers[i];

        if (cont->type != VIR_DOMAIN_CONTROLLER_TYPE_SCSI)
            continue;

        if (cont->idx == controller)
            return cont;
906 907 908 909 910 911 912 913 914 915

        /* Because virDomainHostdevAssignAddress called during
         * virDomainHostdevDefPostParse cannot add a new controller
         * it will assign a controller index to a controller that doesn't
         * exist leaving this code to perform the magic of adding the
         * controller. Because that code would be attempting to add a
         * SCSI disk to an existing controller, let's save the model
         * of the "last" SCSI controller we find so that if we end up
         * creating a controller below it uses the same controller model. */
        model = cont->model;
916 917 918 919
    }

    /* No SCSI controller present, for backward compatibility we
     * now hotplug a controller */
920
    if (VIR_ALLOC(cont) < 0)
921 922
        return NULL;
    cont->type = VIR_DOMAIN_CONTROLLER_TYPE_SCSI;
923
    cont->idx = controller;
924
    if (model == VIR_DOMAIN_CONTROLLER_MODEL_SCSI_DEFAULT)
925 926 927
        cont->model = qemuDomainGetSCSIControllerModel(vm->def, cont, priv->qemuCaps);
    else
        cont->model = model;
928

929
    VIR_INFO("No SCSI controller present, hotplugging one model=%s",
930
             virDomainControllerModelSCSITypeToString(cont->model));
931
    if (qemuDomainAttachControllerDevice(driver, vm, cont) < 0) {
932 933 934 935 936
        VIR_FREE(cont);
        return NULL;
    }

    if (!virDomainObjIsActive(vm)) {
937 938
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("guest unexpectedly quit"));
939 940 941 942 943 944 945 946 947
        /* cont doesn't need freeing here, since the reference
         * now held in def->controllers */
        return NULL;
    }

    return cont;
}


948
static int
949
qemuDomainAttachSCSIDisk(virQEMUDriverPtr driver,
950 951
                         virDomainObjPtr vm,
                         virDomainDiskDefPtr disk)
952
{
953
    size_t i;
954 955 956

    /* We should have an address already, so make sure */
    if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE) {
957 958 959
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("unexpected disk address type %s"),
                       virDomainDeviceAddressTypeToString(disk->info.type));
960
        return -1;
961 962
    }

963 964 965 966 967 968
    if (virDomainSCSIDriveAddressIsUsed(vm->def, &disk->info.addr.drive)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("Domain already contains a disk with that address"));
        return -1;
    }

969 970 971 972 973 974 975 976 977
    /* Let's make sure the disk has a controller defined and loaded before
     * trying to add it. The controller used by the disk must exist before a
     * qemu command line string is generated.
     *
     * Ensure that the given controller and all controllers with a smaller index
     * exist; there must not be any missing index in between.
     */
    for (i = 0; i <= disk->info.addr.drive.controller; i++) {
        if (!qemuDomainFindOrCreateSCSIDiskController(driver, vm, i))
978
            return -1;
979
    }
980

981
    if (qemuDomainAttachDiskGeneric(driver, vm, disk) < 0)
982
        return -1;
983

984
    return 0;
985 986 987
}


988
static int
989
qemuDomainAttachUSBMassStorageDevice(virQEMUDriverPtr driver,
990 991
                                     virDomainObjPtr vm,
                                     virDomainDiskDefPtr disk)
992 993
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
994

995 996
    if (virDomainUSBAddressEnsure(priv->usbaddrs, &disk->info) < 0)
        return -1;
997

998
    if (qemuDomainAttachDiskGeneric(driver, vm, disk) < 0) {
999
        virDomainUSBAddressRelease(priv->usbaddrs, &disk->info);
1000
        return -1;
1001
    }
1002

1003
    return 0;
1004 1005 1006
}


1007 1008 1009 1010
static int
qemuDomainAttachDeviceDiskLiveInternal(virQEMUDriverPtr driver,
                                       virDomainObjPtr vm,
                                       virDomainDeviceDefPtr dev)
1011
{
1012
    size_t i;
1013 1014 1015
    virDomainDiskDefPtr disk = dev->data.disk;
    int ret = -1;

1016 1017 1018 1019 1020 1021 1022
    if (disk->device == VIR_DOMAIN_DISK_DEVICE_CDROM ||
        disk->device == VIR_DOMAIN_DISK_DEVICE_FLOPPY) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                       _("cdrom/floppy device hotplug isn't supported"));
        return -1;
    }

1023
    if (virDomainDiskTranslateSourcePool(disk) < 0)
1024
        goto cleanup;
1025 1026

    if (qemuAddSharedDevice(driver, dev, vm->def->name) < 0)
1027
        goto cleanup;
1028 1029

    if (qemuSetUnprivSGIO(dev) < 0)
1030
        goto cleanup;
1031

1032
    if (qemuDomainDetermineDiskChain(driver, vm, disk, NULL, true) < 0)
1033
        goto cleanup;
1034

1035 1036 1037 1038
    for (i = 0; i < vm->def->ndisks; i++) {
        if (virDomainDiskDefCheckDuplicateInfo(vm->def->disks[i], disk) < 0)
            goto cleanup;
    }
1039

1040 1041 1042 1043 1044
    switch ((virDomainDiskBus) disk->bus) {
    case VIR_DOMAIN_DISK_BUS_USB:
        if (disk->device == VIR_DOMAIN_DISK_DEVICE_LUN) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("disk device='lun' is not supported for usb bus"));
1045
            break;
1046
        }
1047
        ret = qemuDomainAttachUSBMassStorageDevice(driver, vm, disk);
1048
        break;
1049

1050 1051
    case VIR_DOMAIN_DISK_BUS_VIRTIO:
        ret = qemuDomainAttachVirtioDiskDevice(driver, vm, disk);
1052
        break;
1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070

    case VIR_DOMAIN_DISK_BUS_SCSI:
        ret = qemuDomainAttachSCSIDisk(driver, vm, disk);
        break;

    case VIR_DOMAIN_DISK_BUS_IDE:
    case VIR_DOMAIN_DISK_BUS_FDC:
    case VIR_DOMAIN_DISK_BUS_XEN:
    case VIR_DOMAIN_DISK_BUS_UML:
    case VIR_DOMAIN_DISK_BUS_SATA:
    case VIR_DOMAIN_DISK_BUS_SD:
        /* Note that SD card hotplug support should be added only once
         * they support '-device' (don't require -drive only).
         * See also: qemuDiskBusNeedsDriveArg */
    case VIR_DOMAIN_DISK_BUS_LAST:
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("disk bus '%s' cannot be hotplugged."),
                       virDomainDiskBusTypeToString(disk->bus));
1071 1072
    }

1073
 cleanup:
1074 1075 1076 1077 1078 1079
    if (ret != 0)
        ignore_value(qemuRemoveSharedDevice(driver, dev, vm->def->name));
    return ret;
}


1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094
/**
 * qemuDomainAttachDeviceDiskLive:
 * @driver: qemu driver struct
 * @vm: domain object
 * @dev: device to attach (expected type is DISK)
 *
 * Attach a new disk or in case of cdroms/floppies change the media in the drive.
 * This function handles all the necessary steps to attach a new storage source
 * to the VM.
 */
int
qemuDomainAttachDeviceDiskLive(virQEMUDriverPtr driver,
                               virDomainObjPtr vm,
                               virDomainDeviceDefPtr dev)
{
1095 1096 1097 1098 1099 1100 1101
    virDomainDiskDefPtr disk = dev->data.disk;
    virDomainDiskDefPtr orig_disk = NULL;

    /* this API overloads media change semantics on disk hotplug
     * for devices supporting media changes */
    if ((disk->device == VIR_DOMAIN_DISK_DEVICE_CDROM ||
         disk->device == VIR_DOMAIN_DISK_DEVICE_FLOPPY) &&
1102
        (orig_disk = virDomainDiskByTarget(vm->def, disk->dst))) {
1103 1104 1105 1106 1107 1108 1109 1110
        if (qemuDomainChangeEjectableMedia(driver, vm, orig_disk,
                                           disk->src, false) < 0)
            return -1;

        disk->src = NULL;
        return 0;
    }

1111 1112 1113 1114
    return qemuDomainAttachDeviceDiskLiveInternal(driver, vm, dev);
}


1115 1116 1117
static void
qemuDomainNetDeviceVportRemove(virDomainNetDefPtr net)
{
1118
    const virNetDevVPortProfile *vport = virDomainNetGetActualVirtPortProfile(net);
1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132
    const char *brname;

    if (!vport)
        return;

    if (vport->virtPortType == VIR_NETDEV_VPORT_PROFILE_MIDONET) {
        ignore_value(virNetDevMidonetUnbindPort(vport));
    } else if (vport->virtPortType == VIR_NETDEV_VPORT_PROFILE_OPENVSWITCH) {
        brname = virDomainNetGetActualBridgeName(net);
        ignore_value(virNetDevOpenvswitchRemovePort(brname, net->ifname));
    }
}


1133 1134 1135 1136
int
qemuDomainAttachNetDevice(virQEMUDriverPtr driver,
                          virDomainObjPtr vm,
                          virDomainNetDefPtr net)
1137 1138
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
1139
    virDomainDeviceDef dev = { VIR_DOMAIN_DEVICE_NET, { .net = net } };
1140
    virErrorPtr originalError = NULL;
1141
    g_autofree char *slirpfdName = NULL;
1142
    int slirpfd = -1;
1143 1144
    char **tapfdName = NULL;
    int *tapfd = NULL;
1145
    size_t tapfdSize = 0;
1146 1147
    char **vhostfdName = NULL;
    int *vhostfd = NULL;
1148
    size_t vhostfdSize = 0;
1149
    size_t queueSize = 0;
1150 1151
    g_autofree char *nicstr = NULL;
    g_autofree char *netstr = NULL;
1152
    int ret = -1;
1153
    bool releaseaddr = false;
1154
    bool iface_connected = false;
1155
    virDomainNetType actualType;
1156
    const virNetDevBandwidth *actualBandwidth;
1157
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
1158
    virDomainCCWAddressSetPtr ccwaddrs = NULL;
1159
    size_t i;
1160
    g_autofree char *charDevAlias = NULL;
1161 1162
    bool charDevPlugged = false;
    bool netdevPlugged = false;
1163
    g_autofree char *netdev_name = NULL;
1164
    g_autoptr(virConnect) conn = NULL;
1165
    virErrorPtr save_err = NULL;
1166

1167
    /* preallocate new slot for device */
1168
    if (VIR_REALLOC_N(vm->def->nets, vm->def->nnets + 1) < 0)
1169
        goto cleanup;
1170

1171 1172 1173 1174
    /* If appropriate, grab a physical device from the configured
     * network's pool of devices, or resolve bridge device name
     * to the one defined in the network definition.
     */
1175 1176 1177 1178 1179 1180
    if (net->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
        if (!(conn = virGetConnectNetwork()))
            goto cleanup;
        if (virDomainNetAllocateActualDevice(conn, vm->def, net) < 0)
            goto cleanup;
    }
1181

1182 1183
    /* final validation now that we have full info on the type */
    if (qemuDomainValidateActualNetDef(net, priv->qemuCaps) < 0)
1184 1185
        return -1;

1186
    actualType = virDomainNetGetActualType(net);
1187

1188 1189 1190
    if (qemuAssignDeviceNetAlias(vm->def, net, -1) < 0)
        goto cleanup;

1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201
    if (actualType == VIR_DOMAIN_NET_TYPE_HOSTDEV) {
        /* This is really a "smart hostdev", so it should be attached
         * as a hostdev (the hostdev code will reach over into the
         * netdev-specific code as appropriate), then also added to
         * the nets list (see cleanup:) if successful.
         */
        ret = qemuDomainAttachHostDevice(driver, vm,
                                         virDomainNetGetActualHostdev(net));
        goto cleanup;
    }

1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220
    if (qemuDomainIsS390CCW(vm->def) &&
        net->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI &&
        virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_CCW)) {
        net->info.type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW;
        if (!(ccwaddrs = virDomainCCWAddressSetCreateFromDomain(vm->def)))
            goto cleanup;
        if (virDomainCCWAddressAssign(&net->info, ccwaddrs,
                                      !net->info.addr.ccw.assigned) < 0)
            goto cleanup;
    } else if (virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_VIRTIO_S390)) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("virtio-s390 net device cannot be hotplugged."));
        goto cleanup;
    } else if (qemuDomainEnsurePCIAddress(vm, &dev, driver) < 0) {
        goto cleanup;
    }

    releaseaddr = true;

1221 1222
    switch (actualType) {
    case VIR_DOMAIN_NET_TYPE_BRIDGE:
1223
    case VIR_DOMAIN_NET_TYPE_NETWORK:
1224 1225 1226
        tapfdSize = vhostfdSize = net->driver.virtio.queues;
        if (!tapfdSize)
            tapfdSize = vhostfdSize = 1;
1227
        queueSize = tapfdSize;
1228
        if (VIR_ALLOC_N(tapfd, tapfdSize) < 0)
1229
            goto cleanup;
1230 1231 1232 1233
        memset(tapfd, -1, sizeof(*tapfd) * tapfdSize);
        if (VIR_ALLOC_N(vhostfd, vhostfdSize) < 0)
            goto cleanup;
        memset(vhostfd, -1, sizeof(*vhostfd) * vhostfdSize);
1234
        if (qemuInterfaceBridgeConnect(vm->def, driver, net,
1235
                                       tapfd, &tapfdSize) < 0)
1236 1237
            goto cleanup;
        iface_connected = true;
J
Ján Tomko 已提交
1238
        if (qemuInterfaceOpenVhostNet(vm->def, net, vhostfd, &vhostfdSize) < 0)
1239
            goto cleanup;
1240 1241 1242
        break;

    case VIR_DOMAIN_NET_TYPE_DIRECT:
1243 1244 1245
        tapfdSize = vhostfdSize = net->driver.virtio.queues;
        if (!tapfdSize)
            tapfdSize = vhostfdSize = 1;
1246
        queueSize = tapfdSize;
1247
        if (VIR_ALLOC_N(tapfd, tapfdSize) < 0)
1248
            goto cleanup;
1249 1250
        memset(tapfd, -1, sizeof(*tapfd) * tapfdSize);
        if (VIR_ALLOC_N(vhostfd, vhostfdSize) < 0)
1251
            goto cleanup;
1252
        memset(vhostfd, -1, sizeof(*vhostfd) * vhostfdSize);
1253 1254 1255
        if (qemuInterfaceDirectConnect(vm->def, driver, net,
                                       tapfd, tapfdSize,
                                       VIR_NETDEV_VPORT_PROFILE_OP_CREATE) < 0)
1256 1257
            goto cleanup;
        iface_connected = true;
J
Ján Tomko 已提交
1258
        if (qemuInterfaceOpenVhostNet(vm->def, net, vhostfd, &vhostfdSize) < 0)
1259
            goto cleanup;
1260 1261 1262
        break;

    case VIR_DOMAIN_NET_TYPE_ETHERNET:
1263 1264 1265
        tapfdSize = vhostfdSize = net->driver.virtio.queues;
        if (!tapfdSize)
            tapfdSize = vhostfdSize = 1;
1266
        queueSize = tapfdSize;
1267
        if (VIR_ALLOC_N(tapfd, tapfdSize) < 0)
1268
            goto cleanup;
1269 1270 1271 1272 1273
        memset(tapfd, -1, sizeof(*tapfd) * tapfdSize);
        if (VIR_ALLOC_N(vhostfd, vhostfdSize) < 0)
            goto cleanup;
        memset(vhostfd, -1, sizeof(*vhostfd) * vhostfdSize);
        if (qemuInterfaceEthernetConnect(vm->def, driver, net,
1274
                                         tapfd, tapfdSize) < 0)
1275 1276
            goto cleanup;
        iface_connected = true;
J
Ján Tomko 已提交
1277
        if (qemuInterfaceOpenVhostNet(vm->def, net, vhostfd, &vhostfdSize) < 0)
1278
            goto cleanup;
1279 1280 1281
        break;

    case VIR_DOMAIN_NET_TYPE_VHOSTUSER:
1282 1283 1284
        queueSize = net->driver.virtio.queues;
        if (!queueSize)
            queueSize = 1;
1285
        if (!qemuDomainSupportsNicdev(vm->def, net)) {
1286
            virReportError(VIR_ERR_INTERNAL_ERROR,
1287
                           "%s", _("Nicdev support unavailable"));
1288 1289 1290
            goto cleanup;
        }

1291
        if (!(charDevAlias = qemuAliasChardevFromDevAlias(net->info.alias)))
1292
            goto cleanup;
1293 1294 1295 1296 1297

        if (virNetDevOpenvswitchGetVhostuserIfname(net->data.vhostuser->data.nix.path,
                                                   &net->ifname) < 0)
            goto cleanup;

1298 1299 1300
        break;

    case VIR_DOMAIN_NET_TYPE_USER:
1301
        if (!priv->disableSlirp &&
1302
            virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_DBUS_VMSTATE)) {
1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317
            qemuSlirpPtr slirp = qemuInterfacePrepareSlirp(driver, net);

            if (!slirp)
                break;

            QEMU_DOMAIN_NETWORK_PRIVATE(net)->slirp = slirp;

            if (qemuSlirpOpen(slirp, driver, vm->def) < 0 ||
                qemuSlirpStart(slirp, vm, driver, net, true, NULL) < 0) {
                virReportError(VIR_ERR_INTERNAL_ERROR,
                               "%s", _("Failed to start slirp"));
                goto cleanup;
            }

            slirpfd = qemuSlirpGetFD(slirp);
1318
            slirpfdName = g_strdup_printf("slirpfd-%s", net->info.alias);
1319
        }
1320 1321
        break;

1322 1323 1324 1325
    case VIR_DOMAIN_NET_TYPE_HOSTDEV:
        /* hostdev interfaces were handled earlier in this function */
        break;

1326 1327 1328 1329 1330 1331 1332 1333 1334 1335
    case VIR_DOMAIN_NET_TYPE_SERVER:
    case VIR_DOMAIN_NET_TYPE_CLIENT:
    case VIR_DOMAIN_NET_TYPE_MCAST:
    case VIR_DOMAIN_NET_TYPE_INTERNAL:
    case VIR_DOMAIN_NET_TYPE_UDP:
    case VIR_DOMAIN_NET_TYPE_LAST:
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("hotplug of interface type of %s is not implemented yet"),
                       virDomainNetTypeToString(actualType));
        goto cleanup;
1336 1337
    }

1338 1339
    /* Set device online immediately */
    if (qemuInterfaceStartDevice(net) < 0)
1340
        goto cleanup;
1341

1342 1343 1344 1345
    /* Set bandwidth or warn if requested and not supported. */
    actualBandwidth = virDomainNetGetActualBandwidth(net);
    if (actualBandwidth) {
        if (virNetDevSupportBandwidth(actualType)) {
1346 1347
            if (virNetDevBandwidthSet(net->ifname, actualBandwidth, false,
                                      !virDomainNetTypeSharesHostView(net)) < 0)
1348 1349 1350 1351 1352 1353 1354
                goto cleanup;
        } else {
            VIR_WARN("setting bandwidth on interfaces of "
                     "type '%s' is not implemented yet",
                     virDomainNetTypeToString(actualType));
        }
    }
1355

1356 1357 1358 1359
    if (net->mtu &&
        virNetDevSetMTU(net->ifname, net->mtu) < 0)
        goto cleanup;

M
Michal Privoznik 已提交
1360
    for (i = 0; i < tapfdSize; i++) {
1361 1362
        if (qemuSecuritySetTapFDLabel(driver->securityManager,
                                      vm->def, tapfd[i]) < 0)
M
Michal Privoznik 已提交
1363 1364 1365
            goto cleanup;
    }

1366
    if (VIR_ALLOC_N(tapfdName, tapfdSize) < 0 ||
1367
        VIR_ALLOC_N(vhostfdName, vhostfdSize) < 0)
1368 1369
        goto cleanup;

1370 1371
    for (i = 0; i < tapfdSize; i++)
        tapfdName[i] = g_strdup_printf("fd-%s%zu", net->info.alias, i);
1372

1373 1374
    for (i = 0; i < vhostfdSize; i++)
        vhostfdName[i] = g_strdup_printf("vhostfd-%s%zu", net->info.alias, i);
1375

1376
    if (!(netstr = qemuBuildHostNetStr(net,
J
Ján Tomko 已提交
1377
                                       tapfdName, tapfdSize,
1378
                                       vhostfdName, vhostfdSize,
1379
                                       slirpfdName)))
J
Ján Tomko 已提交
1380
        goto cleanup;
1381

1382
    qemuDomainObjEnterMonitor(driver, vm);
1383 1384 1385 1386 1387 1388 1389 1390 1391 1392

    if (actualType == VIR_DOMAIN_NET_TYPE_VHOSTUSER) {
        if (qemuMonitorAttachCharDev(priv->mon, charDevAlias, net->data.vhostuser) < 0) {
            ignore_value(qemuDomainObjExitMonitor(driver, vm));
            virDomainAuditNet(vm, NULL, net, "attach", false);
            goto cleanup;
        }
        charDevPlugged = true;
    }

J
Ján Tomko 已提交
1393 1394
    if (qemuMonitorAddNetdev(priv->mon, netstr,
                             tapfd, tapfdName, tapfdSize,
1395 1396
                             vhostfd, vhostfdName, vhostfdSize,
                             slirpfd, slirpfdName) < 0) {
J
Ján Tomko 已提交
1397 1398 1399
        ignore_value(qemuDomainObjExitMonitor(driver, vm));
        virDomainAuditNet(vm, NULL, net, "attach", false);
        goto try_remove;
1400
    }
J
Ján Tomko 已提交
1401
    netdevPlugged = true;
1402

1403 1404
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;
1405

1406 1407 1408 1409
    for (i = 0; i < tapfdSize; i++)
        VIR_FORCE_CLOSE(tapfd[i]);
    for (i = 0; i < vhostfdSize; i++)
        VIR_FORCE_CLOSE(vhostfd[i]);
1410

1411
    if (!(nicstr = qemuBuildNicDevStr(vm->def, net, 0,
1412
                                      queueSize, priv->qemuCaps)))
1413
        goto try_remove;
1414

1415
    qemuDomainObjEnterMonitor(driver, vm);
1416 1417 1418 1419 1420 1421 1422

    if (qemuDomainAttachExtensionDevice(priv->mon, &net->info) < 0) {
        ignore_value(qemuDomainObjExitMonitor(driver, vm));
        virDomainAuditNet(vm, NULL, net, "attach", false);
        goto try_remove;
    }

1423
    if (qemuMonitorAddDevice(priv->mon, nicstr) < 0) {
1424
        ignore_value(qemuDomainDetachExtensionDevice(priv->mon, &net->info));
1425 1426 1427
        ignore_value(qemuDomainObjExitMonitor(driver, vm));
        virDomainAuditNet(vm, NULL, net, "attach", false);
        goto try_remove;
1428
    }
1429 1430
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;
1431

1432 1433 1434
    /* set link state */
    if (net->linkstate == VIR_DOMAIN_NET_INTERFACE_LINK_STATE_DOWN) {
        if (!net->info.alias) {
1435 1436
            virReportError(VIR_ERR_OPERATION_FAILED, "%s",
                           _("device alias not found: cannot set link state to down"));
1437
        } else {
1438
            qemuDomainObjEnterMonitor(driver, vm);
1439

J
Ján Tomko 已提交
1440 1441 1442 1443
            if (qemuMonitorSetLink(priv->mon, net->info.alias, VIR_DOMAIN_NET_INTERFACE_LINK_STATE_DOWN) < 0) {
                ignore_value(qemuDomainObjExitMonitor(driver, vm));
                virDomainAuditNet(vm, NULL, net, "attach", false);
                goto try_remove;
1444 1445
            }

1446 1447
            if (qemuDomainObjExitMonitor(driver, vm) < 0)
                goto cleanup;
1448 1449 1450 1451
        }
        /* link set to down */
    }

1452
    virDomainAuditNet(vm, NULL, net, "attach", true);
1453 1454 1455

    ret = 0;

1456
 cleanup:
1457 1458 1459
    if (!ret) {
        vm->def->nets[vm->def->nnets++] = net;
    } else {
1460
        virErrorPreserveLast(&save_err);
1461
        if (releaseaddr)
1462
            qemuDomainReleaseDeviceAddress(vm, &net->info);
1463

1464
        if (iface_connected) {
1465
            virErrorPreserveLast(&originalError);
1466
            virDomainConfNWFilterTeardown(net);
1467
            virErrorRestore(&originalError);
1468

1469 1470 1471 1472 1473 1474 1475 1476 1477
            if (virDomainNetGetActualType(net) == VIR_DOMAIN_NET_TYPE_DIRECT) {
                ignore_value(virNetDevMacVLanDeleteWithVPortProfile(
                                 net->ifname, &net->mac,
                                 virDomainNetGetActualDirectDev(net),
                                 virDomainNetGetActualDirectMode(net),
                                 virDomainNetGetActualVirtPortProfile(net),
                                 cfg->stateDir));
            }

1478
            qemuDomainNetDeviceVportRemove(net);
1479
        }
A
Ansis Atteka 已提交
1480

1481 1482
        virDomainNetRemoveHostdev(vm->def, net);

1483 1484 1485 1486 1487 1488
        if (net->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
            if (conn)
                virDomainNetReleaseActualDevice(conn, vm->def, net);
            else
                VIR_WARN("Unable to release network device '%s'", NULLSTR(net->ifname));
        }
1489
        virErrorRestore(&save_err);
1490
    }
1491

1492
    for (i = 0; tapfd && i < tapfdSize; i++) {
1493
        VIR_FORCE_CLOSE(tapfd[i]);
1494 1495
        if (tapfdName)
            VIR_FREE(tapfdName[i]);
1496 1497 1498
    }
    VIR_FREE(tapfd);
    VIR_FREE(tapfdName);
1499
    for (i = 0; vhostfd && i < vhostfdSize; i++) {
1500
        VIR_FORCE_CLOSE(vhostfd[i]);
1501 1502
        if (vhostfdName)
            VIR_FREE(vhostfdName[i]);
1503 1504 1505
    }
    VIR_FREE(vhostfd);
    VIR_FREE(vhostfdName);
1506
    virDomainCCWAddressSetFree(ccwaddrs);
1507
    VIR_FORCE_CLOSE(slirpfd);
1508 1509 1510

    return ret;

1511
 try_remove:
1512 1513 1514
    if (!virDomainObjIsActive(vm))
        goto cleanup;

1515
    virErrorPreserveLast(&originalError);
1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527
    netdev_name = g_strdup_printf("host%s", net->info.alias);
    if (QEMU_DOMAIN_NETWORK_PRIVATE(net)->slirp)
        qemuSlirpStop(QEMU_DOMAIN_NETWORK_PRIVATE(net)->slirp, vm, driver, net, true);
    qemuDomainObjEnterMonitor(driver, vm);
    if (charDevPlugged &&
        qemuMonitorDetachCharDev(priv->mon, charDevAlias) < 0)
        VIR_WARN("Failed to remove associated chardev %s", charDevAlias);
    if (netdevPlugged &&
        qemuMonitorRemoveNetdev(priv->mon, netdev_name) < 0)
        VIR_WARN("Failed to remove network backend for netdev %s",
                 netdev_name);
    ignore_value(qemuDomainObjExitMonitor(driver, vm));
1528
    virErrorRestore(&originalError);
1529 1530 1531 1532
    goto cleanup;
}


1533
static int
1534
qemuDomainAttachHostPCIDevice(virQEMUDriverPtr driver,
1535 1536
                              virDomainObjPtr vm,
                              virDomainHostdevDefPtr hostdev)
1537 1538
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
1539 1540
    virDomainDeviceDef dev = { VIR_DOMAIN_DEVICE_HOSTDEV,
                               { .hostdev = hostdev } };
1541
    virDomainDeviceInfoPtr info = hostdev->info;
1542
    int ret;
1543
    g_autofree char *devstr = NULL;
1544
    bool releaseaddr = false;
1545
    bool teardowncgroup = false;
1546
    bool teardownlabel = false;
1547
    bool teardowndevice = false;
1548
    bool teardownmemlock = false;
1549
    int backend;
1550
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
1551
    unsigned int flags = 0;
1552

1553
    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs + 1) < 0)
1554
        return -1;
1555

1556 1557
    if (!cfg->relaxedACS)
        flags |= VIR_HOSTDEV_STRICT_ACS_CHECK;
1558
    if (qemuHostdevPreparePCIDevices(driver, vm->def->name, vm->def->uuid,
1559
                                     &hostdev, 1, priv->qemuCaps, flags) < 0)
1560
        return -1;
1561

1562
    /* this could have been changed by qemuHostdevPreparePCIDevices */
1563 1564
    backend = hostdev->source.subsys.u.pci.backend;

1565
    switch ((virDomainHostdevSubsysPCIBackendType)backend) {
1566
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO:
1567 1568 1569 1570 1571 1572
        if (!virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_DEVICE_VFIO_PCI)) {
            virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                           _("VFIO PCI device assignment is not "
                             "supported by this version of qemu"));
            goto error;
        }
1573 1574
        break;

1575 1576 1577 1578 1579 1580 1581 1582 1583 1584
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_DEFAULT:
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_KVM:
        break;

    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_XEN:
    case VIR_DOMAIN_HOSTDEV_PCI_BACKEND_TYPE_LAST:
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("QEMU does not support device assignment mode '%s'"),
                       virDomainHostdevSubsysPCIBackendTypeToString(backend));
        goto error;
1585
        break;
1586 1587
    }

1588
    if (qemuDomainAdjustMaxMemLockHostdev(vm, hostdev) < 0)
1589
        goto error;
1590
    teardownmemlock = true;
1591

1592
    if (qemuDomainNamespaceSetupHostdev(vm, hostdev) < 0)
1593 1594 1595
        goto error;
    teardowndevice = true;

1596
    if (qemuSetupHostdevCgroup(vm, hostdev) < 0)
1597 1598 1599
        goto error;
    teardowncgroup = true;

1600
    if (qemuSecuritySetHostdevLabel(driver, vm, hostdev) < 0)
1601
        goto error;
1602 1603
    if (backend != VIR_DOMAIN_HOSTDEV_PCI_BACKEND_VFIO)
        teardownlabel = true;
1604

1605
    if (qemuAssignDeviceHostdevAlias(vm->def, &info->alias, -1) < 0)
1606
        goto error;
1607

1608
    if (qemuDomainIsPSeries(vm->def))
1609
        /* Isolation groups are only relevant for pSeries guests */
1610
        qemuDomainFillDeviceIsolationGroup(vm->def, &dev);
1611

1612
    if (qemuDomainEnsurePCIAddress(vm, &dev, driver) < 0)
1613 1614
        goto error;
    releaseaddr = true;
1615

1616 1617 1618 1619 1620
    if (!virDomainObjIsActive(vm)) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("guest unexpectedly quit during hotplug"));
        goto error;
    }
1621

M
Michal Privoznik 已提交
1622
    if (!(devstr = qemuBuildPCIHostdevDevStr(vm->def, hostdev, 0, priv->qemuCaps)))
1623
        goto error;
1624

1625
    qemuDomainObjEnterMonitor(driver, vm);
1626 1627 1628 1629

    if ((ret = qemuDomainAttachExtensionDevice(priv->mon, hostdev->info)) < 0)
        goto exit_monitor;

M
Michal Privoznik 已提交
1630
    if ((ret = qemuMonitorAddDevice(priv->mon, devstr)) < 0)
1631 1632 1633
        ignore_value(qemuDomainDetachExtensionDevice(priv->mon, hostdev->info));

 exit_monitor:
1634 1635
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto error;
1636

1637
    virDomainAuditHostdev(vm, hostdev, "attach", ret == 0);
1638 1639 1640 1641 1642 1643 1644
    if (ret < 0)
        goto error;

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;

    return 0;

1645
 error:
1646 1647
    if (teardowncgroup && qemuTeardownHostdevCgroup(vm, hostdev) < 0)
        VIR_WARN("Unable to remove host device cgroup ACL on hotplug fail");
1648
    if (teardownlabel &&
1649
        qemuSecurityRestoreHostdevLabel(driver, vm, hostdev) < 0)
1650
        VIR_WARN("Unable to restore host device labelling on hotplug fail");
1651
    if (teardowndevice &&
1652
        qemuDomainNamespaceTeardownHostdev(vm, hostdev) < 0)
1653
        VIR_WARN("Unable to remove host device from /dev");
1654
    if (teardownmemlock && qemuDomainAdjustMaxMemLock(vm, false) < 0)
1655
        VIR_WARN("Unable to reset maximum locked memory on hotplug fail");
1656

1657
    if (releaseaddr)
1658
        qemuDomainReleaseDeviceAddress(vm, info);
1659

1660
    qemuHostdevReAttachPCIDevices(driver, vm->def->name, &hostdev, 1);
1661 1662 1663 1664 1665

    return -1;
}


1666 1667 1668
void
qemuDomainDelTLSObjects(virQEMUDriverPtr driver,
                        virDomainObjPtr vm,
1669
                        qemuDomainAsyncJob asyncJob,
1670 1671 1672 1673 1674 1675 1676 1677 1678
                        const char *secAlias,
                        const char *tlsAlias)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virErrorPtr orig_err;

    if (!tlsAlias && !secAlias)
        return;

1679
    virErrorPreserveLast(&orig_err);
1680

1681 1682
    if (qemuDomainObjEnterMonitorAsync(driver, vm, asyncJob) < 0)
        goto cleanup;
1683 1684 1685 1686 1687 1688 1689 1690 1691

    if (tlsAlias)
        ignore_value(qemuMonitorDelObject(priv->mon, tlsAlias));

    if (secAlias)
        ignore_value(qemuMonitorDelObject(priv->mon, secAlias));

    ignore_value(qemuDomainObjExitMonitor(driver, vm));

1692
 cleanup:
1693
    virErrorRestore(&orig_err);
1694 1695 1696 1697 1698 1699
}


int
qemuDomainAddTLSObjects(virQEMUDriverPtr driver,
                        virDomainObjPtr vm,
1700
                        qemuDomainAsyncJob asyncJob,
1701 1702 1703 1704 1705
                        virJSONValuePtr *secProps,
                        virJSONValuePtr *tlsProps)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virErrorPtr orig_err;
1706
    g_autofree char *secAlias = NULL;
1707

1708
    if (!tlsProps && !secProps)
1709 1710
        return 0;

1711 1712
    if (qemuDomainObjEnterMonitorAsync(driver, vm, asyncJob) < 0)
        return -1;
1713

1714
    if (secProps && *secProps &&
1715 1716
        qemuMonitorAddObject(priv->mon, secProps, &secAlias) < 0)
        goto error;
1717

1718 1719 1720
    if (tlsProps &&
        qemuMonitorAddObject(priv->mon, tlsProps, NULL) < 0)
        goto error;
1721 1722 1723 1724

    return qemuDomainObjExitMonitor(driver, vm);

 error:
1725
    virErrorPreserveLast(&orig_err);
1726
    ignore_value(qemuDomainObjExitMonitor(driver, vm));
1727
    virErrorRestore(&orig_err);
1728
    qemuDomainDelTLSObjects(driver, vm, asyncJob, secAlias, NULL);
1729 1730 1731 1732 1733

    return -1;
}


1734 1735 1736 1737 1738 1739
int
qemuDomainGetTLSObjects(virQEMUCapsPtr qemuCaps,
                        qemuDomainSecretInfoPtr secinfo,
                        const char *tlsCertdir,
                        bool tlsListen,
                        bool tlsVerify,
1740
                        const char *alias,
1741
                        virJSONValuePtr *tlsProps,
1742
                        virJSONValuePtr *secProps)
1743
{
1744 1745
    const char *secAlias = NULL;

1746 1747
    if (secinfo) {
        if (qemuBuildSecretInfoProps(secinfo, secProps) < 0)
1748 1749
            return -1;

1750
        secAlias = secinfo->s.aes.alias;
1751 1752
    }

1753
    if (qemuBuildTLSx509BackendProps(tlsCertdir, tlsListen, tlsVerify,
1754
                                     alias, secAlias, qemuCaps, tlsProps) < 0)
1755 1756 1757 1758 1759 1760
        return -1;

    return 0;
}


1761
static int
1762
qemuDomainAddChardevTLSObjects(virQEMUDriverPtr driver,
1763 1764
                               virDomainObjPtr vm,
                               virDomainChrSourceDefPtr dev,
1765
                               char *devAlias,
1766 1767
                               char *charAlias,
                               char **tlsAlias,
1768
                               const char **secAlias)
1769 1770
{
    int ret = -1;
1771
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
1772
    qemuDomainObjPrivatePtr priv = vm->privateData;
1773 1774
    qemuDomainChrSourcePrivatePtr chrSourcePriv;
    qemuDomainSecretInfoPtr secinfo = NULL;
1775 1776 1777
    virJSONValuePtr tlsProps = NULL;
    virJSONValuePtr secProps = NULL;

1778 1779 1780
    /* NB: This may alter haveTLS based on cfg */
    qemuDomainPrepareChardevSourceTLS(dev, cfg);

1781
    if (dev->type != VIR_DOMAIN_CHR_TYPE_TCP ||
1782 1783 1784 1785
        dev->data.tcp.haveTLS != VIR_TRISTATE_BOOL_YES) {
        ret = 0;
        goto cleanup;
    }
1786

1787
    if (qemuDomainSecretChardevPrepare(cfg, priv, devAlias, dev) < 0)
1788 1789
        goto cleanup;

1790 1791 1792
    if ((chrSourcePriv = QEMU_DOMAIN_CHR_SOURCE_PRIVATE(dev)))
        secinfo = chrSourcePriv->secinfo;

1793 1794 1795
    if (secinfo)
        *secAlias = secinfo->s.aes.alias;

1796 1797 1798
    if (!(*tlsAlias = qemuAliasTLSObjFromSrcAlias(charAlias)))
        goto cleanup;

1799 1800 1801 1802
    if (qemuDomainGetTLSObjects(priv->qemuCaps, secinfo,
                                cfg->chardevTLSx509certdir,
                                dev->data.tcp.listen,
                                cfg->chardevTLSx509verify,
1803
                                *tlsAlias, &tlsProps, &secProps) < 0)
1804
        goto cleanup;
1805
    dev->data.tcp.tlscreds = true;
1806

1807
    if (qemuDomainAddTLSObjects(driver, vm, QEMU_ASYNC_JOB_NONE,
1808
                                &secProps, &tlsProps) < 0)
1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820
        goto cleanup;

    ret = 0;

 cleanup:
    virJSONValueFree(tlsProps);
    virJSONValueFree(secProps);

    return ret;
}


1821 1822 1823
static int
qemuDomainDelChardevTLSObjects(virQEMUDriverPtr driver,
                               virDomainObjPtr vm,
1824
                               virDomainChrSourceDefPtr dev,
1825 1826
                               const char *inAlias)
{
1827
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
1828
    qemuDomainObjPrivatePtr priv = vm->privateData;
1829 1830
    g_autofree char *tlsAlias = NULL;
    g_autofree char *secAlias = NULL;
1831

1832 1833
    if (dev->type != VIR_DOMAIN_CHR_TYPE_TCP ||
        dev->data.tcp.haveTLS != VIR_TRISTATE_BOOL_YES) {
1834
        return 0;
1835 1836
    }

1837
    if (!(tlsAlias = qemuAliasTLSObjFromSrcAlias(inAlias)))
1838
        return -1;
1839 1840 1841 1842 1843 1844 1845

    /* Best shot at this as the secinfo is destroyed after process launch
     * and this path does not recreate it. Thus, if the config has the
     * secret UUID and we have a serial TCP chardev, then formulate a
     * secAlias which we'll attempt to destroy. */
    if (cfg->chardevTLSx509secretUUID &&
        !(secAlias = qemuDomainGetSecretAESAlias(inAlias, false)))
1846
        return -1;
1847 1848 1849 1850 1851 1852 1853 1854

    qemuDomainObjEnterMonitor(driver, vm);

    ignore_value(qemuMonitorDelObject(priv->mon, tlsAlias));
    if (secAlias)
        ignore_value(qemuMonitorDelObject(priv->mon, secAlias));

    if (qemuDomainObjExitMonitor(driver, vm) < 0)
1855
        return -1;
1856

1857
    return 0;
1858 1859 1860
}


1861
int qemuDomainAttachRedirdevDevice(virQEMUDriverPtr driver,
1862 1863 1864
                                   virDomainObjPtr vm,
                                   virDomainRedirdevDefPtr redirdev)
{
1865
    int ret = -1;
1866
    qemuDomainObjPrivatePtr priv = vm->privateData;
1867
    virDomainDefPtr def = vm->def;
1868 1869
    g_autofree char *charAlias = NULL;
    g_autofree char *devstr = NULL;
1870
    bool chardevAdded = false;
1871
    g_autofree char *tlsAlias = NULL;
1872
    const char *secAlias = NULL;
1873
    bool need_release = false;
1874
    virErrorPtr orig_err;
1875

1876
    if (qemuAssignDeviceRedirdevAlias(def, redirdev, -1) < 0)
1877 1878
        goto cleanup;

1879
    if (!(charAlias = qemuAliasChardevFromDevAlias(redirdev->info.alias)))
1880 1881
        goto cleanup;

1882
    if ((virDomainUSBAddressEnsure(priv->usbaddrs, &redirdev->info)) < 0)
1883
        goto cleanup;
1884
    need_release = true;
1885

1886
    if (!(devstr = qemuBuildRedirdevDevStr(def, redirdev, priv->qemuCaps)))
1887
        goto cleanup;
1888

1889
    if (VIR_REALLOC_N(def->redirdevs, def->nredirdevs+1) < 0)
1890
        goto cleanup;
1891

1892
    if (qemuDomainAddChardevTLSObjects(driver, vm, redirdev->source,
1893 1894
                                       redirdev->info.alias, charAlias,
                                       &tlsAlias, &secAlias) < 0)
1895
        goto audit;
1896

1897
    qemuDomainObjEnterMonitor(driver, vm);
1898

1899 1900
    if (qemuMonitorAttachCharDev(priv->mon,
                                 charAlias,
1901
                                 redirdev->source) < 0)
1902 1903
        goto exit_monitor;
    chardevAdded = true;
1904

1905 1906
    if (qemuMonitorAddDevice(priv->mon, devstr) < 0)
        goto exit_monitor;
1907

1908 1909
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto audit;
1910

1911
    def->redirdevs[def->nredirdevs++] = redirdev;
1912 1913 1914 1915
    ret = 0;
 audit:
    virDomainAuditRedirdev(vm, redirdev, "attach", ret == 0);
 cleanup:
1916
    if (ret < 0 && need_release)
1917
        qemuDomainReleaseDeviceAddress(vm, &redirdev->info);
1918
    return ret;
1919 1920

 exit_monitor:
1921
    virErrorPreserveLast(&orig_err);
1922 1923 1924
    /* detach associated chardev on error */
    if (chardevAdded)
        ignore_value(qemuMonitorDetachCharDev(priv->mon, charAlias));
1925
    ignore_value(qemuDomainObjExitMonitor(driver, vm));
1926
    virErrorRestore(&orig_err);
1927 1928
    qemuDomainDelTLSObjects(driver, vm, QEMU_ASYNC_JOB_NONE,
                            secAlias, tlsAlias);
1929
    goto audit;
1930 1931
}

1932 1933 1934
static int
qemuDomainChrPreInsert(virDomainDefPtr vmdef,
                       virDomainChrDefPtr chr)
1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948
{
    if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE &&
        chr->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                       _("attaching serial console is not supported"));
        return -1;
    }

    if (virDomainChrFind(vmdef, chr)) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("chardev already exists"));
        return -1;
    }

1949
    if (virDomainChrPreAlloc(vmdef, chr) < 0)
1950 1951
        return -1;

1952 1953 1954 1955
    /* Due to historical reasons, the first console is an alias to the
     * first serial device (if such exists). If this is the case, we need to
     * create an object for the first console as well.
     */
1956 1957 1958 1959 1960
    if (vmdef->nserials == 0 && vmdef->nconsoles == 0 &&
        chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL) {
        if (!vmdef->consoles && VIR_ALLOC(vmdef->consoles) < 0)
            return -1;

1961 1962
        /* We'll be dealing with serials[0] directly, so NULL is fine here. */
        if (!(vmdef->consoles[0] = virDomainChrDefNew(NULL))) {
1963
            VIR_FREE(vmdef->consoles);
1964 1965
            return -1;
        }
1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977
        vmdef->nconsoles++;
    }
    return 0;
}

static void
qemuDomainChrInsertPreAlloced(virDomainDefPtr vmdef,
                              virDomainChrDefPtr chr)
{
    virDomainChrInsertPreAlloced(vmdef, chr);
    if (vmdef->nserials == 1 && vmdef->nconsoles == 0 &&
        chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL) {
1978 1979 1980 1981 1982 1983
        vmdef->nconsoles = 1;

        /* Create an console alias for the serial port */
        vmdef->consoles[0]->deviceType = VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE;
        vmdef->consoles[0]->targetType = VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL;
    }
1984 1985 1986 1987 1988 1989 1990 1991 1992
}

static void
qemuDomainChrInsertPreAllocCleanup(virDomainDefPtr vmdef,
                                   virDomainChrDefPtr chr)
{
    /* Remove the stub console added by qemuDomainChrPreInsert */
    if (vmdef->nserials == 0 && vmdef->nconsoles == 1 &&
        chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL) {
1993
        virDomainChrDefFree(vmdef->consoles[0]);
1994 1995 1996 1997
        VIR_FREE(vmdef->consoles);
        vmdef->nconsoles = 0;
    }
}
1998

1999 2000 2001 2002 2003 2004 2005 2006 2007
int
qemuDomainChrInsert(virDomainDefPtr vmdef,
                    virDomainChrDefPtr chr)
{
    if (qemuDomainChrPreInsert(vmdef, chr) < 0) {
        qemuDomainChrInsertPreAllocCleanup(vmdef, chr);
        return -1;
    }
    qemuDomainChrInsertPreAlloced(vmdef, chr);
2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043
    return 0;
}

virDomainChrDefPtr
qemuDomainChrRemove(virDomainDefPtr vmdef,
                    virDomainChrDefPtr chr)
{
    virDomainChrDefPtr ret;
    bool removeCompat;

    if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE &&
        chr->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("detaching serial console is not supported"));
        return NULL;
    }

    /* Due to some crazy backcompat stuff, the first serial device is an alias
     * to the first console too. If this is the case, the definition must be
     * duplicated as first console device. */
    removeCompat = vmdef->nserials && vmdef->nconsoles &&
        vmdef->consoles[0]->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE &&
        vmdef->consoles[0]->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_SERIAL &&
        virDomainChrEquals(vmdef->serials[0], chr);

    if (!(ret = virDomainChrRemove(vmdef, chr))) {
        virReportError(VIR_ERR_INVALID_ARG, "%s",
                       _("device not present in domain configuration"));
            return NULL;
    }

    if (removeCompat)
        VIR_DELETE_ELEMENT(vmdef->consoles, 0, vmdef->nconsoles);

    return ret;
}
2044

2045 2046 2047 2048
/* Returns  1 if the address will need to be released later,
 *         -1 on error
 *          0 otherwise
 */
2049
static int
2050
qemuDomainAttachChrDeviceAssignAddr(virDomainObjPtr vm,
2051 2052
                                    virDomainChrDefPtr chr,
                                    virQEMUDriverPtr driver)
2053
{
2054 2055
    virDomainDefPtr def = vm->def;
    qemuDomainObjPrivatePtr priv = vm->privateData;
2056
    virDomainDeviceDef dev = { VIR_DOMAIN_DEVICE_CHR, { .chr = chr } };
2057

2058 2059
    if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CONSOLE &&
        chr->targetType == VIR_DOMAIN_CHR_CONSOLE_TARGET_TYPE_VIRTIO) {
2060
        if (virDomainVirtioSerialAddrAutoAssign(def, &chr->info, true) < 0)
2061
            return -1;
2062
        return 0;
2063 2064 2065

    } else if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL &&
               chr->targetType == VIR_DOMAIN_CHR_SERIAL_TARGET_TYPE_PCI) {
2066
        if (qemuDomainEnsurePCIAddress(vm, &dev, driver) < 0)
2067 2068
            return -1;
        return 1;
2069

2070
    } else if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_SERIAL &&
2071 2072
               chr->targetType == VIR_DOMAIN_CHR_SERIAL_TARGET_TYPE_USB) {
        if (virDomainUSBAddressEnsure(priv->usbaddrs, &chr->info) < 0)
2073 2074
            return -1;
        return 1;
2075

2076 2077
    } else if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CHANNEL &&
               chr->targetType == VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_VIRTIO) {
2078
        if (virDomainVirtioSerialAddrAutoAssign(def, &chr->info, false) < 0)
2079
            return -1;
2080
        return 0;
2081 2082 2083 2084 2085 2086
    }

    if (chr->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_VIRTIO_SERIAL ||
        chr->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Unsupported address type for character device"));
2087
        return -1;
2088 2089
    }

2090
    return 0;
2091 2092
}

2093
int qemuDomainAttachChrDevice(virQEMUDriverPtr driver,
2094 2095 2096
                              virDomainObjPtr vm,
                              virDomainChrDefPtr chr)
{
2097
    int ret = -1, rc;
2098
    qemuDomainObjPrivatePtr priv = vm->privateData;
2099
    virErrorPtr orig_err;
2100
    virDomainDefPtr vmdef = vm->def;
2101
    g_autofree char *devstr = NULL;
2102
    virDomainChrSourceDefPtr dev = chr->source;
2103
    g_autofree char *charAlias = NULL;
2104
    bool chardevAttached = false;
2105
    bool teardowncgroup = false;
2106
    bool teardowndevice = false;
2107
    bool teardownlabel = false;
2108
    g_autofree char *tlsAlias = NULL;
2109
    const char *secAlias = NULL;
2110
    bool need_release = false;
2111
    bool guestfwd = false;
2112

2113 2114 2115 2116 2117 2118
    if (chr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CHANNEL) {
        guestfwd = chr->targetType == VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_GUESTFWD;

        if (qemuDomainPrepareChannel(chr, priv->channelTargetDir) < 0)
            goto cleanup;
    }
2119

2120
    if (qemuAssignDeviceChrAlias(vmdef, chr, -1) < 0)
2121
        goto cleanup;
2122

2123
    if ((rc = qemuDomainAttachChrDeviceAssignAddr(vm, chr, driver)) < 0)
2124 2125 2126
        goto cleanup;
    if (rc == 1)
        need_release = true;
2127

2128
    if (qemuDomainNamespaceSetupChardev(vm, chr) < 0)
2129 2130 2131
        goto cleanup;
    teardowndevice = true;

2132 2133 2134 2135
    if (qemuSecuritySetChardevLabel(driver, vm, chr) < 0)
        goto cleanup;
    teardownlabel = true;

2136 2137 2138 2139
    if (qemuSetupChardevCgroup(vm, chr) < 0)
        goto cleanup;
    teardowncgroup = true;

2140
    if (qemuBuildChrDeviceStr(&devstr, vmdef, chr, priv->qemuCaps) < 0)
2141
        goto cleanup;
2142

2143
    if (!(charAlias = qemuAliasChardevFromDevAlias(chr->info.alias)))
2144 2145
        goto cleanup;

2146
    if (qemuDomainChrPreInsert(vmdef, chr) < 0)
2147 2148
        goto cleanup;

2149
    if (qemuDomainAddChardevTLSObjects(driver, vm, dev,
2150
                                       chr->info.alias, charAlias,
2151
                                       &tlsAlias, &secAlias) < 0)
2152
        goto audit;
2153

2154
    qemuDomainObjEnterMonitor(driver, vm);
2155

2156
    if (qemuMonitorAttachCharDev(priv->mon, charAlias, chr->source) < 0)
2157 2158
        goto exit_monitor;
    chardevAttached = true;
2159

2160 2161
    if (guestfwd) {
        if (qemuMonitorAddNetdev(priv->mon, devstr,
2162
                                 NULL, NULL, 0, NULL, NULL, 0, -1, NULL) < 0)
2163 2164 2165 2166 2167
            goto exit_monitor;
    } else {
        if (qemuMonitorAddDevice(priv->mon, devstr) < 0)
            goto exit_monitor;
    }
2168

2169 2170
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto audit;
2171

2172
    qemuDomainChrInsertPreAlloced(vmdef, chr);
2173
    ret = 0;
2174 2175
 audit:
    virDomainAuditChardev(vm, NULL, chr, "attach", ret == 0);
2176
 cleanup:
2177 2178 2179 2180
    if (ret < 0) {
        if (virDomainObjIsActive(vm))
            qemuDomainChrInsertPreAllocCleanup(vmdef, chr);
        if (need_release)
2181
            qemuDomainReleaseDeviceAddress(vm, &chr->info);
2182 2183
        if (teardowncgroup && qemuTeardownChardevCgroup(vm, chr) < 0)
            VIR_WARN("Unable to remove chr device cgroup ACL on hotplug fail");
2184 2185
        if (teardownlabel && qemuSecurityRestoreChardevLabel(driver, vm, chr) < 0)
            VIR_WARN("Unable to restore security label on char device");
2186
        if (teardowndevice && qemuDomainNamespaceTeardownChardev(vm, chr) < 0)
2187
            VIR_WARN("Unable to remove chr device from /dev");
2188
    }
2189
    return ret;
2190

2191
 exit_monitor:
2192
    virErrorPreserveLast(&orig_err);
2193
    /* detach associated chardev on error */
2194 2195
    if (chardevAttached)
        qemuMonitorDetachCharDev(priv->mon, charAlias);
2196
    ignore_value(qemuDomainObjExitMonitor(driver, vm));
2197
    virErrorRestore(&orig_err);
2198

2199 2200
    qemuDomainDelTLSObjects(driver, vm, QEMU_ASYNC_JOB_NONE,
                            secAlias, tlsAlias);
2201
    goto audit;
2202 2203
}

2204 2205

int
2206
qemuDomainAttachRNGDevice(virQEMUDriverPtr driver,
2207 2208 2209 2210
                          virDomainObjPtr vm,
                          virDomainRNGDefPtr rng)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
2211
    virDomainDeviceDef dev = { VIR_DOMAIN_DEVICE_RNG, { .rng = rng } };
2212
    virErrorPtr orig_err;
2213 2214 2215 2216
    g_autofree char *devstr = NULL;
    g_autofree char *charAlias = NULL;
    g_autofree char *objAlias = NULL;
    g_autofree char *tlsAlias = NULL;
2217
    const char *secAlias = NULL;
2218
    bool releaseaddr = false;
2219
    bool teardowncgroup = false;
2220
    bool teardowndevice = false;
2221
    bool chardevAdded = false;
2222 2223 2224
    virJSONValuePtr props = NULL;
    int ret = -1;

2225
    if (qemuAssignDeviceRNGAlias(vm->def, rng) < 0)
2226
        goto cleanup;
2227 2228 2229

    /* preallocate space for the device definition */
    if (VIR_REALLOC_N(vm->def->rngs, vm->def->nrngs + 1) < 0)
2230
        goto cleanup;
2231

2232 2233
    if (qemuDomainEnsureVirtioAddress(&releaseaddr, vm, &dev, "rng") < 0)
        return -1;
2234

2235
    if (qemuDomainNamespaceSetupRNG(vm, rng) < 0)
2236 2237 2238
        goto cleanup;
    teardowndevice = true;

2239 2240 2241 2242
    if (qemuSetupRNGCgroup(vm, rng) < 0)
        goto cleanup;
    teardowncgroup = true;

2243 2244 2245 2246
    /* build required metadata */
    if (!(devstr = qemuBuildRNGDevStr(vm->def, rng, priv->qemuCaps)))
        goto cleanup;

2247
    if (qemuBuildRNGBackendProps(rng, priv->qemuCaps, &props) < 0)
2248 2249
        goto cleanup;

2250
    if (!(charAlias = qemuAliasChardevFromDevAlias(rng->info.alias)))
2251 2252
        goto cleanup;

2253
    if (rng->backend == VIR_DOMAIN_RNG_BACKEND_EGD) {
2254
        if (qemuDomainAddChardevTLSObjects(driver, vm,
2255 2256 2257
                                           rng->source.chardev,
                                           rng->info.alias, charAlias,
                                           &tlsAlias, &secAlias) < 0)
2258
            goto audit;
2259 2260
    }

2261
    qemuDomainObjEnterMonitor(driver, vm);
2262

2263 2264 2265
    if (rng->backend == VIR_DOMAIN_RNG_BACKEND_EGD &&
        qemuMonitorAttachCharDev(priv->mon, charAlias,
                                 rng->source.chardev) < 0)
2266 2267
        goto exit_monitor;
    chardevAdded = true;
2268

2269
    if (qemuMonitorAddObject(priv->mon, &props, &objAlias) < 0)
2270
        goto exit_monitor;
2271

2272
    if (qemuDomainAttachExtensionDevice(priv->mon, &rng->info) < 0)
2273
        goto exit_monitor;
2274

2275 2276 2277 2278 2279
    if (qemuMonitorAddDevice(priv->mon, devstr) < 0) {
        ignore_value(qemuDomainDetachExtensionDevice(priv->mon, &rng->info));
        goto exit_monitor;
    }

2280
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
2281
        releaseaddr = false;
2282 2283 2284
        goto cleanup;
    }

2285
    VIR_APPEND_ELEMENT_INPLACE(vm->def->rngs, vm->def->nrngs, rng);
2286 2287 2288 2289 2290 2291

    ret = 0;

 audit:
    virDomainAuditRNG(vm, NULL, rng, "attach", ret == 0);
 cleanup:
2292
    virJSONValueFree(props);
2293 2294
    if (ret < 0) {
        if (releaseaddr)
2295
            qemuDomainReleaseDeviceAddress(vm, &rng->info);
2296 2297
        if (teardowncgroup && qemuTeardownRNGCgroup(vm, rng) < 0)
            VIR_WARN("Unable to remove RNG device cgroup ACL on hotplug fail");
2298
        if (teardowndevice && qemuDomainNamespaceTeardownRNG(vm, rng) < 0)
2299
            VIR_WARN("Unable to remove chr device from /dev");
2300 2301
    }

2302 2303
    return ret;

2304
 exit_monitor:
2305
    virErrorPreserveLast(&orig_err);
2306
    if (objAlias)
2307 2308
        ignore_value(qemuMonitorDelObject(priv->mon, objAlias));
    if (rng->backend == VIR_DOMAIN_RNG_BACKEND_EGD && chardevAdded)
2309
        ignore_value(qemuMonitorDetachCharDev(priv->mon, charAlias));
2310 2311
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        releaseaddr = false;
2312
    virErrorRestore(&orig_err);
2313

2314 2315
    qemuDomainDelTLSObjects(driver, vm, QEMU_ASYNC_JOB_NONE,
                            secAlias, tlsAlias);
2316 2317 2318 2319
    goto audit;
}


2320 2321 2322 2323 2324 2325 2326 2327 2328 2329 2330 2331 2332 2333 2334 2335
/**
 * qemuDomainAttachMemory:
 * @driver: qemu driver data
 * @vm: VM object
 * @mem: Definition of the memory device to be attached. @mem is always consumed
 *
 * Attaches memory device described by @mem to domain @vm.
 *
 * Returns 0 on success -1 on error.
 */
int
qemuDomainAttachMemory(virQEMUDriverPtr driver,
                       virDomainObjPtr vm,
                       virDomainMemoryDefPtr mem)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
2336
    virErrorPtr orig_err;
2337
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
2338
    unsigned long long oldmem = virDomainDefGetMemoryTotal(vm->def);
2339
    unsigned long long newmem = oldmem + mem->size;
2340 2341
    g_autofree char *devstr = NULL;
    g_autofree char *objalias = NULL;
2342
    bool objAdded = false;
M
Michal Privoznik 已提交
2343
    bool teardownlabel = false;
2344
    bool teardowncgroup = false;
M
Michal Privoznik 已提交
2345
    bool teardowndevice = false;
2346
    virJSONValuePtr props = NULL;
2347
    virObjectEventPtr event;
2348 2349 2350
    int id;
    int ret = -1;

2351 2352 2353
    qemuDomainMemoryDeviceAlignSize(vm->def, mem);

    if (qemuDomainDefValidateMemoryHotplug(vm->def, priv->qemuCaps, mem) < 0)
2354 2355
        goto cleanup;

2356 2357 2358
    if (qemuDomainAssignMemoryDeviceSlot(vm->def, mem) < 0)
        goto cleanup;

2359 2360 2361
    /* in cases where we are using a VM with aliases generated according to the
     * index of the memory device we need to keep continue using that scheme */
    if (qemuAssignDeviceMemoryAlias(vm->def, mem, priv->memAliasOrderMismatch) < 0)
2362 2363
        goto cleanup;

2364
    objalias = g_strdup_printf("mem%s", mem->info.alias);
2365

2366
    if (!(devstr = qemuBuildMemoryDeviceStr(mem, priv)))
2367 2368
        goto cleanup;

2369
    if (qemuBuildMemoryBackendProps(&props, objalias, cfg,
2370
                                    priv, vm->def, mem, true) < 0)
2371 2372
        goto cleanup;

2373
    if (qemuProcessBuildDestroyMemoryPaths(driver, vm, mem, true) < 0)
2374 2375
        goto cleanup;

2376
    if (qemuDomainNamespaceSetupMemory(vm, mem) < 0)
M
Michal Privoznik 已提交
2377 2378 2379
        goto cleanup;
    teardowndevice = true;

2380 2381 2382 2383
    if (qemuSetupMemoryDevicesCgroup(vm, mem) < 0)
        goto cleanup;
    teardowncgroup = true;

M
Michal Privoznik 已提交
2384
    if (qemuSecuritySetMemoryLabel(driver, vm, mem) < 0)
2385
        goto cleanup;
M
Michal Privoznik 已提交
2386
    teardownlabel = true;
2387

M
Michal Privoznik 已提交
2388 2389 2390
    if (virDomainMemoryInsert(vm->def, mem) < 0)
        goto cleanup;

2391
    if (qemuDomainAdjustMaxMemLock(vm, false) < 0)
2392 2393
        goto removedef;

2394
    qemuDomainObjEnterMonitor(driver, vm);
2395
    if (qemuMonitorAddObject(priv->mon, &props, NULL) < 0)
2396
        goto exit_monitor;
2397
    objAdded = true;
2398

2399
    if (qemuMonitorAddDevice(priv->mon, devstr) < 0)
2400
        goto exit_monitor;
2401 2402 2403 2404

    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        /* we shouldn't touch mem now, as the def might be freed */
        mem = NULL;
2405
        goto audit;
2406 2407
    }

2408
    event = virDomainEventDeviceAddedNewFromObj(vm, objalias);
2409
    virObjectEventStateQueue(driver->domainEventState, event);
2410

2411 2412
    /* fix the balloon size */
    ignore_value(qemuProcessRefreshBalloonState(driver, vm, QEMU_ASYNC_JOB_NONE));
2413

2414 2415 2416 2417 2418 2419 2420 2421 2422
    /* mem is consumed by vm->def */
    mem = NULL;

    /* this step is best effort, removing the device would be so much trouble */
    ignore_value(qemuDomainUpdateMemoryDeviceInfo(driver, vm,
                                                  QEMU_ASYNC_JOB_NONE));

    ret = 0;

2423 2424
 audit:
    virDomainAuditMemory(vm, oldmem, newmem, "update", ret == 0);
2425
 cleanup:
M
Michal Privoznik 已提交
2426
    if (mem && ret < 0) {
2427 2428
        if (teardowncgroup && qemuTeardownMemoryDevicesCgroup(vm, mem) < 0)
            VIR_WARN("Unable to remove memory device cgroup ACL on hotplug fail");
M
Michal Privoznik 已提交
2429 2430
        if (teardownlabel && qemuSecurityRestoreMemoryLabel(driver, vm, mem) < 0)
            VIR_WARN("Unable to restore security label on memdev");
M
Michal Privoznik 已提交
2431
        if (teardowndevice &&
2432
            qemuDomainNamespaceTeardownMemory(vm, mem) <  0)
M
Michal Privoznik 已提交
2433
            VIR_WARN("Unable to remove memory device from /dev");
M
Michal Privoznik 已提交
2434 2435 2436
    }

    virJSONValueFree(props);
2437 2438 2439
    virDomainMemoryDefFree(mem);
    return ret;

2440
 exit_monitor:
2441
    virErrorPreserveLast(&orig_err);
2442 2443
    if (objAdded)
        ignore_value(qemuMonitorDelObject(priv->mon, objalias));
2444 2445
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        mem = NULL;
2446 2447 2448 2449

    if (objAdded && mem)
        ignore_value(qemuProcessDestroyMemoryBackingPath(driver, vm, mem));

2450
    virErrorRestore(&orig_err);
2451
    if (!mem)
2452
        goto audit;
2453

2454
 removedef:
2455 2456 2457 2458 2459
    if ((id = virDomainMemoryFindByDef(vm->def, mem)) >= 0)
        mem = virDomainMemoryRemove(vm->def, id);
    else
        mem = NULL;

2460
    /* reset the mlock limit */
2461
    virErrorPreserveLast(&orig_err);
2462
    ignore_value(qemuDomainAdjustMaxMemLock(vm, false));
2463
    virErrorRestore(&orig_err);
2464

2465
    goto audit;
2466 2467 2468
}


2469
static int
2470
qemuDomainAttachHostUSBDevice(virQEMUDriverPtr driver,
2471 2472
                              virDomainObjPtr vm,
                              virDomainHostdevDefPtr hostdev)
2473 2474
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
2475
    g_autofree char *devstr = NULL;
2476
    bool added = false;
2477
    bool teardowncgroup = false;
2478
    bool teardownlabel = false;
2479
    bool teardowndevice = false;
2480 2481
    int ret = -1;

2482 2483
    if (virDomainUSBAddressEnsure(priv->usbaddrs, hostdev->info) < 0)
        return -1;
2484

2485
    if (qemuHostdevPrepareUSBDevices(driver, vm->def->name, &hostdev, 1, 0) < 0)
2486 2487 2488
        goto cleanup;

    added = true;
2489

2490
    if (qemuDomainNamespaceSetupHostdev(vm, hostdev) < 0)
2491 2492 2493
        goto cleanup;
    teardowndevice = true;

2494
    if (qemuSetupHostdevCgroup(vm, hostdev) < 0)
2495 2496 2497
        goto cleanup;
    teardowncgroup = true;

2498
    if (qemuSecuritySetHostdevLabel(driver, vm, hostdev) < 0)
2499 2500 2501
        goto cleanup;
    teardownlabel = true;

2502 2503 2504 2505
    if (qemuAssignDeviceHostdevAlias(vm->def, &hostdev->info->alias, -1) < 0)
        goto cleanup;
    if (!(devstr = qemuBuildUSBHostdevDevStr(vm->def, hostdev, priv->qemuCaps)))
        goto cleanup;
2506

2507
    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs+1) < 0)
2508
        goto cleanup;
2509

2510
    qemuDomainObjEnterMonitor(driver, vm);
2511
    ret = qemuMonitorAddDevice(priv->mon, devstr);
2512 2513 2514 2515
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        ret = -1;
        goto cleanup;
    }
2516
    virDomainAuditHostdev(vm, hostdev, "attach", ret == 0);
2517
    if (ret < 0)
2518
        goto cleanup;
2519 2520 2521

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;

2522
    ret = 0;
2523
 cleanup:
2524 2525 2526 2527
    if (ret < 0) {
        if (teardowncgroup && qemuTeardownHostdevCgroup(vm, hostdev) < 0)
            VIR_WARN("Unable to remove host device cgroup ACL on hotplug fail");
        if (teardownlabel &&
2528
            qemuSecurityRestoreHostdevLabel(driver, vm, hostdev) < 0)
2529
            VIR_WARN("Unable to restore host device labelling on hotplug fail");
2530
        if (teardowndevice &&
2531
            qemuDomainNamespaceTeardownHostdev(vm, hostdev) < 0)
2532
            VIR_WARN("Unable to remove host device from /dev");
2533
        if (added)
2534
            qemuHostdevReAttachUSBDevices(driver, vm->def->name, &hostdev, 1);
2535
        virDomainUSBAddressRelease(priv->usbaddrs, hostdev->info);
2536
    }
2537
    return ret;
2538 2539
}

2540

2541
static int
2542
qemuDomainAttachHostSCSIDevice(virQEMUDriverPtr driver,
2543 2544 2545
                               virDomainObjPtr vm,
                               virDomainHostdevDefPtr hostdev)
{
2546
    size_t i;
2547 2548
    int ret = -1;
    qemuDomainObjPrivatePtr priv = vm->privateData;
2549
    virErrorPtr orig_err;
2550 2551 2552 2553
    g_autofree char *devstr = NULL;
    g_autofree char *drvstr = NULL;
    g_autofree char *drivealias = NULL;
    g_autofree char *secobjAlias = NULL;
2554
    bool teardowncgroup = false;
2555
    bool teardownlabel = false;
2556
    bool teardowndevice = false;
2557
    bool driveAdded = false;
2558 2559
    virJSONValuePtr secobjProps = NULL;
    virDomainHostdevSubsysSCSIPtr scsisrc = &hostdev->source.subsys.u.scsi;
2560
    qemuDomainSecretInfoPtr secinfo = NULL;
2561

2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 2572
    /* Let's make sure the disk has a controller defined and loaded before
     * trying to add it. The controller used by the disk must exist before a
     * qemu command line string is generated.
     *
     * Ensure that the given controller and all controllers with a smaller index
     * exist; there must not be any missing index in between.
     */
    for (i = 0; i <= hostdev->info->addr.drive.controller; i++) {
        if (!qemuDomainFindOrCreateSCSIDiskController(driver, vm, i))
            return -1;
    }
2573

2574
    if (qemuHostdevPrepareSCSIDevices(driver, vm->def->name, &hostdev, 1) < 0)
2575 2576
        return -1;

2577
    if (qemuDomainNamespaceSetupHostdev(vm, hostdev) < 0)
2578 2579 2580
        goto cleanup;
    teardowndevice = true;

2581
    if (qemuSetupHostdevCgroup(vm, hostdev) < 0)
2582 2583 2584
        goto cleanup;
    teardowncgroup = true;

2585
    if (qemuSecuritySetHostdevLabel(driver, vm, hostdev) < 0)
2586 2587 2588
        goto cleanup;
    teardownlabel = true;

2589
    if (qemuAssignDeviceHostdevAlias(vm->def, &hostdev->info->alias, -1) < 0)
2590 2591
        goto cleanup;

2592
    if (qemuDomainSecretHostdevPrepare(priv, hostdev) < 0)
2593 2594
        goto cleanup;

2595 2596 2597
    if (scsisrc->protocol == VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI) {
        qemuDomainStorageSourcePrivatePtr srcPriv =
            QEMU_DOMAIN_STORAGE_SOURCE_PRIVATE(scsisrc->u.iscsi.src);
2598 2599
        if (srcPriv)
            secinfo = srcPriv->secinfo;
2600 2601
    }

2602 2603 2604 2605 2606 2607
    if (secinfo && secinfo->type == VIR_DOMAIN_SECRET_INFO_TYPE_AES) {
        if (qemuBuildSecretInfoProps(secinfo, &secobjProps) < 0)
            goto cleanup;
    }

    if (!(drvstr = qemuBuildSCSIHostdevDrvStr(hostdev, priv->qemuCaps)))
2608 2609
        goto cleanup;

2610 2611 2612
    if (!(drivealias = qemuAliasFromHostdev(hostdev)))
        goto cleanup;

2613
    if (!(devstr = qemuBuildSCSIHostdevDevStr(vm->def, hostdev)))
2614 2615
        goto cleanup;

2616
    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs + 1) < 0)
2617 2618 2619 2620
        goto cleanup;

    qemuDomainObjEnterMonitor(driver, vm);

2621 2622 2623
    if (secobjProps &&
        qemuMonitorAddObject(priv->mon, &secobjProps, &secobjAlias) < 0)
        goto exit_monitor;
2624

2625
    if (qemuMonitorAddDrive(priv->mon, drvstr) < 0)
2626 2627
        goto exit_monitor;
    driveAdded = true;
2628 2629

    if (qemuMonitorAddDevice(priv->mon, devstr) < 0)
2630
        goto exit_monitor;
2631 2632

    if (qemuDomainObjExitMonitor(driver, vm) < 0)
2633
        goto cleanup;
2634 2635

    virDomainAuditHostdev(vm, hostdev, "attach", true);
2636 2637 2638 2639

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;

    ret = 0;
2640

2641
 cleanup:
2642
    if (ret < 0) {
2643
        qemuHostdevReAttachSCSIDevices(driver, vm->def->name, &hostdev, 1);
2644 2645
        if (teardowncgroup && qemuTeardownHostdevCgroup(vm, hostdev) < 0)
            VIR_WARN("Unable to remove host device cgroup ACL on hotplug fail");
2646
        if (teardownlabel &&
2647
            qemuSecurityRestoreHostdevLabel(driver, vm, hostdev) < 0)
2648
            VIR_WARN("Unable to restore host device labelling on hotplug fail");
2649
        if (teardowndevice &&
2650
            qemuDomainNamespaceTeardownHostdev(vm, hostdev) < 0)
2651
            VIR_WARN("Unable to remove host device from /dev");
2652
    }
2653 2654
    qemuDomainSecretHostdevDestroy(hostdev);
    virJSONValueFree(secobjProps);
2655
    return ret;
2656

2657
 exit_monitor:
2658
    virErrorPreserveLast(&orig_err);
2659
    if (driveAdded && qemuMonitorDriveDel(priv->mon, drivealias) < 0) {
2660 2661 2662
        VIR_WARN("Unable to remove drive %s (%s) after failed "
                 "qemuMonitorAddDevice",
                 drvstr, devstr);
2663
    }
2664 2665
    if (secobjAlias)
        ignore_value(qemuMonitorDelObject(priv->mon, secobjAlias));
2666
    ignore_value(qemuDomainObjExitMonitor(driver, vm));
2667
    virErrorRestore(&orig_err);
2668 2669 2670 2671

    virDomainAuditHostdev(vm, hostdev, "attach", false);

    goto cleanup;
2672 2673
}

2674 2675 2676 2677 2678 2679 2680 2681 2682 2683
static int
qemuDomainAttachSCSIVHostDevice(virQEMUDriverPtr driver,
                                virDomainObjPtr vm,
                                virDomainHostdevDefPtr hostdev)
{
    int ret = -1;
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainDeviceDef dev = { VIR_DOMAIN_DEVICE_HOSTDEV,
                               { .hostdev = hostdev } };
    virDomainCCWAddressSetPtr ccwaddrs = NULL;
2684
    g_autofree char *vhostfdName = NULL;
2685
    int vhostfd = -1;
2686
    g_autofree char *devstr = NULL;
2687 2688
    bool teardowncgroup = false;
    bool teardownlabel = false;
2689
    bool teardowndevice = false;
2690 2691
    bool releaseaddr = false;

2692
    if (qemuHostdevPrepareSCSIVHostDevices(driver, vm->def->name, &hostdev, 1) < 0)
2693 2694
        return -1;

2695
    if (qemuDomainNamespaceSetupHostdev(vm, hostdev) < 0)
2696 2697 2698
        goto cleanup;
    teardowndevice = true;

2699 2700 2701 2702
    if (qemuSetupHostdevCgroup(vm, hostdev) < 0)
        goto cleanup;
    teardowncgroup = true;

2703
    if (qemuSecuritySetHostdevLabel(driver, vm, hostdev) < 0)
2704 2705 2706 2707 2708 2709
        goto cleanup;
    teardownlabel = true;

    if (virSCSIVHostOpenVhostSCSI(&vhostfd) < 0)
        goto cleanup;

2710
    vhostfdName = g_strdup_printf("vhostfd-%d", vhostfd);
2711 2712

    if (hostdev->info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) {
2713
        if (qemuDomainIsS390CCW(vm->def) &&
2714
            virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_CCW))
2715 2716 2717 2718 2719
            hostdev->info->type = VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW;
    }

    if (hostdev->info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE ||
        hostdev->info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) {
2720
        if (qemuDomainEnsurePCIAddress(vm, &dev, driver) < 0)
2721 2722
            goto cleanup;
    } else if (hostdev->info->type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW) {
2723
        if (!(ccwaddrs = virDomainCCWAddressSetCreateFromDomain(vm->def)))
2724 2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741 2742 2743 2744
            goto cleanup;
        if (virDomainCCWAddressAssign(hostdev->info, ccwaddrs,
                                      !hostdev->info->addr.ccw.assigned) < 0)
            goto cleanup;
    }
    releaseaddr = true;

    if (qemuAssignDeviceHostdevAlias(vm->def, &hostdev->info->alias, -1) < 0)
        goto cleanup;

    if (!(devstr = qemuBuildSCSIVHostHostdevDevStr(vm->def,
                                                   hostdev,
                                                   priv->qemuCaps,
                                                   vhostfdName)))
        goto cleanup;

    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs + 1) < 0)
        goto cleanup;

    qemuDomainObjEnterMonitor(driver, vm);

2745 2746 2747 2748 2749 2750 2751 2752
    if ((ret = qemuDomainAttachExtensionDevice(priv->mon, hostdev->info)) < 0)
        goto exit_monitor;

    if ((ret = qemuMonitorAddDeviceWithFd(priv->mon, devstr, vhostfd,
                                          vhostfdName)) < 0) {
        ignore_value(qemuDomainDetachExtensionDevice(priv->mon, hostdev->info));
        goto exit_monitor;
    }
2753

2754
 exit_monitor:
2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767 2768
    if (qemuDomainObjExitMonitor(driver, vm) < 0 || ret < 0)
        goto audit;

    vm->def->hostdevs[vm->def->nhostdevs++] = hostdev;
    ret = 0;

 audit:
    virDomainAuditHostdev(vm, hostdev, "attach", (ret == 0));

 cleanup:
    if (ret < 0) {
        if (teardowncgroup && qemuTeardownHostdevCgroup(vm, hostdev) < 0)
            VIR_WARN("Unable to remove host device cgroup ACL on hotplug fail");
        if (teardownlabel &&
2769
            qemuSecurityRestoreHostdevLabel(driver, vm, hostdev) < 0)
2770
            VIR_WARN("Unable to restore host device labelling on hotplug fail");
2771
        if (teardowndevice &&
2772
            qemuDomainNamespaceTeardownHostdev(vm, hostdev) < 0)
2773
            VIR_WARN("Unable to remove host device from /dev");
2774
        if (releaseaddr)
2775
            qemuDomainReleaseDeviceAddress(vm, hostdev->info);
2776 2777 2778 2779 2780 2781 2782 2783
    }

    virDomainCCWAddressSetFree(ccwaddrs);

    VIR_FORCE_CLOSE(vhostfd);
    return ret;
}

2784

2785 2786 2787 2788 2789 2790
static int
qemuDomainAttachMediatedDevice(virQEMUDriverPtr driver,
                               virDomainObjPtr vm,
                               virDomainHostdevDefPtr hostdev)
{
    int ret = -1;
2791
    g_autofree char *devstr = NULL;
2792 2793 2794 2795
    bool added = false;
    bool teardowncgroup = false;
    bool teardownlabel = false;
    bool teardowndevice = false;
2796
    bool teardownmemlock = false;
2797 2798 2799 2800
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainDeviceDef dev = { VIR_DOMAIN_DEVICE_HOSTDEV,
                                { .hostdev = hostdev } };

2801 2802 2803 2804 2805
    switch (hostdev->source.subsys.u.mdev.model) {
    case VIR_MDEV_MODEL_TYPE_VFIO_PCI:
        if (qemuDomainEnsurePCIAddress(vm, &dev, driver) < 0)
            return -1;
        break;
2806 2807 2808 2809 2810 2811 2812
    case VIR_MDEV_MODEL_TYPE_VFIO_CCW: {
        const char *devName = hostdev->source.subsys.u.mdev.uuidstr;
        bool releaseaddr = false;

        if (qemuDomainEnsureVirtioAddress(&releaseaddr, vm, &dev, devName) < 0)
            return -1;
    }   break;
2813 2814 2815
    case VIR_MDEV_MODEL_TYPE_LAST:
        break;
    }
2816 2817 2818 2819 2820 2821 2822 2823 2824 2825 2826 2827 2828 2829 2830 2831 2832 2833 2834 2835 2836 2837 2838 2839 2840 2841 2842 2843 2844 2845

    if (qemuHostdevPrepareMediatedDevices(driver,
                                          vm->def->name,
                                          &hostdev,
                                          1) < 0)
        goto cleanup;
    added = true;

    if (qemuDomainNamespaceSetupHostdev(vm, hostdev) < 0)
        goto cleanup;
    teardowndevice = true;

    if (qemuSetupHostdevCgroup(vm, hostdev) < 0)
        goto cleanup;
    teardowncgroup = true;

    if (qemuSecuritySetHostdevLabel(driver, vm, hostdev) < 0)
        goto cleanup;
    teardownlabel = true;

    if (qemuAssignDeviceHostdevAlias(vm->def, &hostdev->info->alias, -1) < 0)
        goto cleanup;

    if (!(devstr = qemuBuildHostdevMediatedDevStr(vm->def, hostdev,
                                                  priv->qemuCaps)))
        goto cleanup;

    if (VIR_REALLOC_N(vm->def->hostdevs, vm->def->nhostdevs + 1) < 0)
        goto cleanup;

2846 2847 2848 2849
    if (qemuDomainAdjustMaxMemLockHostdev(vm, hostdev) < 0)
        goto cleanup;
    teardownmemlock = true;

2850 2851 2852 2853 2854 2855 2856 2857 2858 2859 2860 2861 2862 2863 2864
    qemuDomainObjEnterMonitor(driver, vm);
    ret = qemuMonitorAddDevice(priv->mon, devstr);
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        ret = -1;
        goto cleanup;
    }

    virDomainAuditHostdev(vm, hostdev, "attach", ret == 0);
    if (ret < 0)
        goto cleanup;

    VIR_APPEND_ELEMENT_INPLACE(vm->def->hostdevs, vm->def->nhostdevs, hostdev);
    ret = 0;
 cleanup:
    if (ret < 0) {
2865
        if (teardownmemlock && qemuDomainAdjustMaxMemLock(vm, false) < 0)
2866
            VIR_WARN("Unable to reset maximum locked memory on hotplug fail");
2867 2868 2869 2870 2871 2872 2873 2874 2875 2876 2877 2878 2879
        if (teardowncgroup && qemuTeardownHostdevCgroup(vm, hostdev) < 0)
            VIR_WARN("Unable to remove host device cgroup ACL on hotplug fail");
        if (teardownlabel &&
            qemuSecurityRestoreHostdevLabel(driver, vm, hostdev) < 0)
            VIR_WARN("Unable to restore host device labelling on hotplug fail");
        if (teardowndevice &&
            qemuDomainNamespaceTeardownHostdev(vm, hostdev) < 0)
            VIR_WARN("Unable to remove host device from /dev");
        if (added)
            qemuHostdevReAttachMediatedDevices(driver,
                                               vm->def->name,
                                               &hostdev,
                                               1);
2880
        qemuDomainReleaseDeviceAddress(vm, hostdev->info);
2881 2882 2883 2884 2885
    }
    return ret;
}


2886
int
2887
qemuDomainAttachHostDevice(virQEMUDriverPtr driver,
2888 2889
                           virDomainObjPtr vm,
                           virDomainHostdevDefPtr hostdev)
2890 2891
{
    if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS) {
2892
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
2893
                       _("hotplug is not supported for hostdev mode '%s'"),
2894
                       virDomainHostdevModeTypeToString(hostdev->mode));
2895 2896 2897 2898 2899
        return -1;
    }

    switch (hostdev->source.subsys.type) {
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
2900
        if (qemuDomainAttachHostPCIDevice(driver, vm,
2901
                                          hostdev) < 0)
2902
            return -1;
2903 2904 2905
        break;

    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
2906
        if (qemuDomainAttachHostUSBDevice(driver, vm,
2907
                                          hostdev) < 0)
2908
            return -1;
2909 2910
        break;

2911
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI:
2912
        if (qemuDomainAttachHostSCSIDevice(driver, vm,
2913
                                           hostdev) < 0)
2914
            return -1;
2915 2916
        break;

2917 2918
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI_HOST:
        if (qemuDomainAttachSCSIVHostDevice(driver, vm, hostdev) < 0)
2919
            return -1;
2920
        break;
2921 2922
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_MDEV:
        if (qemuDomainAttachMediatedDevice(driver, vm, hostdev) < 0)
2923
            return -1;
2924
        break;
2925

2926
    default:
2927
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
2928
                       _("hotplug is not supported for hostdev subsys type '%s'"),
2929
                       virDomainHostdevSubsysTypeToString(hostdev->source.subsys.type));
2930
        return -1;
2931 2932 2933 2934 2935
    }

    return 0;
}

2936 2937 2938 2939 2940 2941 2942

int
qemuDomainAttachShmemDevice(virQEMUDriverPtr driver,
                            virDomainObjPtr vm,
                            virDomainShmemDefPtr shmem)
{
    int ret = -1;
2943 2944 2945
    g_autofree char *shmstr = NULL;
    g_autofree char *charAlias = NULL;
    g_autofree char *memAlias = NULL;
2946 2947 2948 2949 2950
    bool release_backing = false;
    bool release_address = true;
    virErrorPtr orig_err = NULL;
    virJSONValuePtr props = NULL;
    qemuDomainObjPrivatePtr priv = vm->privateData;
2951
    virDomainDeviceDef dev = { VIR_DOMAIN_DEVICE_SHMEM, { .shmem = shmem } };
2952 2953 2954 2955 2956 2957 2958 2959 2960 2961

    switch ((virDomainShmemModel)shmem->model) {
    case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_PLAIN:
    case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_DOORBELL:
        break;

    case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM:
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("live attach of shmem model '%s' is not supported"),
                       virDomainShmemModelTypeToString(shmem->model));
2962
        G_GNUC_FALLTHROUGH;
2963 2964 2965 2966 2967 2968 2969
    case VIR_DOMAIN_SHMEM_MODEL_LAST:
        return -1;
    }

    if (qemuAssignDeviceShmemAlias(vm->def, shmem, -1) < 0)
        return -1;

2970
    qemuDomainPrepareShmemChardev(shmem);
2971 2972 2973 2974 2975 2976

    if (VIR_REALLOC_N(vm->def->shmems, vm->def->nshmems + 1) < 0)
        return -1;

    if ((shmem->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE ||
         shmem->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) &&
2977
        (qemuDomainEnsurePCIAddress(vm, &dev, driver) < 0))
2978 2979 2980 2981 2982 2983
        return -1;

    if (!(shmstr = qemuBuildShmemDevStr(vm->def, shmem, priv->qemuCaps)))
        goto cleanup;

    if (shmem->server.enabled) {
2984
        charAlias = g_strdup_printf("char%s", shmem->info.alias);
2985 2986 2987 2988 2989 2990 2991 2992 2993 2994 2995 2996 2997
    } else {
        if (!(props = qemuBuildShmemBackendMemProps(shmem)))
            goto cleanup;

    }

    qemuDomainObjEnterMonitor(driver, vm);

    if (shmem->server.enabled) {
        if (qemuMonitorAttachCharDev(priv->mon, charAlias,
                                     &shmem->server.chr) < 0)
            goto exit_monitor;
    } else {
2998
        if (qemuMonitorAddObject(priv->mon, &props, &memAlias) < 0)
2999 3000 3001 3002 3003
            goto exit_monitor;
    }

    release_backing = true;

3004 3005 3006 3007 3008
    if (qemuDomainAttachExtensionDevice(priv->mon, &shmem->info) < 0)
        goto exit_monitor;

    if (qemuMonitorAddDevice(priv->mon, shmstr) < 0) {
        ignore_value(qemuDomainDetachExtensionDevice(priv->mon, &shmem->info));
3009
        goto exit_monitor;
3010
    }
3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028

    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        release_address = false;
        goto cleanup;
    }

    /* Doing a copy here just so the pointer doesn't get nullified
     * because we need it in the audit function */
    VIR_APPEND_ELEMENT_COPY_INPLACE(vm->def->shmems, vm->def->nshmems, shmem);

    ret = 0;
    release_address = false;

 audit:
    virDomainAuditShmem(vm, shmem, "attach", ret == 0);

 cleanup:
    if (release_address)
3029
        qemuDomainReleaseDeviceAddress(vm, &shmem->info);
3030 3031 3032 3033 3034 3035

    virJSONValueFree(props);

    return ret;

 exit_monitor:
3036
    virErrorPreserveLast(&orig_err);
3037 3038 3039 3040 3041 3042 3043
    if (release_backing) {
        if (shmem->server.enabled)
            ignore_value(qemuMonitorDetachCharDev(priv->mon, charAlias));
        else
            ignore_value(qemuMonitorDelObject(priv->mon, memAlias));
    }

3044 3045 3046
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        release_address = false;

3047
    virErrorRestore(&orig_err);
3048 3049 3050 3051 3052

    goto audit;
}


M
Michal Privoznik 已提交
3053 3054 3055 3056 3057 3058 3059 3060 3061 3062
int
qemuDomainAttachWatchdog(virQEMUDriverPtr driver,
                         virDomainObjPtr vm,
                         virDomainWatchdogDefPtr watchdog)
{
    int ret = -1;
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainDeviceDef dev = { VIR_DOMAIN_DEVICE_WATCHDOG, { .watchdog = watchdog } };
    virDomainWatchdogAction actualAction = watchdog->action;
    const char *actionStr = NULL;
3063
    g_autofree char *watchdogstr = NULL;
M
Michal Privoznik 已提交
3064 3065 3066 3067 3068 3069 3070 3071 3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083 3084 3085 3086
    bool releaseAddress = false;
    int rv;

    if (vm->def->watchdog) {
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("domain already has a watchdog"));
        return -1;
    }

    if (qemuAssignDeviceWatchdogAlias(watchdog) < 0)
        return -1;

    if (watchdog->model == VIR_DOMAIN_WATCHDOG_MODEL_I6300ESB) {
        if (qemuDomainEnsurePCIAddress(vm, &dev, driver) < 0)
            goto cleanup;
        releaseAddress = true;
    } else {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("hotplug of watchdog of model %s is not supported"),
                       virDomainWatchdogModelTypeToString(watchdog->model));
        goto cleanup;
    }

3087 3088 3089
    if (!(watchdogstr = qemuBuildWatchdogDevStr(vm->def, watchdog, priv->qemuCaps)))
        goto cleanup;

M
Michal Privoznik 已提交
3090 3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107 3108 3109 3110 3111 3112 3113 3114 3115 3116 3117 3118
    /* QEMU doesn't have a 'dump' action; we tell qemu to 'pause', then
       libvirt listens for the watchdog event, and we perform the dump
       ourselves. so convert 'dump' to 'pause' for the qemu cli */
    if (actualAction == VIR_DOMAIN_WATCHDOG_ACTION_DUMP)
        actualAction = VIR_DOMAIN_WATCHDOG_ACTION_PAUSE;

    actionStr = virDomainWatchdogActionTypeToString(actualAction);

    qemuDomainObjEnterMonitor(driver, vm);

    rv = qemuMonitorSetWatchdogAction(priv->mon, actionStr);

    if (rv >= 0)
        rv = qemuMonitorAddDevice(priv->mon, watchdogstr);

    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        releaseAddress = false;
        goto cleanup;
    }

    if (rv < 0)
        goto cleanup;

    releaseAddress = false;
    vm->def->watchdog = watchdog;
    ret = 0;

 cleanup:
    if (releaseAddress)
3119
        qemuDomainReleaseDeviceAddress(vm, &watchdog->info);
M
Michal Privoznik 已提交
3120 3121 3122 3123
    return ret;
}


J
Ján Tomko 已提交
3124 3125 3126 3127 3128 3129
int
qemuDomainAttachInputDevice(virQEMUDriverPtr driver,
                            virDomainObjPtr vm,
                            virDomainInputDefPtr input)
{
    int ret = -1;
3130
    g_autofree char *devstr = NULL;
J
Ján Tomko 已提交
3131 3132 3133
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainDeviceDef dev = { VIR_DOMAIN_DEVICE_INPUT,
                               { .input = input } };
3134
    virErrorPtr originalError = NULL;
J
Ján Tomko 已提交
3135
    bool releaseaddr = false;
3136 3137 3138
    bool teardowndevice = false;
    bool teardownlabel = false;
    bool teardowncgroup = false;
J
Ján Tomko 已提交
3139 3140 3141 3142 3143 3144 3145 3146 3147 3148 3149 3150 3151

    if (input->bus != VIR_DOMAIN_INPUT_BUS_USB &&
        input->bus != VIR_DOMAIN_INPUT_BUS_VIRTIO) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("input device on bus '%s' cannot be hot plugged."),
                       virDomainInputBusTypeToString(input->bus));
        return -1;
    }

    if (input->bus == VIR_DOMAIN_INPUT_BUS_VIRTIO) {
        if (qemuDomainEnsureVirtioAddress(&releaseaddr, vm, &dev, "input") < 0)
            return -1;
    } else if (input->bus == VIR_DOMAIN_INPUT_BUS_USB) {
3152 3153 3154
        if (virDomainUSBAddressEnsure(priv->usbaddrs, &input->info) < 0)
            goto cleanup;
        releaseaddr = true;
J
Ján Tomko 已提交
3155 3156 3157 3158 3159 3160 3161 3162
    }

    if (qemuAssignDeviceInputAlias(vm->def, input, -1) < 0)
        goto cleanup;

    if (qemuBuildInputDevStr(&devstr, vm->def, input, priv->qemuCaps) < 0)
        goto cleanup;

3163 3164 3165 3166 3167 3168 3169 3170 3171 3172 3173 3174
    if (qemuDomainNamespaceSetupInput(vm, input) < 0)
        goto cleanup;
    teardowndevice = true;

    if (qemuSetupInputCgroup(vm, input) < 0)
        goto cleanup;
    teardowncgroup = true;

    if (qemuSecuritySetInputLabel(vm, input) < 0)
        goto cleanup;
    teardownlabel = true;

J
Ján Tomko 已提交
3175 3176 3177 3178
    if (VIR_REALLOC_N(vm->def->inputs, vm->def->ninputs + 1) < 0)
        goto cleanup;

    qemuDomainObjEnterMonitor(driver, vm);
3179 3180

    if (qemuDomainAttachExtensionDevice(priv->mon, &input->info) < 0)
J
Ján Tomko 已提交
3181 3182
        goto exit_monitor;

3183 3184 3185 3186 3187
    if (qemuMonitorAddDevice(priv->mon, devstr) < 0) {
        ignore_value(qemuDomainDetachExtensionDevice(priv->mon, &input->info));
        goto exit_monitor;
    }

J
Ján Tomko 已提交
3188 3189 3190 3191 3192 3193 3194 3195 3196 3197 3198 3199 3200
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        releaseaddr = false;
        goto cleanup;
    }

    VIR_APPEND_ELEMENT_COPY_INPLACE(vm->def->inputs, vm->def->ninputs, input);

    ret = 0;

 audit:
    virDomainAuditInput(vm, input, "attach", ret == 0);

 cleanup:
3201 3202 3203 3204 3205 3206 3207 3208 3209
    if (ret < 0) {
        virErrorPreserveLast(&originalError);
        if (teardownlabel)
            qemuSecurityRestoreInputLabel(vm, input);
        if (teardowncgroup)
            qemuTeardownInputCgroup(vm, input);
        if (teardowndevice)
            qemuDomainNamespaceTeardownInput(vm, input);
        if (releaseaddr)
3210
            qemuDomainReleaseDeviceAddress(vm, &input->info);
3211 3212
        virErrorRestore(&originalError);
    }
J
Ján Tomko 已提交
3213 3214 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224

    return ret;

 exit_monitor:
    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        releaseaddr = false;
        goto cleanup;
    }
    goto audit;
}


J
Ján Tomko 已提交
3225 3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236
int
qemuDomainAttachVsockDevice(virQEMUDriverPtr driver,
                            virDomainObjPtr vm,
                            virDomainVsockDefPtr vsock)
{
    qemuDomainVsockPrivatePtr vsockPriv = (qemuDomainVsockPrivatePtr)vsock->privateData;
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainDeviceDef dev = { VIR_DOMAIN_DEVICE_VSOCK,
                               { .vsock = vsock } };
    virErrorPtr originalError = NULL;
    const char *fdprefix = "vsockfd";
    bool releaseaddr = false;
3237 3238
    g_autofree char *fdname = NULL;
    g_autofree char *devstr = NULL;
J
Ján Tomko 已提交
3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255
    int ret = -1;

    if (vm->def->vsock) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                       _("the domain already has a vsock device"));
        return -1;
    }

    if (qemuDomainEnsureVirtioAddress(&releaseaddr, vm, &dev, "vsock") < 0)
        return -1;

    if (qemuAssignDeviceVsockAlias(vsock) < 0)
        goto cleanup;

    if (qemuProcessOpenVhostVsock(vsock) < 0)
        goto cleanup;

3256
    fdname = g_strdup_printf("%s%u", fdprefix, vsockPriv->vhostfd);
J
Ján Tomko 已提交
3257 3258 3259 3260 3261

    if (!(devstr = qemuBuildVsockDevStr(vm->def, vsock, priv->qemuCaps, fdprefix)))
        goto cleanup;

    qemuDomainObjEnterMonitor(driver, vm);
3262 3263 3264 3265 3266 3267

    if (qemuDomainAttachExtensionDevice(priv->mon, &vsock->info) < 0)
        goto exit_monitor;

    if (qemuMonitorAddDeviceWithFd(priv->mon, devstr, vsockPriv->vhostfd, fdname) < 0) {
        ignore_value(qemuDomainDetachExtensionDevice(priv->mon, &vsock->info));
J
Ján Tomko 已提交
3268
        goto exit_monitor;
3269
    }
J
Ján Tomko 已提交
3270 3271 3272 3273 3274 3275

    if (qemuDomainObjExitMonitor(driver, vm) < 0) {
        releaseaddr = false;
        goto cleanup;
    }

3276
    vm->def->vsock = g_steal_pointer(&vsock);
J
Ján Tomko 已提交
3277 3278 3279 3280 3281 3282 3283

    ret = 0;

 cleanup:
    if (ret < 0) {
        virErrorPreserveLast(&originalError);
        if (releaseaddr)
3284
            qemuDomainReleaseDeviceAddress(vm, &vsock->info);
J
Ján Tomko 已提交
3285 3286 3287 3288 3289 3290 3291 3292 3293 3294 3295 3296
        virErrorRestore(&originalError);
    }

    return ret;

 exit_monitor:
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        releaseaddr = false;
    goto cleanup;
}


3297 3298 3299 3300 3301
int
qemuDomainAttachLease(virQEMUDriverPtr driver,
                      virDomainObjPtr vm,
                      virDomainLeaseDefPtr lease)
{
3302
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
3303 3304

    if (virDomainLeaseInsertPreAlloc(vm->def) < 0)
3305
        return -1;
3306 3307 3308 3309

    if (virDomainLockLeaseAttach(driver->lockManager, cfg->uri,
                                 vm, lease) < 0) {
        virDomainLeaseInsertPreAlloced(vm->def, NULL);
3310
        return -1;
3311 3312 3313
    }

    virDomainLeaseInsertPreAlloced(vm->def, lease);
3314
    return 0;
3315 3316 3317
}


3318
static int
3319
qemuDomainChangeNetBridge(virDomainObjPtr vm,
3320 3321
                          virDomainNetDefPtr olddev,
                          virDomainNetDefPtr newdev)
3322 3323
{
    int ret = -1;
3324 3325
    const char *oldbridge = virDomainNetGetActualBridgeName(olddev);
    const char *newbridge = virDomainNetGetActualBridgeName(newdev);
3326

3327 3328
    if (!oldbridge || !newbridge) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s", _("Missing bridge name"));
3329
        return -1;
3330
    }
3331 3332 3333 3334 3335

    VIR_DEBUG("Change bridge for interface %s: %s -> %s",
              olddev->ifname, oldbridge, newbridge);

    if (virNetDevExists(newbridge) != 1) {
3336 3337
        virReportError(VIR_ERR_OPERATION_FAILED,
                       _("bridge %s doesn't exist"), newbridge);
3338
        return -1;
3339 3340
    }

3341 3342 3343 3344 3345 3346 3347 3348 3349
    ret = virNetDevBridgeRemovePort(oldbridge, olddev->ifname);
    virDomainAuditNet(vm, olddev, NULL, "detach", ret == 0);
    if (ret < 0) {
        /* warn but continue - possibly the old network
         * had been destroyed and reconstructed, leaving the
         * tap device orphaned.
         */
        VIR_WARN("Unable to detach device %s from bridge %s",
                 olddev->ifname, oldbridge);
3350 3351 3352
    }

    ret = virNetDevBridgeAddPort(newbridge, olddev->ifname);
3353 3354 3355 3356 3357 3358 3359 3360 3361 3362 3363 3364
    if (ret == 0 &&
        virDomainNetGetActualPortOptionsIsolated(newdev) == VIR_TRISTATE_BOOL_YES) {

        ret = virNetDevBridgePortSetIsolated(newbridge, olddev->ifname, true);
        if (ret < 0) {
            virErrorPtr err;

            virErrorPreserveLast(&err);
            ignore_value(virNetDevBridgeRemovePort(newbridge, olddev->ifname));
            virErrorRestore(&err);
        }
    }
3365
    virDomainAuditNet(vm, NULL, newdev, "attach", ret == 0);
3366
    if (ret < 0) {
3367 3368 3369
        virErrorPtr err;

        virErrorPreserveLast(&err);
3370
        ret = virNetDevBridgeAddPort(oldbridge, olddev->ifname);
3371 3372 3373 3374
        if (ret == 0 &&
            virDomainNetGetActualPortOptionsIsolated(olddev) == VIR_TRISTATE_BOOL_YES) {
            ignore_value(virNetDevBridgePortSetIsolated(newbridge, olddev->ifname, true));
        }
3375
        virDomainAuditNet(vm, NULL, olddev, "attach", ret == 0);
3376 3377
        virErrorRestore(&err);
        return -1;
3378
    }
3379
    /* caller will replace entire olddev with newdev in domain nets list */
3380
    return 0;
3381 3382
}

3383
static int
3384
qemuDomainChangeNetFilter(virDomainObjPtr vm,
3385 3386 3387 3388 3389 3390 3391
                          virDomainNetDefPtr olddev,
                          virDomainNetDefPtr newdev)
{
    /* make sure this type of device supports filters. */
    switch (virDomainNetGetActualType(newdev)) {
    case VIR_DOMAIN_NET_TYPE_ETHERNET:
    case VIR_DOMAIN_NET_TYPE_BRIDGE:
3392
    case VIR_DOMAIN_NET_TYPE_NETWORK:
3393
        break;
3394 3395 3396 3397 3398 3399 3400 3401 3402
    case VIR_DOMAIN_NET_TYPE_USER:
    case VIR_DOMAIN_NET_TYPE_VHOSTUSER:
    case VIR_DOMAIN_NET_TYPE_SERVER:
    case VIR_DOMAIN_NET_TYPE_CLIENT:
    case VIR_DOMAIN_NET_TYPE_MCAST:
    case VIR_DOMAIN_NET_TYPE_INTERNAL:
    case VIR_DOMAIN_NET_TYPE_DIRECT:
    case VIR_DOMAIN_NET_TYPE_HOSTDEV:
    case VIR_DOMAIN_NET_TYPE_UDP:
3403 3404 3405 3406
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("filters not supported on interfaces of type %s"),
                       virDomainNetTypeToString(virDomainNetGetActualType(newdev)));
        return -1;
3407 3408 3409 3410 3411
    case VIR_DOMAIN_NET_TYPE_LAST:
    default:
        virReportEnumRangeError(virDomainNetType,
                                virDomainNetGetActualType(newdev));
        return -1;
3412 3413 3414 3415
    }

    virDomainConfNWFilterTeardown(olddev);

3416
    if (newdev->filter &&
3417
        virDomainConfNWFilterInstantiate(vm->def->name,
3418
                                         vm->def->uuid, newdev, false) < 0) {
3419 3420 3421 3422 3423 3424
        virErrorPtr errobj;

        virReportError(VIR_ERR_OPERATION_FAILED,
                       _("failed to add new filter rules to '%s' "
                         "- attempting to restore old rules"),
                       olddev->ifname);
3425
        virErrorPreserveLast(&errobj);
3426
        ignore_value(virDomainConfNWFilterInstantiate(vm->def->name,
3427
                                                      vm->def->uuid, olddev, false));
3428
        virErrorRestore(&errobj);
3429 3430 3431 3432 3433
        return -1;
    }
    return 0;
}

3434
int qemuDomainChangeNetLinkState(virQEMUDriverPtr driver,
3435 3436 3437 3438 3439 3440 3441 3442
                                 virDomainObjPtr vm,
                                 virDomainNetDefPtr dev,
                                 int linkstate)
{
    int ret = -1;
    qemuDomainObjPrivatePtr priv = vm->privateData;

    if (!dev->info.alias) {
3443 3444
        virReportError(VIR_ERR_OPERATION_FAILED, "%s",
                       _("can't change link state: device alias not found"));
3445 3446 3447
        return -1;
    }

3448 3449
    VIR_DEBUG("dev: %s, state: %d", dev->info.alias, linkstate);

3450
    qemuDomainObjEnterMonitor(driver, vm);
3451 3452 3453 3454 3455 3456 3457 3458

    ret = qemuMonitorSetLink(priv->mon, dev->info.alias, linkstate);
    if (ret < 0)
        goto cleanup;

    /* modify the device configuration */
    dev->linkstate = linkstate;

3459
 cleanup:
3460 3461
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        return -1;
3462 3463 3464 3465

    return ret;
}

3466
int
3467
qemuDomainChangeNet(virQEMUDriverPtr driver,
3468 3469
                    virDomainObjPtr vm,
                    virDomainDeviceDefPtr dev)
3470
{
3471
    qemuDomainObjPrivatePtr priv = vm->privateData;
3472
    virDomainNetDefPtr newdev = dev->data.net;
3473
    virDomainNetDefPtr *devslot = NULL;
3474
    virDomainNetDefPtr olddev;
3475
    virDomainNetType oldType, newType;
3476 3477
    bool needReconnect = false;
    bool needBridgeChange = false;
3478
    bool needFilterChange = false;
3479 3480
    bool needLinkStateChange = false;
    bool needReplaceDevDef = false;
3481
    bool needBandwidthSet = false;
3482
    bool needCoalesceChange = false;
3483
    bool needVlanUpdate = false;
3484
    bool needIsolatedPortChange = false;
3485
    int ret = -1;
3486
    int changeidx = -1;
3487
    g_autoptr(virConnect) conn = NULL;
3488
    virErrorPtr save_err = NULL;
3489 3490 3491 3492

    if ((changeidx = virDomainNetFindIdx(vm->def, newdev)) < 0)
        goto cleanup;
    devslot = &vm->def->nets[changeidx];
3493
    olddev = *devslot;
3494 3495 3496 3497

    oldType = virDomainNetGetActualType(olddev);
    if (oldType == VIR_DOMAIN_NET_TYPE_HOSTDEV) {
        /* no changes are possible to a type='hostdev' interface */
3498
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
3499 3500 3501 3502 3503 3504 3505 3506 3507 3508 3509 3510 3511 3512 3513 3514 3515 3516 3517 3518 3519 3520
                       _("cannot change config of '%s' network type"),
                       virDomainNetTypeToString(oldType));
        goto cleanup;
    }

    /* Check individual attributes for changes that can't be done to a
     * live netdev. These checks *mostly* go in order of the
     * declarations in virDomainNetDef in order to assure nothing is
     * omitted. (exceptiong where noted in comments - in particular,
     * some things require that a new "actual device" be allocated
     * from the network driver first, but we delay doing that until
     * after we've made as many other checks as possible)
     */

    /* type: this can change (with some restrictions), but the actual
     * type of the new device connection isn't known until after we
     * allocate the "actual" device.
     */

    if (virMacAddrCmp(&olddev->mac, &newdev->mac)) {
        char oldmac[VIR_MAC_STRING_BUFLEN], newmac[VIR_MAC_STRING_BUFLEN];

3521
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
3522 3523 3524 3525 3526 3527 3528
                       _("cannot change network interface mac address "
                         "from %s to %s"),
                       virMacAddrFormat(&olddev->mac, oldmac),
                       virMacAddrFormat(&newdev->mac, newmac));
        goto cleanup;
    }

3529 3530
    if (STRNEQ_NULLABLE(virDomainNetGetModelString(olddev),
                        virDomainNetGetModelString(newdev))) {
3531
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
3532
                       _("cannot modify network device model from %s to %s"),
3533 3534
                       NULLSTR(virDomainNetGetModelString(olddev)),
                       NULLSTR(virDomainNetGetModelString(newdev)));
3535
        goto cleanup;
3536 3537
    }

3538 3539 3540 3541 3542 3543 3544 3545
    if (olddev->model != newdev->model) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("cannot modify network device model from %s to %s"),
                       virDomainNetModelTypeToString(olddev->model),
                       virDomainNetModelTypeToString(newdev->model));
        goto cleanup;
    }

3546
    if (virDomainNetIsVirtioModel(olddev) &&
3547 3548 3549
        (olddev->driver.virtio.name != newdev->driver.virtio.name ||
         olddev->driver.virtio.txmode != newdev->driver.virtio.txmode ||
         olddev->driver.virtio.ioeventfd != newdev->driver.virtio.ioeventfd ||
3550
         olddev->driver.virtio.event_idx != newdev->driver.virtio.event_idx ||
3551
         olddev->driver.virtio.queues != newdev->driver.virtio.queues ||
3552 3553
         olddev->driver.virtio.rx_queue_size != newdev->driver.virtio.rx_queue_size ||
         olddev->driver.virtio.tx_queue_size != newdev->driver.virtio.tx_queue_size ||
3554 3555 3556 3557 3558 3559
         olddev->driver.virtio.host.csum != newdev->driver.virtio.host.csum ||
         olddev->driver.virtio.host.gso != newdev->driver.virtio.host.gso ||
         olddev->driver.virtio.host.tso4 != newdev->driver.virtio.host.tso4 ||
         olddev->driver.virtio.host.tso6 != newdev->driver.virtio.host.tso6 ||
         olddev->driver.virtio.host.ecn != newdev->driver.virtio.host.ecn ||
         olddev->driver.virtio.host.ufo != newdev->driver.virtio.host.ufo ||
J
Ján Tomko 已提交
3560
         olddev->driver.virtio.host.mrg_rxbuf != newdev->driver.virtio.host.mrg_rxbuf ||
3561 3562 3563 3564 3565
         olddev->driver.virtio.guest.csum != newdev->driver.virtio.guest.csum ||
         olddev->driver.virtio.guest.tso4 != newdev->driver.virtio.guest.tso4 ||
         olddev->driver.virtio.guest.tso6 != newdev->driver.virtio.guest.tso6 ||
         olddev->driver.virtio.guest.ecn != newdev->driver.virtio.guest.ecn ||
         olddev->driver.virtio.guest.ufo != newdev->driver.virtio.guest.ufo)) {
3566
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
3567 3568 3569 3570 3571 3572 3573 3574 3575 3576
                       _("cannot modify virtio network device driver attributes"));
        goto cleanup;
    }

    /* data: this union will be examined later, after allocating new actualdev */
    /* virtPortProfile: will be examined later, after allocating new actualdev */

    if (olddev->tune.sndbuf_specified != newdev->tune.sndbuf_specified ||
        olddev->tune.sndbuf != newdev->tune.sndbuf) {
        needReconnect = true;
3577 3578
    }

3579
    if (STRNEQ_NULLABLE(olddev->script, newdev->script)) {
3580
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
3581 3582
                       _("cannot modify network device script attribute"));
        goto cleanup;
3583 3584
    }

3585
    /* ifname: check if it's set in newdev. If not, retain the autogenerated one */
3586 3587
    if (!newdev->ifname)
        newdev->ifname = g_strdup(olddev->ifname);
3588
    if (STRNEQ_NULLABLE(olddev->ifname, newdev->ifname)) {
3589
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
3590 3591 3592
                       _("cannot modify network device tap name"));
        goto cleanup;
    }
3593

3594 3595
    /* info: Nothing is allowed to change. First fill the missing newdev->info
     * from olddev and then check for changes.
3596
     */
3597 3598 3599 3600 3601 3602 3603 3604 3605 3606
    /* if pci addr is missing or is invalid we overwrite it from olddev */
    if (newdev->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE ||
        !virDomainDeviceAddressIsValid(&newdev->info,
                                       newdev->info.type)) {
        newdev->info.type = olddev->info.type;
        newdev->info.addr = olddev->info.addr;
    }
    if (olddev->info.type != newdev->info.type) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                       _("cannot modify network device address type"));
3607
    }
3608
    if (!virPCIDeviceAddressEqual(&olddev->info.addr.pci,
3609
                                  &newdev->info.addr.pci)) {
3610
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
3611 3612 3613 3614
                       _("cannot modify network device guest PCI address"));
        goto cleanup;
    }
    /* grab alias from olddev if not set in newdev */
3615 3616
    if (!newdev->info.alias)
        newdev->info.alias = g_strdup(olddev->info.alias);
3617 3618 3619

    /* device alias is checked already in virDomainDefCompatibleDevice */

3620 3621
    if (newdev->info.rombar == VIR_TRISTATE_BOOL_ABSENT)
        newdev->info.rombar = olddev->info.rombar;
3622
    if (olddev->info.rombar != newdev->info.rombar) {
3623
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
3624 3625 3626
                       _("cannot modify network device rom bar setting"));
        goto cleanup;
    }
3627

3628 3629
    if (!newdev->info.romfile)
        newdev->info.romfile = g_strdup(olddev->info.romfile);
3630
    if (STRNEQ_NULLABLE(olddev->info.romfile, newdev->info.romfile)) {
3631
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
3632 3633 3634
                       _("cannot modify network rom file"));
        goto cleanup;
    }
3635 3636 3637

    if (newdev->info.bootIndex == 0)
        newdev->info.bootIndex = olddev->info.bootIndex;
3638
    if (olddev->info.bootIndex != newdev->info.bootIndex) {
3639
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
3640 3641 3642
                       _("cannot modify network device boot index setting"));
        goto cleanup;
    }
3643 3644 3645

    if (newdev->info.romenabled == VIR_TRISTATE_BOOL_ABSENT)
        newdev->info.romenabled = olddev->info.romenabled;
3646 3647 3648 3649 3650
    if (olddev->info.romenabled != newdev->info.romenabled) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                       _("cannot modify network device rom enabled setting"));
        goto cleanup;
    }
3651
    /* (end of device info checks) */
3652

3653 3654 3655 3656
    if (STRNEQ_NULLABLE(olddev->filter, newdev->filter) ||
        !virNWFilterHashTableEqual(olddev->filterparams, newdev->filterparams)) {
        needFilterChange = true;
    }
3657

3658 3659 3660 3661
    /* bandwidth can be modified, and will be checked later */
    /* vlan can be modified, and will be checked later */
    /* linkstate can be modified */

3662 3663 3664 3665 3666 3667
    if (olddev->mtu != newdev->mtu) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                       _("cannot modify MTU"));
        goto cleanup;
    }

3668 3669 3670
    /* allocate new actual device to compare to old - we will need to
     * free it if we fail for any reason
     */
3671 3672 3673 3674 3675
    if (newdev->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
        if (!(conn = virGetConnectNetwork()))
            goto cleanup;
        if (virDomainNetAllocateActualDevice(conn, vm->def, newdev) < 0)
            goto cleanup;
3676 3677
    }

3678 3679 3680 3681
    /* final validation now that we have full info on the type */
    if (qemuDomainValidateActualNetDef(newdev, priv->qemuCaps) < 0)
        goto cleanup;

3682 3683 3684 3685
    newType = virDomainNetGetActualType(newdev);

    if (newType == VIR_DOMAIN_NET_TYPE_HOSTDEV) {
        /* can't turn it into a type='hostdev' interface */
3686
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
3687 3688 3689 3690 3691 3692
                       _("cannot change network interface type to '%s'"),
                       virDomainNetTypeToString(newType));
        goto cleanup;
    }

    if (olddev->type == newdev->type && oldType == newType) {
3693

3694 3695 3696 3697 3698 3699
        /* if type hasn't changed, check the relevant fields for the type */
        switch (newdev->type) {
        case VIR_DOMAIN_NET_TYPE_USER:
            break;

        case VIR_DOMAIN_NET_TYPE_ETHERNET:
3700
            break;
3701

3702 3703 3704
        case VIR_DOMAIN_NET_TYPE_SERVER:
        case VIR_DOMAIN_NET_TYPE_CLIENT:
        case VIR_DOMAIN_NET_TYPE_MCAST:
3705
        case VIR_DOMAIN_NET_TYPE_UDP:
3706 3707 3708 3709 3710 3711 3712 3713 3714 3715 3716 3717 3718 3719 3720 3721 3722 3723 3724 3725 3726 3727 3728 3729 3730 3731 3732 3733 3734 3735 3736 3737
            if (STRNEQ_NULLABLE(olddev->data.socket.address,
                                newdev->data.socket.address) ||
                olddev->data.socket.port != newdev->data.socket.port) {
                needReconnect = true;
            }
            break;

        case VIR_DOMAIN_NET_TYPE_NETWORK:
            if (STRNEQ(olddev->data.network.name, newdev->data.network.name)) {
                if (virDomainNetGetActualVirtPortProfile(newdev))
                    needReconnect = true;
                else
                    needBridgeChange = true;
            }
            /* other things handled in common code directly below this switch */
            break;

        case VIR_DOMAIN_NET_TYPE_BRIDGE:
            /* all handled in bridge name checked in common code below */
            break;

        case VIR_DOMAIN_NET_TYPE_INTERNAL:
            if (STRNEQ_NULLABLE(olddev->data.internal.name,
                                newdev->data.internal.name)) {
                needReconnect = true;
            }
            break;

        case VIR_DOMAIN_NET_TYPE_DIRECT:
            /* all handled in common code directly below this switch */
            break;

3738 3739
        case VIR_DOMAIN_NET_TYPE_VHOSTUSER:
        case VIR_DOMAIN_NET_TYPE_HOSTDEV:
3740
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
3741 3742
                           _("unable to change config on '%s' network type"),
                           virDomainNetTypeToString(newdev->type));
3743 3744 3745 3746 3747
            goto cleanup;
        case VIR_DOMAIN_NET_TYPE_LAST:
        default:
            virReportEnumRangeError(virDomainNetType, newdev->type);
            goto cleanup;
3748
        }
3749 3750 3751 3752 3753 3754 3755 3756 3757 3758 3759 3760 3761 3762 3763 3764 3765 3766 3767 3768 3769 3770 3771 3772 3773 3774 3775 3776 3777 3778 3779
    } else {
        /* interface type has changed. There are a few special cases
         * where this can only require a minor (or even no) change,
         * but in most cases we need to do a full reconnection.
         *
         * If we switch (in either direction) between type='bridge'
         * and type='network' (for a traditional managed virtual
         * network that uses a host bridge, i.e. forward
         * mode='route|nat'), we just need to change the bridge.
         */
        if ((oldType == VIR_DOMAIN_NET_TYPE_NETWORK &&
             newType == VIR_DOMAIN_NET_TYPE_BRIDGE) ||
            (oldType == VIR_DOMAIN_NET_TYPE_BRIDGE &&
             newType == VIR_DOMAIN_NET_TYPE_NETWORK)) {

            needBridgeChange = true;

        } else if (oldType == VIR_DOMAIN_NET_TYPE_DIRECT &&
                   newType == VIR_DOMAIN_NET_TYPE_DIRECT) {

            /* this is the case of switching from type='direct' to
             * type='network' for a network that itself uses direct
             * (macvtap) devices. If the physical device and mode are
             * the same, this doesn't require any actual setup
             * change. If the physical device or mode *does* change,
             * that will be caught in the common section below */

        } else {

            /* for all other combinations, we'll need a full reconnect */
            needReconnect = true;
3780 3781

        }
3782
    }
3783

3784 3785 3786 3787 3788 3789 3790 3791 3792 3793 3794
    /* now several things that are in multiple (but not all)
     * different types, and can be safely compared even for those
     * cases where they don't apply to a particular type.
     */
    if (STRNEQ_NULLABLE(virDomainNetGetActualBridgeName(olddev),
                        virDomainNetGetActualBridgeName(newdev))) {
        if (virDomainNetGetActualVirtPortProfile(newdev))
            needReconnect = true;
        else
            needBridgeChange = true;
    }
3795

3796 3797
    if (STRNEQ_NULLABLE(virDomainNetGetActualDirectDev(olddev),
                        virDomainNetGetActualDirectDev(newdev)) ||
3798
        virDomainNetGetActualDirectMode(olddev) != virDomainNetGetActualDirectMode(newdev) ||
3799
        !virNetDevVPortProfileEqual(virDomainNetGetActualVirtPortProfile(olddev),
3800
                                    virDomainNetGetActualVirtPortProfile(newdev))) {
3801
        needReconnect = true;
3802 3803
    }

3804 3805 3806 3807 3808
    if (!virNetDevVlanEqual(virDomainNetGetActualVlan(olddev),
                             virDomainNetGetActualVlan(newdev))) {
        needVlanUpdate = true;
    }

3809 3810 3811 3812 3813
    if (virDomainNetGetActualPortOptionsIsolated(olddev) !=
        virDomainNetGetActualPortOptionsIsolated(newdev)) {
        needIsolatedPortChange = true;
    }

3814 3815 3816
    if (olddev->linkstate != newdev->linkstate)
        needLinkStateChange = true;

3817 3818 3819 3820
    if (!virNetDevBandwidthEqual(virDomainNetGetActualBandwidth(olddev),
                                 virDomainNetGetActualBandwidth(newdev)))
        needBandwidthSet = true;

3821 3822
    if (!!olddev->coalesce != !!newdev->coalesce ||
        (olddev->coalesce && newdev->coalesce &&
3823 3824
         memcmp(olddev->coalesce, newdev->coalesce,
                sizeof(*olddev->coalesce))))
3825 3826
        needCoalesceChange = true;

3827 3828 3829
    /* FINALLY - actually perform the required actions */

    if (needReconnect) {
3830
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
3831 3832 3833
                       _("unable to change config on '%s' network type"),
                       virDomainNetTypeToString(newdev->type));
        goto cleanup;
3834 3835
    }

3836
    if (needBandwidthSet) {
3837
        const virNetDevBandwidth *newb = virDomainNetGetActualBandwidth(newdev);
3838 3839 3840 3841 3842 3843 3844 3845 3846 3847 3848 3849

        if (newb) {
            if (virNetDevBandwidthSet(newdev->ifname, newb, false,
                                      !virDomainNetTypeSharesHostView(newdev)) < 0)
                goto cleanup;
        } else {
            /*
             * virNetDevBandwidthSet() doesn't clear any existing
             * setting unless something new is being set.
             */
            virNetDevBandwidthClear(newdev->ifname);
        }
3850 3851 3852
        needReplaceDevDef = true;
    }

3853
    if (needBridgeChange) {
3854
        if (qemuDomainChangeNetBridge(vm, olddev, newdev) < 0)
3855 3856 3857
            goto cleanup;
        /* we successfully switched to the new bridge, and we've
         * determined that the rest of newdev is equivalent to olddev,
3858 3859
         * so move newdev into place */
        needReplaceDevDef = true;
3860 3861 3862 3863 3864 3865 3866 3867 3868 3869 3870 3871 3872 3873

        /* this is already updated as a part of reconnecting the bridge */
        needIsolatedPortChange = false;
    }

    if (needIsolatedPortChange) {
        const char *bridge = virDomainNetGetActualBridgeName(newdev);
        bool isolatedOn = (virDomainNetGetActualPortOptionsIsolated(newdev) ==
                           VIR_TRISTATE_BOOL_YES);

        if (virNetDevBridgePortSetIsolated(bridge, newdev->ifname, isolatedOn) < 0)
            goto cleanup;

        needReplaceDevDef = true;
3874 3875 3876
    }

    if (needFilterChange) {
3877
        if (qemuDomainChangeNetFilter(vm, olddev, newdev) < 0)
3878 3879 3880 3881
            goto cleanup;
        /* we successfully switched to the new filter, and we've
         * determined that the rest of newdev is equivalent to olddev,
         * so move newdev into place */
3882
        needReplaceDevDef = true;
3883 3884
    }

3885 3886 3887 3888 3889 3890
    if (needCoalesceChange) {
        if (virNetDevSetCoalesce(newdev->ifname, newdev->coalesce, true) < 0)
            goto cleanup;
        needReplaceDevDef = true;
    }

3891 3892 3893
    if (needLinkStateChange &&
        qemuDomainChangeNetLinkState(driver, vm, olddev, newdev->linkstate) < 0) {
        goto cleanup;
3894 3895
    }

3896 3897 3898 3899 3900 3901
    if (needVlanUpdate) {
        if (virNetDevOpenvswitchUpdateVlan(newdev->ifname, &newdev->vlan) < 0)
            goto cleanup;
        needReplaceDevDef = true;
    }

3902 3903 3904 3905
    if (needReplaceDevDef) {
        /* the changes above warrant replacing olddev with newdev in
         * the domain's nets list.
         */
3906 3907 3908

        /* this function doesn't work with HOSTDEV networks yet, thus
         * no need to change the pointer in the hostdev structure */
3909 3910 3911 3912 3913 3914
        if (olddev->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
            if (conn || (conn = virGetConnectNetwork()))
                virDomainNetReleaseActualDevice(conn, vm->def, olddev);
            else
                VIR_WARN("Unable to release network device '%s'", NULLSTR(olddev->ifname));
        }
3915 3916 3917 3918 3919 3920 3921 3922
        virDomainNetDefFree(olddev);
        /* move newdev into the nets list, and NULL it out from the
         * virDomainDeviceDef that we were given so that the caller
         * won't delete it on return.
         */
        *devslot = newdev;
        newdev = dev->data.net = NULL;
        dev->type = VIR_DOMAIN_DEVICE_NONE;
3923 3924
    }

3925
    ret = 0;
3926
 cleanup:
3927
    virErrorPreserveLast(&save_err);
3928 3929 3930 3931 3932 3933 3934 3935 3936 3937 3938 3939 3940 3941 3942 3943 3944 3945
    /* When we get here, we will be in one of these two states:
     *
     * 1) newdev has been moved into the domain's list of nets and
     *    newdev set to NULL, and dev->data.net will be NULL (and
     *    dev->type is NONE). olddev will have been completely
     *    released and freed. (aka success) In this case no extra
     *    cleanup is needed.
     *
     * 2) newdev has *not* been moved into the domain's list of nets,
     *    and dev->data.net == newdev (and dev->type == NET). In this *
     *    case, we need to at least release the "actual device" from *
     *    newdev (the caller will free dev->data.net a.k.a. newdev, and
     *    the original olddev is still in used)
     *
     * Note that case (2) isn't necessarily a failure. It may just be
     * that the changes were minor enough that we didn't need to
     * replace the entire device object.
     */
3946 3947
    if (newdev && newdev->type == VIR_DOMAIN_NET_TYPE_NETWORK && conn)
        virDomainNetReleaseActualDevice(conn, vm->def, newdev);
3948
    virErrorRestore(&save_err);
3949

3950 3951 3952
    return ret;
}

3953 3954 3955
static virDomainGraphicsDefPtr
qemuDomainFindGraphics(virDomainObjPtr vm,
                       virDomainGraphicsDefPtr dev)
3956
{
3957
    size_t i;
3958

3959
    for (i = 0; i < vm->def->ngraphics; i++) {
3960 3961 3962 3963 3964 3965 3966
        if (vm->def->graphics[i]->type == dev->type)
            return vm->def->graphics[i];
    }

    return NULL;
}

3967 3968 3969 3970 3971 3972 3973 3974 3975 3976 3977 3978 3979 3980
int
qemuDomainFindGraphicsIndex(virDomainDefPtr def,
                            virDomainGraphicsDefPtr dev)
{
    size_t i;

    for (i = 0; i < def->ngraphics; i++) {
        if (def->graphics[i]->type == dev->type)
            return i;
    }

    return -1;
}

3981 3982 3983 3984 3985 3986 3987 3988 3989 3990 3991 3992

int
qemuDomainChangeGraphicsPasswords(virQEMUDriverPtr driver,
                                  virDomainObjPtr vm,
                                  int type,
                                  virDomainGraphicsAuthDefPtr auth,
                                  const char *defaultPasswd,
                                  int asyncJob)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    time_t now = time(NULL);
    const char *expire;
3993
    g_autofree char *validTo = NULL;
3994 3995 3996 3997
    const char *connected = NULL;
    const char *password;
    int ret = -1;

3998 3999 4000
    if (!auth->passwd && !defaultPasswd)
        return 0;

4001 4002 4003 4004 4005 4006
    password = auth->passwd ? auth->passwd : defaultPasswd;

    if (auth->connected)
        connected = virDomainGraphicsAuthConnectedTypeToString(auth->connected);

    if (qemuDomainObjEnterMonitorAsync(driver, vm, asyncJob) < 0)
4007
        return ret;
4008 4009 4010 4011 4012 4013 4014 4015 4016
    ret = qemuMonitorSetPassword(priv->mon, type, password, connected);

    if (ret != 0)
        goto end_job;

    if (password[0] == '\0' ||
        (auth->expires && auth->validTo <= now)) {
        expire = "now";
    } else if (auth->expires) {
4017
        validTo = g_strdup_printf("%lu", (unsigned long)auth->validTo);
4018 4019 4020 4021 4022 4023 4024 4025 4026 4027
        expire = validTo;
    } else {
        expire = "never";
    }

    ret = qemuMonitorExpirePassword(priv->mon, type, expire);

 end_job:
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        ret = -1;
4028

4029 4030 4031 4032
    return ret;
}


4033
int
4034
qemuDomainChangeGraphics(virQEMUDriverPtr driver,
4035 4036 4037 4038
                         virDomainObjPtr vm,
                         virDomainGraphicsDefPtr dev)
{
    virDomainGraphicsDefPtr olddev = qemuDomainFindGraphics(vm, dev);
4039
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
4040
    const char *type = virDomainGraphicsTypeToString(dev->type);
4041
    size_t i;
4042 4043

    if (!olddev) {
4044
        virReportError(VIR_ERR_DEVICE_MISSING,
4045 4046
                       _("cannot find existing graphics device to modify of "
                         "type '%s'"), type);
4047
        return -1;
4048 4049
    }

4050
    if (dev->nListens != olddev->nListens) {
4051 4052 4053
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("cannot change the number of listen addresses "
                         "on '%s' graphics"), type);
4054
        return -1;
4055 4056 4057
    }

    for (i = 0; i < dev->nListens; i++) {
J
Jim Fehlig 已提交
4058
        virDomainGraphicsListenDefPtr newlisten = &dev->listens[i];
4059 4060
        virDomainGraphicsListenDefPtr oldlisten = &olddev->listens[i];

J
Jim Fehlig 已提交
4061
        if (newlisten->type != oldlisten->type) {
4062 4063 4064
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                           _("cannot change the type of listen address "
                             "on '%s' graphics"), type);
4065
            return -1;
4066 4067
        }

4068
        switch (newlisten->type) {
4069
        case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_ADDRESS:
J
Jim Fehlig 已提交
4070
            if (STRNEQ_NULLABLE(newlisten->address, oldlisten->address)) {
4071 4072 4073
                virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                               _("cannot change listen address setting "
                                 "on '%s' graphics"), type);
4074
                return -1;
4075
            }
4076

4077 4078 4079
            break;

        case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_NETWORK:
J
Jim Fehlig 已提交
4080
            if (STRNEQ_NULLABLE(newlisten->network, oldlisten->network)) {
4081 4082 4083
                virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                               _("cannot change listen address setting "
                                 "on '%s' graphics"), type);
4084
                return -1;
4085
            }
4086

4087 4088
            break;

4089 4090 4091 4092 4093
        case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_SOCKET:
            if (STRNEQ_NULLABLE(newlisten->socket, oldlisten->socket)) {
                virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                               _("cannot change listen socket setting "
                                 "on '%s' graphics"), type);
4094
                return -1;
4095 4096 4097
            }
            break;

4098 4099 4100 4101 4102 4103
        case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_NONE:
        case VIR_DOMAIN_GRAPHICS_LISTEN_TYPE_LAST:
            /* nada */
            break;
        }
    }
4104

4105 4106
    switch (dev->type) {
    case VIR_DOMAIN_GRAPHICS_TYPE_VNC:
4107 4108 4109
        if ((olddev->data.vnc.autoport != dev->data.vnc.autoport) ||
            (!dev->data.vnc.autoport &&
             (olddev->data.vnc.port != dev->data.vnc.port))) {
4110
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4111
                           _("cannot change port settings on vnc graphics"));
4112
            return -1;
4113 4114
        }
        if (STRNEQ_NULLABLE(olddev->data.vnc.keymap, dev->data.vnc.keymap)) {
4115
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4116
                           _("cannot change keymap setting on vnc graphics"));
4117
            return -1;
4118 4119
        }

4120 4121 4122
        /* If a password lifetime was, or is set, or action if connected has
         * changed, then we must always run, even if new password matches
         * old password */
4123 4124
        if (olddev->data.vnc.auth.expires ||
            dev->data.vnc.auth.expires ||
4125
            olddev->data.vnc.auth.connected != dev->data.vnc.auth.connected ||
E
Eric Blake 已提交
4126 4127 4128
            STRNEQ_NULLABLE(olddev->data.vnc.auth.passwd,
                            dev->data.vnc.auth.passwd)) {
            VIR_DEBUG("Updating password on VNC server %p %p",
4129
                      dev->data.vnc.auth.passwd, cfg->vncPassword);
4130 4131 4132 4133 4134 4135
            if (qemuDomainChangeGraphicsPasswords(driver, vm,
                                                  VIR_DOMAIN_GRAPHICS_TYPE_VNC,
                                                  &dev->data.vnc.auth,
                                                  cfg->vncPassword,
                                                  QEMU_ASYNC_JOB_NONE) < 0)
                return -1;
4136 4137 4138 4139 4140

            /* Steal the new dev's  char * reference */
            VIR_FREE(olddev->data.vnc.auth.passwd);
            olddev->data.vnc.auth.passwd = dev->data.vnc.auth.passwd;
            dev->data.vnc.auth.passwd = NULL;
4141 4142
            olddev->data.vnc.auth.validTo = dev->data.vnc.auth.validTo;
            olddev->data.vnc.auth.expires = dev->data.vnc.auth.expires;
4143
            olddev->data.vnc.auth.connected = dev->data.vnc.auth.connected;
4144 4145 4146
        }
        break;

4147
    case VIR_DOMAIN_GRAPHICS_TYPE_SPICE:
4148 4149 4150 4151 4152
        if ((olddev->data.spice.autoport != dev->data.spice.autoport) ||
            (!dev->data.spice.autoport &&
             (olddev->data.spice.port != dev->data.spice.port)) ||
            (!dev->data.spice.autoport &&
             (olddev->data.spice.tlsPort != dev->data.spice.tlsPort))) {
4153
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4154
                           _("cannot change port settings on spice graphics"));
4155
            return -1;
4156
        }
E
Eric Blake 已提交
4157 4158
        if (STRNEQ_NULLABLE(olddev->data.spice.keymap,
                            dev->data.spice.keymap)) {
4159
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
4160
                            _("cannot change keymap setting on spice graphics"));
4161
            return -1;
4162 4163
        }

4164 4165 4166 4167 4168
        /* We must reset the password if it has changed but also if:
         * - password lifetime is or was set
         * - the requested action has changed
         * - the action is "disconnect"
         */
4169 4170
        if (olddev->data.spice.auth.expires ||
            dev->data.spice.auth.expires ||
4171
            olddev->data.spice.auth.connected != dev->data.spice.auth.connected ||
4172 4173
            dev->data.spice.auth.connected ==
            VIR_DOMAIN_GRAPHICS_AUTH_CONNECTED_DISCONNECT ||
E
Eric Blake 已提交
4174 4175 4176
            STRNEQ_NULLABLE(olddev->data.spice.auth.passwd,
                            dev->data.spice.auth.passwd)) {
            VIR_DEBUG("Updating password on SPICE server %p %p",
4177
                      dev->data.spice.auth.passwd, cfg->spicePassword);
4178 4179 4180 4181 4182 4183
            if (qemuDomainChangeGraphicsPasswords(driver, vm,
                                                  VIR_DOMAIN_GRAPHICS_TYPE_SPICE,
                                                  &dev->data.spice.auth,
                                                  cfg->spicePassword,
                                                  QEMU_ASYNC_JOB_NONE) < 0)
                return -1;
4184

E
Eric Blake 已提交
4185
            /* Steal the new dev's char * reference */
4186 4187 4188 4189 4190
            VIR_FREE(olddev->data.spice.auth.passwd);
            olddev->data.spice.auth.passwd = dev->data.spice.auth.passwd;
            dev->data.spice.auth.passwd = NULL;
            olddev->data.spice.auth.validTo = dev->data.spice.auth.validTo;
            olddev->data.spice.auth.expires = dev->data.spice.auth.expires;
4191
            olddev->data.spice.auth.connected = dev->data.spice.auth.connected;
4192
        } else {
4193
            VIR_DEBUG("Not updating since password didn't change");
4194
        }
E
Eric Blake 已提交
4195
        break;
4196

4197 4198 4199
    case VIR_DOMAIN_GRAPHICS_TYPE_SDL:
    case VIR_DOMAIN_GRAPHICS_TYPE_RDP:
    case VIR_DOMAIN_GRAPHICS_TYPE_DESKTOP:
4200
    case VIR_DOMAIN_GRAPHICS_TYPE_EGL_HEADLESS:
4201
        virReportError(VIR_ERR_INTERNAL_ERROR,
4202
                       _("unable to change config on '%s' graphics type"), type);
4203
        break;
4204 4205 4206 4207
    case VIR_DOMAIN_GRAPHICS_TYPE_LAST:
    default:
        virReportEnumRangeError(virDomainGraphicsType, dev->type);
        break;
4208 4209
    }

4210
    return 0;
4211 4212 4213
}


J
Ján Tomko 已提交
4214 4215
static int qemuComparePCIDevice(virDomainDefPtr def G_GNUC_UNUSED,
                                virDomainDeviceDefPtr device G_GNUC_UNUSED,
4216
                                virDomainDeviceInfoPtr info1,
4217 4218
                                void *opaque)
{
4219
    virDomainDeviceInfoPtr info2 = opaque;
4220

4221 4222
    if (info1->type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI ||
        info2->type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)
4223 4224
        return 0;

4225 4226 4227
    if (info1->addr.pci.domain == info2->addr.pci.domain &&
        info1->addr.pci.bus == info2->addr.pci.bus &&
        info1->addr.pci.slot == info2->addr.pci.slot &&
4228
        info1->addr.pci.function != info2->addr.pci.function)
4229 4230 4231 4232 4233
        return -1;
    return 0;
}

static bool qemuIsMultiFunctionDevice(virDomainDefPtr def,
4234
                                      virDomainDeviceInfoPtr info)
4235
{
4236
    if (info->type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI)
4237 4238
        return false;

4239
    if (virDomainDeviceInfoIterate(def, qemuComparePCIDevice, info) < 0)
4240 4241 4242 4243
        return true;
    return false;
}

4244

4245
static int
4246 4247 4248 4249
qemuDomainRemoveDiskDevice(virQEMUDriverPtr driver,
                           virDomainObjPtr vm,
                           virDomainDiskDefPtr disk)
{
4250
    qemuDomainDiskPrivatePtr diskPriv = QEMU_DOMAIN_DISK_PRIVATE(disk);
J
Ján Tomko 已提交
4251
    g_autoptr(qemuBlockStorageSourceChainData) diskBackend = NULL;
4252 4253
    virDomainDeviceDef dev;
    size_t i;
4254
    qemuDomainObjPrivatePtr priv = vm->privateData;
4255
    g_autofree char *corAlias = NULL;
4256
    bool blockdev = virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_BLOCKDEV);
4257
    int ret = -1;
4258 4259 4260 4261

    VIR_DEBUG("Removing disk %s from domain %p %s",
              disk->info.alias, vm, vm->def->name);

4262

4263
    if (blockdev) {
4264
        corAlias = g_strdup(diskPriv->nodeCopyOnRead);
4265

4266 4267 4268 4269 4270 4271 4272 4273 4274
        if (diskPriv->blockjob) {
            /* the block job keeps reference to the disk chain */
            diskPriv->blockjob->disk = NULL;
            virObjectUnref(diskPriv->blockjob);
            diskPriv->blockjob = NULL;
        } else {
            if (!(diskBackend = qemuBlockStorageSourceChainDetachPrepareBlockdev(disk->src)))
                goto cleanup;
        }
4275 4276 4277 4278 4279 4280 4281 4282
    } else {
        char *driveAlias;

        if (!(driveAlias = qemuAliasDiskDriveFromDisk(disk)))
            goto cleanup;

        if (!(diskBackend = qemuBlockStorageSourceChainDetachPrepareDrive(disk->src, driveAlias)))
            goto cleanup;
4283 4284
    }

4285 4286 4287 4288 4289 4290 4291
    for (i = 0; i < vm->def->ndisks; i++) {
        if (vm->def->disks[i] == disk) {
            virDomainDiskRemove(vm->def, i);
            break;
        }
    }

4292
    qemuDomainObjEnterMonitor(driver, vm);
4293

4294
    if (corAlias)
4295
        ignore_value(qemuMonitorBlockdevDel(priv->mon, corAlias));
4296

4297 4298
    if (diskBackend)
        qemuBlockStorageSourceChainDetach(priv->mon, diskBackend);
4299

4300
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
4301
        goto cleanup;
4302

4303
    virDomainAuditDisk(vm, disk->src, NULL, "detach", true);
4304

4305
    qemuDomainReleaseDeviceAddress(vm, &disk->info);
4306

4307
    /* tear down disk security access */
4308 4309
    if (diskBackend)
        qemuDomainStorageSourceChainAccessRevoke(driver, vm, disk->src);
4310

4311 4312 4313 4314
    dev.type = VIR_DOMAIN_DEVICE_DISK;
    dev.data.disk = disk;
    ignore_value(qemuRemoveSharedDevice(driver, &dev, vm->def->name));

4315 4316
    if (virStorageSourceChainHasManagedPR(disk->src) &&
        qemuHotplugRemoveManagedPR(driver, vm, QEMU_ASYNC_JOB_NONE) < 0)
4317 4318
        goto cleanup;

4319 4320 4321
    ret = 0;

 cleanup:
4322
    virDomainDiskDefFree(disk);
4323
    return ret;
4324 4325 4326
}


4327
static int
4328
qemuDomainRemoveControllerDevice(virDomainObjPtr vm,
4329 4330 4331 4332 4333 4334 4335 4336 4337 4338 4339 4340 4341 4342
                                 virDomainControllerDefPtr controller)
{
    size_t i;

    VIR_DEBUG("Removing controller %s from domain %p %s",
              controller->info.alias, vm, vm->def->name);

    for (i = 0; i < vm->def->ncontrollers; i++) {
        if (vm->def->controllers[i] == controller) {
            virDomainControllerRemove(vm->def, i);
            break;
        }
    }

4343
    qemuDomainReleaseDeviceAddress(vm, &controller->info);
4344
    virDomainControllerDefFree(controller);
4345
    return 0;
4346 4347 4348
}


4349 4350 4351 4352 4353 4354
static int
qemuDomainRemoveMemoryDevice(virQEMUDriverPtr driver,
                             virDomainObjPtr vm,
                             virDomainMemoryDefPtr mem)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
4355
    unsigned long long oldmem = virDomainDefGetMemoryTotal(vm->def);
4356
    unsigned long long newmem = oldmem - mem->size;
4357
    g_autofree char *backendAlias = NULL;
4358 4359 4360 4361 4362 4363
    int rc;
    int idx;

    VIR_DEBUG("Removing memory device %s from domain %p %s",
              mem->info.alias, vm, vm->def->name);

4364
    backendAlias = g_strdup_printf("mem%s", mem->info.alias);
4365 4366 4367

    qemuDomainObjEnterMonitor(driver, vm);
    rc = qemuMonitorDelObject(priv->mon, backendAlias);
4368 4369 4370 4371 4372 4373
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        rc = -1;

    virDomainAuditMemory(vm, oldmem, newmem, "update", rc == 0);
    if (rc < 0)
        return -1;
4374 4375 4376 4377

    if ((idx = virDomainMemoryFindByDef(vm->def, mem)) >= 0)
        virDomainMemoryRemove(vm->def, idx);

M
Michal Privoznik 已提交
4378 4379 4380
    if (qemuSecurityRestoreMemoryLabel(driver, vm, mem) < 0)
        VIR_WARN("Unable to restore security label on memdev");

4381 4382 4383
    if (qemuTeardownMemoryDevicesCgroup(vm, mem) < 0)
        VIR_WARN("Unable to remove memory device cgroup ACL");

4384
    if (qemuDomainNamespaceTeardownMemory(vm, mem) <  0)
M
Michal Privoznik 已提交
4385 4386
        VIR_WARN("Unable to remove memory device from /dev");

4387 4388 4389
    if (qemuProcessDestroyMemoryBackingPath(driver, vm, mem) < 0)
        VIR_WARN("Unable to destroy memory backing path");

4390
    virDomainMemoryDefFree(mem);
4391

4392 4393 4394
    /* fix the balloon size */
    ignore_value(qemuProcessRefreshBalloonState(driver, vm, QEMU_ASYNC_JOB_NONE));

4395
    /* decrease the mlock limit after memory unplug if necessary */
4396
    ignore_value(qemuDomainAdjustMaxMemLock(vm, false));
4397

4398
    return 0;
4399 4400 4401
}


4402 4403 4404 4405 4406
static void
qemuDomainRemovePCIHostDevice(virQEMUDriverPtr driver,
                              virDomainObjPtr vm,
                              virDomainHostdevDefPtr hostdev)
{
4407
    qemuHostdevReAttachPCIDevices(driver, vm->def->name, &hostdev, 1);
4408
    qemuDomainReleaseDeviceAddress(vm, hostdev->info);
4409 4410 4411 4412
}

static void
qemuDomainRemoveUSBHostDevice(virQEMUDriverPtr driver,
4413
                              virDomainObjPtr vm,
4414 4415
                              virDomainHostdevDefPtr hostdev)
{
4416
    qemuHostdevReAttachUSBDevices(driver, vm->def->name, &hostdev, 1);
4417
    qemuDomainReleaseDeviceAddress(vm, hostdev->info);
4418 4419 4420 4421 4422 4423 4424
}

static void
qemuDomainRemoveSCSIHostDevice(virQEMUDriverPtr driver,
                               virDomainObjPtr vm,
                               virDomainHostdevDefPtr hostdev)
{
4425
    qemuHostdevReAttachSCSIDevices(driver, vm->def->name, &hostdev, 1);
4426 4427
}

4428 4429 4430 4431 4432 4433 4434 4435
static void
qemuDomainRemoveSCSIVHostDevice(virQEMUDriverPtr driver,
                                virDomainObjPtr vm,
                                virDomainHostdevDefPtr hostdev)
{
    qemuHostdevReAttachSCSIVHostDevices(driver, vm->def->name, &hostdev, 1);
}

4436 4437 4438 4439 4440 4441 4442

static void
qemuDomainRemoveMediatedDevice(virQEMUDriverPtr driver,
                               virDomainObjPtr vm,
                               virDomainHostdevDefPtr hostdev)
{
    qemuHostdevReAttachMediatedDevices(driver, vm->def->name, &hostdev, 1);
4443
    qemuDomainReleaseDeviceAddress(vm, hostdev->info);
4444 4445 4446
}


4447
static int
4448 4449 4450 4451 4452 4453
qemuDomainRemoveHostDevice(virQEMUDriverPtr driver,
                           virDomainObjPtr vm,
                           virDomainHostdevDefPtr hostdev)
{
    virDomainNetDefPtr net = NULL;
    size_t i;
4454
    qemuDomainObjPrivatePtr priv = vm->privateData;
4455 4456
    g_autofree char *drivealias = NULL;
    g_autofree char *objAlias = NULL;
4457 4458 4459 4460

    VIR_DEBUG("Removing host device %s from domain %p %s",
              hostdev->info->alias, vm, vm->def->name);

4461
    if (hostdev->source.subsys.type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI) {
4462 4463 4464
        virDomainHostdevSubsysSCSIPtr scsisrc = &hostdev->source.subsys.u.scsi;
        virDomainHostdevSubsysSCSIiSCSIPtr iscsisrc = &scsisrc->u.iscsi;

J
John Ferlan 已提交
4465
        if (!(drivealias = qemuAliasFromHostdev(hostdev)))
4466
            return -1;
4467

4468 4469 4470 4471 4472
        /* Look for the markers that the iSCSI hostdev was added with a
         * secret object to manage the username/password. If present, let's
         * attempt to remove the object as well. */
        if (scsisrc->protocol == VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI &&
            virQEMUCapsGet(priv->qemuCaps, QEMU_CAPS_ISCSI_PASSWORD_SECRET) &&
4473
            qemuDomainStorageSourceHasAuth(iscsisrc->src)) {
4474
            if (!(objAlias = qemuDomainGetSecretAESAlias(hostdev->info->alias, false)))
4475
                return -1;
4476 4477
        }

4478
        qemuDomainObjEnterMonitor(driver, vm);
J
John Ferlan 已提交
4479
        qemuMonitorDriveDel(priv->mon, drivealias);
4480 4481 4482 4483 4484

        /* If it fails, then so be it - it was a best shot */
        if (objAlias)
            ignore_value(qemuMonitorDelObject(priv->mon, objAlias));

4485
        if (qemuDomainObjExitMonitor(driver, vm) < 0)
4486
            return -1;
4487 4488
    }

4489
    if (hostdev->parentnet) {
4490
        net = hostdev->parentnet;
4491
        for (i = 0; i < vm->def->nnets; i++) {
4492
            if (vm->def->nets[i] == hostdev->parentnet) {
4493 4494 4495 4496 4497 4498 4499 4500 4501 4502 4503 4504 4505 4506 4507
                virDomainNetRemove(vm->def, i);
                break;
            }
        }
    }

    for (i = 0; i < vm->def->nhostdevs; i++) {
        if (vm->def->hostdevs[i] == hostdev) {
            virDomainHostdevRemove(vm->def, i);
            break;
        }
    }

    virDomainAuditHostdev(vm, hostdev, "detach", true);

4508
    if (!virHostdevIsVFIODevice(hostdev) &&
4509
        qemuSecurityRestoreHostdevLabel(driver, vm, hostdev) < 0)
4510
        VIR_WARN("Failed to restore host device labelling");
4511

4512 4513 4514
    if (qemuTeardownHostdevCgroup(vm, hostdev) < 0)
        VIR_WARN("Failed to remove host device cgroup ACL");

4515
    if (qemuDomainNamespaceTeardownHostdev(vm, hostdev) < 0)
4516 4517
        VIR_WARN("Unable to remove host device from /dev");

4518
    switch ((virDomainHostdevSubsysType)hostdev->source.subsys.type) {
4519 4520
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
        qemuDomainRemovePCIHostDevice(driver, vm, hostdev);
4521 4522
        /* QEMU might no longer need to lock as much memory, eg. we just
         * detached the last VFIO device, so adjust the limit here */
4523
        if (qemuDomainAdjustMaxMemLock(vm, false) < 0)
4524
            VIR_WARN("Failed to adjust locked memory limit");
4525 4526 4527 4528 4529 4530 4531
        break;
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
        qemuDomainRemoveUSBHostDevice(driver, vm, hostdev);
        break;
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI:
        qemuDomainRemoveSCSIHostDevice(driver, vm, hostdev);
        break;
4532
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI_HOST:
4533
        qemuDomainRemoveSCSIVHostDevice(driver, vm, hostdev);
4534
        break;
4535
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_MDEV:
4536
        qemuDomainRemoveMediatedDevice(driver, vm, hostdev);
4537
        break;
4538 4539 4540 4541 4542 4543 4544
    case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_LAST:
        break;
    }

    virDomainHostdevDefFree(hostdev);

    if (net) {
4545
        if (net->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
4546 4547
            g_autoptr(virConnect) conn = virGetConnectNetwork();
            if (conn)
4548
                virDomainNetReleaseActualDevice(conn, vm->def, net);
4549
            else
4550 4551
                VIR_WARN("Unable to release network device '%s'", NULLSTR(net->ifname));
        }
4552 4553
        virDomainNetDefFree(net);
    }
4554

4555
    return 0;
4556 4557 4558
}


4559
static int
4560 4561 4562 4563
qemuDomainRemoveNetDevice(virQEMUDriverPtr driver,
                          virDomainObjPtr vm,
                          virDomainNetDefPtr net)
{
4564
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
4565
    qemuDomainObjPrivatePtr priv = vm->privateData;
4566 4567
    g_autofree char *hostnet_name = NULL;
    g_autofree char *charDevAlias = NULL;
4568
    size_t i;
4569
    int actualType = virDomainNetGetActualType(net);
4570

4571
    if (actualType == VIR_DOMAIN_NET_TYPE_HOSTDEV) {
4572
        /* this function handles all hostdev and netdev cleanup */
4573 4574
        return qemuDomainRemoveHostDevice(driver, vm,
                                          virDomainNetGetActualHostdev(net));
4575 4576
    }

4577 4578 4579
    VIR_DEBUG("Removing network interface %s from domain %p %s",
              net->info.alias, vm, vm->def->name);

4580 4581
    hostnet_name = g_strdup_printf("host%s", net->info.alias);
    if (!(charDevAlias = qemuAliasChardevFromDevAlias(net->info.alias)))
4582
        return -1;
4583

4584 4585 4586 4587 4588 4589 4590 4591 4592 4593 4594
    if (virDomainNetGetActualBandwidth(net) &&
        virNetDevSupportBandwidth(virDomainNetGetActualType(net)) &&
        virNetDevBandwidthClear(net->ifname) < 0)
        VIR_WARN("cannot clear bandwidth setting for device : %s",
                 net->ifname);

    /* deactivate the tap/macvtap device on the host, which could also
     * affect the parent device (e.g. macvtap passthrough mode sets
     * the parent device offline)
     */
    ignore_value(qemuInterfaceStopDevice(net));
4595

4596
    qemuDomainObjEnterMonitor(driver, vm);
J
Ján Tomko 已提交
4597 4598
    if (qemuMonitorRemoveNetdev(priv->mon, hostnet_name) < 0) {
        if (qemuDomainObjExitMonitor(driver, vm) < 0)
4599
            return -1;
J
Ján Tomko 已提交
4600
        virDomainAuditNet(vm, net, NULL, "detach", false);
4601
        return -1;
4602
    }
4603 4604 4605 4606 4607 4608 4609 4610 4611 4612 4613

    if (actualType == VIR_DOMAIN_NET_TYPE_VHOSTUSER) {
        /* vhostuser has a chardev too */
        if (qemuMonitorDetachCharDev(priv->mon, charDevAlias) < 0) {
            /* well, this is a messy situation. Guest visible PCI device has
             * been removed, netdev too but chardev not. The best seems to be
             * to just ignore the error and carry on.
             */
        }
    }

4614
    if (qemuDomainObjExitMonitor(driver, vm) < 0)
4615
        return -1;
4616

4617 4618 4619
    if (QEMU_DOMAIN_NETWORK_PRIVATE(net)->slirp)
        qemuSlirpStop(QEMU_DOMAIN_NETWORK_PRIVATE(net)->slirp, vm, driver, net, true);

4620 4621 4622 4623 4624 4625 4626 4627 4628
    virDomainAuditNet(vm, net, NULL, "detach", true);

    for (i = 0; i < vm->def->nnets; i++) {
        if (vm->def->nets[i] == net) {
            virDomainNetRemove(vm->def, i);
            break;
        }
    }

4629
    qemuDomainReleaseDeviceAddress(vm, &net->info);
4630 4631
    virDomainConfNWFilterTeardown(net);

4632 4633 4634 4635 4636 4637
    if (cfg->macFilter && (net->ifname != NULL)) {
        ignore_value(ebtablesRemoveForwardAllowIn(driver->ebtables,
                                                  net->ifname,
                                                  &net->mac));
    }

4638
    if (actualType == VIR_DOMAIN_NET_TYPE_DIRECT) {
4639 4640 4641 4642 4643 4644 4645 4646
        ignore_value(virNetDevMacVLanDeleteWithVPortProfile(
                         net->ifname, &net->mac,
                         virDomainNetGetActualDirectDev(net),
                         virDomainNetGetActualDirectMode(net),
                         virDomainNetGetActualVirtPortProfile(net),
                         cfg->stateDir));
    }

4647
    qemuDomainNetDeviceVportRemove(net);
4648

4649
    if (net->type == VIR_DOMAIN_NET_TYPE_NETWORK) {
4650 4651
        g_autoptr(virConnect) conn = virGetConnectNetwork();
        if (conn)
4652
            virDomainNetReleaseActualDevice(conn, vm->def, net);
4653
        else
4654 4655
            VIR_WARN("Unable to release network device '%s'", NULLSTR(net->ifname));
    }
4656
    virDomainNetDefFree(net);
4657
    return 0;
4658 4659 4660
}


4661
static int
4662
qemuDomainRemoveChrDevice(virQEMUDriverPtr driver,
4663
                          virDomainObjPtr vm,
4664 4665
                          virDomainChrDefPtr chr,
                          bool monitor)
4666
{
4667
    virObjectEventPtr event;
4668
    g_autofree char *charAlias = NULL;
4669
    qemuDomainObjPrivatePtr priv = vm->privateData;
4670
    int rc = 0;
4671

4672 4673 4674
    VIR_DEBUG("Removing character device %s from domain %p %s",
              chr->info.alias, vm, vm->def->name);

4675
    if (!(charAlias = qemuAliasChardevFromDevAlias(chr->info.alias)))
4676
        return -1;
4677

4678
    if (monitor) {
4679 4680 4681
        qemuDomainObjEnterMonitor(driver, vm);
        rc = qemuMonitorDetachCharDev(priv->mon, charAlias);
        if (qemuDomainObjExitMonitor(driver, vm) < 0)
4682
            return -1;
4683
    }
4684

4685 4686
    if (rc == 0 &&
        qemuDomainDelChardevTLSObjects(driver, vm, chr->source, charAlias) < 0)
4687
        return -1;
4688

4689 4690 4691
    virDomainAuditChardev(vm, chr, NULL, "detach", rc == 0);

    if (rc < 0)
4692
        return -1;
4693

4694 4695 4696
    if (qemuTeardownChardevCgroup(vm, chr) < 0)
        VIR_WARN("Failed to remove chr device cgroup ACL");

4697 4698 4699
    if (qemuSecurityRestoreChardevLabel(driver, vm, chr) < 0)
        VIR_WARN("Unable to restore security label on char device");

4700
    if (qemuDomainNamespaceTeardownChardev(vm, chr) < 0)
4701 4702
        VIR_WARN("Unable to remove chr device from /dev");

4703
    qemuDomainReleaseDeviceAddress(vm, &chr->info);
4704 4705 4706 4707 4708 4709
    qemuDomainChrRemove(vm->def, chr);

    /* The caller does not emit the event, so we must do it here. Note
     * that the event should be reported only after all backend
     * teardown is completed.
     */
4710
    event = virDomainEventDeviceRemovedNewFromObj(vm, chr->info.alias);
4711
    virObjectEventStateQueue(driver->domainEventState, event);
4712

4713
    virDomainChrDefFree(chr);
4714
    return 0;
4715 4716 4717
}


4718 4719 4720 4721 4722
static int
qemuDomainRemoveRNGDevice(virQEMUDriverPtr driver,
                          virDomainObjPtr vm,
                          virDomainRNGDefPtr rng)
{
4723 4724
    g_autofree char *charAlias = NULL;
    g_autofree char *objAlias = NULL;
4725 4726
    qemuDomainObjPrivatePtr priv = vm->privateData;
    ssize_t idx;
4727
    int rc = 0;
4728 4729 4730 4731

    VIR_DEBUG("Removing RNG device %s from domain %p %s",
              rng->info.alias, vm, vm->def->name);

4732

4733
    objAlias = g_strdup_printf("obj%s", rng->info.alias);
4734

4735
    if (!(charAlias = qemuAliasChardevFromDevAlias(rng->info.alias)))
4736
        return -1;
4737 4738

    qemuDomainObjEnterMonitor(driver, vm);
4739

4740 4741 4742 4743 4744 4745 4746 4747
    if (rc == 0 &&
        qemuMonitorDelObject(priv->mon, objAlias) < 0)
        rc = -1;

    if (rng->backend == VIR_DOMAIN_RNG_BACKEND_EGD &&
        rc == 0 &&
        qemuMonitorDetachCharDev(priv->mon, charAlias) < 0)
        rc = -1;
4748 4749

    if (qemuDomainObjExitMonitor(driver, vm) < 0)
4750
        return -1;
4751

4752 4753
    if (rng->backend == VIR_DOMAIN_RNG_BACKEND_EGD &&
        rc == 0 &&
4754 4755
        qemuDomainDelChardevTLSObjects(driver, vm, rng->source.chardev,
                                       charAlias) < 0)
4756
        rc = -1;
4757

4758 4759 4760
    virDomainAuditRNG(vm, rng, NULL, "detach", rc == 0);

    if (rc < 0)
4761
        return -1;
4762

4763 4764 4765
    if (qemuTeardownRNGCgroup(vm, rng) < 0)
        VIR_WARN("Failed to remove RNG device cgroup ACL");

4766
    if (qemuDomainNamespaceTeardownRNG(vm, rng) < 0)
4767 4768
        VIR_WARN("Unable to remove RNG device from /dev");

4769 4770
    if ((idx = virDomainRNGFind(vm->def, rng)) >= 0)
        virDomainRNGRemove(vm->def, idx);
4771
    qemuDomainReleaseDeviceAddress(vm, &rng->info);
4772
    virDomainRNGDefFree(rng);
4773
    return 0;
4774 4775 4776
}


4777 4778 4779 4780 4781 4782 4783
static int
qemuDomainRemoveShmemDevice(virQEMUDriverPtr driver,
                            virDomainObjPtr vm,
                            virDomainShmemDefPtr shmem)
{
    int rc;
    ssize_t idx = -1;
4784 4785
    g_autofree char *charAlias = NULL;
    g_autofree char *memAlias = NULL;
4786 4787 4788 4789 4790 4791
    qemuDomainObjPrivatePtr priv = vm->privateData;

    VIR_DEBUG("Removing shmem device %s from domain %p %s",
              shmem->info.alias, vm, vm->def->name);

    if (shmem->server.enabled) {
4792
        charAlias = g_strdup_printf("char%s", shmem->info.alias);
4793
    } else {
4794
        memAlias = g_strdup_printf("shmmem-%s", shmem->info.alias);
4795 4796 4797 4798 4799 4800 4801 4802 4803 4804
    }

    qemuDomainObjEnterMonitor(driver, vm);

    if (shmem->server.enabled)
        rc = qemuMonitorDetachCharDev(priv->mon, charAlias);
    else
        rc = qemuMonitorDelObject(priv->mon, memAlias);

    if (qemuDomainObjExitMonitor(driver, vm) < 0)
4805
        return -1;
4806 4807 4808 4809

    virDomainAuditShmem(vm, shmem, "detach", rc == 0);

    if (rc < 0)
4810
        return -1;
4811 4812 4813

    if ((idx = virDomainShmemDefFind(vm->def, shmem)) >= 0)
        virDomainShmemDefRemove(vm->def, idx);
4814
    qemuDomainReleaseDeviceAddress(vm, &shmem->info);
4815 4816
    virDomainShmemDefFree(shmem);

4817
    return 0;
4818 4819 4820
}


M
Michal Privoznik 已提交
4821
static int
4822
qemuDomainRemoveWatchdog(virDomainObjPtr vm,
M
Michal Privoznik 已提交
4823 4824 4825 4826 4827
                         virDomainWatchdogDefPtr watchdog)
{
    VIR_DEBUG("Removing watchdog %s from domain %p %s",
              watchdog->info.alias, vm, vm->def->name);

4828
    qemuDomainReleaseDeviceAddress(vm, &watchdog->info);
M
Michal Privoznik 已提交
4829 4830 4831 4832 4833 4834
    virDomainWatchdogDefFree(vm->def->watchdog);
    vm->def->watchdog = NULL;
    return 0;
}


4835 4836 4837 4838 4839 4840 4841 4842 4843 4844 4845 4846 4847
static int
qemuDomainRemoveInputDevice(virDomainObjPtr vm,
                            virDomainInputDefPtr dev)
{
    size_t i;

    VIR_DEBUG("Removing input device %s from domain %p %s",
              dev->info.alias, vm, vm->def->name);

    for (i = 0; i < vm->def->ninputs; i++) {
        if (vm->def->inputs[i] == dev)
            break;
    }
4848
    qemuDomainReleaseDeviceAddress(vm, &dev->info);
4849 4850 4851 4852 4853 4854 4855 4856 4857
    if (qemuSecurityRestoreInputLabel(vm, dev) < 0)
        VIR_WARN("Unable to restore security label on input device");

    if (qemuTeardownInputCgroup(vm, dev) < 0)
        VIR_WARN("Unable to remove input device cgroup ACL");

    if (qemuDomainNamespaceTeardownInput(vm, dev) < 0)
        VIR_WARN("Unable to remove input device from /dev");

4858 4859 4860 4861 4862 4863
    virDomainInputDefFree(vm->def->inputs[i]);
    VIR_DELETE_ELEMENT(vm->def->inputs, i, vm->def->ninputs);
    return 0;
}


J
Ján Tomko 已提交
4864 4865 4866 4867 4868 4869 4870
static int
qemuDomainRemoveVsockDevice(virDomainObjPtr vm,
                            virDomainVsockDefPtr dev)
{
    VIR_DEBUG("Removing vsock device %s from domain %p %s",
              dev->info.alias, vm, vm->def->name);

4871
    qemuDomainReleaseDeviceAddress(vm, &dev->info);
J
Ján Tomko 已提交
4872 4873 4874 4875 4876 4877
    virDomainVsockDefFree(vm->def->vsock);
    vm->def->vsock = NULL;
    return 0;
}


4878 4879 4880 4881 4882 4883
static int
qemuDomainRemoveRedirdevDevice(virQEMUDriverPtr driver,
                               virDomainObjPtr vm,
                               virDomainRedirdevDefPtr dev)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
4884
    g_autofree char *charAlias = NULL;
4885 4886 4887 4888 4889 4890
    ssize_t idx;

    VIR_DEBUG("Removing redirdev device %s from domain %p %s",
              dev->info.alias, vm, vm->def->name);

    if (!(charAlias = qemuAliasChardevFromDevAlias(dev->info.alias)))
4891
        return -1;
4892 4893 4894 4895 4896 4897 4898 4899

    qemuDomainObjEnterMonitor(driver, vm);
    /* DeviceDel from Detach may remove chardev,
     * so we cannot rely on return status to delete TLS chardevs.
     */
    ignore_value(qemuMonitorDetachCharDev(priv->mon, charAlias));

    if (qemuDomainObjExitMonitor(driver, vm) < 0)
4900
        return -1;
4901 4902

    if (qemuDomainDelChardevTLSObjects(driver, vm, dev->source, charAlias) < 0)
4903
        return -1;
4904 4905 4906 4907 4908

    virDomainAuditRedirdev(vm, dev, "detach", true);

    if ((idx = virDomainRedirdevDefFind(vm->def, dev)) >= 0)
        virDomainRedirdevDefRemove(vm->def, idx);
4909
    qemuDomainReleaseDeviceAddress(vm, &dev->info);
4910 4911
    virDomainRedirdevDefFree(dev);

4912
    return 0;
4913 4914 4915
}


4916
static void
4917 4918 4919 4920 4921 4922 4923 4924 4925 4926 4927 4928 4929 4930 4931
qemuDomainRemoveAuditDevice(virDomainObjPtr vm,
                            virDomainDeviceDefPtr detach,
                            bool success)
{
    switch ((virDomainDeviceType)detach->type) {
    case VIR_DOMAIN_DEVICE_DISK:
        virDomainAuditDisk(vm, detach->data.disk->src, NULL, "detach", success);
        break;
    case VIR_DOMAIN_DEVICE_NET:
        virDomainAuditNet(vm, detach->data.net, NULL, "detach", success);
        break;
    case VIR_DOMAIN_DEVICE_HOSTDEV:
        virDomainAuditHostdev(vm, detach->data.hostdev, "detach", success);
        break;
    case VIR_DOMAIN_DEVICE_INPUT:
4932 4933
        virDomainAuditInput(vm, detach->data.input, "detach", success);
        break;
4934
    case VIR_DOMAIN_DEVICE_CHR:
4935 4936
        virDomainAuditChardev(vm, detach->data.chr, NULL, "detach", success);
        break;
4937
    case VIR_DOMAIN_DEVICE_RNG:
4938 4939 4940 4941 4942 4943 4944 4945 4946
        virDomainAuditRNG(vm, detach->data.rng, NULL, "detach", success);
        break;
    case VIR_DOMAIN_DEVICE_MEMORY: {
        unsigned long long oldmem = virDomainDefGetMemoryTotal(vm->def);
        unsigned long long newmem = oldmem - detach->data.memory->size;

        virDomainAuditMemory(vm, oldmem, newmem, "update", success);
        break;
    }
4947
    case VIR_DOMAIN_DEVICE_SHMEM:
4948 4949
        virDomainAuditShmem(vm, detach->data.shmem, "detach", success);
        break;
4950
    case VIR_DOMAIN_DEVICE_REDIRDEV:
4951 4952
        virDomainAuditRedirdev(vm, detach->data.redirdev, "detach", success);
        break;
4953 4954 4955 4956 4957 4958 4959 4960 4961 4962 4963 4964 4965 4966 4967 4968 4969 4970 4971 4972 4973 4974 4975 4976 4977 4978 4979

    case VIR_DOMAIN_DEVICE_LEASE:
    case VIR_DOMAIN_DEVICE_CONTROLLER:
    case VIR_DOMAIN_DEVICE_WATCHDOG:
    case VIR_DOMAIN_DEVICE_VSOCK:
        /* These devices don't have associated audit logs */
        break;

    case VIR_DOMAIN_DEVICE_FS:
    case VIR_DOMAIN_DEVICE_SOUND:
    case VIR_DOMAIN_DEVICE_VIDEO:
    case VIR_DOMAIN_DEVICE_GRAPHICS:
    case VIR_DOMAIN_DEVICE_HUB:
    case VIR_DOMAIN_DEVICE_SMARTCARD:
    case VIR_DOMAIN_DEVICE_MEMBALLOON:
    case VIR_DOMAIN_DEVICE_NVRAM:
    case VIR_DOMAIN_DEVICE_NONE:
    case VIR_DOMAIN_DEVICE_TPM:
    case VIR_DOMAIN_DEVICE_PANIC:
    case VIR_DOMAIN_DEVICE_IOMMU:
    case VIR_DOMAIN_DEVICE_LAST:
        /* libvirt doesn't yet support detaching these devices */
        break;
    }
}


4980
int
4981 4982 4983 4984
qemuDomainRemoveDevice(virQEMUDriverPtr driver,
                       virDomainObjPtr vm,
                       virDomainDeviceDefPtr dev)
{
4985 4986
    virDomainDeviceInfoPtr info;
    virObjectEventPtr event;
4987
    g_autofree char *alias = NULL;
4988 4989 4990 4991 4992

    /*
     * save the alias to use when sending a DEVICE_REMOVED event after
     * all other teardown is complete
     */
4993 4994
    if ((info = virDomainDeviceGetInfo(dev)))
        alias = g_strdup(info->alias);
4995 4996
    info = NULL;

4997
    switch ((virDomainDeviceType)dev->type) {
4998 4999 5000 5001 5002 5003 5004 5005 5006 5007 5008 5009 5010 5011 5012
    case VIR_DOMAIN_DEVICE_CHR:
        /* We must return directly after calling
         * qemuDomainRemoveChrDevice because it is called directly
         * from other places, so it must be completely self-contained
         * and can't take advantage of any common code at the end of
         * qemuDomainRemoveDevice().
         */
        return qemuDomainRemoveChrDevice(driver, vm, dev->data.chr, true);

        /*
         * all of the following qemuDomainRemove*Device() functions
         * are (and must be) only called from this function, so any
         * code that is common to them all can be pulled out and put
         * into this function.
         */
5013
    case VIR_DOMAIN_DEVICE_DISK:
5014 5015
        if (qemuDomainRemoveDiskDevice(driver, vm, dev->data.disk) < 0)
            return -1;
5016 5017
        break;
    case VIR_DOMAIN_DEVICE_CONTROLLER:
5018 5019
        if (qemuDomainRemoveControllerDevice(vm, dev->data.controller) < 0)
            return -1;
5020 5021
        break;
    case VIR_DOMAIN_DEVICE_NET:
5022 5023
        if (qemuDomainRemoveNetDevice(driver, vm, dev->data.net) < 0)
            return -1;
5024 5025
        break;
    case VIR_DOMAIN_DEVICE_HOSTDEV:
5026 5027
        if (qemuDomainRemoveHostDevice(driver, vm, dev->data.hostdev) < 0)
            return -1;
5028
        break;
5029
    case VIR_DOMAIN_DEVICE_RNG:
5030 5031
        if (qemuDomainRemoveRNGDevice(driver, vm, dev->data.rng) < 0)
            return -1;
5032
        break;
5033
    case VIR_DOMAIN_DEVICE_MEMORY:
5034 5035
        if (qemuDomainRemoveMemoryDevice(driver, vm, dev->data.memory) < 0)
            return -1;
5036
        break;
5037
    case VIR_DOMAIN_DEVICE_SHMEM:
5038 5039
        if (qemuDomainRemoveShmemDevice(driver, vm, dev->data.shmem) < 0)
            return -1;
5040
        break;
5041
    case VIR_DOMAIN_DEVICE_INPUT:
5042 5043
        if (qemuDomainRemoveInputDevice(vm, dev->data.input) < 0)
            return -1;
5044
        break;
5045
    case VIR_DOMAIN_DEVICE_REDIRDEV:
5046 5047
        if (qemuDomainRemoveRedirdevDevice(driver, vm, dev->data.redirdev) < 0)
            return -1;
5048
        break;
5049
    case VIR_DOMAIN_DEVICE_WATCHDOG:
5050 5051
        if (qemuDomainRemoveWatchdog(vm, dev->data.watchdog) < 0)
            return -1;
5052
        break;
J
Ján Tomko 已提交
5053
    case VIR_DOMAIN_DEVICE_VSOCK:
5054 5055
        if (qemuDomainRemoveVsockDevice(vm, dev->data.vsock) < 0)
            return -1;
J
Ján Tomko 已提交
5056 5057
        break;

5058 5059 5060 5061 5062 5063 5064 5065 5066 5067
    case VIR_DOMAIN_DEVICE_NONE:
    case VIR_DOMAIN_DEVICE_LEASE:
    case VIR_DOMAIN_DEVICE_FS:
    case VIR_DOMAIN_DEVICE_SOUND:
    case VIR_DOMAIN_DEVICE_VIDEO:
    case VIR_DOMAIN_DEVICE_GRAPHICS:
    case VIR_DOMAIN_DEVICE_HUB:
    case VIR_DOMAIN_DEVICE_SMARTCARD:
    case VIR_DOMAIN_DEVICE_MEMBALLOON:
    case VIR_DOMAIN_DEVICE_NVRAM:
5068
    case VIR_DOMAIN_DEVICE_TPM:
5069
    case VIR_DOMAIN_DEVICE_PANIC:
J
Ján Tomko 已提交
5070
    case VIR_DOMAIN_DEVICE_IOMMU:
5071 5072 5073 5074 5075 5076
    case VIR_DOMAIN_DEVICE_LAST:
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("don't know how to remove a %s device"),
                       virDomainDeviceTypeToString(dev->type));
        break;
    }
5077 5078 5079 5080 5081

    event = virDomainEventDeviceRemovedNewFromObj(vm, alias);
    virObjectEventStateQueue(driver->domainEventState, event);

    return 0;
5082 5083 5084 5085
}


static void
5086 5087
qemuDomainMarkDeviceAliasForRemoval(virDomainObjPtr vm,
                                    const char *alias)
5088 5089 5090
{
    qemuDomainObjPrivatePtr priv = vm->privateData;

5091 5092
    memset(&priv->unplug, 0, sizeof(priv->unplug));

5093
    priv->unplug.alias = alias;
5094 5095
}

5096 5097 5098 5099 5100 5101 5102 5103 5104 5105

static void
qemuDomainMarkDeviceForRemoval(virDomainObjPtr vm,
                               virDomainDeviceInfoPtr info)

{
    qemuDomainMarkDeviceAliasForRemoval(vm, info->alias);
}


5106 5107 5108 5109
static void
qemuDomainResetDeviceRemoval(virDomainObjPtr vm)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
5110
    priv->unplug.alias = NULL;
5111
    priv->unplug.eventSeen = false;
5112 5113
}

5114 5115 5116 5117 5118 5119 5120 5121 5122 5123 5124

unsigned long long
qemuDomainGetUnplugTimeout(virDomainObjPtr vm)
{
    if (qemuDomainIsPSeries(vm->def))
        return QEMU_UNPLUG_TIMEOUT_PPC64;

    return QEMU_UNPLUG_TIMEOUT;
}


5125
/* Returns:
5126 5127
 *  -1 Unplug of the device failed
 *
5128
 *   0 removal of the device did not finish in qemuDomainRemoveDeviceWaitTime
5129 5130 5131 5132
 *
 *   1 when the caller is responsible for finishing the device removal:
 *      - DEVICE_DELETED event arrived before the timeout time
 *      - we failed to reliably wait for the event and thus use fallback behavior
5133 5134 5135 5136 5137 5138
 */
static int
qemuDomainWaitForDeviceRemoval(virDomainObjPtr vm)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    unsigned long long until;
5139
    int rc;
5140 5141

    if (virTimeMillisNow(&until) < 0)
5142
        return 1;
5143
    until += qemuDomainGetUnplugTimeout(vm);
5144

5145
    while (priv->unplug.alias) {
5146 5147 5148 5149 5150
        if ((rc = virDomainObjWaitUntil(vm, until)) == 1)
            return 0;

        if (rc < 0) {
            VIR_WARN("Failed to wait on unplug condition for domain '%s' "
5151
                     "device '%s'", vm->def->name, priv->unplug.alias);
5152
            return 1;
5153 5154 5155
        }
    }

5156 5157 5158 5159 5160 5161
    if (priv->unplug.status == QEMU_DOMAIN_UNPLUGGING_DEVICE_STATUS_GUEST_REJECTED) {
        virReportError(VIR_ERR_OPERATION_FAILED, "%s",
                       _("unplug of device was rejected by the guest"));
        return -1;
    }

5162 5163 5164
    return 1;
}

5165 5166 5167 5168 5169 5170 5171
/* Returns:
 *  true    there was a thread waiting for devAlias to be removed and this
 *          thread will take care of finishing the removal
 *  false   the thread that started the removal is already gone and delegate
 *          finishing the removal to a new thread
 */
bool
5172
qemuDomainSignalDeviceRemoval(virDomainObjPtr vm,
5173 5174
                              const char *devAlias,
                              qemuDomainUnpluggingDeviceStatus status)
5175 5176 5177
{
    qemuDomainObjPrivatePtr priv = vm->privateData;

5178
    if (STREQ_NULLABLE(priv->unplug.alias, devAlias)) {
5179
        VIR_DEBUG("Removal of device '%s' continues in waiting thread", devAlias);
5180
        qemuDomainResetDeviceRemoval(vm);
5181
        priv->unplug.status = status;
5182
        priv->unplug.eventSeen = true;
5183
        virDomainObjBroadcast(vm);
5184
        return true;
5185
    }
5186
    return false;
5187 5188 5189
}


5190 5191 5192 5193 5194 5195
static int
qemuFindDisk(virDomainDefPtr def, const char *dst)
{
    size_t i;

    for (i = 0; i < def->ndisks; i++) {
5196
        if (STREQ(def->disks[i]->dst, dst))
5197 5198 5199 5200 5201 5202
            return i;
    }

    return -1;
}

5203
static int
5204
qemuDomainDetachPrepDisk(virDomainObjPtr vm,
5205
                         virDomainDiskDefPtr match,
5206
                         virDomainDiskDefPtr *detach)
5207 5208 5209 5210
{
    virDomainDiskDefPtr disk;
    int idx;

5211
    if ((idx = qemuFindDisk(vm->def, match->dst)) < 0) {
5212
        virReportError(VIR_ERR_OPERATION_FAILED,
5213
                       _("disk %s not found"), match->dst);
5214 5215
        return -1;
    }
5216
    *detach = disk = vm->def->disks[idx];
5217

5218
    switch ((virDomainDiskDevice) disk->device) {
5219 5220
    case VIR_DOMAIN_DISK_DEVICE_DISK:
    case VIR_DOMAIN_DISK_DEVICE_LUN:
5221 5222 5223 5224 5225

        switch ((virDomainDiskBus) disk->bus) {
        case VIR_DOMAIN_DISK_BUS_VIRTIO:
        case VIR_DOMAIN_DISK_BUS_USB:
        case VIR_DOMAIN_DISK_BUS_SCSI:
5226
            break;
5227 5228 5229 5230 5231 5232 5233

        case VIR_DOMAIN_DISK_BUS_IDE:
        case VIR_DOMAIN_DISK_BUS_FDC:
        case VIR_DOMAIN_DISK_BUS_XEN:
        case VIR_DOMAIN_DISK_BUS_UML:
        case VIR_DOMAIN_DISK_BUS_SATA:
        case VIR_DOMAIN_DISK_BUS_SD:
5234 5235
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                           _("This type of disk cannot be hot unplugged"));
5236
            return -1;
5237 5238 5239 5240

        case VIR_DOMAIN_DISK_BUS_LAST:
        default:
            virReportEnumRangeError(virDomainDiskBus, disk->bus);
5241
            return -1;
5242
        }
5243
        break;
5244 5245 5246

    case VIR_DOMAIN_DISK_DEVICE_CDROM:
    case VIR_DOMAIN_DISK_DEVICE_FLOPPY:
5247 5248 5249
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("disk device type '%s' cannot be detached"),
                       virDomainDiskDeviceTypeToString(disk->device));
5250
        return -1;
5251 5252 5253 5254

    case VIR_DOMAIN_DISK_DEVICE_LAST:
    default:
        virReportEnumRangeError(virDomainDiskDevice, disk->device);
5255
        return -1;
5256 5257
    }

5258 5259 5260
    if (qemuDomainDiskBlockJobIsActive(disk))
        return -1;

5261
    return 0;
5262 5263 5264
}


5265 5266 5267
static bool qemuDomainDiskControllerIsBusy(virDomainObjPtr vm,
                                           virDomainControllerDefPtr detach)
{
5268
    size_t i;
5269
    virDomainDiskDefPtr disk;
5270
    virDomainHostdevDefPtr hostdev;
5271 5272 5273 5274 5275 5276 5277 5278 5279 5280 5281 5282 5283 5284 5285 5286 5287 5288 5289 5290 5291 5292

    for (i = 0; i < vm->def->ndisks; i++) {
        disk = vm->def->disks[i];
        if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DRIVE)
            /* the disk does not use disk controller */
            continue;

        /* check whether the disk uses this type controller */
        if (disk->bus == VIR_DOMAIN_DISK_BUS_IDE &&
            detach->type != VIR_DOMAIN_CONTROLLER_TYPE_IDE)
            continue;
        if (disk->bus == VIR_DOMAIN_DISK_BUS_FDC &&
            detach->type != VIR_DOMAIN_CONTROLLER_TYPE_FDC)
            continue;
        if (disk->bus == VIR_DOMAIN_DISK_BUS_SCSI &&
            detach->type != VIR_DOMAIN_CONTROLLER_TYPE_SCSI)
            continue;

        if (disk->info.addr.drive.controller == detach->idx)
            return true;
    }

5293 5294 5295 5296 5297 5298 5299 5300 5301
    for (i = 0; i < vm->def->nhostdevs; i++) {
        hostdev = vm->def->hostdevs[i];
        if (!virHostdevIsSCSIDevice(hostdev) ||
            detach->type != VIR_DOMAIN_CONTROLLER_TYPE_SCSI)
            continue;
        if (hostdev->info->addr.drive.controller == detach->idx)
            return true;
    }

5302 5303 5304 5305 5306 5307 5308 5309 5310 5311 5312 5313 5314 5315 5316 5317 5318 5319 5320 5321 5322 5323 5324
    return false;
}

static bool qemuDomainControllerIsBusy(virDomainObjPtr vm,
                                       virDomainControllerDefPtr detach)
{
    switch (detach->type) {
    case VIR_DOMAIN_CONTROLLER_TYPE_IDE:
    case VIR_DOMAIN_CONTROLLER_TYPE_FDC:
    case VIR_DOMAIN_CONTROLLER_TYPE_SCSI:
        return qemuDomainDiskControllerIsBusy(vm, detach);

    case VIR_DOMAIN_CONTROLLER_TYPE_SATA:
    case VIR_DOMAIN_CONTROLLER_TYPE_VIRTIO_SERIAL:
    case VIR_DOMAIN_CONTROLLER_TYPE_CCID:
    default:
        /* libvirt does not support sata controller, and does not support to
         * detach virtio and smart card controller.
         */
        return true;
    }
}

5325
static int
5326
qemuDomainDetachPrepController(virDomainObjPtr vm,
5327
                               virDomainControllerDefPtr match,
5328
                               virDomainControllerDefPtr *detach)
5329
{
5330
    int idx;
5331
    virDomainControllerDefPtr controller = NULL;
5332

5333
    if (match->type != VIR_DOMAIN_CONTROLLER_TYPE_SCSI) {
5334 5335
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("'%s' controller cannot be hot unplugged."),
5336
                       virDomainControllerTypeToString(match->type));
5337 5338 5339
        return -1;
    }

5340
    if ((idx = virDomainControllerFind(vm->def, match->type, match->idx)) < 0) {
5341
        virReportError(VIR_ERR_DEVICE_MISSING,
5342
                       _("controller %s:%d not found"),
5343 5344
                       virDomainControllerTypeToString(match->type),
                       match->idx);
5345
        return -1;
5346 5347
    }

5348
    *detach = controller = vm->def->controllers[idx];
5349

5350
    if (qemuDomainControllerIsBusy(vm, controller)) {
5351 5352
        virReportError(VIR_ERR_OPERATION_FAILED, "%s",
                       _("device cannot be detached: device is busy"));
5353
        return -1;
5354
    }
5355

5356
    return 0;
5357 5358 5359
}


5360
/* search for a hostdev matching dev and detach it */
5361
static int
5362
qemuDomainDetachPrepHostdev(virDomainObjPtr vm,
5363
                            virDomainHostdevDefPtr match,
5364
                            virDomainHostdevDefPtr *detach)
5365
{
5366
    virDomainHostdevSubsysPtr subsys = &match->source.subsys;
5367
    virDomainHostdevSubsysUSBPtr usbsrc = &subsys->u.usb;
5368
    virDomainHostdevSubsysPCIPtr pcisrc = &subsys->u.pci;
5369
    virDomainHostdevSubsysSCSIPtr scsisrc = &subsys->u.scsi;
5370
    virDomainHostdevSubsysMediatedDevPtr mdevsrc = &subsys->u.mdev;
5371
    virDomainHostdevDefPtr hostdev = NULL;
5372 5373
    int idx;

5374
    if (match->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS) {
5375
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
5376
                       _("hot unplug is not supported for hostdev mode '%s'"),
5377
                       virDomainHostdevModeTypeToString(match->mode));
5378 5379 5380
        return -1;
    }

5381 5382
    idx = virDomainHostdevFind(vm->def, match, &hostdev);
    *detach = hostdev;
5383 5384

    if (idx < 0) {
5385
        switch (subsys->type) {
5386
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI:
5387
            virReportError(VIR_ERR_DEVICE_MISSING,
5388 5389
                           _("host pci device " VIR_PCI_DEVICE_ADDRESS_FMT
                             " not found"),
5390 5391
                           pcisrc->addr.domain, pcisrc->addr.bus,
                           pcisrc->addr.slot, pcisrc->addr.function);
5392 5393
            break;
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_USB:
5394
            if (usbsrc->bus && usbsrc->device) {
5395
                virReportError(VIR_ERR_DEVICE_MISSING,
5396
                               _("host usb device %03d.%03d not found"),
5397
                               usbsrc->bus, usbsrc->device);
5398
            } else {
5399
                virReportError(VIR_ERR_DEVICE_MISSING,
5400
                               _("host usb device vendor=0x%.4x product=0x%.4x not found"),
5401
                               usbsrc->vendor, usbsrc->product);
5402 5403
            }
            break;
5404
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI: {
5405 5406 5407
            if (scsisrc->protocol ==
                VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI) {
                virDomainHostdevSubsysSCSIiSCSIPtr iscsisrc = &scsisrc->u.iscsi;
5408
                virReportError(VIR_ERR_DEVICE_MISSING,
5409
                               _("host scsi iSCSI path %s not found"),
5410
                               iscsisrc->src->path);
5411 5412 5413
            } else {
                 virDomainHostdevSubsysSCSIHostPtr scsihostsrc =
                     &scsisrc->u.host;
5414
                 virReportError(VIR_ERR_DEVICE_MISSING,
5415
                                _("host scsi device %s:%u:%u.%llu not found"),
5416 5417 5418
                                scsihostsrc->adapter, scsihostsrc->bus,
                                scsihostsrc->target, scsihostsrc->unit);
            }
5419
            break;
5420
        }
5421 5422 5423 5424 5425
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_MDEV:
            virReportError(VIR_ERR_DEVICE_MISSING,
                           _("mediated device '%s' not found"),
                           mdevsrc->uuidstr);
            break;
5426 5427
        case VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI_HOST:
            break;
5428
        default:
5429 5430
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("unexpected hostdev type %d"), subsys->type);
5431 5432 5433 5434 5435
            break;
        }
        return -1;
    }

5436
    return 0;
5437 5438
}

5439

5440
static int
5441
qemuDomainDetachPrepShmem(virDomainObjPtr vm,
5442
                          virDomainShmemDefPtr match,
5443
                          virDomainShmemDefPtr *detach)
5444 5445 5446 5447
{
    ssize_t idx = -1;
    virDomainShmemDefPtr shmem = NULL;

5448
    if ((idx = virDomainShmemDefFind(vm->def, match)) < 0) {
5449
        virReportError(VIR_ERR_DEVICE_MISSING,
5450 5451
                       _("model '%s' shmem device not present "
                         "in domain configuration"),
5452
                       virDomainShmemModelTypeToString(match->model));
5453 5454 5455
        return -1;
    }

5456
    *detach = shmem = vm->def->shmems[idx];
5457 5458 5459 5460 5461 5462 5463 5464 5465 5466

    switch ((virDomainShmemModel)shmem->model) {
    case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_PLAIN:
    case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_DOORBELL:
        break;

    case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM:
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("live detach of shmem model '%s' is not supported"),
                       virDomainShmemModelTypeToString(shmem->model));
5467
        G_GNUC_FALLTHROUGH;
5468 5469 5470 5471
    case VIR_DOMAIN_SHMEM_MODEL_LAST:
        return -1;
    }

5472
    return 0;
5473 5474 5475
}


5476
static int
5477
qemuDomainDetachPrepWatchdog(virDomainObjPtr vm,
5478
                             virDomainWatchdogDefPtr match,
5479
                             virDomainWatchdogDefPtr *detach)
M
Michal Privoznik 已提交
5480
{
5481 5482 5483
    virDomainWatchdogDefPtr watchdog;

    *detach = watchdog = vm->def->watchdog;
M
Michal Privoznik 已提交
5484

5485 5486 5487 5488 5489 5490
    if (!watchdog) {
        virReportError(VIR_ERR_DEVICE_MISSING, "%s",
                       _("watchdog device not present in domain configuration"));
        return -1;
    }

M
Michal Privoznik 已提交
5491 5492 5493
    /* While domains can have up to one watchdog, the one supplied by the user
     * doesn't necessarily match the one domain has. Refuse to detach in such
     * case. */
5494 5495 5496
    if (!(watchdog->model == match->model &&
          watchdog->action == match->action &&
          virDomainDeviceInfoAddressIsEqual(&match->info, &watchdog->info))) {
5497
        virReportError(VIR_ERR_DEVICE_MISSING,
5498 5499 5500
                       _("model '%s' watchdog device not present "
                         "in domain configuration"),
                       virDomainWatchdogModelTypeToString(watchdog->model));
M
Michal Privoznik 已提交
5501 5502 5503 5504 5505 5506 5507 5508 5509 5510
        return -1;
    }

    if (watchdog->model != VIR_DOMAIN_WATCHDOG_MODEL_I6300ESB) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("hot unplug of watchdog of model %s is not supported"),
                       virDomainWatchdogModelTypeToString(watchdog->model));
        return -1;
    }

5511
    return 0;
M
Michal Privoznik 已提交
5512 5513 5514
}


5515
static int
5516
qemuDomainDetachPrepRedirdev(virDomainObjPtr vm,
5517
                             virDomainRedirdevDefPtr match,
5518
                             virDomainRedirdevDefPtr *detach)
5519
{
5520
    virDomainRedirdevDefPtr redirdev;
5521 5522
    ssize_t idx;

5523
    if ((idx = virDomainRedirdevDefFind(vm->def, match)) < 0) {
5524 5525 5526 5527 5528
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("no matching redirdev was not found"));
        return -1;
    }

5529
    *detach = redirdev = vm->def->redirdevs[idx];
5530

5531
    return 0;
5532 5533 5534
}


5535
static int
5536
qemuDomainDetachPrepNet(virDomainObjPtr vm,
5537
                        virDomainNetDefPtr match,
5538
                        virDomainNetDefPtr *detach)
5539
{
5540
    int detachidx;
5541
    virDomainNetDefPtr net = NULL;
5542

5543
    if ((detachidx = virDomainNetFindIdx(vm->def, match)) < 0)
5544
        return -1;
5545

5546
    *detach = net = vm->def->nets[detachidx];
5547

5548 5549
    return 0;
}
5550

5551

5552
static int
5553
qemuDomainDetachDeviceChr(virQEMUDriverPtr driver,
5554 5555 5556
                          virDomainObjPtr vm,
                          virDomainChrDefPtr chr,
                          bool async)
5557 5558 5559 5560 5561
{
    int ret = -1;
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainDefPtr vmdef = vm->def;
    virDomainChrDefPtr tmpChr;
5562
    bool guestfwd = false;
5563 5564

    if (!(tmpChr = virDomainChrFind(vmdef, chr))) {
5565
        virReportError(VIR_ERR_DEVICE_MISSING,
5566 5567 5568
                       _("chr type '%s' device not present "
                         "in domain configuration"),
                       virDomainChrDeviceTypeToString(chr->deviceType));
5569
        goto cleanup;
5570 5571
    }

5572 5573 5574 5575 5576 5577
    /* guestfwd channels are not really -device rather than
     * -netdev. We need to treat them slightly differently. */
    guestfwd = tmpChr->deviceType == VIR_DOMAIN_CHR_DEVICE_TYPE_CHANNEL &&
               tmpChr->targetType == VIR_DOMAIN_CHR_CHANNEL_TARGET_TYPE_GUESTFWD;

    if (!async && !guestfwd)
5578
        qemuDomainMarkDeviceForRemoval(vm, &tmpChr->info);
5579

5580
    if (guestfwd) {
5581 5582 5583 5584 5585 5586 5587
        int rc;
        qemuDomainObjEnterMonitor(driver, vm);
        rc = qemuMonitorRemoveNetdev(priv->mon, tmpChr->info.alias);
        if (qemuDomainObjExitMonitor(driver, vm) < 0)
            rc = -1;

        if (rc < 0)
5588 5589
            goto cleanup;
    } else {
5590
        if (qemuDomainDeleteDevice(vm, tmpChr->info.alias) < 0)
5591
            goto cleanup;
5592
    }
5593

5594 5595 5596
    if (guestfwd) {
        ret = qemuDomainRemoveChrDevice(driver, vm, tmpChr, false);
    } else if (async) {
5597 5598 5599
        ret = 0;
    } else {
        if ((ret = qemuDomainWaitForDeviceRemoval(vm)) == 1)
5600
            ret = qemuDomainRemoveChrDevice(driver, vm, tmpChr, true);
5601
    }
5602

5603
 cleanup:
5604 5605
    if (!async)
        qemuDomainResetDeviceRemoval(vm);
5606 5607
    return ret;
}
5608 5609


5610
static int
5611
qemuDomainDetachPrepRNG(virDomainObjPtr vm,
5612
                        virDomainRNGDefPtr match,
5613
                        virDomainRNGDefPtr *detach)
5614 5615
{
    ssize_t idx;
5616
    virDomainRNGDefPtr rng;
5617

5618
    if ((idx = virDomainRNGFind(vm->def, match)) < 0) {
5619
        virReportError(VIR_ERR_DEVICE_MISSING,
5620 5621
                       _("model '%s' RNG device not present "
                         "in domain configuration"),
5622
                       virDomainRNGBackendTypeToString(match->model));
5623 5624 5625
        return -1;
    }

5626
    *detach = rng = vm->def->rngs[idx];
5627

5628
    return 0;
5629
}
5630 5631


5632
static int
5633
qemuDomainDetachPrepMemory(virDomainObjPtr vm,
5634
                           virDomainMemoryDefPtr match,
5635
                           virDomainMemoryDefPtr *detach)
5636 5637 5638 5639
{
    virDomainMemoryDefPtr mem;
    int idx;

5640
    qemuDomainMemoryDeviceAlignSize(vm->def, match);
5641

5642
    if ((idx = virDomainMemoryFindByDef(vm->def, match)) < 0) {
5643
        virReportError(VIR_ERR_DEVICE_MISSING,
5644 5645
                       _("model '%s' memory device not present "
                         "in the domain configuration"),
5646
                       virDomainMemoryModelTypeToString(match->model));
5647 5648 5649
        return -1;
    }

5650
    *detach = mem = vm->def->mems[idx];
5651

5652
    return 0;
5653
}
5654 5655


5656
static int
5657 5658
qemuDomainDetachPrepInput(virDomainObjPtr vm,
                          virDomainInputDefPtr match,
5659
                          virDomainInputDefPtr *detach)
5660 5661 5662 5663
{
    virDomainInputDefPtr input;
    int idx;

5664
    if ((idx = virDomainInputDefFind(vm->def, match)) < 0) {
5665 5666 5667 5668
        virReportError(VIR_ERR_OPERATION_FAILED, "%s",
                       _("matching input device not found"));
        return -1;
    }
5669
    *detach = input = vm->def->inputs[idx];
5670 5671 5672 5673 5674 5675 5676 5677 5678 5679 5680 5681 5682 5683 5684 5685

    switch ((virDomainInputBus) input->bus) {
    case VIR_DOMAIN_INPUT_BUS_PS2:
    case VIR_DOMAIN_INPUT_BUS_XEN:
    case VIR_DOMAIN_INPUT_BUS_PARALLELS:
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("input device on bus '%s' cannot be detached"),
                       virDomainInputBusTypeToString(input->bus));
        return -1;

    case VIR_DOMAIN_INPUT_BUS_LAST:
    case VIR_DOMAIN_INPUT_BUS_USB:
    case VIR_DOMAIN_INPUT_BUS_VIRTIO:
        break;
    }

5686
    return 0;
5687 5688 5689
}


5690
static int
5691 5692
qemuDomainDetachPrepVsock(virDomainObjPtr vm,
                          virDomainVsockDefPtr match,
5693
                          virDomainVsockDefPtr *detach)
5694
{
5695
    virDomainVsockDefPtr vsock;
5696

5697
    *detach = vsock = vm->def->vsock;
5698
    if (!vsock ||
5699
        !virDomainVsockDefEquals(match, vsock)) {
5700 5701 5702 5703 5704
        virReportError(VIR_ERR_OPERATION_FAILED, "%s",
                       _("matching vsock device not found"));
        return -1;
    }

5705
    return 0;
5706 5707 5708
}


5709
static int
5710 5711 5712
qemuDomainDetachDeviceLease(virQEMUDriverPtr driver,
                            virDomainObjPtr vm,
                            virDomainLeaseDefPtr lease)
5713 5714 5715 5716 5717 5718 5719 5720 5721 5722 5723 5724 5725 5726 5727 5728 5729 5730 5731 5732
{
    virDomainLeaseDefPtr det_lease;
    int idx;

    if ((idx = virDomainLeaseIndex(vm->def, lease)) < 0) {
        virReportError(VIR_ERR_INVALID_ARG,
                       _("Lease %s in lockspace %s does not exist"),
                       lease->key, NULLSTR(lease->lockspace));
        return -1;
    }

    if (virDomainLockLeaseDetach(driver->lockManager, vm, lease) < 0)
        return -1;

    det_lease = virDomainLeaseRemoveAt(vm->def, idx);
    virDomainLeaseDefFree(det_lease);
    return 0;
}


5733 5734
int
qemuDomainDetachDeviceLive(virDomainObjPtr vm,
5735
                           virDomainDeviceDefPtr match,
5736 5737 5738
                           virQEMUDriverPtr driver,
                           bool async)
{
5739
    virDomainDeviceDef detach = { .type = match->type };
5740
    virDomainDeviceInfoPtr info = NULL;
5741 5742
    int ret = -1;

5743
    switch ((virDomainDeviceType)match->type) {
5744 5745 5746 5747 5748 5749
        /*
         * lease and chr devices don't follow the standard pattern of
         * the others, so they must have their own self-contained
         * Detach functions.
         */
    case VIR_DOMAIN_DEVICE_LEASE:
5750
        return qemuDomainDetachDeviceLease(driver, vm, match->data.lease);
5751 5752

    case VIR_DOMAIN_DEVICE_CHR:
5753
        return qemuDomainDetachDeviceChr(driver, vm, match->data.chr, async);
5754 5755 5756 5757 5758 5759 5760 5761

        /*
         * All the other device types follow a very similar pattern -
         * First we call type-specific functions to 1) locate the
         * device we want to detach (based on the prototype device in
         * match) and 2) do any device-type-specific validation to
         * assure it is okay to detach the device.
         */
5762
    case VIR_DOMAIN_DEVICE_DISK:
5763 5764
        if (qemuDomainDetachPrepDisk(vm, match->data.disk,
                                     &detach.data.disk) < 0) {
5765 5766
            return -1;
        }
5767 5768
        break;
    case VIR_DOMAIN_DEVICE_CONTROLLER:
5769 5770
        if (qemuDomainDetachPrepController(vm, match->data.controller,
                                           &detach.data.controller) < 0) {
5771 5772
            return -1;
        }
5773 5774
        break;
    case VIR_DOMAIN_DEVICE_NET:
5775 5776
        if (qemuDomainDetachPrepNet(vm, match->data.net,
                                    &detach.data.net) < 0) {
5777 5778
            return -1;
        }
5779 5780
        break;
    case VIR_DOMAIN_DEVICE_HOSTDEV:
5781 5782
        if (qemuDomainDetachPrepHostdev(vm, match->data.hostdev,
                                        &detach.data.hostdev) < 0) {
5783 5784
            return -1;
        }
5785 5786
        break;
    case VIR_DOMAIN_DEVICE_RNG:
5787 5788
        if (qemuDomainDetachPrepRNG(vm, match->data.rng,
                                    &detach.data.rng) < 0) {
5789 5790
            return -1;
        }
5791 5792
        break;
    case VIR_DOMAIN_DEVICE_MEMORY:
5793 5794
        if (qemuDomainDetachPrepMemory(vm, match->data.memory,
                                       &detach.data.memory) < 0) {
5795 5796
            return -1;
        }
5797 5798
        break;
    case VIR_DOMAIN_DEVICE_SHMEM:
5799 5800
        if (qemuDomainDetachPrepShmem(vm, match->data.shmem,
                                      &detach.data.shmem) < 0) {
5801 5802
            return -1;
        }
5803 5804
        break;
    case VIR_DOMAIN_DEVICE_WATCHDOG:
5805 5806
        if (qemuDomainDetachPrepWatchdog(vm, match->data.watchdog,
                                         &detach.data.watchdog) < 0) {
5807 5808
            return -1;
        }
5809 5810
        break;
    case VIR_DOMAIN_DEVICE_INPUT:
5811
        if (qemuDomainDetachPrepInput(vm, match->data.input,
5812
                                      &detach.data.input) < 0) {
5813 5814
            return -1;
        }
5815 5816
        break;
    case VIR_DOMAIN_DEVICE_REDIRDEV:
5817 5818
        if (qemuDomainDetachPrepRedirdev(vm, match->data.redirdev,
                                         &detach.data.redirdev) < 0) {
5819 5820
            return -1;
        }
5821 5822
        break;
    case VIR_DOMAIN_DEVICE_VSOCK:
5823
        if (qemuDomainDetachPrepVsock(vm, match->data.vsock,
5824
                                      &detach.data.vsock) < 0) {
5825 5826
            return -1;
        }
5827 5828 5829 5830 5831 5832 5833 5834 5835 5836 5837 5838 5839 5840 5841 5842 5843
        break;

    case VIR_DOMAIN_DEVICE_FS:
    case VIR_DOMAIN_DEVICE_SOUND:
    case VIR_DOMAIN_DEVICE_VIDEO:
    case VIR_DOMAIN_DEVICE_GRAPHICS:
    case VIR_DOMAIN_DEVICE_HUB:
    case VIR_DOMAIN_DEVICE_SMARTCARD:
    case VIR_DOMAIN_DEVICE_MEMBALLOON:
    case VIR_DOMAIN_DEVICE_NVRAM:
    case VIR_DOMAIN_DEVICE_NONE:
    case VIR_DOMAIN_DEVICE_TPM:
    case VIR_DOMAIN_DEVICE_PANIC:
    case VIR_DOMAIN_DEVICE_IOMMU:
    case VIR_DOMAIN_DEVICE_LAST:
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("live detach of device '%s' is not supported"),
5844
                       virDomainDeviceTypeToString(match->type));
5845
        return -1;
5846 5847
    }

5848 5849 5850 5851 5852 5853 5854 5855 5856 5857 5858 5859 5860 5861 5862 5863 5864 5865 5866 5867 5868 5869 5870 5871 5872 5873 5874
    /* "detach" now points to the actual device we want to detach */

    if (!(info = virDomainDeviceGetInfo(&detach))) {
        /*
         * This should never happen, since all of the device types in
         * the switch cases that end with a "break" instead of a
         * return have a virDeviceInfo in them.
         */
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("device of type '%s' has no device info"),
                       virDomainDeviceTypeToString(detach.type));
        return -1;
    }


    /* Make generic validation checks common to all device types */

    if (!info->alias) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("Cannot detach %s device with no alias"),
                       virDomainDeviceTypeToString(detach.type));
        return -1;
    }

    if (qemuIsMultiFunctionDevice(vm->def, info)) {
        virReportError(VIR_ERR_OPERATION_FAILED,
                       _("cannot hot unplug %s device with multifunction PCI guest address: "
5875
                         VIR_PCI_DEVICE_ADDRESS_FMT),
5876 5877 5878 5879 5880 5881 5882 5883 5884 5885 5886 5887 5888 5889 5890 5891 5892 5893 5894 5895 5896 5897 5898 5899 5900 5901 5902 5903 5904 5905
                       virDomainDeviceTypeToString(detach.type),
                       info->addr.pci.domain, info->addr.pci.bus,
                       info->addr.pci.slot, info->addr.pci.function);
        return -1;
    }

    /*
     * Issue the qemu monitor command to delete the device (based on
     * its alias), and optionally wait a short time in case the
     * DEVICE_DELETED event arrives from qemu right away.
     */
    if (!async)
        qemuDomainMarkDeviceForRemoval(vm, info);

    if (qemuDomainDeleteDevice(vm, info->alias) < 0) {
        if (virDomainObjIsActive(vm))
            qemuDomainRemoveAuditDevice(vm, &detach, false);
        goto cleanup;
    }

    if (async) {
        ret = 0;
    } else {
        if ((ret = qemuDomainWaitForDeviceRemoval(vm)) == 1)
            ret = qemuDomainRemoveDevice(driver, vm, &detach);
    }

 cleanup:
    if (!async)
        qemuDomainResetDeviceRemoval(vm);
5906

5907 5908 5909 5910
    return ret;
}


5911 5912 5913 5914 5915 5916 5917 5918 5919 5920
static int
qemuDomainRemoveVcpu(virQEMUDriverPtr driver,
                     virDomainObjPtr vm,
                     unsigned int vcpu)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    virDomainVcpuDefPtr vcpuinfo = virDomainDefGetVcpu(vm->def, vcpu);
    qemuDomainVcpuPrivatePtr vcpupriv = QEMU_DOMAIN_VCPU_PRIVATE(vcpuinfo);
    int oldvcpus = virDomainDefGetVcpus(vm->def);
    unsigned int nvcpus = vcpupriv->vcpus;
5921
    virErrorPtr save_error = NULL;
5922 5923 5924 5925 5926 5927 5928 5929 5930 5931 5932 5933 5934 5935 5936 5937 5938 5939 5940 5941 5942 5943 5944 5945
    size_t i;

    if (qemuDomainRefreshVcpuInfo(driver, vm, QEMU_ASYNC_JOB_NONE, false) < 0)
        return -1;

    /* validation requires us to set the expected state prior to calling it */
    for (i = vcpu; i < vcpu + nvcpus; i++) {
        vcpuinfo = virDomainDefGetVcpu(vm->def, i);
        vcpuinfo->online = false;
    }

    if (qemuDomainValidateVcpuInfo(vm) < 0) {
        /* rollback vcpu count if the setting has failed */
        virDomainAuditVcpu(vm, oldvcpus, oldvcpus - nvcpus, "update", false);

        for (i = vcpu; i < vcpu + nvcpus; i++) {
            vcpuinfo = virDomainDefGetVcpu(vm->def, i);
            vcpuinfo->online = true;
        }
        return -1;
    }

    virDomainAuditVcpu(vm, oldvcpus, oldvcpus - nvcpus, "update", true);

5946 5947 5948 5949 5950 5951
    virErrorPreserveLast(&save_error);

    for (i = vcpu; i < vcpu + nvcpus; i++)
        ignore_value(virCgroupDelThread(priv->cgroup, VIR_CGROUP_THREAD_VCPU, i));

    virErrorRestore(&save_error);
5952 5953 5954 5955 5956 5957 5958 5959 5960 5961 5962 5963 5964 5965 5966 5967 5968 5969 5970 5971 5972 5973 5974 5975 5976 5977

    return 0;
}


void
qemuDomainRemoveVcpuAlias(virQEMUDriverPtr driver,
                          virDomainObjPtr vm,
                          const char *alias)
{
    virDomainVcpuDefPtr vcpu;
    qemuDomainVcpuPrivatePtr vcpupriv;
    size_t i;

    for (i = 0; i < virDomainDefGetVcpusMax(vm->def); i++) {
        vcpu = virDomainDefGetVcpu(vm->def, i);
        vcpupriv = QEMU_DOMAIN_VCPU_PRIVATE(vcpu);

        if (STREQ_NULLABLE(alias, vcpupriv->alias)) {
            qemuDomainRemoveVcpu(driver, vm, i);
            return;
        }
    }
}


5978
static int
5979
qemuDomainHotplugDelVcpu(virQEMUDriverPtr driver,
5980
                         virQEMUDriverConfigPtr cfg,
5981 5982 5983 5984 5985 5986 5987 5988
                         virDomainObjPtr vm,
                         unsigned int vcpu)
{
    virDomainVcpuDefPtr vcpuinfo = virDomainDefGetVcpu(vm->def, vcpu);
    qemuDomainVcpuPrivatePtr vcpupriv = QEMU_DOMAIN_VCPU_PRIVATE(vcpuinfo);
    int oldvcpus = virDomainDefGetVcpus(vm->def);
    unsigned int nvcpus = vcpupriv->vcpus;
    int rc;
5989
    int ret = -1;
5990 5991 5992 5993 5994 5995 5996 5997 5998

    if (!vcpupriv->alias) {
        virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
                       _("vcpu '%u' can't be unplugged"), vcpu);
        return -1;
    }

    qemuDomainMarkDeviceAliasForRemoval(vm, vcpupriv->alias);

5999 6000 6001
    if (qemuDomainDeleteDevice(vm, vcpupriv->alias) < 0) {
        if (virDomainObjIsActive(vm))
            virDomainAuditVcpu(vm, oldvcpus, oldvcpus - nvcpus, "update", false);
6002
        goto cleanup;
6003 6004 6005 6006
    }

    if ((rc = qemuDomainWaitForDeviceRemoval(vm)) <= 0) {
        if (rc == 0)
6007 6008 6009
            virReportError(VIR_ERR_OPERATION_TIMEOUT, "%s",
                           _("vcpu unplug request timed out. Unplug result "
                             "must be manually inspected in the domain"));
6010

6011
        goto cleanup;
6012 6013
    }

6014 6015 6016
    if (qemuDomainRemoveVcpu(driver, vm, vcpu) < 0)
        goto cleanup;

6017 6018
    qemuDomainVcpuPersistOrder(vm->def);

6019
    if (virDomainObjSave(vm, driver->xmlopt, cfg->stateDir) < 0)
6020 6021
        goto cleanup;

6022 6023 6024 6025 6026
    ret = 0;

 cleanup:
    qemuDomainResetDeviceRemoval(vm);
    return ret;
6027
}
6028 6029 6030 6031


static int
qemuDomainHotplugAddVcpu(virQEMUDriverPtr driver,
6032
                         virQEMUDriverConfigPtr cfg,
6033 6034 6035 6036 6037 6038 6039 6040 6041 6042 6043 6044 6045 6046
                         virDomainObjPtr vm,
                         unsigned int vcpu)
{
    virJSONValuePtr vcpuprops = NULL;
    virDomainVcpuDefPtr vcpuinfo = virDomainDefGetVcpu(vm->def, vcpu);
    qemuDomainVcpuPrivatePtr vcpupriv = QEMU_DOMAIN_VCPU_PRIVATE(vcpuinfo);
    unsigned int nvcpus = vcpupriv->vcpus;
    bool newhotplug = qemuDomainSupportsNewVcpuHotplug(vm);
    int ret = -1;
    int rc;
    int oldvcpus = virDomainDefGetVcpus(vm->def);
    size_t i;

    if (newhotplug) {
6047
        vcpupriv->alias = g_strdup_printf("vcpu%u", vcpu);
6048 6049 6050 6051 6052 6053 6054 6055 6056 6057 6058 6059 6060 6061 6062 6063 6064 6065 6066 6067 6068 6069 6070 6071 6072 6073 6074 6075 6076 6077 6078 6079 6080 6081 6082 6083 6084 6085 6086 6087 6088 6089 6090 6091

        if (!(vcpuprops = qemuBuildHotpluggableCPUProps(vcpuinfo)))
            goto cleanup;
    }

    qemuDomainObjEnterMonitor(driver, vm);

    if (newhotplug) {
        rc = qemuMonitorAddDeviceArgs(qemuDomainGetMonitor(vm), vcpuprops);
        vcpuprops = NULL;
    } else {
        rc = qemuMonitorSetCPU(qemuDomainGetMonitor(vm), vcpu, true);
    }

    if (qemuDomainObjExitMonitor(driver, vm) < 0)
        goto cleanup;

    virDomainAuditVcpu(vm, oldvcpus, oldvcpus + nvcpus, "update", rc == 0);

    if (rc < 0)
        goto cleanup;

    /* start outputting of the new XML element to allow keeping unpluggability */
    if (newhotplug)
        vm->def->individualvcpus = true;

    if (qemuDomainRefreshVcpuInfo(driver, vm, QEMU_ASYNC_JOB_NONE, false) < 0)
        goto cleanup;

    /* validation requires us to set the expected state prior to calling it */
    for (i = vcpu; i < vcpu + nvcpus; i++) {
        vcpuinfo = virDomainDefGetVcpu(vm->def, i);
        vcpupriv = QEMU_DOMAIN_VCPU_PRIVATE(vcpuinfo);

        vcpuinfo->online = true;

        if (vcpupriv->tid > 0 &&
            qemuProcessSetupVcpu(vm, i) < 0)
            goto cleanup;
    }

    if (qemuDomainValidateVcpuInfo(vm) < 0)
        goto cleanup;

6092 6093
    qemuDomainVcpuPersistOrder(vm->def);

6094
    if (virDomainObjSave(vm, driver->xmlopt, cfg->stateDir) < 0)
6095 6096
        goto cleanup;

6097 6098 6099 6100 6101 6102 6103 6104 6105 6106 6107 6108 6109 6110 6111 6112 6113 6114 6115 6116 6117 6118 6119 6120 6121 6122 6123 6124 6125 6126 6127 6128 6129 6130 6131 6132 6133 6134 6135 6136 6137 6138 6139 6140 6141 6142 6143 6144 6145 6146 6147 6148 6149 6150 6151 6152 6153 6154 6155 6156 6157 6158 6159 6160 6161 6162 6163 6164 6165 6166 6167 6168 6169 6170 6171 6172 6173 6174 6175 6176 6177 6178 6179 6180 6181 6182 6183 6184 6185 6186 6187 6188 6189 6190 6191 6192 6193 6194 6195 6196 6197 6198 6199 6200 6201 6202 6203 6204 6205 6206 6207 6208 6209 6210 6211 6212 6213 6214 6215 6216 6217
    ret = 0;

 cleanup:
    virJSONValueFree(vcpuprops);
    return ret;
}


/**
 * qemuDomainSelectHotplugVcpuEntities:
 *
 * @def: domain definition
 * @nvcpus: target vcpu count
 * @enable: set to true if vcpus should be enabled
 *
 * Tries to find which vcpu entities need to be enabled or disabled to reach
 * @nvcpus. This function works in order of the legacy hotplug but is able to
 * skip over entries that are added out of order.
 *
 * Returns the bitmap of vcpus to modify on success, NULL on error.
 */
static virBitmapPtr
qemuDomainSelectHotplugVcpuEntities(virDomainDefPtr def,
                                    unsigned int nvcpus,
                                    bool *enable)
{
    virBitmapPtr ret = NULL;
    virDomainVcpuDefPtr vcpu;
    qemuDomainVcpuPrivatePtr vcpupriv;
    unsigned int maxvcpus = virDomainDefGetVcpusMax(def);
    unsigned int curvcpus = virDomainDefGetVcpus(def);
    ssize_t i;

    if (!(ret = virBitmapNew(maxvcpus)))
        return NULL;

    if (nvcpus > curvcpus) {
        *enable = true;

        for (i = 0; i < maxvcpus && curvcpus < nvcpus; i++) {
            vcpu = virDomainDefGetVcpu(def, i);
            vcpupriv =  QEMU_DOMAIN_VCPU_PRIVATE(vcpu);

            if (vcpu->online)
                continue;

            if (vcpupriv->vcpus == 0)
                continue;

            curvcpus += vcpupriv->vcpus;

            if (curvcpus > nvcpus) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("target vm vcpu granularity does not allow the "
                                 "desired vcpu count"));
                goto error;
            }

            ignore_value(virBitmapSetBit(ret, i));
        }
    } else {
        *enable = false;

        for (i = maxvcpus - 1; i >= 0 && curvcpus > nvcpus; i--) {
            vcpu = virDomainDefGetVcpu(def, i);
            vcpupriv =  QEMU_DOMAIN_VCPU_PRIVATE(vcpu);

            if (!vcpu->online)
                continue;

            if (vcpupriv->vcpus == 0)
                continue;

            if (!vcpupriv->alias)
                continue;

            curvcpus -= vcpupriv->vcpus;

            if (curvcpus < nvcpus) {
                virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                               _("target vm vcpu granularity does not allow the "
                                 "desired vcpu count"));
                goto error;
            }

            ignore_value(virBitmapSetBit(ret, i));
        }
    }

    if (curvcpus != nvcpus) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("failed to find appropriate hotpluggable vcpus to "
                         "reach the desired target vcpu count"));
        goto error;
    }

    return ret;

 error:
    virBitmapFree(ret);
    return NULL;
}


static int
qemuDomainSetVcpusLive(virQEMUDriverPtr driver,
                       virQEMUDriverConfigPtr cfg,
                       virDomainObjPtr vm,
                       virBitmapPtr vcpumap,
                       bool enable)
{
    qemuDomainObjPrivatePtr priv = vm->privateData;
    qemuCgroupEmulatorAllNodesDataPtr emulatorCgroup = NULL;
    ssize_t nextvcpu = -1;
    int ret = -1;

    if (qemuCgroupEmulatorAllNodesAllow(priv->cgroup, &emulatorCgroup) < 0)
        goto cleanup;

    if (enable) {
        while ((nextvcpu = virBitmapNextSetBit(vcpumap, nextvcpu)) != -1) {
6218 6219
            if (qemuDomainHotplugAddVcpu(driver, cfg, vm, nextvcpu) < 0)
                goto cleanup;
6220 6221 6222 6223 6224 6225
        }
    } else {
        for (nextvcpu = virDomainDefGetVcpusMax(vm->def) - 1; nextvcpu >= 0; nextvcpu--) {
            if (!virBitmapIsBitSet(vcpumap, nextvcpu))
                continue;

6226 6227
            if (qemuDomainHotplugDelVcpu(driver, cfg, vm, nextvcpu) < 0)
                goto cleanup;
6228 6229 6230 6231 6232 6233 6234 6235 6236 6237 6238 6239 6240 6241 6242 6243 6244 6245 6246 6247 6248 6249 6250 6251 6252 6253 6254 6255 6256 6257 6258 6259 6260 6261 6262 6263 6264 6265 6266 6267 6268 6269 6270 6271 6272
        }
    }

    ret = 0;

 cleanup:
    qemuCgroupEmulatorAllNodesRestore(emulatorCgroup);

    return ret;
}


/**
 * qemuDomainSetVcpusConfig:
 * @def: config/offline definition of a domain
 * @nvcpus: target vcpu count
 *
 * Properly handle cold(un)plug of vcpus:
 * - plug in inactive vcpus/uplug active rather than rewriting state
 * - fix hotpluggable state
 */
static void
qemuDomainSetVcpusConfig(virDomainDefPtr def,
                         unsigned int nvcpus,
                         bool hotpluggable)
{
    virDomainVcpuDefPtr vcpu;
    size_t curvcpus = virDomainDefGetVcpus(def);
    size_t maxvcpus = virDomainDefGetVcpusMax(def);
    size_t i;

    /* ordering information may become invalid, thus clear it */
    virDomainDefVcpuOrderClear(def);

    if (curvcpus == nvcpus)
        return;

    if (curvcpus < nvcpus) {
        for (i = 0; i < maxvcpus; i++) {
            vcpu = virDomainDefGetVcpu(def, i);

            if (!vcpu)
                continue;

            if (vcpu->online) {
6273
                /* non-hotpluggable vcpus need to be clustered at the beginning,
6274 6275 6276 6277 6278 6279 6280 6281 6282 6283 6284 6285 6286 6287 6288 6289 6290 6291 6292 6293 6294 6295 6296 6297 6298 6299 6300 6301 6302 6303 6304 6305 6306 6307 6308 6309 6310 6311 6312 6313 6314 6315 6316 6317 6318
                 * thus we need to force vcpus to be hotpluggable when we find
                 * vcpus that are hotpluggable and online prior to the ones
                 * we are going to add */
                if (vcpu->hotpluggable == VIR_TRISTATE_BOOL_YES)
                    hotpluggable = true;

                continue;
            }

            vcpu->online = true;
            if (hotpluggable) {
                vcpu->hotpluggable = VIR_TRISTATE_BOOL_YES;
                def->individualvcpus = true;
            } else {
                vcpu->hotpluggable = VIR_TRISTATE_BOOL_NO;
            }

            if (++curvcpus == nvcpus)
                break;
        }
    } else {
        for (i = maxvcpus; i != 0; i--) {
            vcpu = virDomainDefGetVcpu(def, i - 1);

            if (!vcpu || !vcpu->online)
                continue;

            vcpu->online = false;
            vcpu->hotpluggable = VIR_TRISTATE_BOOL_YES;

            if (--curvcpus == nvcpus)
                break;
        }
    }
}


int
qemuDomainSetVcpusInternal(virQEMUDriverPtr driver,
                           virDomainObjPtr vm,
                           virDomainDefPtr def,
                           virDomainDefPtr persistentDef,
                           unsigned int nvcpus,
                           bool hotpluggable)
{
6319
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
6320 6321 6322 6323 6324 6325 6326 6327 6328 6329 6330 6331 6332 6333 6334 6335 6336 6337 6338 6339 6340 6341 6342 6343 6344 6345 6346 6347 6348 6349 6350 6351
    virBitmapPtr vcpumap = NULL;
    bool enable;
    int ret = -1;

    if (def && nvcpus > virDomainDefGetVcpusMax(def)) {
        virReportError(VIR_ERR_INVALID_ARG,
                       _("requested vcpus is greater than max allowable"
                         " vcpus for the live domain: %u > %u"),
                       nvcpus, virDomainDefGetVcpusMax(def));
        goto cleanup;
    }

    if (persistentDef && nvcpus > virDomainDefGetVcpusMax(persistentDef)) {
        virReportError(VIR_ERR_INVALID_ARG,
                       _("requested vcpus is greater than max allowable"
                         " vcpus for the persistent domain: %u > %u"),
                       nvcpus, virDomainDefGetVcpusMax(persistentDef));
        goto cleanup;
    }

    if (def) {
        if (!(vcpumap = qemuDomainSelectHotplugVcpuEntities(vm->def, nvcpus,
                                                            &enable)))
            goto cleanup;

        if (qemuDomainSetVcpusLive(driver, cfg, vm, vcpumap, enable) < 0)
            goto cleanup;
    }

    if (persistentDef) {
        qemuDomainSetVcpusConfig(persistentDef, nvcpus, hotpluggable);

6352
        if (virDomainDefSave(persistentDef, driver->xmlopt, cfg->configDir) < 0)
6353 6354 6355 6356 6357 6358 6359 6360 6361
            goto cleanup;
    }

    ret = 0;

 cleanup:
    virBitmapFree(vcpumap);
    return ret;
}
6362 6363 6364 6365 6366 6367 6368 6369 6370 6371 6372 6373


static void
qemuDomainSetVcpuConfig(virDomainDefPtr def,
                        virBitmapPtr map,
                        bool state)
{
    virDomainVcpuDefPtr vcpu;
    ssize_t next = -1;

    def->individualvcpus = true;

6374 6375 6376
    /* ordering information may become invalid, thus clear it */
    virDomainDefVcpuOrderClear(def);

6377
    while ((next = virBitmapNextSetBit(map, next)) >= 0) {
6378 6379 6380 6381 6382 6383 6384 6385 6386 6387 6388 6389 6390 6391 6392 6393 6394 6395 6396 6397 6398 6399 6400 6401 6402 6403 6404 6405 6406 6407 6408
        if (!(vcpu = virDomainDefGetVcpu(def, next)))
            continue;

        vcpu->online = state;
        vcpu->hotpluggable = VIR_TRISTATE_BOOL_YES;
    }
}


/**
 * qemuDomainFilterHotplugVcpuEntities:
 *
 * Returns a bitmap of hotpluggable vcpu entities that correspond to the logical
 * vcpus requested in @vcpus.
 */
static virBitmapPtr
qemuDomainFilterHotplugVcpuEntities(virDomainDefPtr def,
                                    virBitmapPtr vcpus,
                                    bool state)
{
    qemuDomainVcpuPrivatePtr vcpupriv;
    virDomainVcpuDefPtr vcpu;
    virBitmapPtr map = NULL;
    virBitmapPtr ret = NULL;
    ssize_t next = -1;
    size_t i;

    if (!(map = virBitmapNewCopy(vcpus)))
        return NULL;

    /* make sure that all selected vcpus are in the correct state */
6409
    while ((next = virBitmapNextSetBit(map, next)) >= 0) {
6410 6411 6412 6413 6414
        if (!(vcpu = virDomainDefGetVcpu(def, next)))
            continue;

        if (vcpu->online == state) {
            virReportError(VIR_ERR_INVALID_ARG,
6415
                           _("vcpu '%zd' is already in requested state"), next);
6416 6417 6418 6419 6420
            goto cleanup;
        }

        if (vcpu->online && !vcpu->hotpluggable) {
            virReportError(VIR_ERR_INVALID_ARG,
6421
                           _("vcpu '%zd' can't be hotunplugged"), next);
6422 6423 6424 6425 6426 6427 6428
            goto cleanup;
        }
    }

    /* Make sure that all vCPUs belonging to a single hotpluggable entity were
     * selected and then de-select any sub-threads of it. */
    next = -1;
6429
    while ((next = virBitmapNextSetBit(map, next)) >= 0) {
6430 6431 6432 6433 6434 6435 6436
        if (!(vcpu = virDomainDefGetVcpu(def, next)))
            continue;

        vcpupriv = QEMU_DOMAIN_VCPU_PRIVATE(vcpu);

        if (vcpupriv->vcpus == 0) {
            virReportError(VIR_ERR_INVALID_ARG,
6437
                           _("vcpu '%zd' belongs to a larger hotpluggable entity, "
6438 6439 6440 6441 6442 6443 6444 6445
                             "but siblings were not selected"), next);
            goto cleanup;
        }

        for (i = next + 1; i < next + vcpupriv->vcpus; i++) {
            if (!virBitmapIsBitSet(map, i)) {
                virReportError(VIR_ERR_INVALID_ARG,
                               _("vcpu '%zu' was not selected but it belongs to "
6446
                                 "hotpluggable entity '%zd-%zd' which was "
6447 6448 6449 6450 6451 6452 6453 6454 6455 6456
                                 "partially selected"),
                               i, next, next + vcpupriv->vcpus - 1);
                goto cleanup;
            }

            /* clear the subthreads */
            ignore_value(virBitmapClearBit(map, i));
        }
    }

6457
    ret = g_steal_pointer(&map);
6458 6459 6460 6461 6462 6463 6464

 cleanup:
    virBitmapFree(map);
    return ret;
}


6465
static int
6466
qemuDomainVcpuValidateConfig(virDomainDefPtr def,
6467
                             virBitmapPtr map)
6468
{
6469 6470 6471
    virDomainVcpuDefPtr vcpu;
    size_t maxvcpus = virDomainDefGetVcpusMax(def);
    ssize_t next;
6472
    ssize_t firstvcpu = -1;
6473

6474 6475
    /* vcpu 0 can't be modified */
    if (virBitmapIsBitSet(map, 0)) {
6476
        virReportError(VIR_ERR_INVALID_ARG, "%s",
6477
                       _("vCPU '0' can't be modified"));
6478 6479 6480
        return -1;
    }

6481 6482 6483 6484 6485 6486
    /* non-hotpluggable vcpus need to stay clustered starting from vcpu 0 */
    for (next = virBitmapNextSetBit(map, -1) + 1; next < maxvcpus; next++) {
        if (!(vcpu = virDomainDefGetVcpu(def, next)))
            continue;

        /* skip vcpus being modified */
6487 6488 6489 6490
        if (virBitmapIsBitSet(map, next)) {
            if (firstvcpu < 0)
                firstvcpu = next;

6491
            continue;
6492
        }
6493 6494 6495 6496

        if (vcpu->online && vcpu->hotpluggable == VIR_TRISTATE_BOOL_NO) {
            virReportError(VIR_ERR_INVALID_ARG,
                           _("vcpu '%zd' can't be modified as it is followed "
6497
                             "by non-hotpluggable online vcpus"), firstvcpu);
6498 6499 6500 6501
            return -1;
        }
    }

6502 6503 6504 6505
    return 0;
}


6506 6507 6508 6509 6510 6511 6512 6513
int
qemuDomainSetVcpuInternal(virQEMUDriverPtr driver,
                          virDomainObjPtr vm,
                          virDomainDefPtr def,
                          virDomainDefPtr persistentDef,
                          virBitmapPtr map,
                          bool state)
{
6514
    g_autoptr(virQEMUDriverConfig) cfg = virQEMUDriverGetConfig(driver);
6515 6516 6517 6518 6519 6520 6521 6522 6523 6524 6525 6526 6527 6528 6529 6530 6531 6532 6533 6534 6535 6536 6537 6538 6539
    virBitmapPtr livevcpus = NULL;
    int ret = -1;

    if (def) {
        if (!qemuDomainSupportsNewVcpuHotplug(vm)) {
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                           _("this qemu version does not support specific "
                             "vCPU hotplug"));
            goto cleanup;
        }

        if (!(livevcpus = qemuDomainFilterHotplugVcpuEntities(def, map, state)))
            goto cleanup;

        /* Make sure that only one hotpluggable entity is selected.
         * qemuDomainSetVcpusLive allows setting more at once but error
         * resolution in case of a partial failure is hard, so don't let users
         * do so */
        if (virBitmapCountBits(livevcpus) != 1) {
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                           _("only one hotpluggable entity can be selected"));
            goto cleanup;
        }
    }

6540
    if (persistentDef) {
6541
        if (qemuDomainVcpuValidateConfig(persistentDef, map) < 0)
6542 6543 6544
            goto cleanup;
    }

6545 6546 6547 6548 6549 6550 6551
    if (livevcpus &&
        qemuDomainSetVcpusLive(driver, cfg, vm, livevcpus, state) < 0)
        goto cleanup;

    if (persistentDef) {
        qemuDomainSetVcpuConfig(persistentDef, map, state);

6552
        if (virDomainDefSave(persistentDef, driver->xmlopt, cfg->configDir) < 0)
6553 6554 6555 6556 6557 6558 6559 6560 6561
            goto cleanup;
    }

    ret = 0;

 cleanup:
    virBitmapFree(livevcpus);
    return ret;
}