libvirt.c 607.5 KB
Newer Older
D
Daniel P. Berrange 已提交
1
/*
2
 * libvirt.c: Main interfaces for the libvirt library to handle virtualization
D
Daniel Veillard 已提交
3 4
 *           domains from a process running in domain 0
 *
E
Eric Blake 已提交
5
 * Copyright (C) 2005-2006, 2008-2014 Red Hat, Inc.
D
Daniel Veillard 已提交
6
 *
O
Osier Yang 已提交
7 8 9 10 11 12 13 14 15 16 17
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
D
Daniel Veillard 已提交
20 21 22 23
 *
 * Daniel Veillard <veillard@redhat.com>
 */

24
#include <config.h>
D
Daniel Veillard 已提交
25

26
#include <stdio.h>
27
#include <stdlib.h>
28
#include <string.h>
29 30 31
#include <sys/types.h>
#include <sys/stat.h>
#include <unistd.h>
E
Eric Blake 已提交
32
#include <sys/wait.h>
33
#include <time.h>
34

35 36
#include <libxml/parser.h>
#include <libxml/xpath.h>
37 38
#include "getpass.h"

39
#ifdef HAVE_WINSOCK2_H
40
# include <winsock2.h>
41
#endif
42

43
#ifdef WITH_CURL
44 45 46
# include <curl/curl.h>
#endif

47
#include "virerror.h"
48
#include "virlog.h"
49
#include "datatypes.h"
50
#include "driver.h"
51

52
#include "viruuid.h"
53
#include "viralloc.h"
54
#include "configmake.h"
55
#include "intprops.h"
56
#include "virconf.h"
57
#if WITH_GNUTLS
58 59 60
# if WITH_GNUTLS_GCRYPT
#  include <gcrypt.h>
# endif
61 62
# include "rpc/virnettlscontext.h"
#endif
63
#include "vircommand.h"
64
#include "virfile.h"
65
#include "virrandom.h"
M
Martin Kletzander 已提交
66
#include "viruri.h"
67
#include "virthread.h"
68
#include "virstring.h"
E
Eric Blake 已提交
69
#include "virutil.h"
70
#include "virtypedparam.h"
71

72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94
#ifdef WITH_TEST
# include "test/test_driver.h"
#endif
#ifdef WITH_REMOTE
# include "remote/remote_driver.h"
#endif
#ifdef WITH_OPENVZ
# include "openvz/openvz_driver.h"
#endif
#ifdef WITH_VMWARE
# include "vmware/vmware_driver.h"
#endif
#ifdef WITH_PHYP
# include "phyp/phyp_driver.h"
#endif
#ifdef WITH_ESX
# include "esx/esx_driver.h"
#endif
#ifdef WITH_HYPERV
# include "hyperv/hyperv_driver.h"
#endif
#ifdef WITH_XENAPI
# include "xenapi/xenapi_driver.h"
95
#endif
D
Dmitry Guryanov 已提交
96 97 98
#ifdef WITH_PARALLELS
# include "parallels/parallels_driver.h"
#endif
R
Roman Bogorodskiy 已提交
99 100 101
#ifdef WITH_BHYVE
# include "bhyve/bhyve_driver.h"
#endif
102

103 104
#define VIR_FROM_THIS VIR_FROM_NONE

D
Daniel Veillard 已提交
105 106 107
/*
 * TODO:
 * - use lock to protect against concurrent accesses ?
D
Daniel Veillard 已提交
108
 * - use reference counting to guarantee coherent pointer state ?
D
Daniel Veillard 已提交
109 110
 */

111
#define MAX_DRIVERS 20
112

113 114 115 116 117 118 119 120 121 122
#define virDriverCheckTabMaxReturn(count, ret)                          \
    do {                                                                \
        if ((count) >= MAX_DRIVERS) {                                   \
            virReportError(VIR_ERR_INTERNAL_ERROR,                      \
                           _("Too many drivers, cannot register %s"),   \
                           driver->name);                               \
            return ret;                                                 \
        }                                                               \
    } while (0)

123
static virDriverPtr virDriverTab[MAX_DRIVERS];
124
static int virDriverTabCount = 0;
125
static virNetworkDriverPtr virNetworkDriverTab[MAX_DRIVERS];
126
static int virNetworkDriverTabCount = 0;
D
Daniel Veillard 已提交
127 128
static virInterfaceDriverPtr virInterfaceDriverTab[MAX_DRIVERS];
static int virInterfaceDriverTabCount = 0;
129 130
static virStorageDriverPtr virStorageDriverTab[MAX_DRIVERS];
static int virStorageDriverTabCount = 0;
131 132
static virNodeDeviceDriverPtr virNodeDeviceDriverTab[MAX_DRIVERS];
static int virNodeDeviceDriverTabCount = 0;
133 134
static virSecretDriverPtr virSecretDriverTab[MAX_DRIVERS];
static int virSecretDriverTabCount = 0;
S
Stefan Berger 已提交
135 136
static virNWFilterDriverPtr virNWFilterDriverTab[MAX_DRIVERS];
static int virNWFilterDriverTabCount = 0;
A
Atsushi SAKAI 已提交
137
#ifdef WITH_LIBVIRTD
138 139
static virStateDriverPtr virStateDriverTab[MAX_DRIVERS];
static int virStateDriverTabCount = 0;
A
Atsushi SAKAI 已提交
140
#endif
141

142

143
#if defined(POLKIT_AUTH)
144 145 146
static int
virConnectAuthGainPolkit(const char *privilege)
{
E
Eric Blake 已提交
147 148 149
    virCommandPtr cmd;
    int status;
    int ret = -1;
150

151
    if (geteuid() == 0)
152 153
        return 0;

E
Eric Blake 已提交
154 155
    cmd = virCommandNewArgList(POLKIT_AUTH, "--obtain", privilege, NULL);
    if (virCommandRun(cmd, &status) < 0 ||
156
        status > 0)
E
Eric Blake 已提交
157
        goto cleanup;
158

E
Eric Blake 已提交
159 160 161 162
    ret = 0;
cleanup:
    virCommandFree(cmd);
    return ret;
163 164 165
}
#endif

166 167 168 169 170 171

static int
virConnectAuthCallbackDefault(virConnectCredentialPtr cred,
                              unsigned int ncred,
                              void *cbdata ATTRIBUTE_UNUSED)
{
172
    size_t i;
173

174
    for (i = 0; i < ncred; i++) {
175 176
        char buf[1024];
        char *bufptr = buf;
177
        size_t len;
178 179

        switch (cred[i].type) {
180 181 182 183
        case VIR_CRED_EXTERNAL: {
            if (STRNEQ(cred[i].challenge, "PolicyKit"))
                return -1;

184
#if defined(POLKIT_AUTH)
185
            if (virConnectAuthGainPolkit(cred[i].prompt) < 0)
186
                return -1;
187 188 189 190 191 192 193
#else
            /*
             * Ignore & carry on. Although we can't auth
             * directly, the user may have authenticated
             * themselves already outside context of libvirt
             */
#endif
194 195
            break;
        }
196

197 198 199 200
        case VIR_CRED_USERNAME:
        case VIR_CRED_AUTHNAME:
        case VIR_CRED_ECHOPROMPT:
        case VIR_CRED_REALM:
201
            if (printf("%s: ", cred[i].prompt) < 0)
202 203 204 205
                return -1;
            if (fflush(stdout) != 0)
                return -1;

206 207 208 209 210 211 212
            if (!fgets(buf, sizeof(buf), stdin)) {
                if (feof(stdin)) { /* Treat EOF as "" */
                    buf[0] = '\0';
                    break;
                }
                return -1;
            }
213 214 215
            len = strlen(buf);
            if (len != 0 && buf[len-1] == '\n')
                buf[len-1] = '\0';
216 217 218 219
            break;

        case VIR_CRED_PASSPHRASE:
        case VIR_CRED_NOECHOPROMPT:
220
            if (printf("%s: ", cred[i].prompt) < 0)
221 222 223 224
                return -1;
            if (fflush(stdout) != 0)
                return -1;

225 226 227 228
            bufptr = getpass("");
            if (!bufptr)
                return -1;
            break;
229 230 231

        default:
            return -1;
232 233
        }

D
Daniel P. Berrange 已提交
234
        if (cred[i].type != VIR_CRED_EXTERNAL) {
235 236 237
            if (VIR_STRDUP(cred[i].result,
                           STREQ(bufptr, "") && cred[i].defresult ?
                           cred[i].defresult : bufptr) < 0)
D
Daniel P. Berrange 已提交
238 239 240
                return -1;
            cred[i].resultlen = strlen(cred[i].result);
        }
241 242 243 244 245
    }

    return 0;
}

246

247 248 249 250 251 252 253 254 255 256
/* Don't typically want VIR_CRED_USERNAME. It enables you to authenticate
 * as one user, and act as another. It just results in annoying
 * prompts for the username twice & is very rarely what you want
 */
static int virConnectCredTypeDefault[] = {
    VIR_CRED_AUTHNAME,
    VIR_CRED_ECHOPROMPT,
    VIR_CRED_REALM,
    VIR_CRED_PASSPHRASE,
    VIR_CRED_NOECHOPROMPT,
257
    VIR_CRED_EXTERNAL,
258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278
};

static virConnectAuth virConnectAuthDefault = {
    virConnectCredTypeDefault,
    sizeof(virConnectCredTypeDefault)/sizeof(int),
    virConnectAuthCallbackDefault,
    NULL,
};

/*
 * virConnectAuthPtrDefault
 *
 * A default implementation of the authentication callbacks. This
 * implementation is suitable for command line based tools. It will
 * prompt for username, passwords, realm and one time keys as needed.
 * It will print on STDOUT, and read from STDIN. If this is not
 * suitable for the application's needs an alternative implementation
 * should be provided.
 */
virConnectAuthPtr virConnectAuthPtrDefault = &virConnectAuthDefault;

279 280
#if HAVE_WINSOCK2_H
static int
281
winsock_init(void)
282 283 284 285 286 287 288
{
    WORD winsock_version, err;
    WSADATA winsock_data;

    /* http://msdn2.microsoft.com/en-us/library/ms742213.aspx */
    winsock_version = MAKEWORD (2, 2);
    err = WSAStartup (winsock_version, &winsock_data);
J
Jim Meyering 已提交
289
    return err == 0 ? 0 : -1;
290 291 292
}
#endif

293

294
#ifdef WITH_GNUTLS_GCRYPT
295 296
static int
virTLSMutexInit(void **priv)
297
{
D
Daniel P. Berrange 已提交
298 299
    virMutexPtr lock = NULL;

300
    if (VIR_ALLOC_QUIET(lock) < 0)
D
Daniel P. Berrange 已提交
301 302 303 304 305 306 307 308 309 310 311
        return ENOMEM;

    if (virMutexInit(lock) < 0) {
        VIR_FREE(lock);
        return errno;
    }

    *priv = lock;
    return 0;
}

312 313 314

static int
virTLSMutexDestroy(void **priv)
D
Daniel P. Berrange 已提交
315 316 317 318 319 320 321
{
    virMutexPtr lock = *priv;
    virMutexDestroy(lock);
    VIR_FREE(lock);
    return 0;
}

322 323 324

static int
virTLSMutexLock(void **priv)
D
Daniel P. Berrange 已提交
325 326 327 328 329 330
{
    virMutexPtr lock = *priv;
    virMutexLock(lock);
    return 0;
}

331 332 333

static int
virTLSMutexUnlock(void **priv)
D
Daniel P. Berrange 已提交
334 335 336 337 338 339
{
    virMutexPtr lock = *priv;
    virMutexUnlock(lock);
    return 0;
}

340

D
Daniel P. Berrange 已提交
341
static struct gcry_thread_cbs virTLSThreadImpl = {
342
    /* GCRY_THREAD_OPTION_VERSION was added in gcrypt 1.4.2 */
343
# ifdef GCRY_THREAD_OPTION_VERSION
D
Daniel P. Berrange 已提交
344
    (GCRY_THREAD_OPTION_PTHREAD | (GCRY_THREAD_OPTION_VERSION << 8)),
345
# else
346
    GCRY_THREAD_OPTION_PTHREAD,
347
# endif
D
Daniel P. Berrange 已提交
348 349 350 351 352 353 354
    NULL,
    virTLSMutexInit,
    virTLSMutexDestroy,
    virTLSMutexLock,
    virTLSMutexUnlock,
    NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL
};
355
#endif /* WITH_GNUTLS_GCRYPT */
D
Daniel P. Berrange 已提交
356

357

358 359
static bool virGlobalError = false;
static virOnceControl virGlobalOnce = VIR_ONCE_CONTROL_INITIALIZER;
360

361 362 363
static void
virGlobalInit(void)
{
364 365 366 367 368
    /* It would be nice if we could trace the use of this call, to
     * help diagnose in log files if a user calls something other than
     * virConnectOpen first.  But we can't rely on VIR_DEBUG working
     * until after initialization is complete, and since this is
     * one-shot, we never get here again.  */
369
    if (virThreadInitialize() < 0 ||
370
        virErrorInitialize() < 0)
371
        goto error;
372

373
#ifndef LIBVIRT_SETUID_RPC_CLIENT
374 375 376 377 378 379 380
    if (virIsSUID()) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("libvirt.so is not safe to use from setuid programs"));
        goto error;
    }
#endif

381
#ifdef WITH_GNUTLS_GCRYPT
382 383 384 385 386 387 388 389 390 391 392 393 394
    /*
     * This sequence of API calls it copied exactly from
     * gnutls 2.12.23 source lib/gcrypt/init.c, with
     * exception that GCRYCTL_ENABLE_QUICK_RANDOM, is
     * dropped
     */
    if (gcry_control(GCRYCTL_ANY_INITIALIZATION_P) == 0) {
        gcry_control(GCRYCTL_SET_THREAD_CBS, &virTLSThreadImpl);
        gcry_check_version(NULL);

        gcry_control(GCRYCTL_DISABLE_SECMEM, NULL, 0);
        gcry_control(GCRYCTL_INITIALIZATION_FINISHED, NULL, 0);
    }
395
#endif
D
Daniel P. Berrange 已提交
396

397
    virLogSetFromEnv();
398

399
#ifdef WITH_GNUTLS
400
    virNetTLSInit();
401
#endif
402

403
#if WITH_CURL
404 405 406
    curl_global_init(CURL_GLOBAL_DEFAULT);
#endif

407
    VIR_DEBUG("register drivers");
408

409
#if HAVE_WINSOCK2_H
410
    if (winsock_init() == -1)
411
        goto error;
412 413
#endif

414
    if (!bindtextdomain(PACKAGE, LOCALEDIR))
415
        goto error;
416

417 418 419 420 421
    /*
     * Note we must avoid everything except 'remote' driver
     * for virt-login-shell usage
     */
#ifndef LIBVIRT_SETUID_RPC_CLIENT
422
    /*
423 424
     * Note that the order is important: the first ones have a higher
     * priority when calling virConnectOpen.
425
     */
426
# ifdef WITH_TEST
427 428
    if (testRegister() == -1)
        goto error;
429 430
# endif
# ifdef WITH_OPENVZ
431 432
    if (openvzRegister() == -1)
        goto error;
433 434
# endif
# ifdef WITH_VMWARE
435 436
    if (vmwareRegister() == -1)
        goto error;
437 438
# endif
# ifdef WITH_PHYP
439 440
    if (phypRegister() == -1)
        goto error;
441 442
# endif
# ifdef WITH_ESX
443 444
    if (esxRegister() == -1)
        goto error;
445 446
# endif
# ifdef WITH_HYPERV
447 448
    if (hypervRegister() == -1)
        goto error;
449 450
# endif
# ifdef WITH_XENAPI
451 452
    if (xenapiRegister() == -1)
        goto error;
453 454
# endif
# ifdef WITH_PARALLELS
455 456
    if (parallelsRegister() == -1)
        goto error;
457
# endif
D
Dmitry Guryanov 已提交
458
#endif
459
#ifdef WITH_REMOTE
460
    if (remoteRegister() == -1)
461
        goto error;
462
#endif
D
Daniel P. Berrange 已提交
463

464 465 466 467 468 469
    return;

error:
    virGlobalError = true;
}

470

471 472 473 474 475
/**
 * virInitialize:
 *
 * Initialize the library.
 *
476 477 478 479 480 481
 * This method is invoked automatically by any of the virConnectOpen() API
 * calls, and by virGetVersion(). Since release 1.0.0, there is no need to
 * call this method even in a multithreaded application, since
 * initialization is performed in a thread safe manner; but applications
 * using an older version of the library should manually call this before
 * setting up competing threads that attempt virConnectOpen in parallel.
482
 *
483 484 485 486 487
 * The only other time it would be necessary to call virInitialize is if the
 * application did not invoke virConnectOpen as its first API call, such
 * as when calling virEventRegisterImpl() before setting up connections,
 * or when using virSetErrorFunc() to alter error reporting of the first
 * connection attempt.
488 489 490 491 492 493 494 495 496 497 498
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
virInitialize(void)
{
    if (virOnce(&virGlobalOnce, virGlobalInit) < 0)
        return -1;

    if (virGlobalError)
        return -1;
499
    return 0;
500 501
}

502

503 504
#ifdef WIN32
BOOL WINAPI
505
DllMain(HINSTANCE instance, DWORD reason, LPVOID ignore);
506 507

BOOL WINAPI
508 509 510
DllMain(HINSTANCE instance ATTRIBUTE_UNUSED,
        DWORD reason,
        LPVOID ignore ATTRIBUTE_UNUSED)
511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535
{
    switch (reason) {
    case DLL_PROCESS_ATTACH:
        virInitialize();
        break;

    case DLL_THREAD_ATTACH:
        /* Nothing todo in libvirt yet */
        break;

    case DLL_THREAD_DETACH:
        /* Release per-thread local data */
        virThreadOnExit();
        break;

    case DLL_PROCESS_DETACH:
        /* Don't bother releasing per-thread data
           since (hopefully) windows cleans up
           everything on process exit */
        break;
    }

    return TRUE;
}
#endif
536

537

538 539 540 541 542 543 544 545 546 547 548
/**
 * virRegisterNetworkDriver:
 * @driver: pointer to a network driver block
 *
 * Register a network virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterNetworkDriver(virNetworkDriverPtr driver)
{
549
    virCheckNonNullArgReturn(driver, -1);
550
    virDriverCheckTabMaxReturn(virNetworkDriverTabCount, -1);
551

552
    VIR_DEBUG("registering %s as network driver %d",
553 554
           driver->name, virNetworkDriverTabCount);

555 556
    virNetworkDriverTab[virNetworkDriverTabCount] = driver;
    return virNetworkDriverTabCount++;
557 558
}

559

D
Daniel Veillard 已提交
560 561
/**
 * virRegisterInterfaceDriver:
L
Laine Stump 已提交
562
 * @driver: pointer to an interface driver block
D
Daniel Veillard 已提交
563
 *
L
Laine Stump 已提交
564
 * Register an interface virtualization driver
D
Daniel Veillard 已提交
565 566 567 568 569 570
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterInterfaceDriver(virInterfaceDriverPtr driver)
{
571
    virCheckNonNullArgReturn(driver, -1);
572
    virDriverCheckTabMaxReturn(virInterfaceDriverTabCount, -1);
D
Daniel Veillard 已提交
573

574
    VIR_DEBUG("registering %s as interface driver %d",
D
Daniel Veillard 已提交
575 576 577 578 579 580
           driver->name, virInterfaceDriverTabCount);

    virInterfaceDriverTab[virInterfaceDriverTabCount] = driver;
    return virInterfaceDriverTabCount++;
}

581

582 583 584 585 586 587 588 589 590 591 592
/**
 * virRegisterStorageDriver:
 * @driver: pointer to a storage driver block
 *
 * Register a storage virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterStorageDriver(virStorageDriverPtr driver)
{
593
    virCheckNonNullArgReturn(driver, -1);
594
    virDriverCheckTabMaxReturn(virStorageDriverTabCount, -1);
595

596
    VIR_DEBUG("registering %s as storage driver %d",
597 598
           driver->name, virStorageDriverTabCount);

599 600 601 602
    virStorageDriverTab[virStorageDriverTabCount] = driver;
    return virStorageDriverTabCount++;
}

603

604
/**
605
 * virRegisterNodeDeviceDriver:
606 607 608 609 610 611 612
 * @driver: pointer to a device monitor block
 *
 * Register a device monitor
 *
 * Returns the driver priority or -1 in case of error.
 */
int
613
virRegisterNodeDeviceDriver(virNodeDeviceDriverPtr driver)
614
{
615
    virCheckNonNullArgReturn(driver, -1);
616
    virDriverCheckTabMaxReturn(virNodeDeviceDriverTabCount, -1);
617

618
    VIR_DEBUG("registering %s as device driver %d",
619
           driver->name, virNodeDeviceDriverTabCount);
620

621 622
    virNodeDeviceDriverTab[virNodeDeviceDriverTabCount] = driver;
    return virNodeDeviceDriverTabCount++;
623 624
}

625

626 627 628 629 630 631 632 633 634 635 636
/**
 * virRegisterSecretDriver:
 * @driver: pointer to a secret driver block
 *
 * Register a secret driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterSecretDriver(virSecretDriverPtr driver)
{
637
    virCheckNonNullArgReturn(driver, -1);
638
    virDriverCheckTabMaxReturn(virSecretDriverTabCount, -1);
639

640
    VIR_DEBUG("registering %s as secret driver %d",
641 642 643 644 645 646
           driver->name, virSecretDriverTabCount);

    virSecretDriverTab[virSecretDriverTabCount] = driver;
    return virSecretDriverTabCount++;
}

647

S
Stefan Berger 已提交
648 649 650 651 652 653 654 655 656 657 658
/**
 * virRegisterNWFilterDriver:
 * @driver: pointer to a network filter driver block
 *
 * Register a network filter virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterNWFilterDriver(virNWFilterDriverPtr driver)
{
659
    virCheckNonNullArgReturn(driver, -1);
660
    virDriverCheckTabMaxReturn(virNWFilterDriverTabCount, -1);
S
Stefan Berger 已提交
661

662
    VIR_DEBUG("registering %s as network filter driver %d",
S
Stefan Berger 已提交
663 664 665 666 667 668 669
           driver->name, virNWFilterDriverTabCount);

    virNWFilterDriverTab[virNWFilterDriverTabCount] = driver;
    return virNWFilterDriverTabCount++;
}


670 671 672 673 674 675 676 677 678 679 680
/**
 * virRegisterDriver:
 * @driver: pointer to a driver block
 *
 * Register a virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterDriver(virDriverPtr driver)
{
681 682
    VIR_DEBUG("driver=%p name=%s", driver,
              driver ? NULLSTR(driver->name) : "(null)");
683

684
    virCheckNonNullArgReturn(driver, -1);
685
    virDriverCheckTabMaxReturn(virDriverTabCount, -1);
686

687
    VIR_DEBUG("registering %s as driver %d",
688 689
           driver->name, virDriverTabCount);

690 691
    virDriverTab[virDriverTabCount] = driver;
    return virDriverTabCount++;
692 693
}

694

A
Atsushi SAKAI 已提交
695
#ifdef WITH_LIBVIRTD
696 697 698 699 700 701 702 703 704 705 706
/**
 * virRegisterStateDriver:
 * @driver: pointer to a driver block
 *
 * Register a virtualization driver
 *
 * Returns the driver priority or -1 in case of error.
 */
int
virRegisterStateDriver(virStateDriverPtr driver)
{
707
    virCheckNonNullArgReturn(driver, -1);
708
    virDriverCheckTabMaxReturn(virStateDriverTabCount, -1);
709 710 711 712 713

    virStateDriverTab[virStateDriverTabCount] = driver;
    return virStateDriverTabCount++;
}

714

715 716
/**
 * virStateInitialize:
717
 * @privileged: set to true if running with root privilege, false otherwise
718 719
 * @callback: callback to invoke to inhibit shutdown of the daemon
 * @opaque: data to pass to @callback
720
 *
721 722 723 724 725
 * Initialize all virtualization drivers. Accomplished in two phases,
 * the first being state and structure initialization followed by any
 * auto start supported by the driver.  This is done to ensure dependencies
 * that some drivers may have on another driver having been initialized
 * will exist, such as the storage driver's need to use the secret driver.
726
 *
727
 * Returns 0 if all succeed, -1 upon any failure.
728
 */
729 730 731 732
int
virStateInitialize(bool privileged,
                   virStateInhibitCallback callback,
                   void *opaque)
733
{
734
    size_t i;
735 736 737 738

    if (virInitialize() < 0)
        return -1;

739
    for (i = 0; i < virStateDriverTabCount; i++) {
740
        if (virStateDriverTab[i]->stateInitialize) {
741
            VIR_DEBUG("Running global init for %s state driver",
742
                      virStateDriverTab[i]->name);
743 744 745
            if (virStateDriverTab[i]->stateInitialize(privileged,
                                                      callback,
                                                      opaque) < 0) {
746 747 748 749
                virErrorPtr err = virGetLastError();
                VIR_ERROR(_("Initialization of %s state driver failed: %s"),
                          virStateDriverTab[i]->name,
                          err && err->message ? err->message : _("Unknown problem"));
750 751
                return -1;
            }
752
        }
753
    }
754 755 756 757 758 759 760 761

    for (i = 0; i < virStateDriverTabCount; i++) {
        if (virStateDriverTab[i]->stateAutoStart) {
            VIR_DEBUG("Running global auto start for %s state driver",
                      virStateDriverTab[i]->name);
            virStateDriverTab[i]->stateAutoStart();
        }
    }
762
    return 0;
763 764
}

765

766 767 768 769 770
/**
 * virStateCleanup:
 *
 * Run each virtualization driver's cleanup method.
 *
771
 * Returns 0 if all succeed, -1 upon any failure.
772
 */
773 774 775
int
virStateCleanup(void)
{
776 777
    size_t i;
    int ret = 0;
778

779
    for (i = 0; i < virStateDriverTabCount; i++) {
780 781
        if (virStateDriverTab[i]->stateCleanup &&
            virStateDriverTab[i]->stateCleanup() < 0)
782 783 784 785 786
            ret = -1;
    }
    return ret;
}

787

788 789 790 791 792
/**
 * virStateReload:
 *
 * Run each virtualization driver's reload method.
 *
793
 * Returns 0 if all succeed, -1 upon any failure.
794
 */
795 796 797
int
virStateReload(void)
{
798 799
    size_t i;
    int ret = 0;
800

801
    for (i = 0; i < virStateDriverTabCount; i++) {
802 803
        if (virStateDriverTab[i]->stateReload &&
            virStateDriverTab[i]->stateReload() < 0)
804 805 806 807 808
            ret = -1;
    }
    return ret;
}

809

810 811 812 813 814 815 816
/**
 * virStateStop:
 *
 * Run each virtualization driver's "stop" method.
 *
 * Returns 0 if successful, -1 on failure
 */
817 818 819
int
virStateStop(void)
{
820 821
    size_t i;
    int ret = 0;
822

823
    for (i = 0; i < virStateDriverTabCount; i++) {
824 825
        if (virStateDriverTab[i]->stateStop &&
            virStateDriverTab[i]->stateStop())
826 827 828 829
            ret = 1;
    }
    return ret;
}
830
#endif /* WITH_LIBVIRTD */
831 832


833 834 835
/**
 * virGetVersion:
 * @libVer: return value for the library version (OUT)
836 837 838 839 840 841 842 843 844 845
 * @type: ignored; pass NULL
 * @typeVer: pass NULL; for historical purposes duplicates @libVer if
 * non-NULL
 *
 * Provides version information. @libVer is the version of the
 * library and will always be set unless an error occurs, in which case
 * an error code will be returned. @typeVer exists for historical
 * compatibility; if it is not NULL it will duplicate @libVer (it was
 * originally intended to return hypervisor information based on @type,
 * but due to the design of remote clients this is not reliable). To
846
 * get the version of the running hypervisor use the virConnectGetVersion()
847
 * function instead. To get the libvirt library version used by a
848 849 850
 * connection use the virConnectGetLibVersion() instead.
 *
 * This function includes a call to virInitialize() when necessary.
851 852 853 854 855
 *
 * Returns -1 in case of failure, 0 otherwise, and values for @libVer and
 *       @typeVer have the format major * 1,000,000 + minor * 1,000 + release.
 */
int
856
virGetVersion(unsigned long *libVer, const char *type ATTRIBUTE_UNUSED,
857 858
              unsigned long *typeVer)
{
859 860
    if (virInitialize() < 0)
        goto error;
861
    VIR_DEBUG("libVir=%p, type=%s, typeVer=%p", libVer, type, typeVer);
862

863
    virResetLastError();
864
    if (libVer == NULL)
865
        goto error;
866 867
    *libVer = LIBVIR_VERSION_NUMBER;

868
    if (typeVer != NULL)
869 870
        *typeVer = LIBVIR_VERSION_NUMBER;

871
    return 0;
872 873 874 875

error:
    virDispatchError(NULL);
    return -1;
876 877
}

878

879
static char *
880
virConnectGetConfigFilePath(void)
881 882 883 884 885
{
    char *path;
    if (geteuid() == 0) {
        if (virAsprintf(&path, "%s/libvirt/libvirt.conf",
                        SYSCONFDIR) < 0)
886
            return NULL;
887
    } else {
888
        char *userdir = virGetUserConfigDirectory();
889
        if (!userdir)
890
            return NULL;
891

892
        if (virAsprintf(&path, "%s/libvirt.conf",
893 894
                        userdir) < 0) {
            VIR_FREE(userdir);
895
            return NULL;
896 897
        }
        VIR_FREE(userdir);
898 899 900 901 902
    }

    return path;
}

903

904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930
static int
virConnectGetConfigFile(virConfPtr *conf)
{
    char *filename = NULL;
    int ret = -1;

    *conf = NULL;

    if (!(filename = virConnectGetConfigFilePath()))
        goto cleanup;

    if (!virFileExists(filename)) {
        ret = 0;
        goto cleanup;
    }

    VIR_DEBUG("Loading config file '%s'", filename);
    if (!(*conf = virConfReadFile(filename, 0)))
        goto cleanup;

    ret = 0;

cleanup:
    VIR_FREE(filename);
    return ret;
}

931 932
#define URI_ALIAS_CHARS "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789_-"

933

934
static int
935 936
virConnectOpenFindURIAliasMatch(virConfValuePtr value, const char *alias,
                                char **uri)
937 938
{
    virConfValuePtr entry;
W
Wen Ruo Lv 已提交
939 940
    size_t alias_len;

941
    if (value->type != VIR_CONF_LIST) {
942 943
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("Expected a list for 'uri_aliases' config parameter"));
944 945 946 947
        return -1;
    }

    entry = value->list;
W
Wen Ruo Lv 已提交
948
    alias_len = strlen(alias);
949 950 951 952 953
    while (entry) {
        char *offset;
        size_t safe;

        if (entry->type != VIR_CONF_STRING) {
954 955
            virReportError(VIR_ERR_CONF_SYNTAX, "%s",
                           _("Expected a string for 'uri_aliases' config parameter list entry"));
956 957 958 959
            return -1;
        }

        if (!(offset = strchr(entry->str, '='))) {
960 961
            virReportError(VIR_ERR_CONF_SYNTAX,
                           _("Malformed 'uri_aliases' config entry '%s', expected 'alias=uri://host/path'"),
962 963 964 965 966 967
                            entry->str);
            return -1;
        }

        safe  = strspn(entry->str, URI_ALIAS_CHARS);
        if (safe < (offset - entry->str)) {
968 969
            virReportError(VIR_ERR_CONF_SYNTAX,
                           _("Malformed 'uri_aliases' config entry '%s', aliases may only contain 'a-Z, 0-9, _, -'"),
970 971 972 973
                            entry->str);
            return -1;
        }

W
Wen Ruo Lv 已提交
974 975
        if (alias_len == (offset - entry->str) &&
            STREQLEN(entry->str, alias, alias_len)) {
976 977
            VIR_DEBUG("Resolved alias '%s' to '%s'",
                      alias, offset+1);
978
            return VIR_STRDUP(*uri, offset+1);
979 980 981 982 983 984 985 986 987 988
        }

        entry = entry->next;
    }

    VIR_DEBUG("No alias found for '%s', passing through to drivers",
              alias);
    return 0;
}

989

990
static int
991 992
virConnectOpenResolveURIAlias(virConfPtr conf,
                              const char *alias, char **uri)
993 994 995 996 997 998
{
    int ret = -1;
    virConfValuePtr value = NULL;

    *uri = NULL;

999
    if ((value = virConfGetValue(conf, "uri_aliases")))
1000 1001 1002 1003
        ret = virConnectOpenFindURIAliasMatch(value, alias, uri);
    else
        ret = 0;

1004 1005 1006 1007 1008 1009 1010 1011 1012 1013
    return ret;
}


static int
virConnectGetDefaultURI(virConfPtr conf,
                        const char **name)
{
    int ret = -1;
    virConfValuePtr value = NULL;
1014
    const char *defname = virGetEnvBlockSUID("LIBVIRT_DEFAULT_URI");
1015 1016 1017 1018 1019
    if (defname && *defname) {
        VIR_DEBUG("Using LIBVIRT_DEFAULT_URI '%s'", defname);
        *name = defname;
    } else if ((value = virConfGetValue(conf, "uri_default"))) {
        if (value->type != VIR_CONF_STRING) {
1020 1021
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Expected a string for 'uri_default' config parameter"));
1022 1023 1024 1025 1026 1027 1028
            goto cleanup;
        }
        VIR_DEBUG("Using config file uri '%s'", value->str);
        *name = value->str;
    }

    ret = 0;
1029 1030 1031 1032
cleanup:
    return ret;
}

1033

1034
static virConnectPtr
1035 1036 1037
do_open(const char *name,
        virConnectAuthPtr auth,
        unsigned int flags)
1038
{
1039 1040
    size_t i;
    int res;
1041
    virConnectPtr ret;
1042
    virConfPtr conf = NULL;
1043 1044 1045 1046

    ret = virGetConnect();
    if (ret == NULL)
        return NULL;
1047

1048 1049 1050 1051 1052 1053
    if (virConnectGetConfigFile(&conf) < 0)
        goto failed;

    if (name && name[0] == '\0')
        name = NULL;

1054 1055 1056 1057 1058 1059
    if (!name && virIsSUID()) {
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("An explicit URI must be provided when setuid"));
        goto failed;
    }

1060
    /*
E
Eric Blake 已提交
1061 1062 1063
     * If no URI is passed, then check for an environment string if not
     * available probe the compiled in drivers to find a default hypervisor
     * if detectable.
1064
     */
1065 1066 1067
    if (!name &&
        virConnectGetDefaultURI(conf, &name) < 0)
        goto failed;
1068

1069
    if (name) {
1070
        char *alias = NULL;
1071 1072 1073 1074 1075 1076 1077
        /* Convert xen -> xen:/// for back compat */
        if (STRCASEEQ(name, "xen"))
            name = "xen:///";

        /* Convert xen:// -> xen:/// because xmlParseURI cannot parse the
         * former.  This allows URIs such as xen://localhost to work.
         */
1078
        if (STREQ(name, "xen://"))
1079 1080
            name = "xen:///";

1081
        if (!(flags & VIR_CONNECT_NO_ALIASES) &&
1082
            virConnectOpenResolveURIAlias(conf, name, &alias) < 0)
1083 1084
            goto failed;

1085
        if (!(ret->uri = virURIParse(alias ? alias : name))) {
1086
            VIR_FREE(alias);
1087 1088
            goto failed;
        }
1089

1090
        VIR_DEBUG("name \"%s\" to URI components:\n"
1091 1092 1093 1094 1095 1096
                  "  scheme %s\n"
                  "  server %s\n"
                  "  user %s\n"
                  "  port %d\n"
                  "  path %s\n",
                  alias ? alias : name,
1097
                  NULLSTR(ret->uri->scheme), NULLSTR(ret->uri->server),
1098 1099 1100 1101
                  NULLSTR(ret->uri->user), ret->uri->port,
                  NULLSTR(ret->uri->path));

        VIR_FREE(alias);
1102
    } else {
1103
        VIR_DEBUG("no name, allowing driver auto-select");
1104 1105
    }

1106 1107 1108
    /* Cleansing flags */
    ret->flags = flags & VIR_CONNECT_RO;

1109
    for (i = 0; i < virDriverTabCount; i++) {
1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123
        /* We're going to probe the remote driver next. So we have already
         * probed all other client-side-only driver before, but none of them
         * accepted the URI.
         * If the scheme corresponds to a known but disabled client-side-only
         * driver then report a useful error, instead of a cryptic one about
         * not being able to connect to libvirtd or not being able to find
         * certificates. */
        if (virDriverTab[i]->no == VIR_DRV_REMOTE &&
            ret->uri != NULL && ret->uri->scheme != NULL &&
            (
#ifndef WITH_PHYP
             STRCASEEQ(ret->uri->scheme, "phyp") ||
#endif
#ifndef WITH_ESX
1124
             STRCASEEQ(ret->uri->scheme, "vpx") ||
1125 1126
             STRCASEEQ(ret->uri->scheme, "esx") ||
             STRCASEEQ(ret->uri->scheme, "gsx") ||
M
Matthias Bolte 已提交
1127 1128 1129
#endif
#ifndef WITH_HYPERV
             STRCASEEQ(ret->uri->scheme, "hyperv") ||
1130 1131 1132
#endif
#ifndef WITH_XENAPI
             STRCASEEQ(ret->uri->scheme, "xenapi") ||
D
Dmitry Guryanov 已提交
1133 1134 1135
#endif
#ifndef WITH_PARALLELS
             STRCASEEQ(ret->uri->scheme, "parallels") ||
1136 1137
#endif
             false)) {
1138
            virReportErrorHelper(VIR_FROM_NONE, VIR_ERR_CONFIG_UNSUPPORTED,
1139 1140 1141 1142 1143 1144
                                 __FILE__, __FUNCTION__, __LINE__,
                                 _("libvirt was built without the '%s' driver"),
                                 ret->uri->scheme);
            goto failed;
        }

1145
        VIR_DEBUG("trying driver %zu (%s) ...", i, virDriverTab[i]->name);
1146
        ret->driver = virDriverTab[i];
1147
        res = virDriverTab[i]->connectOpen(ret, auth, flags);
1148
        VIR_DEBUG("driver %zu %s returned %s",
O
Osier Yang 已提交
1149 1150 1151 1152 1153 1154
                  i, virDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1155
            break;
O
Osier Yang 已提交
1156
        } else if (res == VIR_DRV_OPEN_ERROR) {
1157
            ret->driver = NULL;
O
Osier Yang 已提交
1158
            goto failed;
1159 1160
        } else {
            ret->driver = NULL;
1161
        }
1162 1163
    }

1164
    if (!ret->driver) {
1165
        /* If we reach here, then all drivers declined the connection. */
1166
        virReportError(VIR_ERR_NO_CONNECT, "%s", NULLSTR(name));
1167
        goto failed;
1168 1169
    }

1170
    for (i = 0; i < virNetworkDriverTabCount; i++) {
1171
        res = virNetworkDriverTab[i]->networkOpen(ret, auth, flags);
1172
        VIR_DEBUG("network driver %zu %s returned %s",
O
Osier Yang 已提交
1173 1174 1175 1176 1177 1178
                  i, virNetworkDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1179 1180
            ret->networkDriver = virNetworkDriverTab[i];
            break;
O
Osier Yang 已提交
1181 1182
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1183
        }
1184
    }
1185

D
Daniel Veillard 已提交
1186
    for (i = 0; i < virInterfaceDriverTabCount; i++) {
1187
        res = virInterfaceDriverTab[i]->interfaceOpen(ret, auth, flags);
1188
        VIR_DEBUG("interface driver %zu %s returned %s",
O
Osier Yang 已提交
1189 1190 1191 1192 1193 1194
                  i, virInterfaceDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
D
Daniel Veillard 已提交
1195 1196
            ret->interfaceDriver = virInterfaceDriverTab[i];
            break;
O
Osier Yang 已提交
1197 1198
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
D
Daniel Veillard 已提交
1199 1200
        }
    }
1201 1202 1203

    /* Secondary driver for storage. Optional */
    for (i = 0; i < virStorageDriverTabCount; i++) {
1204
        res = virStorageDriverTab[i]->storageOpen(ret, auth, flags);
1205
        VIR_DEBUG("storage driver %zu %s returned %s",
O
Osier Yang 已提交
1206 1207 1208 1209 1210 1211
                  i, virStorageDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1212 1213
            ret->storageDriver = virStorageDriverTab[i];
            break;
O
Osier Yang 已提交
1214 1215
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1216 1217 1218
        }
    }

1219
    /* Node driver (optional) */
1220
    for (i = 0; i < virNodeDeviceDriverTabCount; i++) {
1221
        res = virNodeDeviceDriverTab[i]->nodeDeviceOpen(ret, auth, flags);
1222
        VIR_DEBUG("node driver %zu %s returned %s",
1223
                  i, virNodeDeviceDriverTab[i]->name,
O
Osier Yang 已提交
1224 1225 1226 1227 1228
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1229
            ret->nodeDeviceDriver = virNodeDeviceDriverTab[i];
1230
            break;
O
Osier Yang 已提交
1231 1232
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1233 1234 1235
        }
    }

1236 1237
    /* Secret manipulation driver. Optional */
    for (i = 0; i < virSecretDriverTabCount; i++) {
1238
        res = virSecretDriverTab[i]->secretOpen(ret, auth, flags);
1239
        VIR_DEBUG("secret driver %zu %s returned %s",
O
Osier Yang 已提交
1240 1241 1242 1243 1244 1245
                  i, virSecretDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
1246 1247
            ret->secretDriver = virSecretDriverTab[i];
            break;
O
Osier Yang 已提交
1248 1249
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
1250 1251 1252
        }
    }

S
Stefan Berger 已提交
1253 1254
    /* Network filter driver. Optional */
    for (i = 0; i < virNWFilterDriverTabCount; i++) {
1255
        res = virNWFilterDriverTab[i]->nwfilterOpen(ret, auth, flags);
1256
        VIR_DEBUG("nwfilter driver %zu %s returned %s",
O
Osier Yang 已提交
1257 1258 1259 1260 1261 1262
                  i, virNWFilterDriverTab[i]->name,
                  res == VIR_DRV_OPEN_SUCCESS ? "SUCCESS" :
                  (res == VIR_DRV_OPEN_DECLINED ? "DECLINED" :
                  (res == VIR_DRV_OPEN_ERROR ? "ERROR" : "unknown status")));

        if (res == VIR_DRV_OPEN_SUCCESS) {
S
Stefan Berger 已提交
1263 1264
            ret->nwfilterDriver = virNWFilterDriverTab[i];
            break;
O
Osier Yang 已提交
1265 1266
        } else if (res == VIR_DRV_OPEN_ERROR) {
            break;
S
Stefan Berger 已提交
1267 1268 1269
        }
    }

1270 1271
    virConfFree(conf);

1272
    return ret;
1273 1274

failed:
1275
    virConfFree(conf);
1276
    virObjectUnref(ret);
1277

1278
    return NULL;
1279 1280
}

1281

1282 1283
/**
 * virConnectOpen:
1284
 * @name: (optional) URI of the hypervisor
1285
 *
1286
 * This function should be called first to get a connection to the
1287 1288
 * Hypervisor and xen store
 *
1289 1290 1291 1292 1293
 * If @name is NULL, if the LIBVIRT_DEFAULT_URI environment variable is set,
 * then it will be used. Otherwise if the client configuration file
 * has the "uri_default" parameter set, then it will be used. Finally
 * probing will be done to determine a suitable default driver to activate.
 * This involves trying each hypervisor in turn until one successfully opens.
1294 1295 1296 1297 1298 1299
 *
 * If connecting to an unprivileged hypervisor driver which requires
 * the libvirtd daemon to be active, it will automatically be launched
 * if not already running. This can be prevented by setting the
 * environment variable LIBVIRT_AUTOSTART=0
 *
1300
 * URIs are documented at http://libvirt.org/uri.html
E
Eric Blake 已提交
1301 1302
 *
 * Returns a pointer to the hypervisor connection or NULL in case of error
1303 1304
 */
virConnectPtr
1305
virConnectOpen(const char *name)
1306
{
1307
    virConnectPtr ret = NULL;
1308 1309 1310

    if (virInitialize() < 0)
        goto error;
1311

1312
    VIR_DEBUG("name=%s", NULLSTR(name));
1313
    virResetLastError();
1314
    ret = do_open(name, NULL, 0);
1315 1316 1317 1318 1319 1320 1321
    if (!ret)
        goto error;
    return ret;

error:
    virDispatchError(NULL);
    return NULL;
1322 1323
}

1324

1325
/**
1326
 * virConnectOpenReadOnly:
1327
 * @name: (optional) URI of the hypervisor
1328
 *
1329
 * This function should be called first to get a restricted connection to the
D
Daniel Veillard 已提交
1330
 * library functionalities. The set of APIs usable are then restricted
1331
 * on the available methods to control the domains.
1332
 *
1333 1334 1335
 * See virConnectOpen for notes about environment variables which can
 * have an effect on opening drivers
 *
1336
 * URIs are documented at http://libvirt.org/uri.html
E
Eric Blake 已提交
1337 1338
 *
 * Returns a pointer to the hypervisor connection or NULL in case of error
1339
 */
1340
virConnectPtr
1341 1342
virConnectOpenReadOnly(const char *name)
{
1343
    virConnectPtr ret = NULL;
1344 1345 1346

    if (virInitialize() < 0)
        goto error;
1347

1348
    VIR_DEBUG("name=%s", NULLSTR(name));
1349
    virResetLastError();
1350
    ret = do_open(name, NULL, VIR_CONNECT_RO);
1351 1352 1353 1354 1355 1356 1357
    if (!ret)
        goto error;
    return ret;

error:
    virDispatchError(NULL);
    return NULL;
1358 1359
}

1360

1361 1362
/**
 * virConnectOpenAuth:
1363
 * @name: (optional) URI of the hypervisor
1364
 * @auth: Authenticate callback parameters
1365
 * @flags: bitwise-OR of virConnectFlags
1366
 *
1367
 * This function should be called first to get a connection to the
1368
 * Hypervisor. If necessary, authentication will be performed fetching
1369 1370
 * credentials via the callback
 *
1371 1372 1373
 * See virConnectOpen for notes about environment variables which can
 * have an effect on opening drivers
 *
1374
 * URIs are documented at http://libvirt.org/uri.html
E
Eric Blake 已提交
1375 1376
 *
 * Returns a pointer to the hypervisor connection or NULL in case of error
1377 1378 1379 1380
 */
virConnectPtr
virConnectOpenAuth(const char *name,
                   virConnectAuthPtr auth,
1381
                   unsigned int flags)
1382
{
1383
    virConnectPtr ret = NULL;
1384 1385 1386

    if (virInitialize() < 0)
        goto error;
1387

1388
    VIR_DEBUG("name=%s, auth=%p, flags=%x", NULLSTR(name), auth, flags);
1389
    virResetLastError();
1390
    ret = do_open(name, auth, flags);
1391 1392 1393 1394 1395 1396 1397
    if (!ret)
        goto error;
    return ret;

error:
    virDispatchError(NULL);
    return NULL;
D
Daniel Veillard 已提交
1398 1399
}

1400

D
Daniel Veillard 已提交
1401
/**
1402
 * virConnectClose:
D
Daniel Veillard 已提交
1403 1404 1405 1406 1407 1408 1409
 * @conn: pointer to the hypervisor connection
 *
 * This function closes the connection to the Hypervisor. This should
 * not be called if further interaction with the Hypervisor are needed
 * especially if there is running domain which need further monitoring by
 * the application.
 *
1410 1411 1412 1413 1414 1415 1416 1417
 * Connections are reference counted; the count is explicitly
 * increased by the initial open (virConnectOpen, virConnectOpenAuth,
 * and the like) as well as virConnectRef; it is also temporarily
 * increased by other API that depend on the connection remaining
 * alive.  The open and every virConnectRef call should have a
 * matching virConnectClose, and all other references will be released
 * after the corresponding operation completes.
 *
1418 1419 1420 1421 1422 1423 1424 1425 1426 1427
 * Returns a positive number if at least 1 reference remains on
 * success. The returned value should not be assumed to be the total
 * reference count. A return of 0 implies no references remain and
 * the connection is closed and memory has been freed. A return of -1
 * implies a failure.
 *
 * It is possible for the last virConnectClose to return a positive
 * value if some other object still has a temporary reference to the
 * connection, but the application should not try to further use a
 * connection after the virConnectClose that matches the initial open.
D
Daniel Veillard 已提交
1428 1429
 */
int
1430 1431
virConnectClose(virConnectPtr conn)
{
1432
    VIR_DEBUG("conn=%p", conn);
1433

1434 1435
    virResetLastError();

1436
    virCheckConnectReturn(conn, -1);
1437

1438 1439 1440
    if (!virObjectUnref(conn))
        return 0;
    return 1;
D
Daniel Veillard 已提交
1441 1442
}

1443

1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457
/**
 * virConnectRef:
 * @conn: the connection to hold a reference on
 *
 * Increment the reference count on the connection. For each
 * additional call to this method, there shall be a corresponding
 * call to virConnectClose to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a connection would increment
 * the reference count.
D
Daniel Veillard 已提交
1458 1459
 *
 * Returns 0 in case of success, -1 in case of failure
1460 1461 1462 1463
 */
int
virConnectRef(virConnectPtr conn)
{
1464 1465
    VIR_DEBUG("conn=%p refs=%d", conn, conn ? conn->object.u.s.refs : 0);

1466 1467
    virResetLastError();

1468
    virCheckConnectReturn(conn, -1);
1469
    virObjectRef(conn);
1470 1471 1472
    return 0;
}

1473

D
Daniel Veillard 已提交
1474 1475
/*
 * Not for public use.  This function is part of the internal
1476 1477 1478
 * implementation of driver features in the remote case.
 */
int
1479
virConnectSupportsFeature(virConnectPtr conn, int feature)
1480
{
1481
    int ret;
1482
    VIR_DEBUG("conn=%p, feature=%d", conn, feature);
1483

1484 1485
    virResetLastError();

1486
    virCheckConnectReturn(conn, -1);
1487

1488
    if (!conn->driver->connectSupportsFeature)
1489 1490
        ret = 0;
    else
1491
        ret = conn->driver->connectSupportsFeature(conn, feature);
1492 1493

    if (ret < 0)
1494
        virDispatchError(conn);
1495

1496
    return ret;
1497 1498
}

1499

1500 1501 1502 1503
/**
 * virConnectGetType:
 * @conn: pointer to the hypervisor connection
 *
1504 1505 1506 1507 1508
 * Get the name of the Hypervisor driver used. This is merely the driver
 * name; for example, both KVM and QEMU guests are serviced by the
 * driver for the qemu:// URI, so a return of "QEMU" does not indicate
 * whether KVM acceleration is present.  For more details about the
 * hypervisor, use virConnectGetCapabilities().
1509 1510
 *
 * Returns NULL in case of error, a static zero terminated string otherwise.
1511 1512 1513
 *
 * See also:
 * http://www.redhat.com/archives/libvir-list/2007-February/msg00096.html
1514 1515
 */
const char *
1516 1517
virConnectGetType(virConnectPtr conn)
{
1518
    const char *ret;
1519
    VIR_DEBUG("conn=%p", conn);
1520

1521 1522
    virResetLastError();

1523
    virCheckConnectReturn(conn, NULL);
1524

1525 1526
    if (conn->driver->connectGetType) {
        ret = conn->driver->connectGetType(conn);
1527
        if (ret) return ret;
1528
    }
1529
    return conn->driver->name;
1530 1531
}

1532

D
Daniel Veillard 已提交
1533
/**
1534
 * virConnectGetVersion:
D
Daniel Veillard 已提交
1535
 * @conn: pointer to the hypervisor connection
1536
 * @hvVer: return value for the version of the running hypervisor (OUT)
D
Daniel Veillard 已提交
1537
 *
1538
 * Get the version level of the Hypervisor running. This may work only with
1539
 * hypervisor call, i.e. with privileged access to the hypervisor, not
1540
 * with a Read-Only connection.
D
Daniel Veillard 已提交
1541
 *
1542 1543 1544
 * Returns -1 in case of error, 0 otherwise. if the version can't be
 *    extracted by lack of capacities returns 0 and @hvVer is 0, otherwise
 *    @hvVer value is major * 1,000,000 + minor * 1,000 + release
D
Daniel Veillard 已提交
1545
 */
1546
int
1547 1548
virConnectGetVersion(virConnectPtr conn, unsigned long *hvVer)
{
1549
    VIR_DEBUG("conn=%p, hvVer=%p", conn, hvVer);
1550

1551 1552
    virResetLastError();

1553
    virCheckConnectReturn(conn, -1);
1554
    virCheckNonNullArgGoto(hvVer, error);
1555

1556 1557
    if (conn->driver->connectGetVersion) {
        int ret = conn->driver->connectGetVersion(conn, hvVer);
1558 1559 1560 1561
        if (ret < 0)
            goto error;
        return ret;
    }
D
Daniel P. Berrange 已提交
1562

1563
    virReportUnsupportedError();
1564 1565

error:
1566
    virDispatchError(conn);
1567
    return -1;
1568 1569
}

1570

1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585
/**
 * virConnectGetLibVersion:
 * @conn: pointer to the hypervisor connection
 * @libVer: returns the libvirt library version used on the connection (OUT)
 *
 * Provides @libVer, which is the version of libvirt used by the
 *   daemon running on the @conn host
 *
 * Returns -1 in case of failure, 0 otherwise, and values for @libVer have
 *      the format major * 1,000,000 + minor * 1,000 + release.
 */
int
virConnectGetLibVersion(virConnectPtr conn, unsigned long *libVer)
{
    int ret = -1;
1586
    VIR_DEBUG("conn=%p, libVir=%p", conn, libVer);
1587 1588 1589

    virResetLastError();

1590
    virCheckConnectReturn(conn, -1);
1591
    virCheckNonNullArgGoto(libVer, error);
1592

1593 1594
    if (conn->driver->connectGetLibVersion) {
        ret = conn->driver->connectGetLibVersion(conn, libVer);
1595 1596 1597 1598 1599
        if (ret < 0)
            goto error;
        return ret;
    }

1600 1601 1602
    *libVer = LIBVIR_VERSION_NUMBER;
    return 0;

1603
error:
1604
    virDispatchError(conn);
1605 1606 1607
    return ret;
}

1608

1609 1610 1611 1612
/**
 * virConnectGetHostname:
 * @conn: pointer to a hypervisor connection
 *
E
Eric Blake 已提交
1613 1614 1615 1616
 * This returns a system hostname on which the hypervisor is
 * running (based on the result of the gethostname system call, but
 * possibly expanded to a fully-qualified domain name via getaddrinfo).
 * If we are connected to a remote system, then this returns the
1617 1618 1619 1620 1621 1622
 * hostname of the remote system.
 *
 * Returns the hostname which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
1623
virConnectGetHostname(virConnectPtr conn)
1624
{
1625
    VIR_DEBUG("conn=%p", conn);
1626

1627 1628
    virResetLastError();

1629
    virCheckConnectReturn(conn, NULL);
1630

1631 1632
    if (conn->driver->connectGetHostname) {
        char *ret = conn->driver->connectGetHostname(conn);
1633 1634 1635 1636
        if (!ret)
            goto error;
        return ret;
    }
1637

1638
    virReportUnsupportedError();
1639 1640

error:
1641
    virDispatchError(conn);
1642 1643 1644
    return NULL;
}

1645

1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661
/**
 * virConnectGetURI:
 * @conn: pointer to a hypervisor connection
 *
 * This returns the URI (name) of the hypervisor connection.
 * Normally this is the same as or similar to the string passed
 * to the virConnectOpen/virConnectOpenReadOnly call, but
 * the driver may make the URI canonical.  If name == NULL
 * was passed to virConnectOpen, then the driver will return
 * a non-NULL URI which can be used to connect to the same
 * hypervisor later.
 *
 * Returns the URI string which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
1662
virConnectGetURI(virConnectPtr conn)
1663
{
1664
    char *name;
1665
    VIR_DEBUG("conn=%p", conn);
1666

1667 1668
    virResetLastError();

1669
    virCheckConnectReturn(conn, NULL);
1670

1671
    if (!(name = virURIFormat(conn->uri)))
1672
        goto error;
1673

1674
    return name;
1675 1676

error:
1677
    virDispatchError(conn);
1678
    return NULL;
1679 1680
}

1681

E
Eric Blake 已提交
1682 1683 1684
/**
 * virConnectGetSysinfo:
 * @conn: pointer to a hypervisor connection
1685
 * @flags: extra flags; not used yet, so callers should always pass 0
E
Eric Blake 已提交
1686 1687 1688 1689 1690 1691 1692 1693 1694 1695
 *
 * This returns the XML description of the sysinfo details for the
 * host on which the hypervisor is running, in the same format as the
 * <sysinfo> element of a domain XML.  This information is generally
 * available only for hypervisors running with root privileges.
 *
 * Returns the XML string which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
1696
virConnectGetSysinfo(virConnectPtr conn, unsigned int flags)
E
Eric Blake 已提交
1697
{
E
Eric Blake 已提交
1698
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
E
Eric Blake 已提交
1699 1700 1701

    virResetLastError();

1702
    virCheckConnectReturn(conn, NULL);
E
Eric Blake 已提交
1703

1704 1705
    if (conn->driver->connectGetSysinfo) {
        char *ret = conn->driver->connectGetSysinfo(conn, flags);
E
Eric Blake 已提交
1706 1707 1708 1709 1710
        if (!ret)
            goto error;
        return ret;
    }

1711
    virReportUnsupportedError();
E
Eric Blake 已提交
1712 1713 1714 1715 1716 1717

error:
    virDispatchError(conn);
    return NULL;
}

1718

1719 1720 1721 1722 1723
/**
 * virConnectGetMaxVcpus:
 * @conn: pointer to the hypervisor connection
 * @type: value of the 'type' attribute in the <domain> element
 *
1724
 * Provides the maximum number of virtual CPUs supported for a guest VM of a
1725 1726 1727 1728 1729 1730 1731 1732 1733
 * specific type. The 'type' parameter here corresponds to the 'type'
 * attribute in the <domain> element of the XML.
 *
 * Returns the maximum of virtual CPU or -1 in case of error.
 */
int
virConnectGetMaxVcpus(virConnectPtr conn,
                      const char *type)
{
1734
    VIR_DEBUG("conn=%p, type=%s", conn, type);
1735

1736 1737
    virResetLastError();

1738
    virCheckConnectReturn(conn, -1);
1739

1740 1741
    if (conn->driver->connectGetMaxVcpus) {
        int ret = conn->driver->connectGetMaxVcpus(conn, type);
1742 1743 1744 1745
        if (ret < 0)
            goto error;
        return ret;
    }
1746

1747
    virReportUnsupportedError();
1748
error:
1749
    virDispatchError(conn);
1750
    return -1;
1751 1752
}

1753

1754
/**
1755
 * virConnectListDomains:
1756 1757 1758 1759
 * @conn: pointer to the hypervisor connection
 * @ids: array to collect the list of IDs of active domains
 * @maxids: size of @ids
 *
1760
 * Collect the list of active domains, and store their IDs in array @ids
1761
 *
1762 1763 1764 1765 1766 1767 1768 1769
 * For inactive domains, see virConnectListDefinedDomains().  For more
 * control over the results, see virConnectListAllDomains().
 *
 * Returns the number of domains found or -1 in case of error.  Note that
 * this command is inherently racy; a domain can be started between a
 * call to virConnectNumOfDomains() and this call; you are only guaranteed
 * that all currently active domains were listed if the return is less
 * than @maxids.
1770 1771
 */
int
1772 1773
virConnectListDomains(virConnectPtr conn, int *ids, int maxids)
{
1774
    VIR_DEBUG("conn=%p, ids=%p, maxids=%d", conn, ids, maxids);
1775

1776 1777
    virResetLastError();

1778
    virCheckConnectReturn(conn, -1);
1779 1780
    virCheckNonNullArgGoto(ids, error);
    virCheckNonNegativeArgGoto(maxids, error);
1781

1782 1783
    if (conn->driver->connectListDomains) {
        int ret = conn->driver->connectListDomains(conn, ids, maxids);
1784 1785 1786 1787
        if (ret < 0)
            goto error;
        return ret;
    }
1788

1789
    virReportUnsupportedError();
1790
error:
1791
    virDispatchError(conn);
1792
    return -1;
D
Daniel Veillard 已提交
1793 1794
}

1795

K
 
Karel Zak 已提交
1796 1797 1798 1799
/**
 * virConnectNumOfDomains:
 * @conn: pointer to the hypervisor connection
 *
1800 1801
 * Provides the number of active domains.
 *
K
 
Karel Zak 已提交
1802 1803 1804
 * Returns the number of domain found or -1 in case of error
 */
int
1805 1806
virConnectNumOfDomains(virConnectPtr conn)
{
1807
    VIR_DEBUG("conn=%p", conn);
1808

1809 1810
    virResetLastError();

1811
    virCheckConnectReturn(conn, -1);
K
Karel Zak 已提交
1812

1813 1814
    if (conn->driver->connectNumOfDomains) {
        int ret = conn->driver->connectNumOfDomains(conn);
1815 1816 1817 1818
        if (ret < 0)
            goto error;
        return ret;
    }
1819

1820
    virReportUnsupportedError();
1821
error:
1822
    virDispatchError(conn);
1823
    return -1;
K
 
Karel Zak 已提交
1824 1825
}

1826

1827 1828 1829 1830
/**
 * virDomainGetConnect:
 * @dom: pointer to a domain
 *
1831
 * Provides the connection pointer associated with a domain.  The
1832 1833 1834
 * reference counter on the connection is not increased by this
 * call.
 *
1835 1836 1837 1838
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the domain object together.
 *
1839 1840 1841
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
1842
virDomainGetConnect(virDomainPtr dom)
1843
{
1844
    VIR_DOMAIN_DEBUG(dom);
1845

1846 1847
    virResetLastError();

1848 1849
    virCheckDomainReturn(dom, NULL);

1850 1851 1852
    return dom->conn;
}

1853

D
Daniel Veillard 已提交
1854
/**
1855
 * virDomainCreateXML:
D
Daniel Veillard 已提交
1856
 * @conn: pointer to the hypervisor connection
D
Daniel Veillard 已提交
1857
 * @xmlDesc: string containing an XML description of the domain
1858
 * @flags: bitwise-OR of supported virDomainCreateFlags
D
Daniel Veillard 已提交
1859
 *
1860
 * Launch a new guest domain, based on an XML description similar
1861
 * to the one returned by virDomainGetXMLDesc()
1862
 * This function may require privileged access to the hypervisor.
1863 1864 1865
 * The domain is not persistent, so its definition will disappear when it
 * is destroyed, or if the host is restarted (see virDomainDefineXML() to
 * define persistent domains).
1866
 *
1867 1868 1869 1870 1871 1872 1873
 * If the VIR_DOMAIN_START_PAUSED flag is set, the guest domain
 * will be started, but its CPUs will remain paused. The CPUs
 * can later be manually started using virDomainResume.
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
E
Eric Blake 已提交
1874
 * client application crashes / loses its connection to the
1875
 * libvirtd daemon. Any domains marked for auto destroy will
1876
 * block attempts at migration, save-to-file, or snapshots.
1877
 *
D
Daniel Veillard 已提交
1878 1879
 * Returns a new domain object or NULL in case of failure
 */
1880
virDomainPtr
1881 1882
virDomainCreateXML(virConnectPtr conn, const char *xmlDesc,
                   unsigned int flags)
1883
{
1884
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
1885

1886 1887
    virResetLastError();

1888
    virCheckConnectReturn(conn, NULL);
1889
    virCheckNonNullArgGoto(xmlDesc, error);
1890
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
1891

1892 1893
    if (conn->driver->domainCreateXML) {
        virDomainPtr ret;
1894
        ret = conn->driver->domainCreateXML(conn, xmlDesc, flags);
1895 1896 1897 1898
        if (!ret)
            goto error;
        return ret;
    }
1899

1900
    virReportUnsupportedError();
1901
error:
1902
    virDispatchError(conn);
1903
    return NULL;
D
Daniel Veillard 已提交
1904 1905
}

1906

1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952
/**
 * virDomainCreateXMLWithFiles:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: string containing an XML description of the domain
 * @nfiles: number of file descriptors passed
 * @files: list of file descriptors passed
 * @flags: bitwise-OR of supported virDomainCreateFlags
 *
 * Launch a new guest domain, based on an XML description similar
 * to the one returned by virDomainGetXMLDesc()
 * This function may require privileged access to the hypervisor.
 * The domain is not persistent, so its definition will disappear when it
 * is destroyed, or if the host is restarted (see virDomainDefineXML() to
 * define persistent domains).
 *
 * @files provides an array of file descriptors which will be
 * made available to the 'init' process of the guest. The file
 * handles exposed to the guest will be renumbered to start
 * from 3 (ie immediately following stderr). This is only
 * supported for guests which use container based virtualization
 * technology.
 *
 * If the VIR_DOMAIN_START_PAUSED flag is set, the guest domain
 * will be started, but its CPUs will remain paused. The CPUs
 * can later be manually started using virDomainResume.
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
 * client application crashes / loses its connection to the
 * libvirtd daemon. Any domains marked for auto destroy will
 * block attempts at migration, save-to-file, or snapshots.
 *
 * Returns a new domain object or NULL in case of failure
 */
virDomainPtr
virDomainCreateXMLWithFiles(virConnectPtr conn, const char *xmlDesc,
                            unsigned int nfiles,
                            int *files,
                            unsigned int flags)
{
    VIR_DEBUG("conn=%p, xmlDesc=%s, nfiles=%u, files=%p, flags=%x",
              conn, xmlDesc, nfiles, files, flags);

    virResetLastError();

1953
    virCheckConnectReturn(conn, NULL);
1954
    virCheckNonNullArgGoto(xmlDesc, error);
1955
    virCheckReadOnlyGoto(conn->flags, error);
1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966

    if (conn->driver->domainCreateXMLWithFiles) {
        virDomainPtr ret;
        ret = conn->driver->domainCreateXMLWithFiles(conn, xmlDesc,
                                                     nfiles, files,
                                                     flags);
        if (!ret)
            goto error;
        return ret;
    }

1967
    virReportUnsupportedError();
1968 1969 1970 1971 1972
error:
    virDispatchError(conn);
    return NULL;
}

1973

1974 1975 1976 1977
/**
 * virDomainCreateLinux:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: string containing an XML description of the domain
1978
 * @flags: extra flags; not used yet, so callers should always pass 0
1979 1980 1981
 *
 * Deprecated after 0.4.6.
 * Renamed to virDomainCreateXML() providing identical functionality.
1982
 * This existing name will left indefinitely for API compatibility.
1983 1984 1985 1986 1987 1988 1989
 *
 * Returns a new domain object or NULL in case of failure
 */
virDomainPtr
virDomainCreateLinux(virConnectPtr conn, const char *xmlDesc,
                     unsigned int flags)
{
1990
    return virDomainCreateXML(conn, xmlDesc, flags);
1991
}
1992

1993

1994
/**
1995
 * virDomainLookupByID:
1996 1997 1998 1999
 * @conn: pointer to the hypervisor connection
 * @id: the domain ID number
 *
 * Try to find a domain based on the hypervisor ID number
D
Daniel Veillard 已提交
2000 2001
 * Note that this won't work for inactive domains which have an ID of -1,
 * in that case a lookup based on the Name or UUId need to be done instead.
2002
 *
2003 2004
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
2005
 */
2006
virDomainPtr
2007 2008
virDomainLookupByID(virConnectPtr conn, int id)
{
2009
    VIR_DEBUG("conn=%p, id=%d", conn, id);
2010

2011 2012
    virResetLastError();

2013
    virCheckConnectReturn(conn, NULL);
2014
    virCheckNonNegativeArgGoto(id, error);
2015

2016 2017
    if (conn->driver->domainLookupByID) {
        virDomainPtr ret;
2018
        ret = conn->driver->domainLookupByID(conn, id);
2019 2020 2021 2022
        if (!ret)
            goto error;
        return ret;
    }
2023

2024
    virReportUnsupportedError();
2025 2026

error:
2027
    virDispatchError(conn);
2028
    return NULL;
2029 2030
}

2031

2032 2033 2034
/**
 * virDomainLookupByUUID:
 * @conn: pointer to the hypervisor connection
K
Karel Zak 已提交
2035
 * @uuid: the raw UUID for the domain
2036 2037 2038
 *
 * Try to lookup a domain on the given hypervisor based on its UUID.
 *
2039 2040
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
2041 2042
 */
virDomainPtr
2043 2044
virDomainLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
{
2045
    VIR_UUID_DEBUG(conn, uuid);
2046

2047 2048
    virResetLastError();

2049
    virCheckConnectReturn(conn, NULL);
2050
    virCheckNonNullArgGoto(uuid, error);
2051

2052 2053
    if (conn->driver->domainLookupByUUID) {
        virDomainPtr ret;
2054
        ret = conn->driver->domainLookupByUUID(conn, uuid);
2055 2056 2057 2058
        if (!ret)
            goto error;
        return ret;
    }
2059

2060
    virReportUnsupportedError();
2061 2062

error:
2063
    virDispatchError(conn);
2064
    return NULL;
2065 2066
}

2067

K
Karel Zak 已提交
2068 2069 2070 2071 2072 2073 2074
/**
 * virDomainLookupByUUIDString:
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the domain
 *
 * Try to lookup a domain on the given hypervisor based on its UUID.
 *
2075 2076
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
K
Karel Zak 已提交
2077 2078 2079 2080
 */
virDomainPtr
virDomainLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
2081
    unsigned char uuid[VIR_UUID_BUFLEN];
2082
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
2083

2084 2085
    virResetLastError();

2086
    virCheckConnectReturn(conn, NULL);
2087
    virCheckNonNullArgGoto(uuidstr, error);
2088 2089

    if (virUUIDParse(uuidstr, uuid) < 0) {
2090 2091 2092
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
2093
        goto error;
K
Karel Zak 已提交
2094
    }
2095

K
Karel Zak 已提交
2096
    return virDomainLookupByUUID(conn, &uuid[0]);
2097 2098

error:
2099
    virDispatchError(conn);
2100
    return NULL;
K
Karel Zak 已提交
2101 2102
}

2103

2104 2105 2106 2107 2108
/**
 * virDomainLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the domain
 *
2109
 * Try to lookup a domain on the given hypervisor based on its name.
2110
 *
2111 2112
 * Returns a new domain object or NULL in case of failure.  If the
 * domain cannot be found, then VIR_ERR_NO_DOMAIN error is raised.
2113 2114
 */
virDomainPtr
2115 2116
virDomainLookupByName(virConnectPtr conn, const char *name)
{
2117
    VIR_DEBUG("conn=%p, name=%s", conn, name);
2118

2119 2120
    virResetLastError();

2121
    virCheckConnectReturn(conn, NULL);
2122
    virCheckNonNullArgGoto(name, error);
2123

2124 2125
    if (conn->driver->domainLookupByName) {
        virDomainPtr dom;
2126
        dom = conn->driver->domainLookupByName(conn, name);
2127 2128 2129 2130
        if (!dom)
            goto error;
        return dom;
    }
2131

2132
    virReportUnsupportedError();
2133 2134

error:
2135
    virDispatchError(conn);
2136
    return NULL;
2137 2138
}

2139

D
Daniel Veillard 已提交
2140
/**
2141
 * virDomainDestroy:
D
Daniel Veillard 已提交
2142 2143 2144
 * @domain: a domain object
 *
 * Destroy the domain object. The running instance is shutdown if not down
2145 2146
 * already and all resources used by it are given back to the hypervisor. This
 * does not free the associated virDomainPtr object.
2147
 * This function may require privileged access.
D
Daniel Veillard 已提交
2148
 *
2149 2150
 * virDomainDestroy first requests that a guest terminate
 * (e.g. SIGTERM), then waits for it to comply. After a reasonable
2151
 * timeout, if the guest still exists, virDomainDestroy will
2152 2153 2154 2155 2156 2157
 * forcefully terminate the guest (e.g. SIGKILL) if necessary (which
 * may produce undesirable results, for example unflushed disk cache
 * in the guest). To avoid this possibility, it's recommended to
 * instead call virDomainDestroyFlags, sending the
 * VIR_DOMAIN_DESTROY_GRACEFUL flag.
 *
2158 2159 2160 2161
 * If the domain is transient and has any snapshot metadata (see
 * virDomainSnapshotNum()), then that metadata will automatically
 * be deleted when the domain quits.
 *
D
Daniel Veillard 已提交
2162
 * Returns 0 in case of success and -1 in case of failure.
2163
 */
D
Daniel Veillard 已提交
2164
int
2165 2166
virDomainDestroy(virDomainPtr domain)
{
2167
    virConnectPtr conn;
2168

2169
    VIR_DOMAIN_DEBUG(domain);
2170

2171 2172
    virResetLastError();

2173
    virCheckDomainReturn(domain, -1);
2174
    conn = domain->conn;
2175

2176
    virCheckReadOnlyGoto(conn->flags, error);
2177

2178 2179
    if (conn->driver->domainDestroy) {
        int ret;
2180
        ret = conn->driver->domainDestroy(domain);
2181 2182 2183 2184
        if (ret < 0)
            goto error;
        return ret;
    }
2185

2186
    virReportUnsupportedError();
2187 2188

error:
2189
    virDispatchError(conn);
2190
    return -1;
2191 2192
}

2193

2194 2195 2196
/**
 * virDomainDestroyFlags:
 * @domain: a domain object
2197
 * @flags: bitwise-OR of virDomainDestroyFlagsValues
2198 2199 2200 2201 2202 2203
 *
 * Destroy the domain object. The running instance is shutdown if not down
 * already and all resources used by it are given back to the hypervisor.
 * This does not free the associated virDomainPtr object.
 * This function may require privileged access.
 *
2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219
 * Calling this function with no @flags set (equal to zero) is
 * equivalent to calling virDomainDestroy, and after a reasonable
 * timeout will forcefully terminate the guest (e.g. SIGKILL) if
 * necessary (which may produce undesirable results, for example
 * unflushed disk cache in the guest). Including
 * VIR_DOMAIN_DESTROY_GRACEFUL in the flags will prevent the forceful
 * termination of the guest, and virDomainDestroyFlags will instead
 * return an error if the guest doesn't terminate by the end of the
 * timeout; at that time, the management application can decide if
 * calling again without VIR_DOMAIN_DESTROY_GRACEFUL is appropriate.
 *
 * Another alternative which may produce cleaner results for the
 * guest's disks is to use virDomainShutdown() instead, but that
 * depends on guest support (some hypervisor/guest combinations may
 * ignore the shutdown request).
 *
2220 2221 2222 2223 2224 2225 2226 2227 2228
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainDestroyFlags(virDomainPtr domain,
                      unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
2229
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
2230 2231 2232

    virResetLastError();

2233
    virCheckDomainReturn(domain, -1);
2234
    conn = domain->conn;
2235

2236
    virCheckReadOnlyGoto(conn->flags, error);
2237 2238 2239 2240 2241 2242 2243 2244 2245

    if (conn->driver->domainDestroyFlags) {
        int ret;
        ret = conn->driver->domainDestroyFlags(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

2246
    virReportUnsupportedError();
2247 2248 2249 2250 2251 2252

error:
    virDispatchError(conn);
    return -1;
}

2253

2254 2255 2256 2257 2258 2259 2260 2261 2262 2263
/**
 * virDomainFree:
 * @domain: a domain object
 *
 * Free the domain object. The running instance is kept alive.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2264 2265
virDomainFree(virDomainPtr domain)
{
2266
    VIR_DOMAIN_DEBUG(domain);
2267

2268 2269
    virResetLastError();

2270 2271
    virCheckDomainReturn(domain, -1);

2272
    virObjectUnref(domain);
2273
    return 0;
D
Daniel Veillard 已提交
2274 2275
}

2276

2277 2278
/**
 * virDomainRef:
D
Daniel Veillard 已提交
2279
 * @domain: the domain to hold a reference on
2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290
 *
 * Increment the reference count on the domain. For each
 * additional call to this method, there shall be a corresponding
 * call to virDomainFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a domain would increment
 * the reference count.
D
Daniel Veillard 已提交
2291 2292
 *
 * Returns 0 in case of success and -1 in case of failure.
2293 2294 2295 2296
 */
int
virDomainRef(virDomainPtr domain)
{
2297 2298
    VIR_DOMAIN_DEBUG(domain, "refs=%d", domain ? domain->object.u.s.refs : 0);

2299 2300
    virResetLastError();

2301
    virCheckDomainReturn(domain, -1);
2302 2303

    virObjectRef(domain);
2304 2305 2306 2307
    return 0;
}


D
Daniel Veillard 已提交
2308
/**
2309
 * virDomainSuspend:
D
Daniel Veillard 已提交
2310 2311 2312
 * @domain: a domain object
 *
 * Suspends an active domain, the process is frozen without further access
2313
 * to CPU resources and I/O but the memory used by the domain at the
2314
 * hypervisor level will stay allocated. Use virDomainResume() to reactivate
D
Daniel Veillard 已提交
2315
 * the domain.
2316
 * This function may require privileged access.
2317 2318
 * Moreover, suspend may not be supported if domain is in some
 * special state like VIR_DOMAIN_PMSUSPENDED.
D
Daniel Veillard 已提交
2319 2320 2321 2322
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2323 2324
virDomainSuspend(virDomainPtr domain)
{
2325
    virConnectPtr conn;
2326

2327
    VIR_DOMAIN_DEBUG(domain);
2328

2329 2330
    virResetLastError();

2331
    virCheckDomainReturn(domain, -1);
2332 2333
    conn = domain->conn;

2334 2335
    virCheckReadOnlyGoto(conn->flags, error);

2336 2337
    if (conn->driver->domainSuspend) {
        int ret;
2338
        ret = conn->driver->domainSuspend(domain);
2339 2340 2341 2342
        if (ret < 0)
            goto error;
        return ret;
    }
2343

2344
    virReportUnsupportedError();
2345 2346

error:
2347
    virDispatchError(domain->conn);
2348
    return -1;
D
Daniel Veillard 已提交
2349 2350
}

2351

D
Daniel Veillard 已提交
2352
/**
2353
 * virDomainResume:
D
Daniel Veillard 已提交
2354 2355
 * @domain: a domain object
 *
D
Dan Kenigsberg 已提交
2356
 * Resume a suspended domain, the process is restarted from the state where
2357
 * it was frozen by calling virDomainSuspend().
2358
 * This function may require privileged access
2359 2360
 * Moreover, resume may not be supported if domain is in some
 * special state like VIR_DOMAIN_PMSUSPENDED.
D
Daniel Veillard 已提交
2361 2362 2363 2364
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2365 2366
virDomainResume(virDomainPtr domain)
{
2367
    virConnectPtr conn;
2368

2369
    VIR_DOMAIN_DEBUG(domain);
2370

2371 2372
    virResetLastError();

2373
    virCheckDomainReturn(domain, -1);
2374 2375
    conn = domain->conn;

2376 2377
    virCheckReadOnlyGoto(conn->flags, error);

2378 2379
    if (conn->driver->domainResume) {
        int ret;
2380
        ret = conn->driver->domainResume(domain);
2381 2382 2383 2384
        if (ret < 0)
            goto error;
        return ret;
    }
2385

2386
    virReportUnsupportedError();
2387 2388

error:
2389
    virDispatchError(domain->conn);
2390
    return -1;
D
Daniel Veillard 已提交
2391 2392
}

2393

2394 2395 2396
/**
 * virDomainPMSuspendForDuration:
 * @dom: a domain object
2397 2398 2399
 * @target: a value from virNodeSuspendTarget
 * @duration: duration in seconds to suspend, or 0 for indefinite
 * @flags: extra flags; not used yet, so callers should always pass 0
2400
 *
2401 2402 2403 2404 2405
 * Attempt to have the guest enter the given @target power management
 * suspension level.  If @duration is non-zero, also schedule the guest to
 * resume normal operation after that many seconds, if nothing else has
 * resumed it earlier.  Some hypervisors require that @duration be 0, for
 * an indefinite suspension.
2406
 *
2407
 * Dependent on hypervisor used, this may require a
2408 2409
 * guest agent to be available, e.g. QEMU.
 *
2410 2411 2412 2413 2414 2415 2416
 * Beware that at least for QEMU, the domain's process will be terminated
 * when VIR_NODE_SUSPEND_TARGET_DISK is used and a new process will be
 * launched when libvirt is asked to wake up the domain. As a result of
 * this, any runtime changes, such as device hotplug or memory settings,
 * are lost unless such changes were made with VIR_DOMAIN_AFFECT_CONFIG
 * flag.
 *
2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432
 * Returns: 0 on success,
 *          -1 on failure.
 */
int
virDomainPMSuspendForDuration(virDomainPtr dom,
                              unsigned int target,
                              unsigned long long duration,
                              unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "target=%u duration=%llu flags=%x",
                     target, duration, flags);

    virResetLastError();

2433
    virCheckDomainReturn(dom, -1);
2434 2435
    conn = dom->conn;

2436
    virCheckReadOnlyGoto(conn->flags, error);
2437 2438 2439 2440 2441 2442 2443 2444 2445 2446

    if (conn->driver->domainPMSuspendForDuration) {
        int ret;
        ret = conn->driver->domainPMSuspendForDuration(dom, target,
                                                       duration, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

2447
    virReportUnsupportedError();
2448 2449 2450 2451 2452 2453

error:
    virDispatchError(conn);
    return -1;
}

2454

2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476
/**
 * virDomainPMWakeup:
 * @dom: a domain object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Inject a wakeup into the guest that previously used
 * virDomainPMSuspendForDuration, rather than waiting for the
 * previously requested duration (if any) to elapse.
 *
 * Returns: 0 on success,
 *          -1 on failure.
 */
int
virDomainPMWakeup(virDomainPtr dom,
                  unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);

    virResetLastError();

2477
    virCheckDomainReturn(dom, -1);
2478 2479
    conn = dom->conn;

2480
    virCheckReadOnlyGoto(conn->flags, error);
2481 2482 2483 2484 2485 2486 2487 2488 2489

    if (conn->driver->domainPMWakeup) {
        int ret;
        ret = conn->driver->domainPMWakeup(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

2490
    virReportUnsupportedError();
2491 2492 2493 2494 2495 2496

error:
    virDispatchError(conn);
    return -1;
}

2497

2498 2499 2500 2501 2502 2503
/**
 * virDomainSave:
 * @domain: a domain object
 * @to: path for the output file
 *
 * This method will suspend a domain and save its memory contents to
2504
 * a file on disk. After the call, if successful, the domain is not
2505
 * listed as running anymore (this ends the life of a transient domain).
2506
 * Use virDomainRestore() to restore a domain after saving.
2507
 *
2508 2509 2510
 * See virDomainSaveFlags() for more control.  Also, a save file can
 * be inspected or modified slightly with virDomainSaveImageGetXMLDesc()
 * and virDomainSaveImageDefineXML().
2511
 *
2512 2513 2514
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2515 2516
virDomainSave(virDomainPtr domain, const char *to)
{
2517
    virConnectPtr conn;
2518 2519

    VIR_DOMAIN_DEBUG(domain, "to=%s", to);
2520

2521 2522
    virResetLastError();

2523
    virCheckDomainReturn(domain, -1);
2524
    conn = domain->conn;
2525 2526

    virCheckReadOnlyGoto(conn->flags, error);
2527
    virCheckNonNullArgGoto(to, error);
2528

2529 2530 2531
    if (conn->driver->domainSave) {
        int ret;
        char *absolute_to;
2532

2533 2534
        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
2535 2536
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute output file path"));
2537 2538
            goto error;
        }
2539

2540 2541 2542
        ret = conn->driver->domainSave(domain, absolute_to);

        VIR_FREE(absolute_to);
2543

2544 2545 2546 2547
        if (ret < 0)
            goto error;
        return ret;
    }
2548

2549
    virReportUnsupportedError();
2550 2551

error:
2552
    virDispatchError(domain->conn);
2553
    return -1;
2554 2555
}

2556

2557 2558 2559 2560 2561 2562 2563 2564 2565
/**
 * virDomainSaveFlags:
 * @domain: a domain object
 * @to: path for the output file
 * @dxml: (optional) XML config for adjusting guest xml used on restore
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
 *
 * This method will suspend a domain and save its memory contents to
 * a file on disk. After the call, if successful, the domain is not
2566
 * listed as running anymore (this ends the life of a transient domain).
2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579 2580
 * Use virDomainRestore() to restore a domain after saving.
 *
 * If the hypervisor supports it, @dxml can be used to alter
 * host-specific portions of the domain XML that will be used when
 * restoring an image.  For example, it is possible to alter the
 * backing filename that is associated with a disk device, in order to
 * prepare for file renaming done as part of backing up the disk
 * device while the domain is stopped.
 *
 * If @flags includes VIR_DOMAIN_SAVE_BYPASS_CACHE, then libvirt will
 * attempt to bypass the file system cache while creating the file, or
 * fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
2581 2582 2583 2584 2585 2586
 * Normally, the saved state file will remember whether the domain was
 * running or paused, and restore defaults to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override what state gets saved into the file.  These
 * two flags are mutually exclusive.
 *
2587 2588 2589
 * A save file can be inspected or modified slightly with
 * virDomainSaveImageGetXMLDesc() and virDomainSaveImageDefineXML().
 *
E
Eric Blake 已提交
2590 2591 2592 2593
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation; in that case, use virDomainBlockJobAbort()
 * to stop the block copy first.
 *
2594 2595 2596 2597 2598 2599 2600 2601
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSaveFlags(virDomainPtr domain, const char *to,
                   const char *dxml, unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
2602
    VIR_DOMAIN_DEBUG(domain, "to=%s, dxml=%s, flags=%x",
2603 2604 2605 2606
                     to, NULLSTR(dxml), flags);

    virResetLastError();

2607
    virCheckDomainReturn(domain, -1);
2608
    conn = domain->conn;
2609 2610

    virCheckReadOnlyGoto(conn->flags, error);
2611
    virCheckNonNullArgGoto(to, error);
2612

2613
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
2614
        virReportInvalidArg(flags, "%s",
2615 2616
                            _("running and paused flags are mutually "
                              "exclusive"));
2617 2618 2619
        goto error;
    }

2620 2621 2622 2623 2624 2625
    if (conn->driver->domainSaveFlags) {
        int ret;
        char *absolute_to;

        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
2626 2627
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute output file path"));
2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639
            goto error;
        }

        ret = conn->driver->domainSaveFlags(domain, absolute_to, dxml, flags);

        VIR_FREE(absolute_to);

        if (ret < 0)
            goto error;
        return ret;
    }

2640
    virReportUnsupportedError();
2641 2642 2643 2644 2645 2646

error:
    virDispatchError(domain->conn);
    return -1;
}

2647

2648 2649
/**
 * virDomainRestore:
2650
 * @conn: pointer to the hypervisor connection
2651
 * @from: path to the input file
2652 2653 2654
 *
 * This method will restore a domain saved to disk by virDomainSave().
 *
2655 2656
 * See virDomainRestoreFlags() for more control.
 *
2657 2658 2659
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2660 2661
virDomainRestore(virConnectPtr conn, const char *from)
{
2662
    VIR_DEBUG("conn=%p, from=%s", conn, from);
2663

2664 2665
    virResetLastError();

2666
    virCheckConnectReturn(conn, -1);
2667
    virCheckReadOnlyGoto(conn->flags, error);
2668
    virCheckNonNullArgGoto(from, error);
D
Daniel Veillard 已提交
2669

2670 2671 2672
    if (conn->driver->domainRestore) {
        int ret;
        char *absolute_from;
2673

2674 2675
        /* We must absolutize the file path as the restore is done out of process */
        if (virFileAbsPath(from, &absolute_from) < 0) {
2676 2677
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2678 2679
            goto error;
        }
2680

2681 2682 2683 2684
        ret = conn->driver->domainRestore(conn, absolute_from);

        VIR_FREE(absolute_from);

2685 2686 2687 2688
        if (ret < 0)
            goto error;
        return ret;
    }
2689

2690
    virReportUnsupportedError();
2691 2692

error:
2693
    virDispatchError(conn);
2694
    return -1;
D
Daniel Veillard 已提交
2695 2696
}

2697

2698 2699 2700 2701 2702 2703 2704 2705 2706 2707 2708 2709 2710 2711 2712 2713 2714 2715 2716
/**
 * virDomainRestoreFlags:
 * @conn: pointer to the hypervisor connection
 * @from: path to the input file
 * @dxml: (optional) XML config for adjusting guest xml used on restore
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
 *
 * This method will restore a domain saved to disk by virDomainSave().
 *
 * If the hypervisor supports it, @dxml can be used to alter
 * host-specific portions of the domain XML that will be used when
 * restoring an image.  For example, it is possible to alter the
 * backing filename that is associated with a disk device, in order to
 * prepare for file renaming done as part of backing up the disk
 * device while the domain is stopped.
 *
 * If @flags includes VIR_DOMAIN_SAVE_BYPASS_CACHE, then libvirt will
 * attempt to bypass the file system cache while restoring the file, or
 * fail if it cannot do so for the given system; this can allow less
2717
 * pressure on file system cache, but also risks slowing restores from NFS.
2718
 *
2719 2720 2721 2722 2723 2724
 * Normally, the saved state file will remember whether the domain was
 * running or paused, and restore defaults to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override the default read from the file.  These two
 * flags are mutually exclusive.
 *
2725 2726 2727 2728
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainRestoreFlags(virConnectPtr conn, const char *from, const char *dxml,
2729
                      unsigned int flags)
2730 2731 2732 2733 2734 2735
{
    VIR_DEBUG("conn=%p, from=%s, dxml=%s, flags=%x",
              conn, from, NULLSTR(dxml), flags);

    virResetLastError();

2736
    virCheckConnectReturn(conn, -1);
2737
    virCheckReadOnlyGoto(conn->flags, error);
2738
    virCheckNonNullArgGoto(from, error);
2739

2740
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
2741
        virReportInvalidArg(flags, "%s",
2742 2743
                            _("running and paused flags are mutually "
                              "exclusive"));
2744 2745 2746
        goto error;
    }

2747 2748 2749 2750 2751 2752
    if (conn->driver->domainRestoreFlags) {
        int ret;
        char *absolute_from;

        /* We must absolutize the file path as the restore is done out of process */
        if (virFileAbsPath(from, &absolute_from) < 0) {
2753 2754
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767
            goto error;
        }

        ret = conn->driver->domainRestoreFlags(conn, absolute_from, dxml,
                                               flags);

        VIR_FREE(absolute_from);

        if (ret < 0)
            goto error;
        return ret;
    }

2768
    virReportUnsupportedError();
2769 2770 2771 2772 2773 2774

error:
    virDispatchError(conn);
    return -1;
}

2775

2776 2777 2778 2779 2780 2781 2782 2783 2784 2785 2786 2787 2788 2789 2790 2791 2792 2793 2794 2795 2796 2797 2798 2799 2800 2801 2802
/**
 * virDomainSaveImageGetXMLDesc:
 * @conn: pointer to the hypervisor connection
 * @file: path to saved state file
 * @flags: bitwise-OR of subset of virDomainXMLFlags
 *
 * This method will extract the XML describing the domain at the time
 * a saved state file was created.  @file must be a file created
 * previously by virDomainSave() or virDomainSaveFlags().
 *
 * No security-sensitive data will be included unless @flags contains
 * VIR_DOMAIN_XML_SECURE; this flag is rejected on read-only
 * connections.  For this API, @flags should not contain either
 * VIR_DOMAIN_XML_INACTIVE or VIR_DOMAIN_XML_UPDATE_CPU.
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of
 * error.  The caller must free() the returned value.
 */
char *
virDomainSaveImageGetXMLDesc(virConnectPtr conn, const char *file,
                             unsigned int flags)
{
    VIR_DEBUG("conn=%p, file=%s, flags=%x",
              conn, file, flags);

    virResetLastError();

2803
    virCheckConnectReturn(conn, NULL);
2804
    virCheckNonNullArgGoto(file, error);
2805 2806

    if ((conn->flags & VIR_CONNECT_RO) && (flags & VIR_DOMAIN_XML_SECURE)) {
2807 2808
        virReportError(VIR_ERR_OPERATION_DENIED, "%s",
                       _("virDomainSaveImageGetXMLDesc with secure flag"));
2809 2810 2811 2812 2813 2814 2815 2816 2817
        goto error;
    }

    if (conn->driver->domainSaveImageGetXMLDesc) {
        char *ret;
        char *absolute_file;

        /* We must absolutize the file path as the read is done out of process */
        if (virFileAbsPath(file, &absolute_file) < 0) {
2818 2819
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2820 2821 2822 2823 2824 2825 2826 2827 2828 2829 2830 2831 2832
            goto error;
        }

        ret = conn->driver->domainSaveImageGetXMLDesc(conn, absolute_file,
                                                      flags);

        VIR_FREE(absolute_file);

        if (!ret)
            goto error;
        return ret;
    }

2833
    virReportUnsupportedError();
2834 2835 2836 2837 2838 2839

error:
    virDispatchError(conn);
    return NULL;
}

2840

2841 2842 2843 2844 2845
/**
 * virDomainSaveImageDefineXML:
 * @conn: pointer to the hypervisor connection
 * @file: path to saved state file
 * @dxml: XML config for adjusting guest xml used on restore
2846
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
2847 2848 2849 2850 2851 2852 2853 2854 2855 2856 2857
 *
 * This updates the definition of a domain stored in a saved state
 * file.  @file must be a file created previously by virDomainSave()
 * or virDomainSaveFlags().
 *
 * @dxml can be used to alter host-specific portions of the domain XML
 * that will be used when restoring an image.  For example, it is
 * possible to alter the backing filename that is associated with a
 * disk device, to match renaming done as part of backing up the disk
 * device while the domain is stopped.
 *
2858 2859 2860 2861 2862 2863 2864
 * Normally, the saved state file will remember whether the domain was
 * running or paused, and restore defaults to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override the default saved into the file; omitting both
 * leaves the file's default unchanged.  These two flags are mutually
 * exclusive.
 *
2865 2866 2867 2868 2869 2870 2871 2872 2873 2874 2875
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSaveImageDefineXML(virConnectPtr conn, const char *file,
                            const char *dxml, unsigned int flags)
{
    VIR_DEBUG("conn=%p, file=%s, dxml=%s, flags=%x",
              conn, file, dxml, flags);

    virResetLastError();

2876
    virCheckConnectReturn(conn, -1);
2877
    virCheckReadOnlyGoto(conn->flags, error);
2878 2879
    virCheckNonNullArgGoto(file, error);
    virCheckNonNullArgGoto(dxml, error);
2880

2881
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
2882
        virReportInvalidArg(flags, "%s",
2883 2884
                            _("running and paused flags are mutually "
                              "exclusive"));
2885 2886 2887
        goto error;
    }

2888 2889 2890 2891 2892 2893
    if (conn->driver->domainSaveImageDefineXML) {
        int ret;
        char *absolute_file;

        /* We must absolutize the file path as the read is done out of process */
        if (virFileAbsPath(file, &absolute_file) < 0) {
2894 2895
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute input file path"));
2896 2897 2898 2899 2900 2901 2902 2903 2904 2905 2906 2907 2908
            goto error;
        }

        ret = conn->driver->domainSaveImageDefineXML(conn, absolute_file,
                                                     dxml, flags);

        VIR_FREE(absolute_file);

        if (ret < 0)
            goto error;
        return ret;
    }

2909
    virReportUnsupportedError();
2910 2911 2912 2913 2914 2915

error:
    virDispatchError(conn);
    return -1;
}

2916

D
Daniel Veillard 已提交
2917 2918 2919 2920
/**
 * virDomainCoreDump:
 * @domain: a domain object
 * @to: path for the core file
2921
 * @flags: bitwise-OR of virDomainCoreDumpFlags
D
Daniel Veillard 已提交
2922 2923 2924
 *
 * This method will dump the core of a domain on a given file for analysis.
 * Note that for remote Xen Daemon the file path will be interpreted in
2925 2926
 * the remote host. Hypervisors may require  the user to manually ensure
 * proper permissions on the file named by @to.
D
Daniel Veillard 已提交
2927
 *
2928 2929 2930 2931
 * If @flags includes VIR_DUMP_CRASH, then leave the guest shut off with
 * a crashed state after the dump completes.  If @flags includes
 * VIR_DUMP_LIVE, then make the core dump while continuing to allow
 * the guest to run; otherwise, the guest is suspended during the dump.
2932 2933
 * VIR_DUMP_RESET flag forces reset of the quest after dump.
 * The above three flags are mutually exclusive.
2934 2935 2936 2937 2938 2939
 *
 * Additionally, if @flags includes VIR_DUMP_BYPASS_CACHE, then libvirt
 * will attempt to bypass the file system cache while creating the file,
 * or fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
D
Daniel Veillard 已提交
2940 2941 2942
 * Returns 0 in case of success and -1 in case of failure.
 */
int
2943
virDomainCoreDump(virDomainPtr domain, const char *to, unsigned int flags)
D
Daniel Veillard 已提交
2944 2945
{
    virConnectPtr conn;
2946

2947
    VIR_DOMAIN_DEBUG(domain, "to=%s, flags=%x", to, flags);
D
Daniel Veillard 已提交
2948

2949 2950
    virResetLastError();

2951
    virCheckDomainReturn(domain, -1);
D
Daniel Veillard 已提交
2952
    conn = domain->conn;
2953 2954

    virCheckReadOnlyGoto(conn->flags, error);
2955
    virCheckNonNullArgGoto(to, error);
D
Daniel Veillard 已提交
2956

2957
    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_LIVE)) {
2958 2959
        virReportInvalidArg(flags, "%s",
                            _("crash and live flags are mutually exclusive"));
2960 2961 2962
        goto error;
    }

2963
    if ((flags & VIR_DUMP_CRASH) && (flags & VIR_DUMP_RESET)) {
2964
        virReportInvalidArg(flags, "%s",
2965 2966 2967 2968 2969
                         _("crash and reset flags are mutually exclusive"));
        goto error;
    }

    if ((flags & VIR_DUMP_LIVE) && (flags & VIR_DUMP_RESET)) {
2970 2971
        virReportInvalidArg(flags, "%s",
                            _("live and reset flags are mutually exclusive"));
2972 2973 2974
        goto error;
    }

2975 2976 2977
    if (conn->driver->domainCoreDump) {
        int ret;
        char *absolute_to;
D
Daniel Veillard 已提交
2978

2979 2980
        /* We must absolutize the file path as the save is done out of process */
        if (virFileAbsPath(to, &absolute_to) < 0) {
2981 2982
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("could not build absolute core file path"));
2983 2984
            goto error;
        }
D
Daniel Veillard 已提交
2985

2986 2987 2988
        ret = conn->driver->domainCoreDump(domain, absolute_to, flags);

        VIR_FREE(absolute_to);
D
Daniel Veillard 已提交
2989

2990 2991 2992 2993
        if (ret < 0)
            goto error;
        return ret;
    }
2994

2995
    virReportUnsupportedError();
2996 2997

error:
2998
    virDispatchError(domain->conn);
2999
    return -1;
3000 3001
}

3002

3003 3004 3005 3006 3007
/**
 * virDomainScreenshot:
 * @domain: a domain object
 * @stream: stream to use as output
 * @screen: monitor ID to take screenshot from
3008
 * @flags: extra flags; not used yet, so callers should always pass 0
3009 3010 3011 3012 3013 3014 3015
 *
 * Take a screenshot of current domain console as a stream. The image format
 * is hypervisor specific. Moreover, some hypervisors supports multiple
 * displays per domain. These can be distinguished by @screen argument.
 *
 * This call sets up a stream; subsequent use of stream API is necessary
 * to transfer actual data, determine how much data is successfully
J
Ján Tomko 已提交
3016
 * transferred, and detect any errors.
3017 3018 3019 3020
 *
 * The screen ID is the sequential number of screen. In case of multiple
 * graphics cards, heads are enumerated before devices, e.g. having
 * two graphics cards, both with four heads, screen ID 5 addresses
3021
 * the second head on the second card.
3022 3023 3024 3025 3026 3027 3028 3029 3030 3031
 *
 * Returns a string representing the mime-type of the image format, or
 * NULL upon error. The caller must free() the returned value.
 */
char *
virDomainScreenshot(virDomainPtr domain,
                    virStreamPtr stream,
                    unsigned int screen,
                    unsigned int flags)
{
E
Eric Blake 已提交
3032
    VIR_DOMAIN_DEBUG(domain, "stream=%p, flags=%x", stream, flags);
3033 3034 3035

    virResetLastError();

3036
    virCheckDomainReturn(domain, NULL);
3037 3038 3039 3040 3041 3042 3043 3044
    virCheckStreamGoto(stream, error);
    virCheckReadOnlyGoto(domain->conn->flags, error);

    if (domain->conn != stream->conn) {
        virReportInvalidArg(stream,
                            _("stream in %s must match connection of domain '%s'"),
                            __FUNCTION__, domain->name);
        goto error;
3045 3046 3047
    }

    if (domain->conn->driver->domainScreenshot) {
3048
        char *ret;
3049 3050 3051 3052 3053 3054 3055 3056
        ret = domain->conn->driver->domainScreenshot(domain, stream,
                                                     screen, flags);

        if (ret == NULL)
            goto error;
        return ret;
    }

3057
    virReportUnsupportedError();
3058 3059 3060 3061 3062 3063

error:
    virDispatchError(domain->conn);
    return NULL;
}

3064

3065 3066 3067 3068
/**
 * virDomainShutdown:
 * @domain: a domain object
 *
3069
 * Shutdown a domain, the domain object is still usable thereafter, but
3070
 * the domain OS is being stopped. Note that the guest OS may ignore the
3071 3072 3073
 * request. Additionally, the hypervisor may check and support the domain
 * 'on_poweroff' XML setting resulting in a domain that reboots instead of
 * shutting down. For guests that react to a shutdown request, the differences
3074 3075 3076 3077
 * from virDomainDestroy() are that the guests disk storage will be in a
 * stable state rather than having the (virtual) power cord pulled, and
 * this command returns as soon as the shutdown request is issued rather
 * than blocking until the guest is no longer running.
3078
 *
3079 3080 3081
 * If the domain is transient and has any snapshot metadata (see
 * virDomainSnapshotNum()), then that metadata will automatically
 * be deleted when the domain quits.
3082 3083 3084 3085
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
3086 3087
virDomainShutdown(virDomainPtr domain)
{
3088
    virConnectPtr conn;
3089

3090
    VIR_DOMAIN_DEBUG(domain);
3091

3092 3093
    virResetLastError();

3094
    virCheckDomainReturn(domain, -1);
3095 3096
    conn = domain->conn;

3097 3098
    virCheckReadOnlyGoto(conn->flags, error);

3099 3100
    if (conn->driver->domainShutdown) {
        int ret;
3101
        ret = conn->driver->domainShutdown(domain);
3102 3103 3104 3105
        if (ret < 0)
            goto error;
        return ret;
    }
3106

3107
    virReportUnsupportedError();
3108 3109

error:
3110
    virDispatchError(domain->conn);
3111
    return -1;
3112 3113
}

3114

3115 3116 3117 3118 3119 3120 3121
/**
 * virDomainShutdownFlags:
 * @domain: a domain object
 * @flags: bitwise-OR of virDomainShutdownFlagValues
 *
 * Shutdown a domain, the domain object is still usable thereafter but
 * the domain OS is being stopped. Note that the guest OS may ignore the
3122 3123 3124
 * request. Additionally, the hypervisor may check and support the domain
 * 'on_poweroff' XML setting resulting in a domain that reboots instead of
 * shutting down. For guests that react to a shutdown request, the differences
3125 3126 3127 3128 3129 3130 3131 3132 3133 3134 3135
 * from virDomainDestroy() are that the guest's disk storage will be in a
 * stable state rather than having the (virtual) power cord pulled, and
 * this command returns as soon as the shutdown request is issued rather
 * than blocking until the guest is no longer running.
 *
 * If the domain is transient and has any snapshot metadata (see
 * virDomainSnapshotNum()), then that metadata will automatically
 * be deleted when the domain quits.
 *
 * If @flags is set to zero, then the hypervisor will choose the
 * method of shutdown it considers best. To have greater control
3136 3137 3138
 * pass one or more of the virDomainShutdownFlagValues. The order
 * in which the hypervisor tries each shutdown method is undefined,
 * and a hypervisor is not required to support all methods.
3139
 *
3140 3141 3142
 * To use guest agent (VIR_DOMAIN_SHUTDOWN_GUEST_AGENT) the domain XML
 * must have <channel> configured.
 *
3143 3144 3145 3146 3147 3148 3149
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainShutdownFlags(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;

3150
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
3151 3152 3153

    virResetLastError();

3154
    virCheckDomainReturn(domain, -1);
3155 3156
    conn = domain->conn;

3157 3158
    virCheckReadOnlyGoto(conn->flags, error);

3159 3160 3161 3162 3163 3164 3165 3166
    if (conn->driver->domainShutdownFlags) {
        int ret;
        ret = conn->driver->domainShutdownFlags(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3167
    virReportUnsupportedError();
3168 3169 3170 3171 3172 3173

error:
    virDispatchError(domain->conn);
    return -1;
}

3174

3175 3176 3177
/**
 * virDomainReboot:
 * @domain: a domain object
3178
 * @flags: bitwise-OR of virDomainRebootFlagValues
3179
 *
3180
 * Reboot a domain, the domain object is still usable thereafter, but
3181 3182
 * the domain OS is being stopped for a restart.
 * Note that the guest OS may ignore the request.
3183 3184 3185
 * Additionally, the hypervisor may check and support the domain
 * 'on_reboot' XML setting resulting in a domain that shuts down instead
 * of rebooting.
3186
 *
3187 3188
 * If @flags is set to zero, then the hypervisor will choose the
 * method of shutdown it considers best. To have greater control
3189
 * pass one or more of the virDomainRebootFlagValues. The order
3190 3191
 * in which the hypervisor tries each shutdown method is undefined,
 * and a hypervisor is not required to support all methods.
3192 3193 3194 3195
 *
 * To use guest agent (VIR_DOMAIN_REBOOT_GUEST_AGENT) the domain XML
 * must have <channel> configured.
 *
3196 3197 3198 3199 3200
 * Due to implementation limitations in some drivers (the qemu driver,
 * for instance) it is not advised to migrate or save a guest that is
 * rebooting as a result of this API. Migrating such a guest can lead
 * to a plain shutdown on the destination.
 *
3201 3202 3203 3204 3205
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainReboot(virDomainPtr domain, unsigned int flags)
{
3206
    virConnectPtr conn;
3207

3208
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
3209

3210 3211
    virResetLastError();

3212
    virCheckDomainReturn(domain, -1);
3213 3214
    conn = domain->conn;

3215 3216
    virCheckReadOnlyGoto(conn->flags, error);

3217 3218
    if (conn->driver->domainReboot) {
        int ret;
3219
        ret = conn->driver->domainReboot(domain, flags);
3220 3221 3222 3223
        if (ret < 0)
            goto error;
        return ret;
    }
3224

3225
    virReportUnsupportedError();
X
Xu He Jie 已提交
3226 3227 3228 3229 3230 3231

error:
    virDispatchError(domain->conn);
    return -1;
}

3232

X
Xu He Jie 已提交
3233 3234 3235
/**
 * virDomainReset:
 * @domain: a domain object
3236
 * @flags: extra flags; not used yet, so callers should always pass 0
X
Xu He Jie 已提交
3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255
 *
 * Reset a domain immediately without any guest OS shutdown.
 * Reset emulates the power reset button on a machine, where all
 * hardware sees the RST line set and reinitializes internal state.
 *
 * Note that there is a risk of data loss caused by reset without any
 * guest OS shutdown.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainReset(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);

    virResetLastError();

3256
    virCheckDomainReturn(domain, -1);
X
Xu He Jie 已提交
3257 3258
    conn = domain->conn;

3259 3260
    virCheckReadOnlyGoto(conn->flags, error);

X
Xu He Jie 已提交
3261 3262
    if (conn->driver->domainReset) {
        int ret;
3263
        ret = conn->driver->domainReset(domain, flags);
X
Xu He Jie 已提交
3264 3265 3266 3267 3268
        if (ret < 0)
            goto error;
        return ret;
    }

3269
    virReportUnsupportedError();
3270 3271

error:
3272
    virDispatchError(domain->conn);
3273
    return -1;
3274 3275
}

3276

3277
/**
3278
 * virDomainGetName:
3279 3280 3281 3282 3283 3284 3285 3286
 * @domain: a domain object
 *
 * Get the public name for that domain
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the domain object.
 */
const char *
3287 3288
virDomainGetName(virDomainPtr domain)
{
3289
    VIR_DEBUG("domain=%p", domain);
3290

3291 3292
    virResetLastError();

3293 3294
    virCheckDomainReturn(domain, NULL);

3295
    return domain->name;
3296 3297
}

3298

3299 3300 3301
/**
 * virDomainGetUUID:
 * @domain: a domain object
3302
 * @uuid: pointer to a VIR_UUID_BUFLEN bytes array
3303 3304 3305 3306 3307 3308
 *
 * Get the UUID for a domain
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
3309 3310
virDomainGetUUID(virDomainPtr domain, unsigned char *uuid)
{
3311
    VIR_DOMAIN_DEBUG(domain, "uuid=%p", uuid);
3312

3313 3314
    virResetLastError();

3315
    virCheckDomainReturn(domain, -1);
3316
    virCheckNonNullArgGoto(uuid, error);
D
Daniel Veillard 已提交
3317

3318 3319
    memcpy(uuid, &domain->uuid[0], VIR_UUID_BUFLEN);

3320
    return 0;
3321 3322 3323 3324

error:
    virDispatchError(domain->conn);
    return -1;
3325 3326
}

3327

K
Karel Zak 已提交
3328 3329 3330
/**
 * virDomainGetUUIDString:
 * @domain: a domain object
3331
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
K
Karel Zak 已提交
3332
 *
3333
 * Get the UUID for a domain as string. For more information about
K
Karel Zak 已提交
3334 3335 3336 3337 3338 3339 3340
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virDomainGetUUIDString(virDomainPtr domain, char *buf)
{
3341
    VIR_DOMAIN_DEBUG(domain, "buf=%p", buf);
3342

3343 3344
    virResetLastError();

3345
    virCheckDomainReturn(domain, -1);
3346
    virCheckNonNullArgGoto(buf, error);
3347

E
Eric Blake 已提交
3348
    virUUIDFormat(domain->uuid, buf);
3349
    return 0;
3350 3351

error:
3352
    virDispatchError(domain->conn);
3353
    return -1;
K
Karel Zak 已提交
3354 3355
}

3356

3357
/**
3358
 * virDomainGetID:
3359 3360 3361 3362 3363 3364 3365
 * @domain: a domain object
 *
 * Get the hypervisor ID number for the domain
 *
 * Returns the domain ID number or (unsigned int) -1 in case of error
 */
unsigned int
3366 3367
virDomainGetID(virDomainPtr domain)
{
3368
    VIR_DOMAIN_DEBUG(domain);
3369

3370 3371
    virResetLastError();

3372 3373
    virCheckDomainReturn(domain, (unsigned int)-1);

3374
    return domain->id;
3375 3376
}

3377

3378 3379 3380 3381 3382 3383
/**
 * virDomainGetOSType:
 * @domain: a domain object
 *
 * Get the type of domain operation system.
 *
3384 3385
 * Returns the new string or NULL in case of error, the string must be
 *         freed by the caller.
3386 3387
 */
char *
3388 3389
virDomainGetOSType(virDomainPtr domain)
{
3390
    virConnectPtr conn;
3391

3392
    VIR_DOMAIN_DEBUG(domain);
3393

3394 3395
    virResetLastError();

3396
    virCheckDomainReturn(domain, NULL);
3397 3398
    conn = domain->conn;

3399 3400
    if (conn->driver->domainGetOSType) {
        char *ret;
3401
        ret = conn->driver->domainGetOSType(domain);
3402 3403 3404 3405
        if (!ret)
            goto error;
        return ret;
    }
3406

3407
    virReportUnsupportedError();
3408 3409

error:
3410
    virDispatchError(domain->conn);
3411
    return NULL;
3412 3413
}

3414

3415
/**
3416
 * virDomainGetMaxMemory:
3417
 * @domain: a domain object or NULL
3418
 *
3419 3420 3421 3422
 * Retrieve the maximum amount of physical memory allocated to a
 * domain. If domain is NULL, then this get the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
 *
3423 3424
 * Returns the memory size in kibibytes (blocks of 1024 bytes), or 0 in
 * case of error.
3425 3426
 */
unsigned long
3427 3428
virDomainGetMaxMemory(virDomainPtr domain)
{
3429
    virConnectPtr conn;
3430

3431
    VIR_DOMAIN_DEBUG(domain);
3432

3433 3434
    virResetLastError();

3435
    virCheckDomainReturn(domain, 0);
3436 3437
    conn = domain->conn;

3438
    if (conn->driver->domainGetMaxMemory) {
3439
        unsigned long long ret;
3440
        ret = conn->driver->domainGetMaxMemory(domain);
3441 3442
        if (ret == 0)
            goto error;
3443
        if ((unsigned long) ret != ret) {
3444 3445
            virReportError(VIR_ERR_OVERFLOW, _("result too large: %llu"),
                           ret);
3446 3447
            goto error;
        }
3448 3449
        return ret;
    }
3450

3451
    virReportUnsupportedError();
3452 3453

error:
3454
    virDispatchError(domain->conn);
3455
    return 0;
3456 3457
}

3458

D
Daniel Veillard 已提交
3459
/**
3460
 * virDomainSetMaxMemory:
D
Daniel Veillard 已提交
3461
 * @domain: a domain object or NULL
3462
 * @memory: the memory size in kibibytes (blocks of 1024 bytes)
3463
 *
D
Daniel Veillard 已提交
3464 3465 3466
 * Dynamically change the maximum amount of physical memory allocated to a
 * domain. If domain is NULL, then this change the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
3467
 * This function may require privileged access to the hypervisor.
D
Daniel Veillard 已提交
3468
 *
3469 3470 3471
 * This command is hypervisor-specific for whether active, persistent,
 * or both configurations are changed; for more control, use
 * virDomainSetMemoryFlags().
3472
 *
D
Daniel Veillard 已提交
3473 3474 3475
 * Returns 0 in case of success and -1 in case of failure.
 */
int
3476 3477
virDomainSetMaxMemory(virDomainPtr domain, unsigned long memory)
{
3478
    virConnectPtr conn;
3479 3480

    VIR_DOMAIN_DEBUG(domain, "memory=%lu", memory);
3481

3482 3483
    virResetLastError();

3484
    virCheckDomainReturn(domain, -1);
3485
    conn = domain->conn;
3486

3487 3488 3489
    virCheckReadOnlyGoto(conn->flags, error);
    virCheckNonZeroArgGoto(memory, error);

3490 3491
    if (conn->driver->domainSetMaxMemory) {
        int ret;
3492
        ret = conn->driver->domainSetMaxMemory(domain, memory);
3493 3494 3495 3496
        if (ret < 0)
            goto error;
        return ret;
    }
3497

3498
    virReportUnsupportedError();
3499 3500

error:
3501
    virDispatchError(domain->conn);
3502
    return -1;
3503
}
3504

3505

3506 3507 3508
/**
 * virDomainSetMemory:
 * @domain: a domain object or NULL
3509
 * @memory: the memory size in kibibytes (blocks of 1024 bytes)
3510
 *
3511 3512 3513
 * Dynamically change the target amount of physical memory allocated to a
 * domain. If domain is NULL, then this change the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
3514
 * This function may require privileged access to the hypervisor.
3515
 *
3516 3517 3518
 * This command only changes the runtime configuration of the domain,
 * so can only be called on an active domain.
 *
3519 3520 3521 3522 3523 3524
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSetMemory(virDomainPtr domain, unsigned long memory)
{
    virConnectPtr conn;
3525 3526

    VIR_DOMAIN_DEBUG(domain, "memory=%lu", memory);
3527

3528 3529
    virResetLastError();

3530
    virCheckDomainReturn(domain, -1);
3531
    conn = domain->conn;
3532

3533 3534 3535
    virCheckReadOnlyGoto(conn->flags, error);
    virCheckNonZeroArgGoto(memory, error);

3536 3537
    if (conn->driver->domainSetMemory) {
        int ret;
3538
        ret = conn->driver->domainSetMemory(domain, memory);
3539 3540 3541 3542
        if (ret < 0)
            goto error;
        return ret;
    }
3543

3544
    virReportUnsupportedError();
3545 3546

error:
3547
    virDispatchError(domain->conn);
3548
    return -1;
D
Daniel Veillard 已提交
3549 3550
}

3551

3552
/**
3553
 * virDomainSetMemoryFlags:
3554
 * @domain: a domain object or NULL
3555
 * @memory: the memory size in kibibytes (blocks of 1024 bytes)
3556
 * @flags: bitwise-OR of virDomainMemoryModFlags
3557 3558 3559 3560
 *
 * Dynamically change the target amount of physical memory allocated to a
 * domain. If domain is NULL, then this change the amount of memory reserved
 * to Domain0 i.e. the domain where the application runs.
3561
 * This function may require privileged access to the hypervisor.
3562
 *
3563 3564
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set. If VIR_DOMAIN_AFFECT_LIVE is set, the change affects
3565
 * a running domain and will fail if domain is not active.
3566
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
3567
 * and will fail for transient domains. If neither flag is specified
3568
 * (that is, @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain
3569 3570
 * modifies persistent setup, while an active domain is hypervisor-dependent
 * on whether just live or both live and persistent state is changed.
3571 3572
 * If VIR_DOMAIN_MEM_MAXIMUM is set, the change affects domain's maximum memory
 * size rather than current memory size.
3573
 * Not all hypervisors can support all flag combinations.
3574 3575 3576 3577 3578 3579 3580 3581 3582
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetMemoryFlags(virDomainPtr domain, unsigned long memory,
                        unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
3583
    VIR_DOMAIN_DEBUG(domain, "memory=%lu, flags=%x", memory, flags);
3584 3585 3586

    virResetLastError();

3587 3588
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
3589

3590
    virCheckReadOnlyGoto(conn->flags, error);
3591
    virCheckNonZeroArgGoto(memory, error);
3592 3593 3594 3595 3596 3597 3598 3599 3600

    if (conn->driver->domainSetMemoryFlags) {
        int ret;
        ret = conn->driver->domainSetMemoryFlags(domain, memory, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3601
    virReportUnsupportedError();
3602

3603 3604 3605 3606 3607
error:
    virDispatchError(domain->conn);
    return -1;
}

3608

3609 3610 3611 3612 3613 3614 3615 3616 3617 3618 3619 3620 3621 3622 3623 3624 3625 3626 3627 3628 3629 3630 3631 3632 3633 3634 3635 3636 3637 3638 3639 3640
/**
 * virDomainSetMemoryStatsPeriod:
 * @domain: a domain object or NULL
 * @period: the period in seconds for stats collection
 * @flags: bitwise-OR of virDomainMemoryModFlags
 *
 * Dynamically change the domain memory balloon driver statistics collection
 * period. Use 0 to disable and a positive value to enable.
 *
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set. If VIR_DOMAIN_AFFECT_LIVE is set, the change affects
 * a running domain and will fail if domain is not active.
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
 * and will fail for transient domains. If neither flag is specified
 * (that is, @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain
 * modifies persistent setup, while an active domain is hypervisor-dependent
 * on whether just live or both live and persistent state is changed.
 *
 * Not all hypervisors can support all flag combinations.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetMemoryStatsPeriod(virDomainPtr domain, int period,
                              unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "peroid=%d, flags=%x", period, flags);

    virResetLastError();

3641 3642
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
3643

3644
    virCheckReadOnlyGoto(conn->flags, error);
3645 3646 3647 3648 3649 3650 3651 3652 3653 3654 3655 3656

    /* This must be positive to set the balloon collection period */
    virCheckNonNegativeArgGoto(period, error);

    if (conn->driver->domainSetMemoryStatsPeriod) {
        int ret;
        ret = conn->driver->domainSetMemoryStatsPeriod(domain, period, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3657
    virReportUnsupportedError();
3658 3659 3660 3661 3662 3663

error:
    virDispatchError(domain->conn);
    return -1;
}

3664

E
Eric Blake 已提交
3665 3666 3667
/* Helper function called to validate incoming client array on any
 * interface that sets typed parameters in the hypervisor.  */
static int
3668
virTypedParameterValidateSet(virConnectPtr conn,
E
Eric Blake 已提交
3669 3670 3671 3672
                             virTypedParameterPtr params,
                             int nparams)
{
    bool string_okay;
3673
    size_t i;
E
Eric Blake 已提交
3674

3675 3676
    string_okay = VIR_DRV_SUPPORTS_FEATURE(conn->driver,
                                           conn,
E
Eric Blake 已提交
3677 3678 3679 3680
                                           VIR_DRV_FEATURE_TYPED_PARAM_STRING);
    for (i = 0; i < nparams; i++) {
        if (strnlen(params[i].field, VIR_TYPED_PARAM_FIELD_LENGTH) ==
            VIR_TYPED_PARAM_FIELD_LENGTH) {
3681 3682 3683 3684
            virReportInvalidArg(params,
                                _("string parameter name '%.*s' too long"),
                                VIR_TYPED_PARAM_FIELD_LENGTH,
                                params[i].field);
E
Eric Blake 已提交
3685 3686 3687 3688 3689
            return -1;
        }
        if (params[i].type == VIR_TYPED_PARAM_STRING) {
            if (string_okay) {
                if (!params[i].value.s) {
3690 3691 3692
                    virReportInvalidArg(params,
                                        _("NULL string parameter '%s'"),
                                        params[i].field);
E
Eric Blake 已提交
3693 3694 3695
                    return -1;
                }
            } else {
3696 3697 3698
                virReportInvalidArg(params,
                                    _("string parameter '%s' unsupported"),
                                    params[i].field);
E
Eric Blake 已提交
3699 3700 3701 3702 3703 3704 3705
                return -1;
            }
        }
    }
    return 0;
}

3706

3707 3708 3709 3710
/**
 * virDomainSetMemoryParameters:
 * @domain: pointer to domain object
 * @params: pointer to memory parameter objects
3711
 * @nparams: number of memory parameter (this value can be the same or
3712
 *          less than the number of parameters supported)
3713
 * @flags: bitwise-OR of virDomainModificationImpact
3714
 *
3715
 * Change all or a subset of the memory tunables.
3716
 * This function may require privileged access to the hypervisor.
3717 3718 3719 3720 3721
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetMemoryParameters(virDomainPtr domain,
3722
                             virTypedParameterPtr params,
3723 3724 3725
                             int nparams, unsigned int flags)
{
    virConnectPtr conn;
3726

3727
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
3728
                     params, nparams, flags);
3729
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
3730 3731 3732

    virResetLastError();

3733 3734 3735 3736
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
3737 3738 3739
    virCheckNonNullArgGoto(params, error);
    virCheckPositiveArgGoto(nparams, error);

3740
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
3741
        goto error;
E
Eric Blake 已提交
3742

3743 3744
    if (conn->driver->domainSetMemoryParameters) {
        int ret;
3745
        ret = conn->driver->domainSetMemoryParameters(domain, params, nparams, flags);
3746 3747 3748 3749 3750
        if (ret < 0)
            goto error;
        return ret;
    }

3751
    virReportUnsupportedError();
3752 3753 3754 3755 3756 3757

error:
    virDispatchError(domain->conn);
    return -1;
}

3758

3759 3760 3761 3762 3763
/**
 * virDomainGetMemoryParameters:
 * @domain: pointer to domain object
 * @params: pointer to memory parameter object
 *          (return value, allocated by the caller)
3764
 * @nparams: pointer to number of memory parameters; input and output
E
Eric Blake 已提交
3765
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
3766
 *
3767 3768 3769 3770
 * Get all memory parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.
3771
 *
3772 3773 3774
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
3775
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
3776 3777
 * again.
 *
3778
 * Here is a sample code snippet:
3779
 *
3780 3781
 *   if (virDomainGetMemoryParameters(dom, NULL, &nparams, 0) == 0 &&
 *       nparams != 0) {
3782 3783 3784 3785 3786 3787
 *       if ((params = malloc(sizeof(*params) * nparams)) == NULL)
 *           goto error;
 *       memset(params, 0, sizeof(*params) * nparams);
 *       if (virDomainGetMemoryParameters(dom, params, &nparams, 0))
 *           goto error;
 *   }
3788
 *
3789
 * This function may require privileged access to the hypervisor. This function
3790
 * expects the caller to allocate the @params.
3791 3792 3793 3794 3795
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetMemoryParameters(virDomainPtr domain,
3796
                             virTypedParameterPtr params,
3797 3798 3799
                             int *nparams, unsigned int flags)
{
    virConnectPtr conn;
3800

3801
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
3802
                     params, (nparams) ? *nparams : -1, flags);
3803 3804 3805

    virResetLastError();

3806
    virCheckDomainReturn(domain, -1);
3807 3808 3809 3810 3811
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

E
Eric Blake 已提交
3812 3813 3814
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
3815 3816 3817 3818

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
3819
        virReportInvalidArg(flags,
3820 3821
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
3822
                            __FUNCTION__);
3823 3824
        goto error;
    }
3825 3826 3827 3828
    conn = domain->conn;

    if (conn->driver->domainGetMemoryParameters) {
        int ret;
3829
        ret = conn->driver->domainGetMemoryParameters(domain, params, nparams, flags);
3830 3831 3832 3833
        if (ret < 0)
            goto error;
        return ret;
    }
3834
    virReportUnsupportedError();
3835 3836 3837 3838 3839 3840

error:
    virDispatchError(domain->conn);
    return -1;
}

3841

3842 3843 3844 3845 3846 3847 3848 3849 3850 3851 3852 3853 3854 3855 3856 3857 3858 3859 3860 3861 3862 3863
/**
 * virDomainSetNumaParameters:
 * @domain: pointer to domain object
 * @params: pointer to numa parameter objects
 * @nparams: number of numa parameters (this value can be the same or
 *          less than the number of parameters supported)
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Change all or a subset of the numa tunables.
 * This function may require privileged access to the hypervisor.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetNumaParameters(virDomainPtr domain,
                           virTypedParameterPtr params,
                           int nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
                     params, nparams, flags);
3864
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
3865 3866 3867

    virResetLastError();

3868
    virCheckDomainReturn(domain, -1);
3869
    virCheckReadOnlyGoto(domain->conn->flags, error);
3870 3871
    virCheckNonNullArgGoto(params, error);
    virCheckPositiveArgGoto(nparams, error);
3872
    if (virTypedParameterValidateSet(domain->conn, params, nparams) < 0)
3873
        goto error;
3874 3875 3876 3877 3878 3879 3880 3881 3882 3883 3884 3885

    conn = domain->conn;

    if (conn->driver->domainSetNumaParameters) {
        int ret;
        ret = conn->driver->domainSetNumaParameters(domain, params, nparams,
                                                    flags);
        if (ret < 0)
            goto error;
        return ret;
    }

3886
    virReportUnsupportedError();
3887 3888 3889 3890 3891 3892

error:
    virDispatchError(domain->conn);
    return -1;
}

3893

3894 3895 3896 3897 3898 3899 3900 3901 3902 3903 3904 3905 3906 3907 3908 3909 3910 3911 3912 3913 3914 3915 3916 3917 3918 3919 3920 3921 3922 3923 3924 3925 3926 3927 3928 3929 3930 3931
/**
 * virDomainGetNumaParameters:
 * @domain: pointer to domain object
 * @params: pointer to numa parameter object
 *          (return value, allocated by the caller)
 * @nparams: pointer to number of numa parameters
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
 *
 * Get all numa parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.
 *
 * See virDomainGetMemoryParameters() for an equivalent usage example.
 *
 * This function may require privileged access to the hypervisor. This function
 * expects the caller to allocate the @params.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetNumaParameters(virDomainPtr domain,
                           virTypedParameterPtr params,
                           int *nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
                     params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

3932
    virCheckDomainReturn(domain, -1);
3933 3934 3935 3936 3937
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

3938 3939 3940 3941 3942 3943 3944 3945 3946 3947 3948 3949 3950 3951
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    conn = domain->conn;

    if (conn->driver->domainGetNumaParameters) {
        int ret;
        ret = conn->driver->domainGetNumaParameters(domain, params, nparams,
                                                    flags);
        if (ret < 0)
            goto error;
        return ret;
    }
3952
    virReportUnsupportedError();
3953 3954 3955 3956 3957 3958

error:
    virDispatchError(domain->conn);
    return -1;
}

3959

3960 3961 3962 3963
/**
 * virDomainSetBlkioParameters:
 * @domain: pointer to domain object
 * @params: pointer to blkio parameter objects
3964
 * @nparams: number of blkio parameters (this value can be the same or
3965
 *          less than the number of parameters supported)
E
Eric Blake 已提交
3966
 * @flags: bitwise-OR of virDomainModificationImpact
3967
 *
3968
 * Change all or a subset of the blkio tunables.
3969
 * This function may require privileged access to the hypervisor.
3970 3971 3972 3973 3974
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetBlkioParameters(virDomainPtr domain,
3975 3976
                            virTypedParameterPtr params,
                            int nparams, unsigned int flags)
3977 3978 3979
{
    virConnectPtr conn;

3980
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
3981
                     params, nparams, flags);
3982
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
3983 3984 3985

    virResetLastError();

3986 3987 3988 3989
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
3990 3991 3992
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

3993
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
3994
        goto error;
E
Eric Blake 已提交
3995

3996 3997
    if (conn->driver->domainSetBlkioParameters) {
        int ret;
3998
        ret = conn->driver->domainSetBlkioParameters(domain, params, nparams, flags);
3999 4000 4001 4002 4003
        if (ret < 0)
            goto error;
        return ret;
    }

4004
    virReportUnsupportedError();
4005 4006 4007 4008 4009 4010

error:
    virDispatchError(domain->conn);
    return -1;
}

4011

4012 4013 4014 4015 4016
/**
 * virDomainGetBlkioParameters:
 * @domain: pointer to domain object
 * @params: pointer to blkio parameter object
 *          (return value, allocated by the caller)
4017
 * @nparams: pointer to number of blkio parameters; input and output
E
Eric Blake 已提交
4018
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
4019
 *
4020 4021 4022 4023 4024 4025 4026 4027 4028 4029 4030 4031
 * Get all blkio parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.
 *
 * See virDomainGetMemoryParameters() for an equivalent usage example.
4032
 *
4033
 * This function may require privileged access to the hypervisor. This function
4034 4035 4036 4037 4038 4039
 * expects the caller to allocate the @params.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetBlkioParameters(virDomainPtr domain,
4040 4041
                            virTypedParameterPtr params,
                            int *nparams, unsigned int flags)
4042 4043 4044
{
    virConnectPtr conn;

4045
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
4046 4047 4048 4049
                     params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

4050
    virCheckDomainReturn(domain, -1);
4051 4052 4053 4054 4055
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

E
Eric Blake 已提交
4056 4057 4058
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
4059 4060 4061 4062

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
4063
        virReportInvalidArg(flags,
4064 4065
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
4066
                            __FUNCTION__);
4067 4068
        goto error;
    }
4069 4070 4071 4072
    conn = domain->conn;

    if (conn->driver->domainGetBlkioParameters) {
        int ret;
4073
        ret = conn->driver->domainGetBlkioParameters(domain, params, nparams, flags);
4074 4075 4076 4077
        if (ret < 0)
            goto error;
        return ret;
    }
4078
    virReportUnsupportedError();
4079 4080 4081 4082 4083 4084

error:
    virDispatchError(domain->conn);
    return -1;
}

4085

4086 4087
/**
 * virDomainGetInfo:
4088
 * @domain: a domain object
4089
 * @info: pointer to a virDomainInfo structure allocated by the user
4090
 *
4091
 * Extract information about a domain. Note that if the connection
4092
 * used to get the domain is limited only a partial set of the information
4093 4094 4095 4096 4097
 * can be extracted.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
4098 4099
virDomainGetInfo(virDomainPtr domain, virDomainInfoPtr info)
{
4100
    virConnectPtr conn;
4101 4102

    VIR_DOMAIN_DEBUG(domain, "info=%p", info);
4103

4104 4105
    virResetLastError();

4106 4107 4108
    if (info)
        memset(info, 0, sizeof(*info));

4109
    virCheckDomainReturn(domain, -1);
4110
    virCheckNonNullArgGoto(info, error);
4111

4112 4113
    conn = domain->conn;

4114 4115
    if (conn->driver->domainGetInfo) {
        int ret;
4116
        ret = conn->driver->domainGetInfo(domain, info);
4117 4118 4119 4120
        if (ret < 0)
            goto error;
        return ret;
    }
4121

4122
    virReportUnsupportedError();
4123 4124

error:
4125
    virDispatchError(domain->conn);
4126
    return -1;
4127
}
4128

4129

4130 4131 4132 4133 4134 4135
/**
 * virDomainGetState:
 * @domain: a domain object
 * @state: returned state of the domain (one of virDomainState)
 * @reason: returned reason which led to @state (one of virDomain*Reason
 * corresponding to the current state); it is allowed to be NULL
4136
 * @flags: extra flags; not used yet, so callers should always pass 0
4137 4138 4139 4140 4141 4142 4143 4144 4145 4146 4147 4148 4149 4150
 *
 * Extract domain state. Each state can be accompanied with a reason (if known)
 * which led to the state.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetState(virDomainPtr domain,
                  int *state,
                  int *reason,
                  unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
4151 4152
    VIR_DOMAIN_DEBUG(domain, "state=%p, reason=%p, flags=%x",
                     state, reason, flags);
4153 4154 4155

    virResetLastError();

4156
    virCheckDomainReturn(domain, -1);
4157
    virCheckNonNullArgGoto(state, error);
4158 4159 4160 4161 4162 4163

    conn = domain->conn;
    if (conn->driver->domainGetState) {
        int ret;
        ret = conn->driver->domainGetState(domain, state, reason, flags);
        if (ret < 0)
4164 4165 4166 4167
            goto error;
        return ret;
    }

4168
    virReportUnsupportedError();
4169 4170 4171 4172 4173 4174

error:
    virDispatchError(domain->conn);
    return -1;
}

4175

4176 4177 4178 4179
/**
 * virDomainGetControlInfo:
 * @domain: a domain object
 * @info: pointer to a virDomainControlInfo structure allocated by the user
4180
 * @flags: extra flags; not used yet, so callers should always pass 0
4181 4182 4183 4184 4185 4186 4187 4188 4189 4190 4191 4192
 *
 * Extract details about current state of control interface to a domain.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetControlInfo(virDomainPtr domain,
                        virDomainControlInfoPtr info,
                        unsigned int flags)
{
    virConnectPtr conn;

E
Eric Blake 已提交
4193
    VIR_DOMAIN_DEBUG(domain, "info=%p, flags=%x", info, flags);
4194 4195 4196

    virResetLastError();

4197
    virCheckDomainReturn(domain, -1);
4198
    virCheckNonNullArgGoto(info, error);
4199 4200 4201 4202 4203 4204

    conn = domain->conn;
    if (conn->driver->domainGetControlInfo) {
        int ret;
        ret = conn->driver->domainGetControlInfo(domain, info, flags);
        if (ret < 0)
4205 4206 4207 4208
            goto error;
        return ret;
    }

4209
    virReportUnsupportedError();
4210 4211 4212 4213 4214 4215

error:
    virDispatchError(domain->conn);
    return -1;
}

4216

4217 4218 4219
/**
 * virDomainGetXMLDesc:
 * @domain: a domain object
4220
 * @flags: bitwise-OR of virDomainXMLFlags
4221 4222
 *
 * Provide an XML description of the domain. The description may be reused
4223
 * later to relaunch the domain with virDomainCreateXML().
4224
 *
4225 4226 4227 4228 4229 4230 4231 4232 4233 4234
 * No security-sensitive data will be included unless @flags contains
 * VIR_DOMAIN_XML_SECURE; this flag is rejected on read-only
 * connections.  If @flags includes VIR_DOMAIN_XML_INACTIVE, then the
 * XML represents the configuration that will be used on the next boot
 * of a persistent domain; otherwise, the configuration represents the
 * currently running domain.  If @flags contains
 * VIR_DOMAIN_XML_UPDATE_CPU, then the portion of the domain XML
 * describing CPU capabilities is modified to match actual
 * capabilities of the host.
 *
4235 4236 4237 4238
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
4239
virDomainGetXMLDesc(virDomainPtr domain, unsigned int flags)
4240
{
4241
    virConnectPtr conn;
4242

4243
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
4244

4245 4246
    virResetLastError();

4247
    virCheckDomainReturn(domain, NULL);
4248 4249
    conn = domain->conn;

4250
    if ((conn->flags & VIR_CONNECT_RO) && (flags & VIR_DOMAIN_XML_SECURE)) {
4251 4252
        virReportError(VIR_ERR_OPERATION_DENIED, "%s",
                       _("virDomainGetXMLDesc with secure flag"));
4253 4254 4255
        goto error;
    }

4256
    if (conn->driver->domainGetXMLDesc) {
4257
        char *ret;
4258
        ret = conn->driver->domainGetXMLDesc(domain, flags);
4259 4260 4261 4262
        if (!ret)
            goto error;
        return ret;
    }
4263

4264
    virReportUnsupportedError();
4265 4266

error:
4267
    virDispatchError(domain->conn);
4268
    return NULL;
4269
}
4270

4271

4272 4273 4274 4275 4276
/**
 * virConnectDomainXMLFromNative:
 * @conn: a connection object
 * @nativeFormat: configuration format importing from
 * @nativeConfig: the configuration data to import
4277
 * @flags: extra flags; not used yet, so callers should always pass 0
4278 4279 4280 4281 4282 4283 4284 4285
 *
 * Reads native configuration data  describing a domain, and
 * generates libvirt domain XML. The format of the native
 * data is hypervisor dependant.
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
4286 4287 4288 4289 4290
char *
virConnectDomainXMLFromNative(virConnectPtr conn,
                              const char *nativeFormat,
                              const char *nativeConfig,
                              unsigned int flags)
4291
{
E
Eric Blake 已提交
4292
    VIR_DEBUG("conn=%p, format=%s, config=%s, flags=%x",
4293
              conn, nativeFormat, nativeConfig, flags);
4294 4295 4296

    virResetLastError();

4297
    virCheckConnectReturn(conn, NULL);
4298
    virCheckReadOnlyGoto(conn->flags, error);
4299

4300 4301
    virCheckNonNullArgGoto(nativeFormat, error);
    virCheckNonNullArgGoto(nativeConfig, error);
4302

4303
    if (conn->driver->connectDomainXMLFromNative) {
4304
        char *ret;
4305 4306 4307 4308
        ret = conn->driver->connectDomainXMLFromNative(conn,
                                                       nativeFormat,
                                                       nativeConfig,
                                                       flags);
4309 4310 4311 4312 4313
        if (!ret)
            goto error;
        return ret;
    }

4314
    virReportUnsupportedError();
4315 4316

error:
4317
    virDispatchError(conn);
4318 4319 4320
    return NULL;
}

4321

4322 4323 4324 4325 4326
/**
 * virConnectDomainXMLToNative:
 * @conn: a connection object
 * @nativeFormat: configuration format exporting to
 * @domainXml: the domain configuration to export
4327
 * @flags: extra flags; not used yet, so callers should always pass 0
4328 4329
 *
 * Reads a domain XML configuration document, and generates
E
Eric Blake 已提交
4330
 * a native configuration file describing the domain.
4331 4332 4333 4334 4335
 * The format of the native data is hypervisor dependant.
 *
 * Returns a 0 terminated UTF-8 encoded native config datafile, or NULL in case of error.
 *         the caller must free() the returned value.
 */
4336 4337 4338 4339 4340
char *
virConnectDomainXMLToNative(virConnectPtr conn,
                            const char *nativeFormat,
                            const char *domainXml,
                            unsigned int flags)
4341
{
E
Eric Blake 已提交
4342
    VIR_DEBUG("conn=%p, format=%s, xml=%s, flags=%x",
4343
              conn, nativeFormat, domainXml, flags);
4344 4345 4346

    virResetLastError();

4347
    virCheckConnectReturn(conn, NULL);
4348
    virCheckReadOnlyGoto(conn->flags, error);
4349

4350 4351
    virCheckNonNullArgGoto(nativeFormat, error);
    virCheckNonNullArgGoto(domainXml, error);
4352

4353
    if (conn->driver->connectDomainXMLToNative) {
4354
        char *ret;
4355 4356 4357 4358
        ret = conn->driver->connectDomainXMLToNative(conn,
                                                     nativeFormat,
                                                     domainXml,
                                                     flags);
4359 4360 4361 4362 4363
        if (!ret)
            goto error;
        return ret;
    }

4364
    virReportUnsupportedError();
4365 4366

error:
4367
    virDispatchError(conn);
4368 4369 4370 4371
    return NULL;
}


4372 4373 4374 4375 4376 4377 4378 4379 4380 4381 4382 4383 4384 4385 4386 4387
/*
 * Sequence v1:
 *
 *  Dst: Prepare
 *        - Get ready to accept incoming VM
 *        - Generate optional cookie to pass to src
 *
 *  Src: Perform
 *        - Start migration and wait for send completion
 *        - Kill off VM if successful, resume if failed
 *
 *  Dst: Finish
 *        - Wait for recv completion and check status
 *        - Kill off VM if unsuccessful
 *
 */
4388
static virDomainPtr
4389 4390 4391 4392 4393 4394
virDomainMigrateVersion1(virDomainPtr domain,
                         virConnectPtr dconn,
                         unsigned long flags,
                         const char *dname,
                         const char *uri,
                         unsigned long bandwidth)
4395 4396 4397 4398
{
    virDomainPtr ddomain = NULL;
    char *uri_out = NULL;
    char *cookie = NULL;
4399 4400
    int cookielen = 0, ret;
    virDomainInfo info;
4401
    unsigned int destflags;
4402

4403
    VIR_DOMAIN_DEBUG(domain,
E
Eric Blake 已提交
4404
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
4405
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);
4406

4407
    ret = virDomainGetInfo(domain, &info);
4408
    if (ret == 0 && info.state == VIR_DOMAIN_PAUSED)
4409
        flags |= VIR_MIGRATE_PAUSED;
4410 4411

    destflags = flags & ~VIR_MIGRATE_ABORT_ON_ERROR;
4412 4413 4414 4415 4416 4417 4418 4419 4420 4421 4422 4423 4424

    /* Prepare the migration.
     *
     * The destination host may return a cookie, or leave cookie as
     * NULL.
     *
     * The destination host MUST set uri_out if uri_in is NULL.
     *
     * If uri_in is non-NULL, then the destination host may modify
     * the URI by setting uri_out.  If it does not wish to modify
     * the URI, it should leave uri_out as NULL.
     */
    if (dconn->driver->domainMigratePrepare
4425
        (dconn, &cookie, &cookielen, uri, &uri_out, destflags, dname,
4426 4427 4428 4429
         bandwidth) == -1)
        goto done;

    if (uri == NULL && uri_out == NULL) {
4430 4431
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("domainMigratePrepare did not set uri"));
4432 4433 4434 4435 4436 4437 4438 4439 4440 4441 4442 4443 4444 4445 4446 4447 4448 4449 4450 4451
        goto done;
    }
    if (uri_out)
        uri = uri_out; /* Did domainMigratePrepare change URI? */

    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete.
     */
    if (domain->conn->driver->domainMigratePerform
        (domain, cookie, cookielen, uri, flags, dname, bandwidth) == -1)
        goto done;

    /* Get the destination domain and return it or error.
     * 'domain' no longer actually exists at this point
     * (or so we hope), but we still use the object in memory
     * in order to get the name.
     */
    dname = dname ? dname : domain->name;
    if (dconn->driver->domainMigrateFinish)
        ddomain = dconn->driver->domainMigrateFinish
4452
            (dconn, dname, cookie, cookielen, uri, destflags);
4453
    else
4454
        ddomain = virDomainLookupByName(dconn, dname);
4455

4456
done:
4457 4458
    VIR_FREE(uri_out);
    VIR_FREE(cookie);
4459 4460 4461
    return ddomain;
}

4462

4463 4464 4465 4466 4467 4468 4469 4470 4471 4472 4473 4474 4475 4476 4477 4478 4479 4480 4481
/*
 * Sequence v2:
 *
 *  Src: DumpXML
 *        - Generate XML to pass to dst
 *
 *  Dst: Prepare
 *        - Get ready to accept incoming VM
 *        - Generate optional cookie to pass to src
 *
 *  Src: Perform
 *        - Start migration and wait for send completion
 *        - Kill off VM if successful, resume if failed
 *
 *  Dst: Finish
 *        - Wait for recv completion and check status
 *        - Kill off VM if unsuccessful
 *
 */
4482
static virDomainPtr
4483 4484 4485 4486 4487 4488
virDomainMigrateVersion2(virDomainPtr domain,
                         virConnectPtr dconn,
                         unsigned long flags,
                         const char *dname,
                         const char *uri,
                         unsigned long bandwidth)
4489 4490 4491 4492 4493 4494
{
    virDomainPtr ddomain = NULL;
    char *uri_out = NULL;
    char *cookie = NULL;
    char *dom_xml = NULL;
    int cookielen = 0, ret;
4495
    virDomainInfo info;
4496
    virErrorPtr orig_err = NULL;
4497
    unsigned int getxml_flags = 0;
4498
    int cancelled;
4499
    unsigned long destflags;
4500

4501
    VIR_DOMAIN_DEBUG(domain,
E
Eric Blake 已提交
4502
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
4503
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);
4504 4505 4506 4507 4508 4509 4510 4511 4512 4513 4514 4515 4516 4517 4518 4519 4520

    /* Prepare the migration.
     *
     * The destination host may return a cookie, or leave cookie as
     * NULL.
     *
     * The destination host MUST set uri_out if uri_in is NULL.
     *
     * If uri_in is non-NULL, then the destination host may modify
     * the URI by setting uri_out.  If it does not wish to modify
     * the URI, it should leave uri_out as NULL.
     */

    /* In version 2 of the protocol, the prepare step is slightly
     * different.  We fetch the domain XML of the source domain
     * and pass it to Prepare2.
     */
4521
    if (!domain->conn->driver->domainGetXMLDesc) {
4522
        virReportUnsupportedError();
4523 4524
        return NULL;
    }
4525 4526 4527 4528 4529 4530 4531 4532 4533

    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_XML_MIGRATABLE)) {
        getxml_flags |= VIR_DOMAIN_XML_MIGRATABLE;
    } else {
        getxml_flags |= VIR_DOMAIN_XML_SECURE | VIR_DOMAIN_XML_UPDATE_CPU;
    }

    dom_xml = domain->conn->driver->domainGetXMLDesc(domain, getxml_flags);
4534 4535 4536
    if (!dom_xml)
        return NULL;

4537
    ret = virDomainGetInfo(domain, &info);
4538
    if (ret == 0 && info.state == VIR_DOMAIN_PAUSED)
4539 4540
        flags |= VIR_MIGRATE_PAUSED;

4541 4542 4543
    destflags = flags & ~VIR_MIGRATE_ABORT_ON_ERROR;

    VIR_DEBUG("Prepare2 %p flags=%lx", dconn, destflags);
4544
    ret = dconn->driver->domainMigratePrepare2
4545
        (dconn, &cookie, &cookielen, uri, &uri_out, destflags, dname,
4546
         bandwidth, dom_xml);
4547
    VIR_FREE(dom_xml);
4548 4549 4550 4551
    if (ret == -1)
        goto done;

    if (uri == NULL && uri_out == NULL) {
4552 4553
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("domainMigratePrepare2 did not set uri"));
4554
        cancelled = 1;
4555 4556
        /* Make sure Finish doesn't overwrite the error */
        orig_err = virSaveLastError();
4557
        goto finish;
4558 4559 4560 4561 4562 4563 4564
    }
    if (uri_out)
        uri = uri_out; /* Did domainMigratePrepare2 change URI? */

    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete.
     */
4565
    VIR_DEBUG("Perform %p", domain->conn);
4566 4567 4568
    ret = domain->conn->driver->domainMigratePerform
        (domain, cookie, cookielen, uri, flags, dname, bandwidth);

4569 4570 4571 4572
    /* Perform failed. Make sure Finish doesn't overwrite the error */
    if (ret < 0)
        orig_err = virSaveLastError();

4573 4574 4575 4576 4577 4578
    /* If Perform returns < 0, then we need to cancel the VM
     * startup on the destination
     */
    cancelled = ret < 0 ? 1 : 0;

finish:
4579 4580 4581 4582 4583
    /* In version 2 of the migration protocol, we pass the
     * status code from the sender to the destination host,
     * so it can do any cleanup if the migration failed.
     */
    dname = dname ? dname : domain->name;
4584
    VIR_DEBUG("Finish2 %p ret=%d", dconn, ret);
4585
    ddomain = dconn->driver->domainMigrateFinish2
4586
        (dconn, dname, cookie, cookielen, uri, destflags, cancelled);
4587 4588
    if (cancelled && ddomain)
        VIR_ERROR(_("finish step ignored that migration was cancelled"));
4589

4590
done:
4591 4592 4593 4594
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
4595 4596
    VIR_FREE(uri_out);
    VIR_FREE(cookie);
4597 4598 4599
    return ddomain;
}

4600

4601 4602 4603 4604 4605 4606 4607 4608 4609 4610 4611 4612 4613 4614 4615 4616 4617 4618 4619 4620 4621 4622 4623
/*
 * Sequence v3:
 *
 *  Src: Begin
 *        - Generate XML to pass to dst
 *        - Generate optional cookie to pass to dst
 *
 *  Dst: Prepare
 *        - Get ready to accept incoming VM
 *        - Generate optional cookie to pass to src
 *
 *  Src: Perform
 *        - Start migration and wait for send completion
 *        - Generate optional cookie to pass to dst
 *
 *  Dst: Finish
 *        - Wait for recv completion and check status
 *        - Kill off VM if failed, resume if success
 *        - Generate optional cookie to pass to src
 *
 *  Src: Confirm
 *        - Kill off VM if success, resume if failed
 *
4624 4625 4626 4627
  * If useParams is true, params and nparams contain migration parameters and
  * we know it's safe to call the API which supports extensible parameters.
  * Otherwise, we have to use xmlin, dname, uri, and bandwidth and pass them
  * to the old-style APIs.
4628 4629
 */
static virDomainPtr
4630 4631 4632 4633 4634 4635 4636 4637 4638 4639
virDomainMigrateVersion3Full(virDomainPtr domain,
                             virConnectPtr dconn,
                             const char *xmlin,
                             const char *dname,
                             const char *uri,
                             unsigned long long bandwidth,
                             virTypedParameterPtr params,
                             int nparams,
                             bool useParams,
                             unsigned int flags)
4640 4641 4642 4643 4644 4645 4646 4647 4648 4649 4650
{
    virDomainPtr ddomain = NULL;
    char *uri_out = NULL;
    char *cookiein = NULL;
    char *cookieout = NULL;
    char *dom_xml = NULL;
    int cookieinlen = 0;
    int cookieoutlen = 0;
    int ret;
    virDomainInfo info;
    virErrorPtr orig_err = NULL;
4651 4652
    int cancelled = 1;
    unsigned long protection = 0;
4653
    bool notify_source = true;
4654
    unsigned int destflags;
4655 4656
    int state;
    virTypedParameterPtr tmp;
4657

4658 4659 4660 4661 4662 4663
    VIR_DOMAIN_DEBUG(domain,
                     "dconn=%p, xmlin=%s, dname=%s, uri=%s, bandwidth=%llu, "
                     "params=%p, nparams=%d, useParams=%d, flags=%x",
                     dconn, NULLSTR(xmlin), NULLSTR(dname), NULLSTR(uri),
                     bandwidth, params, nparams, useParams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
4664

4665 4666 4667 4668 4669 4670 4671 4672 4673 4674 4675 4676
    if ((!useParams &&
         (!domain->conn->driver->domainMigrateBegin3 ||
          !domain->conn->driver->domainMigratePerform3 ||
          !domain->conn->driver->domainMigrateConfirm3 ||
          !dconn->driver->domainMigratePrepare3 ||
          !dconn->driver->domainMigrateFinish3)) ||
        (useParams &&
         (!domain->conn->driver->domainMigrateBegin3Params ||
          !domain->conn->driver->domainMigratePerform3Params ||
          !domain->conn->driver->domainMigrateConfirm3Params ||
          !dconn->driver->domainMigratePrepare3Params ||
          !dconn->driver->domainMigrateFinish3Params))) {
4677
        virReportUnsupportedError();
4678 4679 4680
        return NULL;
    }

4681 4682 4683 4684
    if (virTypedParamsCopy(&tmp, params, nparams) < 0)
        return NULL;
    params = tmp;

4685 4686 4687 4688
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION))
        protection = VIR_MIGRATE_CHANGE_PROTECTION;

4689
    VIR_DEBUG("Begin3 %p", domain->conn);
4690 4691 4692 4693 4694 4695 4696 4697 4698
    if (useParams) {
        dom_xml = domain->conn->driver->domainMigrateBegin3Params
            (domain, params, nparams, &cookieout, &cookieoutlen,
             flags | protection);
    } else {
        dom_xml = domain->conn->driver->domainMigrateBegin3
            (domain, xmlin, &cookieout, &cookieoutlen,
             flags | protection, dname, bandwidth);
    }
4699 4700 4701
    if (!dom_xml)
        goto done;

4702 4703 4704 4705 4706 4707 4708
    if (useParams) {
        /* If source is new enough to support extensible migration parameters,
         * it's certainly new enough to support virDomainGetState. */
        ret = virDomainGetState(domain, &state, NULL, 0);
    } else {
        ret = virDomainGetInfo(domain, &info);
        state = info.state;
4709
    }
4710 4711
    if (ret == 0 && state == VIR_DOMAIN_PAUSED)
        flags |= VIR_MIGRATE_PAUSED;
4712

4713 4714 4715
    destflags = flags & ~VIR_MIGRATE_ABORT_ON_ERROR;

    VIR_DEBUG("Prepare3 %p flags=%x", dconn, destflags);
4716 4717 4718 4719
    cookiein = cookieout;
    cookieinlen = cookieoutlen;
    cookieout = NULL;
    cookieoutlen = 0;
4720 4721 4722 4723 4724 4725 4726 4727 4728 4729 4730 4731 4732
    if (useParams) {
        if (virTypedParamsReplaceString(&params, &nparams,
                                        VIR_MIGRATE_PARAM_DEST_XML,
                                        dom_xml) < 0)
            goto done;
        ret = dconn->driver->domainMigratePrepare3Params
            (dconn, params, nparams, cookiein, cookieinlen,
             &cookieout, &cookieoutlen, &uri_out, destflags);
    } else {
        ret = dconn->driver->domainMigratePrepare3
            (dconn, cookiein, cookieinlen, &cookieout, &cookieoutlen,
             uri, &uri_out, destflags, dname, bandwidth, dom_xml);
    }
4733 4734 4735 4736 4737 4738 4739 4740 4741 4742 4743
    if (ret == -1) {
        if (protection) {
            /* Begin already started a migration job so we need to cancel it by
             * calling Confirm while making sure it doesn't overwrite the error
             */
            orig_err = virSaveLastError();
            goto confirm;
        } else {
            goto done;
        }
    }
4744

4745 4746 4747 4748 4749 4750
    /* Did domainMigratePrepare3 change URI? */
    if (uri_out) {
        uri = uri_out;
        if (useParams &&
            virTypedParamsReplaceString(&params, &nparams,
                                        VIR_MIGRATE_PARAM_URI,
4751 4752 4753
                                        uri_out) < 0) {
            cancelled = 1;
            orig_err = virSaveLastError();
4754
            goto finish;
4755
        }
4756 4757 4758
    } else if (!uri &&
               virTypedParamsGetString(params, nparams,
                                       VIR_MIGRATE_PARAM_URI, &uri) <= 0) {
4759 4760
        virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                       _("domainMigratePrepare3 did not set uri"));
4761 4762 4763
        cancelled = 1;
        orig_err = virSaveLastError();
        goto finish;
4764 4765
    }

L
liguang 已提交
4766 4767 4768 4769 4770 4771 4772 4773
    if (flags & VIR_MIGRATE_OFFLINE) {
        VIR_DEBUG("Offline migration, skipping Perform phase");
        VIR_FREE(cookieout);
        cookieoutlen = 0;
        cancelled = 0;
        goto finish;
    }

4774 4775 4776 4777 4778 4779 4780 4781 4782 4783 4784
    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete. The src VM should remain
     * running, but in paused state until the destination can
     * confirm migration completion.
     */
    VIR_DEBUG("Perform3 %p uri=%s", domain->conn, uri);
    VIR_FREE(cookiein);
    cookiein = cookieout;
    cookieinlen = cookieoutlen;
    cookieout = NULL;
    cookieoutlen = 0;
4785
    /* dconnuri not relevant in non-P2P modes, so left NULL here */
4786 4787 4788 4789 4790 4791 4792 4793 4794 4795
    if (useParams) {
        ret = domain->conn->driver->domainMigratePerform3Params
            (domain, NULL, params, nparams, cookiein, cookieinlen,
             &cookieout, &cookieoutlen, flags | protection);
    } else {
        ret = domain->conn->driver->domainMigratePerform3
            (domain, NULL, cookiein, cookieinlen,
             &cookieout, &cookieoutlen, NULL,
             uri, flags | protection, dname, bandwidth);
    }
4796 4797

    /* Perform failed. Make sure Finish doesn't overwrite the error */
4798
    if (ret < 0) {
4799
        orig_err = virSaveLastError();
4800 4801 4802 4803 4804
        /* Perform failed so we don't need to call confirm to let source know
         * about the failure.
         */
        notify_source = false;
    }
4805 4806 4807 4808 4809 4810

    /* If Perform returns < 0, then we need to cancel the VM
     * startup on the destination
     */
    cancelled = ret < 0 ? 1 : 0;

4811
finish:
4812 4813 4814 4815 4816 4817 4818 4819 4820 4821 4822 4823
    /*
     * The status code from the source is passed to the destination.
     * The dest can cleanup if the source indicated it failed to
     * send all migration data. Returns NULL for ddomain if
     * the dest was unable to complete migration.
     */
    VIR_DEBUG("Finish3 %p ret=%d", dconn, ret);
    VIR_FREE(cookiein);
    cookiein = cookieout;
    cookieinlen = cookieoutlen;
    cookieout = NULL;
    cookieoutlen = 0;
4824 4825 4826 4827 4828 4829
    if (useParams) {
        if (virTypedParamsGetString(params, nparams,
                                    VIR_MIGRATE_PARAM_DEST_NAME, NULL) <= 0 &&
            virTypedParamsReplaceString(&params, &nparams,
                                        VIR_MIGRATE_PARAM_DEST_NAME,
                                        domain->name) < 0) {
4830
            ddomain = NULL;
4831 4832 4833 4834 4835 4836 4837 4838 4839 4840 4841
        } else {
            ddomain = dconn->driver->domainMigrateFinish3Params
                (dconn, params, nparams, cookiein, cookieinlen,
                 &cookieout, &cookieoutlen, destflags, cancelled);
        }
    } else {
        dname = dname ? dname : domain->name;
        ddomain = dconn->driver->domainMigrateFinish3
            (dconn, dname, cookiein, cookieinlen, &cookieout, &cookieoutlen,
             NULL, uri, destflags, cancelled);
    }
4842 4843
    if (cancelled && ddomain)
        VIR_ERROR(_("finish step ignored that migration was cancelled"));
4844 4845 4846 4847 4848 4849 4850 4851

    /* If ddomain is NULL, then we were unable to start
     * the guest on the target, and must restart on the
     * source. There is a small chance that the ddomain
     * is NULL due to an RPC failure, in which case
     * ddomain could in fact be running on the dest.
     * The lock manager plugins should take care of
     * safety in this scenario.
4852
     */
4853
    cancelled = ddomain == NULL ? 1 : 0;
4854

4855 4856 4857 4858 4859 4860
    /* If finish3 set an error, and we don't have an earlier
     * one we need to preserve it in case confirm3 overwrites
     */
    if (!orig_err)
        orig_err = virSaveLastError();

4861
confirm:
4862
    /*
4863 4864 4865
     * If cancelled, then src VM will be restarted, else it will be killed.
     * Don't do this if migration failed on source and thus it was already
     * cancelled there.
4866
     */
4867 4868 4869 4870 4871 4872 4873
    if (notify_source) {
        VIR_DEBUG("Confirm3 %p ret=%d domain=%p", domain->conn, ret, domain);
        VIR_FREE(cookiein);
        cookiein = cookieout;
        cookieinlen = cookieoutlen;
        cookieout = NULL;
        cookieoutlen = 0;
4874 4875 4876 4877 4878 4879 4880 4881 4882
        if (useParams) {
            ret = domain->conn->driver->domainMigrateConfirm3Params
                (domain, params, nparams, cookiein, cookieinlen,
                 flags | protection, cancelled);
        } else {
            ret = domain->conn->driver->domainMigrateConfirm3
                (domain, cookiein, cookieinlen,
                 flags | protection, cancelled);
        }
4883 4884 4885 4886 4887 4888 4889 4890 4891
        /* If Confirm3 returns -1, there's nothing more we can
         * do, but fortunately worst case is that there is a
         * domain left in 'paused' state on source.
         */
        if (ret < 0) {
            VIR_WARN("Guest %s probably left in 'paused' state on source",
                     domain->name);
        }
    }
4892

4893
done:
4894 4895 4896 4897
    if (orig_err) {
        virSetError(orig_err);
        virFreeError(orig_err);
    }
4898
    VIR_FREE(dom_xml);
4899 4900 4901
    VIR_FREE(uri_out);
    VIR_FREE(cookiein);
    VIR_FREE(cookieout);
4902
    virTypedParamsFree(params, nparams);
4903 4904 4905
    return ddomain;
}

4906

4907 4908 4909 4910 4911 4912 4913 4914 4915 4916 4917 4918 4919
static virDomainPtr
virDomainMigrateVersion3(virDomainPtr domain,
                         virConnectPtr dconn,
                         const char *xmlin,
                         unsigned long flags,
                         const char *dname,
                         const char *uri,
                         unsigned long bandwidth)
{
    return virDomainMigrateVersion3Full(domain, dconn, xmlin, dname, uri,
                                        bandwidth, NULL, 0, false, flags);
}

4920

J
Jiri Denemark 已提交
4921 4922 4923 4924 4925 4926 4927 4928 4929 4930 4931
static virDomainPtr
virDomainMigrateVersion3Params(virDomainPtr domain,
                               virConnectPtr dconn,
                               virTypedParameterPtr params,
                               int nparams,
                               unsigned int flags)
{
    return virDomainMigrateVersion3Full(domain, dconn, NULL, NULL, NULL, 0,
                                        params, nparams, true, flags);
}

4932

4933 4934 4935 4936 4937 4938 4939 4940 4941 4942 4943 4944 4945 4946
/*
 * In normal migration, the libvirt client co-ordinates communication
 * between the 2 libvirtd instances on source & dest hosts.
 *
 * In this peer-2-peer migration alternative, the libvirt client
 * only talks to the source libvirtd instance. The source libvirtd
 * then opens its own connection to the destination and co-ordinates
 * migration itself.
 *
 * If useParams is true, params and nparams contain migration parameters and
 * we know it's safe to call the API which supports extensible parameters.
 * Otherwise, we have to use xmlin, dname, uri, and bandwidth and pass them
 * to the old-style APIs.
 */
4947
static int
4948 4949 4950 4951 4952 4953 4954 4955 4956 4957
virDomainMigratePeer2PeerFull(virDomainPtr domain,
                              const char *dconnuri,
                              const char *xmlin,
                              const char *dname,
                              const char *uri,
                              unsigned long long bandwidth,
                              virTypedParameterPtr params,
                              int nparams,
                              bool useParams,
                              unsigned int flags)
4958
{
M
Martin Kletzander 已提交
4959
    virURIPtr tempuri = NULL;
4960

4961 4962 4963 4964 4965 4966
    VIR_DOMAIN_DEBUG(domain,
                     "dconnuri=%s, xmlin=%s, dname=%s, uri=%s, bandwidth=%llu "
                     "params=%p, nparams=%d, useParams=%d, flags=%x",
                     dconnuri, NULLSTR(xmlin), NULLSTR(dname), NULLSTR(uri),
                     bandwidth, params, nparams, useParams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
4967

4968 4969 4970 4971
    if ((useParams && !domain->conn->driver->domainMigratePerform3Params) ||
        (!useParams &&
         !domain->conn->driver->domainMigratePerform &&
         !domain->conn->driver->domainMigratePerform3)) {
4972
        virReportUnsupportedError();
4973 4974 4975
        return -1;
    }

4976
    if (!(tempuri = virURIParse(dconnuri)))
4977
        return -1;
4978
    if (!tempuri->server || STRPREFIX(tempuri->server, "localhost")) {
4979 4980 4981
        virReportInvalidArg(dconnuri,
                            _("unable to parse server from dconnuri in %s"),
                            __FUNCTION__);
4982
        virURIFree(tempuri);
4983 4984
        return -1;
    }
4985
    virURIFree(tempuri);
4986

4987 4988 4989 4990 4991 4992 4993
    if (useParams) {
        VIR_DEBUG("Using migration protocol 3 with extensible parameters");
        return domain->conn->driver->domainMigratePerform3Params
                (domain, dconnuri, params, nparams,
                 NULL, 0, NULL, NULL, flags);
    } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                        VIR_DRV_FEATURE_MIGRATION_V3)) {
4994
        VIR_DEBUG("Using migration protocol 3");
4995 4996 4997
        return domain->conn->driver->domainMigratePerform3
                (domain, xmlin, NULL, 0, NULL, NULL, dconnuri,
                 uri, flags, dname, bandwidth);
4998 4999
    } else {
        VIR_DEBUG("Using migration protocol 2");
5000
        if (xmlin) {
5001 5002 5003
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during "
                             "migration"));
5004 5005
            return -1;
        }
5006
        if (uri) {
5007 5008
            virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                           _("Unable to override peer2peer migration URI"));
5009 5010
            return -1;
        }
5011 5012
        return domain->conn->driver->domainMigratePerform
                (domain, NULL, 0, dconnuri, flags, dname, bandwidth);
5013
    }
5014 5015
}

5016

5017 5018 5019 5020 5021 5022 5023 5024 5025 5026 5027 5028 5029
static int
virDomainMigratePeer2Peer(virDomainPtr domain,
                          const char *xmlin,
                          unsigned long flags,
                          const char *dname,
                          const char *dconnuri,
                          const char *uri,
                          unsigned long bandwidth)
{
    return virDomainMigratePeer2PeerFull(domain, dconnuri, xmlin, dname, uri,
                                         bandwidth, NULL, 0, false, flags);
}

5030

J
Jiri Denemark 已提交
5031 5032 5033 5034 5035 5036 5037 5038 5039 5040 5041
static int
virDomainMigratePeer2PeerParams(virDomainPtr domain,
                                const char *dconnuri,
                                virTypedParameterPtr params,
                                int nparams,
                                unsigned int flags)
{
    return virDomainMigratePeer2PeerFull(domain, dconnuri, NULL, NULL, NULL, 0,
                                         params, nparams, true, flags);
}

5042

C
Chris Lalancette 已提交
5043
/*
5044
 * In normal migration, the libvirt client co-ordinates communication
5045
 * between the 2 libvirtd instances on source & dest hosts.
C
Chris Lalancette 已提交
5046
 *
5047 5048 5049
 * Some hypervisors support an alternative, direct migration where
 * there is no requirement for a libvirtd instance on the dest host.
 * In this case
5050
 *
5051 5052
 * eg, XenD can talk direct to XenD, so libvirtd on dest does not
 * need to be involved at all, or even running
C
Chris Lalancette 已提交
5053
 */
5054
static int
5055 5056 5057 5058 5059 5060
virDomainMigrateDirect(virDomainPtr domain,
                       const char *xmlin,
                       unsigned long flags,
                       const char *dname,
                       const char *uri,
                       unsigned long bandwidth)
5061
{
5062 5063 5064 5065
    VIR_DOMAIN_DEBUG(domain,
                     "xmlin=%s, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
                     NULLSTR(xmlin), flags, NULLSTR(dname), NULLSTR(uri),
                     bandwidth);
5066

5067
    if (!domain->conn->driver->domainMigratePerform) {
5068
        virReportUnsupportedError();
5069 5070 5071
        return -1;
    }

C
Chris Lalancette 已提交
5072 5073 5074
    /* Perform the migration.  The driver isn't supposed to return
     * until the migration is complete.
     */
5075 5076 5077
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATION_V3)) {
        VIR_DEBUG("Using migration protocol 3");
5078 5079
        /* dconn URI not relevant in direct migration, since no
         * target libvirtd is involved */
5080
        return domain->conn->driver->domainMigratePerform3(domain,
5081
                                                           xmlin,
5082 5083 5084 5085
                                                           NULL, /* cookiein */
                                                           0,    /* cookieinlen */
                                                           NULL, /* cookieoutlen */
                                                           NULL, /* cookieoutlen */
5086
                                                           NULL, /* dconnuri */
5087 5088 5089 5090 5091 5092
                                                           uri,
                                                           flags,
                                                           dname,
                                                           bandwidth);
    } else {
        VIR_DEBUG("Using migration protocol 2");
5093
        if (xmlin) {
5094 5095
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during migration"));
5096 5097
            return -1;
        }
5098 5099 5100 5101 5102 5103 5104 5105
        return domain->conn->driver->domainMigratePerform(domain,
                                                          NULL, /* cookie */
                                                          0,    /* cookielen */
                                                          uri,
                                                          flags,
                                                          dname,
                                                          bandwidth);
    }
C
Chris Lalancette 已提交
5106 5107
}

5108

5109 5110 5111 5112
/**
 * virDomainMigrate:
 * @domain: a domain object
 * @dconn: destination host (a connection object)
5113
 * @flags: bitwise-OR of virDomainMigrateFlags
5114 5115
 * @dname: (optional) rename domain to this at destination
 * @uri: (optional) dest hostname/URI as seen from the source host
5116
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5117 5118 5119 5120 5121
 *
 * Migrate the domain object from its current host to the destination
 * host given by dconn (a connection to the destination host).
 *
 * Flags may be one of more of the following:
5122 5123 5124
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
C
Chris Lalancette 已提交
5125 5126 5127 5128
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
5129
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
5130 5131 5132 5133
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
5134 5135 5136
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
5137
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
5138
 *   VIR_MIGRATE_OFFLINE Migrate offline
5139 5140 5141 5142 5143
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 * Applications using the VIR_MIGRATE_PEER2PEER flag will probably
 * prefer to invoke virDomainMigrateToURI, avoiding the need to
 * open connection to the destination host themselves.
5144 5145 5146 5147 5148 5149
 *
 * If a hypervisor supports renaming domains during migration,
 * then you may set the dname parameter to the new name (otherwise
 * it keeps the same name).  If this is not supported by the
 * hypervisor, dname must be NULL or else you will get an error.
 *
5150 5151 5152 5153 5154 5155 5156 5157 5158 5159 5160
 * If the VIR_MIGRATE_PEER2PEER flag is set, the uri parameter
 * must be a valid libvirt connection URI, by which the source
 * libvirt driver can connect to the destination libvirt. If
 * omitted, the dconn connection object will be queried for its
 * current URI.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, the URI parameter
 * takes a hypervisor specific format. The hypervisor capabilities
 * XML includes details of the support URI schemes. If omitted
 * the dconn will be asked for a default URI.
 *
5161 5162 5163 5164
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
5165
 * In either case it is typically only necessary to specify a
5166 5167
 * URI if the destination host has multiple interfaces and a
 * specific interface is required to transmit migration data.
5168
 *
5169
 * The maximum bandwidth (in MiB/s) that will be used to do migration
5170 5171 5172 5173 5174 5175 5176 5177 5178 5179 5180 5181 5182 5183 5184 5185 5186 5187
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns the new domain object if the migration was successful,
 *   or NULL in case of error.  Note that the new domain object
 *   exists in the scope of the destination connection (dconn).
 */
virDomainPtr
5188 5189 5190 5191 5192 5193
virDomainMigrate(virDomainPtr domain,
                 virConnectPtr dconn,
                 unsigned long flags,
                 const char *dname,
                 const char *uri,
                 unsigned long bandwidth)
5194 5195
{
    virDomainPtr ddomain = NULL;
5196

5197 5198
    VIR_DOMAIN_DEBUG(domain,
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
5199
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);
5200

5201 5202
    virResetLastError();

5203
    /* First checkout the source */
5204
    virCheckDomainReturn(domain, NULL);
5205
    virCheckReadOnlyGoto(domain->conn->flags, error);
5206

5207
    /* Now checkout the destination */
5208
    virCheckConnectGoto(dconn, error);
5209
    virCheckReadOnlyGoto(dconn->flags, error);
5210

5211 5212 5213 5214 5215 5216 5217 5218 5219
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

L
liguang 已提交
5220 5221 5222
    if (flags & VIR_MIGRATE_OFFLINE) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5223 5224 5225
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the source host"));
L
liguang 已提交
5226 5227 5228 5229
            goto error;
        }
        if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5230 5231 5232
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the destination host"));
L
liguang 已提交
5233 5234 5235 5236
            goto error;
        }
    }

5237
    if (flags & VIR_MIGRATE_PEER2PEER) {
5238 5239
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
5240 5241 5242
            char *dstURI = NULL;
            if (uri == NULL) {
                dstURI = virConnectGetURI(dconn);
5243
                if (!dstURI)
5244 5245
                    return NULL;
            }
5246

5247
            VIR_DEBUG("Using peer2peer migration");
5248
            if (virDomainMigratePeer2Peer(domain, NULL, flags, dname,
5249
                                          uri ? uri : dstURI, NULL, bandwidth) < 0) {
5250 5251 5252 5253
                VIR_FREE(dstURI);
                goto error;
            }
            VIR_FREE(dstURI);
C
Chris Lalancette 已提交
5254

5255
            ddomain = virDomainLookupByName(dconn, dname ? dname : domain->name);
5256 5257
        } else {
            /* This driver does not support peer to peer migration */
5258
            virReportUnsupportedError();
5259 5260
            goto error;
        }
5261
    } else {
5262 5263 5264 5265 5266 5267 5268 5269
        /* Change protection requires support only on source side, and
         * is only needed in v3 migration, which automatically re-adds
         * the flag for just the source side.  We mask it out for
         * non-peer2peer to allow migration from newer source to an
         * older destination that rejects the flag.  */
        if (flags & VIR_MIGRATE_CHANGE_PROTECTION &&
            !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION)) {
5270 5271
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("cannot enforce change protection"));
5272 5273 5274
            goto error;
        }
        flags &= ~VIR_MIGRATE_CHANGE_PROTECTION;
5275
        if (flags & VIR_MIGRATE_TUNNELLED) {
5276 5277
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("cannot perform tunnelled migration without using peer2peer flag"));
5278 5279 5280
            goto error;
        }

C
Chris Lalancette 已提交
5281 5282
        /* Check that migration is supported by both drivers. */
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
5283
                                     VIR_DRV_FEATURE_MIGRATION_V3) &&
C
Chris Lalancette 已提交
5284
            VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
5285 5286
                                     VIR_DRV_FEATURE_MIGRATION_V3)) {
            VIR_DEBUG("Using migration protocol 3");
5287 5288
            ddomain = virDomainMigrateVersion3(domain, dconn, NULL,
                                               flags, dname, uri, bandwidth);
5289 5290 5291 5292 5293
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V2) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                          VIR_DRV_FEATURE_MIGRATION_V2)) {
            VIR_DEBUG("Using migration protocol 2");
5294 5295
            ddomain = virDomainMigrateVersion2(domain, dconn, flags,
                                               dname, uri, bandwidth);
5296 5297 5298 5299 5300
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V1) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                            VIR_DRV_FEATURE_MIGRATION_V1)) {
            VIR_DEBUG("Using migration protocol 1");
5301 5302 5303 5304
            ddomain = virDomainMigrateVersion1(domain, dconn, flags,
                                               dname, uri, bandwidth);
        } else {
            /* This driver does not support any migration method */
5305
            virReportUnsupportedError();
5306 5307 5308 5309 5310 5311 5312 5313 5314 5315 5316 5317 5318 5319 5320 5321 5322 5323 5324
            goto error;
        }
    }

    if (ddomain == NULL)
        goto error;

    return ddomain;

error:
    virDispatchError(domain->conn);
    return NULL;
}


/**
 * virDomainMigrate2:
 * @domain: a domain object
 * @dconn: destination host (a connection object)
5325
 * @flags: bitwise-OR of virDomainMigrateFlags
5326 5327 5328
 * @dxml: (optional) XML config for launching guest on target
 * @dname: (optional) rename domain to this at destination
 * @uri: (optional) dest hostname/URI as seen from the source host
5329
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5330 5331 5332 5333 5334 5335 5336 5337 5338 5339 5340 5341 5342
 *
 * Migrate the domain object from its current host to the destination
 * host given by dconn (a connection to the destination host).
 *
 * Flags may be one of more of the following:
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
5343 5344 5345 5346
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
5347 5348 5349
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
5350
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
5351
 *   VIR_MIGRATE_OFFLINE Migrate offline
5352 5353 5354 5355 5356 5357 5358 5359 5360 5361 5362 5363 5364 5365 5366 5367 5368 5369 5370 5371 5372 5373
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 * Applications using the VIR_MIGRATE_PEER2PEER flag will probably
 * prefer to invoke virDomainMigrateToURI, avoiding the need to
 * open connection to the destination host themselves.
 *
 * If a hypervisor supports renaming domains during migration,
 * then you may set the dname parameter to the new name (otherwise
 * it keeps the same name).  If this is not supported by the
 * hypervisor, dname must be NULL or else you will get an error.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is set, the uri parameter
 * must be a valid libvirt connection URI, by which the source
 * libvirt driver can connect to the destination libvirt. If
 * omitted, the dconn connection object will be queried for its
 * current URI.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, the URI parameter
 * takes a hypervisor specific format. The hypervisor capabilities
 * XML includes details of the support URI schemes. If omitted
 * the dconn will be asked for a default URI.
 *
5374 5375 5376 5377
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
5378 5379 5380 5381
 * In either case it is typically only necessary to specify a
 * URI if the destination host has multiple interfaces and a
 * specific interface is required to transmit migration data.
 *
5382
 * The maximum bandwidth (in MiB/s) that will be used to do migration
5383 5384 5385 5386 5387 5388 5389 5390 5391 5392 5393 5394 5395
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
5396 5397 5398 5399 5400 5401 5402 5403
 * If the hypervisor supports it, @dxml can be used to alter
 * host-specific portions of the domain XML that will be used on
 * the destination.  For example, it is possible to alter the
 * backing filename that is associated with a disk device, in order
 * to account for naming differences between source and destination
 * in accessing the underlying storage.  The migration will fail
 * if @dxml would cause any guest-visible changes.  Pass NULL
 * if no changes are needed to the XML between source and destination.
5404
 * @dxml cannot be used to rename the domain during migration (use
5405 5406
 * @dname for that purpose).  Domain name in @dxml must match the
 * original domain name.
5407
 *
5408 5409 5410 5411 5412 5413 5414 5415 5416 5417 5418 5419 5420 5421 5422
 * Returns the new domain object if the migration was successful,
 *   or NULL in case of error.  Note that the new domain object
 *   exists in the scope of the destination connection (dconn).
 */
virDomainPtr
virDomainMigrate2(virDomainPtr domain,
                  virConnectPtr dconn,
                  const char *dxml,
                  unsigned long flags,
                  const char *dname,
                  const char *uri,
                  unsigned long bandwidth)
{
    virDomainPtr ddomain = NULL;

5423 5424
    VIR_DOMAIN_DEBUG(domain,
                     "dconn=%p, flags=%lx, dname=%s, uri=%s, bandwidth=%lu",
5425 5426 5427 5428 5429
                     dconn, flags, NULLSTR(dname), NULLSTR(uri), bandwidth);

    virResetLastError();

    /* First checkout the source */
5430
    virCheckDomainReturn(domain, NULL);
5431
    virCheckReadOnlyGoto(domain->conn->flags, error);
5432 5433

    /* Now checkout the destination */
5434
    virCheckConnectGoto(dconn, error);
5435
    virCheckReadOnlyGoto(dconn->flags, error);
5436

5437 5438 5439 5440 5441 5442 5443 5444 5445
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

L
liguang 已提交
5446 5447 5448
    if (flags & VIR_MIGRATE_OFFLINE) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5449 5450 5451
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the source host"));
L
liguang 已提交
5452 5453 5454 5455
            goto error;
        }
        if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5456 5457 5458
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the destination host"));
L
liguang 已提交
5459 5460 5461 5462
            goto error;
        }
    }

5463
    if (flags & VIR_MIGRATE_PEER2PEER) {
5464 5465
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
5466 5467 5468 5469 5470 5471 5472 5473 5474 5475 5476 5477
            char *dstURI = virConnectGetURI(dconn);
            if (!dstURI)
                return NULL;

            VIR_DEBUG("Using peer2peer migration");
            if (virDomainMigratePeer2Peer(domain, dxml, flags, dname,
                                          dstURI, uri, bandwidth) < 0) {
                VIR_FREE(dstURI);
                goto error;
            }
            VIR_FREE(dstURI);

5478
            ddomain = virDomainLookupByName(dconn, dname ? dname : domain->name);
5479 5480
        } else {
            /* This driver does not support peer to peer migration */
5481
            virReportUnsupportedError();
5482 5483 5484
            goto error;
        }
    } else {
5485 5486 5487 5488 5489 5490 5491 5492
        /* Change protection requires support only on source side, and
         * is only needed in v3 migration, which automatically re-adds
         * the flag for just the source side.  We mask it out for
         * non-peer2peer to allow migration from newer source to an
         * older destination that rejects the flag.  */
        if (flags & VIR_MIGRATE_CHANGE_PROTECTION &&
            !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION)) {
5493 5494
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("cannot enforce change protection"));
5495 5496 5497
            goto error;
        }
        flags &= ~VIR_MIGRATE_CHANGE_PROTECTION;
5498
        if (flags & VIR_MIGRATE_TUNNELLED) {
5499 5500
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("cannot perform tunnelled migration without using peer2peer flag"));
5501 5502 5503 5504 5505 5506 5507 5508 5509 5510 5511 5512 5513 5514 5515 5516 5517
            goto error;
        }

        /* Check that migration is supported by both drivers. */
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_V3) &&
            VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                     VIR_DRV_FEATURE_MIGRATION_V3)) {
            VIR_DEBUG("Using migration protocol 3");
            ddomain = virDomainMigrateVersion3(domain, dconn, dxml,
                                               flags, dname, uri, bandwidth);
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V2) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                          VIR_DRV_FEATURE_MIGRATION_V2)) {
            VIR_DEBUG("Using migration protocol 2");
            if (dxml) {
5518 5519
                virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                               _("Unable to change target guest XML during migration"));
5520 5521 5522 5523 5524 5525 5526 5527 5528 5529
                goto error;
            }
            ddomain = virDomainMigrateVersion2(domain, dconn, flags,
                                               dname, uri, bandwidth);
        } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                            VIR_DRV_FEATURE_MIGRATION_V1) &&
                   VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                            VIR_DRV_FEATURE_MIGRATION_V1)) {
            VIR_DEBUG("Using migration protocol 1");
            if (dxml) {
5530 5531
                virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                               _("Unable to change target guest XML during migration"));
5532 5533 5534 5535
                goto error;
            }
            ddomain = virDomainMigrateVersion1(domain, dconn, flags,
                                               dname, uri, bandwidth);
5536
        } else {
5537
            /* This driver does not support any migration method */
5538
            virReportUnsupportedError();
C
Chris Lalancette 已提交
5539 5540
            goto error;
        }
5541 5542
    }

5543 5544
    if (ddomain == NULL)
        goto error;
D
Daniel Veillard 已提交
5545

5546
    return ddomain;
5547 5548

error:
5549
    virDispatchError(domain->conn);
5550
    return NULL;
5551 5552
}

5553

J
Jiri Denemark 已提交
5554 5555 5556 5557 5558 5559 5560 5561 5562 5563 5564 5565 5566 5567 5568 5569 5570 5571 5572 5573 5574 5575 5576 5577 5578 5579 5580 5581 5582 5583 5584 5585 5586 5587 5588 5589 5590 5591 5592 5593 5594 5595 5596 5597 5598 5599 5600 5601 5602 5603 5604 5605 5606
/**
 * virDomainMigrate3:
 * @domain: a domain object
 * @dconn: destination host (a connection object)
 * @params: (optional) migration parameters
 * @nparams: (optional) number of migration parameters in @params
 * @flags: bitwise-OR of virDomainMigrateFlags
 *
 * Migrate the domain object from its current host to the destination host
 * given by dconn (a connection to the destination host).
 *
 * See virDomainMigrateFlags documentation for description of individual flags.
 *
 * VIR_MIGRATE_TUNNELLED and VIR_MIGRATE_PEER2PEER are not supported by this
 * API, use virDomainMigrateToURI3 instead.
 *
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns the new domain object if the migration was successful,
 *   or NULL in case of error.  Note that the new domain object
 *   exists in the scope of the destination connection (dconn).
 */
virDomainPtr
virDomainMigrate3(virDomainPtr domain,
                  virConnectPtr dconn,
                  virTypedParameterPtr params,
                  unsigned int nparams,
                  unsigned int flags)
{
    virDomainPtr ddomain = NULL;
    const char *compatParams[] = { VIR_MIGRATE_PARAM_URI,
                                   VIR_MIGRATE_PARAM_DEST_NAME,
                                   VIR_MIGRATE_PARAM_DEST_XML,
                                   VIR_MIGRATE_PARAM_BANDWIDTH };
    const char *uri = NULL;
    const char *dname = NULL;
    const char *dxml = NULL;
    unsigned long long bandwidth = 0;

    VIR_DOMAIN_DEBUG(domain, "dconn=%p, params=%p, nparms=%u flags=%x",
                     dconn, params, nparams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

    /* First checkout the source */
5607
    virCheckDomainReturn(domain, NULL);
5608
    virCheckReadOnlyGoto(domain->conn->flags, error);
J
Jiri Denemark 已提交
5609 5610

    /* Now checkout the destination */
5611
    virCheckConnectGoto(dconn, error);
5612
    virCheckReadOnlyGoto(dconn->flags, error);
J
Jiri Denemark 已提交
5613 5614 5615 5616 5617 5618 5619 5620 5621 5622 5623 5624 5625 5626 5627 5628 5629 5630 5631

    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }
    if (flags & (VIR_MIGRATE_PEER2PEER | VIR_MIGRATE_TUNNELLED)) {
        virReportInvalidArg(flags, "%s",
                            _("use virDomainMigrateToURI3 for peer-to-peer "
                              "migration"));
        goto error;
    }

    if (flags & VIR_MIGRATE_OFFLINE) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5632 5633 5634
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the source host"));
J
Jiri Denemark 已提交
5635 5636 5637 5638
            goto error;
        }
        if (!VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5639 5640 5641
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("offline migration is not supported by "
                             "the destination host"));
J
Jiri Denemark 已提交
5642 5643 5644 5645 5646 5647 5648 5649 5650 5651 5652 5653
            goto error;
        }
    }

    /* Change protection requires support only on source side, and
     * is only needed in v3 migration, which automatically re-adds
     * the flag for just the source side.  We mask it out to allow
     * migration from newer source to an older destination that
     * rejects the flag.  */
    if (flags & VIR_MIGRATE_CHANGE_PROTECTION &&
        !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                  VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION)) {
5654 5655
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("cannot enforce change protection"));
J
Jiri Denemark 已提交
5656 5657 5658 5659 5660 5661 5662 5663 5664 5665 5666 5667 5668 5669 5670 5671 5672 5673
        goto error;
    }
    flags &= ~VIR_MIGRATE_CHANGE_PROTECTION;

    /* Prefer extensible API but fall back to older migration APIs if params
     * only contains parameters which were supported by the older API. */
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATION_PARAMS) &&
        VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                 VIR_DRV_FEATURE_MIGRATION_PARAMS)) {
        VIR_DEBUG("Using migration protocol 3 with extensible parameters");
        ddomain = virDomainMigrateVersion3Params(domain, dconn, params,
                                                 nparams, flags);
        goto done;
    }

    if (!virTypedParamsCheck(params, nparams, compatParams,
                             ARRAY_CARDINALITY(compatParams))) {
5674 5675 5676
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("Migration APIs with extensible parameters are not "
                         "supported but extended parameters were passed"));
J
Jiri Denemark 已提交
5677 5678 5679 5680 5681 5682 5683 5684 5685 5686 5687 5688 5689 5690 5691 5692 5693 5694 5695 5696 5697 5698 5699 5700 5701 5702 5703
        goto error;
    }

    if (virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_URI, &uri) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_NAME, &dname) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_XML, &dxml) < 0 ||
        virTypedParamsGetULLong(params, nparams,
                                VIR_MIGRATE_PARAM_BANDWIDTH, &bandwidth) < 0) {
        goto error;
    }

    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_MIGRATION_V3) &&
        VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                 VIR_DRV_FEATURE_MIGRATION_V3)) {
        VIR_DEBUG("Using migration protocol 3");
        ddomain = virDomainMigrateVersion3(domain, dconn, dxml, flags,
                                           dname, uri, bandwidth);
    } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                        VIR_DRV_FEATURE_MIGRATION_V2) &&
               VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                      VIR_DRV_FEATURE_MIGRATION_V2)) {
        VIR_DEBUG("Using migration protocol 2");
        if (dxml) {
5704 5705 5706
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during "
                             "migration"));
J
Jiri Denemark 已提交
5707 5708 5709 5710 5711 5712 5713 5714 5715 5716
            goto error;
        }
        ddomain = virDomainMigrateVersion2(domain, dconn, flags,
                                           dname, uri, bandwidth);
    } else if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                        VIR_DRV_FEATURE_MIGRATION_V1) &&
               VIR_DRV_SUPPORTS_FEATURE(dconn->driver, dconn,
                                        VIR_DRV_FEATURE_MIGRATION_V1)) {
        VIR_DEBUG("Using migration protocol 1");
        if (dxml) {
5717 5718 5719
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Unable to change target guest XML during "
                             "migration"));
J
Jiri Denemark 已提交
5720 5721 5722 5723 5724 5725
            goto error;
        }
        ddomain = virDomainMigrateVersion1(domain, dconn, flags,
                                           dname, uri, bandwidth);
    } else {
        /* This driver does not support any migration method */
5726
        virReportUnsupportedError();
J
Jiri Denemark 已提交
5727 5728 5729 5730 5731 5732 5733 5734 5735 5736 5737 5738 5739 5740 5741
        goto error;
    }

done:
    if (ddomain == NULL)
        goto error;

    return ddomain;

error:
    virDispatchError(domain->conn);
    return NULL;
}


5742 5743 5744 5745
/**
 * virDomainMigrateToURI:
 * @domain: a domain object
 * @duri: mandatory URI for the destination host
5746
 * @flags: bitwise-OR of virDomainMigrateFlags
5747
 * @dname: (optional) rename domain to this at destination
5748
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5749 5750
 *
 * Migrate the domain object from its current host to the destination
D
Dan Kenigsberg 已提交
5751
 * host given by duri.
5752 5753 5754 5755 5756
 *
 * Flags may be one of more of the following:
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
5757 5758 5759 5760
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
5761 5762 5763 5764 5765
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
5766 5767 5768
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
5769
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
5770
 *   VIR_MIGRATE_OFFLINE Migrate offline
5771
 *
5772 5773 5774 5775 5776 5777 5778 5779 5780 5781
 * The operation of this API hinges on the VIR_MIGRATE_PEER2PEER flag.
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, the duri parameter
 * takes a hypervisor specific format. The uri_transports element of the
 * hypervisor capabilities XML includes details of the supported URI
 * schemes. Not all hypervisors will support this mode of migration, so
 * if the VIR_MIGRATE_PEER2PEER flag is not set, then it may be necessary
 * to use the alternative virDomainMigrate API providing and explicit
 * virConnectPtr for the destination host.
 *
 * If the VIR_MIGRATE_PEER2PEER flag IS set, the duri parameter
5782
 * must be a valid libvirt connection URI, by which the source
D
Dan Kenigsberg 已提交
5783
 * libvirt driver can connect to the destination libvirt.
5784
 *
5785 5786
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 *
5787 5788 5789 5790
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
5791 5792 5793 5794 5795
 * If a hypervisor supports renaming domains during migration,
 * the dname parameter specifies the new name for the domain.
 * Setting dname to NULL keeps the domain name the same.  If domain
 * renaming is not supported by the hypervisor, dname must be NULL or
 * else an error will be returned.
5796
 *
5797
 * The maximum bandwidth (in MiB/s) that will be used to do migration
5798 5799 5800 5801 5802 5803 5804 5805 5806 5807 5808 5809 5810 5811 5812 5813
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns 0 if the migration succeeded, -1 upon error.
 */
int
5814 5815 5816 5817 5818
virDomainMigrateToURI(virDomainPtr domain,
                      const char *duri,
                      unsigned long flags,
                      const char *dname,
                      unsigned long bandwidth)
5819
{
5820
    VIR_DOMAIN_DEBUG(domain, "duri=%p, flags=%lx, dname=%s, bandwidth=%lu",
5821
                     NULLSTR(duri), flags, NULLSTR(dname), bandwidth);
5822 5823 5824 5825

    virResetLastError();

    /* First checkout the source */
5826
    virCheckDomainReturn(domain, -1);
5827
    virCheckReadOnlyGoto(domain->conn->flags, error);
5828

5829
    virCheckNonNullArgGoto(duri, error);
5830

5831 5832 5833 5834 5835 5836 5837 5838 5839
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

L
liguang 已提交
5840 5841 5842
    if (flags & VIR_MIGRATE_OFFLINE &&
        !VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                  VIR_DRV_FEATURE_MIGRATION_OFFLINE)) {
5843 5844 5845
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("offline migration is not supported by "
                         "the source host"));
L
liguang 已提交
5846 5847 5848
        goto error;
    }

5849
    if (flags & VIR_MIGRATE_PEER2PEER) {
5850 5851
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
5852
            VIR_DEBUG("Using peer2peer migration");
5853
            if (virDomainMigratePeer2Peer(domain, NULL, flags,
5854
                                          dname, duri, NULL, bandwidth) < 0)
5855 5856 5857
                goto error;
        } else {
            /* No peer to peer migration supported */
5858
            virReportUnsupportedError();
5859 5860 5861
            goto error;
        }
    } else {
5862 5863
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_DIRECT)) {
5864
            VIR_DEBUG("Using direct migration");
5865 5866
            if (virDomainMigrateDirect(domain, NULL, flags,
                                       dname, duri, bandwidth) < 0)
5867 5868 5869
                goto error;
        } else {
            /* Cannot do a migration with only the perform step */
5870 5871 5872
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("direct migration is not supported by the"
                             " connection driver"));
5873 5874 5875 5876 5877 5878 5879
            goto error;
        }
    }

    return 0;

error:
5880
    virDispatchError(domain->conn);
5881 5882 5883 5884
    return -1;
}


5885 5886 5887 5888 5889 5890
/**
 * virDomainMigrateToURI2:
 * @domain: a domain object
 * @dconnuri: (optional) URI for target libvirtd if @flags includes VIR_MIGRATE_PEER2PEER
 * @miguri: (optional) URI for invoking the migration, not if @flags includs VIR_MIGRATE_TUNNELLED
 * @dxml: (optional) XML config for launching guest on target
5891
 * @flags: bitwise-OR of virDomainMigrateFlags
5892
 * @dname: (optional) rename domain to this at destination
5893
 * @bandwidth: (optional) specify migration bandwidth limit in MiB/s
5894 5895 5896 5897 5898 5899 5900 5901 5902 5903 5904 5905
 *
 * Migrate the domain object from its current host to the destination
 * host given by duri.
 *
 * Flags may be one of more of the following:
 *   VIR_MIGRATE_LIVE      Do not pause the VM during migration
 *   VIR_MIGRATE_PEER2PEER Direct connection between source & destination hosts
 *   VIR_MIGRATE_TUNNELLED Tunnel migration data over the libvirt RPC channel
 *   VIR_MIGRATE_PERSIST_DEST If the migration is successful, persist the domain
 *                            on the destination host.
 *   VIR_MIGRATE_UNDEFINE_SOURCE If the migration is successful, undefine the
 *                               domain on the source host.
5906 5907 5908 5909 5910
 *   VIR_MIGRATE_PAUSED    Leave the domain suspended on the remote side.
 *   VIR_MIGRATE_NON_SHARED_DISK Migration with non-shared storage with full
 *                               disk copy
 *   VIR_MIGRATE_NON_SHARED_INC  Migration with non-shared storage with
 *                               incremental disk copy
5911 5912 5913
 *   VIR_MIGRATE_CHANGE_PROTECTION Protect against domain configuration
 *                                 changes during the migration process (set
 *                                 automatically when supported).
J
Jiri Denemark 已提交
5914
 *   VIR_MIGRATE_UNSAFE    Force migration even if it is considered unsafe.
5915
 *   VIR_MIGRATE_OFFLINE Migrate offline
5916 5917 5918 5919 5920 5921 5922 5923 5924 5925 5926 5927 5928 5929 5930 5931 5932
 *
 * The operation of this API hinges on the VIR_MIGRATE_PEER2PEER flag.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is set, the @dconnuri parameter
 * must be a valid libvirt connection URI, by which the source
 * libvirt driver can connect to the destination libvirt. If the
 * VIR_MIGRATE_PEER2PEER flag is NOT set, then @dconnuri must be
 * NULL.
 *
 * If the VIR_MIGRATE_TUNNELLED flag is NOT set, then the @miguri
 * parameter allows specification of a URI to use to initiate the
 * VM migration. It takes a hypervisor specific format. The uri_transports
 * element of the hypervisor capabilities XML includes details of the
 * supported URI schemes.
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 *
5933 5934 5935 5936
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
5937 5938 5939 5940 5941 5942 5943 5944 5945 5946 5947 5948 5949 5950 5951
 * If a hypervisor supports changing the configuration of the guest
 * during migration, the @dxml parameter specifies the new config
 * for the guest. The configuration must include an identical set
 * of virtual devices, to ensure a stable guest ABI across migration.
 * Only parameters related to host side configuration can be
 * changed in the XML. Hypervisors will validate this and refuse to
 * allow migration if the provided XML would cause a change in the
 * guest ABI,
 *
 * If a hypervisor supports renaming domains during migration,
 * the dname parameter specifies the new name for the domain.
 * Setting dname to NULL keeps the domain name the same.  If domain
 * renaming is not supported by the hypervisor, dname must be NULL or
 * else an error will be returned.
 *
5952
 * The maximum bandwidth (in MiB/s) that will be used to do migration
5953 5954 5955 5956 5957 5958 5959 5960 5961 5962 5963 5964 5965 5966 5967 5968 5969 5970 5971 5972 5973 5974 5975 5976 5977
 * can be specified with the bandwidth parameter.  If set to 0,
 * libvirt will choose a suitable default.  Some hypervisors do
 * not support this feature and will return an error if bandwidth
 * is not 0.
 *
 * To see which features are supported by the current hypervisor,
 * see virConnectGetCapabilities, /capabilities/host/migration_features.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns 0 if the migration succeeded, -1 upon error.
 */
int
virDomainMigrateToURI2(virDomainPtr domain,
                       const char *dconnuri,
                       const char *miguri,
                       const char *dxml,
                       unsigned long flags,
                       const char *dname,
                       unsigned long bandwidth)
{
    VIR_DOMAIN_DEBUG(domain, "dconnuri=%s, miguri=%s, dxml=%s, "
5978
                     "flags=%lx, dname=%s, bandwidth=%lu",
5979 5980 5981 5982 5983 5984
                     NULLSTR(dconnuri), NULLSTR(miguri), NULLSTR(dxml),
                     flags, NULLSTR(dname), bandwidth);

    virResetLastError();

    /* First checkout the source */
5985
    virCheckDomainReturn(domain, -1);
5986
    virCheckReadOnlyGoto(domain->conn->flags, error);
5987

5988 5989 5990 5991 5992 5993 5994 5995 5996
    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

5997
    if (flags & VIR_MIGRATE_PEER2PEER) {
5998 5999
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_P2P)) {
6000 6001 6002 6003 6004 6005
            VIR_DEBUG("Using peer2peer migration");
            if (virDomainMigratePeer2Peer(domain, dxml, flags,
                                          dname, dconnuri, miguri, bandwidth) < 0)
                goto error;
        } else {
            /* No peer to peer migration supported */
6006
            virReportUnsupportedError();
6007 6008 6009
            goto error;
        }
    } else {
6010 6011
        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_DIRECT)) {
6012 6013 6014 6015 6016 6017
            VIR_DEBUG("Using direct migration");
            if (virDomainMigrateDirect(domain, dxml, flags,
                                       dname, miguri, bandwidth) < 0)
                goto error;
        } else {
            /* Cannot do a migration with only the perform step */
6018 6019 6020
            virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                           _("direct migration is not supported by the"
                             " connection driver"));
6021 6022 6023 6024 6025 6026 6027 6028 6029 6030 6031 6032
            goto error;
        }
    }

    return 0;

error:
    virDispatchError(domain->conn);
    return -1;
}


J
Jiri Denemark 已提交
6033 6034 6035 6036 6037 6038 6039 6040 6041 6042 6043 6044 6045 6046 6047 6048 6049 6050 6051 6052 6053 6054 6055 6056 6057 6058 6059 6060 6061 6062 6063 6064 6065 6066 6067 6068 6069 6070 6071 6072 6073 6074 6075 6076 6077 6078 6079 6080 6081 6082 6083 6084 6085 6086 6087 6088 6089 6090 6091 6092 6093
/**
 * virDomainMigrateToURI3:
 * @domain: a domain object
 * @dconnuri: (optional) URI for target libvirtd if @flags includes VIR_MIGRATE_PEER2PEER
 * @params: (optional) migration parameters
 * @nparams: (optional) number of migration parameters in @params
 * @flags: bitwise-OR of virDomainMigrateFlags
 *
 * Migrate the domain object from its current host to the destination host
 * given by URI.
 *
 * See virDomainMigrateFlags documentation for description of individual flags.
 *
 * The operation of this API hinges on the VIR_MIGRATE_PEER2PEER flag.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is set, the @dconnuri parameter must be a
 * valid libvirt connection URI, by which the source libvirt daemon can connect
 * to the destination libvirt.
 *
 * If the VIR_MIGRATE_PEER2PEER flag is NOT set, then @dconnuri must be NULL
 * and VIR_MIGRATE_PARAM_URI migration parameter must be filled in with
 * hypervisor specific URI used to initiate the migration. This is called
 * "direct" migration.
 *
 * VIR_MIGRATE_TUNNELLED requires that VIR_MIGRATE_PEER2PEER be set.
 *
 * If you want to copy non-shared storage within migration you
 * can use either VIR_MIGRATE_NON_SHARED_DISK or
 * VIR_MIGRATE_NON_SHARED_INC as they are mutually exclusive.
 *
 * There are many limitations on migration imposed by the underlying
 * technology - for example it may not be possible to migrate between
 * different processors even with the same architecture, or between
 * different types of hypervisor.
 *
 * Returns 0 if the migration succeeded, -1 upon error.
 */
int
virDomainMigrateToURI3(virDomainPtr domain,
                       const char *dconnuri,
                       virTypedParameterPtr params,
                       unsigned int nparams,
                       unsigned int flags)
{
    bool compat;
    const char *compatParams[] = { VIR_MIGRATE_PARAM_URI,
                                   VIR_MIGRATE_PARAM_DEST_NAME,
                                   VIR_MIGRATE_PARAM_DEST_XML,
                                   VIR_MIGRATE_PARAM_BANDWIDTH };
    const char *uri = NULL;
    const char *dname = NULL;
    const char *dxml = NULL;
    unsigned long long bandwidth = 0;

    VIR_DOMAIN_DEBUG(domain, "dconnuri=%s, params=%p, nparms=%u flags=%x",
                     NULLSTR(dconnuri), params, nparams, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

    /* First checkout the source */
6094
    virCheckDomainReturn(domain, -1);
6095
    virCheckReadOnlyGoto(domain->conn->flags, error);
J
Jiri Denemark 已提交
6096 6097 6098 6099 6100 6101 6102 6103 6104 6105 6106 6107 6108 6109 6110 6111 6112 6113 6114 6115 6116 6117 6118 6119 6120 6121 6122

    if (flags & VIR_MIGRATE_NON_SHARED_DISK &&
        flags & VIR_MIGRATE_NON_SHARED_INC) {
        virReportInvalidArg(flags,
                            _("flags 'shared disk' and 'shared incremental' "
                              "in %s are mutually exclusive"),
                            __FUNCTION__);
        goto error;
    }

    compat = virTypedParamsCheck(params, nparams, compatParams,
                                 ARRAY_CARDINALITY(compatParams));

    if (virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_URI, &uri) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_NAME, &dname) < 0 ||
        virTypedParamsGetString(params, nparams,
                                VIR_MIGRATE_PARAM_DEST_XML, &dxml) < 0 ||
        virTypedParamsGetULLong(params, nparams,
                                VIR_MIGRATE_PARAM_BANDWIDTH, &bandwidth) < 0) {
        goto error;
    }

    if (flags & VIR_MIGRATE_PEER2PEER) {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_P2P)) {
6123 6124 6125
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                           _("Peer-to-peer migration is not supported by "
                             "the connection driver"));
J
Jiri Denemark 已提交
6126 6127 6128 6129 6130 6131 6132 6133 6134 6135 6136 6137 6138 6139 6140
            goto error;
        }

        if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                     VIR_DRV_FEATURE_MIGRATION_PARAMS)) {
            VIR_DEBUG("Using peer2peer migration with extensible parameters");
            if (virDomainMigratePeer2PeerParams(domain, dconnuri, params,
                                                nparams, flags) < 0)
                goto error;
        } else if (compat) {
            VIR_DEBUG("Using peer2peer migration");
            if (virDomainMigratePeer2Peer(domain, dxml, flags, dname,
                                          dconnuri, uri, bandwidth) < 0)
                goto error;
        } else {
6141 6142 6143 6144
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Peer-to-peer migration with extensible "
                             "parameters is not supported but extended "
                             "parameters were passed"));
J
Jiri Denemark 已提交
6145 6146 6147 6148 6149 6150
            goto error;
        }
    } else {
        if (!VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                      VIR_DRV_FEATURE_MIGRATION_DIRECT)) {
            /* Cannot do a migration with only the perform step */
6151 6152 6153
            virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
                           _("Direct migration is not supported by the"
                             " connection driver"));
J
Jiri Denemark 已提交
6154 6155 6156 6157
            goto error;
        }

        if (!compat) {
6158 6159 6160
            virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                           _("Direct migration does not support extensible "
                             "parameters"));
J
Jiri Denemark 已提交
6161 6162 6163 6164 6165 6166 6167 6168 6169 6170 6171 6172 6173 6174 6175 6176 6177
            goto error;
        }

        VIR_DEBUG("Using direct migration");
        if (virDomainMigrateDirect(domain, dxml, flags,
                                   dname, uri, bandwidth) < 0)
            goto error;
    }

    return 0;

error:
    virDispatchError(domain->conn);
    return -1;
}


D
Daniel Veillard 已提交
6178 6179
/*
 * Not for public use.  This function is part of the internal
6180 6181 6182
 * implementation of migration in the remote case.
 */
int
6183 6184 6185 6186 6187 6188 6189 6190
virDomainMigratePrepare(virConnectPtr dconn,
                        char **cookie,
                        int *cookielen,
                        const char *uri_in,
                        char **uri_out,
                        unsigned long flags,
                        const char *dname,
                        unsigned long bandwidth)
6191
{
J
John Levon 已提交
6192
    VIR_DEBUG("dconn=%p, cookie=%p, cookielen=%p, uri_in=%s, uri_out=%p, "
6193
              "flags=%lx, dname=%s, bandwidth=%lu", dconn, cookie, cookielen,
J
John Levon 已提交
6194
              NULLSTR(uri_in), uri_out, flags, NULLSTR(dname), bandwidth);
6195

6196 6197
    virResetLastError();

6198
    virCheckConnectReturn(dconn, -1);
6199
    virCheckReadOnlyGoto(dconn->flags, error);
6200

6201 6202
    if (dconn->driver->domainMigratePrepare) {
        int ret;
6203 6204 6205
        ret = dconn->driver->domainMigratePrepare(dconn, cookie, cookielen,
                                                  uri_in, uri_out,
                                                  flags, dname, bandwidth);
6206 6207 6208 6209
        if (ret < 0)
            goto error;
        return ret;
    }
6210

6211
    virReportUnsupportedError();
6212 6213

error:
6214
    virDispatchError(dconn);
6215 6216 6217
    return -1;
}

6218

D
Daniel Veillard 已提交
6219 6220
/*
 * Not for public use.  This function is part of the internal
6221 6222 6223
 * implementation of migration in the remote case.
 */
int
6224 6225 6226 6227 6228 6229 6230
virDomainMigratePerform(virDomainPtr domain,
                        const char *cookie,
                        int cookielen,
                        const char *uri,
                        unsigned long flags,
                        const char *dname,
                        unsigned long bandwidth)
6231 6232
{
    virConnectPtr conn;
6233

6234
    VIR_DOMAIN_DEBUG(domain, "cookie=%p, cookielen=%d, uri=%s, flags=%lx, "
6235 6236
                     "dname=%s, bandwidth=%lu", cookie, cookielen, uri, flags,
                     NULLSTR(dname), bandwidth);
6237

6238 6239
    virResetLastError();

6240
    virCheckDomainReturn(domain, -1);
6241 6242
    conn = domain->conn;

6243
    virCheckReadOnlyGoto(conn->flags, error);
6244

6245 6246
    if (conn->driver->domainMigratePerform) {
        int ret;
6247 6248 6249
        ret = conn->driver->domainMigratePerform(domain, cookie, cookielen,
                                                 uri,
                                                 flags, dname, bandwidth);
6250 6251 6252 6253
        if (ret < 0)
            goto error;
        return ret;
    }
6254

6255
    virReportUnsupportedError();
6256 6257

error:
6258
    virDispatchError(domain->conn);
6259 6260 6261
    return -1;
}

6262

D
Daniel Veillard 已提交
6263 6264
/*
 * Not for public use.  This function is part of the internal
6265 6266 6267
 * implementation of migration in the remote case.
 */
virDomainPtr
6268 6269 6270 6271 6272 6273
virDomainMigrateFinish(virConnectPtr dconn,
                       const char *dname,
                       const char *cookie,
                       int cookielen,
                       const char *uri,
                       unsigned long flags)
6274
{
J
John Levon 已提交
6275
    VIR_DEBUG("dconn=%p, dname=%s, cookie=%p, cookielen=%d, uri=%s, "
6276
              "flags=%lx", dconn, NULLSTR(dname), cookie, cookielen,
J
John Levon 已提交
6277
              uri, flags);
6278

6279 6280
    virResetLastError();

6281
    virCheckConnectReturn(dconn, NULL);
6282
    virCheckReadOnlyGoto(dconn->flags, error);
6283

6284 6285
    if (dconn->driver->domainMigrateFinish) {
        virDomainPtr ret;
6286 6287 6288
        ret = dconn->driver->domainMigrateFinish(dconn, dname,
                                                 cookie, cookielen,
                                                 uri, flags);
6289 6290 6291 6292
        if (!ret)
            goto error;
        return ret;
    }
6293

6294
    virReportUnsupportedError();
6295 6296

error:
6297
    virDispatchError(dconn);
6298
    return NULL;
D
Daniel Veillard 已提交
6299 6300 6301
}


D
Daniel Veillard 已提交
6302 6303
/*
 * Not for public use.  This function is part of the internal
D
Daniel Veillard 已提交
6304 6305 6306
 * implementation of migration in the remote case.
 */
int
6307 6308 6309 6310 6311 6312 6313 6314 6315
virDomainMigratePrepare2(virConnectPtr dconn,
                         char **cookie,
                         int *cookielen,
                         const char *uri_in,
                         char **uri_out,
                         unsigned long flags,
                         const char *dname,
                         unsigned long bandwidth,
                         const char *dom_xml)
D
Daniel Veillard 已提交
6316
{
J
John Levon 已提交
6317
    VIR_DEBUG("dconn=%p, cookie=%p, cookielen=%p, uri_in=%s, uri_out=%p,"
6318
              "flags=%lx, dname=%s, bandwidth=%lu, dom_xml=%s", dconn,
J
John Levon 已提交
6319 6320
              cookie, cookielen, uri_in, uri_out, flags, NULLSTR(dname),
              bandwidth, dom_xml);
D
Daniel Veillard 已提交
6321

6322 6323
    virResetLastError();

6324
    virCheckConnectReturn(dconn, -1);
6325
    virCheckReadOnlyGoto(dconn->flags, error);
6326

6327 6328
    if (dconn->driver->domainMigratePrepare2) {
        int ret;
6329 6330 6331 6332
        ret = dconn->driver->domainMigratePrepare2(dconn, cookie, cookielen,
                                                   uri_in, uri_out,
                                                   flags, dname, bandwidth,
                                                   dom_xml);
6333 6334 6335 6336
        if (ret < 0)
            goto error;
        return ret;
    }
D
Daniel Veillard 已提交
6337

6338
    virReportUnsupportedError();
6339 6340

error:
6341
    virDispatchError(dconn);
D
Daniel Veillard 已提交
6342 6343 6344
    return -1;
}

6345

D
Daniel Veillard 已提交
6346 6347
/*
 * Not for public use.  This function is part of the internal
D
Daniel Veillard 已提交
6348 6349 6350
 * implementation of migration in the remote case.
 */
virDomainPtr
6351 6352 6353 6354 6355 6356 6357
virDomainMigrateFinish2(virConnectPtr dconn,
                        const char *dname,
                        const char *cookie,
                        int cookielen,
                        const char *uri,
                        unsigned long flags,
                        int retcode)
D
Daniel Veillard 已提交
6358
{
J
John Levon 已提交
6359
    VIR_DEBUG("dconn=%p, dname=%s, cookie=%p, cookielen=%d, uri=%s, "
6360
              "flags=%lx, retcode=%d", dconn, NULLSTR(dname), cookie,
J
John Levon 已提交
6361
              cookielen, uri, flags, retcode);
D
Daniel Veillard 已提交
6362

6363 6364
    virResetLastError();

6365
    virCheckConnectReturn(dconn, NULL);
6366
    virCheckReadOnlyGoto(dconn->flags, error);
6367

6368 6369
    if (dconn->driver->domainMigrateFinish2) {
        virDomainPtr ret;
6370 6371 6372 6373
        ret = dconn->driver->domainMigrateFinish2(dconn, dname,
                                                  cookie, cookielen,
                                                  uri, flags,
                                                  retcode);
6374
        if (!ret && !retcode)
6375 6376 6377
            goto error;
        return ret;
    }
D
Daniel Veillard 已提交
6378

6379
    virReportUnsupportedError();
6380 6381

error:
6382
    virDispatchError(dconn);
D
Daniel Veillard 已提交
6383
    return NULL;
6384 6385 6386
}


C
Chris Lalancette 已提交
6387 6388 6389 6390 6391 6392 6393 6394 6395 6396 6397 6398
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepareTunnel(virConnectPtr conn,
                              virStreamPtr st,
                              unsigned long flags,
                              const char *dname,
                              unsigned long bandwidth,
                              const char *dom_xml)
{
6399
    VIR_DEBUG("conn=%p, stream=%p, flags=%lx, dname=%s, "
6400
              "bandwidth=%lu, dom_xml=%s", conn, st, flags,
C
Chris Lalancette 已提交
6401 6402 6403 6404
              NULLSTR(dname), bandwidth, dom_xml);

    virResetLastError();

6405
    virCheckConnectReturn(conn, -1);
6406
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
6407 6408

    if (conn != st->conn) {
6409 6410 6411
        virReportInvalidArg(conn,
                            _("conn in %s must match stream connection"),
                            __FUNCTION__);
C
Chris Lalancette 已提交
6412 6413 6414 6415
        goto error;
    }

    if (conn->driver->domainMigratePrepareTunnel) {
6416
        int rv = conn->driver->domainMigratePrepareTunnel(conn, st,
C
Chris Lalancette 已提交
6417 6418 6419 6420 6421 6422 6423
                                                          flags, dname,
                                                          bandwidth, dom_xml);
        if (rv < 0)
            goto error;
        return rv;
    }

6424
    virReportUnsupportedError();
C
Chris Lalancette 已提交
6425 6426

error:
6427
    virDispatchError(conn);
C
Chris Lalancette 已提交
6428 6429 6430
    return -1;
}

6431

6432 6433 6434 6435 6436 6437
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
char *
virDomainMigrateBegin3(virDomainPtr domain,
6438
                       const char *xmlin,
6439 6440 6441 6442 6443 6444 6445 6446
                       char **cookieout,
                       int *cookieoutlen,
                       unsigned long flags,
                       const char *dname,
                       unsigned long bandwidth)
{
    virConnectPtr conn;

6447
    VIR_DOMAIN_DEBUG(domain, "xmlin=%s cookieout=%p, cookieoutlen=%p, "
6448
                     "flags=%lx, dname=%s, bandwidth=%lu",
6449
                     NULLSTR(xmlin), cookieout, cookieoutlen, flags,
6450 6451 6452 6453
                     NULLSTR(dname), bandwidth);

    virResetLastError();

6454
    virCheckDomainReturn(domain, NULL);
6455 6456
    conn = domain->conn;

6457
    virCheckReadOnlyGoto(conn->flags, error);
6458 6459 6460

    if (conn->driver->domainMigrateBegin3) {
        char *xml;
6461
        xml = conn->driver->domainMigrateBegin3(domain, xmlin,
6462 6463 6464 6465 6466 6467 6468 6469
                                                cookieout, cookieoutlen,
                                                flags, dname, bandwidth);
        VIR_DEBUG("xml %s", NULLSTR(xml));
        if (!xml)
            goto error;
        return xml;
    }

6470
    virReportUnsupportedError();
6471 6472 6473 6474 6475 6476 6477 6478 6479 6480 6481 6482 6483 6484 6485 6486 6487 6488 6489 6490 6491 6492 6493 6494

error:
    virDispatchError(domain->conn);
    return NULL;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepare3(virConnectPtr dconn,
                         const char *cookiein,
                         int cookieinlen,
                         char **cookieout,
                         int *cookieoutlen,
                         const char *uri_in,
                         char **uri_out,
                         unsigned long flags,
                         const char *dname,
                         unsigned long bandwidth,
                         const char *dom_xml)
{
6495 6496 6497 6498 6499
    VIR_DEBUG("dconn=%p, cookiein=%p, cookieinlen=%d, cookieout=%p, "
              "cookieoutlen=%p, uri_in=%s, uri_out=%p, flags=%lx, dname=%s, "
              "bandwidth=%lu, dom_xml=%s",
              dconn, cookiein, cookieinlen, cookieout, cookieoutlen, uri_in,
              uri_out, flags, NULLSTR(dname), bandwidth, dom_xml);
6500 6501 6502

    virResetLastError();

6503
    virCheckConnectReturn(dconn, -1);
6504
    virCheckReadOnlyGoto(dconn->flags, error);
6505 6506 6507 6508 6509 6510 6511 6512 6513 6514 6515 6516 6517 6518

    if (dconn->driver->domainMigratePrepare3) {
        int ret;
        ret = dconn->driver->domainMigratePrepare3(dconn,
                                                   cookiein, cookieinlen,
                                                   cookieout, cookieoutlen,
                                                   uri_in, uri_out,
                                                   flags, dname, bandwidth,
                                                   dom_xml);
        if (ret < 0)
            goto error;
        return ret;
    }

6519
    virReportUnsupportedError();
6520 6521 6522 6523 6524 6525

error:
    virDispatchError(dconn);
    return -1;
}

6526

6527 6528 6529 6530 6531 6532 6533 6534 6535 6536 6537 6538 6539 6540 6541 6542
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepareTunnel3(virConnectPtr conn,
                               virStreamPtr st,
                               const char *cookiein,
                               int cookieinlen,
                               char **cookieout,
                               int *cookieoutlen,
                               unsigned long flags,
                               const char *dname,
                               unsigned long bandwidth,
                               const char *dom_xml)
{
6543 6544 6545
    VIR_DEBUG("conn=%p, stream=%p, cookiein=%p, cookieinlen=%d, cookieout=%p, "
              "cookieoutlen=%p, flags=%lx, dname=%s, bandwidth=%lu, "
              "dom_xml=%s",
6546 6547 6548 6549 6550
              conn, st, cookiein, cookieinlen, cookieout, cookieoutlen, flags,
              NULLSTR(dname), bandwidth, dom_xml);

    virResetLastError();

6551
    virCheckConnectReturn(conn, -1);
6552
    virCheckReadOnlyGoto(conn->flags, error);
6553 6554

    if (conn != st->conn) {
6555 6556 6557
        virReportInvalidArg(conn,
                            _("conn in %s must match stream connection"),
                            __FUNCTION__);
6558 6559 6560 6561 6562 6563 6564 6565 6566 6567 6568 6569 6570 6571
        goto error;
    }

    if (conn->driver->domainMigratePrepareTunnel3) {
        int rv = conn->driver->domainMigratePrepareTunnel3(conn, st,
                                                           cookiein, cookieinlen,
                                                           cookieout, cookieoutlen,
                                                           flags, dname,
                                                           bandwidth, dom_xml);
        if (rv < 0)
            goto error;
        return rv;
    }

6572
    virReportUnsupportedError();
6573 6574 6575 6576 6577 6578 6579 6580 6581 6582 6583 6584 6585

error:
    virDispatchError(conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePerform3(virDomainPtr domain,
6586
                         const char *xmlin,
6587 6588 6589 6590
                         const char *cookiein,
                         int cookieinlen,
                         char **cookieout,
                         int *cookieoutlen,
6591
                         const char *dconnuri,
6592 6593 6594 6595 6596 6597 6598
                         const char *uri,
                         unsigned long flags,
                         const char *dname,
                         unsigned long bandwidth)
{
    virConnectPtr conn;

6599
    VIR_DOMAIN_DEBUG(domain, "xmlin=%s cookiein=%p, cookieinlen=%d, "
6600
                     "cookieout=%p, cookieoutlen=%p, dconnuri=%s, "
6601
                     "uri=%s, flags=%lx, dname=%s, bandwidth=%lu",
6602
                     NULLSTR(xmlin), cookiein, cookieinlen,
6603 6604
                     cookieout, cookieoutlen, NULLSTR(dconnuri),
                     NULLSTR(uri), flags, NULLSTR(dname), bandwidth);
6605 6606 6607

    virResetLastError();

6608
    virCheckDomainReturn(domain, -1);
6609 6610
    conn = domain->conn;

6611
    virCheckReadOnlyGoto(conn->flags, error);
6612 6613 6614

    if (conn->driver->domainMigratePerform3) {
        int ret;
6615
        ret = conn->driver->domainMigratePerform3(domain, xmlin,
6616 6617
                                                  cookiein, cookieinlen,
                                                  cookieout, cookieoutlen,
6618
                                                  dconnuri, uri,
6619 6620 6621 6622 6623 6624
                                                  flags, dname, bandwidth);
        if (ret < 0)
            goto error;
        return ret;
    }

6625
    virReportUnsupportedError();
6626 6627 6628 6629 6630 6631 6632 6633 6634 6635 6636

error:
    virDispatchError(domain->conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
6637
virDomainPtr
6638 6639 6640 6641 6642 6643
virDomainMigrateFinish3(virConnectPtr dconn,
                        const char *dname,
                        const char *cookiein,
                        int cookieinlen,
                        char **cookieout,
                        int *cookieoutlen,
6644
                        const char *dconnuri,
6645 6646
                        const char *uri,
                        unsigned long flags,
6647
                        int cancelled)
6648 6649
{
    VIR_DEBUG("dconn=%p, dname=%s, cookiein=%p, cookieinlen=%d, cookieout=%p,"
6650
              "cookieoutlen=%p, dconnuri=%s, uri=%s, flags=%lx, retcode=%d",
6651
              dconn, NULLSTR(dname), cookiein, cookieinlen, cookieout,
6652
              cookieoutlen, NULLSTR(dconnuri), NULLSTR(uri), flags, cancelled);
6653 6654 6655

    virResetLastError();

6656
    virCheckConnectReturn(dconn, NULL);
6657
    virCheckReadOnlyGoto(dconn->flags, error);
6658 6659

    if (dconn->driver->domainMigrateFinish3) {
6660
        virDomainPtr ret;
6661 6662 6663
        ret = dconn->driver->domainMigrateFinish3(dconn, dname,
                                                  cookiein, cookieinlen,
                                                  cookieout, cookieoutlen,
6664
                                                  dconnuri, uri, flags,
6665
                                                  cancelled);
6666
        if (!ret && !cancelled)
6667 6668 6669 6670
            goto error;
        return ret;
    }

6671
    virReportUnsupportedError();
6672 6673 6674

error:
    virDispatchError(dconn);
6675
    return NULL;
6676 6677 6678 6679 6680 6681 6682 6683 6684 6685 6686 6687 6688 6689 6690 6691
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigrateConfirm3(virDomainPtr domain,
                         const char *cookiein,
                         int cookieinlen,
                         unsigned long flags,
                         int cancelled)
{
    virConnectPtr conn;

6692 6693
    VIR_DOMAIN_DEBUG(domain,
                     "cookiein=%p, cookieinlen=%d, flags=%lx, cancelled=%d",
6694 6695 6696 6697
                     cookiein, cookieinlen, flags, cancelled);

    virResetLastError();

6698
    virCheckDomainReturn(domain, -1);
6699 6700
    conn = domain->conn;

6701
    virCheckReadOnlyGoto(conn->flags, error);
6702 6703 6704 6705 6706 6707 6708 6709 6710 6711 6712

    if (conn->driver->domainMigrateConfirm3) {
        int ret;
        ret = conn->driver->domainMigrateConfirm3(domain,
                                                  cookiein, cookieinlen,
                                                  flags, cancelled);
        if (ret < 0)
            goto error;
        return ret;
    }

6713
    virReportUnsupportedError();
6714 6715 6716 6717 6718 6719

error:
    virDispatchError(domain->conn);
    return -1;
}

C
Chris Lalancette 已提交
6720

6721 6722 6723 6724 6725 6726 6727 6728 6729 6730 6731 6732 6733 6734 6735 6736 6737 6738 6739 6740 6741
/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
char *
virDomainMigrateBegin3Params(virDomainPtr domain,
                             virTypedParameterPtr params,
                             int nparams,
                             char **cookieout,
                             int *cookieoutlen,
                             unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, "
                     "cookieout=%p, cookieoutlen=%p, flags=%x",
                     params, nparams, cookieout, cookieoutlen, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6742
    virCheckDomainReturn(domain, NULL);
6743 6744
    conn = domain->conn;

6745
    virCheckReadOnlyGoto(conn->flags, error);
6746 6747 6748 6749 6750 6751 6752 6753 6754 6755 6756 6757

    if (conn->driver->domainMigrateBegin3Params) {
        char *xml;
        xml = conn->driver->domainMigrateBegin3Params(domain, params, nparams,
                                                      cookieout, cookieoutlen,
                                                      flags);
        VIR_DEBUG("xml %s", NULLSTR(xml));
        if (!xml)
            goto error;
        return xml;
    }

6758
    virReportUnsupportedError();
6759 6760 6761 6762 6763 6764 6765 6766 6767 6768 6769 6770 6771 6772 6773 6774 6775 6776 6777 6778 6779 6780 6781 6782 6783 6784 6785 6786 6787 6788

error:
    virDispatchError(domain->conn);
    return NULL;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepare3Params(virConnectPtr dconn,
                               virTypedParameterPtr params,
                               int nparams,
                               const char *cookiein,
                               int cookieinlen,
                               char **cookieout,
                               int *cookieoutlen,
                               char **uri_out,
                               unsigned int flags)
{
    VIR_DEBUG("dconn=%p, params=%p, nparams=%d, cookiein=%p, cookieinlen=%d, "
              "cookieout=%p, cookieoutlen=%p, uri_out=%p, flags=%x",
              dconn, params, nparams, cookiein, cookieinlen,
              cookieout, cookieoutlen, uri_out, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6789
    virCheckConnectReturn(dconn, -1);
6790
    virCheckReadOnlyGoto(dconn->flags, error);
6791 6792 6793 6794 6795 6796 6797 6798 6799 6800 6801 6802

    if (dconn->driver->domainMigratePrepare3Params) {
        int ret;
        ret = dconn->driver->domainMigratePrepare3Params(dconn, params, nparams,
                                                         cookiein, cookieinlen,
                                                         cookieout, cookieoutlen,
                                                         uri_out, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

6803
    virReportUnsupportedError();
6804 6805 6806 6807 6808 6809 6810 6811 6812 6813 6814 6815 6816 6817 6818 6819 6820 6821 6822 6823 6824 6825 6826 6827 6828 6829 6830 6831 6832 6833

error:
    virDispatchError(dconn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePrepareTunnel3Params(virConnectPtr conn,
                                     virStreamPtr st,
                                     virTypedParameterPtr params,
                                     int nparams,
                                     const char *cookiein,
                                     int cookieinlen,
                                     char **cookieout,
                                     int *cookieoutlen,
                                     unsigned int flags)
{
    VIR_DEBUG("conn=%p, stream=%p, params=%p, nparams=%d, cookiein=%p, "
              "cookieinlen=%d, cookieout=%p, cookieoutlen=%p, flags=%x",
              conn, st, params, nparams, cookiein, cookieinlen,
              cookieout, cookieoutlen, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6834
    virCheckConnectReturn(conn, -1);
6835
    virCheckReadOnlyGoto(conn->flags, error);
6836 6837 6838 6839 6840 6841 6842 6843 6844 6845 6846 6847 6848 6849 6850 6851 6852 6853

    if (conn != st->conn) {
        virReportInvalidArg(conn,
                            _("conn in %s must match stream connection"),
                            __FUNCTION__);
        goto error;
    }

    if (conn->driver->domainMigratePrepareTunnel3Params) {
        int rv;
        rv = conn->driver->domainMigratePrepareTunnel3Params(
                conn, st, params, nparams, cookiein, cookieinlen,
                cookieout, cookieoutlen, flags);
        if (rv < 0)
            goto error;
        return rv;
    }

6854
    virReportUnsupportedError();
6855 6856 6857 6858 6859 6860 6861 6862 6863 6864 6865 6866 6867 6868 6869 6870 6871 6872 6873 6874 6875 6876 6877 6878 6879 6880 6881 6882 6883 6884 6885 6886

error:
    virDispatchError(conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigratePerform3Params(virDomainPtr domain,
                               const char *dconnuri,
                               virTypedParameterPtr params,
                               int nparams,
                               const char *cookiein,
                               int cookieinlen,
                               char **cookieout,
                               int *cookieoutlen,
                               unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "dconnuri=%s, params=%p, nparams=%d, cookiein=%p, "
                     "cookieinlen=%d, cookieout=%p, cookieoutlen=%p, flags=%x",
                     NULLSTR(dconnuri), params, nparams, cookiein,
                     cookieinlen, cookieout, cookieoutlen, flags);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6887
    virCheckDomainReturn(domain, -1);
6888 6889
    conn = domain->conn;

6890
    virCheckReadOnlyGoto(conn->flags, error);
6891 6892 6893 6894 6895 6896 6897 6898 6899 6900 6901

    if (conn->driver->domainMigratePerform3Params) {
        int ret;
        ret = conn->driver->domainMigratePerform3Params(
                domain, dconnuri, params, nparams, cookiein, cookieinlen,
                cookieout, cookieoutlen, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

6902
    virReportUnsupportedError();
6903 6904 6905 6906 6907 6908 6909 6910 6911 6912 6913 6914 6915 6916 6917 6918 6919 6920 6921 6922 6923 6924 6925 6926 6927 6928 6929 6930 6931 6932

error:
    virDispatchError(domain->conn);
    return -1;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
virDomainPtr
virDomainMigrateFinish3Params(virConnectPtr dconn,
                              virTypedParameterPtr params,
                              int nparams,
                              const char *cookiein,
                              int cookieinlen,
                              char **cookieout,
                              int *cookieoutlen,
                              unsigned int flags,
                              int cancelled)
{
    VIR_DEBUG("dconn=%p, params=%p, nparams=%d, cookiein=%p, cookieinlen=%d, "
              "cookieout=%p, cookieoutlen=%p, flags=%x, cancelled=%d",
              dconn, params, nparams, cookiein, cookieinlen, cookieout,
              cookieoutlen, flags, cancelled);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6933
    virCheckConnectReturn(dconn, NULL);
6934
    virCheckReadOnlyGoto(dconn->flags, error);
6935 6936 6937 6938 6939 6940

    if (dconn->driver->domainMigrateFinish3Params) {
        virDomainPtr ret;
        ret = dconn->driver->domainMigrateFinish3Params(
                dconn, params, nparams, cookiein, cookieinlen,
                cookieout, cookieoutlen, flags, cancelled);
6941
        if (!ret && !cancelled)
6942 6943 6944 6945
            goto error;
        return ret;
    }

6946
    virReportUnsupportedError();
6947 6948 6949 6950 6951 6952 6953 6954 6955 6956 6957 6958 6959 6960 6961 6962 6963 6964 6965 6966 6967 6968 6969 6970 6971 6972 6973 6974 6975

error:
    virDispatchError(dconn);
    return NULL;
}


/*
 * Not for public use.  This function is part of the internal
 * implementation of migration in the remote case.
 */
int
virDomainMigrateConfirm3Params(virDomainPtr domain,
                               virTypedParameterPtr params,
                               int nparams,
                               const char *cookiein,
                               int cookieinlen,
                               unsigned int flags,
                               int cancelled)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, cookiein=%p, "
                     "cookieinlen=%d, flags=%x, cancelled=%d",
                     params, nparams, cookiein, cookieinlen, flags, cancelled);
    VIR_TYPED_PARAMS_DEBUG(params, nparams);

    virResetLastError();

6976
    virCheckDomainReturn(domain, -1);
6977 6978
    conn = domain->conn;

6979
    virCheckReadOnlyGoto(conn->flags, error);
6980 6981 6982 6983 6984 6985 6986 6987 6988 6989 6990

    if (conn->driver->domainMigrateConfirm3Params) {
        int ret;
        ret = conn->driver->domainMigrateConfirm3Params(
                domain, params, nparams,
                cookiein, cookieinlen, flags, cancelled);
        if (ret < 0)
            goto error;
        return ret;
    }

6991
    virReportUnsupportedError();
6992 6993 6994 6995 6996 6997 6998

error:
    virDispatchError(domain->conn);
    return -1;
}


6999 7000 7001 7002
/**
 * virNodeGetInfo:
 * @conn: pointer to the hypervisor connection
 * @info: pointer to a virNodeInfo structure allocated by the user
7003
 *
7004 7005 7006 7007 7008
 * Extract hardware information about the node.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
7009 7010
virNodeGetInfo(virConnectPtr conn, virNodeInfoPtr info)
{
7011
    VIR_DEBUG("conn=%p, info=%p", conn, info);
7012

7013 7014
    virResetLastError();

7015
    virCheckConnectReturn(conn, -1);
7016
    virCheckNonNullArgGoto(info, error);
7017

7018 7019
    if (conn->driver->nodeGetInfo) {
        int ret;
7020
        ret = conn->driver->nodeGetInfo(conn, info);
7021 7022 7023 7024
        if (ret < 0)
            goto error;
        return ret;
    }
7025

7026
    virReportUnsupportedError();
7027 7028

error:
7029
    virDispatchError(conn);
7030
    return -1;
7031
}
7032

7033

7034 7035 7036 7037 7038 7039
/**
 * virConnectGetCapabilities:
 * @conn: pointer to the hypervisor connection
 *
 * Provides capabilities of the hypervisor / driver.
 *
7040 7041
 * Returns NULL in case of error, or an XML string
 * defining the capabilities.
7042 7043 7044
 * The client must free the returned string after use.
 */
char *
7045
virConnectGetCapabilities(virConnectPtr conn)
7046
{
7047
    VIR_DEBUG("conn=%p", conn);
7048

7049 7050
    virResetLastError();

7051
    virCheckConnectReturn(conn, NULL);
7052

7053
    if (conn->driver->connectGetCapabilities) {
7054
        char *ret;
7055
        ret = conn->driver->connectGetCapabilities(conn);
7056 7057
        if (!ret)
            goto error;
7058
        VIR_DEBUG("conn=%p ret=%s", conn, ret);
7059 7060
        return ret;
    }
7061

7062
    virReportUnsupportedError();
7063 7064

error:
7065
    virDispatchError(conn);
7066 7067 7068
    return NULL;
}

7069

7070 7071 7072
/**
 * virNodeGetCPUStats:
 * @conn: pointer to the hypervisor connection.
7073
 * @cpuNum: number of node cpu. (VIR_NODE_CPU_STATS_ALL_CPUS means total cpu
7074 7075 7076 7077
 *          statistics)
 * @params: pointer to node cpu time parameter objects
 * @nparams: number of node cpu time parameter (this value should be same or
 *          less than the number of parameters supported)
7078
 * @flags: extra flags; not used yet, so callers should always pass 0
7079 7080 7081
 *
 * This function provides individual cpu statistics of the node.
 * If you want to get total cpu statistics of the node, you must specify
7082
 * VIR_NODE_CPU_STATS_ALL_CPUS to @cpuNum.
7083 7084 7085 7086 7087 7088
 * The @params array will be filled with the values equal to the number of
 * parameters suggested by @nparams
 *
 * As the value of @nparams is dynamic, call the API setting @nparams to 0 and
 * @params as NULL, the API returns the number of parameters supported by the
 * HV by updating @nparams on SUCCESS. The caller should then allocate @params
7089
 * array, i.e. (sizeof(@virNodeCPUStats) * @nparams) bytes and call
7090 7091 7092 7093
 * the API again.
 *
 * Here is a sample code snippet:
 *
E
Eric Blake 已提交
7094 7095 7096 7097 7098 7099 7100 7101
 *   if (virNodeGetCPUStats(conn, cpuNum, NULL, &nparams, 0) == 0 &&
 *       nparams != 0) {
 *       if ((params = malloc(sizeof(virNodeCPUStats) * nparams)) == NULL)
 *           goto error;
 *       memset(params, 0, sizeof(virNodeCPUStats) * nparams);
 *       if (virNodeGetCPUStats(conn, cpuNum, params, &nparams, 0))
 *           goto error;
 *   }
7102 7103 7104 7105 7106 7107 7108 7109 7110 7111 7112 7113 7114 7115 7116 7117 7118 7119 7120 7121 7122 7123
 *
 * This function doesn't require privileged access to the hypervisor.
 * This function expects the caller to allocate the @params.
 *
 * CPU time Statistics:
 *
 * VIR_NODE_CPU_STATS_KERNEL:
 *     The cumulative CPU time which spends by kernel,
 *     when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_USER:
 *     The cumulative CPU time which spends by user processes,
 *     when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_IDLE:
 *     The cumulative idle CPU time, when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_IOWAIT:
 *     The cumulative I/O wait CPU time, when the node booting up.(nanoseconds)
 * VIR_NODE_CPU_STATS_UTILIZATION:
 *     The CPU utilization. The usage value is in percent and 100%
 *     represents all CPUs on the server.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
7124 7125 7126 7127 7128
int
virNodeGetCPUStats(virConnectPtr conn,
                   int cpuNum,
                   virNodeCPUStatsPtr params,
                   int *nparams, unsigned int flags)
7129
{
7130
    VIR_DEBUG("conn=%p, cpuNum=%d, params=%p, nparams=%d, flags=%x",
7131 7132 7133 7134
              conn, cpuNum, params, nparams ? *nparams : -1, flags);

    virResetLastError();

7135
    virCheckConnectReturn(conn, -1);
7136 7137
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
7138
    if (cpuNum < 0 && cpuNum != VIR_NODE_CPU_STATS_ALL_CPUS) {
7139
        virReportInvalidArg(cpuNum,
7140 7141
                            _("cpuNum in %s only accepts %d as a negative "
                              "value"),
7142
                            __FUNCTION__, VIR_NODE_CPU_STATS_ALL_CPUS);
7143 7144 7145 7146 7147
        goto error;
    }

    if (conn->driver->nodeGetCPUStats) {
        int ret;
7148
        ret = conn->driver->nodeGetCPUStats(conn, cpuNum, params, nparams, flags);
7149 7150 7151 7152
        if (ret < 0)
            goto error;
        return ret;
    }
7153
    virReportUnsupportedError();
7154 7155 7156 7157 7158 7159

error:
    virDispatchError(conn);
    return -1;
}

7160

7161 7162 7163
/**
 * virNodeGetMemoryStats:
 * @conn: pointer to the hypervisor connection.
7164 7165
 * @cellNum: number of node cell. (VIR_NODE_MEMORY_STATS_ALL_CELLS means total
 *           cell statistics)
7166 7167 7168
 * @params: pointer to node memory stats objects
 * @nparams: number of node memory stats (this value should be same or
 *          less than the number of stats supported)
7169
 * @flags: extra flags; not used yet, so callers should always pass 0
7170 7171
 *
 * This function provides memory stats of the node.
7172
 * If you want to get total memory statistics of the node, you must specify
7173
 * VIR_NODE_MEMORY_STATS_ALL_CELLS to @cellNum.
7174 7175 7176 7177 7178 7179
 * The @params array will be filled with the values equal to the number of
 * stats suggested by @nparams
 *
 * As the value of @nparams is dynamic, call the API setting @nparams to 0 and
 * @params as NULL, the API returns the number of parameters supported by the
 * HV by updating @nparams on SUCCESS. The caller should then allocate @params
7180
 * array, i.e. (sizeof(@virNodeMemoryStats) * @nparams) bytes and call
7181 7182 7183 7184
 * the API again.
 *
 * Here is the sample code snippet:
 *
E
Eric Blake 已提交
7185 7186 7187 7188 7189 7190 7191 7192
 *   if (virNodeGetMemoryStats(conn, cellNum, NULL, &nparams, 0) == 0 &&
 *       nparams != 0) {
 *       if ((params = malloc(sizeof(virNodeMemoryStats) * nparams)) == NULL)
 *           goto error;
 *       memset(params, cellNum, 0, sizeof(virNodeMemoryStats) * nparams);
 *       if (virNodeGetMemoryStats(conn, params, &nparams, 0))
 *           goto error;
 *   }
7193 7194 7195 7196 7197 7198
 *
 * This function doesn't require privileged access to the hypervisor.
 * This function expects the caller to allocate the @params.
 *
 * Memory Stats:
 *
7199
 * VIR_NODE_MEMORY_STATS_TOTAL:
7200
 *     The total memory usage.(KB)
7201
 * VIR_NODE_MEMORY_STATS_FREE:
7202 7203
 *     The free memory usage.(KB)
 *     On linux, this usage includes buffers and cached.
7204
 * VIR_NODE_MEMORY_STATS_BUFFERS:
7205
 *     The buffers memory usage.(KB)
7206
 * VIR_NODE_MEMORY_STATS_CACHED:
7207 7208 7209 7210
 *     The cached memory usage.(KB)
 *
 * Returns -1 in case of error, 0 in case of success.
 */
7211 7212 7213 7214 7215
int
virNodeGetMemoryStats(virConnectPtr conn,
                      int cellNum,
                      virNodeMemoryStatsPtr params,
                      int *nparams, unsigned int flags)
7216
{
7217
    VIR_DEBUG("conn=%p, cellNum=%d, params=%p, nparams=%d, flags=%x",
7218 7219 7220 7221
              conn, cellNum, params, nparams ? *nparams : -1, flags);

    virResetLastError();

7222
    virCheckConnectReturn(conn, -1);
7223 7224
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
7225
    if (cellNum < 0 && cellNum != VIR_NODE_MEMORY_STATS_ALL_CELLS) {
7226
        virReportInvalidArg(cpuNum,
7227 7228
                            _("cellNum in %s only accepts %d as a negative "
                              "value"),
7229
                            __FUNCTION__, VIR_NODE_MEMORY_STATS_ALL_CELLS);
7230 7231 7232 7233 7234
        goto error;
    }

    if (conn->driver->nodeGetMemoryStats) {
        int ret;
7235
        ret = conn->driver->nodeGetMemoryStats(conn, cellNum, params, nparams, flags);
7236 7237 7238 7239
        if (ret < 0)
            goto error;
        return ret;
    }
7240
    virReportUnsupportedError();
7241 7242 7243 7244 7245 7246

error:
    virDispatchError(conn);
    return -1;
}

7247

7248 7249 7250
/**
 * virNodeGetFreeMemory:
 * @conn: pointer to the hypervisor connection
7251
 *
D
Daniel Veillard 已提交
7252
 * provides the free memory available on the Node
7253
 * Note: most libvirt APIs provide memory sizes in kibibytes, but in this
D
Daniel Veillard 已提交
7254
 * function the returned value is in bytes. Divide by 1024 as necessary.
7255
 *
D
Daniel Veillard 已提交
7256
 * Returns the available free memory in bytes or 0 in case of error
7257 7258 7259 7260
 */
unsigned long long
virNodeGetFreeMemory(virConnectPtr conn)
{
7261
    VIR_DEBUG("conn=%p", conn);
7262

7263 7264
    virResetLastError();

7265
    virCheckConnectReturn(conn, 0);
7266

7267
    if (conn->driver->nodeGetFreeMemory) {
7268
        unsigned long long ret;
7269
        ret = conn->driver->nodeGetFreeMemory(conn);
7270 7271 7272 7273
        if (ret == 0)
            goto error;
        return ret;
    }
7274

7275
    virReportUnsupportedError();
7276 7277

error:
7278
    virDispatchError(conn);
7279 7280 7281
    return 0;
}

7282

7283 7284 7285 7286 7287 7288 7289 7290 7291 7292
/**
 * virNodeSuspendForDuration:
 * @conn: pointer to the hypervisor connection
 * @target: the state to which the host must be suspended to,
 *         such as: VIR_NODE_SUSPEND_TARGET_MEM (Suspend-to-RAM)
 *                  VIR_NODE_SUSPEND_TARGET_DISK (Suspend-to-Disk)
 *                  VIR_NODE_SUSPEND_TARGET_HYBRID (Hybrid-Suspend,
 *                  which is a combination of the former modes).
 * @duration: the time duration in seconds for which the host
 *            has to be suspended
7293
 * @flags: extra flags; not used yet, so callers should always pass 0
7294 7295 7296 7297 7298 7299 7300 7301 7302 7303 7304 7305 7306 7307 7308 7309
 *
 * Attempt to suspend the node (host machine) for the given duration of
 * time in the specified state (Suspend-to-RAM, Suspend-to-Disk or
 * Hybrid-Suspend). Schedule the node's Real-Time-Clock interrupt to
 * resume the node after the duration is complete.
 *
 * Returns 0 on success (i.e., the node will be suspended after a short
 * delay), -1 on failure (the operation is not supported, or an attempted
 * suspend is already underway).
 */
int
virNodeSuspendForDuration(virConnectPtr conn,
                          unsigned int target,
                          unsigned long long duration,
                          unsigned int flags)
{
7310 7311
    VIR_DEBUG("conn=%p, target=%d, duration=%lld, flags=%x",
              conn, target, duration, flags);
7312 7313 7314

    virResetLastError();

7315
    virCheckConnectReturn(conn, -1);
7316
    virCheckReadOnlyGoto(conn->flags, error);
7317 7318 7319 7320 7321 7322 7323 7324 7325 7326

    if (conn->driver->nodeSuspendForDuration) {
        int ret;
        ret = conn->driver->nodeSuspendForDuration(conn, target,
                                                   duration, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7327
    virReportUnsupportedError();
7328 7329 7330 7331 7332 7333

error:
    virDispatchError(conn);
    return -1;
}

7334

7335 7336 7337 7338 7339 7340 7341 7342
/*
 * virNodeGetMemoryParameters:
 * @conn: pointer to the hypervisor connection
 * @params: pointer to memory parameter object
 *          (return value, allocated by the caller)
 * @nparams: pointer to number of memory parameters; input and output
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
7343 7344 7345 7346
 * Get all node memory parameters (parameters unsupported by OS will be
 * omitted).  On input, @nparams gives the size of the @params array;
 * on output, @nparams gives how many slots were filled with parameter
 * information, which might be less but will not exceed the input value.
7347 7348 7349 7350 7351 7352 7353 7354 7355 7356 7357 7358 7359 7360 7361 7362 7363 7364 7365 7366 7367
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.  See virDomainGetMemoryParameters() for an equivalent usage
 * example.
 *
 * Returns 0 in case of success, and -1 in case of failure.
 */
int
virNodeGetMemoryParameters(virConnectPtr conn,
                           virTypedParameterPtr params,
                           int *nparams,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, params=%p, nparams=%p, flags=%x",
              conn, params, nparams, flags);

    virResetLastError();

7368
    virCheckConnectReturn(conn, -1);
7369 7370 7371 7372 7373 7374 7375 7376 7377 7378 7379 7380 7381 7382 7383 7384 7385 7386
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

    if (VIR_DRV_SUPPORTS_FEATURE(conn->driver, conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    if (conn->driver->nodeGetMemoryParameters) {
        int ret;
        ret = conn->driver->nodeGetMemoryParameters(conn, params,
                                                    nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7387
    virReportUnsupportedError();
7388 7389 7390 7391 7392 7393

error:
    virDispatchError(conn);
    return -1;
}

7394

7395 7396 7397 7398 7399 7400 7401 7402 7403
/*
 * virNodeSetMemoryParameters:
 * @conn: pointer to the hypervisor connection
 * @params: pointer to scheduler parameter objects
 * @nparams: number of scheduler parameter objects
 *          (this value can be the same or less than the returned
 *           value nparams of virDomainGetSchedulerType)
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
7404 7405
 * Change all or a subset of the node memory tunables. The function
 * fails if not all of the tunables are supported.
O
Osier Yang 已提交
7406 7407 7408 7409 7410 7411
 *
 * Note that it's not recommended to use this function while the
 * outside tuning program is running (such as ksmtuned under Linux),
 * as they could change the tunables in parallel, which could cause
 * conflicts.
 *
7412 7413 7414 7415 7416 7417 7418 7419 7420 7421 7422 7423
 * This function may require privileged access to the hypervisor.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virNodeSetMemoryParameters(virConnectPtr conn,
                           virTypedParameterPtr params,
                           int nparams,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, params=%p, nparams=%d, flags=%x",
              conn, params, nparams, flags);
7424
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
7425 7426 7427

    virResetLastError();

7428
    virCheckConnectReturn(conn, -1);
7429
    virCheckReadOnlyGoto(conn->flags, error);
7430 7431 7432 7433 7434 7435 7436 7437 7438 7439 7440 7441 7442 7443 7444
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
        goto error;

    if (conn->driver->nodeSetMemoryParameters) {
        int ret;
        ret = conn->driver->nodeSetMemoryParameters(conn, params,
                                                          nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7445
    virReportUnsupportedError();
7446 7447 7448 7449 7450

error:
    virDispatchError(conn);
    return -1;
}
7451

7452

7453 7454 7455
/**
 * virDomainGetSchedulerType:
 * @domain: pointer to domain object
7456 7457
 * @nparams: pointer to number of scheduler parameters, can be NULL
 *           (return value)
7458
 *
7459
 * Get the scheduler type and the number of scheduler parameters.
7460 7461 7462 7463 7464 7465 7466 7467
 *
 * Returns NULL in case of error. The caller must free the returned string.
 */
char *
virDomainGetSchedulerType(virDomainPtr domain, int *nparams)
{
    virConnectPtr conn;
    char *schedtype;
7468 7469

    VIR_DOMAIN_DEBUG(domain, "nparams=%p", nparams);
7470

7471 7472
    virResetLastError();

7473
    virCheckDomainReturn(domain, NULL);
7474 7475 7476
    conn = domain->conn;

    if (conn->driver->domainGetSchedulerType){
7477
        schedtype = conn->driver->domainGetSchedulerType(domain, nparams);
7478 7479
        if (!schedtype)
            goto error;
7480 7481 7482
        return schedtype;
    }

7483
    virReportUnsupportedError();
7484 7485

error:
7486
    virDispatchError(domain->conn);
7487 7488 7489 7490 7491 7492 7493
    return NULL;
}


/**
 * virDomainGetSchedulerParameters:
 * @domain: pointer to domain object
7494
 * @params: pointer to scheduler parameter objects
7495
 *          (return value)
7496
 * @nparams: pointer to number of scheduler parameter objects
7497 7498 7499 7500 7501 7502 7503
 *          (this value should generally be as large as the returned value
 *           nparams of virDomainGetSchedulerType()); input and output
 *
 * Get all scheduler parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.  @nparams cannot be 0.
7504
 *
7505
 * It is hypervisor specific whether this returns the live or
7506
 * persistent state; for more control, use
7507
 * virDomainGetSchedulerParametersFlags().
7508 7509 7510 7511 7512
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetSchedulerParameters(virDomainPtr domain,
7513
                                virTypedParameterPtr params, int *nparams)
7514 7515
{
    virConnectPtr conn;
7516 7517

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%p", params, nparams);
7518

7519 7520
    virResetLastError();

7521
    virCheckDomainReturn(domain, -1);
7522

7523 7524 7525
    virCheckNonNullArgGoto(params, error);
    virCheckNonNullArgGoto(nparams, error);
    virCheckPositiveArgGoto(*nparams, error);
7526

7527 7528
    conn = domain->conn;

7529 7530
    if (conn->driver->domainGetSchedulerParameters) {
        int ret;
7531
        ret = conn->driver->domainGetSchedulerParameters(domain, params, nparams);
7532 7533 7534 7535
        if (ret < 0)
            goto error;
        return ret;
    }
7536

7537
    virReportUnsupportedError();
7538 7539

error:
7540
    virDispatchError(domain->conn);
7541 7542 7543
    return -1;
}

7544

7545 7546 7547 7548 7549 7550 7551
/**
 * virDomainGetSchedulerParametersFlags:
 * @domain: pointer to domain object
 * @params: pointer to scheduler parameter object
 *          (return value)
 * @nparams: pointer to number of scheduler parameter
 *          (this value should be same than the returned value
7552
 *           nparams of virDomainGetSchedulerType()); input and output
E
Eric Blake 已提交
7553
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
7554
 *
7555 7556 7557 7558
 * Get all scheduler parameters.  On input, @nparams gives the size of the
 * @params array; on output, @nparams gives how many slots were filled
 * with parameter information, which might be less but will not exceed
 * the input value.  @nparams cannot be 0.
7559
 *
7560 7561
 * The value of @flags can be exactly VIR_DOMAIN_AFFECT_CURRENT,
 * VIR_DOMAIN_AFFECT_LIVE, or VIR_DOMAIN_AFFECT_CONFIG.
7562
 *
7563 7564
 * Here is a sample code snippet:
 *
E
Eric Blake 已提交
7565 7566 7567 7568 7569 7570 7571 7572
 *   char *ret = virDomainGetSchedulerType(dom, &nparams);
 *   if (ret && nparams != 0) {
 *       if ((params = malloc(sizeof(*params) * nparams)) == NULL)
 *           goto error;
 *       memset(params, 0, sizeof(*params) * nparams);
 *       if (virDomainGetSchedulerParametersFlags(dom, params, &nparams, 0))
 *           goto error;
 *   }
7573
 *
7574 7575 7576 7577 7578 7579 7580 7581 7582
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetSchedulerParametersFlags(virDomainPtr domain,
                                     virTypedParameterPtr params, int *nparams,
                                     unsigned int flags)
{
    virConnectPtr conn;

7583
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%p, flags=%x",
7584 7585 7586 7587
                     params, nparams, flags);

    virResetLastError();

7588
    virCheckDomainReturn(domain, -1);
7589

7590 7591 7592
    virCheckNonNullArgGoto(params, error);
    virCheckNonNullArgGoto(nparams, error);
    virCheckPositiveArgGoto(*nparams, error);
7593

E
Eric Blake 已提交
7594 7595 7596
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
7597 7598 7599 7600

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
7601
        virReportInvalidArg(flags,
7602 7603
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
7604
                            __FUNCTION__);
7605 7606
        goto error;
    }
7607 7608 7609 7610
    conn = domain->conn;

    if (conn->driver->domainGetSchedulerParametersFlags) {
        int ret;
7611 7612
        ret = conn->driver->domainGetSchedulerParametersFlags(domain, params,
                                                              nparams, flags);
7613 7614 7615 7616 7617
        if (ret < 0)
            goto error;
        return ret;
    }

7618
    virReportUnsupportedError();
7619 7620 7621 7622 7623 7624

error:
    virDispatchError(domain->conn);
    return -1;
}

7625

7626 7627 7628 7629
/**
 * virDomainSetSchedulerParameters:
 * @domain: pointer to domain object
 * @params: pointer to scheduler parameter objects
7630 7631
 * @nparams: number of scheduler parameter objects
 *          (this value can be the same or less than the returned value
7632 7633
 *           nparams of virDomainGetSchedulerType)
 *
7634 7635 7636 7637
 * Change all or a subset or the scheduler parameters.  It is
 * hypervisor-specific whether this sets live, persistent, or both
 * settings; for more control, use
 * virDomainSetSchedulerParametersFlags.
7638 7639 7640 7641
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
7642
virDomainSetSchedulerParameters(virDomainPtr domain,
7643
                                virTypedParameterPtr params, int nparams)
7644 7645
{
    virConnectPtr conn;
7646 7647

    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d", params, nparams);
7648
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
7649

7650 7651
    virResetLastError();

7652 7653
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
7654

7655
    virCheckReadOnlyGoto(conn->flags, error);
7656 7657 7658
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

7659
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
7660
        goto error;
7661

7662 7663
    if (conn->driver->domainSetSchedulerParameters) {
        int ret;
7664
        ret = conn->driver->domainSetSchedulerParameters(domain, params, nparams);
7665 7666 7667 7668
        if (ret < 0)
            goto error;
        return ret;
    }
7669

7670
    virReportUnsupportedError();
7671 7672 7673 7674 7675 7676 7677 7678 7679 7680 7681

error:
    virDispatchError(domain->conn);
    return -1;
}


/**
 * virDomainSetSchedulerParametersFlags:
 * @domain: pointer to domain object
 * @params: pointer to scheduler parameter objects
7682 7683
 * @nparams: number of scheduler parameter objects
 *          (this value can be the same or less than the returned value
7684
 *           nparams of virDomainGetSchedulerType)
7685
 * @flags: bitwise-OR of virDomainModificationImpact
7686
 *
7687
 * Change a subset or all scheduler parameters.  The value of @flags
7688 7689 7690
 * should be either VIR_DOMAIN_AFFECT_CURRENT, or a bitwise-or of
 * values from VIR_DOMAIN_AFFECT_LIVE and
 * VIR_DOMAIN_AFFECT_CURRENT, although hypervisors vary in which
7691
 * flags are supported.
7692 7693 7694 7695 7696
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetSchedulerParametersFlags(virDomainPtr domain,
7697
                                     virTypedParameterPtr params,
7698 7699 7700 7701 7702
                                     int nparams,
                                     unsigned int flags)
{
    virConnectPtr conn;

7703
    VIR_DOMAIN_DEBUG(domain, "params=%p, nparams=%d, flags=%x",
7704
                     params, nparams, flags);
7705
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
7706 7707 7708

    virResetLastError();

7709 7710
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
7711

7712
    virCheckReadOnlyGoto(conn->flags, error);
7713 7714 7715
    virCheckNonNullArgGoto(params, error);
    virCheckNonNegativeArgGoto(nparams, error);

7716
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
7717
        goto error;
7718

7719 7720 7721 7722 7723 7724 7725 7726 7727 7728 7729
    if (conn->driver->domainSetSchedulerParametersFlags) {
        int ret;
        ret = conn->driver->domainSetSchedulerParametersFlags(domain,
                                                              params,
                                                              nparams,
                                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

7730
    virReportUnsupportedError();
7731 7732

error:
7733
    virDispatchError(domain->conn);
7734 7735 7736 7737
    return -1;
}


7738
/**
7739
 * virDomainBlockStats:
7740
 * @dom: pointer to the domain object
7741
 * @disk: path to the block device, or device shorthand
7742 7743 7744 7745 7746 7747
 * @stats: block device stats (returned)
 * @size: size of stats structure
 *
 * This function returns block device (disk) stats for block
 * devices attached to the domain.
 *
7748
 * The @disk parameter is either the device target shorthand (the
7749 7750 7751 7752 7753
 * <target dev='...'/> sub-element, such as "xvda"), or (since 0.9.8)
 * an unambiguous source name of the block device (the <source
 * file='...'/> sub-element, such as "/path/to/image").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
7754 7755 7756 7757 7758 7759 7760 7761 7762 7763 7764
 *
 * Domains may have more than one block device.  To get stats for
 * each you should make multiple calls to this function.
 *
 * Individual fields within the stats structure may be returned
 * as -1, which indicates that the hypervisor does not support
 * that particular statistic.
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
7765 7766
virDomainBlockStats(virDomainPtr dom, const char *disk,
                    virDomainBlockStatsPtr stats, size_t size)
7767 7768 7769
{
    virConnectPtr conn;
    struct _virDomainBlockStats stats2 = { -1, -1, -1, -1, -1 };
7770

7771
    VIR_DOMAIN_DEBUG(dom, "disk=%s, stats=%p, size=%zi", disk, stats, size);
7772

7773 7774
    virResetLastError();

7775
    virCheckDomainReturn(dom, -1);
7776 7777 7778 7779 7780 7781
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(stats, error);
    if (size > sizeof(stats2)) {
        virReportInvalidArg(size,
                            _("size in %s must not exceed %zu"),
                            __FUNCTION__, sizeof(stats2));
7782 7783
        goto error;
    }
7784 7785 7786
    conn = dom->conn;

    if (conn->driver->domainBlockStats) {
7787
        if (conn->driver->domainBlockStats(dom, disk, &stats2) == -1)
7788
            goto error;
7789

7790
        memcpy(stats, &stats2, size);
7791 7792 7793
        return 0;
    }

7794
    virReportUnsupportedError();
7795 7796

error:
7797
    virDispatchError(dom->conn);
7798 7799 7800
    return -1;
}

7801

O
Osier Yang 已提交
7802 7803 7804
/**
 * virDomainBlockStatsFlags:
 * @dom: pointer to domain object
7805
 * @disk: path to the block device, or device shorthand
O
Osier Yang 已提交
7806 7807
 * @params: pointer to block stats parameter object
 *          (return value)
7808
 * @nparams: pointer to number of block stats; input and output
E
Eric Blake 已提交
7809
 * @flags: bitwise-OR of virTypedParameterFlags
O
Osier Yang 已提交
7810 7811 7812 7813
 *
 * This function is to get block stats parameters for block
 * devices attached to the domain.
 *
7814
 * The @disk parameter is either the device target shorthand (the
7815 7816 7817 7818 7819
 * <target dev='...'/> sub-element, such as "xvda"), or (since 0.9.8)
 * an unambiguous source name of the block device (the <source
 * file='...'/> sub-element, such as "/path/to/image").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
O
Osier Yang 已提交
7820 7821 7822 7823
 *
 * Domains may have more than one block device.  To get stats for
 * each you should make multiple calls to this function.
 *
7824 7825 7826 7827
 * On input, @nparams gives the size of the @params array; on output,
 * @nparams gives how many slots were filled with parameter
 * information, which might be less but will not exceed the input
 * value.
O
Osier Yang 已提交
7828
 *
7829 7830 7831 7832 7833
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. (Note that block devices of different types
 * might support different parameters, so it might be necessary to compute
 * @nparams for each block device). The caller should then allocate @params
O
Osier Yang 已提交
7834
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
7835
 * again. See virDomainGetMemoryParameters() for more details.
O
Osier Yang 已提交
7836 7837 7838
 *
 * Returns -1 in case of error, 0 in case of success.
 */
7839 7840 7841 7842 7843 7844
int
virDomainBlockStatsFlags(virDomainPtr dom,
                         const char *disk,
                         virTypedParameterPtr params,
                         int *nparams,
                         unsigned int flags)
O
Osier Yang 已提交
7845 7846 7847
{
    virConnectPtr conn;

7848 7849
    VIR_DOMAIN_DEBUG(dom, "disk=%s, params=%p, nparams=%d, flags=%x",
                     disk, params, nparams ? *nparams : -1, flags);
O
Osier Yang 已提交
7850 7851 7852

    virResetLastError();

7853
    virCheckDomainReturn(dom, -1);
7854 7855 7856 7857 7858 7859
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

E
Eric Blake 已提交
7860 7861 7862
    if (VIR_DRV_SUPPORTS_FEATURE(dom->conn->driver, dom->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
O
Osier Yang 已提交
7863 7864 7865 7866
    conn = dom->conn;

    if (conn->driver->domainBlockStatsFlags) {
        int ret;
7867
        ret = conn->driver->domainBlockStatsFlags(dom, disk, params, nparams, flags);
O
Osier Yang 已提交
7868 7869 7870 7871
        if (ret < 0)
            goto error;
        return ret;
    }
7872
    virReportUnsupportedError();
O
Osier Yang 已提交
7873 7874 7875 7876 7877 7878 7879

error:
    virDispatchError(dom->conn);
    return -1;
}


7880
/**
7881
 * virDomainInterfaceStats:
7882 7883 7884 7885 7886 7887 7888 7889 7890 7891
 * @dom: pointer to the domain object
 * @path: path to the interface
 * @stats: network interface stats (returned)
 * @size: size of stats structure
 *
 * This function returns network interface stats for interfaces
 * attached to the domain.
 *
 * The path parameter is the name of the network interface.
 *
D
Dan Kenigsberg 已提交
7892
 * Domains may have more than one network interface.  To get stats for
7893 7894 7895 7896 7897 7898 7899 7900 7901
 * each you should make multiple calls to this function.
 *
 * Individual fields within the stats structure may be returned
 * as -1, which indicates that the hypervisor does not support
 * that particular statistic.
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
7902 7903
virDomainInterfaceStats(virDomainPtr dom, const char *path,
                        virDomainInterfaceStatsPtr stats, size_t size)
7904 7905 7906 7907
{
    virConnectPtr conn;
    struct _virDomainInterfaceStats stats2 = { -1, -1, -1, -1,
                                               -1, -1, -1, -1 };
7908 7909 7910

    VIR_DOMAIN_DEBUG(dom, "path=%s, stats=%p, size=%zi",
                     path, stats, size);
7911

7912 7913
    virResetLastError();

7914
    virCheckDomainReturn(dom, -1);
7915 7916 7917 7918 7919 7920
    virCheckNonNullArgGoto(path, error);
    virCheckNonNullArgGoto(stats, error);
    if (size > sizeof(stats2)) {
        virReportInvalidArg(size,
                            _("size in %s must not exceed %zu"),
                            __FUNCTION__, sizeof(stats2));
7921 7922
        goto error;
    }
7923

7924 7925 7926
    conn = dom->conn;

    if (conn->driver->domainInterfaceStats) {
7927
        if (conn->driver->domainInterfaceStats(dom, path, &stats2) == -1)
7928
            goto error;
7929

7930
        memcpy(stats, &stats2, size);
7931 7932 7933
        return 0;
    }

7934
    virReportUnsupportedError();
7935 7936

error:
7937
    virDispatchError(dom->conn);
7938 7939 7940
    return -1;
}

7941 7942

/**
7943 7944 7945 7946 7947 7948 7949 7950
 * virDomainSetInterfaceParameters:
 * @domain: pointer to domain object
 * @device: the interface name or mac address
 * @params: pointer to interface parameter objects
 * @nparams: number of interface parameter (this value can be the same or
 *          less than the number of parameters supported)
 * @flags: bitwise-OR of virDomainModificationImpact
 *
7951 7952
 * Change a subset or all parameters of interface; currently this
 * includes bandwidth parameters.  The value of @flags should be
7953 7954
 * either VIR_DOMAIN_AFFECT_CURRENT, or a bitwise-or of values
 * VIR_DOMAIN_AFFECT_LIVE and VIR_DOMAIN_AFFECT_CONFIG, although
7955 7956
 * hypervisors vary in which flags are supported.
 *
7957 7958 7959 7960 7961 7962 7963 7964 7965 7966 7967 7968 7969 7970
 * This function may require privileged access to the hypervisor.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainSetInterfaceParameters(virDomainPtr domain,
                                const char *device,
                                virTypedParameterPtr params,
                                int nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "device=%s, params=%p, nparams=%d, flags=%x",
                     device, params, nparams, flags);
7971
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
7972 7973 7974

    virResetLastError();

7975 7976 7977 7978
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
7979 7980 7981
    virCheckNonNullArgGoto(params, error);
    virCheckPositiveArgGoto(nparams, error);

7982
    if (virTypedParameterValidateSet(conn, params, nparams) < 0)
7983
        goto error;
7984 7985 7986

    if (conn->driver->domainSetInterfaceParameters) {
        int ret;
7987 7988 7989
        ret = conn->driver->domainSetInterfaceParameters(domain, device,
                                                         params, nparams,
                                                         flags);
7990 7991 7992 7993 7994
        if (ret < 0)
            goto error;
        return ret;
    }

7995
    virReportUnsupportedError();
7996 7997 7998 7999 8000 8001

error:
    virDispatchError(domain->conn);
    return -1;
}

8002 8003

/**
8004 8005 8006 8007 8008
 * virDomainGetInterfaceParameters:
 * @domain: pointer to domain object
 * @device: the interface name or mac address
 * @params: pointer to interface parameter objects
 *          (return value, allocated by the caller)
8009 8010
 * @nparams: pointer to number of interface parameter; input and output
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
8011 8012 8013 8014 8015 8016 8017 8018 8019 8020 8021 8022 8023 8024 8025 8026 8027 8028 8029 8030 8031 8032 8033 8034 8035 8036 8037 8038 8039 8040 8041
 *
 * Get all interface parameters. On input, @nparams gives the size of
 * the @params array; on output, @nparams gives how many slots were
 * filled with parameter information, which might be less but will not
 * exceed the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0 on
 * input will cause @nparams on output to contain the number of parameters
 * supported by the hypervisor. The caller should then allocate @params
 * array, i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the
 * API again. See virDomainGetMemoryParameters() for an equivalent usage
 * example.
 *
 * This function may require privileged access to the hypervisor. This function
 * expects the caller to allocate the @params.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
int
virDomainGetInterfaceParameters(virDomainPtr domain,
                                const char *device,
                                virTypedParameterPtr params,
                                int *nparams, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "device=%s, params=%p, nparams=%d, flags=%x",
                     device, params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

8042
    virCheckDomainReturn(domain, -1);
8043 8044 8045 8046 8047
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0)
        virCheckNonNullArgGoto(params, error);

8048 8049 8050 8051 8052 8053 8054 8055
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    conn = domain->conn;

    if (conn->driver->domainGetInterfaceParameters) {
        int ret;
8056 8057 8058
        ret = conn->driver->domainGetInterfaceParameters(domain, device,
                                                         params, nparams,
                                                         flags);
8059 8060 8061 8062
        if (ret < 0)
            goto error;
        return ret;
    }
8063
    virReportUnsupportedError();
8064 8065 8066 8067 8068 8069

error:
    virDispatchError(domain->conn);
    return -1;
}

8070

8071 8072 8073 8074 8075
/**
 * virDomainMemoryStats:
 * @dom: pointer to the domain object
 * @stats: nr_stats-sized array of stat structures (returned)
 * @nr_stats: number of memory statistics requested
8076
 * @flags: extra flags; not used yet, so callers should always pass 0
8077 8078 8079 8080 8081 8082 8083 8084 8085 8086 8087 8088 8089 8090 8091 8092 8093 8094 8095 8096 8097
 *
 * This function provides memory statistics for the domain.
 *
 * Up to 'nr_stats' elements of 'stats' will be populated with memory statistics
 * from the domain.  Only statistics supported by the domain, the driver, and
 * this version of libvirt will be returned.
 *
 * Memory Statistics:
 *
 * VIR_DOMAIN_MEMORY_STAT_SWAP_IN:
 *     The total amount of data read from swap space (in kb).
 * VIR_DOMAIN_MEMORY_STAT_SWAP_OUT:
 *     The total amount of memory written out to swap space (in kb).
 * VIR_DOMAIN_MEMORY_STAT_MAJOR_FAULT:
 *     The number of page faults that required disk IO to service.
 * VIR_DOMAIN_MEMORY_STAT_MINOR_FAULT:
 *     The number of page faults serviced without disk IO.
 * VIR_DOMAIN_MEMORY_STAT_UNUSED:
 *     The amount of memory which is not being used for any purpose (in kb).
 * VIR_DOMAIN_MEMORY_STAT_AVAILABLE:
 *     The total amount of memory available to the domain's OS (in kb).
8098 8099
 * VIR_DOMAIN_MEMORY_STAT_ACTUAL_BALLOON:
 *     Current balloon value (in kb).
8100 8101 8102
 *
 * Returns: The number of stats provided or -1 in case of failure.
 */
8103 8104 8105
int
virDomainMemoryStats(virDomainPtr dom, virDomainMemoryStatPtr stats,
                     unsigned int nr_stats, unsigned int flags)
8106 8107 8108
{
    virConnectPtr conn;
    unsigned long nr_stats_ret = 0;
8109

E
Eric Blake 已提交
8110 8111
    VIR_DOMAIN_DEBUG(dom, "stats=%p, nr_stats=%u, flags=%x",
                     stats, nr_stats, flags);
8112 8113 8114

    virResetLastError();

8115
    virCheckDomainReturn(dom, -1);
8116

8117 8118 8119 8120 8121 8122 8123 8124
    if (!stats || nr_stats == 0)
        return 0;

    if (nr_stats > VIR_DOMAIN_MEMORY_STAT_NR)
        nr_stats = VIR_DOMAIN_MEMORY_STAT_NR;

    conn = dom->conn;
    if (conn->driver->domainMemoryStats) {
8125 8126
        nr_stats_ret = conn->driver->domainMemoryStats(dom, stats, nr_stats,
                                                       flags);
8127 8128 8129 8130 8131
        if (nr_stats_ret == -1)
            goto error;
        return nr_stats_ret;
    }

8132
    virReportUnsupportedError();
8133 8134

error:
8135
    virDispatchError(dom->conn);
8136 8137 8138
    return -1;
}

8139

R
Richard W.M. Jones 已提交
8140 8141 8142
/**
 * virDomainBlockPeek:
 * @dom: pointer to the domain object
8143
 * @disk: path to the block device, or device shorthand
R
Richard W.M. Jones 已提交
8144 8145 8146
 * @offset: offset within block device
 * @size: size to read
 * @buffer: return buffer (must be at least size bytes)
8147
 * @flags: extra flags; not used yet, so callers should always pass 0
R
Richard W.M. Jones 已提交
8148 8149 8150 8151 8152 8153 8154 8155 8156 8157 8158 8159 8160 8161
 *
 * This function allows you to read the contents of a domain's
 * disk device.
 *
 * Typical uses for this are to determine if the domain has
 * written a Master Boot Record (indicating that the domain
 * has completed installation), or to try to work out the state
 * of the domain's filesystems.
 *
 * (Note that in the local case you might try to open the
 * block device or file directly, but that won't work in the
 * remote case, nor if you don't have sufficient permission.
 * Hence the need for this call).
 *
8162
 * The @disk parameter is either an unambiguous source name of the
8163 8164 8165 8166 8167
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
R
Richard W.M. Jones 已提交
8168 8169 8170 8171 8172 8173 8174
 *
 * 'offset' and 'size' represent an area which must lie entirely
 * within the device or file.  'size' may be 0 to test if the
 * call would succeed.
 *
 * 'buffer' is the return buffer and must be at least 'size' bytes.
 *
R
Richard W.M. Jones 已提交
8175 8176 8177
 * NB. The remote driver imposes a 64K byte limit on 'size'.
 * For your program to be able to work reliably over a remote
 * connection you should split large requests to <= 65536 bytes.
M
Michal Privoznik 已提交
8178
 * However, with 0.9.13 this RPC limit has been raised to 1M byte.
8179 8180
 * Starting with version 1.0.6 the RPC limit has been raised again.
 * Now large requests up to 16M byte are supported.
R
Richard W.M. Jones 已提交
8181
 *
R
Richard W.M. Jones 已提交
8182 8183 8184
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8185 8186 8187 8188 8189 8190
virDomainBlockPeek(virDomainPtr dom,
                   const char *disk,
                   unsigned long long offset /* really 64 bits */,
                   size_t size,
                   void *buffer,
                   unsigned int flags)
R
Richard W.M. Jones 已提交
8191 8192
{
    virConnectPtr conn;
8193

8194 8195
    VIR_DOMAIN_DEBUG(dom, "disk=%s, offset=%lld, size=%zi, buffer=%p, flags=%x",
                     disk, offset, size, buffer, flags);
R
Richard W.M. Jones 已提交
8196

8197 8198
    virResetLastError();

8199
    virCheckDomainReturn(dom, -1);
R
Richard W.M. Jones 已提交
8200
    conn = dom->conn;
8201

8202
    virCheckReadOnlyGoto(conn->flags, error);
8203
    virCheckNonNullArgGoto(disk, error);
R
Richard W.M. Jones 已提交
8204 8205

    /* Allow size == 0 as an access test. */
8206 8207
    if (size > 0)
        virCheckNonNullArgGoto(buffer, error);
R
Richard W.M. Jones 已提交
8208

8209 8210
    if (conn->driver->domainBlockPeek) {
        int ret;
8211
        ret = conn->driver->domainBlockPeek(dom, disk, offset, size,
8212 8213 8214 8215 8216
                                            buffer, flags);
        if (ret < 0)
            goto error;
        return ret;
    }
R
Richard W.M. Jones 已提交
8217

8218
    virReportUnsupportedError();
8219 8220

error:
8221
    virDispatchError(dom->conn);
R
Richard W.M. Jones 已提交
8222 8223
    return -1;
}
8224

8225

O
Osier Yang 已提交
8226 8227 8228 8229
/**
 * virDomainBlockResize:
 * @dom: pointer to the domain object
 * @disk: path to the block image, or shorthand
E
Eric Blake 已提交
8230 8231
 * @size: new size of the block image, see below for unit
 * @flags: bitwise-OR of virDomainBlockResizeFlags
O
Osier Yang 已提交
8232
 *
E
Eric Blake 已提交
8233
 * Resize a block device of domain while the domain is running.  If
8234 8235 8236 8237 8238
 * @flags is 0, then @size is in kibibytes (blocks of 1024 bytes);
 * since 0.9.11, if @flags includes VIR_DOMAIN_BLOCK_RESIZE_BYTES,
 * @size is in bytes instead.  @size is taken directly as the new
 * size.  Depending on the file format, the hypervisor may round up
 * to the next alignment boundary.
O
Osier Yang 已提交
8239 8240 8241 8242 8243 8244 8245 8246
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
E
Eric Blake 已提交
8247 8248 8249
 * Note that this call may fail if the underlying virtualization hypervisor
 * does not support it; this call requires privileged access to the
 * hypervisor.
O
Osier Yang 已提交
8250 8251 8252 8253
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8254 8255 8256 8257
virDomainBlockResize(virDomainPtr dom,
                     const char *disk,
                     unsigned long long size,
                     unsigned int flags)
O
Osier Yang 已提交
8258 8259 8260 8261 8262 8263 8264
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "disk=%s, size=%llu, flags=%x", disk, size, flags);

    virResetLastError();

8265
    virCheckDomainReturn(dom, -1);
O
Osier Yang 已提交
8266 8267
    conn = dom->conn;

8268
    virCheckReadOnlyGoto(conn->flags, error);
8269
    virCheckNonNullArgGoto(disk, error);
O
Osier Yang 已提交
8270 8271 8272

    if (conn->driver->domainBlockResize) {
        int ret;
8273
        ret = conn->driver->domainBlockResize(dom, disk, size, flags);
O
Osier Yang 已提交
8274 8275 8276 8277 8278
        if (ret < 0)
            goto error;
        return ret;
    }

8279
    virReportUnsupportedError();
O
Osier Yang 已提交
8280 8281 8282 8283 8284 8285

error:
    virDispatchError(dom->conn);
    return -1;
}

8286

R
Richard W.M. Jones 已提交
8287 8288 8289 8290 8291 8292
/**
 * virDomainMemoryPeek:
 * @dom: pointer to the domain object
 * @start: start of memory to peek
 * @size: size of memory to peek
 * @buffer: return buffer (must be at least size bytes)
8293
 * @flags: bitwise-OR of virDomainMemoryFlags
R
Richard W.M. Jones 已提交
8294 8295 8296 8297 8298 8299 8300 8301 8302 8303 8304 8305 8306 8307 8308 8309 8310 8311 8312 8313 8314
 *
 * This function allows you to read the contents of a domain's
 * memory.
 *
 * The memory which is read is controlled by the 'start', 'size'
 * and 'flags' parameters.
 *
 * If 'flags' is VIR_MEMORY_VIRTUAL then the 'start' and 'size'
 * parameters are interpreted as virtual memory addresses for
 * whichever task happens to be running on the domain at the
 * moment.  Although this sounds haphazard it is in fact what
 * you want in order to read Linux kernel state, because it
 * ensures that pointers in the kernel image can be interpreted
 * coherently.
 *
 * 'buffer' is the return buffer and must be at least 'size' bytes.
 * 'size' may be 0 to test if the call would succeed.
 *
 * NB. The remote driver imposes a 64K byte limit on 'size'.
 * For your program to be able to work reliably over a remote
 * connection you should split large requests to <= 65536 bytes.
M
Michal Privoznik 已提交
8315
 * However, with 0.9.13 this RPC limit has been raised to 1M byte.
8316 8317
 * Starting with version 1.0.6 the RPC limit has been raised again.
 * Now large requests up to 16M byte are supported.
R
Richard W.M. Jones 已提交
8318 8319 8320 8321
 *
 * Returns: 0 in case of success or -1 in case of failure.
 */
int
8322 8323 8324 8325 8326
virDomainMemoryPeek(virDomainPtr dom,
                    unsigned long long start /* really 64 bits */,
                    size_t size,
                    void *buffer,
                    unsigned int flags)
R
Richard W.M. Jones 已提交
8327 8328
{
    virConnectPtr conn;
8329

8330
    VIR_DOMAIN_DEBUG(dom, "start=%lld, size=%zi, buffer=%p, flags=%x",
8331
                     start, size, buffer, flags);
R
Richard W.M. Jones 已提交
8332

8333 8334
    virResetLastError();

8335
    virCheckDomainReturn(dom, -1);
R
Richard W.M. Jones 已提交
8336 8337
    conn = dom->conn;

8338
    virCheckReadOnlyGoto(conn->flags, error);
8339

8340
    /* Note on access to physical memory: A VIR_MEMORY_PHYSICAL flag is
R
Richard W.M. Jones 已提交
8341 8342 8343 8344 8345 8346
     * a possibility.  However it isn't really useful unless the caller
     * can also access registers, particularly CR3 on x86 in order to
     * get the Page Table Directory.  Since registers are different on
     * every architecture, that would imply another call to get the
     * machine registers.
     *
8347
     * The QEMU driver handles VIR_MEMORY_VIRTUAL, mapping it
R
Richard W.M. Jones 已提交
8348 8349 8350
     * to the qemu 'memsave' command which does the virtual to physical
     * mapping inside qemu.
     *
8351 8352 8353
     * The QEMU driver also handles VIR_MEMORY_PHYSICAL, mapping it
     * to the qemu 'pmemsave' command.
     *
R
Richard W.M. Jones 已提交
8354 8355 8356 8357 8358 8359 8360 8361
     * At time of writing there is no Xen driver.  However the Xen
     * hypervisor only lets you map physical pages from other domains,
     * and so the Xen driver would have to do the virtual to physical
     * mapping by chasing 2, 3 or 4-level page tables from the PTD.
     * There is example code in libxc (xc_translate_foreign_address)
     * which does this, although we cannot copy this code directly
     * because of incompatible licensing.
     */
8362

8363 8364
    /* Exactly one of these two flags must be set.  */
    if (!(flags & VIR_MEMORY_VIRTUAL) == !(flags & VIR_MEMORY_PHYSICAL)) {
8365
        virReportInvalidArg(flags,
8366 8367
                            _("flags in %s must include VIR_MEMORY_VIRTUAL or "
                              "VIR_MEMORY_PHYSICAL"),
8368
                            __FUNCTION__);
8369
        goto error;
R
Richard W.M. Jones 已提交
8370 8371 8372
    }

    /* Allow size == 0 as an access test. */
8373 8374
    if (size > 0)
        virCheckNonNullArgGoto(buffer, error);
R
Richard W.M. Jones 已提交
8375

8376 8377
    if (conn->driver->domainMemoryPeek) {
        int ret;
8378 8379
        ret = conn->driver->domainMemoryPeek(dom, start, size,
                                             buffer, flags);
8380 8381 8382 8383
        if (ret < 0)
            goto error;
        return ret;
    }
R
Richard W.M. Jones 已提交
8384

8385
    virReportUnsupportedError();
8386 8387

error:
8388
    virDispatchError(dom->conn);
R
Richard W.M. Jones 已提交
8389 8390 8391
    return -1;
}

8392

8393 8394 8395
/**
 * virDomainGetBlockInfo:
 * @domain: a domain object
8396
 * @disk: path to the block device, or device shorthand
8397
 * @info: pointer to a virDomainBlockInfo structure allocated by the user
8398
 * @flags: extra flags; not used yet, so callers should always pass 0
8399 8400 8401
 *
 * Extract information about a domain's block device.
 *
8402
 * The @disk parameter is either an unambiguous source name of the
8403 8404 8405 8406 8407
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
8408 8409 8410 8411 8412 8413 8414 8415 8416 8417 8418 8419 8420 8421 8422 8423 8424 8425 8426 8427 8428 8429 8430 8431 8432 8433 8434 8435 8436 8437 8438 8439 8440 8441 8442 8443 8444 8445 8446 8447 8448 8449 8450 8451 8452 8453 8454 8455 8456 8457 8458 8459 8460
 *
 * For QEMU domains, the allocation and physical virDomainBlockInfo
 * values returned will generally be the same, except when using a
 * non raw, block backing device, such as qcow2 for an active domain.
 * When the persistent domain is not active, QEMU will return the
 * default which is the same value for allocation and physical.
 *
 * Active QEMU domains can return an allocation value which is more
 * representative of the currently used blocks by the device compared
 * to the physical size of the device. Applications can use/monitor
 * the allocation value with the understanding that if the domain
 * becomes inactive during an attempt to get the value, the default
 * values will be returned. Thus, the application should check
 * after the call for the domain being inactive if the values are
 * the same. Optionally, the application could be watching for a
 * shutdown event and then ignore any values received afterwards.
 * This can be an issue when a domain is being migrated and the
 * exact timing of the domain being made inactive and check of
 * the allocation value results the default being returned. For
 * a transient domain in the similar situation, this call will return
 * -1 and an error message indicating the "domain is not running".
 *
 * The following is some pseudo code illustrating the call sequence:
 *
 *   ...
 *   virDomainPtr dom;
 *   virDomainBlockInfo info;
 *   char *device;
 *   ...
 *   // Either get a list of all domains or a specific domain
 *   // via a virDomainLookupBy*() call.
 *   //
 *   // It's also required to fill in the device pointer, but that's
 *   // specific to the implementation. For the purposes of this example
 *   // a qcow2 backed device name string would need to be provided.
 *   ...
 *   // If the following call is made on a persistent domain with a
 *   // qcow2 block backed block device, then it's possible the returned
 *   // allocation equals the physical value. In that case, the domain
 *   // that may have been active prior to calling has become inactive,
 *   // such as is the case during a domain migration. Thus once we
 *   // get data returned, check for active domain when the values are
 *   // the same.
 *   if (virDomainGetBlockInfo(dom, device, &info, 0) < 0)
 *       goto failure;
 *   if (info.allocation == info.physical) {
 *       // If the domain is no longer active,
 *       // then the defaults are being returned.
 *       if (!virDomainIsActive())
 *               goto ignore_return;
 *   }
 *   // Do something with the allocation and physical values
 *   ...
8461
 *
8462 8463 8464
 * Returns 0 in case of success and -1 in case of failure.
 */
int
8465
virDomainGetBlockInfo(virDomainPtr domain, const char *disk,
8466
                      virDomainBlockInfoPtr info, unsigned int flags)
8467 8468
{
    virConnectPtr conn;
8469

E
Eric Blake 已提交
8470
    VIR_DOMAIN_DEBUG(domain, "info=%p, flags=%x", info, flags);
8471 8472 8473

    virResetLastError();

8474 8475 8476
    if (info)
        memset(info, 0, sizeof(*info));

8477
    virCheckDomainReturn(domain, -1);
8478 8479
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(info, error);
8480 8481 8482 8483 8484

    conn = domain->conn;

    if (conn->driver->domainGetBlockInfo) {
        int ret;
8485
        ret = conn->driver->domainGetBlockInfo(domain, disk, info, flags);
8486 8487 8488 8489 8490
        if (ret < 0)
            goto error;
        return ret;
    }

8491
    virReportUnsupportedError();
8492 8493 8494 8495 8496 8497 8498

error:
    virDispatchError(domain->conn);
    return -1;
}


8499 8500 8501 8502 8503 8504 8505 8506 8507 8508 8509
/************************************************************************
 *									*
 *		Handling of defined but not running domains		*
 *									*
 ************************************************************************/

/**
 * virDomainDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xml: the XML description for the domain, preferably in UTF-8
 *
8510 8511
 * Define a domain, but does not start it.
 * This definition is persistent, until explicitly undefined with
8512
 * virDomainUndefine(). A previous definition for this domain would be
8513
 * overridden if it already exists.
8514
 *
E
Eric Blake 已提交
8515 8516 8517 8518 8519
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation on a transient domain with the same id as the
 * domain being defined; in that case, use virDomainBlockJobAbort() to
 * stop the block copy first.
 *
8520 8521 8522
 * Returns NULL in case of error, a pointer to the domain otherwise
 */
virDomainPtr
8523 8524
virDomainDefineXML(virConnectPtr conn, const char *xml)
{
8525
    VIR_DEBUG("conn=%p, xml=%s", conn, xml);
8526

8527 8528
    virResetLastError();

8529
    virCheckConnectReturn(conn, NULL);
8530
    virCheckReadOnlyGoto(conn->flags, error);
8531
    virCheckNonNullArgGoto(xml, error);
8532

8533 8534
    if (conn->driver->domainDefineXML) {
        virDomainPtr ret;
8535
        ret = conn->driver->domainDefineXML(conn, xml);
8536 8537 8538 8539
        if (!ret)
            goto error;
        return ret;
    }
8540

8541
    virReportUnsupportedError();
8542 8543

error:
8544
    virDispatchError(conn);
8545
    return NULL;
8546 8547
}

8548

8549 8550 8551 8552
/**
 * virDomainUndefine:
 * @domain: pointer to a defined domain
 *
O
Osier Yang 已提交
8553 8554 8555 8556 8557
 * Undefine a domain. If the domain is running, it's converted to
 * transient domain, without stopping it. If the domain is inactive,
 * the domain configuration is removed.
 *
 * If the domain has a managed save image (see
8558 8559 8560
 * virDomainHasManagedSaveImage()), or if it is inactive and has any
 * snapshot metadata (see virDomainSnapshotNum()), then the undefine will
 * fail. See virDomainUndefineFlags() for more control.
8561 8562 8563 8564
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
8565 8566
virDomainUndefine(virDomainPtr domain)
{
8567
    virConnectPtr conn;
8568

8569
    VIR_DOMAIN_DEBUG(domain);
8570

8571 8572
    virResetLastError();

8573
    virCheckDomainReturn(domain, -1);
8574
    conn = domain->conn;
8575

8576
    virCheckReadOnlyGoto(conn->flags, error);
8577

8578 8579
    if (conn->driver->domainUndefine) {
        int ret;
8580
        ret = conn->driver->domainUndefine(domain);
8581 8582 8583 8584
        if (ret < 0)
            goto error;
        return ret;
    }
8585

8586
    virReportUnsupportedError();
8587 8588

error:
8589
    virDispatchError(domain->conn);
8590
    return -1;
8591 8592
}

8593

O
Osier Yang 已提交
8594 8595 8596
/**
 * virDomainUndefineFlags:
 * @domain: pointer to a defined domain
8597
 * @flags: bitwise-OR of supported virDomainUndefineFlagsValues
O
Osier Yang 已提交
8598 8599 8600 8601 8602 8603 8604 8605 8606
 *
 * Undefine a domain. If the domain is running, it's converted to
 * transient domain, without stopping it. If the domain is inactive,
 * the domain configuration is removed.
 *
 * If the domain has a managed save image (see virDomainHasManagedSaveImage()),
 * then including VIR_DOMAIN_UNDEFINE_MANAGED_SAVE in @flags will also remove
 * that file, and omitting the flag will cause the undefine process to fail.
 *
8607 8608 8609 8610 8611 8612 8613 8614 8615
 * If the domain is inactive and has any snapshot metadata (see
 * virDomainSnapshotNum()), then including
 * VIR_DOMAIN_UNDEFINE_SNAPSHOTS_METADATA in @flags will also remove
 * that metadata.  Omitting the flag will cause the undefine of an
 * inactive domain to fail.  Active snapshots will retain snapshot
 * metadata until the (now-transient) domain halts, regardless of
 * whether this flag is present.  On hypervisors where snapshots do
 * not use libvirt metadata, this flag has no effect.
 *
O
Osier Yang 已提交
8616 8617 8618 8619 8620 8621 8622 8623 8624 8625 8626 8627
 * Returns 0 in case of success, -1 in case of error
 */
int
virDomainUndefineFlags(virDomainPtr domain,
                       unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);

    virResetLastError();

8628
    virCheckDomainReturn(domain, -1);
O
Osier Yang 已提交
8629
    conn = domain->conn;
8630

8631
    virCheckReadOnlyGoto(conn->flags, error);
O
Osier Yang 已提交
8632 8633 8634

    if (conn->driver->domainUndefineFlags) {
        int ret;
8635
        ret = conn->driver->domainUndefineFlags(domain, flags);
O
Osier Yang 已提交
8636 8637 8638 8639 8640
        if (ret < 0)
            goto error;
        return ret;
    }

8641
    virReportUnsupportedError();
O
Osier Yang 已提交
8642 8643 8644 8645 8646 8647 8648

error:
    virDispatchError(domain->conn);
    return -1;
}


8649 8650 8651 8652
/**
 * virConnectNumOfDefinedDomains:
 * @conn: pointer to the hypervisor connection
 *
8653
 * Provides the number of defined but inactive domains.
8654 8655 8656 8657 8658 8659
 *
 * Returns the number of domain found or -1 in case of error
 */
int
virConnectNumOfDefinedDomains(virConnectPtr conn)
{
8660
    VIR_DEBUG("conn=%p", conn);
8661

8662 8663
    virResetLastError();

8664
    virCheckConnectReturn(conn, -1);
8665

8666
    if (conn->driver->connectNumOfDefinedDomains) {
8667
        int ret;
8668
        ret = conn->driver->connectNumOfDefinedDomains(conn);
8669 8670 8671 8672
        if (ret < 0)
            goto error;
        return ret;
    }
8673

8674
    virReportUnsupportedError();
8675 8676

error:
8677
    virDispatchError(conn);
8678
    return -1;
8679 8680
}

8681

8682 8683 8684 8685 8686 8687
/**
 * virConnectListDefinedDomains:
 * @conn: pointer to the hypervisor connection
 * @names: pointer to an array to store the names
 * @maxnames: size of the array
 *
8688 8689
 * list the defined but inactive domains, stores the pointers to the names
 * in @names
8690
 *
8691 8692 8693 8694 8695 8696 8697 8698
 * For active domains, see virConnectListDomains().  For more control over
 * the results, see virConnectListAllDomains().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a domain can be defined between
 * a call to virConnectNumOfDefinedDomains() and this call; you are only
 * guaranteed that all currently defined domains were listed if the return
 * is less than @maxids.  The client must call free() on each returned name.
8699 8700
 */
int
8701
virConnectListDefinedDomains(virConnectPtr conn, char **const names,
8702 8703
                             int maxnames)
{
8704
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
8705

8706 8707
    virResetLastError();

8708
    virCheckConnectReturn(conn, -1);
8709 8710
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
8711

8712
    if (conn->driver->connectListDefinedDomains) {
8713
        int ret;
8714
        ret = conn->driver->connectListDefinedDomains(conn, names, maxnames);
8715 8716 8717 8718
        if (ret < 0)
            goto error;
        return ret;
    }
8719

8720
    virReportUnsupportedError();
8721 8722

error:
8723
    virDispatchError(conn);
8724
    return -1;
8725 8726
}

8727

8728 8729 8730 8731 8732 8733 8734 8735 8736 8737 8738 8739 8740 8741 8742 8743 8744 8745 8746 8747 8748 8749 8750 8751 8752 8753 8754 8755 8756 8757 8758 8759 8760 8761 8762 8763 8764 8765 8766 8767 8768 8769 8770 8771 8772 8773 8774 8775
/**
 * virConnectListAllDomains:
 * @conn: Pointer to the hypervisor connection.
 * @domains: Pointer to a variable to store the array containing domain objects
 *           or NULL if the list is not required (just returns number of guests).
 * @flags: bitwise-OR of virConnectListAllDomainsFlags
 *
 * Collect a possibly-filtered list of all domains, and return an allocated
 * array of information for each.  This API solves the race inherent in
 * virConnectListDomains() and virConnectListDefinedDomains().
 *
 * Normally, all domains are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted domains.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a domain, and where all bits
 * within a group describe all possible domains.  Some hypervisors might
 * reject explicit bits from a group where the hypervisor cannot make a
 * distinction (for example, not all hypervisors can tell whether domains
 * have snapshots).  For a group supported by a given hypervisor, the
 * behavior when no bits of a group are set is identical to the behavior
 * when all bits in that group are set.  When setting bits from more than
 * one group, it is possible to select an impossible combination (such
 * as an inactive transient domain), in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_CONNECT_LIST_DOMAINS_ACTIVE (online
 * domains) and VIR_CONNECT_LIST_DOMAINS_INACTIVE (offline domains).
 *
 * The next group of @flags is VIR_CONNECT_LIST_DOMAINS_PERSISTENT (defined
 * domains) and VIR_CONNECT_LIST_DOMAINS_TRANSIENT (running but not defined).
 *
 * The next group of @flags covers various domain states:
 * VIR_CONNECT_LIST_DOMAINS_RUNNING, VIR_CONNECT_LIST_DOMAINS_PAUSED,
 * VIR_CONNECT_LIST_DOMAINS_SHUTOFF, and a catch-all for all other states
 * (such as crashed, this catch-all covers the possibility of adding new
 * states).
 *
 * The remaining groups cover boolean attributes commonly asked about
 * domains; they include VIR_CONNECT_LIST_DOMAINS_MANAGEDSAVE and
 * VIR_CONNECT_LIST_DOMAINS_NO_MANAGEDSAVE, for filtering based on whether
 * a managed save image exists; VIR_CONNECT_LIST_DOMAINS_AUTOSTART and
 * VIR_CONNECT_LIST_DOMAINS_NO_AUTOSTART, for filtering based on autostart;
 * VIR_CONNECT_LIST_DOMAINS_HAS_SNAPSHOT and
 * VIR_CONNECT_LIST_DOMAINS_NO_SNAPSHOT, for filtering based on whether
 * a domain has snapshots.
 *
 * Example of usage:
 *
E
Eric Blake 已提交
8776 8777 8778 8779 8780 8781 8782 8783 8784 8785 8786 8787 8788 8789
 *   virDomainPtr *domains;
 *   size_t i;
 *   int ret;
 *   unsigned int flags = VIR_CONNECT_LIST_DOMAINS_RUNNING |
 *                        VIR_CONNECT_LIST_DOMAINS_PERSISTENT;
 *   ret = virConnectListAllDomains(conn, &domains, flags);
 *   if (ret < 0)
 *       error();
 *   for (i = 0; i < ret; i++) {
 *        do_something_with_domain(domains[i]);
 *        //here or in a separate loop if needed
 *        virDomainFree(domains[i]);
 *   }
 *   free(domains);
E
Eric Blake 已提交
8790 8791 8792 8793 8794 8795
 *
 * Returns the number of domains found or -1 and sets domains to NULL in case of
 * error.  On success, the array stored into @domains is guaranteed to have an
 * extra allocated element set to NULL but not included in the return count, to
 * make iteration easier. The caller is responsible for calling virDomainFree()
 * on each array element, then calling free() on @domains.
8796 8797 8798 8799 8800 8801 8802 8803 8804 8805 8806 8807 8808
 */
int
virConnectListAllDomains(virConnectPtr conn,
                         virDomainPtr **domains,
                         unsigned int flags)
{
    VIR_DEBUG("conn=%p, domains=%p, flags=%x", conn, domains, flags);

    virResetLastError();

    if (domains)
        *domains = NULL;

8809
    virCheckConnectReturn(conn, -1);
8810

8811
    if (conn->driver->connectListAllDomains) {
8812
        int ret;
8813
        ret = conn->driver->connectListAllDomains(conn, domains, flags);
8814 8815 8816 8817 8818
        if (ret < 0)
            goto error;
        return ret;
    }

8819
    virReportUnsupportedError();
8820 8821 8822 8823 8824 8825

error:
    virDispatchError(conn);
    return -1;
}

8826

8827 8828 8829 8830
/**
 * virDomainCreate:
 * @domain: pointer to a defined domain
 *
8831
 * Launch a defined domain. If the call succeeds the domain moves from the
8832 8833 8834
 * defined to the running domains pools.  The domain will be paused only
 * if restoring from managed state created from a paused domain.  For more
 * control, see virDomainCreateWithFlags().
8835 8836 8837 8838
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
8839 8840
virDomainCreate(virDomainPtr domain)
{
8841
    virConnectPtr conn;
8842

8843
    VIR_DOMAIN_DEBUG(domain);
8844

8845 8846
    virResetLastError();

8847
    virCheckDomainReturn(domain, -1);
8848
    conn = domain->conn;
8849

8850
    virCheckReadOnlyGoto(conn->flags, error);
8851

8852 8853
    if (conn->driver->domainCreate) {
        int ret;
8854
        ret = conn->driver->domainCreate(domain);
8855 8856 8857 8858
        if (ret < 0)
            goto error;
        return ret;
    }
8859

8860
    virReportUnsupportedError();
8861 8862

error:
8863
    virDispatchError(domain->conn);
8864
    return -1;
8865 8866
}

8867

8868 8869 8870
/**
 * virDomainCreateWithFlags:
 * @domain: pointer to a defined domain
8871
 * @flags: bitwise-OR of supported virDomainCreateFlags
8872 8873 8874 8875
 *
 * Launch a defined domain. If the call succeeds the domain moves from the
 * defined to the running domains pools.
 *
8876 8877 8878 8879 8880 8881
 * If the VIR_DOMAIN_START_PAUSED flag is set, or if the guest domain
 * has a managed save image that requested paused state (see
 * virDomainManagedSave()) the guest domain will be started, but its
 * CPUs will remain paused. The CPUs can later be manually started
 * using virDomainResume().  In all other cases, the guest domain will
 * be running.
8882 8883 8884 8885
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
E
Eric Blake 已提交
8886
 * client application crashes / loses its connection to the
8887
 * libvirtd daemon. Any domains marked for auto destroy will
8888
 * block attempts at migration, save-to-file, or snapshots.
8889
 *
8890 8891 8892 8893 8894 8895
 * If the VIR_DOMAIN_START_BYPASS_CACHE flag is set, and there is a
 * managed save file for this domain (created by virDomainManagedSave()),
 * then libvirt will attempt to bypass the file system cache while restoring
 * the file, or fail if it cannot do so for the given system; this can allow
 * less pressure on file system cache, but also risks slowing loads from NFS.
 *
8896 8897 8898
 * If the VIR_DOMAIN_START_FORCE_BOOT flag is set, then any managed save
 * file for this domain is discarded, and the domain boots from scratch.
 *
8899 8900 8901
 * Returns 0 in case of success, -1 in case of error
 */
int
8902 8903
virDomainCreateWithFlags(virDomainPtr domain, unsigned int flags)
{
8904
    virConnectPtr conn;
8905

8906
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
8907 8908 8909

    virResetLastError();

8910
    virCheckDomainReturn(domain, -1);
8911
    conn = domain->conn;
8912

8913
    virCheckReadOnlyGoto(conn->flags, error);
8914 8915 8916

    if (conn->driver->domainCreateWithFlags) {
        int ret;
8917
        ret = conn->driver->domainCreateWithFlags(domain, flags);
8918 8919 8920 8921 8922
        if (ret < 0)
            goto error;
        return ret;
    }

8923
    virReportUnsupportedError();
8924 8925 8926 8927 8928 8929

error:
    virDispatchError(domain->conn);
    return -1;
}

8930

8931 8932 8933 8934 8935 8936 8937 8938 8939 8940 8941 8942 8943 8944 8945 8946 8947 8948 8949 8950 8951 8952 8953 8954 8955 8956 8957 8958 8959 8960 8961 8962 8963 8964 8965 8966 8967 8968 8969 8970 8971 8972 8973 8974 8975 8976 8977 8978 8979 8980 8981 8982 8983
/**
 * virDomainCreateWithFiles:
 * @domain: pointer to a defined domain
 * @nfiles: number of file descriptors passed
 * @files: list of file descriptors passed
 * @flags: bitwise-OR of supported virDomainCreateFlags
 *
 * Launch a defined domain. If the call succeeds the domain moves from the
 * defined to the running domains pools.
 *
 * @files provides an array of file descriptors which will be
 * made available to the 'init' process of the guest. The file
 * handles exposed to the guest will be renumbered to start
 * from 3 (ie immediately following stderr). This is only
 * supported for guests which use container based virtualization
 * technology.
 *
 * If the VIR_DOMAIN_START_PAUSED flag is set, or if the guest domain
 * has a managed save image that requested paused state (see
 * virDomainManagedSave()) the guest domain will be started, but its
 * CPUs will remain paused. The CPUs can later be manually started
 * using virDomainResume().  In all other cases, the guest domain will
 * be running.
 *
 * If the VIR_DOMAIN_START_AUTODESTROY flag is set, the guest
 * domain will be automatically destroyed when the virConnectPtr
 * object is finally released. This will also happen if the
 * client application crashes / loses its connection to the
 * libvirtd daemon. Any domains marked for auto destroy will
 * block attempts at migration, save-to-file, or snapshots.
 *
 * If the VIR_DOMAIN_START_BYPASS_CACHE flag is set, and there is a
 * managed save file for this domain (created by virDomainManagedSave()),
 * then libvirt will attempt to bypass the file system cache while restoring
 * the file, or fail if it cannot do so for the given system; this can allow
 * less pressure on file system cache, but also risks slowing loads from NFS.
 *
 * If the VIR_DOMAIN_START_FORCE_BOOT flag is set, then any managed save
 * file for this domain is discarded, and the domain boots from scratch.
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
virDomainCreateWithFiles(virDomainPtr domain, unsigned int nfiles,
                         int *files, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "nfiles=%u, files=%p, flags=%x",
                     nfiles, files, flags);

    virResetLastError();

8984
    virCheckDomainReturn(domain, -1);
8985
    conn = domain->conn;
8986

8987
    virCheckReadOnlyGoto(conn->flags, error);
8988 8989 8990 8991 8992 8993 8994 8995 8996 8997 8998

    if (conn->driver->domainCreateWithFiles) {
        int ret;
        ret = conn->driver->domainCreateWithFiles(domain,
                                                  nfiles, files,
                                                  flags);
        if (ret < 0)
            goto error;
        return ret;
    }

8999
    virReportUnsupportedError();
9000 9001 9002 9003 9004 9005

error:
    virDispatchError(domain->conn);
    return -1;
}

9006

9007 9008 9009
/**
 * virDomainGetAutostart:
 * @domain: a domain object
9010
 * @autostart: the value returned
9011
 *
9012
 * Provides a boolean value indicating whether the domain
9013 9014 9015 9016 9017 9018 9019
 * configured to be automatically started when the host
 * machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virDomainGetAutostart(virDomainPtr domain,
9020 9021 9022
                      int *autostart)
{
    virConnectPtr conn;
9023 9024

    VIR_DOMAIN_DEBUG(domain, "autostart=%p", autostart);
9025

9026 9027
    virResetLastError();

9028
    virCheckDomainReturn(domain, -1);
9029
    virCheckNonNullArgGoto(autostart, error);
9030

9031 9032
    conn = domain->conn;

9033 9034
    if (conn->driver->domainGetAutostart) {
        int ret;
9035
        ret = conn->driver->domainGetAutostart(domain, autostart);
9036 9037 9038 9039
        if (ret < 0)
            goto error;
        return ret;
    }
9040

9041
    virReportUnsupportedError();
9042 9043

error:
9044
    virDispatchError(domain->conn);
9045
    return -1;
9046 9047
}

9048

9049 9050 9051
/**
 * virDomainSetAutostart:
 * @domain: a domain object
9052
 * @autostart: whether the domain should be automatically started 0 or 1
9053 9054 9055 9056 9057 9058 9059 9060
 *
 * Configure the domain to be automatically started
 * when the host machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virDomainSetAutostart(virDomainPtr domain,
9061 9062 9063
                      int autostart)
{
    virConnectPtr conn;
9064 9065

    VIR_DOMAIN_DEBUG(domain, "autostart=%d", autostart);
9066

9067 9068
    virResetLastError();

9069
    virCheckDomainReturn(domain, -1);
9070 9071
    conn = domain->conn;

9072
    virCheckReadOnlyGoto(conn->flags, error);
9073

9074 9075
    if (conn->driver->domainSetAutostart) {
        int ret;
9076
        ret = conn->driver->domainSetAutostart(domain, autostart);
9077 9078 9079 9080
        if (ret < 0)
            goto error;
        return ret;
    }
9081

9082
    virReportUnsupportedError();
9083 9084

error:
9085
    virDispatchError(domain->conn);
9086
    return -1;
9087 9088
}

9089

9090 9091 9092
/**
 * virDomainInjectNMI:
 * @domain: pointer to domain object, or NULL for Domain0
9093
 * @flags: extra flags; not used yet, so callers should always pass 0
9094 9095 9096 9097 9098
 *
 * Send NMI to the guest
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
9099 9100
int
virDomainInjectNMI(virDomainPtr domain, unsigned int flags)
9101 9102
{
    virConnectPtr conn;
9103
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
9104 9105 9106

    virResetLastError();

9107
    virCheckDomainReturn(domain, -1);
9108 9109
    conn = domain->conn;

9110 9111
    virCheckReadOnlyGoto(conn->flags, error);

9112 9113 9114 9115 9116 9117 9118 9119
    if (conn->driver->domainInjectNMI) {
        int ret;
        ret = conn->driver->domainInjectNMI(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9120
    virReportUnsupportedError();
9121 9122 9123 9124 9125 9126

error:
    virDispatchError(domain->conn);
    return -1;
}

9127

9128 9129 9130 9131 9132 9133 9134
/**
 * virDomainSendKey:
 * @domain:    pointer to domain object, or NULL for Domain0
 * @codeset:   the code set of keycodes, from virKeycodeSet
 * @holdtime:  the duration (in milliseconds) that the keys will be held
 * @keycodes:  array of keycodes
 * @nkeycodes: number of keycodes, up to VIR_DOMAIN_SEND_KEY_MAX_KEYS
9135
 * @flags: extra flags; not used yet, so callers should always pass 0
9136 9137 9138 9139 9140
 *
 * Send key(s) to the guest.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
9141 9142 9143 9144 9145 9146 9147
int
virDomainSendKey(virDomainPtr domain,
                 unsigned int codeset,
                 unsigned int holdtime,
                 unsigned int *keycodes,
                 int nkeycodes,
                 unsigned int flags)
9148 9149
{
    virConnectPtr conn;
9150
    VIR_DOMAIN_DEBUG(domain, "codeset=%u, holdtime=%u, nkeycodes=%u, flags=%x",
9151 9152 9153 9154
                     codeset, holdtime, nkeycodes, flags);

    virResetLastError();

9155
    virCheckDomainReturn(domain, -1);
9156 9157 9158
    conn = domain->conn;

    virCheckReadOnlyGoto(conn->flags, error);
9159 9160 9161 9162 9163 9164 9165 9166 9167 9168
    virCheckNonNullArgGoto(keycodes, error);
    virCheckPositiveArgGoto(nkeycodes, error);

    if (nkeycodes > VIR_DOMAIN_SEND_KEY_MAX_KEYS) {
        virReportInvalidArg(nkeycodes,
                            _("nkeycodes in %s must be <= %d"),
                            __FUNCTION__, VIR_DOMAIN_SEND_KEY_MAX_KEYS);
        goto error;
    }

9169 9170 9171 9172 9173 9174 9175 9176 9177
    if (conn->driver->domainSendKey) {
        int ret;
        ret = conn->driver->domainSendKey(domain, codeset, holdtime,
                                          keycodes, nkeycodes, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9178
    virReportUnsupportedError();
9179 9180 9181 9182 9183 9184

error:
    virDispatchError(domain->conn);
    return -1;
}

9185 9186 9187 9188 9189 9190 9191 9192 9193 9194 9195 9196 9197 9198 9199 9200 9201 9202 9203 9204 9205 9206 9207 9208 9209 9210 9211 9212 9213 9214 9215 9216 9217 9218

/**
 * virDomainSendProcessSignal:
 * @domain: pointer to domain object
 * @pid_value: a positive integer process ID, or negative integer process group ID
 * @signum: a signal from the virDomainProcessSignal enum
 * @flags: one of the virDomainProcessSignalFlag values
 *
 * Send a signal to the designated process in the guest
 *
 * The signal numbers must be taken from the virDomainProcessSignal
 * enum. These will be translated to the corresponding signal
 * number for the guest OS, by the guest agent delivering the
 * signal. If there is no mapping from virDomainProcessSignal to
 * the native OS signals, this API will report an error.
 *
 * If @pid_value is an integer greater than zero, it is
 * treated as a process ID. If @pid_value is an integer
 * less than zero, it is treated as a process group ID.
 * All the @pid_value numbers are from the container/guest
 * namespace. The value zero is not valid.
 *
 * Not all hypervisors will support sending signals to
 * arbitrary processes or process groups. If this API is
 * implemented the minimum requirement is to be able to
 * use @pid_value==1 (i.e. kill init). No other value is
 * required to be supported.
 *
 * If the @signum is VIR_DOMAIN_PROCESS_SIGNAL_NOP then this
 * API will simply report whether the process is running in
 * the container/guest.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
9219 9220 9221 9222 9223
int
virDomainSendProcessSignal(virDomainPtr domain,
                           long long pid_value,
                           unsigned int signum,
                           unsigned int flags)
9224 9225 9226 9227 9228 9229 9230
{
    virConnectPtr conn;
    VIR_DOMAIN_DEBUG(domain, "pid=%lld, signum=%u flags=%x",
                     pid_value, signum, flags);

    virResetLastError();

9231 9232
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9233 9234

    virCheckNonZeroArgGoto(pid_value, error);
9235
    virCheckReadOnlyGoto(conn->flags, error);
9236 9237 9238 9239 9240 9241 9242 9243 9244 9245 9246 9247

    if (conn->driver->domainSendProcessSignal) {
        int ret;
        ret = conn->driver->domainSendProcessSignal(domain,
                                                    pid_value,
                                                    signum,
                                                    flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9248
    virReportUnsupportedError();
9249 9250 9251 9252 9253 9254 9255

error:
    virDispatchError(domain->conn);
    return -1;
}


9256 9257 9258 9259 9260 9261 9262 9263
/**
 * virDomainSetVcpus:
 * @domain: pointer to domain object, or NULL for Domain0
 * @nvcpus: the new number of virtual CPUs for this domain
 *
 * Dynamically change the number of virtual CPUs used by the domain.
 * Note that this call may fail if the underlying virtualization hypervisor
 * does not support it or if growing the number is arbitrary limited.
9264
 * This function may require privileged access to the hypervisor.
9265
 *
9266
 * This command only changes the runtime configuration of the domain,
E
Eric Blake 已提交
9267 9268 9269
 * so can only be called on an active domain.  It is hypervisor-dependent
 * whether it also affects persistent configuration; for more control,
 * use virDomainSetVcpusFlags().
9270
 *
9271 9272 9273 9274 9275
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetVcpus(virDomainPtr domain, unsigned int nvcpus)
{
9276
    virConnectPtr conn;
9277 9278

    VIR_DOMAIN_DEBUG(domain, "nvcpus=%u", nvcpus);
9279

9280 9281
    virResetLastError();

9282 9283
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9284

9285
    virCheckReadOnlyGoto(conn->flags, error);
9286 9287
    virCheckNonZeroArgGoto(nvcpus, error);

9288 9289
    if (conn->driver->domainSetVcpus) {
        int ret;
9290
        ret = conn->driver->domainSetVcpus(domain, nvcpus);
9291 9292 9293 9294
        if (ret < 0)
            goto error;
        return ret;
    }
9295

9296
    virReportUnsupportedError();
9297 9298

error:
9299
    virDispatchError(domain->conn);
9300
    return -1;
9301 9302
}

9303

E
Eric Blake 已提交
9304 9305 9306 9307
/**
 * virDomainSetVcpusFlags:
 * @domain: pointer to domain object, or NULL for Domain0
 * @nvcpus: the new number of virtual CPUs for this domain, must be at least 1
9308
 * @flags: bitwise-OR of virDomainVcpuFlags
E
Eric Blake 已提交
9309 9310 9311 9312
 *
 * Dynamically change the number of virtual CPUs used by the domain.
 * Note that this call may fail if the underlying virtualization hypervisor
 * does not support it or if growing the number is arbitrary limited.
9313
 * This function may require privileged access to the hypervisor.
E
Eric Blake 已提交
9314
 *
9315
 * @flags may include VIR_DOMAIN_AFFECT_LIVE to affect a running
E
Eric Blake 已提交
9316
 * domain (which may fail if domain is not active), or
9317
 * VIR_DOMAIN_AFFECT_CONFIG to affect the next boot via the XML
E
Eric Blake 已提交
9318
 * description of the domain.  Both flags may be set.
9319 9320 9321 9322
 * If neither flag is specified (that is, @flags is VIR_DOMAIN_AFFECT_CURRENT),
 * then an inactive domain modifies persistent setup, while an active domain
 * is hypervisor-dependent on whether just live or both live and persistent
 * state is changed.
E
Eric Blake 已提交
9323 9324
 *
 * If @flags includes VIR_DOMAIN_VCPU_MAXIMUM, then
9325
 * VIR_DOMAIN_AFFECT_LIVE must be clear, and only the maximum virtual
E
Eric Blake 已提交
9326 9327 9328 9329
 * CPU limit is altered; generally, this value must be less than or
 * equal to virConnectGetMaxVcpus().  Otherwise, this call affects the
 * current virtual CPU limit, which must be less than or equal to the
 * maximum limit.
9330
 *
9331 9332 9333 9334
 * If @flags includes VIR_DOMAIN_VCPU_GUEST, then the state of processors is
 * modified inside the guest instead of the hypervisor. This flag can only
 * be used with live guests and is incompatible with VIR_DOMAIN_VCPU_MAXIMUM.
 * The usage of this flag may require a guest agent configured.
9335
 *
9336
 * Not all hypervisors can support all flag combinations.
E
Eric Blake 已提交
9337 9338 9339 9340 9341 9342 9343 9344
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainSetVcpusFlags(virDomainPtr domain, unsigned int nvcpus,
                       unsigned int flags)
{
    virConnectPtr conn;
9345

9346
    VIR_DOMAIN_DEBUG(domain, "nvcpus=%u, flags=%x", nvcpus, flags);
E
Eric Blake 已提交
9347 9348 9349

    virResetLastError();

9350
    virCheckDomainReturn(domain, -1);
9351
    virCheckReadOnlyGoto(domain->conn->flags, error);
E
Eric Blake 已提交
9352

9353
    if (flags & VIR_DOMAIN_VCPU_GUEST &&
9354 9355 9356
        flags & VIR_DOMAIN_VCPU_MAXIMUM) {
        virReportInvalidArg(flags,
                            _("flags 'VIR_DOMAIN_VCPU_MAXIMUM' and "
9357
                              "'VIR_DOMAIN_VCPU_GUEST' in '%s' are mutually "
9358 9359 9360 9361
                              "exclusive"), __FUNCTION__);
        goto error;
    }

9362 9363
    virCheckNonZeroArgGoto(nvcpus, error);

E
Eric Blake 已提交
9364
    if ((unsigned short) nvcpus != nvcpus) {
9365
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u"), nvcpus);
E
Eric Blake 已提交
9366 9367
        goto error;
    }
E
Eric Blake 已提交
9368 9369 9370 9371
    conn = domain->conn;

    if (conn->driver->domainSetVcpusFlags) {
        int ret;
9372
        ret = conn->driver->domainSetVcpusFlags(domain, nvcpus, flags);
E
Eric Blake 已提交
9373 9374 9375 9376 9377
        if (ret < 0)
            goto error;
        return ret;
    }

9378
    virReportUnsupportedError();
E
Eric Blake 已提交
9379 9380 9381 9382 9383 9384

error:
    virDispatchError(domain->conn);
    return -1;
}

9385

E
Eric Blake 已提交
9386 9387 9388
/**
 * virDomainGetVcpusFlags:
 * @domain: pointer to domain object, or NULL for Domain0
9389
 * @flags: bitwise-OR of virDomainVcpuFlags
E
Eric Blake 已提交
9390 9391 9392
 *
 * Query the number of virtual CPUs used by the domain.  Note that
 * this call may fail if the underlying virtualization hypervisor does
9393
 * not support it.  This function may require privileged access to the
E
Eric Blake 已提交
9394 9395
 * hypervisor.
 *
9396 9397 9398 9399 9400 9401 9402
 * If @flags includes VIR_DOMAIN_AFFECT_LIVE, this will query a
 * running domain (which will fail if domain is not active); if
 * it includes VIR_DOMAIN_AFFECT_CONFIG, this will query the XML
 * description of the domain.  It is an error to set both flags.
 * If neither flag is set (that is, VIR_DOMAIN_AFFECT_CURRENT),
 * then the configuration queried depends on whether the domain
 * is currently running.
E
Eric Blake 已提交
9403 9404 9405
 *
 * If @flags includes VIR_DOMAIN_VCPU_MAXIMUM, then the maximum
 * virtual CPU limit is queried.  Otherwise, this call queries the
9406 9407
 * current virtual CPU count.
 *
9408
 * If @flags includes VIR_DOMAIN_VCPU_GUEST, then the state of the processors
9409
 * is queried in the guest instead of the hypervisor. This flag is only usable
9410
 * on live domains. Guest agent may be needed for this flag to be available.
E
Eric Blake 已提交
9411
 *
9412
 * Returns the number of vCPUs in case of success, -1 in case of failure.
E
Eric Blake 已提交
9413 9414 9415 9416 9417
 */
int
virDomainGetVcpusFlags(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;
9418

9419
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
E
Eric Blake 已提交
9420 9421 9422

    virResetLastError();

9423
    virCheckDomainReturn(domain, -1);
9424 9425 9426 9427
    conn = domain->conn;

    if (flags & VIR_DOMAIN_VCPU_GUEST)
        virCheckReadOnlyGoto(conn->flags, error);
E
Eric Blake 已提交
9428

9429
    /* At most one of these two flags should be set.  */
9430 9431
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
9432
        virReportInvalidArg(flags,
9433 9434
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
9435
                            __FUNCTION__);
E
Eric Blake 已提交
9436 9437 9438 9439 9440
        goto error;
    }

    if (conn->driver->domainGetVcpusFlags) {
        int ret;
9441
        ret = conn->driver->domainGetVcpusFlags(domain, flags);
E
Eric Blake 已提交
9442 9443 9444 9445 9446
        if (ret < 0)
            goto error;
        return ret;
    }

9447
    virReportUnsupportedError();
E
Eric Blake 已提交
9448 9449 9450 9451 9452 9453

error:
    virDispatchError(domain->conn);
    return -1;
}

9454

9455 9456 9457 9458 9459
/**
 * virDomainPinVcpu:
 * @domain: pointer to domain object, or NULL for Domain0
 * @vcpu: virtual CPU number
 * @cpumap: pointer to a bit map of real CPUs (in 8-bit bytes) (IN)
E
Eric Blake 已提交
9460 9461 9462
 *      Each bit set to 1 means that corresponding CPU is usable.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
9463
 * @maplen: number of bytes in cpumap, from 1 up to size of CPU map in
O
Osier Yang 已提交
9464 9465 9466
 *      underlying virtualization system (Xen...).
 *      If maplen < size, missing bytes are set to zero.
 *      If maplen > size, failure code is returned.
9467
 *
9468
 * Dynamically change the real CPUs which can be allocated to a virtual CPU.
9469
 * This function may require privileged access to the hypervisor.
9470
 *
9471 9472 9473
 * This command only changes the runtime configuration of the domain,
 * so can only be called on an active domain.
 *
9474 9475 9476 9477 9478 9479
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainPinVcpu(virDomainPtr domain, unsigned int vcpu,
                 unsigned char *cpumap, int maplen)
{
9480
    virConnectPtr conn;
9481 9482 9483

    VIR_DOMAIN_DEBUG(domain, "vcpu=%u, cpumap=%p, maplen=%d",
                     vcpu, cpumap, maplen);
9484

9485 9486
    virResetLastError();

9487 9488
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9489

9490
    virCheckReadOnlyGoto(conn->flags, error);
9491 9492 9493 9494
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);

    if ((unsigned short) vcpu != vcpu) {
9495
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u"), vcpu);
9496
        goto error;
9497
    }
9498

9499 9500
    if (conn->driver->domainPinVcpu) {
        int ret;
9501
        ret = conn->driver->domainPinVcpu(domain, vcpu, cpumap, maplen);
9502 9503 9504 9505
        if (ret < 0)
            goto error;
        return ret;
    }
9506

9507
    virReportUnsupportedError();
9508 9509

error:
9510
    virDispatchError(domain->conn);
9511
    return -1;
9512 9513
}

9514

9515 9516 9517 9518 9519 9520 9521 9522 9523 9524 9525 9526
/**
 * virDomainPinVcpuFlags:
 * @domain: pointer to domain object, or NULL for Domain0
 * @vcpu: virtual CPU number
 * @cpumap: pointer to a bit map of real CPUs (in 8-bit bytes) (IN)
 *      Each bit set to 1 means that corresponding CPU is usable.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
 * @maplen: number of bytes in cpumap, from 1 up to size of CPU map in
 *      underlying virtualization system (Xen...).
 *      If maplen < size, missing bytes are set to zero.
 *      If maplen > size, failure code is returned.
9527
 * @flags: bitwise-OR of virDomainModificationImpact
9528 9529
 *
 * Dynamically change the real CPUs which can be allocated to a virtual CPU.
9530
 * This function may require privileged access to the hypervisor.
9531 9532 9533 9534 9535 9536 9537 9538 9539 9540 9541 9542
 *
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set.
 * If VIR_DOMAIN_AFFECT_LIVE is set, the change affects a running domain
 * and may fail if domain is not alive.
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
 * and will fail for transient domains. If neither flag is specified (that is,
 * @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain modifies
 * persistent setup, while an active domain is hypervisor-dependent on whether
 * just live or both live and persistent state is changed.
 * Not all hypervisors can support all flag combinations.
 *
E
Eric Blake 已提交
9543
 * See also virDomainGetVcpuPinInfo for querying this information.
9544
 *
9545 9546 9547 9548 9549 9550 9551 9552 9553
 * Returns 0 in case of success, -1 in case of failure.
 *
 */
int
virDomainPinVcpuFlags(virDomainPtr domain, unsigned int vcpu,
                      unsigned char *cpumap, int maplen, unsigned int flags)
{
    virConnectPtr conn;

9554
    VIR_DOMAIN_DEBUG(domain, "vcpu=%u, cpumap=%p, maplen=%d, flags=%x",
9555 9556
                     vcpu, cpumap, maplen, flags);

9557 9558 9559 9560
    virResetLastError();

    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9561

9562
    virCheckReadOnlyGoto(conn->flags, error);
9563 9564 9565 9566
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);

    if ((unsigned short) vcpu != vcpu) {
9567
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u"), vcpu);
9568 9569 9570 9571 9572
        goto error;
    }

    if (conn->driver->domainPinVcpuFlags) {
        int ret;
9573
        ret = conn->driver->domainPinVcpuFlags(domain, vcpu, cpumap, maplen, flags);
9574 9575 9576 9577 9578
        if (ret < 0)
            goto error;
        return ret;
    }

9579
    virReportUnsupportedError();
9580 9581 9582 9583 9584 9585

error:
    virDispatchError(domain->conn);
    return -1;
}

9586

9587
/**
E
Eric Blake 已提交
9588
 * virDomainGetVcpuPinInfo:
9589 9590 9591 9592 9593 9594 9595 9596 9597 9598 9599 9600
 * @domain: pointer to domain object, or NULL for Domain0
 * @ncpumaps: the number of cpumap (listed first to match virDomainGetVcpus)
 * @cpumaps: pointer to a bit map of real CPUs for all vcpus of this
 *     domain (in 8-bit bytes) (OUT)
 *     It's assumed there is <ncpumaps> cpumap in cpumaps array.
 *     The memory allocated to cpumaps must be (ncpumaps * maplen) bytes
 *     (ie: calloc(ncpumaps, maplen)).
 *     One cpumap inside cpumaps has the format described in
 *     virDomainPinVcpu() API.
 *     Must not be NULL.
 * @maplen: the number of bytes in one cpumap, from 1 up to size of CPU map.
 *     Must be positive.
9601
 * @flags: bitwise-OR of virDomainModificationImpact
9602 9603 9604 9605 9606 9607 9608 9609 9610 9611
 *     Must not be VIR_DOMAIN_AFFECT_LIVE and
 *     VIR_DOMAIN_AFFECT_CONFIG concurrently.
 *
 * Query the CPU affinity setting of all virtual CPUs of domain, store it
 * in cpumaps.
 *
 * Returns the number of virtual CPUs in case of success,
 * -1 in case of failure.
 */
int
9612 9613
virDomainGetVcpuPinInfo(virDomainPtr domain, int ncpumaps,
                        unsigned char *cpumaps, int maplen, unsigned int flags)
9614 9615 9616
{
    virConnectPtr conn;

9617
    VIR_DOMAIN_DEBUG(domain, "ncpumaps=%d, cpumaps=%p, maplen=%d, flags=%x",
9618 9619 9620 9621
                     ncpumaps, cpumaps, maplen, flags);

    virResetLastError();

9622 9623
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9624

9625 9626 9627 9628
    virCheckNonNullArgGoto(cpumaps, error);
    virCheckPositiveArgGoto(ncpumaps, error);
    virCheckPositiveArgGoto(maplen, error);

E
Eric Blake 已提交
9629
    if (INT_MULTIPLY_OVERFLOW(ncpumaps, maplen)) {
9630 9631
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %d * %d"),
                       ncpumaps, maplen);
E
Eric Blake 已提交
9632 9633
        goto error;
    }
9634

9635 9636 9637
    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
9638
        virReportInvalidArg(flags,
9639 9640
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
9641
                            __FUNCTION__);
9642 9643
        goto error;
    }
9644

E
Eric Blake 已提交
9645
    if (conn->driver->domainGetVcpuPinInfo) {
9646
        int ret;
9647 9648
        ret = conn->driver->domainGetVcpuPinInfo(domain, ncpumaps,
                                                 cpumaps, maplen, flags);
9649 9650 9651 9652 9653
        if (ret < 0)
            goto error;
        return ret;
    }

9654
    virReportUnsupportedError();
9655 9656 9657 9658 9659 9660

error:
    virDispatchError(domain->conn);
    return -1;
}

9661

9662 9663 9664 9665 9666 9667 9668 9669 9670 9671 9672 9673 9674 9675 9676 9677 9678 9679 9680 9681 9682 9683 9684 9685 9686 9687 9688 9689 9690 9691 9692 9693 9694 9695 9696 9697 9698 9699 9700 9701 9702 9703 9704
/**
 * virDomainPinEmulator:
 * @domain: pointer to domain object, or NULL for Domain0
 * @cpumap: pointer to a bit map of real CPUs (in 8-bit bytes) (IN)
 *      Each bit set to 1 means that corresponding CPU is usable.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
 * @maplen: number of bytes in cpumap, from 1 up to size of CPU map in
 *      underlying virtualization system (Xen...).
 *      If maplen < size, missing bytes are set to zero.
 *      If maplen > size, failure code is returned.
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Dynamically change the real CPUs which can be allocated to all emulator
 * threads. This function may require privileged access to the hypervisor.
 *
 * @flags may include VIR_DOMAIN_AFFECT_LIVE or VIR_DOMAIN_AFFECT_CONFIG.
 * Both flags may be set.
 * If VIR_DOMAIN_AFFECT_LIVE is set, the change affects a running domain
 * and may fail if domain is not alive.
 * If VIR_DOMAIN_AFFECT_CONFIG is set, the change affects persistent state,
 * and will fail for transient domains. If neither flag is specified (that is,
 * @flags is VIR_DOMAIN_AFFECT_CURRENT), then an inactive domain modifies
 * persistent setup, while an active domain is hypervisor-dependent on whether
 * just live or both live and persistent state is changed.
 * Not all hypervisors can support all flag combinations.
 *
 * See also virDomainGetEmulatorPinInfo for querying this information.
 *
 * Returns 0 in case of success, -1 in case of failure.
 *
 */
int
virDomainPinEmulator(virDomainPtr domain, unsigned char *cpumap,
                     int maplen, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cpumap=%p, maplen=%d, flags=%x",
                     cpumap, maplen, flags);

    virResetLastError();

9705 9706
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9707

9708
    virCheckReadOnlyGoto(conn->flags, error);
9709

9710 9711
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);
9712 9713 9714

    if (conn->driver->domainPinEmulator) {
        int ret;
9715
        ret = conn->driver->domainPinEmulator(domain, cpumap, maplen, flags);
9716 9717 9718 9719 9720
        if (ret < 0)
            goto error;
        return ret;
    }

9721
    virReportUnsupportedError();
9722 9723 9724 9725 9726 9727

error:
    virDispatchError(domain->conn);
    return -1;
}

9728

9729 9730 9731 9732 9733 9734 9735 9736 9737 9738 9739 9740 9741 9742 9743 9744 9745 9746 9747 9748 9749 9750 9751 9752 9753 9754 9755 9756 9757 9758 9759
/**
 * virDomainGetEmulatorPinInfo:
 * @domain: pointer to domain object, or NULL for Domain0
 * @cpumap: pointer to a bit map of real CPUs for all emulator threads of
 *     this domain (in 8-bit bytes) (OUT)
 *     There is only one cpumap for all emulator threads.
 *     Must not be NULL.
 * @maplen: the number of bytes in one cpumap, from 1 up to size of CPU map.
 *     Must be positive.
 * @flags: bitwise-OR of virDomainModificationImpact
 *     Must not be VIR_DOMAIN_AFFECT_LIVE and
 *     VIR_DOMAIN_AFFECT_CONFIG concurrently.
 *
 * Query the CPU affinity setting of all emulator threads of domain, store
 * it in cpumap.
 *
 * Returns 1 in case of success,
 * 0 in case of no emulator threads are pined to pcpus,
 * -1 in case of failure.
 */
int
virDomainGetEmulatorPinInfo(virDomainPtr domain, unsigned char *cpumap,
                            int maplen, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cpumap=%p, maplen=%d, flags=%x",
                     cpumap, maplen, flags);

    virResetLastError();

9760
    virCheckDomainReturn(domain, -1);
9761

9762 9763
    virCheckNonNullArgGoto(cpumap, error);
    virCheckPositiveArgGoto(maplen, error);
9764 9765 9766 9767

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
9768 9769 9770 9771
        virReportInvalidArg(flags,
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
                            __FUNCTION__);
9772 9773 9774 9775 9776 9777 9778 9779 9780 9781 9782 9783 9784
        goto error;
    }
    conn = domain->conn;

    if (conn->driver->domainGetEmulatorPinInfo) {
        int ret;
        ret = conn->driver->domainGetEmulatorPinInfo(domain, cpumap,
                                                     maplen, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

9785
    virReportUnsupportedError();
9786 9787 9788 9789 9790 9791

error:
    virDispatchError(domain->conn);
    return -1;
}

9792

9793 9794 9795 9796 9797
/**
 * virDomainGetVcpus:
 * @domain: pointer to domain object, or NULL for Domain0
 * @info: pointer to an array of virVcpuInfo structures (OUT)
 * @maxinfo: number of structures in info array
D
Dan Kenigsberg 已提交
9798
 * @cpumaps: pointer to a bit map of real CPUs for all vcpus of this
9799
 *      domain (in 8-bit bytes) (OUT)
O
Osier Yang 已提交
9800 9801 9802 9803 9804
 *      If cpumaps is NULL, then no cpumap information is returned by the API.
 *      It's assumed there is <maxinfo> cpumap in cpumaps array.
 *      The memory allocated to cpumaps must be (maxinfo * maplen) bytes
 *      (ie: calloc(maxinfo, maplen)).
 *      One cpumap inside cpumaps has the format described in
9805 9806
 *      virDomainPinVcpu() API.
 * @maplen: number of bytes in one cpumap, from 1 up to size of CPU map in
O
Osier Yang 已提交
9807 9808
 *      underlying virtualization system (Xen...).
 *      Must be zero when cpumaps is NULL and positive when it is non-NULL.
9809
 *
9810
 * Extract information about virtual CPUs of domain, store it in info array
9811 9812 9813
 * and also in cpumaps if this pointer isn't NULL.  This call may fail
 * on an inactive domain.
 *
E
Eric Blake 已提交
9814
 * See also virDomainGetVcpuPinInfo for querying just cpumaps, including on
9815
 * an inactive domain.
9816 9817 9818 9819 9820
 *
 * Returns the number of info filled in case of success, -1 in case of failure.
 */
int
virDomainGetVcpus(virDomainPtr domain, virVcpuInfoPtr info, int maxinfo,
9821
                  unsigned char *cpumaps, int maplen)
9822
{
9823
    virConnectPtr conn;
9824 9825 9826

    VIR_DOMAIN_DEBUG(domain, "info=%p, maxinfo=%d, cpumaps=%p, maplen=%d",
                     info, maxinfo, cpumaps, maplen);
9827

9828 9829
    virResetLastError();

9830
    virCheckDomainReturn(domain, -1);
9831 9832
    virCheckNonNullArgGoto(info, error);
    virCheckPositiveArgGoto(maxinfo, error);
9833 9834 9835

    /* Ensure that domainGetVcpus (aka remoteDomainGetVcpus) does not
       try to memcpy anything into a NULL pointer.  */
9836 9837 9838 9839 9840
    if (cpumaps)
        virCheckPositiveArgGoto(maplen, error);
    else
        virCheckZeroArgGoto(maplen, error);

E
Eric Blake 已提交
9841
    if (cpumaps && INT_MULTIPLY_OVERFLOW(maxinfo, maplen)) {
9842 9843
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %d * %d"),
                       maxinfo, maplen);
E
Eric Blake 已提交
9844 9845
        goto error;
    }
9846

9847 9848
    conn = domain->conn;

9849 9850
    if (conn->driver->domainGetVcpus) {
        int ret;
9851 9852
        ret = conn->driver->domainGetVcpus(domain, info, maxinfo,
                                           cpumaps, maplen);
9853 9854 9855 9856
        if (ret < 0)
            goto error;
        return ret;
    }
9857

9858
    virReportUnsupportedError();
9859 9860

error:
9861
    virDispatchError(domain->conn);
9862
    return -1;
9863
}
9864

9865

9866 9867 9868
/**
 * virDomainGetMaxVcpus:
 * @domain: pointer to domain object
9869
 *
9870 9871
 * Provides the maximum number of virtual CPUs supported for
 * the guest VM. If the guest is inactive, this is basically
E
Eric Blake 已提交
9872
 * the same as virConnectGetMaxVcpus(). If the guest is running
9873
 * this will reflect the maximum number of virtual CPUs the
E
Eric Blake 已提交
9874
 * guest was booted with.  For more details, see virDomainGetVcpusFlags().
9875 9876 9877 9878
 *
 * Returns the maximum of virtual CPU or -1 in case of error.
 */
int
9879 9880
virDomainGetMaxVcpus(virDomainPtr domain)
{
9881
    virConnectPtr conn;
9882

9883
    VIR_DOMAIN_DEBUG(domain);
9884

9885 9886
    virResetLastError();

9887
    virCheckDomainReturn(domain, -1);
9888 9889
    conn = domain->conn;

9890 9891
    if (conn->driver->domainGetMaxVcpus) {
        int ret;
9892
        ret = conn->driver->domainGetMaxVcpus(domain);
9893 9894 9895 9896
        if (ret < 0)
            goto error;
        return ret;
    }
9897

9898
    virReportUnsupportedError();
9899 9900

error:
9901
    virDispatchError(domain->conn);
9902
    return -1;
9903 9904
}

9905

9906 9907 9908 9909 9910
/**
 * virDomainGetSecurityLabel:
 * @domain: a domain object
 * @seclabel: pointer to a virSecurityLabel structure
 *
9911 9912 9913
 * Extract security label of an active domain. The 'label' field
 * in the @seclabel argument will be initialized to the empty
 * string if the domain is not running under a security model.
9914
 *
9915
 * Returns 0 in case of success, -1 in case of failure
9916 9917 9918 9919 9920 9921
 */
int
virDomainGetSecurityLabel(virDomainPtr domain, virSecurityLabelPtr seclabel)
{
    virConnectPtr conn;

9922 9923
    VIR_DOMAIN_DEBUG(domain, "seclabel=%p", seclabel);

9924 9925
    virResetLastError();

9926 9927
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
9928

9929
    virCheckNonNullArgGoto(seclabel, error);
9930

9931 9932 9933 9934 9935 9936 9937 9938
    if (conn->driver->domainGetSecurityLabel) {
        int ret;
        ret = conn->driver->domainGetSecurityLabel(domain, seclabel);
        if (ret < 0)
            goto error;
        return ret;
    }

9939
    virReportUnsupportedError();
9940

9941
error:
9942
    virDispatchError(domain->conn);
9943
    return -1;
9944 9945
}

9946

M
Marcelo Cerri 已提交
9947 9948 9949 9950 9951 9952 9953 9954 9955 9956 9957 9958 9959 9960 9961 9962 9963 9964 9965 9966
/**
 * virDomainGetSecurityLabelList:
 * @domain: a domain object
 * @seclabels: will be auto-allocated and filled with domains' security labels.
 * Caller must free memory on return.
 *
 * Extract the security labels of an active domain. The 'label' field
 * in the @seclabels argument will be initialized to the empty
 * string if the domain is not running under a security model.
 *
 * Returns number of elemnets in @seclabels on success, -1 in case of failure.
 */
int
virDomainGetSecurityLabelList(virDomainPtr domain,
                              virSecurityLabelPtr* seclabels)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "seclabels=%p", seclabels);

9967 9968
    virResetLastError();

9969
    virCheckDomainReturn(domain, -1);
M
Marcelo Cerri 已提交
9970

9971
    virCheckNonNullArgGoto(seclabels, error);
M
Marcelo Cerri 已提交
9972 9973 9974 9975 9976 9977 9978 9979 9980 9981 9982

    conn = domain->conn;

    if (conn->driver->domainGetSecurityLabelList) {
        int ret;
        ret = conn->driver->domainGetSecurityLabelList(domain, seclabels);
        if (ret < 0)
            goto error;
        return ret;
    }

9983
    virReportUnsupportedError();
M
Marcelo Cerri 已提交
9984 9985 9986 9987 9988

error:
    virDispatchError(domain->conn);
    return -1;
}
9989 9990 9991 9992 9993 9994 9995 9996 9997 9998 9999 10000 10001 10002 10003 10004 10005 10006 10007 10008 10009 10010 10011 10012 10013 10014 10015 10016 10017 10018 10019 10020 10021 10022 10023 10024 10025 10026 10027 10028 10029 10030 10031 10032 10033
/**
 * virDomainSetMetadata:
 * @domain: a domain object
 * @type: type of description, from virDomainMetadataType
 * @metadata: new metadata text
 * @key: XML namespace key, or NULL
 * @uri: XML namespace URI, or NULL
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Sets the appropriate domain element given by @type to the
 * value of @description.  A @type of VIR_DOMAIN_METADATA_DESCRIPTION
 * is free-form text; VIR_DOMAIN_METADATA_TITLE is free-form, but no
 * newlines are permitted, and should be short (although the length is
 * not enforced). For these two options @key and @uri are irrelevant and
 * must be set to NULL.
 *
 * For type VIR_DOMAIN_METADATA_ELEMENT @metadata  must be well-formed
 * XML belonging to namespace defined by @uri with local name @key.
 *
 * Passing NULL for @metadata says to remove that element from the
 * domain XML (passing the empty string leaves the element present).
 *
 * The resulting metadata will be present in virDomainGetXMLDesc(),
 * as well as quick access through virDomainGetMetadata().
 *
 * @flags controls whether the live domain, persistent configuration,
 * or both will be modified.
 *
 * Returns 0 on success, -1 in case of failure.
 */
int
virDomainSetMetadata(virDomainPtr domain,
                     int type,
                     const char *metadata,
                     const char *key,
                     const char *uri,
                     unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain,
                     "type=%d, metadata='%s', key='%s', uri='%s', flags=%x",
                     type, NULLSTR(metadata), NULLSTR(key), NULLSTR(uri),
                     flags);

10034 10035
    virResetLastError();

10036
    virCheckDomainReturn(domain, -1);
10037 10038
    conn = domain->conn;

10039
    virCheckReadOnlyGoto(conn->flags, error);
10040 10041 10042 10043

    switch (type) {
    case VIR_DOMAIN_METADATA_TITLE:
        if (metadata && strchr(metadata, '\n')) {
10044
            virReportInvalidArg(metadata,
10045 10046
                                _("metadata title in %s can't contain "
                                  "newlines"),
10047 10048
                                __FUNCTION__);
            goto error;
10049 10050 10051
        }
        /* fallthrough */
    case VIR_DOMAIN_METADATA_DESCRIPTION:
10052 10053
        virCheckNullArgGoto(uri, error);
        virCheckNullArgGoto(key, error);
10054 10055
        break;
    case VIR_DOMAIN_METADATA_ELEMENT:
10056
        virCheckNonNullArgGoto(uri, error);
10057 10058
        if (metadata)
            virCheckNonNullArgGoto(key, error);
10059 10060 10061 10062 10063 10064 10065 10066 10067 10068 10069 10070 10071 10072 10073
        break;
    default:
        /* For future expansion */
        break;
    }

    if (conn->driver->domainSetMetadata) {
        int ret;
        ret = conn->driver->domainSetMetadata(domain, type, metadata, key, uri,
                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

10074
    virReportUnsupportedError();
10075 10076 10077 10078 10079 10080

error:
    virDispatchError(domain->conn);
    return -1;
}

10081

10082 10083 10084 10085 10086 10087 10088 10089 10090 10091 10092 10093 10094 10095 10096 10097 10098 10099 10100 10101 10102 10103 10104 10105 10106 10107 10108 10109 10110 10111 10112 10113 10114 10115
/**
 * virDomainGetMetadata:
 * @domain: a domain object
 * @type: type of description, from virDomainMetadataType
 * @uri: XML namespace identifier
 * @flags: bitwise-OR of virDomainModificationImpact
 *
 * Retrieves the appropriate domain element given by @type.
 * If VIR_DOMAIN_METADATA_ELEMENT is requested parameter @uri
 * must be set to the name of the namespace the requested elements
 * belong to, otherwise must be NULL.
 *
 * If an element of the domain XML is not present, the resulting
 * error will be VIR_ERR_NO_DOMAIN_METADATA.  This method forms
 * a shortcut for seeing information from virDomainSetMetadata()
 * without having to go through virDomainGetXMLDesc().
 *
 * @flags controls whether the live domain or persistent
 * configuration will be queried.
 *
 * Returns the metadata string on success (caller must free),
 * or NULL in case of failure.
 */
char *
virDomainGetMetadata(virDomainPtr domain,
                     int type,
                     const char *uri,
                     unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "type=%d, uri='%s', flags=%x",
                     type, NULLSTR(uri), flags);

10116 10117
    virResetLastError();

10118
    virCheckDomainReturn(domain, NULL);
10119 10120 10121

    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
10122
        virReportInvalidArg(flags,
10123 10124
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
10125
                            __FUNCTION__);
10126 10127 10128 10129 10130 10131
        goto error;
    }

    switch (type) {
    case VIR_DOMAIN_METADATA_TITLE:
    case VIR_DOMAIN_METADATA_DESCRIPTION:
10132
        virCheckNullArgGoto(uri, error);
10133 10134
        break;
    case VIR_DOMAIN_METADATA_ELEMENT:
10135
        virCheckNonNullArgGoto(uri, error);
10136 10137 10138 10139 10140 10141 10142 10143 10144 10145 10146 10147 10148 10149 10150
        break;
    default:
        /* For future expansion */
        break;
    }

    conn = domain->conn;

    if (conn->driver->domainGetMetadata) {
        char *ret;
        if (!(ret = conn->driver->domainGetMetadata(domain, type, uri, flags)))
            goto error;
        return ret;
    }

10151
    virReportUnsupportedError();
10152 10153 10154 10155 10156 10157

error:
    virDispatchError(domain->conn);
    return NULL;
}

10158

10159 10160 10161 10162 10163
/**
 * virNodeGetSecurityModel:
 * @conn: a connection object
 * @secmodel: pointer to a virSecurityModel structure
 *
10164 10165 10166
 * Extract the security model of a hypervisor. The 'model' field
 * in the @secmodel argument may be initialized to the empty
 * string if the driver has not activated a security model.
10167
 *
10168
 * Returns 0 in case of success, -1 in case of failure
10169 10170 10171 10172
 */
int
virNodeGetSecurityModel(virConnectPtr conn, virSecurityModelPtr secmodel)
{
10173
    VIR_DEBUG("conn=%p secmodel=%p", conn, secmodel);
10174

10175 10176
    virResetLastError();

10177
    virCheckConnectReturn(conn, -1);
10178
    virCheckNonNullArgGoto(secmodel, error);
10179 10180 10181 10182 10183 10184 10185

    if (conn->driver->nodeGetSecurityModel) {
        int ret;
        ret = conn->driver->nodeGetSecurityModel(conn, secmodel);
        if (ret < 0)
            goto error;
        return ret;
10186 10187
    }

10188
    virReportUnsupportedError();
10189

10190
error:
10191
    virDispatchError(conn);
10192
    return -1;
10193
}
10194

10195

10196 10197 10198 10199
/**
 * virDomainAttachDevice:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10200
 *
10201 10202
 * Create a virtual device attachment to backend.  This function,
 * having hotplug semantics, is only allowed on an active domain.
10203
 *
10204 10205 10206 10207
 * For compatibility, this method can also be used to change the media
 * in an existing CDROM/Floppy device, however, applications are
 * recommended to use the virDomainUpdateDeviceFlag method instead.
 *
10208 10209 10210
 * Returns 0 in case of success, -1 in case of failure.
 */
int
10211
virDomainAttachDevice(virDomainPtr domain, const char *xml)
10212 10213
{
    virConnectPtr conn;
10214 10215

    VIR_DOMAIN_DEBUG(domain, "xml=%s", xml);
10216

10217 10218
    virResetLastError();

10219 10220
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10221

10222
    virCheckNonNullArgGoto(xml, error);
10223
    virCheckReadOnlyGoto(conn->flags, error);
10224

10225
    if (conn->driver->domainAttachDevice) {
J
Jim Fehlig 已提交
10226
       int ret;
10227
       ret = conn->driver->domainAttachDevice(domain, xml);
J
Jim Fehlig 已提交
10228 10229 10230 10231 10232
       if (ret < 0)
          goto error;
       return ret;
    }

10233
    virReportUnsupportedError();
J
Jim Fehlig 已提交
10234 10235 10236 10237 10238 10239

error:
    virDispatchError(domain->conn);
    return -1;
}

10240

J
Jim Fehlig 已提交
10241 10242 10243 10244
/**
 * virDomainAttachDeviceFlags:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10245
 * @flags: bitwise-OR of virDomainDeviceModifyFlags
J
Jim Fehlig 已提交
10246 10247
 *
 * Attach a virtual device to a domain, using the flags parameter
10248
 * to control how the device is attached.  VIR_DOMAIN_AFFECT_CURRENT
J
Jim Fehlig 已提交
10249
 * specifies that the device allocation is made based on current domain
10250
 * state.  VIR_DOMAIN_AFFECT_LIVE specifies that the device shall be
J
Jim Fehlig 已提交
10251
 * allocated to the active domain instance only and is not added to the
10252
 * persisted domain configuration.  VIR_DOMAIN_AFFECT_CONFIG
J
Jim Fehlig 已提交
10253 10254 10255 10256 10257 10258
 * specifies that the device shall be allocated to the persisted domain
 * configuration only.  Note that the target hypervisor must return an
 * error if unable to satisfy flags.  E.g. the hypervisor driver will
 * return failure if LIVE is specified but it only supports modifying the
 * persisted device allocation.
 *
10259 10260 10261 10262
 * For compatibility, this method can also be used to change the media
 * in an existing CDROM/Floppy device, however, applications are
 * recommended to use the virDomainUpdateDeviceFlag method instead.
 *
J
Jim Fehlig 已提交
10263 10264 10265 10266 10267 10268 10269
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainAttachDeviceFlags(virDomainPtr domain,
                           const char *xml, unsigned int flags)
{
    virConnectPtr conn;
10270

10271
    VIR_DOMAIN_DEBUG(domain, "xml=%s, flags=%x", xml, flags);
J
Jim Fehlig 已提交
10272 10273 10274

    virResetLastError();

10275 10276
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10277

10278
    virCheckNonNullArgGoto(xml, error);
10279
    virCheckReadOnlyGoto(conn->flags, error);
J
Jim Fehlig 已提交
10280 10281

    if (conn->driver->domainAttachDeviceFlags) {
10282
        int ret;
J
Jim Fehlig 已提交
10283
        ret = conn->driver->domainAttachDeviceFlags(domain, xml, flags);
10284 10285 10286 10287
        if (ret < 0)
            goto error;
        return ret;
    }
10288

10289
    virReportUnsupportedError();
10290 10291

error:
10292
    virDispatchError(domain->conn);
10293
    return -1;
10294 10295
}

10296

10297 10298 10299 10300
/**
 * virDomainDetachDevice:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10301
 *
10302 10303
 * Destroy a virtual device attachment to backend.  This function,
 * having hot-unplug semantics, is only allowed on an active domain.
10304 10305 10306 10307
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
10308
virDomainDetachDevice(virDomainPtr domain, const char *xml)
10309 10310
{
    virConnectPtr conn;
10311 10312

    VIR_DOMAIN_DEBUG(domain, "xml=%s", xml);
10313

10314 10315
    virResetLastError();

10316 10317
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10318

10319
    virCheckNonNullArgGoto(xml, error);
10320
    virCheckReadOnlyGoto(conn->flags, error);
10321

10322 10323
    if (conn->driver->domainDetachDevice) {
        int ret;
10324
        ret = conn->driver->domainDetachDevice(domain, xml);
J
Jim Fehlig 已提交
10325 10326 10327 10328 10329
         if (ret < 0)
             goto error;
         return ret;
     }

10330
    virReportUnsupportedError();
J
Jim Fehlig 已提交
10331 10332 10333 10334 10335 10336

error:
    virDispatchError(domain->conn);
    return -1;
}

10337

J
Jim Fehlig 已提交
10338 10339 10340 10341
/**
 * virDomainDetachDeviceFlags:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10342
 * @flags: bitwise-OR of virDomainDeviceModifyFlags
J
Jim Fehlig 已提交
10343 10344
 *
 * Detach a virtual device from a domain, using the flags parameter
10345
 * to control how the device is detached.  VIR_DOMAIN_AFFECT_CURRENT
J
Jim Fehlig 已提交
10346
 * specifies that the device allocation is removed based on current domain
10347
 * state.  VIR_DOMAIN_AFFECT_LIVE specifies that the device shall be
J
Jim Fehlig 已提交
10348
 * deallocated from the active domain instance only and is not from the
10349
 * persisted domain configuration.  VIR_DOMAIN_AFFECT_CONFIG
J
Jim Fehlig 已提交
10350 10351 10352 10353 10354 10355
 * specifies that the device shall be deallocated from the persisted domain
 * configuration only.  Note that the target hypervisor must return an
 * error if unable to satisfy flags.  E.g. the hypervisor driver will
 * return failure if LIVE is specified but it only supports removing the
 * persisted device allocation.
 *
E
Eric Blake 已提交
10356 10357 10358 10359
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation on the device being detached; in that case,
 * use virDomainBlockJobAbort() to stop the block copy first.
 *
10360 10361 10362 10363 10364 10365 10366 10367 10368 10369 10370 10371 10372 10373 10374 10375
 * Beware that depending on the hypervisor and device type, detaching a device
 * from a running domain may be asynchronous. That is, calling
 * virDomainDetachDeviceFlags may just request device removal while the device
 * is actually removed later (in cooperation with a guest OS). Previously,
 * this fact was ignored and the device could have been removed from domain
 * configuration before it was actually removed by the hypervisor causing
 * various failures on subsequent operations. To check whether the device was
 * successfully removed, either recheck domain configuration using
 * virDomainGetXMLDesc() or add handler for VIR_DOMAIN_EVENT_ID_DEVICE_REMOVED
 * event. In case the device is already gone when virDomainDetachDeviceFlags
 * returns, the event is delivered before this API call ends. To help existing
 * clients work better in most cases, this API will try to transform an
 * asynchronous device removal that finishes shortly after the request into
 * a synchronous removal. In other words, this API may wait a bit for the
 * removal to complete in case it was not synchronous.
 *
J
Jim Fehlig 已提交
10376 10377 10378 10379 10380 10381 10382
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainDetachDeviceFlags(virDomainPtr domain,
                           const char *xml, unsigned int flags)
{
    virConnectPtr conn;
10383

10384
    VIR_DOMAIN_DEBUG(domain, "xml=%s, flags=%x", xml, flags);
J
Jim Fehlig 已提交
10385 10386 10387

    virResetLastError();

10388 10389
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10390

10391
    virCheckNonNullArgGoto(xml, error);
10392
    virCheckReadOnlyGoto(conn->flags, error);
J
Jim Fehlig 已提交
10393 10394 10395 10396

    if (conn->driver->domainDetachDeviceFlags) {
        int ret;
        ret = conn->driver->domainDetachDeviceFlags(domain, xml, flags);
10397 10398 10399 10400 10401
        if (ret < 0)
            goto error;
        return ret;
    }

10402
    virReportUnsupportedError();
10403 10404 10405 10406 10407 10408

error:
    virDispatchError(domain->conn);
    return -1;
}

10409

10410 10411 10412 10413
/**
 * virDomainUpdateDeviceFlags:
 * @domain: pointer to domain object
 * @xml: pointer to XML description of one device
10414
 * @flags: bitwise-OR of virDomainDeviceModifyFlags
10415 10416
 *
 * Change a virtual device on a domain, using the flags parameter
10417
 * to control how the device is changed.  VIR_DOMAIN_AFFECT_CURRENT
10418
 * specifies that the device change is made based on current domain
10419
 * state.  VIR_DOMAIN_AFFECT_LIVE specifies that the device shall be
10420
 * changed on the active domain instance only and is not added to the
10421
 * persisted domain configuration. VIR_DOMAIN_AFFECT_CONFIG
10422 10423 10424 10425 10426 10427 10428 10429 10430 10431 10432 10433 10434 10435 10436 10437 10438
 * specifies that the device shall be changed on the persisted domain
 * configuration only.  Note that the target hypervisor must return an
 * error if unable to satisfy flags.  E.g. the hypervisor driver will
 * return failure if LIVE is specified but it only supports modifying the
 * persisted device allocation.
 *
 * This method is used for actions such changing CDROM/Floppy device
 * media, altering the graphics configuration such as password,
 * reconfiguring the NIC device backend connectivity, etc.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virDomainUpdateDeviceFlags(virDomainPtr domain,
                           const char *xml, unsigned int flags)
{
    virConnectPtr conn;
10439

10440
    VIR_DOMAIN_DEBUG(domain, "xml=%s, flags=%x", xml, flags);
10441 10442 10443

    virResetLastError();

10444 10445
    virCheckDomainReturn(domain, -1);
    conn = domain->conn;
10446

10447
    virCheckNonNullArgGoto(xml, error);
10448
    virCheckReadOnlyGoto(conn->flags, error);
10449 10450 10451 10452

    if (conn->driver->domainUpdateDeviceFlags) {
        int ret;
        ret = conn->driver->domainUpdateDeviceFlags(domain, xml, flags);
10453 10454 10455 10456
        if (ret < 0)
            goto error;
        return ret;
    }
10457

10458
    virReportUnsupportedError();
10459 10460

error:
10461
    virDispatchError(domain->conn);
10462
    return -1;
10463
}
10464

10465

10466 10467 10468 10469 10470 10471 10472 10473 10474 10475
/**
 * virNodeGetCellsFreeMemory:
 * @conn: pointer to the hypervisor connection
 * @freeMems: pointer to the array of unsigned long long
 * @startCell: index of first cell to return freeMems info on.
 * @maxCells: Maximum number of cells for which freeMems information can
 *            be returned.
 *
 * This call returns the amount of free memory in one or more NUMA cells.
 * The @freeMems array must be allocated by the caller and will be filled
10476
 * with the amount of free memory in bytes for each cell requested,
10477 10478 10479 10480 10481 10482 10483 10484 10485 10486
 * starting with startCell (in freeMems[0]), up to either
 * (startCell + maxCells), or the number of additional cells in the node,
 * whichever is smaller.
 *
 * Returns the number of entries filled in freeMems, or -1 in case of error.
 */
int
virNodeGetCellsFreeMemory(virConnectPtr conn, unsigned long long *freeMems,
                          int startCell, int maxCells)
{
10487
    VIR_DEBUG("conn=%p, freeMems=%p, startCell=%d, maxCells=%d",
10488 10489
          conn, freeMems, startCell, maxCells);

10490 10491
    virResetLastError();

10492
    virCheckConnectReturn(conn, -1);
10493 10494 10495
    virCheckNonNullArgGoto(freeMems, error);
    virCheckPositiveArgGoto(maxCells, error);
    virCheckNonNegativeArgGoto(startCell, error);
10496

10497 10498
    if (conn->driver->nodeGetCellsFreeMemory) {
        int ret;
10499
        ret = conn->driver->nodeGetCellsFreeMemory(conn, freeMems, startCell, maxCells);
10500 10501 10502 10503
        if (ret < 0)
            goto error;
        return ret;
    }
10504

10505
    virReportUnsupportedError();
10506 10507

error:
10508
    virDispatchError(conn);
10509 10510 10511
    return -1;
}

10512

10513 10514 10515 10516
/**
 * virNetworkGetConnect:
 * @net: pointer to a network
 *
10517
 * Provides the connection pointer associated with a network.  The
10518 10519 10520
 * reference counter on the connection is not increased by this
 * call.
 *
10521 10522 10523 10524
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the network object together.
 *
10525 10526 10527
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
10528
virNetworkGetConnect(virNetworkPtr net)
10529
{
10530
    VIR_DEBUG("net=%p", net);
10531

10532 10533
    virResetLastError();

10534 10535
    virCheckNetworkReturn(net, NULL);

10536 10537 10538
    return net->conn;
}

10539

10540 10541 10542 10543 10544 10545 10546 10547 10548 10549 10550 10551 10552 10553 10554 10555 10556 10557 10558 10559 10560 10561 10562 10563 10564 10565 10566 10567 10568 10569 10570 10571 10572 10573 10574 10575 10576 10577 10578 10579 10580 10581 10582 10583 10584 10585 10586
/**
 * virConnectListAllNetworks:
 * @conn: Pointer to the hypervisor connection.
 * @nets: Pointer to a variable to store the array containing the network
 *        objects or NULL if the list is not required (just returns number
 *        of networks).
 * @flags: bitwise-OR of virConnectListAllNetworksFlags.
 *
 * Collect the list of networks, and allocate an array to store those
 * objects. This API solves the race inherent between virConnectListNetworks
 * and virConnectListDefinedNetworks.
 *
 * Normally, all networks are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted networks.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a network, and where all bits
 * within a group describe all possible networks.
 *
 * The first group of @flags is VIR_CONNECT_LIST_NETWORKS_ACTIVE (up) and
 * VIR_CONNECT_LIST_NETWORKS_INACTIVE (down) to filter the networks by state.
 *
 * The second group of @flags is VIR_CONNECT_LIST_NETWORKS_PERSISTENT (defined)
 * and VIR_CONNECT_LIST_NETWORKS_TRANSIENT (running but not defined), to filter
 * the networks by whether they have persistent config or not.
 *
 * The third group of @flags is VIR_CONNECT_LIST_NETWORKS_AUTOSTART
 * and VIR_CONNECT_LIST_NETWORKS_NO_AUTOSTART, to filter the networks by
 * whether they are marked as autostart or not.
 *
 * Returns the number of networks found or -1 and sets @nets to  NULL in case
 * of error.  On success, the array stored into @nets is guaranteed to have an
 * extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virNetworkFree() on each array element, then calling free() on @nets.
 */
int
virConnectListAllNetworks(virConnectPtr conn,
                          virNetworkPtr **nets,
                          unsigned int flags)
{
    VIR_DEBUG("conn=%p, nets=%p, flags=%x", conn, nets, flags);

    virResetLastError();

    if (nets)
        *nets = NULL;

10587
    virCheckConnectReturn(conn, -1);
10588 10589

    if (conn->networkDriver &&
10590
        conn->networkDriver->connectListAllNetworks) {
10591
        int ret;
10592
        ret = conn->networkDriver->connectListAllNetworks(conn, nets, flags);
10593 10594 10595 10596 10597
        if (ret < 0)
            goto error;
        return ret;
    }

10598
    virReportUnsupportedError();
10599 10600 10601 10602 10603 10604 10605

error:
    virDispatchError(conn);
    return -1;
}


10606 10607 10608 10609 10610 10611 10612 10613 10614 10615 10616
/**
 * virConnectNumOfNetworks:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of active networks.
 *
 * Returns the number of network found or -1 in case of error
 */
int
virConnectNumOfNetworks(virConnectPtr conn)
{
10617
    VIR_DEBUG("conn=%p", conn);
10618

10619 10620
    virResetLastError();

10621
    virCheckConnectReturn(conn, -1);
10622

10623
    if (conn->networkDriver && conn->networkDriver->connectNumOfNetworks) {
10624
        int ret;
10625
        ret = conn->networkDriver->connectNumOfNetworks(conn);
10626 10627 10628 10629
        if (ret < 0)
            goto error;
        return ret;
    }
10630

10631
    virReportUnsupportedError();
10632 10633

error:
10634
    virDispatchError(conn);
10635
    return -1;
10636 10637
}

10638

10639 10640 10641 10642 10643 10644 10645 10646
/**
 * virConnectListNetworks:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of active networks
 * @maxnames: size of @names
 *
 * Collect the list of active networks, and store their names in @names
 *
10647 10648 10649 10650 10651 10652
 * For more control over the results, see virConnectListAllNetworks().
 *
 * Returns the number of networks found or -1 in case of error.  Note that
 * this command is inherently racy; a network can be started between a call
 * to virConnectNumOfNetworks() and this call; you are only guaranteed that
 * all currently active networks were listed if the return is less than
J
John Ferlan 已提交
10653
 * @maxnames. The client must call free() on each returned name.
10654 10655
 */
int
10656
virConnectListNetworks(virConnectPtr conn, char **const names, int maxnames)
10657
{
10658
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
10659

10660 10661
    virResetLastError();

10662
    virCheckConnectReturn(conn, -1);
10663 10664
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
10665

10666
    if (conn->networkDriver && conn->networkDriver->connectListNetworks) {
10667
        int ret;
10668
        ret = conn->networkDriver->connectListNetworks(conn, names, maxnames);
10669 10670 10671 10672
        if (ret < 0)
            goto error;
        return ret;
    }
10673

10674
    virReportUnsupportedError();
10675 10676

error:
10677
    virDispatchError(conn);
10678
    return -1;
10679 10680
}

10681

10682 10683 10684 10685 10686 10687 10688 10689 10690 10691 10692
/**
 * virConnectNumOfDefinedNetworks:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of inactive networks.
 *
 * Returns the number of networks found or -1 in case of error
 */
int
virConnectNumOfDefinedNetworks(virConnectPtr conn)
{
10693
    VIR_DEBUG("conn=%p", conn);
10694

10695 10696
    virResetLastError();

10697
    virCheckConnectReturn(conn, -1);
10698

10699
    if (conn->networkDriver && conn->networkDriver->connectNumOfDefinedNetworks) {
10700
        int ret;
10701
        ret = conn->networkDriver->connectNumOfDefinedNetworks(conn);
10702 10703 10704 10705
        if (ret < 0)
            goto error;
        return ret;
    }
10706

10707
    virReportUnsupportedError();
10708 10709

error:
10710
    virDispatchError(conn);
10711
    return -1;
10712 10713
}

10714

10715 10716 10717 10718 10719 10720 10721 10722
/**
 * virConnectListDefinedNetworks:
 * @conn: pointer to the hypervisor connection
 * @names: pointer to an array to store the names
 * @maxnames: size of the array
 *
 * list the inactive networks, stores the pointers to the names in @names
 *
10723 10724 10725 10726 10727 10728 10729
 * For more control over the results, see virConnectListAllNetworks().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a network can be defined between
 * a call to virConnectNumOfDefinedNetworks() and this call; you are only
 * guaranteed that all currently defined networks were listed if the return
 * is less than @maxnames.  The client must call free() on each returned name.
10730 10731
 */
int
10732
virConnectListDefinedNetworks(virConnectPtr conn, char **const names,
10733 10734
                              int maxnames)
{
10735
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
10736

10737 10738
    virResetLastError();

10739
    virCheckConnectReturn(conn, -1);
10740 10741
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
10742

10743
    if (conn->networkDriver && conn->networkDriver->connectListDefinedNetworks) {
10744
        int ret;
10745
        ret = conn->networkDriver->connectListDefinedNetworks(conn, names, maxnames);
10746 10747 10748 10749
        if (ret < 0)
            goto error;
        return ret;
    }
10750

10751
    virReportUnsupportedError();
10752 10753

error:
10754
    virDispatchError(conn);
10755
    return -1;
10756 10757
}

10758

10759 10760 10761 10762 10763 10764 10765
/**
 * virNetworkLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the network
 *
 * Try to lookup a network on the given hypervisor based on its name.
 *
10766 10767
 * Returns a new network object or NULL in case of failure.  If the
 * network cannot be found, then VIR_ERR_NO_NETWORK error is raised.
10768 10769 10770 10771
 */
virNetworkPtr
virNetworkLookupByName(virConnectPtr conn, const char *name)
{
10772
    VIR_DEBUG("conn=%p, name=%s", conn, name);
10773

10774 10775
    virResetLastError();

10776
    virCheckConnectReturn(conn, NULL);
10777
    virCheckNonNullArgGoto(name, error);
10778

10779 10780
    if (conn->networkDriver && conn->networkDriver->networkLookupByName) {
        virNetworkPtr ret;
10781
        ret = conn->networkDriver->networkLookupByName(conn, name);
10782 10783 10784 10785
        if (!ret)
            goto error;
        return ret;
    }
10786

10787
    virReportUnsupportedError();
10788 10789

error:
10790
    virDispatchError(conn);
10791
    return NULL;
10792 10793
}

10794

10795 10796 10797 10798 10799 10800 10801
/**
 * virNetworkLookupByUUID:
 * @conn: pointer to the hypervisor connection
 * @uuid: the raw UUID for the network
 *
 * Try to lookup a network on the given hypervisor based on its UUID.
 *
10802 10803
 * Returns a new network object or NULL in case of failure.  If the
 * network cannot be found, then VIR_ERR_NO_NETWORK error is raised.
10804 10805 10806 10807
 */
virNetworkPtr
virNetworkLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
{
10808
    VIR_UUID_DEBUG(conn, uuid);
10809

10810 10811
    virResetLastError();

10812
    virCheckConnectReturn(conn, NULL);
10813
    virCheckNonNullArgGoto(uuid, error);
10814

10815 10816
    if (conn->networkDriver && conn->networkDriver->networkLookupByUUID){
        virNetworkPtr ret;
10817
        ret = conn->networkDriver->networkLookupByUUID(conn, uuid);
10818 10819 10820 10821
        if (!ret)
            goto error;
        return ret;
    }
10822

10823
    virReportUnsupportedError();
10824 10825

error:
10826
    virDispatchError(conn);
10827
    return NULL;
10828 10829
}

10830

10831 10832 10833 10834 10835 10836 10837
/**
 * virNetworkLookupByUUIDString:
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the network
 *
 * Try to lookup a network on the given hypervisor based on its UUID.
 *
10838 10839
 * Returns a new network object or NULL in case of failure.  If the
 * network cannot be found, then VIR_ERR_NO_NETWORK error is raised.
10840 10841 10842 10843 10844
 */
virNetworkPtr
virNetworkLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
    unsigned char uuid[VIR_UUID_BUFLEN];
10845
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
10846

10847 10848
    virResetLastError();

10849
    virCheckConnectReturn(conn, NULL);
10850
    virCheckNonNullArgGoto(uuidstr, error);
10851

10852
    if (virUUIDParse(uuidstr, uuid) < 0) {
10853 10854 10855
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
10856
        goto error;
10857 10858 10859
    }

    return virNetworkLookupByUUID(conn, &uuid[0]);
10860 10861

error:
10862
    virDispatchError(conn);
10863
    return NULL;
10864 10865
}

10866

10867 10868 10869 10870 10871 10872 10873 10874 10875 10876 10877 10878 10879
/**
 * virNetworkCreateXML:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: an XML description of the network
 *
 * Create and start a new virtual network, based on an XML description
 * similar to the one returned by virNetworkGetXMLDesc()
 *
 * Returns a new network object or NULL in case of failure
 */
virNetworkPtr
virNetworkCreateXML(virConnectPtr conn, const char *xmlDesc)
{
10880
    VIR_DEBUG("conn=%p, xmlDesc=%s", conn, xmlDesc);
10881

10882 10883
    virResetLastError();

10884
    virCheckConnectReturn(conn, NULL);
10885
    virCheckNonNullArgGoto(xmlDesc, error);
10886
    virCheckReadOnlyGoto(conn->flags, error);
10887

10888 10889
    if (conn->networkDriver && conn->networkDriver->networkCreateXML) {
        virNetworkPtr ret;
10890
        ret = conn->networkDriver->networkCreateXML(conn, xmlDesc);
10891 10892 10893 10894
        if (!ret)
            goto error;
        return ret;
    }
10895

10896
    virReportUnsupportedError();
10897 10898

error:
10899
    virDispatchError(conn);
10900
    return NULL;
10901 10902
}

10903

10904 10905 10906 10907 10908 10909 10910 10911 10912 10913
/**
 * virNetworkDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xml: the XML description for the network, preferably in UTF-8
 *
 * Define a network, but does not create it
 *
 * Returns NULL in case of error, a pointer to the network otherwise
 */
virNetworkPtr
10914 10915
virNetworkDefineXML(virConnectPtr conn, const char *xml)
{
10916
    VIR_DEBUG("conn=%p, xml=%s", conn, xml);
10917

10918 10919
    virResetLastError();

10920
    virCheckConnectReturn(conn, NULL);
10921
    virCheckReadOnlyGoto(conn->flags, error);
10922
    virCheckNonNullArgGoto(xml, error);
10923

10924 10925
    if (conn->networkDriver && conn->networkDriver->networkDefineXML) {
        virNetworkPtr ret;
10926
        ret = conn->networkDriver->networkDefineXML(conn, xml);
10927 10928 10929 10930
        if (!ret)
            goto error;
        return ret;
    }
10931

10932
    virReportUnsupportedError();
10933 10934

error:
10935
    virDispatchError(conn);
10936
    return NULL;
10937 10938
}

10939

10940 10941 10942 10943 10944 10945 10946 10947 10948
/**
 * virNetworkUndefine:
 * @network: pointer to a defined network
 *
 * Undefine a network but does not stop it if it is running
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
10949 10950
virNetworkUndefine(virNetworkPtr network)
{
10951
    virConnectPtr conn;
10952
    VIR_DEBUG("network=%p", network);
10953

10954 10955
    virResetLastError();

10956
    virCheckNetworkReturn(network, -1);
10957
    conn = network->conn;
10958

10959
    virCheckReadOnlyGoto(conn->flags, error);
10960

10961 10962
    if (conn->networkDriver && conn->networkDriver->networkUndefine) {
        int ret;
10963
        ret = conn->networkDriver->networkUndefine(network);
10964 10965 10966 10967
        if (ret < 0)
            goto error;
        return ret;
    }
10968

10969
    virReportUnsupportedError();
10970 10971 10972 10973 10974 10975

error:
    virDispatchError(network->conn);
    return -1;
}

10976

10977 10978 10979 10980 10981 10982 10983 10984 10985 10986 10987 10988 10989 10990 10991 10992 10993 10994 10995 10996 10997 10998 10999 11000 11001 11002 11003 11004 11005 11006 11007 11008 11009
/**
 * virNetworkUpdate:
 * @network: pointer to a defined network
 * @section: which section of the network to update
 *           (see virNetworkUpdateSection for descriptions)
 * @command: what action to perform (add/delete/modify)
 *           (see virNetworkUpdateCommand for descriptions)
 * @parentIndex: which parent element, if there are multiple parents
 *           of the same type (e.g. which <ip> element when modifying
 *           a <dhcp>/<host> element), or "-1" for "don't care" or
 *           "automatically find appropriate one".
 * @xml: the XML description for the network, preferably in UTF-8
 * @flags: bitwise OR of virNetworkUpdateFlags.
 *
 * Update the definition of an existing network, either its live
 * running state, its persistent configuration, or both.
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
virNetworkUpdate(virNetworkPtr network,
                 unsigned int command, /* virNetworkUpdateCommand */
                 unsigned int section, /* virNetworkUpdateSection */
                 int parentIndex,
                 const char *xml,
                 unsigned int flags)
{
    virConnectPtr conn;
    VIR_DEBUG("network=%p, section=%d, parentIndex=%d, xml=%s, flags=0x%x",
              network, section, parentIndex, xml, flags);

    virResetLastError();

11010
    virCheckNetworkReturn(network, -1);
11011 11012
    conn = network->conn;

11013
    virCheckReadOnlyGoto(conn->flags, error);
11014 11015 11016 11017 11018 11019 11020 11021 11022 11023 11024
    virCheckNonNullArgGoto(xml, error);

    if (conn->networkDriver && conn->networkDriver->networkUpdate) {
        int ret;
        ret = conn->networkDriver->networkUpdate(network, section, command,
                                                 parentIndex, xml, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

11025
    virReportUnsupportedError();
11026 11027

error:
11028
    virDispatchError(network->conn);
11029
    return -1;
11030 11031
}

11032

11033 11034 11035 11036 11037 11038 11039 11040 11041 11042
/**
 * virNetworkCreate:
 * @network: pointer to a defined network
 *
 * Create and start a defined network. If the call succeed the network
 * moves from the defined to the running networks pools.
 *
 * Returns 0 in case of success, -1 in case of error
 */
int
11043 11044
virNetworkCreate(virNetworkPtr network)
{
11045
    virConnectPtr conn;
11046
    VIR_DEBUG("network=%p", network);
11047

11048 11049
    virResetLastError();

11050
    virCheckNetworkReturn(network, -1);
11051
    conn = network->conn;
11052

11053
    virCheckReadOnlyGoto(conn->flags, error);
11054

11055 11056
    if (conn->networkDriver && conn->networkDriver->networkCreate) {
        int ret;
11057
        ret = conn->networkDriver->networkCreate(network);
11058 11059 11060 11061
        if (ret < 0)
            goto error;
        return ret;
    }
11062

11063
    virReportUnsupportedError();
11064 11065

error:
11066
    virDispatchError(network->conn);
11067
    return -1;
11068 11069
}

11070

11071 11072 11073 11074 11075
/**
 * virNetworkDestroy:
 * @network: a network object
 *
 * Destroy the network object. The running instance is shutdown if not down
11076 11077 11078
 * already and all resources used by it are given back to the hypervisor. This
 * does not free the associated virNetworkPtr object.
 * This function may require privileged access
11079 11080 11081 11082 11083 11084 11085
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNetworkDestroy(virNetworkPtr network)
{
    virConnectPtr conn;
11086
    VIR_DEBUG("network=%p", network);
11087

11088 11089
    virResetLastError();

11090
    virCheckNetworkReturn(network, -1);
11091
    conn = network->conn;
11092

11093
    virCheckReadOnlyGoto(conn->flags, error);
11094

11095 11096
    if (conn->networkDriver && conn->networkDriver->networkDestroy) {
        int ret;
11097
        ret = conn->networkDriver->networkDestroy(network);
11098 11099 11100 11101
        if (ret < 0)
            goto error;
        return ret;
    }
11102

11103
    virReportUnsupportedError();
11104 11105

error:
11106
    virDispatchError(network->conn);
11107
    return -1;
11108 11109
}

11110

11111 11112 11113 11114 11115 11116 11117 11118 11119 11120 11121 11122
/**
 * virNetworkFree:
 * @network: a network object
 *
 * Free the network object. The running instance is kept alive.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNetworkFree(virNetworkPtr network)
{
11123
    VIR_DEBUG("network=%p", network);
11124

11125 11126
    virResetLastError();

11127 11128
    virCheckNetworkReturn(network, -1);

11129
    virObjectUnref(network);
11130
    return 0;
11131 11132
}

11133

11134 11135
/**
 * virNetworkRef:
D
Daniel Veillard 已提交
11136
 * @network: the network to hold a reference on
11137 11138 11139 11140 11141 11142 11143 11144 11145 11146 11147
 *
 * Increment the reference count on the network. For each
 * additional call to this method, there shall be a corresponding
 * call to virNetworkFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a network would increment
 * the reference count.
D
Daniel Veillard 已提交
11148 11149
 *
 * Returns 0 in case of success, -1 in case of failure.
11150 11151 11152 11153
 */
int
virNetworkRef(virNetworkPtr network)
{
11154 11155 11156
    VIR_DEBUG("network=%p refs=%d", network,
              network ? network->object.u.s.refs : 0);

11157 11158
    virResetLastError();

11159 11160
    virCheckNetworkReturn(network, -1);

11161
    virObjectRef(network);
11162 11163 11164
    return 0;
}

11165

11166 11167 11168 11169 11170 11171 11172 11173 11174 11175 11176 11177
/**
 * virNetworkGetName:
 * @network: a network object
 *
 * Get the public name for that network
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the network object.
 */
const char *
virNetworkGetName(virNetworkPtr network)
{
11178
    VIR_DEBUG("network=%p", network);
11179

11180 11181
    virResetLastError();

11182 11183
    virCheckNetworkReturn(network, NULL);

11184
    return network->name;
11185 11186
}

11187

11188 11189 11190 11191 11192 11193 11194 11195 11196 11197 11198 11199
/**
 * virNetworkGetUUID:
 * @network: a network object
 * @uuid: pointer to a VIR_UUID_BUFLEN bytes array
 *
 * Get the UUID for a network
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkGetUUID(virNetworkPtr network, unsigned char *uuid)
{
11200
    VIR_DEBUG("network=%p, uuid=%p", network, uuid);
11201

11202 11203
    virResetLastError();

11204
    virCheckNetworkReturn(network, -1);
11205
    virCheckNonNullArgGoto(uuid, error);
11206 11207 11208

    memcpy(uuid, &network->uuid[0], VIR_UUID_BUFLEN);

11209
    return 0;
11210 11211

error:
11212
    virDispatchError(network->conn);
11213
    return -1;
11214 11215
}

11216

11217 11218 11219 11220 11221 11222 11223 11224 11225 11226 11227 11228 11229
/**
 * virNetworkGetUUIDString:
 * @network: a network object
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
 *
 * Get the UUID for a network as string. For more information about
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkGetUUIDString(virNetworkPtr network, char *buf)
{
11230
    VIR_DEBUG("network=%p, buf=%p", network, buf);
11231

11232 11233
    virResetLastError();

11234
    virCheckNetworkReturn(network, -1);
11235
    virCheckNonNullArgGoto(buf, error);
11236

E
Eric Blake 已提交
11237
    virUUIDFormat(network->uuid, buf);
11238
    return 0;
11239 11240

error:
11241
    virDispatchError(network->conn);
11242
    return -1;
11243 11244
}

11245

11246 11247 11248
/**
 * virNetworkGetXMLDesc:
 * @network: a network object
11249
 * @flags: bitwise-OR of virNetworkXMLFlags
11250 11251 11252 11253
 *
 * Provide an XML description of the network. The description may be reused
 * later to relaunch the network with virNetworkCreateXML().
 *
11254 11255 11256 11257 11258
 * Normally, if a network included a physical function, the output includes
 * all virtual functions tied to that physical interface.  If @flags includes
 * VIR_NETWORK_XML_INACTIVE, then the expansion of virtual interfaces is
 * not performed.
 *
11259 11260 11261 11262
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
11263
virNetworkGetXMLDesc(virNetworkPtr network, unsigned int flags)
11264
{
11265
    virConnectPtr conn;
11266
    VIR_DEBUG("network=%p, flags=%x", network, flags);
11267

11268 11269
    virResetLastError();

11270
    virCheckNetworkReturn(network, NULL);
11271 11272
    conn = network->conn;

11273
    if (conn->networkDriver && conn->networkDriver->networkGetXMLDesc) {
11274
        char *ret;
11275
        ret = conn->networkDriver->networkGetXMLDesc(network, flags);
11276 11277 11278 11279
        if (!ret)
            goto error;
        return ret;
    }
11280

11281
    virReportUnsupportedError();
11282 11283

error:
11284
    virDispatchError(network->conn);
11285
    return NULL;
11286
}
11287

11288

11289 11290 11291 11292
/**
 * virNetworkGetBridgeName:
 * @network: a network object
 *
11293
 * Provides a bridge interface name to which a domain may connect
11294 11295 11296 11297 11298 11299 11300 11301
 * a network interface in order to join the network.
 *
 * Returns a 0 terminated interface name, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
virNetworkGetBridgeName(virNetworkPtr network)
{
11302
    virConnectPtr conn;
11303
    VIR_DEBUG("network=%p", network);
11304

11305 11306
    virResetLastError();

11307
    virCheckNetworkReturn(network, NULL);
11308 11309
    conn = network->conn;

11310 11311
    if (conn->networkDriver && conn->networkDriver->networkGetBridgeName) {
        char *ret;
11312
        ret = conn->networkDriver->networkGetBridgeName(network);
11313 11314 11315 11316
        if (!ret)
            goto error;
        return ret;
    }
11317

11318
    virReportUnsupportedError();
11319 11320

error:
11321
    virDispatchError(network->conn);
11322
    return NULL;
11323
}
11324

11325

11326 11327 11328
/**
 * virNetworkGetAutostart:
 * @network: a network object
11329
 * @autostart: the value returned
11330
 *
11331
 * Provides a boolean value indicating whether the network
11332 11333 11334 11335 11336 11337 11338
 * configured to be automatically started when the host
 * machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkGetAutostart(virNetworkPtr network,
11339 11340 11341
                       int *autostart)
{
    virConnectPtr conn;
11342
    VIR_DEBUG("network=%p, autostart=%p", network, autostart);
11343

11344 11345
    virResetLastError();

11346
    virCheckNetworkReturn(network, -1);
11347
    virCheckNonNullArgGoto(autostart, error);
11348

11349 11350
    conn = network->conn;

11351 11352
    if (conn->networkDriver && conn->networkDriver->networkGetAutostart) {
        int ret;
11353
        ret = conn->networkDriver->networkGetAutostart(network, autostart);
11354 11355 11356 11357
        if (ret < 0)
            goto error;
        return ret;
    }
11358

11359
    virReportUnsupportedError();
11360 11361

error:
11362
    virDispatchError(network->conn);
11363
    return -1;
11364 11365
}

11366

11367 11368 11369
/**
 * virNetworkSetAutostart:
 * @network: a network object
11370
 * @autostart: whether the network should be automatically started 0 or 1
11371 11372 11373 11374 11375 11376 11377 11378
 *
 * Configure the network to be automatically started
 * when the host machine boots.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNetworkSetAutostart(virNetworkPtr network,
11379 11380 11381
                       int autostart)
{
    virConnectPtr conn;
11382
    VIR_DEBUG("network=%p, autostart=%d", network, autostart);
11383

11384 11385
    virResetLastError();

11386
    virCheckNetworkReturn(network, -1);
11387 11388
    conn = network->conn;

11389 11390
    virCheckReadOnlyGoto(conn->flags, error);

11391 11392
    if (conn->networkDriver && conn->networkDriver->networkSetAutostart) {
        int ret;
11393
        ret = conn->networkDriver->networkSetAutostart(network, autostart);
11394 11395 11396 11397
        if (ret < 0)
            goto error;
        return ret;
    }
11398

11399
    virReportUnsupportedError();
11400 11401

error:
11402
    virDispatchError(network->conn);
11403
    return -1;
11404
}
11405

11406

D
Daniel Veillard 已提交
11407 11408
/**
 * virInterfaceGetConnect:
L
Laine Stump 已提交
11409
 * @iface: pointer to an interface
D
Daniel Veillard 已提交
11410 11411 11412 11413 11414 11415 11416 11417 11418 11419 11420 11421
 *
 * Provides the connection pointer associated with an interface.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the interface object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
11422
virInterfaceGetConnect(virInterfacePtr iface)
D
Daniel Veillard 已提交
11423
{
11424
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11425 11426 11427

    virResetLastError();

11428 11429
    virCheckInterfaceReturn(iface, NULL);

11430
    return iface->conn;
D
Daniel Veillard 已提交
11431 11432
}

11433

11434 11435 11436 11437 11438 11439 11440 11441 11442 11443 11444 11445 11446 11447 11448 11449 11450 11451 11452 11453 11454 11455 11456 11457 11458 11459 11460 11461 11462 11463 11464 11465 11466 11467 11468 11469 11470 11471 11472
/**
 * virConnectListAllInterfaces:
 * @conn: Pointer to the hypervisor connection.
 * @ifaces: Pointer to a variable to store the array containing the interface
 *          objects or NULL if the list is not required (just returns number
 *          of interfaces).
 * @flags: bitwise-OR of virConnectListAllInterfacesFlags.
 *
 * Collect the list of interfaces, and allocate an array to store those
 * objects. This API solves the race inherent between virConnectListInterfaces
 * and virConnectListDefinedInterfaces.
 *
 * Normally, all interfaces are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted interfaces.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a interface, and where all bits
 * within a group describe all possible interfaces.
 *
 * The only group of @flags is VIR_CONNECT_LIST_INTERFACES_ACTIVE (up) and
 * VIR_CONNECT_LIST_INTERFACES_INACTIVE (down) to filter the interfaces by state.
 *
 * Returns the number of interfaces found or -1 and sets @ifaces to  NULL in case
 * of error.  On success, the array stored into @ifaces is guaranteed to have an
 * extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virStorageInterfaceFree() on each array element, then calling free() on @ifaces.
 */
int
virConnectListAllInterfaces(virConnectPtr conn,
                            virInterfacePtr **ifaces,
                            unsigned int flags)
{
    VIR_DEBUG("conn=%p, ifaces=%p, flags=%x", conn, ifaces, flags);

    virResetLastError();

    if (ifaces)
        *ifaces = NULL;

11473
    virCheckConnectReturn(conn, -1);
11474 11475

    if (conn->interfaceDriver &&
11476
        conn->interfaceDriver->connectListAllInterfaces) {
11477
        int ret;
11478
        ret = conn->interfaceDriver->connectListAllInterfaces(conn, ifaces, flags);
11479 11480 11481 11482 11483
        if (ret < 0)
            goto error;
        return ret;
    }

11484
    virReportUnsupportedError();
11485 11486 11487 11488 11489 11490

error:
    virDispatchError(conn);
    return -1;
}

11491

D
Daniel Veillard 已提交
11492 11493 11494 11495
/**
 * virConnectNumOfInterfaces:
 * @conn: pointer to the hypervisor connection
 *
11496
 * Provides the number of active interfaces on the physical host.
D
Daniel Veillard 已提交
11497
 *
11498
 * Returns the number of active interfaces found or -1 in case of error
D
Daniel Veillard 已提交
11499 11500 11501 11502
 */
int
virConnectNumOfInterfaces(virConnectPtr conn)
{
11503
    VIR_DEBUG("conn=%p", conn);
D
Daniel Veillard 已提交
11504 11505 11506

    virResetLastError();

11507
    virCheckConnectReturn(conn, -1);
D
Daniel Veillard 已提交
11508

11509
    if (conn->interfaceDriver && conn->interfaceDriver->connectNumOfInterfaces) {
D
Daniel Veillard 已提交
11510
        int ret;
11511
        ret = conn->interfaceDriver->connectNumOfInterfaces(conn);
D
Daniel Veillard 已提交
11512 11513 11514 11515 11516
        if (ret < 0)
            goto error;
        return ret;
    }

11517
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11518 11519

error:
11520
    virDispatchError(conn);
D
Daniel Veillard 已提交
11521 11522 11523
    return -1;
}

11524

D
Daniel Veillard 已提交
11525 11526 11527 11528 11529 11530
/**
 * virConnectListInterfaces:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of interfaces
 * @maxnames: size of @names
 *
11531 11532
 * Collect the list of active physical host interfaces,
 * and store their names in @names
D
Daniel Veillard 已提交
11533
 *
11534 11535 11536 11537 11538 11539
 * For more control over the results, see virConnectListAllInterfaces().
 *
 * Returns the number of interfaces found or -1 in case of error.  Note that
 * this command is inherently racy; a interface can be started between a call
 * to virConnectNumOfInterfaces() and this call; you are only guaranteed that
 * all currently active interfaces were listed if the return is less than
J
John Ferlan 已提交
11540
 * @maxnames. The client must call free() on each returned name.
D
Daniel Veillard 已提交
11541 11542 11543 11544
 */
int
virConnectListInterfaces(virConnectPtr conn, char **const names, int maxnames)
{
11545
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
D
Daniel Veillard 已提交
11546 11547 11548

    virResetLastError();

11549
    virCheckConnectReturn(conn, -1);
11550 11551
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
D
Daniel Veillard 已提交
11552

11553
    if (conn->interfaceDriver && conn->interfaceDriver->connectListInterfaces) {
D
Daniel Veillard 已提交
11554
        int ret;
11555
        ret = conn->interfaceDriver->connectListInterfaces(conn, names, maxnames);
D
Daniel Veillard 已提交
11556 11557 11558 11559 11560
        if (ret < 0)
            goto error;
        return ret;
    }

11561
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11562 11563

error:
11564
    virDispatchError(conn);
D
Daniel Veillard 已提交
11565 11566 11567
    return -1;
}

11568

11569 11570 11571 11572 11573 11574 11575 11576 11577 11578 11579
/**
 * virConnectNumOfDefinedInterfaces:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of defined (inactive) interfaces on the physical host.
 *
 * Returns the number of defined interface found or -1 in case of error
 */
int
virConnectNumOfDefinedInterfaces(virConnectPtr conn)
{
11580
    VIR_DEBUG("conn=%p", conn);
11581 11582 11583

    virResetLastError();

11584
    virCheckConnectReturn(conn, -1);
11585

11586
    if (conn->interfaceDriver && conn->interfaceDriver->connectNumOfDefinedInterfaces) {
11587
        int ret;
11588
        ret = conn->interfaceDriver->connectNumOfDefinedInterfaces(conn);
11589 11590 11591 11592 11593
        if (ret < 0)
            goto error;
        return ret;
    }

11594
    virReportUnsupportedError();
11595 11596

error:
11597
    virDispatchError(conn);
11598 11599 11600
    return -1;
}

11601

11602 11603 11604 11605 11606 11607 11608 11609 11610
/**
 * virConnectListDefinedInterfaces:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of interfaces
 * @maxnames: size of @names
 *
 * Collect the list of defined (inactive) physical host interfaces,
 * and store their names in @names.
 *
11611 11612 11613 11614 11615 11616 11617
 * For more control over the results, see virConnectListAllInterfaces().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a interface can be defined between
 * a call to virConnectNumOfDefinedInterfaces() and this call; you are only
 * guaranteed that all currently defined interfaces were listed if the return
 * is less than @maxnames.  The client must call free() on each returned name.
11618 11619 11620 11621 11622 11623
 */
int
virConnectListDefinedInterfaces(virConnectPtr conn,
                                char **const names,
                                int maxnames)
{
11624
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
11625 11626 11627

    virResetLastError();

11628
    virCheckConnectReturn(conn, -1);
11629 11630
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
11631

11632
    if (conn->interfaceDriver && conn->interfaceDriver->connectListDefinedInterfaces) {
11633
        int ret;
11634
        ret = conn->interfaceDriver->connectListDefinedInterfaces(conn, names, maxnames);
11635 11636 11637 11638 11639
        if (ret < 0)
            goto error;
        return ret;
    }

11640
    virReportUnsupportedError();
11641 11642

error:
11643
    virDispatchError(conn);
11644 11645 11646
    return -1;
}

11647

D
Daniel Veillard 已提交
11648 11649 11650 11651 11652 11653 11654 11655 11656 11657 11658 11659 11660
/**
 * virInterfaceLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the interface
 *
 * Try to lookup an interface on the given hypervisor based on its name.
 *
 * Returns a new interface object or NULL in case of failure.  If the
 * interface cannot be found, then VIR_ERR_NO_INTERFACE error is raised.
 */
virInterfacePtr
virInterfaceLookupByName(virConnectPtr conn, const char *name)
{
11661
    VIR_DEBUG("conn=%p, name=%s", conn, name);
D
Daniel Veillard 已提交
11662 11663 11664

    virResetLastError();

11665
    virCheckConnectReturn(conn, NULL);
11666
    virCheckNonNullArgGoto(name, error);
D
Daniel Veillard 已提交
11667 11668 11669

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceLookupByName) {
        virInterfacePtr ret;
11670
        ret = conn->interfaceDriver->interfaceLookupByName(conn, name);
D
Daniel Veillard 已提交
11671 11672 11673 11674 11675
        if (!ret)
            goto error;
        return ret;
    }

11676
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11677 11678

error:
11679
    virDispatchError(conn);
D
Daniel Veillard 已提交
11680 11681 11682
    return NULL;
}

11683

D
Daniel Veillard 已提交
11684 11685 11686 11687 11688 11689 11690 11691 11692 11693 11694 11695 11696
/**
 * virInterfaceLookupByMACString:
 * @conn: pointer to the hypervisor connection
 * @macstr: the MAC for the interface (null-terminated ASCII format)
 *
 * Try to lookup an interface on the given hypervisor based on its MAC.
 *
 * Returns a new interface object or NULL in case of failure.  If the
 * interface cannot be found, then VIR_ERR_NO_INTERFACE error is raised.
 */
virInterfacePtr
virInterfaceLookupByMACString(virConnectPtr conn, const char *macstr)
{
11697
    VIR_DEBUG("conn=%p, macstr=%s", conn, macstr);
D
Daniel Veillard 已提交
11698 11699 11700

    virResetLastError();

11701
    virCheckConnectReturn(conn, NULL);
11702
    virCheckNonNullArgGoto(macstr, error);
D
Daniel Veillard 已提交
11703 11704 11705

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceLookupByMACString) {
        virInterfacePtr ret;
11706
        ret = conn->interfaceDriver->interfaceLookupByMACString(conn, macstr);
D
Daniel Veillard 已提交
11707 11708 11709 11710 11711
        if (!ret)
            goto error;
        return ret;
    }

11712
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11713 11714

error:
11715
    virDispatchError(conn);
D
Daniel Veillard 已提交
11716 11717 11718
    return NULL;
}

11719

D
Daniel Veillard 已提交
11720 11721
/**
 * virInterfaceGetName:
L
Laine Stump 已提交
11722
 * @iface: an interface object
D
Daniel Veillard 已提交
11723 11724 11725 11726 11727 11728 11729
 *
 * Get the public name for that interface
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the interface object.
 */
const char *
11730
virInterfaceGetName(virInterfacePtr iface)
D
Daniel Veillard 已提交
11731
{
11732
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11733 11734 11735

    virResetLastError();

11736 11737
    virCheckInterfaceReturn(iface, NULL);

11738
    return iface->name;
D
Daniel Veillard 已提交
11739 11740
}

11741

D
Daniel Veillard 已提交
11742 11743
/**
 * virInterfaceGetMACString:
L
Laine Stump 已提交
11744
 * @iface: an interface object
D
Daniel Veillard 已提交
11745
 *
L
Laine Stump 已提交
11746
 * Get the MAC for an interface as string. For more information about
D
Daniel Veillard 已提交
11747 11748 11749 11750 11751 11752 11753
 * MAC see RFC4122.
 *
 * Returns a pointer to the MAC address (in null-terminated ASCII
 * format) or NULL, the string need not be deallocated its lifetime
 * will be the same as the interface object.
 */
const char *
11754
virInterfaceGetMACString(virInterfacePtr iface)
D
Daniel Veillard 已提交
11755
{
11756
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11757 11758 11759

    virResetLastError();

11760 11761
    virCheckInterfaceReturn(iface, NULL);

11762
    return iface->mac;
D
Daniel Veillard 已提交
11763 11764
}

11765

D
Daniel Veillard 已提交
11766 11767
/**
 * virInterfaceGetXMLDesc:
L
Laine Stump 已提交
11768
 * @iface: an interface object
11769
 * @flags: bitwise-OR of extraction flags. Current valid bits:
11770 11771 11772 11773
 *
 *      VIR_INTERFACE_XML_INACTIVE - return the static configuration,
 *                                   suitable for use redefining the
 *                                   interface via virInterfaceDefineXML()
D
Daniel Veillard 已提交
11774
 *
11775 11776 11777 11778 11779
 * Provide an XML description of the interface. If
 * VIR_INTERFACE_XML_INACTIVE is set, the description may be reused
 * later to redefine the interface with virInterfaceDefineXML(). If it
 * is not set, the ip address and netmask will be the current live
 * setting of the interface, not the settings from the config files.
D
Daniel Veillard 已提交
11780 11781 11782 11783 11784
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
11785
virInterfaceGetXMLDesc(virInterfacePtr iface, unsigned int flags)
D
Daniel Veillard 已提交
11786 11787
{
    virConnectPtr conn;
11788
    VIR_DEBUG("iface=%p, flags=%x", iface, flags);
D
Daniel Veillard 已提交
11789 11790 11791

    virResetLastError();

11792
    virCheckInterfaceReturn(iface, NULL);
11793
    conn = iface->conn;
D
Daniel Veillard 已提交
11794 11795 11796

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceGetXMLDesc) {
        char *ret;
11797
        ret = conn->interfaceDriver->interfaceGetXMLDesc(iface, flags);
D
Daniel Veillard 已提交
11798 11799 11800 11801 11802
        if (!ret)
            goto error;
        return ret;
    }

11803
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11804 11805

error:
11806
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
11807 11808 11809
    return NULL;
}

11810

D
Daniel Veillard 已提交
11811 11812 11813 11814
/**
 * virInterfaceDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xml: the XML description for the interface, preferably in UTF-8
11815
 * @flags: extra flags; not used yet, so callers should always pass 0
D
Daniel Veillard 已提交
11816
 *
11817 11818 11819 11820 11821 11822 11823 11824 11825 11826 11827
 * Define an interface (or modify existing interface configuration).
 *
 * Normally this change in the interface configuration is immediately
 * permanent/persistent, but if virInterfaceChangeBegin() has been
 * previously called (i.e. if an interface config transaction is
 * open), the new interface definition will only become permanent if
 * virInterfaceChangeCommit() is called prior to the next reboot of
 * the system running libvirtd. Prior to that time, it can be
 * explicitly removed using virInterfaceChangeRollback(), or will be
 * automatically removed during the next reboot of the system running
 * libvirtd.
D
Daniel Veillard 已提交
11828 11829 11830 11831 11832 11833
 *
 * Returns NULL in case of error, a pointer to the interface otherwise
 */
virInterfacePtr
virInterfaceDefineXML(virConnectPtr conn, const char *xml, unsigned int flags)
{
11834
    VIR_DEBUG("conn=%p, xml=%s, flags=%x", conn, xml, flags);
D
Daniel Veillard 已提交
11835 11836 11837

    virResetLastError();

11838
    virCheckConnectReturn(conn, NULL);
11839
    virCheckReadOnlyGoto(conn->flags, error);
11840
    virCheckNonNullArgGoto(xml, error);
D
Daniel Veillard 已提交
11841 11842 11843

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceDefineXML) {
        virInterfacePtr ret;
11844
        ret = conn->interfaceDriver->interfaceDefineXML(conn, xml, flags);
D
Daniel Veillard 已提交
11845 11846 11847 11848 11849
        if (!ret)
            goto error;
        return ret;
    }

11850
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11851 11852

error:
11853
    virDispatchError(conn);
D
Daniel Veillard 已提交
11854 11855 11856
    return NULL;
}

11857

D
Daniel Veillard 已提交
11858 11859
/**
 * virInterfaceUndefine:
11860
 * @iface: pointer to a defined interface
D
Daniel Veillard 已提交
11861 11862 11863 11864
 *
 * Undefine an interface, ie remove it from the config.
 * This does not free the associated virInterfacePtr object.
 *
11865 11866 11867 11868 11869 11870 11871 11872 11873 11874
 * Normally this change in the interface configuration is
 * permanent/persistent, but if virInterfaceChangeBegin() has been
 * previously called (i.e. if an interface config transaction is
 * open), the removal of the interface definition will only become
 * permanent if virInterfaceChangeCommit() is called prior to the next
 * reboot of the system running libvirtd. Prior to that time, the
 * definition can be explicitly restored using
 * virInterfaceChangeRollback(), or will be automatically restored
 * during the next reboot of the system running libvirtd.
 *
D
Daniel Veillard 已提交
11875 11876 11877
 * Returns 0 in case of success, -1 in case of error
 */
int
11878 11879
virInterfaceUndefine(virInterfacePtr iface)
{
D
Daniel Veillard 已提交
11880
    virConnectPtr conn;
11881
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
11882 11883 11884

    virResetLastError();

11885
    virCheckInterfaceReturn(iface, -1);
11886
    conn = iface->conn;
11887

11888
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
11889 11890 11891

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceUndefine) {
        int ret;
11892
        ret = conn->interfaceDriver->interfaceUndefine(iface);
D
Daniel Veillard 已提交
11893 11894 11895 11896 11897
        if (ret < 0)
            goto error;
        return ret;
    }

11898
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11899 11900

error:
11901
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
11902 11903 11904
    return -1;
}

11905

D
Daniel Veillard 已提交
11906 11907
/**
 * virInterfaceCreate:
11908
 * @iface: pointer to a defined interface
11909
 * @flags: extra flags; not used yet, so callers should always pass 0
D
Daniel Veillard 已提交
11910
 *
11911
 * Activate an interface (i.e. call "ifup").
D
Daniel Veillard 已提交
11912
 *
11913 11914 11915 11916
 * If there was an open network config transaction at the time this
 * interface was defined (that is, if virInterfaceChangeBegin() had
 * been called), the interface will be brought back down (and then
 * undefined) if virInterfaceChangeRollback() is called.
W
Wangyufei (A) 已提交
11917
 *
D
Daniel Veillard 已提交
11918 11919 11920
 * Returns 0 in case of success, -1 in case of error
 */
int
11921
virInterfaceCreate(virInterfacePtr iface, unsigned int flags)
D
Daniel Veillard 已提交
11922 11923
{
    virConnectPtr conn;
11924
    VIR_DEBUG("iface=%p, flags=%x", iface, flags);
D
Daniel Veillard 已提交
11925 11926 11927

    virResetLastError();

11928
    virCheckInterfaceReturn(iface, -1);
11929
    conn = iface->conn;
11930

11931
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
11932 11933 11934

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceCreate) {
        int ret;
11935
        ret = conn->interfaceDriver->interfaceCreate(iface, flags);
D
Daniel Veillard 已提交
11936 11937 11938 11939 11940
        if (ret < 0)
            goto error;
        return ret;
    }

11941
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11942 11943

error:
11944
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
11945 11946 11947
    return -1;
}

11948

D
Daniel Veillard 已提交
11949 11950
/**
 * virInterfaceDestroy:
11951
 * @iface: an interface object
11952
 * @flags: extra flags; not used yet, so callers should always pass 0
D
Daniel Veillard 已提交
11953 11954 11955 11956 11957
 *
 * deactivate an interface (ie call "ifdown")
 * This does not remove the interface from the config, and
 * does not free the associated virInterfacePtr object.
 *
11958 11959 11960 11961 11962 11963 11964

 * If there is an open network config transaction at the time this
 * interface is destroyed (that is, if virInterfaceChangeBegin() had
 * been called), and if the interface is later undefined and then
 * virInterfaceChangeRollback() is called, the restoral of the
 * interface definition will also bring the interface back up.
 *
D
Daniel Veillard 已提交
11965 11966 11967
 * Returns 0 in case of success and -1 in case of failure.
 */
int
11968
virInterfaceDestroy(virInterfacePtr iface, unsigned int flags)
D
Daniel Veillard 已提交
11969 11970
{
    virConnectPtr conn;
11971
    VIR_DEBUG("iface=%p, flags=%x", iface, flags);
D
Daniel Veillard 已提交
11972 11973 11974

    virResetLastError();

11975
    virCheckInterfaceReturn(iface, -1);
11976
    conn = iface->conn;
11977

11978
    virCheckReadOnlyGoto(conn->flags, error);
D
Daniel Veillard 已提交
11979 11980 11981

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceDestroy) {
        int ret;
11982
        ret = conn->interfaceDriver->interfaceDestroy(iface, flags);
D
Daniel Veillard 已提交
11983 11984 11985 11986 11987
        if (ret < 0)
            goto error;
        return ret;
    }

11988
    virReportUnsupportedError();
D
Daniel Veillard 已提交
11989 11990

error:
11991
    virDispatchError(iface->conn);
D
Daniel Veillard 已提交
11992 11993 11994
    return -1;
}

11995

D
Daniel Veillard 已提交
11996 11997
/**
 * virInterfaceRef:
11998
 * @iface: the interface to hold a reference on
D
Daniel Veillard 已提交
11999 12000 12001 12002 12003 12004 12005 12006 12007
 *
 * Increment the reference count on the interface. For each
 * additional call to this method, there shall be a corresponding
 * call to virInterfaceFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
L
Laine Stump 已提交
12008
 * it. ie, each new thread using an interface would increment
D
Daniel Veillard 已提交
12009 12010 12011 12012 12013
 * the reference count.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
12014
virInterfaceRef(virInterfacePtr iface)
D
Daniel Veillard 已提交
12015
{
12016 12017
    VIR_DEBUG("iface=%p refs=%d", iface, iface ? iface->object.u.s.refs : 0);

12018 12019
    virResetLastError();

12020 12021
    virCheckInterfaceReturn(iface, -1);

12022
    virObjectRef(iface);
D
Daniel Veillard 已提交
12023 12024 12025
    return 0;
}

12026

D
Daniel Veillard 已提交
12027 12028
/**
 * virInterfaceFree:
L
Laine Stump 已提交
12029
 * @iface: an interface object
D
Daniel Veillard 已提交
12030 12031 12032 12033 12034 12035 12036
 *
 * Free the interface object. The interface itself is unaltered.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
12037
virInterfaceFree(virInterfacePtr iface)
D
Daniel Veillard 已提交
12038
{
12039
    VIR_DEBUG("iface=%p", iface);
D
Daniel Veillard 已提交
12040 12041 12042

    virResetLastError();

12043 12044
    virCheckInterfaceReturn(iface, -1);

12045
    virObjectUnref(iface);
12046
    return 0;
D
Daniel Veillard 已提交
12047 12048
}

12049

12050 12051 12052
/**
 * virInterfaceChangeBegin:
 * @conn: pointer to hypervisor connection
12053
 * @flags: extra flags; not used yet, so callers should always pass 0
12054
 *
Y
Yuri Chornoivan 已提交
12055
 * This function creates a restore point to which one can return
12056 12057
 * later by calling virInterfaceChangeRollback(). This function should
 * be called before any transaction with interface configuration.
Y
Yuri Chornoivan 已提交
12058
 * Once it is known that a new configuration works, it can be committed via
12059 12060 12061 12062 12063 12064 12065 12066 12067 12068 12069
 * virInterfaceChangeCommit(), which frees the restore point.
 *
 * If virInterfaceChangeBegin() is called when a transaction is
 * already opened, this function will fail, and a
 * VIR_ERR_INVALID_OPERATION will be logged.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virInterfaceChangeBegin(virConnectPtr conn, unsigned int flags)
{
12070
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
12071 12072 12073

    virResetLastError();

12074
    virCheckConnectReturn(conn, -1);
12075
    virCheckReadOnlyGoto(conn->flags, error);
12076 12077 12078 12079 12080 12081 12082 12083 12084

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceChangeBegin) {
        int ret;
        ret = conn->interfaceDriver->interfaceChangeBegin(conn, flags);
        if (ret < 0)
           goto error;
        return ret;
    }

12085
    virReportUnsupportedError();
12086 12087 12088 12089 12090 12091

error:
    virDispatchError(conn);
    return -1;
}

12092

12093 12094 12095
/**
 * virInterfaceChangeCommit:
 * @conn: pointer to hypervisor connection
12096
 * @flags: extra flags; not used yet, so callers should always pass 0
12097 12098 12099 12100 12101 12102 12103 12104 12105 12106 12107 12108 12109
 *
 * This commits the changes made to interfaces and frees the restore point
 * created by virInterfaceChangeBegin().
 *
 * If virInterfaceChangeCommit() is called when a transaction is not
 * opened, this function will fail, and a VIR_ERR_INVALID_OPERATION
 * will be logged.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virInterfaceChangeCommit(virConnectPtr conn, unsigned int flags)
{
12110
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
12111 12112 12113

    virResetLastError();

12114
    virCheckConnectReturn(conn, -1);
12115
    virCheckReadOnlyGoto(conn->flags, error);
12116 12117 12118 12119 12120 12121 12122 12123 12124

    if (conn->interfaceDriver && conn->interfaceDriver->interfaceChangeCommit) {
        int ret;
        ret = conn->interfaceDriver->interfaceChangeCommit(conn, flags);
        if (ret < 0)
           goto error;
        return ret;
    }

12125
    virReportUnsupportedError();
12126 12127 12128 12129 12130 12131

error:
    virDispatchError(conn);
    return -1;
}

12132

12133 12134 12135
/**
 * virInterfaceChangeRollback:
 * @conn: pointer to hypervisor connection
12136
 * @flags: extra flags; not used yet, so callers should always pass 0
12137 12138 12139 12140 12141 12142 12143 12144 12145 12146 12147 12148 12149
 *
 * This cancels changes made to interfaces settings by restoring previous
 * state created by virInterfaceChangeBegin().
 *
 * If virInterfaceChangeRollback() is called when a transaction is not
 * opened, this function will fail, and a VIR_ERR_INVALID_OPERATION
 * will be logged.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virInterfaceChangeRollback(virConnectPtr conn, unsigned int flags)
{
12150
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
12151 12152 12153

    virResetLastError();

12154
    virCheckConnectReturn(conn, -1);
12155
    virCheckReadOnlyGoto(conn->flags, error);
12156 12157 12158 12159 12160 12161 12162 12163 12164 12165

    if (conn->interfaceDriver &&
        conn->interfaceDriver->interfaceChangeRollback) {
        int ret;
        ret = conn->interfaceDriver->interfaceChangeRollback(conn, flags);
        if (ret < 0)
           goto error;
        return ret;
    }

12166
    virReportUnsupportedError();
12167 12168 12169 12170 12171 12172

error:
    virDispatchError(conn);
    return -1;
}

12173 12174 12175

/**
 * virStoragePoolGetConnect:
12176
 * @pool: pointer to a pool
12177 12178 12179 12180 12181 12182 12183 12184 12185 12186 12187 12188
 *
 * Provides the connection pointer associated with a storage pool.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the pool object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
12189
virStoragePoolGetConnect(virStoragePoolPtr pool)
12190
{
12191
    VIR_DEBUG("pool=%p", pool);
12192

12193 12194
    virResetLastError();

12195 12196
    virCheckStoragePoolReturn(pool, NULL);

12197 12198 12199
    return pool->conn;
}

12200

12201 12202 12203 12204 12205 12206 12207 12208 12209 12210 12211 12212 12213 12214 12215 12216 12217 12218 12219 12220 12221 12222 12223 12224 12225 12226 12227 12228 12229 12230 12231 12232 12233 12234 12235 12236 12237 12238 12239 12240 12241 12242 12243 12244 12245 12246 12247 12248 12249 12250 12251 12252 12253 12254 12255 12256 12257 12258 12259 12260 12261 12262
/**
 * virConnectListAllStoragePools:
 * @conn: Pointer to the hypervisor connection.
 * @pools: Pointer to a variable to store the array containing storage pool
 *         objects or NULL if the list is not required (just returns number
 *         of pools).
 * @flags: bitwise-OR of virConnectListAllStoragePoolsFlags.
 *
 * Collect the list of storage pools, and allocate an array to store those
 * objects. This API solves the race inherent between
 * virConnectListStoragePools and virConnectListDefinedStoragePools.
 *
 * Normally, all storage pools are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted pools.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a pool, and where all bits
 * within a group describe all possible pools.
 *
 * The first group of @flags is VIR_CONNECT_LIST_STORAGE_POOLS_ACTIVE (online)
 * and VIR_CONNECT_LIST_STORAGE_POOLS_INACTIVE (offline) to filter the pools
 * by state.
 *
 * The second group of @flags is VIR_CONNECT_LIST_STORAGE_POOLS_PERSITENT
 * (defined) and VIR_CONNECT_LIST_STORAGE_POOLS_TRANSIENT (running but not
 * defined), to filter the pools by whether they have persistent config or not.
 *
 * The third group of @flags is VIR_CONNECT_LIST_STORAGE_POOLS_AUTOSTART
 * and VIR_CONNECT_LIST_STORAGE_POOLS_NO_AUTOSTART, to filter the pools by
 * whether they are marked as autostart or not.
 *
 * The last group of @flags is provided to filter the pools by the types,
 * the flags include:
 * VIR_CONNECT_LIST_STORAGE_POOLS_DIR
 * VIR_CONNECT_LIST_STORAGE_POOLS_FS
 * VIR_CONNECT_LIST_STORAGE_POOLS_NETFS
 * VIR_CONNECT_LIST_STORAGE_POOLS_LOGICAL
 * VIR_CONNECT_LIST_STORAGE_POOLS_DISK
 * VIR_CONNECT_LIST_STORAGE_POOLS_ISCSI
 * VIR_CONNECT_LIST_STORAGE_POOLS_SCSI
 * VIR_CONNECT_LIST_STORAGE_POOLS_MPATH
 * VIR_CONNECT_LIST_STORAGE_POOLS_RBD
 * VIR_CONNECT_LIST_STORAGE_POOLS_SHEEPDOG
 *
 * Returns the number of storage pools found or -1 and sets @pools to
 * NULL in case of error.  On success, the array stored into @pools is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virStoragePoolFree() on each array element, then calling
 * free() on @pools.
 */
int
virConnectListAllStoragePools(virConnectPtr conn,
                              virStoragePoolPtr **pools,
                              unsigned int flags)
{
    VIR_DEBUG("conn=%p, pools=%p, flags=%x", conn, pools, flags);

    virResetLastError();

    if (pools)
        *pools = NULL;

12263
    virCheckConnectReturn(conn, -1);
12264 12265

    if (conn->storageDriver &&
12266
        conn->storageDriver->connectListAllStoragePools) {
12267
        int ret;
12268
        ret = conn->storageDriver->connectListAllStoragePools(conn, pools, flags);
12269 12270 12271 12272 12273
        if (ret < 0)
            goto error;
        return ret;
    }

12274
    virReportUnsupportedError();
12275 12276 12277 12278 12279 12280

error:
    virDispatchError(conn);
    return -1;
}

12281

12282 12283 12284 12285 12286 12287 12288 12289 12290
/**
 * virConnectNumOfStoragePools:
 * @conn: pointer to hypervisor connection
 *
 * Provides the number of active storage pools
 *
 * Returns the number of pools found, or -1 on error
 */
int
O
Osier Yang 已提交
12291
virConnectNumOfStoragePools(virConnectPtr conn)
12292
{
12293
    VIR_DEBUG("conn=%p", conn);
12294

12295 12296
    virResetLastError();

12297
    virCheckConnectReturn(conn, -1);
12298

12299
    if (conn->storageDriver && conn->storageDriver->connectNumOfStoragePools) {
12300
        int ret;
12301
        ret = conn->storageDriver->connectNumOfStoragePools(conn);
12302 12303 12304 12305
        if (ret < 0)
            goto error;
        return ret;
    }
12306

12307
    virReportUnsupportedError();
12308 12309

error:
12310
    virDispatchError(conn);
12311 12312 12313
    return -1;
}

12314

12315 12316 12317 12318 12319 12320
/**
 * virConnectListStoragePools:
 * @conn: pointer to hypervisor connection
 * @names: array of char * to fill with pool names (allocated by caller)
 * @maxnames: size of the names array
 *
12321 12322 12323 12324 12325
 * Provides the list of names of active storage pools up to maxnames.
 * If there are more than maxnames, the remaining names will be silently
 * ignored.
 *
 * For more control over the results, see virConnectListAllStoragePools().
12326
 *
12327 12328 12329 12330
 * Returns the number of pools found or -1 in case of error.  Note that
 * this command is inherently racy; a pool can be started between a call to
 * virConnectNumOfStoragePools() and this call; you are only guaranteed
 * that all currently active pools were listed if the return is less than
J
John Ferlan 已提交
12331
 * @maxnames. The client must call free() on each returned name.
12332 12333
 */
int
O
Osier Yang 已提交
12334 12335 12336
virConnectListStoragePools(virConnectPtr conn,
                           char **const names,
                           int maxnames)
12337
{
12338
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
12339

12340 12341
    virResetLastError();

12342
    virCheckConnectReturn(conn, -1);
12343 12344
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
12345

12346
    if (conn->storageDriver && conn->storageDriver->connectListStoragePools) {
12347
        int ret;
12348
        ret = conn->storageDriver->connectListStoragePools(conn, names, maxnames);
12349 12350 12351 12352
        if (ret < 0)
            goto error;
        return ret;
    }
12353

12354
    virReportUnsupportedError();
12355

12356
error:
12357
    virDispatchError(conn);
12358
    return -1;
12359 12360 12361 12362 12363 12364 12365 12366 12367 12368 12369 12370 12371 12372
}


/**
 * virConnectNumOfDefinedStoragePools:
 * @conn: pointer to hypervisor connection
 *
 * Provides the number of inactive storage pools
 *
 * Returns the number of pools found, or -1 on error
 */
int
virConnectNumOfDefinedStoragePools(virConnectPtr conn)
{
12373
    VIR_DEBUG("conn=%p", conn);
12374

12375 12376
    virResetLastError();

12377
    virCheckConnectReturn(conn, -1);
12378

12379
    if (conn->storageDriver && conn->storageDriver->connectNumOfDefinedStoragePools) {
12380
        int ret;
12381
        ret = conn->storageDriver->connectNumOfDefinedStoragePools(conn);
12382 12383 12384 12385
        if (ret < 0)
            goto error;
        return ret;
    }
12386

12387
    virReportUnsupportedError();
12388 12389

error:
12390
    virDispatchError(conn);
12391 12392 12393 12394 12395 12396 12397 12398 12399 12400
    return -1;
}


/**
 * virConnectListDefinedStoragePools:
 * @conn: pointer to hypervisor connection
 * @names: array of char * to fill with pool names (allocated by caller)
 * @maxnames: size of the names array
 *
12401 12402 12403
 * Provides the list of names of inactive storage pools up to maxnames.
 * If there are more than maxnames, the remaining names will be silently
 * ignored.
12404
 *
12405 12406 12407 12408 12409 12410 12411
 * For more control over the results, see virConnectListAllStoragePools().
 *
 * Returns the number of names provided in the array or -1 in case of error.
 * Note that this command is inherently racy; a pool can be defined between
 * a call to virConnectNumOfDefinedStoragePools() and this call; you are only
 * guaranteed that all currently defined pools were listed if the return
 * is less than @maxnames.  The client must call free() on each returned name.
12412 12413 12414 12415 12416 12417
 */
int
virConnectListDefinedStoragePools(virConnectPtr conn,
                                  char **const names,
                                  int maxnames)
{
12418
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
12419

12420 12421
    virResetLastError();

12422
    virCheckConnectReturn(conn, -1);
12423 12424
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
12425

12426
    if (conn->storageDriver && conn->storageDriver->connectListDefinedStoragePools) {
12427
        int ret;
12428
        ret = conn->storageDriver->connectListDefinedStoragePools(conn, names, maxnames);
12429 12430 12431 12432
        if (ret < 0)
            goto error;
        return ret;
    }
12433

12434
    virReportUnsupportedError();
12435 12436

error:
12437
    virDispatchError(conn);
12438 12439 12440 12441
    return -1;
}


12442 12443 12444 12445 12446
/**
 * virConnectFindStoragePoolSources:
 * @conn: pointer to hypervisor connection
 * @type: type of storage pool sources to discover
 * @srcSpec: XML document specifying discovery source
12447
 * @flags: extra flags; not used yet, so callers should always pass 0
12448 12449 12450 12451 12452 12453 12454 12455 12456 12457 12458 12459 12460 12461 12462 12463 12464 12465 12466 12467 12468
 *
 * Talks to a storage backend and attempts to auto-discover the set of
 * available storage pool sources. e.g. For iSCSI this would be a set of
 * iSCSI targets. For NFS this would be a list of exported paths.  The
 * srcSpec (optional for some storage pool types, e.g. local ones) is
 * an instance of the storage pool's source element specifying where
 * to look for the pools.
 *
 * srcSpec is not required for some types (e.g., those querying
 * local storage resources only)
 *
 * Returns an xml document consisting of a SourceList element
 * containing a source document appropriate to the given pool
 * type for each discovered source.
 */
char *
virConnectFindStoragePoolSources(virConnectPtr conn,
                                 const char *type,
                                 const char *srcSpec,
                                 unsigned int flags)
{
12469
    VIR_DEBUG("conn=%p, type=%s, src=%s, flags=%x",
O
Osier Yang 已提交
12470
              conn, NULLSTR(type), NULLSTR(srcSpec), flags);
12471 12472 12473

    virResetLastError();

12474
    virCheckConnectReturn(conn, NULL);
12475
    virCheckNonNullArgGoto(type, error);
12476
    virCheckReadOnlyGoto(conn->flags, error);
12477

12478
    if (conn->storageDriver && conn->storageDriver->connectFindStoragePoolSources) {
12479
        char *ret;
12480
        ret = conn->storageDriver->connectFindStoragePoolSources(conn, type, srcSpec, flags);
12481 12482 12483 12484
        if (!ret)
            goto error;
        return ret;
    }
12485

12486
    virReportUnsupportedError();
12487 12488

error:
12489
    virDispatchError(conn);
12490 12491 12492 12493
    return NULL;
}


12494 12495 12496 12497 12498 12499 12500 12501 12502 12503 12504 12505 12506
/**
 * virStoragePoolLookupByName:
 * @conn: pointer to hypervisor connection
 * @name: name of pool to fetch
 *
 * Fetch a storage pool based on its unique name
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByName(virConnectPtr conn,
                           const char *name)
{
12507
    VIR_DEBUG("conn=%p, name=%s", conn, name);
12508

12509 12510
    virResetLastError();

12511
    virCheckConnectReturn(conn, NULL);
12512
    virCheckNonNullArgGoto(name, error);
12513

12514
    if (conn->storageDriver && conn->storageDriver->storagePoolLookupByName) {
12515
        virStoragePoolPtr ret;
12516
        ret = conn->storageDriver->storagePoolLookupByName(conn, name);
12517 12518 12519 12520
        if (!ret)
            goto error;
        return ret;
    }
12521

12522
    virReportUnsupportedError();
12523 12524

error:
12525
    virDispatchError(conn);
12526 12527 12528 12529 12530 12531 12532 12533 12534 12535 12536 12537 12538 12539 12540 12541 12542
    return NULL;
}


/**
 * virStoragePoolLookupByUUID:
 * @conn: pointer to hypervisor connection
 * @uuid: globally unique id of pool to fetch
 *
 * Fetch a storage pool based on its globally unique id
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByUUID(virConnectPtr conn,
                           const unsigned char *uuid)
{
12543
    VIR_UUID_DEBUG(conn, uuid);
12544

12545 12546
    virResetLastError();

12547
    virCheckConnectReturn(conn, NULL);
12548
    virCheckNonNullArgGoto(uuid, error);
12549

12550
    if (conn->storageDriver && conn->storageDriver->storagePoolLookupByUUID) {
12551
        virStoragePoolPtr ret;
12552
        ret = conn->storageDriver->storagePoolLookupByUUID(conn, uuid);
12553 12554 12555 12556
        if (!ret)
            goto error;
        return ret;
    }
12557

12558
    virReportUnsupportedError();
12559

12560
error:
12561
    virDispatchError(conn);
12562
    return NULL;
12563 12564 12565 12566 12567 12568 12569 12570 12571 12572 12573 12574 12575 12576
}


/**
 * virStoragePoolLookupByUUIDString:
 * @conn: pointer to hypervisor connection
 * @uuidstr: globally unique id of pool to fetch
 *
 * Fetch a storage pool based on its globally unique id
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByUUIDString(virConnectPtr conn,
12577
                                 const char *uuidstr)
12578 12579
{
    unsigned char uuid[VIR_UUID_BUFLEN];
12580
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
12581

12582 12583
    virResetLastError();

12584
    virCheckConnectReturn(conn, NULL);
12585
    virCheckNonNullArgGoto(uuidstr, error);
12586 12587

    if (virUUIDParse(uuidstr, uuid) < 0) {
12588 12589 12590
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
12591
        goto error;
12592 12593 12594
    }

    return virStoragePoolLookupByUUID(conn, uuid);
12595 12596

error:
12597
    virDispatchError(conn);
12598
    return NULL;
12599 12600 12601 12602 12603 12604 12605 12606 12607 12608 12609 12610 12611 12612
}


/**
 * virStoragePoolLookupByVolume:
 * @vol: pointer to storage volume
 *
 * Fetch a storage pool which contains a particular volume
 *
 * Returns a virStoragePoolPtr object, or NULL if no matching pool is found
 */
virStoragePoolPtr
virStoragePoolLookupByVolume(virStorageVolPtr vol)
{
12613
    VIR_DEBUG("vol=%p", vol);
12614

12615 12616
    virResetLastError();

12617
    virCheckStorageVolReturn(vol, NULL);
12618

12619
    if (vol->conn->storageDriver && vol->conn->storageDriver->storagePoolLookupByVolume) {
12620
        virStoragePoolPtr ret;
12621
        ret = vol->conn->storageDriver->storagePoolLookupByVolume(vol);
12622 12623 12624 12625
        if (!ret)
            goto error;
        return ret;
    }
12626

12627
    virReportUnsupportedError();
12628

12629
error:
12630
    virDispatchError(vol->conn);
12631
    return NULL;
12632 12633
}

12634

12635 12636 12637 12638
/**
 * virStoragePoolCreateXML:
 * @conn: pointer to hypervisor connection
 * @xmlDesc: XML description for new pool
12639
 * @flags: extra flags; not used yet, so callers should always pass 0
12640 12641
 *
 * Create a new storage based on its XML description. The
D
Daniel Veillard 已提交
12642
 * pool is not persistent, so its definition will disappear
12643 12644 12645 12646 12647 12648 12649 12650 12651
 * when it is destroyed, or if the host is restarted
 *
 * Returns a virStoragePoolPtr object, or NULL if creation failed
 */
virStoragePoolPtr
virStoragePoolCreateXML(virConnectPtr conn,
                        const char *xmlDesc,
                        unsigned int flags)
{
E
Eric Blake 已提交
12652
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
12653

12654 12655
    virResetLastError();

12656
    virCheckConnectReturn(conn, NULL);
12657
    virCheckNonNullArgGoto(xmlDesc, error);
12658
    virCheckReadOnlyGoto(conn->flags, error);
12659

12660
    if (conn->storageDriver && conn->storageDriver->storagePoolCreateXML) {
12661
        virStoragePoolPtr ret;
12662
        ret = conn->storageDriver->storagePoolCreateXML(conn, xmlDesc, flags);
12663 12664 12665 12666
        if (!ret)
            goto error;
        return ret;
    }
12667

12668
    virReportUnsupportedError();
12669 12670

error:
12671
    virDispatchError(conn);
12672 12673 12674
    return NULL;
}

12675

12676 12677 12678 12679
/**
 * virStoragePoolDefineXML:
 * @conn: pointer to hypervisor connection
 * @xml: XML description for new pool
12680
 * @flags: extra flags; not used yet, so callers should always pass 0
12681 12682
 *
 * Define a new inactive storage pool based on its XML description. The
D
Daniel Veillard 已提交
12683
 * pool is persistent, until explicitly undefined.
12684 12685 12686 12687 12688 12689 12690 12691
 *
 * Returns a virStoragePoolPtr object, or NULL if creation failed
 */
virStoragePoolPtr
virStoragePoolDefineXML(virConnectPtr conn,
                        const char *xml,
                        unsigned int flags)
{
E
Eric Blake 已提交
12692
    VIR_DEBUG("conn=%p, xml=%s, flags=%x", conn, xml, flags);
12693

12694 12695
    virResetLastError();

12696
    virCheckConnectReturn(conn, NULL);
12697
    virCheckReadOnlyGoto(conn->flags, error);
12698
    virCheckNonNullArgGoto(xml, error);
12699

12700
    if (conn->storageDriver && conn->storageDriver->storagePoolDefineXML) {
12701
        virStoragePoolPtr ret;
12702
        ret = conn->storageDriver->storagePoolDefineXML(conn, xml, flags);
12703 12704 12705 12706
        if (!ret)
            goto error;
        return ret;
    }
12707

12708
    virReportUnsupportedError();
12709

12710
error:
12711
    virDispatchError(conn);
12712
    return NULL;
12713 12714
}

12715

12716 12717 12718
/**
 * virStoragePoolBuild:
 * @pool: pointer to storage pool
12719
 * @flags: bitwise-OR of virStoragePoolBuildFlags
O
Osier Yang 已提交
12720 12721 12722
 *
 * Currently only filesystem pool accepts flags VIR_STORAGE_POOL_BUILD_OVERWRITE
 * and VIR_STORAGE_POOL_BUILD_NO_OVERWRITE.
12723 12724 12725 12726 12727 12728 12729 12730 12731 12732
 *
 * Build the underlying storage pool
 *
 * Returns 0 on success, or -1 upon failure
 */
int
virStoragePoolBuild(virStoragePoolPtr pool,
                    unsigned int flags)
{
    virConnectPtr conn;
12733
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
12734

12735 12736
    virResetLastError();

12737
    virCheckStoragePoolReturn(pool, -1);
12738
    conn = pool->conn;
12739

12740
    virCheckReadOnlyGoto(conn->flags, error);
12741

12742
    if (conn->storageDriver && conn->storageDriver->storagePoolBuild) {
12743
        int ret;
12744
        ret = conn->storageDriver->storagePoolBuild(pool, flags);
12745 12746 12747 12748
        if (ret < 0)
            goto error;
        return ret;
    }
12749

12750
    virReportUnsupportedError();
12751

12752
error:
12753
    virDispatchError(pool->conn);
12754
    return -1;
12755 12756 12757 12758 12759 12760 12761 12762 12763
}


/**
 * virStoragePoolUndefine:
 * @pool: pointer to storage pool
 *
 * Undefine an inactive storage pool
 *
12764
 * Returns 0 on success, -1 on failure
12765 12766 12767 12768 12769
 */
int
virStoragePoolUndefine(virStoragePoolPtr pool)
{
    virConnectPtr conn;
12770
    VIR_DEBUG("pool=%p", pool);
12771

12772 12773
    virResetLastError();

12774
    virCheckStoragePoolReturn(pool, -1);
12775
    conn = pool->conn;
12776

12777
    virCheckReadOnlyGoto(conn->flags, error);
12778

12779
    if (conn->storageDriver && conn->storageDriver->storagePoolUndefine) {
12780
        int ret;
12781
        ret = conn->storageDriver->storagePoolUndefine(pool);
12782 12783 12784 12785
        if (ret < 0)
            goto error;
        return ret;
    }
12786

12787
    virReportUnsupportedError();
12788

12789
error:
12790
    virDispatchError(pool->conn);
12791
    return -1;
12792 12793 12794 12795 12796 12797
}


/**
 * virStoragePoolCreate:
 * @pool: pointer to storage pool
12798
 * @flags: extra flags; not used yet, so callers should always pass 0
12799 12800 12801 12802 12803 12804 12805 12806 12807 12808
 *
 * Starts an inactive storage pool
 *
 * Returns 0 on success, or -1 if it could not be started
 */
int
virStoragePoolCreate(virStoragePoolPtr pool,
                     unsigned int flags)
{
    virConnectPtr conn;
E
Eric Blake 已提交
12809
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
12810

12811 12812
    virResetLastError();

12813
    virCheckStoragePoolReturn(pool, -1);
12814
    conn = pool->conn;
12815

12816
    virCheckReadOnlyGoto(conn->flags, error);
12817

12818
    if (conn->storageDriver && conn->storageDriver->storagePoolCreate) {
12819
        int ret;
12820
        ret = conn->storageDriver->storagePoolCreate(pool, flags);
12821 12822 12823 12824
        if (ret < 0)
            goto error;
        return ret;
    }
12825

12826
    virReportUnsupportedError();
12827

12828
error:
12829
    virDispatchError(pool->conn);
12830
    return -1;
12831 12832 12833 12834 12835 12836 12837 12838 12839 12840 12841 12842 12843 12844 12845 12846 12847 12848 12849
}


/**
 * virStoragePoolDestroy:
 * @pool: pointer to storage pool
 *
 * Destroy an active storage pool. This will deactivate the
 * pool on the host, but keep any persistent config associated
 * with it. If it has a persistent config it can later be
 * restarted with virStoragePoolCreate(). This does not free
 * the associated virStoragePoolPtr object.
 *
 * Returns 0 on success, or -1 if it could not be destroyed
 */
int
virStoragePoolDestroy(virStoragePoolPtr pool)
{
    virConnectPtr conn;
12850
    VIR_DEBUG("pool=%p", pool);
12851

12852 12853
    virResetLastError();

12854
    virCheckStoragePoolReturn(pool, -1);
12855
    conn = pool->conn;
12856

12857
    virCheckReadOnlyGoto(conn->flags, error);
12858

12859
    if (conn->storageDriver && conn->storageDriver->storagePoolDestroy) {
12860
        int ret;
12861
        ret = conn->storageDriver->storagePoolDestroy(pool);
12862 12863 12864 12865
        if (ret < 0)
            goto error;
        return ret;
    }
12866

12867
    virReportUnsupportedError();
12868 12869

error:
12870
    virDispatchError(pool->conn);
12871 12872 12873
    return -1;
}

12874

12875 12876 12877
/**
 * virStoragePoolDelete:
 * @pool: pointer to storage pool
12878
 * @flags: bitwise-OR of virStoragePoolDeleteFlags
12879 12880 12881 12882 12883 12884 12885 12886 12887 12888 12889 12890
 *
 * Delete the underlying pool resources. This is
 * a non-recoverable operation. The virStoragePoolPtr object
 * itself is not free'd.
 *
 * Returns 0 on success, or -1 if it could not be obliterate
 */
int
virStoragePoolDelete(virStoragePoolPtr pool,
                     unsigned int flags)
{
    virConnectPtr conn;
12891
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
12892

12893 12894
    virResetLastError();

12895
    virCheckStoragePoolReturn(pool, -1);
12896
    conn = pool->conn;
12897

12898
    virCheckReadOnlyGoto(conn->flags, error);
12899

12900
    if (conn->storageDriver && conn->storageDriver->storagePoolDelete) {
12901
        int ret;
12902
        ret = conn->storageDriver->storagePoolDelete(pool, flags);
12903 12904 12905 12906
        if (ret < 0)
            goto error;
        return ret;
    }
12907

12908
    virReportUnsupportedError();
12909 12910

error:
12911
    virDispatchError(pool->conn);
12912 12913 12914 12915 12916 12917 12918 12919 12920 12921 12922 12923 12924 12925 12926 12927
    return -1;
}


/**
 * virStoragePoolFree:
 * @pool: pointer to storage pool
 *
 * Free a storage pool object, releasing all memory associated with
 * it. Does not change the state of the pool on the host.
 *
 * Returns 0 on success, or -1 if it could not be free'd.
 */
int
virStoragePoolFree(virStoragePoolPtr pool)
{
12928
    VIR_DEBUG("pool=%p", pool);
12929

12930 12931
    virResetLastError();

12932 12933
    virCheckStoragePoolReturn(pool, -1);

12934
    virObjectUnref(pool);
12935
    return 0;
12936 12937 12938 12939

}


12940 12941
/**
 * virStoragePoolRef:
D
Daniel Veillard 已提交
12942
 * @pool: the pool to hold a reference on
12943 12944 12945 12946 12947 12948 12949 12950 12951 12952 12953
 *
 * Increment the reference count on the pool. For each
 * additional call to this method, there shall be a corresponding
 * call to virStoragePoolFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a pool would increment
 * the reference count.
D
Daniel Veillard 已提交
12954 12955
 *
 * Returns 0 in case of success, -1 in case of failure.
12956 12957 12958 12959
 */
int
virStoragePoolRef(virStoragePoolPtr pool)
{
12960 12961
    VIR_DEBUG("pool=%p refs=%d", pool, pool ? pool->object.u.s.refs : 0);

12962 12963
    virResetLastError();

12964 12965
    virCheckStoragePoolReturn(pool, -1);

12966
    virObjectRef(pool);
12967 12968 12969
    return 0;
}

12970

12971 12972 12973
/**
 * virStoragePoolRefresh:
 * @pool: pointer to storage pool
12974
 * @flags: extra flags; not used yet, so callers should always pass 0
12975 12976 12977 12978 12979
 *
 * Request that the pool refresh its list of volumes. This may
 * involve communicating with a remote server, and/or initializing
 * new devices at the OS layer
 *
12980
 * Returns 0 if the volume list was refreshed, -1 on failure
12981 12982 12983 12984 12985 12986
 */
int
virStoragePoolRefresh(virStoragePoolPtr pool,
                      unsigned int flags)
{
    virConnectPtr conn;
E
Eric Blake 已提交
12987
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
12988

12989 12990
    virResetLastError();

12991
    virCheckStoragePoolReturn(pool, -1);
12992
    conn = pool->conn;
12993

12994
    virCheckReadOnlyGoto(conn->flags, error);
12995

12996
    if (conn->storageDriver && conn->storageDriver->storagePoolRefresh) {
12997
        int ret;
12998
        ret = conn->storageDriver->storagePoolRefresh(pool, flags);
12999 13000 13001 13002
        if (ret < 0)
            goto error;
        return ret;
    }
13003

13004
    virReportUnsupportedError();
13005 13006

error:
13007
    virDispatchError(pool->conn);
13008 13009 13010 13011 13012 13013 13014 13015 13016 13017
    return -1;
}


/**
 * virStoragePoolGetName:
 * @pool: pointer to storage pool
 *
 * Fetch the locally unique name of the storage pool
 *
13018
 * Returns the name of the pool, or NULL on error
13019 13020 13021 13022
 */
const char*
virStoragePoolGetName(virStoragePoolPtr pool)
{
13023
    VIR_DEBUG("pool=%p", pool);
13024

13025 13026
    virResetLastError();

13027 13028
    virCheckStoragePoolReturn(pool, NULL);

13029
    return pool->name;
13030 13031 13032 13033 13034 13035 13036 13037 13038 13039
}


/**
 * virStoragePoolGetUUID:
 * @pool: pointer to storage pool
 * @uuid: buffer of VIR_UUID_BUFLEN bytes in size
 *
 * Fetch the globally unique ID of the storage pool
 *
13040
 * Returns 0 on success, or -1 on error;
13041 13042 13043 13044 13045
 */
int
virStoragePoolGetUUID(virStoragePoolPtr pool,
                      unsigned char *uuid)
{
13046
    VIR_DEBUG("pool=%p, uuid=%p", pool, uuid);
13047

13048 13049
    virResetLastError();

13050
    virCheckStoragePoolReturn(pool, -1);
13051
    virCheckNonNullArgGoto(uuid, error);
13052 13053 13054

    memcpy(uuid, &pool->uuid[0], VIR_UUID_BUFLEN);

13055
    return 0;
13056

13057
error:
13058
    virDispatchError(pool->conn);
13059
    return -1;
13060 13061
}

13062

13063 13064 13065 13066 13067 13068 13069
/**
 * virStoragePoolGetUUIDString:
 * @pool: pointer to storage pool
 * @buf: buffer of VIR_UUID_STRING_BUFLEN bytes in size
 *
 * Fetch the globally unique ID of the storage pool as a string
 *
13070
 * Returns 0 on success, or -1 on error;
13071 13072 13073 13074 13075
 */
int
virStoragePoolGetUUIDString(virStoragePoolPtr pool,
                            char *buf)
{
13076
    VIR_DEBUG("pool=%p, buf=%p", pool, buf);
13077

13078 13079
    virResetLastError();

13080
    virCheckStoragePoolReturn(pool, -1);
13081
    virCheckNonNullArgGoto(buf, error);
13082

E
Eric Blake 已提交
13083
    virUUIDFormat(pool->uuid, buf);
13084
    return 0;
13085

13086
error:
13087
    virDispatchError(pool->conn);
13088
    return -1;
13089 13090 13091 13092 13093 13094 13095 13096 13097 13098 13099
}


/**
 * virStoragePoolGetInfo:
 * @pool: pointer to storage pool
 * @info: pointer at which to store info
 *
 * Get volatile information about the storage pool
 * such as free space / usage summary
 *
13100
 * Returns 0 on success, or -1 on failure.
13101 13102 13103 13104 13105 13106
 */
int
virStoragePoolGetInfo(virStoragePoolPtr pool,
                      virStoragePoolInfoPtr info)
{
    virConnectPtr conn;
13107
    VIR_DEBUG("pool=%p, info=%p", pool, info);
13108

13109 13110
    virResetLastError();

13111 13112 13113
    if (info)
        memset(info, 0, sizeof(*info));

13114
    virCheckStoragePoolReturn(pool, -1);
13115
    virCheckNonNullArgGoto(info, error);
13116 13117 13118

    conn = pool->conn;

13119
    if (conn->storageDriver->storagePoolGetInfo) {
13120
        int ret;
13121
        ret = conn->storageDriver->storagePoolGetInfo(pool, info);
13122 13123 13124 13125
        if (ret < 0)
            goto error;
        return ret;
    }
13126

13127
    virReportUnsupportedError();
13128

13129
error:
13130
    virDispatchError(pool->conn);
13131
    return -1;
13132 13133 13134 13135 13136 13137
}


/**
 * virStoragePoolGetXMLDesc:
 * @pool: pointer to storage pool
13138
 * @flags: bitwise-OR of virStorageXMLFlags
13139 13140 13141 13142 13143
 *
 * Fetch an XML document describing all aspects of the
 * storage pool. This is suitable for later feeding back
 * into the virStoragePoolCreateXML method.
 *
13144
 * Returns a XML document, or NULL on error
13145 13146 13147 13148 13149 13150
 */
char *
virStoragePoolGetXMLDesc(virStoragePoolPtr pool,
                         unsigned int flags)
{
    virConnectPtr conn;
13151
    VIR_DEBUG("pool=%p, flags=%x", pool, flags);
13152

13153 13154
    virResetLastError();

13155
    virCheckStoragePoolReturn(pool, NULL);
13156 13157
    conn = pool->conn;

13158
    if (conn->storageDriver && conn->storageDriver->storagePoolGetXMLDesc) {
13159
        char *ret;
13160
        ret = conn->storageDriver->storagePoolGetXMLDesc(pool, flags);
13161 13162 13163 13164
        if (!ret)
            goto error;
        return ret;
    }
13165

13166
    virReportUnsupportedError();
13167

13168
error:
13169
    virDispatchError(pool->conn);
13170
    return NULL;
13171 13172 13173 13174 13175 13176 13177 13178 13179 13180 13181
}


/**
 * virStoragePoolGetAutostart:
 * @pool: pointer to storage pool
 * @autostart: location in which to store autostart flag
 *
 * Fetches the value of the autostart flag, which determines
 * whether the pool is automatically started at boot time
 *
13182
 * Returns 0 on success, -1 on failure
13183 13184 13185 13186 13187 13188
 */
int
virStoragePoolGetAutostart(virStoragePoolPtr pool,
                           int *autostart)
{
    virConnectPtr conn;
13189
    VIR_DEBUG("pool=%p, autostart=%p", pool, autostart);
13190

13191 13192
    virResetLastError();

13193
    virCheckStoragePoolReturn(pool, -1);
13194
    virCheckNonNullArgGoto(autostart, error);
13195 13196 13197

    conn = pool->conn;

13198
    if (conn->storageDriver && conn->storageDriver->storagePoolGetAutostart) {
13199
        int ret;
13200
        ret = conn->storageDriver->storagePoolGetAutostart(pool, autostart);
13201 13202 13203 13204
        if (ret < 0)
            goto error;
        return ret;
    }
13205

13206
    virReportUnsupportedError();
13207 13208

error:
13209
    virDispatchError(pool->conn);
13210 13211 13212 13213 13214 13215 13216 13217 13218 13219 13220
    return -1;
}


/**
 * virStoragePoolSetAutostart:
 * @pool: pointer to storage pool
 * @autostart: new flag setting
 *
 * Sets the autostart flag
 *
13221
 * Returns 0 on success, -1 on failure
13222 13223 13224 13225 13226 13227
 */
int
virStoragePoolSetAutostart(virStoragePoolPtr pool,
                           int autostart)
{
    virConnectPtr conn;
13228
    VIR_DEBUG("pool=%p, autostart=%d", pool, autostart);
13229

13230 13231
    virResetLastError();

13232
    virCheckStoragePoolReturn(pool, -1);
13233 13234
    conn = pool->conn;

13235 13236
    virCheckReadOnlyGoto(conn->flags, error);

13237
    if (conn->storageDriver && conn->storageDriver->storagePoolSetAutostart) {
13238
        int ret;
13239
        ret = conn->storageDriver->storagePoolSetAutostart(pool, autostart);
13240 13241 13242 13243
        if (ret < 0)
            goto error;
        return ret;
    }
13244

13245
    virReportUnsupportedError();
13246 13247

error:
13248
    virDispatchError(pool->conn);
13249 13250 13251
    return -1;
}

13252

13253 13254 13255 13256 13257 13258 13259 13260 13261 13262 13263 13264 13265 13266 13267 13268 13269 13270 13271 13272 13273 13274 13275 13276 13277 13278 13279
/**
 * virStoragePoolListAllVolumes:
 * @pool: Pointer to storage pool
 * @vols: Pointer to a variable to store the array containing storage volume
 *        objects or NULL if the list is not required (just returns number
 *        of volumes).
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Collect the list of storage volumes, and allocate an array to store those
 * objects.
 *
 * Returns the number of storage volumes found or -1 and sets @vols to
 * NULL in case of error.  On success, the array stored into @vols is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virStorageVolFree() on each array element, then calling
 * free() on @vols.
 */
int
virStoragePoolListAllVolumes(virStoragePoolPtr pool,
                             virStorageVolPtr **vols,
                             unsigned int flags)
{
    VIR_DEBUG("pool=%p, vols=%p, flags=%x", pool, vols, flags);

    virResetLastError();

13280
    virCheckStoragePoolReturn(pool, -1);
13281 13282

    if (pool->conn->storageDriver &&
13283
        pool->conn->storageDriver->storagePoolListAllVolumes) {
13284
        int ret;
13285
        ret = pool->conn->storageDriver->storagePoolListAllVolumes(pool, vols, flags);
13286 13287 13288 13289 13290
        if (ret < 0)
            goto error;
        return ret;
    }

13291
    virReportUnsupportedError();
13292 13293 13294 13295 13296

error:
    virDispatchError(pool->conn);
    return -1;
}
13297

13298

13299 13300 13301 13302 13303 13304 13305 13306 13307 13308 13309
/**
 * virStoragePoolNumOfVolumes:
 * @pool: pointer to storage pool
 *
 * Fetch the number of storage volumes within a pool
 *
 * Returns the number of storage pools, or -1 on failure
 */
int
virStoragePoolNumOfVolumes(virStoragePoolPtr pool)
{
13310
    VIR_DEBUG("pool=%p", pool);
13311

13312 13313
    virResetLastError();

13314
    virCheckStoragePoolReturn(pool, -1);
13315

13316
    if (pool->conn->storageDriver && pool->conn->storageDriver->storagePoolNumOfVolumes) {
13317
        int ret;
13318
        ret = pool->conn->storageDriver->storagePoolNumOfVolumes(pool);
13319 13320 13321 13322
        if (ret < 0)
            goto error;
        return ret;
    }
13323

13324
    virReportUnsupportedError();
13325 13326

error:
13327
    virDispatchError(pool->conn);
13328 13329 13330 13331 13332 13333 13334 13335 13336 13337 13338 13339 13340
    return -1;
}


/**
 * virStoragePoolListVolumes:
 * @pool: pointer to storage pool
 * @names: array in which to storage volume names
 * @maxnames: size of names array
 *
 * Fetch list of storage volume names, limiting to
 * at most maxnames.
 *
13341 13342
 * To list the volume objects directly, see virStoragePoolListAllVolumes().
 *
13343 13344 13345 13346 13347 13348 13349
 * Returns the number of names fetched, or -1 on error
 */
int
virStoragePoolListVolumes(virStoragePoolPtr pool,
                          char **const names,
                          int maxnames)
{
13350
    VIR_DEBUG("pool=%p, names=%p, maxnames=%d", pool, names, maxnames);
13351

13352 13353
    virResetLastError();

13354
    virCheckStoragePoolReturn(pool, -1);
13355 13356
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
13357

13358
    if (pool->conn->storageDriver && pool->conn->storageDriver->storagePoolListVolumes) {
13359
        int ret;
13360
        ret = pool->conn->storageDriver->storagePoolListVolumes(pool, names, maxnames);
13361 13362 13363 13364
        if (ret < 0)
            goto error;
        return ret;
    }
13365

13366
    virReportUnsupportedError();
13367 13368

error:
13369
    virDispatchError(pool->conn);
13370 13371 13372 13373 13374 13375
    return -1;
}


/**
 * virStorageVolGetConnect:
13376
 * @vol: pointer to a pool
13377 13378 13379 13380 13381 13382 13383 13384 13385 13386 13387 13388
 *
 * Provides the connection pointer associated with a storage volume.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do
 * not use this function.  Instead, store the connection and
 * the volume object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
13389
virStorageVolGetConnect(virStorageVolPtr vol)
13390
{
13391
    VIR_DEBUG("vol=%p", vol);
13392

13393 13394
    virResetLastError();

13395 13396
    virCheckStorageVolReturn(vol, NULL);

13397 13398 13399 13400 13401 13402 13403 13404 13405 13406 13407 13408
    return vol->conn;
}


/**
 * virStorageVolLookupByName:
 * @pool: pointer to storage pool
 * @name: name of storage volume
 *
 * Fetch a pointer to a storage volume based on its name
 * within a pool
 *
13409
 * Returns a storage volume, or NULL if not found / error
13410 13411 13412 13413 13414
 */
virStorageVolPtr
virStorageVolLookupByName(virStoragePoolPtr pool,
                          const char *name)
{
13415
    VIR_DEBUG("pool=%p, name=%s", pool, name);
13416

13417 13418
    virResetLastError();

13419
    virCheckStoragePoolReturn(pool, NULL);
13420
    virCheckNonNullArgGoto(name, error);
13421

13422
    if (pool->conn->storageDriver && pool->conn->storageDriver->storageVolLookupByName) {
13423
        virStorageVolPtr ret;
13424
        ret = pool->conn->storageDriver->storageVolLookupByName(pool, name);
13425 13426 13427 13428
        if (!ret)
            goto error;
        return ret;
    }
13429

13430
    virReportUnsupportedError();
13431 13432

error:
13433
    virDispatchError(pool->conn);
13434 13435 13436 13437 13438 13439 13440 13441 13442 13443 13444 13445
    return NULL;
}


/**
 * virStorageVolLookupByKey:
 * @conn: pointer to hypervisor connection
 * @key: globally unique key
 *
 * Fetch a pointer to a storage volume based on its
 * globally unique key
 *
13446
 * Returns a storage volume, or NULL if not found / error
13447 13448 13449 13450 13451
 */
virStorageVolPtr
virStorageVolLookupByKey(virConnectPtr conn,
                         const char *key)
{
13452
    VIR_DEBUG("conn=%p, key=%s", conn, key);
13453

13454 13455
    virResetLastError();

13456
    virCheckConnectReturn(conn, NULL);
13457
    virCheckNonNullArgGoto(key, error);
13458

13459
    if (conn->storageDriver && conn->storageDriver->storageVolLookupByKey) {
13460
        virStorageVolPtr ret;
13461
        ret = conn->storageDriver->storageVolLookupByKey(conn, key);
13462 13463 13464 13465
        if (!ret)
            goto error;
        return ret;
    }
13466

13467
    virReportUnsupportedError();
13468 13469

error:
13470
    virDispatchError(conn);
13471 13472 13473
    return NULL;
}

13474

13475 13476 13477 13478 13479 13480 13481 13482
/**
 * virStorageVolLookupByPath:
 * @conn: pointer to hypervisor connection
 * @path: locally unique path
 *
 * Fetch a pointer to a storage volume based on its
 * locally (host) unique path
 *
13483
 * Returns a storage volume, or NULL if not found / error
13484 13485 13486 13487 13488
 */
virStorageVolPtr
virStorageVolLookupByPath(virConnectPtr conn,
                          const char *path)
{
13489
    VIR_DEBUG("conn=%p, path=%s", conn, path);
13490

13491 13492
    virResetLastError();

13493
    virCheckConnectReturn(conn, NULL);
13494
    virCheckNonNullArgGoto(path, error);
13495

13496
    if (conn->storageDriver && conn->storageDriver->storageVolLookupByPath) {
13497
        virStorageVolPtr ret;
13498
        ret = conn->storageDriver->storageVolLookupByPath(conn, path);
13499 13500 13501 13502
        if (!ret)
            goto error;
        return ret;
    }
13503

13504
    virReportUnsupportedError();
13505 13506

error:
13507
    virDispatchError(conn);
13508 13509 13510 13511 13512 13513 13514 13515 13516 13517 13518
    return NULL;
}


/**
 * virStorageVolGetName:
 * @vol: pointer to storage volume
 *
 * Fetch the storage volume name. This is unique
 * within the scope of a pool
 *
13519
 * Returns the volume name, or NULL on error
13520 13521 13522 13523
 */
const char*
virStorageVolGetName(virStorageVolPtr vol)
{
13524
    VIR_DEBUG("vol=%p", vol);
13525

13526 13527
    virResetLastError();

13528 13529
    virCheckStorageVolReturn(vol, NULL);

13530
    return vol->name;
13531 13532 13533 13534 13535 13536 13537 13538
}


/**
 * virStorageVolGetKey:
 * @vol: pointer to storage volume
 *
 * Fetch the storage volume key. This is globally
13539
 * unique, so the same volume will have the same
13540 13541
 * key no matter what host it is accessed from
 *
13542
 * Returns the volume key, or NULL on error
13543 13544 13545 13546
 */
const char*
virStorageVolGetKey(virStorageVolPtr vol)
{
13547
    VIR_DEBUG("vol=%p", vol);
13548

13549 13550
    virResetLastError();

13551 13552
    virCheckStorageVolReturn(vol, NULL);

13553
    return vol->key;
13554 13555 13556 13557 13558 13559
}


/**
 * virStorageVolCreateXML:
 * @pool: pointer to storage pool
E
Eric Blake 已提交
13560
 * @xmlDesc: description of volume to create
13561
 * @flags: bitwise-OR of virStorageVolCreateFlags
13562 13563 13564
 *
 * Create a storage volume within a pool based
 * on an XML description. Not all pools support
13565 13566 13567 13568 13569 13570
 * creation of volumes.
 *
 * Since 1.0.1 VIR_STORAGE_VOL_CREATE_PREALLOC_METADATA
 * in flags can be used to get higher performance with
 * qcow2 image files which don't support full preallocation,
 * by creating a sparse image file with metadata.
13571
 *
13572
 * Returns the storage volume, or NULL on error
13573 13574 13575
 */
virStorageVolPtr
virStorageVolCreateXML(virStoragePoolPtr pool,
E
Eric Blake 已提交
13576
                       const char *xmlDesc,
13577 13578
                       unsigned int flags)
{
E
Eric Blake 已提交
13579
    VIR_DEBUG("pool=%p, xmlDesc=%s, flags=%x", pool, xmlDesc, flags);
13580

13581 13582
    virResetLastError();

13583
    virCheckStoragePoolReturn(pool, NULL);
E
Eric Blake 已提交
13584
    virCheckNonNullArgGoto(xmlDesc, error);
13585
    virCheckReadOnlyGoto(pool->conn->flags, error);
13586

13587
    if (pool->conn->storageDriver && pool->conn->storageDriver->storageVolCreateXML) {
13588
        virStorageVolPtr ret;
13589
        ret = pool->conn->storageDriver->storageVolCreateXML(pool, xmlDesc, flags);
13590 13591 13592 13593
        if (!ret)
            goto error;
        return ret;
    }
13594

13595
    virReportUnsupportedError();
13596 13597

error:
13598
    virDispatchError(pool->conn);
13599 13600 13601 13602
    return NULL;
}


13603 13604 13605
/**
 * virStorageVolCreateXMLFrom:
 * @pool: pointer to parent pool for the new volume
E
Eric Blake 已提交
13606
 * @xmlDesc: description of volume to create
13607
 * @clonevol: storage volume to use as input
13608
 * @flags: bitwise-OR of virStorageVolCreateFlags
13609 13610 13611 13612 13613 13614
 *
 * Create a storage volume in the parent pool, using the
 * 'clonevol' volume as input. Information for the new
 * volume (name, perms)  are passed via a typical volume
 * XML description.
 *
13615 13616 13617 13618 13619
 * Since 1.0.1 VIR_STORAGE_VOL_CREATE_PREALLOC_METADATA
 * in flags can be used to get higher performance with
 * qcow2 image files which don't support full preallocation,
 * by creating a sparse image file with metadata.
 *
13620
 * Returns the storage volume, or NULL on error
13621 13622 13623
 */
virStorageVolPtr
virStorageVolCreateXMLFrom(virStoragePoolPtr pool,
E
Eric Blake 已提交
13624
                           const char *xmlDesc,
13625 13626 13627
                           virStorageVolPtr clonevol,
                           unsigned int flags)
{
E
Eric Blake 已提交
13628 13629
    VIR_DEBUG("pool=%p, xmlDesc=%s, clonevol=%p, flags=%x",
              pool, xmlDesc, clonevol, flags);
13630 13631 13632

    virResetLastError();

13633
    virCheckStoragePoolReturn(pool, NULL);
13634
    virCheckStorageVolGoto(clonevol, error);
E
Eric Blake 已提交
13635
    virCheckNonNullArgGoto(xmlDesc, error);
13636
    virCheckReadOnlyGoto(pool->conn->flags | clonevol->conn->flags, error);
13637 13638

    if (pool->conn->storageDriver &&
13639
        pool->conn->storageDriver->storageVolCreateXMLFrom) {
13640
        virStorageVolPtr ret;
13641
        ret = pool->conn->storageDriver->storageVolCreateXMLFrom(pool, xmlDesc,
13642
                                                          clonevol, flags);
13643 13644 13645 13646 13647
        if (!ret)
            goto error;
        return ret;
    }

13648
    virReportUnsupportedError();
13649 13650

error:
13651
    virDispatchError(pool->conn);
13652 13653 13654 13655
    return NULL;
}


13656 13657 13658 13659 13660 13661
/**
 * virStorageVolDownload:
 * @vol: pointer to volume to download from
 * @stream: stream to use as output
 * @offset: position in @vol to start reading from
 * @length: limit on amount of data to download
13662
 * @flags: extra flags; not used yet, so callers should always pass 0
13663 13664 13665 13666 13667 13668 13669 13670 13671 13672 13673 13674 13675 13676 13677 13678 13679 13680 13681 13682
 *
 * Download the content of the volume as a stream. If @length
 * is zero, then the remaining contents of the volume after
 * @offset will be downloaded.
 *
 * This call sets up an asynchronous stream; subsequent use of
 * stream APIs is necessary to transfer the actual data,
 * determine how much data is successfully transferred, and
 * detect any errors. The results will be unpredictable if
 * another active stream is writing to the storage volume.
 *
 * Returns 0, or -1 upon error.
 */
int
virStorageVolDownload(virStorageVolPtr vol,
                      virStreamPtr stream,
                      unsigned long long offset,
                      unsigned long long length,
                      unsigned int flags)
{
E
Eric Blake 已提交
13683
    VIR_DEBUG("vol=%p, stream=%p, offset=%llu, length=%llu, flags=%x",
13684 13685 13686 13687
              vol, stream, offset, length, flags);

    virResetLastError();

13688
    virCheckStorageVolReturn(vol, -1);
13689 13690
    virCheckStreamGoto(stream, error);
    virCheckReadOnlyGoto(vol->conn->flags, error);
13691

13692 13693 13694 13695 13696
    if (vol->conn != stream->conn) {
        virReportInvalidArg(stream,
                            _("stream in %s must match connection of volume '%s'"),
                            __FUNCTION__, vol->name);
        goto error;
13697 13698 13699
    }

    if (vol->conn->storageDriver &&
13700
        vol->conn->storageDriver->storageVolDownload) {
13701
        int ret;
13702
        ret = vol->conn->storageDriver->storageVolDownload(vol,
O
Osier Yang 已提交
13703 13704 13705 13706
                                                           stream,
                                                           offset,
                                                           length,
                                                           flags);
13707 13708 13709 13710 13711
        if (ret < 0)
            goto error;
        return ret;
    }

13712
    virReportUnsupportedError();
13713 13714 13715 13716 13717 13718 13719 13720 13721 13722 13723 13724 13725

error:
    virDispatchError(vol->conn);
    return -1;
}


/**
 * virStorageVolUpload:
 * @vol: pointer to volume to upload
 * @stream: stream to use as input
 * @offset: position to start writing to
 * @length: limit on amount of data to upload
13726
 * @flags: extra flags; not used yet, so callers should always pass 0
13727 13728 13729 13730 13731 13732 13733 13734 13735 13736 13737 13738 13739 13740 13741 13742 13743 13744 13745 13746 13747 13748
 *
 * Upload new content to the volume from a stream. This call
 * will fail if @offset + @length exceeds the size of the
 * volume. Otherwise, if @length is non-zero, an error
 * will be raised if an attempt is made to upload greater
 * than @length bytes of data.
 *
 * This call sets up an asynchronous stream; subsequent use of
 * stream APIs is necessary to transfer the actual data,
 * determine how much data is successfully transferred, and
 * detect any errors. The results will be unpredictable if
 * another active stream is writing to the storage volume.
 *
 * Returns 0, or -1 upon error.
 */
int
virStorageVolUpload(virStorageVolPtr vol,
                    virStreamPtr stream,
                    unsigned long long offset,
                    unsigned long long length,
                    unsigned int flags)
{
E
Eric Blake 已提交
13749
    VIR_DEBUG("vol=%p, stream=%p, offset=%llu, length=%llu, flags=%x",
13750 13751 13752 13753
              vol, stream, offset, length, flags);

    virResetLastError();

13754
    virCheckStorageVolReturn(vol, -1);
13755 13756
    virCheckStreamGoto(stream, error);
    virCheckReadOnlyGoto(vol->conn->flags, error);
13757

13758 13759 13760 13761 13762
    if (vol->conn != stream->conn) {
        virReportInvalidArg(stream,
                            _("stream in %s must match connection of volume '%s'"),
                            __FUNCTION__, vol->name);
        goto error;
13763 13764 13765
    }

    if (vol->conn->storageDriver &&
13766
        vol->conn->storageDriver->storageVolUpload) {
13767
        int ret;
13768
        ret = vol->conn->storageDriver->storageVolUpload(vol,
13769 13770 13771 13772 13773 13774 13775 13776 13777
                                                  stream,
                                                  offset,
                                                  length,
                                                  flags);
        if (ret < 0)
            goto error;
        return ret;
    }

13778
    virReportUnsupportedError();
13779 13780 13781 13782 13783 13784 13785

error:
    virDispatchError(vol->conn);
    return -1;
}


13786 13787 13788
/**
 * virStorageVolDelete:
 * @vol: pointer to storage volume
13789
 * @flags: extra flags; not used yet, so callers should always pass 0
13790 13791 13792
 *
 * Delete the storage volume from the pool
 *
13793
 * Returns 0 on success, or -1 on error
13794 13795 13796 13797 13798 13799
 */
int
virStorageVolDelete(virStorageVolPtr vol,
                    unsigned int flags)
{
    virConnectPtr conn;
13800
    VIR_DEBUG("vol=%p, flags=%x", vol, flags);
13801

13802 13803
    virResetLastError();

13804
    virCheckStorageVolReturn(vol, -1);
13805
    conn = vol->conn;
13806

13807
    virCheckReadOnlyGoto(conn->flags, error);
13808

13809
    if (conn->storageDriver && conn->storageDriver->storageVolDelete) {
13810
        int ret;
13811
        ret = conn->storageDriver->storageVolDelete(vol, flags);
13812 13813 13814 13815
        if (ret < 0)
            goto error;
        return ret;
    }
13816

13817
    virReportUnsupportedError();
13818 13819

error:
13820
    virDispatchError(vol->conn);
13821 13822 13823 13824
    return -1;
}


13825 13826 13827
/**
 * virStorageVolWipe:
 * @vol: pointer to storage volume
13828
 * @flags: extra flags; not used yet, so callers should always pass 0
13829 13830 13831 13832 13833 13834 13835 13836 13837 13838
 *
 * Ensure data previously on a volume is not accessible to future reads
 *
 * Returns 0 on success, or -1 on error
 */
int
virStorageVolWipe(virStorageVolPtr vol,
                  unsigned int flags)
{
    virConnectPtr conn;
13839
    VIR_DEBUG("vol=%p, flags=%x", vol, flags);
13840 13841 13842

    virResetLastError();

13843
    virCheckStorageVolReturn(vol, -1);
13844
    conn = vol->conn;
13845

13846
    virCheckReadOnlyGoto(conn->flags, error);
13847

13848
    if (conn->storageDriver && conn->storageDriver->storageVolWipe) {
13849
        int ret;
13850
        ret = conn->storageDriver->storageVolWipe(vol, flags);
13851 13852 13853 13854 13855 13856
        if (ret < 0) {
            goto error;
        }
        return ret;
    }

13857
    virReportUnsupportedError();
13858 13859 13860 13861 13862 13863 13864

error:
    virDispatchError(vol->conn);
    return -1;
}


13865 13866 13867 13868 13869 13870 13871 13872 13873 13874 13875 13876 13877 13878 13879 13880 13881 13882 13883 13884 13885
/**
 * virStorageVolWipePattern:
 * @vol: pointer to storage volume
 * @algorithm: one of virStorageVolWipeAlgorithm
 * @flags: future flags, use 0 for now
 *
 * Similar to virStorageVolWipe, but one can choose
 * between different wiping algorithms.
 *
 * Returns 0 on success, or -1 on error.
 */
int
virStorageVolWipePattern(virStorageVolPtr vol,
                         unsigned int algorithm,
                         unsigned int flags)
{
    virConnectPtr conn;
    VIR_DEBUG("vol=%p, algorithm=%u, flags=%x", vol, algorithm, flags);

    virResetLastError();

13886
    virCheckStorageVolReturn(vol, -1);
13887
    conn = vol->conn;
13888

13889
    virCheckReadOnlyGoto(conn->flags, error);
13890

13891
    if (conn->storageDriver && conn->storageDriver->storageVolWipePattern) {
13892
        int ret;
13893
        ret = conn->storageDriver->storageVolWipePattern(vol, algorithm, flags);
13894 13895 13896 13897 13898 13899
        if (ret < 0) {
            goto error;
        }
        return ret;
    }

13900
    virReportUnsupportedError();
13901 13902 13903 13904 13905 13906

error:
    virDispatchError(vol->conn);
    return -1;
}

13907

13908 13909 13910 13911 13912
/**
 * virStorageVolFree:
 * @vol: pointer to storage volume
 *
 * Release the storage volume handle. The underlying
13913
 * storage volume continues to exist.
13914
 *
13915
 * Returns 0 on success, or -1 on error
13916 13917 13918 13919
 */
int
virStorageVolFree(virStorageVolPtr vol)
{
13920
    VIR_DEBUG("vol=%p", vol);
13921

13922 13923
    virResetLastError();

13924 13925
    virCheckStorageVolReturn(vol, -1);

13926
    virObjectUnref(vol);
13927
    return 0;
13928 13929 13930
}


13931 13932
/**
 * virStorageVolRef:
D
Daniel Veillard 已提交
13933
 * @vol: the vol to hold a reference on
13934 13935 13936 13937 13938 13939 13940 13941 13942 13943 13944
 *
 * Increment the reference count on the vol. For each
 * additional call to this method, there shall be a corresponding
 * call to virStorageVolFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a vol would increment
 * the reference count.
D
Daniel Veillard 已提交
13945 13946
 *
 * Returns 0 in case of success, -1 in case of failure.
13947 13948 13949 13950
 */
int
virStorageVolRef(virStorageVolPtr vol)
{
13951 13952
    VIR_DEBUG("vol=%p refs=%d", vol, vol ? vol->object.u.s.refs : 0);

13953 13954
    virResetLastError();

13955 13956
    virCheckStorageVolReturn(vol, -1);

13957
    virObjectRef(vol);
13958 13959 13960
    return 0;
}

13961

13962 13963 13964 13965 13966 13967 13968 13969
/**
 * virStorageVolGetInfo:
 * @vol: pointer to storage volume
 * @info: pointer at which to store info
 *
 * Fetches volatile information about the storage
 * volume such as its current allocation
 *
13970
 * Returns 0 on success, or -1 on failure
13971 13972 13973 13974 13975 13976
 */
int
virStorageVolGetInfo(virStorageVolPtr vol,
                     virStorageVolInfoPtr info)
{
    virConnectPtr conn;
13977
    VIR_DEBUG("vol=%p, info=%p", vol, info);
13978

13979 13980
    virResetLastError();

13981 13982 13983
    if (info)
        memset(info, 0, sizeof(*info));

13984
    virCheckStorageVolReturn(vol, -1);
13985
    virCheckNonNullArgGoto(info, error);
13986 13987 13988

    conn = vol->conn;

13989
    if (conn->storageDriver->storageVolGetInfo){
13990
        int ret;
13991
        ret = conn->storageDriver->storageVolGetInfo(vol, info);
13992 13993 13994 13995
        if (ret < 0)
            goto error;
        return ret;
    }
13996

13997
    virReportUnsupportedError();
13998 13999

error:
14000
    virDispatchError(vol->conn);
14001 14002 14003 14004 14005 14006 14007
    return -1;
}


/**
 * virStorageVolGetXMLDesc:
 * @vol: pointer to storage volume
14008
 * @flags: extra flags; not used yet, so callers should always pass 0
14009 14010 14011 14012
 *
 * Fetch an XML document describing all aspects of
 * the storage volume
 *
14013
 * Returns the XML document, or NULL on error
14014 14015 14016 14017 14018 14019
 */
char *
virStorageVolGetXMLDesc(virStorageVolPtr vol,
                        unsigned int flags)
{
    virConnectPtr conn;
14020
    VIR_DEBUG("vol=%p, flags=%x", vol, flags);
14021

14022 14023
    virResetLastError();

14024
    virCheckStorageVolReturn(vol, NULL);
14025 14026
    conn = vol->conn;

14027
    if (conn->storageDriver && conn->storageDriver->storageVolGetXMLDesc) {
14028
        char *ret;
14029
        ret = conn->storageDriver->storageVolGetXMLDesc(vol, flags);
14030 14031 14032 14033
        if (!ret)
            goto error;
        return ret;
    }
14034

14035
    virReportUnsupportedError();
14036

14037
error:
14038
    virDispatchError(vol->conn);
14039
    return NULL;
14040 14041 14042 14043 14044 14045 14046 14047 14048 14049 14050 14051 14052
}


/**
 * virStorageVolGetPath:
 * @vol: pointer to storage volume
 *
 * Fetch the storage volume path. Depending on the pool
 * configuration this is either persistent across hosts,
 * or dynamically assigned at pool startup. Consult
 * pool documentation for information on getting the
 * persistent naming
 *
14053 14054
 * Returns the storage volume path, or NULL on error. The
 * caller must free() the returned path after use.
14055 14056 14057 14058 14059
 */
char *
virStorageVolGetPath(virStorageVolPtr vol)
{
    virConnectPtr conn;
14060
    VIR_DEBUG("vol=%p", vol);
14061

14062 14063
    virResetLastError();

14064
    virCheckStorageVolReturn(vol, NULL);
14065 14066
    conn = vol->conn;

14067
    if (conn->storageDriver && conn->storageDriver->storageVolGetPath) {
14068
        char *ret;
14069
        ret = conn->storageDriver->storageVolGetPath(vol);
14070 14071 14072 14073
        if (!ret)
            goto error;
        return ret;
    }
14074

14075
    virReportUnsupportedError();
14076 14077

error:
14078
    virDispatchError(vol->conn);
14079 14080
    return NULL;
}
14081

14082

14083 14084 14085 14086 14087 14088 14089 14090 14091
/**
 * virStorageVolResize:
 * @vol: pointer to storage volume
 * @capacity: new capacity, in bytes
 * @flags: bitwise-OR of virStorageVolResizeFlags
 *
 * Changes the capacity of the storage volume @vol to @capacity. The
 * operation will fail if the new capacity requires allocation that would
 * exceed the remaining free space in the parent pool.  The contents of
14092 14093
 * the new capacity will appear as all zero bytes. The capacity value will
 * be rounded to the granularity supported by the hypervisor.
14094 14095 14096 14097 14098 14099 14100 14101
 *
 * Normally, the operation will attempt to affect capacity with a minimum
 * impact on allocation (that is, the default operation favors a sparse
 * resize).  If @flags contains VIR_STORAGE_VOL_RESIZE_ALLOCATE, then the
 * operation will ensure that allocation is sufficient for the new
 * capacity; this may make the operation take noticeably longer.
 *
 * Normally, the operation treats @capacity as the new size in bytes;
A
Alex Jia 已提交
14102
 * but if @flags contains VIR_STORAGE_VOL_RESIZE_DELTA, then @capacity
14103 14104 14105 14106 14107
 * represents the size difference to add to the current size.  It is
 * up to the storage pool implementation whether unaligned requests are
 * rounded up to the next valid boundary, or rejected.
 *
 * Normally, this operation should only be used to enlarge capacity;
A
Alex Jia 已提交
14108
 * but if @flags contains VIR_STORAGE_VOL_RESIZE_SHRINK, it is possible to
14109
 * attempt a reduction in capacity even though it might cause data loss.
A
Alex Jia 已提交
14110
 * If VIR_STORAGE_VOL_RESIZE_DELTA is also present, then @capacity is
E
Eric Blake 已提交
14111 14112 14113
 * subtracted from the current size; without it, @capacity represents
 * the absolute new size regardless of whether it is larger or smaller
 * than the current size.
14114 14115 14116 14117 14118
 *
 * Returns 0 on success, or -1 on error.
 */
int
virStorageVolResize(virStorageVolPtr vol,
E
Eric Blake 已提交
14119
                    unsigned long long capacity,
14120 14121 14122
                    unsigned int flags)
{
    virConnectPtr conn;
E
Eric Blake 已提交
14123
    VIR_DEBUG("vol=%p capacity=%llu flags=%x", vol, capacity, flags);
14124 14125 14126

    virResetLastError();

14127
    virCheckStorageVolReturn(vol, -1);
14128 14129
    conn = vol->conn;

14130
    virCheckReadOnlyGoto(conn->flags, error);
14131

E
Eric Blake 已提交
14132 14133 14134
    /* Zero capacity is only valid with either delta or shrink.  */
    if (capacity == 0 && !((flags & VIR_STORAGE_VOL_RESIZE_DELTA) ||
                           (flags & VIR_STORAGE_VOL_RESIZE_SHRINK))) {
14135
        virReportInvalidArg(capacity,
14136 14137
                            _("capacity in %s cannot be zero without 'delta' "
                              "or 'shrink' flags set"),
14138
                            __FUNCTION__);
14139 14140 14141
        goto error;
    }

14142
    if (conn->storageDriver && conn->storageDriver->storageVolResize) {
14143
        int ret;
14144
        ret = conn->storageDriver->storageVolResize(vol, capacity, flags);
14145 14146 14147 14148 14149
        if (ret < 0)
            goto error;
        return ret;
    }

14150
    virReportUnsupportedError();
14151 14152 14153 14154 14155

error:
    virDispatchError(vol->conn);
    return -1;
}
14156

14157

14158 14159 14160 14161
/**
 * virNodeNumOfDevices:
 * @conn: pointer to the hypervisor connection
 * @cap: capability name
14162
 * @flags: extra flags; not used yet, so callers should always pass 0
14163 14164 14165 14166 14167 14168 14169 14170 14171 14172 14173
 *
 * Provides the number of node devices.
 *
 * If the optional 'cap'  argument is non-NULL, then the count
 * will be restricted to devices with the specified capability
 *
 * Returns the number of node devices or -1 in case of error
 */
int
virNodeNumOfDevices(virConnectPtr conn, const char *cap, unsigned int flags)
{
14174
    VIR_DEBUG("conn=%p, cap=%s, flags=%x", conn, NULLSTR(cap), flags);
14175

14176 14177
    virResetLastError();

14178
    virCheckConnectReturn(conn, -1);
14179

14180
    if (conn->nodeDeviceDriver && conn->nodeDeviceDriver->nodeNumOfDevices) {
14181
        int ret;
14182
        ret = conn->nodeDeviceDriver->nodeNumOfDevices(conn, cap, flags);
14183 14184 14185 14186
        if (ret < 0)
            goto error;
        return ret;
    }
14187

14188
    virReportUnsupportedError();
14189 14190

error:
14191
    virDispatchError(conn);
14192 14193 14194
    return -1;
}

14195

14196 14197 14198 14199 14200 14201 14202 14203 14204 14205 14206 14207 14208 14209 14210 14211 14212 14213 14214 14215 14216 14217 14218 14219 14220 14221 14222 14223
/**
 * virConnectListAllNodeDevices:
 * @conn: Pointer to the hypervisor connection.
 * @devices: Pointer to a variable to store the array containing the node
 *           device objects or NULL if the list is not required (just returns
 *           number of node devices).
 * @flags: bitwise-OR of virConnectListAllNodeDevices.
 *
 * Collect the list of node devices, and allocate an array to store those
 * objects.
 *
 * Normally, all node devices are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted node devices.  The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a node device, and where all bits
 * within a group describe all possible node devices.
 *
 * Only one group of the @flags is provided to filter the node devices by
 * capability type, flags include:
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SYSTEM
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_PCI_DEV
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_USB_DEV
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_USB_INTERFACE
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_NET
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI_HOST
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI_TARGET
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_STORAGE
14224 14225
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_FC_HOST
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_VPORTS
14226
 *   VIR_CONNECT_LIST_NODE_DEVICES_CAP_SCSI_GENERIC
14227 14228 14229 14230 14231 14232 14233 14234 14235 14236 14237 14238 14239 14240 14241 14242 14243 14244 14245 14246
 *
 * Returns the number of node devices found or -1 and sets @devices to NULL in
 * case of error.  On success, the array stored into @devices is guaranteed to
 * have an extra allocated element set to NULL but not included in the return
 * count, to make iteration easier.  The caller is responsible for calling
 * virNodeDeviceFree() on each array element, then calling free() on
 * @devices.
 */
int
virConnectListAllNodeDevices(virConnectPtr conn,
                             virNodeDevicePtr **devices,
                             unsigned int flags)
{
    VIR_DEBUG("conn=%p, devices=%p, flags=%x", conn, devices, flags);

    virResetLastError();

    if (devices)
        *devices = NULL;

14247
    virCheckConnectReturn(conn, -1);
14248

14249 14250
    if (conn->nodeDeviceDriver &&
        conn->nodeDeviceDriver->connectListAllNodeDevices) {
14251
        int ret;
14252
        ret = conn->nodeDeviceDriver->connectListAllNodeDevices(conn, devices, flags);
14253 14254 14255 14256 14257
        if (ret < 0)
            goto error;
        return ret;
    }

14258
    virReportUnsupportedError();
14259 14260 14261 14262 14263

error:
    virDispatchError(conn);
    return -1;
}
14264

14265

14266 14267 14268 14269 14270 14271
/**
 * virNodeListDevices:
 * @conn: pointer to the hypervisor connection
 * @cap: capability name
 * @names: array to collect the list of node device names
 * @maxnames: size of @names
14272
 * @flags: extra flags; not used yet, so callers should always pass 0
14273 14274 14275
 *
 * Collect the list of node devices, and store their names in @names
 *
14276 14277
 * For more control over the results, see virConnectListAllNodeDevices().
 *
14278 14279 14280 14281 14282 14283 14284 14285 14286 14287 14288
 * If the optional 'cap'  argument is non-NULL, then the count
 * will be restricted to devices with the specified capability
 *
 * Returns the number of node devices found or -1 in case of error
 */
int
virNodeListDevices(virConnectPtr conn,
                   const char *cap,
                   char **const names, int maxnames,
                   unsigned int flags)
{
14289
    VIR_DEBUG("conn=%p, cap=%s, names=%p, maxnames=%d, flags=%x",
14290 14291
          conn, cap, names, maxnames, flags);

14292 14293
    virResetLastError();

14294
    virCheckConnectReturn(conn, -1);
14295 14296
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
14297

14298
    if (conn->nodeDeviceDriver && conn->nodeDeviceDriver->nodeListDevices) {
14299
        int ret;
14300
        ret = conn->nodeDeviceDriver->nodeListDevices(conn, cap, names, maxnames, flags);
14301 14302 14303 14304
        if (ret < 0)
            goto error;
        return ret;
    }
14305

14306
    virReportUnsupportedError();
14307 14308

error:
14309
    virDispatchError(conn);
14310 14311 14312 14313 14314 14315 14316 14317 14318 14319 14320 14321 14322
    return -1;
}


/**
 * virNodeDeviceLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: unique device name
 *
 * Lookup a node device by its name.
 *
 * Returns a virNodeDevicePtr if found, NULL otherwise.
 */
14323 14324
virNodeDevicePtr
virNodeDeviceLookupByName(virConnectPtr conn, const char *name)
14325
{
14326
    VIR_DEBUG("conn=%p, name=%p", conn, name);
14327

14328 14329
    virResetLastError();

14330
    virCheckConnectReturn(conn, NULL);
14331
    virCheckNonNullArgGoto(name, error);
14332

14333
    if (conn->nodeDeviceDriver && conn->nodeDeviceDriver->nodeDeviceLookupByName) {
14334
        virNodeDevicePtr ret;
14335
        ret = conn->nodeDeviceDriver->nodeDeviceLookupByName(conn, name);
14336 14337 14338 14339
        if (!ret)
            goto error;
        return ret;
    }
14340

14341
    virReportUnsupportedError();
14342 14343

error:
14344
    virDispatchError(conn);
14345 14346 14347
    return NULL;
}

14348

14349 14350 14351 14352 14353 14354 14355 14356 14357 14358 14359 14360 14361 14362 14363 14364 14365 14366 14367 14368 14369
/**
 * virNodeDeviceLookupSCSIHostByWWN:
 * @conn: pointer to the hypervisor connection
 * @wwnn: WWNN of the SCSI Host.
 * @wwpn: WWPN of the SCSI Host.
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Lookup SCSI Host which is capable with 'fc_host' by its WWNN and WWPN.
 *
 * Returns a virNodeDevicePtr if found, NULL otherwise.
 */
virNodeDevicePtr
virNodeDeviceLookupSCSIHostByWWN(virConnectPtr conn,
                                 const char *wwnn,
                                 const char *wwpn,
                                 unsigned int flags)
{
    VIR_DEBUG("conn=%p, wwnn=%p, wwpn=%p, flags=%x", conn, wwnn, wwpn, flags);

    virResetLastError();

14370
    virCheckConnectReturn(conn, NULL);
14371 14372 14373
    virCheckNonNullArgGoto(wwnn, error);
    virCheckNonNullArgGoto(wwpn, error);

14374 14375
    if (conn->nodeDeviceDriver &&
        conn->nodeDeviceDriver->nodeDeviceLookupSCSIHostByWWN) {
14376
        virNodeDevicePtr ret;
14377
        ret = conn->nodeDeviceDriver->nodeDeviceLookupSCSIHostByWWN(conn, wwnn,
14378 14379 14380 14381 14382 14383
                                                             wwpn, flags);
        if (!ret)
            goto error;
        return ret;
    }

14384
    virReportUnsupportedError();
14385 14386 14387 14388 14389

error:
    virDispatchError(conn);
    return NULL;
}
14390

14391

14392 14393 14394
/**
 * virNodeDeviceGetXMLDesc:
 * @dev: pointer to the node device
14395
 * @flags: extra flags; not used yet, so callers should always pass 0
14396 14397 14398 14399
 *
 * Fetch an XML document describing all aspects of
 * the device.
 *
14400
 * Returns the XML document, or NULL on error
14401
 */
14402 14403
char *
virNodeDeviceGetXMLDesc(virNodeDevicePtr dev, unsigned int flags)
14404
{
E
Eric Blake 已提交
14405
    VIR_DEBUG("dev=%p, conn=%p, flags=%x", dev, dev ? dev->conn : NULL, flags);
14406

14407 14408
    virResetLastError();

14409
    virCheckNodeDeviceReturn(dev, NULL);
14410

14411
    if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceGetXMLDesc) {
14412
        char *ret;
14413
        ret = dev->conn->nodeDeviceDriver->nodeDeviceGetXMLDesc(dev, flags);
14414 14415 14416 14417
        if (!ret)
            goto error;
        return ret;
    }
14418

14419
    virReportUnsupportedError();
14420 14421

error:
14422
    virDispatchError(dev->conn);
14423 14424 14425 14426 14427 14428 14429 14430
    return NULL;
}


/**
 * virNodeDeviceGetName:
 * @dev: the device
 *
D
Daniel Veillard 已提交
14431 14432 14433
 * Just return the device name
 *
 * Returns the device name or NULL in case of error
14434
 */
14435 14436
const char *
virNodeDeviceGetName(virNodeDevicePtr dev)
14437
{
14438
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14439

14440 14441
    virResetLastError();

14442
    virCheckNodeDeviceReturn(dev, NULL);
14443 14444 14445 14446

    return dev->name;
}

14447

14448 14449 14450 14451
/**
 * virNodeDeviceGetParent:
 * @dev: the device
 *
D
Daniel Veillard 已提交
14452 14453
 * Accessor for the parent of the device
 *
14454 14455
 * Returns the name of the device's parent, or NULL if an
 * error occurred or when the device has no parent.
14456
 */
14457 14458
const char *
virNodeDeviceGetParent(virNodeDevicePtr dev)
14459
{
14460
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14461

14462 14463
    virResetLastError();

14464
    virCheckNodeDeviceReturn(dev, NULL);
14465

14466
    if (!dev->parent) {
14467 14468
        if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceGetParent) {
            dev->parent = dev->conn->nodeDeviceDriver->nodeDeviceGetParent(dev);
14469
        } else {
14470
            virReportUnsupportedError();
14471
            virDispatchError(dev->conn);
14472 14473 14474 14475
            return NULL;
        }
    }
    return dev->parent;
14476 14477
}

14478

14479 14480 14481 14482
/**
 * virNodeDeviceNumOfCaps:
 * @dev: the device
 *
D
Daniel Veillard 已提交
14483 14484
 * Accessor for the number of capabilities supported by the device.
 *
14485 14486
 * Returns the number of capabilities supported by the device or -1
 * in case of error.
14487
 */
14488 14489
int
virNodeDeviceNumOfCaps(virNodeDevicePtr dev)
14490
{
14491
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14492

14493 14494
    virResetLastError();

14495
    virCheckNodeDeviceReturn(dev, -1);
14496

14497
    if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceNumOfCaps) {
14498
        int ret;
14499
        ret = dev->conn->nodeDeviceDriver->nodeDeviceNumOfCaps(dev);
14500 14501 14502 14503
        if (ret < 0)
            goto error;
        return ret;
    }
14504

14505
    virReportUnsupportedError();
14506 14507

error:
14508
    virDispatchError(dev->conn);
14509 14510 14511
    return -1;
}

14512

14513 14514 14515 14516 14517 14518 14519 14520
/**
 * virNodeDeviceListCaps:
 * @dev: the device
 * @names: array to collect the list of capability names
 * @maxnames: size of @names
 *
 * Lists the names of the capabilities supported by the device.
 *
14521 14522
 * Returns the number of capability names listed in @names or -1
 * in case of error.
14523
 */
14524 14525 14526 14527
int
virNodeDeviceListCaps(virNodeDevicePtr dev,
                      char **const names,
                      int maxnames)
14528
{
14529
    VIR_DEBUG("dev=%p, conn=%p, names=%p, maxnames=%d",
14530 14531
          dev, dev ? dev->conn : NULL, names, maxnames);

14532 14533
    virResetLastError();

14534
    virCheckNodeDeviceReturn(dev, -1);
14535 14536
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
14537

14538
    if (dev->conn->nodeDeviceDriver && dev->conn->nodeDeviceDriver->nodeDeviceListCaps) {
14539
        int ret;
14540
        ret = dev->conn->nodeDeviceDriver->nodeDeviceListCaps(dev, names, maxnames);
14541 14542 14543 14544
        if (ret < 0)
            goto error;
        return ret;
    }
14545

14546
    virReportUnsupportedError();
14547 14548

error:
14549
    virDispatchError(dev->conn);
14550 14551 14552 14553 14554 14555 14556 14557 14558 14559 14560 14561 14562
    return -1;
}


/**
 * virNodeDeviceFree:
 * @dev: pointer to the node device
 *
 * Drops a reference to the node device, freeing it if
 * this was the last reference.
 *
 * Returns the 0 for success, -1 for error.
 */
14563 14564
int
virNodeDeviceFree(virNodeDevicePtr dev)
14565
{
14566
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14567

14568 14569
    virResetLastError();

14570 14571
    virCheckNodeDeviceReturn(dev, -1);

14572
    virObjectUnref(dev);
14573
    return 0;
14574 14575 14576
}


14577 14578
/**
 * virNodeDeviceRef:
D
Daniel Veillard 已提交
14579
 * @dev: the dev to hold a reference on
14580 14581 14582 14583 14584 14585 14586 14587 14588 14589 14590
 *
 * Increment the reference count on the dev. For each
 * additional call to this method, there shall be a corresponding
 * call to virNodeDeviceFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using a dev would increment
 * the reference count.
D
Daniel Veillard 已提交
14591 14592
 *
 * Returns 0 in case of success, -1 in case of failure.
14593 14594 14595 14596
 */
int
virNodeDeviceRef(virNodeDevicePtr dev)
{
14597 14598
    VIR_DEBUG("dev=%p refs=%d", dev, dev ? dev->object.u.s.refs : 0);

14599 14600
    virResetLastError();

14601 14602
    virCheckNodeDeviceReturn(dev, -1);

14603
    virObjectRef(dev);
14604 14605 14606
    return 0;
}

14607

14608
/**
D
Daniel Veillard 已提交
14609
 * virNodeDeviceDettach:
14610 14611 14612 14613 14614 14615 14616 14617 14618 14619 14620 14621 14622 14623
 * @dev: pointer to the node device
 *
 * Dettach the node device from the node itself so that it may be
 * assigned to a guest domain.
 *
 * Depending on the hypervisor, this may involve operations such
 * as unbinding any device drivers from the device, binding the
 * device to a dummy device driver and resetting the device.
 *
 * If the device is currently in use by the node, this method may
 * fail.
 *
 * Once the device is not assigned to any guest, it may be re-attached
 * to the node using the virNodeDeviceReattach() method.
D
Daniel Veillard 已提交
14624
 *
14625 14626 14627 14628 14629
 * If the caller needs control over which backend driver will be used
 * during PCI device assignment (to use something other than the
 * default, for example VFIO), the newer virNodeDeviceDetachFlags()
 * API should be used instead.
 *
D
Daniel Veillard 已提交
14630
 * Returns 0 in case of success, -1 in case of failure.
14631 14632 14633 14634
 */
int
virNodeDeviceDettach(virNodeDevicePtr dev)
{
14635
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14636 14637 14638

    virResetLastError();

14639
    virCheckNodeDeviceReturn(dev, -1);
14640
    virCheckReadOnlyGoto(dev->conn->flags, error);
14641

14642 14643
    if (dev->conn->driver->nodeDeviceDettach) {
        int ret;
14644
        ret = dev->conn->driver->nodeDeviceDettach(dev);
14645 14646 14647 14648 14649
        if (ret < 0)
            goto error;
        return ret;
    }

14650
    virReportUnsupportedError();
14651 14652

error:
14653
    virDispatchError(dev->conn);
14654
    return -1;
14655 14656
}

14657

14658 14659 14660 14661 14662 14663 14664 14665 14666 14667 14668 14669 14670 14671 14672 14673 14674 14675 14676 14677 14678 14679 14680 14681 14682 14683 14684 14685 14686 14687 14688 14689 14690 14691 14692 14693 14694 14695
/**
 * virNodeDeviceDetachFlags:
 * @dev: pointer to the node device
 * @driverName: name of backend driver that will be used
 *              for later device assignment to a domain. NULL
 *              means "use the hypervisor default driver"
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Detach the node device from the node itself so that it may be
 * assigned to a guest domain.
 *
 * Depending on the hypervisor, this may involve operations such as
 * unbinding any device drivers from the device, binding the device to
 * a dummy device driver and resetting the device. Different backend
 * drivers expect the device to be bound to different dummy
 * devices. For example, QEMU's "kvm" backend driver (the default)
 * expects the device to be bound to "pci-stub", but its "vfio"
 * backend driver expects the device to be bound to "vfio-pci".
 *
 * If the device is currently in use by the node, this method may
 * fail.
 *
 * Once the device is not assigned to any guest, it may be re-attached
 * to the node using the virNodeDeviceReAttach() method.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virNodeDeviceDetachFlags(virNodeDevicePtr dev,
                         const char *driverName,
                         unsigned int flags)
{
    VIR_DEBUG("dev=%p, conn=%p driverName=%s flags=%x",
              dev, dev ? dev->conn : NULL,
              driverName ? driverName : "(default)", flags);

    virResetLastError();

14696
    virCheckNodeDeviceReturn(dev, -1);
14697
    virCheckReadOnlyGoto(dev->conn->flags, error);
14698 14699 14700 14701 14702 14703 14704 14705 14706

    if (dev->conn->driver->nodeDeviceDetachFlags) {
        int ret;
        ret = dev->conn->driver->nodeDeviceDetachFlags(dev, driverName, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

14707
    virReportUnsupportedError();
14708 14709 14710 14711 14712 14713

error:
    virDispatchError(dev->conn);
    return -1;
}

14714

14715 14716 14717 14718 14719 14720 14721 14722 14723 14724 14725 14726
/**
 * virNodeDeviceReAttach:
 * @dev: pointer to the node device
 *
 * Re-attach a previously dettached node device to the node so that it
 * may be used by the node again.
 *
 * Depending on the hypervisor, this may involve operations such
 * as resetting the device, unbinding it from a dummy device driver
 * and binding it to its appropriate driver.
 *
 * If the device is currently in use by a guest, this method may fail.
D
Daniel Veillard 已提交
14727 14728
 *
 * Returns 0 in case of success, -1 in case of failure.
14729 14730 14731 14732
 */
int
virNodeDeviceReAttach(virNodeDevicePtr dev)
{
14733
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14734 14735 14736

    virResetLastError();

14737
    virCheckNodeDeviceReturn(dev, -1);
14738
    virCheckReadOnlyGoto(dev->conn->flags, error);
14739

14740 14741
    if (dev->conn->driver->nodeDeviceReAttach) {
        int ret;
14742
        ret = dev->conn->driver->nodeDeviceReAttach(dev);
14743 14744 14745 14746 14747
        if (ret < 0)
            goto error;
        return ret;
    }

14748
    virReportUnsupportedError();
14749 14750

error:
14751
    virDispatchError(dev->conn);
14752
    return -1;
14753 14754
}

14755

14756 14757 14758 14759 14760 14761 14762 14763 14764 14765 14766 14767 14768 14769
/**
 * virNodeDeviceReset:
 * @dev: pointer to the node device
 *
 * Reset a previously dettached node device to the node before or
 * after assigning it to a guest.
 *
 * The exact reset semantics depends on the hypervisor and device
 * type but, for example, KVM will attempt to reset PCI devices with
 * a Function Level Reset, Secondary Bus Reset or a Power Management
 * D-State reset.
 *
 * If the reset will affect other devices which are currently in use,
 * this function may fail.
D
Daniel Veillard 已提交
14770 14771
 *
 * Returns 0 in case of success, -1 in case of failure.
14772 14773 14774 14775
 */
int
virNodeDeviceReset(virNodeDevicePtr dev)
{
14776
    VIR_DEBUG("dev=%p, conn=%p", dev, dev ? dev->conn : NULL);
14777 14778 14779

    virResetLastError();

14780
    virCheckNodeDeviceReturn(dev, -1);
14781
    virCheckReadOnlyGoto(dev->conn->flags, error);
14782

14783 14784
    if (dev->conn->driver->nodeDeviceReset) {
        int ret;
14785
        ret = dev->conn->driver->nodeDeviceReset(dev);
14786 14787 14788 14789 14790
        if (ret < 0)
            goto error;
        return ret;
    }

14791
    virReportUnsupportedError();
14792 14793

error:
14794
    virDispatchError(dev->conn);
14795
    return -1;
14796 14797
}

14798

14799 14800 14801 14802
/**
 * virNodeDeviceCreateXML:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: string containing an XML description of the device to be created
14803
 * @flags: extra flags; not used yet, so callers should always pass 0
14804 14805 14806 14807 14808 14809 14810 14811 14812 14813 14814
 *
 * Create a new device on the VM host machine, for example, virtual
 * HBAs created using vport_create.
 *
 * Returns a node device object if successful, NULL in case of failure
 */
virNodeDevicePtr
virNodeDeviceCreateXML(virConnectPtr conn,
                       const char *xmlDesc,
                       unsigned int flags)
{
14815
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
14816 14817 14818

    virResetLastError();

14819
    virCheckConnectReturn(conn, NULL);
14820
    virCheckReadOnlyGoto(conn->flags, error);
14821
    virCheckNonNullArgGoto(xmlDesc, error);
14822

14823 14824 14825
    if (conn->nodeDeviceDriver &&
        conn->nodeDeviceDriver->nodeDeviceCreateXML) {
        virNodeDevicePtr dev = conn->nodeDeviceDriver->nodeDeviceCreateXML(conn, xmlDesc, flags);
14826 14827 14828 14829 14830
        if (dev == NULL)
            goto error;
        return dev;
    }

14831
    virReportUnsupportedError();
14832 14833

error:
14834
    virDispatchError(conn);
14835 14836 14837 14838 14839 14840 14841 14842
    return NULL;
}


/**
 * virNodeDeviceDestroy:
 * @dev: a device object
 *
14843 14844 14845
 * Destroy the device object. The virtual device (only works for vHBA
 * currently) is removed from the host operating system.  This function
 * may require privileged access.
14846 14847 14848 14849 14850 14851
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNodeDeviceDestroy(virNodeDevicePtr dev)
{
14852
    VIR_DEBUG("dev=%p", dev);
14853 14854 14855

    virResetLastError();

14856
    virCheckNodeDeviceReturn(dev, -1);
14857
    virCheckReadOnlyGoto(dev->conn->flags, error);
14858

14859 14860 14861
    if (dev->conn->nodeDeviceDriver &&
        dev->conn->nodeDeviceDriver->nodeDeviceDestroy) {
        int retval = dev->conn->nodeDeviceDriver->nodeDeviceDestroy(dev);
14862 14863 14864 14865 14866 14867 14868
        if (retval < 0) {
            goto error;
        }

        return 0;
    }

14869
    virReportUnsupportedError();
14870 14871

error:
14872
    virDispatchError(dev->conn);
14873 14874 14875 14876
    return -1;
}


14877 14878 14879 14880 14881 14882 14883 14884 14885
/*
 * Domain Event Notification
 */

/**
 * virConnectDomainEventRegister:
 * @conn: pointer to the connection
 * @cb: callback to the function handling domain events
 * @opaque: opaque data to pass on to the callback
D
Daniel Veillard 已提交
14886
 * @freecb: optional function to deallocate opaque when not used anymore
14887
 *
14888
 * Adds a callback to receive notifications of domain lifecycle events
E
Eric Blake 已提交
14889 14890 14891
 * occurring on a connection.  This function requires that an event loop
 * has been previously registered with virEventRegisterImpl() or
 * virEventRegisterDefaultImpl().
14892 14893
 *
 * Use of this method is no longer recommended. Instead applications
14894
 * should try virConnectDomainEventRegisterAny() which has a more flexible
E
Eric Blake 已提交
14895
 * API contract.
14896
 *
14897 14898
 * The virDomainPtr object handle passed into the callback upon delivery
 * of an event is only valid for the duration of execution of the callback.
14899 14900
 * If the callback wishes to keep the domain object after the callback returns,
 * it shall take a reference to it, by calling virDomainRef.
14901 14902 14903
 * The reference can be released once the object is no longer required
 * by calling virDomainFree.
 *
14904 14905 14906
 * Returns 0 on success, -1 on failure.  Older versions of some hypervisors
 * sometimes returned a positive number on success, but without any reliable
 * semantics on what that number represents.
14907 14908 14909 14910
 */
int
virConnectDomainEventRegister(virConnectPtr conn,
                              virConnectDomainEventCallback cb,
14911 14912
                              void *opaque,
                              virFreeCallback freecb)
14913
{
14914
    VIR_DEBUG("conn=%p, cb=%p, opaque=%p, freecb=%p", conn, cb, opaque, freecb);
14915
    virResetLastError();
14916

14917
    virCheckConnectReturn(conn, -1);
14918
    virCheckNonNullArgGoto(cb, error);
14919

14920
    if (conn->driver && conn->driver->connectDomainEventRegister) {
14921
        int ret;
14922
        ret = conn->driver->connectDomainEventRegister(conn, cb, opaque, freecb);
14923 14924 14925 14926 14927
        if (ret < 0)
            goto error;
        return ret;
    }

14928
    virReportUnsupportedError();
14929
error:
14930
    virDispatchError(conn);
14931 14932 14933
    return -1;
}

14934

14935 14936 14937 14938 14939
/**
 * virConnectDomainEventDeregister:
 * @conn: pointer to the connection
 * @cb: callback to the function handling domain events
 *
14940 14941
 * Removes a callback previously registered with the
 * virConnectDomainEventRegister() function.
14942 14943
 *
 * Use of this method is no longer recommended. Instead applications
14944
 * should try virConnectDomainEventDeregisterAny() which has a more flexible
14945
 * API contract
14946
 *
14947 14948 14949
 * Returns 0 on success, -1 on failure.  Older versions of some hypervisors
 * sometimes returned a positive number on success, but without any reliable
 * semantics on what that number represents.
14950 14951 14952 14953 14954
 */
int
virConnectDomainEventDeregister(virConnectPtr conn,
                                virConnectDomainEventCallback cb)
{
14955
    VIR_DEBUG("conn=%p, cb=%p", conn, cb);
14956 14957

    virResetLastError();
14958

14959
    virCheckConnectReturn(conn, -1);
14960 14961
    virCheckNonNullArgGoto(cb, error);

14962
    if (conn->driver && conn->driver->connectDomainEventDeregister) {
14963
        int ret;
14964
        ret = conn->driver->connectDomainEventDeregister(conn, cb);
14965 14966 14967
        if (ret < 0)
            goto error;
        return ret;
14968 14969
    }

14970
    virReportUnsupportedError();
14971
error:
14972
    virDispatchError(conn);
14973 14974
    return -1;
}
14975

14976

14977 14978 14979 14980 14981 14982 14983 14984 14985 14986 14987 14988 14989
/**
 * virSecretGetConnect:
 * @secret: A virSecret secret
 *
 * Provides the connection pointer associated with a secret.  The reference
 * counter on the connection is not increased by this call.
 *
 * WARNING: When writing libvirt bindings in other languages, do not use this
 * function.  Instead, store the connection and the secret object together.
 *
 * Returns the virConnectPtr or NULL in case of failure.
 */
virConnectPtr
14990
virSecretGetConnect(virSecretPtr secret)
14991
{
14992
    VIR_DEBUG("secret=%p", secret);
14993 14994 14995

    virResetLastError();

14996 14997
    virCheckSecretReturn(secret, NULL);

14998 14999 15000
    return secret->conn;
}

15001

15002 15003 15004 15005 15006 15007 15008 15009 15010 15011 15012 15013 15014 15015 15016
/**
 * virConnectNumOfSecrets:
 * @conn: virConnect connection
 *
 * Fetch number of currently defined secrets.
 *
 * Returns the number currently defined secrets.
 */
int
virConnectNumOfSecrets(virConnectPtr conn)
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

15017
    virCheckConnectReturn(conn, -1);
15018 15019

    if (conn->secretDriver != NULL &&
15020
        conn->secretDriver->connectNumOfSecrets != NULL) {
15021 15022
        int ret;

15023
        ret = conn->secretDriver->connectNumOfSecrets(conn);
15024 15025 15026 15027 15028
        if (ret < 0)
            goto error;
        return ret;
    }

15029
    virReportUnsupportedError();
15030 15031

error:
15032
    virDispatchError(conn);
15033 15034 15035
    return -1;
}

15036

15037 15038 15039 15040 15041 15042 15043 15044 15045 15046 15047 15048 15049 15050 15051 15052 15053 15054 15055 15056 15057 15058 15059 15060 15061 15062 15063 15064 15065 15066 15067 15068 15069 15070 15071 15072 15073 15074 15075 15076 15077 15078 15079 15080 15081
/**
 * virConnectListAllSecrets:
 * @conn: Pointer to the hypervisor connection.
 * @secrets: Pointer to a variable to store the array containing the secret
 *           objects or NULL if the list is not required (just returns the
 *           number of secrets).
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Collect the list of secrets, and allocate an array to store those
 * objects.
 *
 * Normally, all secrets are returned; however, @flags can be used to
 * filter the results for a smaller list of targeted secrets. The valid
 * flags are divided into groups, where each group contains bits that
 * describe mutually exclusive attributes of a secret, and where all bits
 * within a group describe all possible secrets.
 *
 * The first group of @flags is used to filter secrets by its storage
 * location. Flag VIR_CONNECT_LIST_SECRETS_EPHEMERAL selects secrets that
 * are kept only in memory. Flag VIR_CONNECT_LIST_SECRETS_NO_EPHEMERAL
 * selects secrets that are kept in persistent storage.
 *
 * The second group of @flags is used to filter secrets by privacy. Flag
 * VIR_CONNECT_LIST_SECRETS_PRIVATE seclets secrets that are never revealed
 * to any caller of libvirt nor to any other node. Flag
 * VIR_CONNECT_LIST_SECRETS_NO_PRIVATE selects non-private secrets.
 *
 * Returns the number of secrets found or -1 and sets @secrets to NULL in case
 * of error.  On success, the array stored into @secrets is guaranteed to
 * have an extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virSecretFree() on each array element, then calling free() on @secrets.
 */
int
virConnectListAllSecrets(virConnectPtr conn,
                         virSecretPtr **secrets,
                         unsigned int flags)
{
    VIR_DEBUG("conn=%p, secrets=%p, flags=%x", conn, secrets, flags);

    virResetLastError();

    if (secrets)
        *secrets = NULL;

15082
    virCheckConnectReturn(conn, -1);
15083 15084

    if (conn->secretDriver &&
15085
        conn->secretDriver->connectListAllSecrets) {
15086
        int ret;
15087
        ret = conn->secretDriver->connectListAllSecrets(conn, secrets, flags);
15088 15089 15090 15091 15092
        if (ret < 0)
            goto error;
        return ret;
    }

15093
    virReportUnsupportedError();
15094 15095 15096 15097 15098 15099

error:
    virDispatchError(conn);
    return -1;
}

15100

15101 15102 15103 15104 15105 15106 15107 15108 15109 15110 15111 15112 15113 15114 15115 15116 15117
/**
 * virConnectListSecrets:
 * @conn: virConnect connection
 * @uuids: Pointer to an array to store the UUIDs
 * @maxuuids: size of the array.
 *
 * List UUIDs of defined secrets, store pointers to names in uuids.
 *
 * Returns the number of UUIDs provided in the array, or -1 on failure.
 */
int
virConnectListSecrets(virConnectPtr conn, char **uuids, int maxuuids)
{
    VIR_DEBUG("conn=%p, uuids=%p, maxuuids=%d", conn, uuids, maxuuids);

    virResetLastError();

15118
    virCheckConnectReturn(conn, -1);
15119 15120
    virCheckNonNullArgGoto(uuids, error);
    virCheckNonNegativeArgGoto(maxuuids, error);
15121

15122
    if (conn->secretDriver != NULL && conn->secretDriver->connectListSecrets != NULL) {
15123 15124
        int ret;

15125
        ret = conn->secretDriver->connectListSecrets(conn, uuids, maxuuids);
15126 15127 15128 15129 15130
        if (ret < 0)
            goto error;
        return ret;
    }

15131
    virReportUnsupportedError();
15132 15133

error:
15134
    virDispatchError(conn);
15135 15136 15137
    return -1;
}

15138

15139
/**
15140 15141 15142
 * virSecretLookupByUUID:
 * @conn: pointer to the hypervisor connection
 * @uuid: the raw UUID for the secret
15143
 *
15144 15145
 * Try to lookup a secret on the given hypervisor based on its UUID.
 * Uses the 16 bytes of raw data to describe the UUID
15146
 *
15147 15148
 * Returns a new secret object or NULL in case of failure.  If the
 * secret cannot be found, then VIR_ERR_NO_SECRET error is raised.
15149 15150
 */
virSecretPtr
15151
virSecretLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
15152
{
15153
    VIR_UUID_DEBUG(conn, uuid);
15154 15155 15156

    virResetLastError();

15157
    virCheckConnectReturn(conn, NULL);
15158
    virCheckNonNullArgGoto(uuid, error);
15159

15160
    if (conn->secretDriver &&
15161
        conn->secretDriver->secretLookupByUUID) {
15162
        virSecretPtr ret;
15163
        ret = conn->secretDriver->secretLookupByUUID(conn, uuid);
15164
        if (!ret)
15165 15166 15167 15168
            goto error;
        return ret;
    }

15169
    virReportUnsupportedError();
15170 15171

error:
15172
    virDispatchError(conn);
15173 15174 15175
    return NULL;
}

15176

15177 15178 15179 15180 15181 15182 15183 15184 15185 15186 15187 15188 15189 15190 15191
/**
 * virSecretLookupByUUIDString:
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the secret
 *
 * Try to lookup a secret on the given hypervisor based on its UUID.
 * Uses the printable string value to describe the UUID
 *
 * Returns a new secret object or NULL in case of failure.  If the
 * secret cannot be found, then VIR_ERR_NO_SECRET error is raised.
 */
virSecretPtr
virSecretLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
    unsigned char uuid[VIR_UUID_BUFLEN];
15192
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
15193 15194 15195

    virResetLastError();

15196
    virCheckConnectReturn(conn, NULL);
15197
    virCheckNonNullArgGoto(uuidstr, error);
15198 15199

    if (virUUIDParse(uuidstr, uuid) < 0) {
15200 15201 15202
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
15203 15204 15205 15206 15207 15208
        goto error;
    }

    return virSecretLookupByUUID(conn, &uuid[0]);

error:
15209
    virDispatchError(conn);
15210 15211 15212 15213
    return NULL;
}


15214 15215 15216 15217 15218 15219 15220 15221 15222 15223 15224 15225 15226 15227 15228 15229 15230 15231
/**
 * virSecretLookupByUsage:
 * @conn: pointer to the hypervisor connection
 * @usageType: the type of secret usage
 * @usageID: identifier of the object using the secret
 *
 * Try to lookup a secret on the given hypervisor based on its usage
 * The usageID is unique within the set of secrets sharing the
 * same usageType value.
 *
 * Returns a new secret object or NULL in case of failure.  If the
 * secret cannot be found, then VIR_ERR_NO_SECRET error is raised.
 */
virSecretPtr
virSecretLookupByUsage(virConnectPtr conn,
                       int usageType,
                       const char *usageID)
{
15232
    VIR_DEBUG("conn=%p, usageType=%d usageID=%s", conn, usageType, NULLSTR(usageID));
15233 15234 15235

    virResetLastError();

15236
    virCheckConnectReturn(conn, NULL);
15237
    virCheckNonNullArgGoto(usageID, error);
15238 15239

    if (conn->secretDriver &&
15240
        conn->secretDriver->secretLookupByUsage) {
15241
        virSecretPtr ret;
15242
        ret = conn->secretDriver->secretLookupByUsage(conn, usageType, usageID);
15243 15244 15245 15246 15247
        if (!ret)
            goto error;
        return ret;
    }

15248
    virReportUnsupportedError();
15249 15250

error:
15251
    virDispatchError(conn);
15252 15253 15254 15255
    return NULL;
}


15256 15257 15258 15259
/**
 * virSecretDefineXML:
 * @conn: virConnect connection
 * @xml: XML describing the secret.
15260
 * @flags: extra flags; not used yet, so callers should always pass 0
15261
 *
D
Dan Kenigsberg 已提交
15262
 * If XML specifies a UUID, locates the specified secret and replaces all
15263 15264 15265 15266 15267 15268
 * attributes of the secret specified by UUID by attributes specified in xml
 * (any attributes not specified in xml are discarded).
 *
 * Otherwise, creates a new secret with an automatically chosen UUID, and
 * initializes its attributes from xml.
 *
W
Wang Yufei 已提交
15269
 * Returns a secret on success, NULL on failure.
15270 15271 15272 15273
 */
virSecretPtr
virSecretDefineXML(virConnectPtr conn, const char *xml, unsigned int flags)
{
15274
    VIR_DEBUG("conn=%p, xml=%s, flags=%x", conn, xml, flags);
15275 15276 15277

    virResetLastError();

15278
    virCheckConnectReturn(conn, NULL);
15279
    virCheckReadOnlyGoto(conn->flags, error);
15280
    virCheckNonNullArgGoto(xml, error);
15281

15282
    if (conn->secretDriver != NULL && conn->secretDriver->secretDefineXML != NULL) {
15283 15284
        virSecretPtr ret;

15285
        ret = conn->secretDriver->secretDefineXML(conn, xml, flags);
15286 15287 15288 15289 15290
        if (ret == NULL)
            goto error;
        return ret;
    }

15291
    virReportUnsupportedError();
15292 15293

error:
15294
    virDispatchError(conn);
15295 15296 15297
    return NULL;
}

15298

15299
/**
15300
 * virSecretGetUUID:
15301
 * @secret: A virSecret secret
15302
 * @uuid: buffer of VIR_UUID_BUFLEN bytes in size
15303 15304 15305
 *
 * Fetches the UUID of the secret.
 *
15306 15307
 * Returns 0 on success with the uuid buffer being filled, or
 * -1 upon failure.
15308
 */
15309 15310
int
virSecretGetUUID(virSecretPtr secret, unsigned char *uuid)
15311 15312 15313 15314 15315
{
    VIR_DEBUG("secret=%p", secret);

    virResetLastError();

15316
    virCheckSecretReturn(secret, -1);
15317
    virCheckNonNullArgGoto(uuid, error);
15318

15319 15320 15321
    memcpy(uuid, &secret->uuid[0], VIR_UUID_BUFLEN);

    return 0;
15322 15323 15324 15325

error:
    virDispatchError(secret->conn);
    return -1;
15326 15327
}

15328

15329 15330 15331 15332 15333 15334 15335 15336 15337 15338 15339 15340 15341
/**
 * virSecretGetUUIDString:
 * @secret: a secret object
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
 *
 * Get the UUID for a secret as string. For more information about
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virSecretGetUUIDString(virSecretPtr secret, char *buf)
{
15342
    VIR_DEBUG("secret=%p, buf=%p", secret, buf);
15343 15344

    virResetLastError();
15345

15346
    virCheckSecretReturn(secret, -1);
15347
    virCheckNonNullArgGoto(buf, error);
15348

E
Eric Blake 已提交
15349
    virUUIDFormat(secret->uuid, buf);
15350
    return 0;
15351 15352

error:
15353
    virDispatchError(secret->conn);
15354
    return -1;
15355 15356
}

15357

15358 15359 15360 15361 15362 15363 15364 15365 15366 15367 15368 15369 15370 15371 15372 15373
/**
 * virSecretGetUsageType:
 * @secret: a secret object
 *
 * Get the type of object which uses this secret. The returned
 * value is one of the constants defined in the virSecretUsageType
 * enumeration. More values may be added to this enumeration in
 * the future, so callers should expect to see usage types they
 * do not explicitly know about.
 *
 * Returns a positive integer identifying the type of object,
 * or -1 upon error.
 */
int
virSecretGetUsageType(virSecretPtr secret)
{
15374
    VIR_DEBUG("secret=%p", secret);
15375 15376 15377

    virResetLastError();

15378 15379
    virCheckSecretReturn(secret, -1);

15380
    return secret->usageType;
15381 15382
}

15383

15384 15385 15386 15387 15388 15389 15390 15391 15392 15393 15394 15395 15396 15397 15398 15399 15400 15401 15402
/**
 * virSecretGetUsageID:
 * @secret: a secret object
 *
 * Get the unique identifier of the object with which this
 * secret is to be used. The format of the identifier is
 * dependant on the usage type of the secret. For a secret
 * with a usage type of VIR_SECRET_USAGE_TYPE_VOLUME the
 * identifier will be a fully qualfied path name. The
 * identifiers are intended to be unique within the set of
 * all secrets sharing the same usage type. ie, there shall
 * only ever be one secret for each volume path.
 *
 * Returns a string identifying the object using the secret,
 * or NULL upon error
 */
const char *
virSecretGetUsageID(virSecretPtr secret)
{
15403
    VIR_DEBUG("secret=%p", secret);
15404 15405 15406

    virResetLastError();

15407 15408
    virCheckSecretReturn(secret, NULL);

15409
    return secret->usageID;
15410 15411
}

15412

15413 15414 15415
/**
 * virSecretGetXMLDesc:
 * @secret: A virSecret secret
15416
 * @flags: extra flags; not used yet, so callers should always pass 0
15417 15418 15419 15420 15421 15422 15423 15424 15425 15426 15427
 *
 * Fetches an XML document describing attributes of the secret.
 *
 * Returns the XML document on success, NULL on failure.  The caller must
 * free() the XML.
 */
char *
virSecretGetXMLDesc(virSecretPtr secret, unsigned int flags)
{
    virConnectPtr conn;

15428
    VIR_DEBUG("secret=%p, flags=%x", secret, flags);
15429 15430 15431

    virResetLastError();

15432
    virCheckSecretReturn(secret, NULL);
15433
    conn = secret->conn;
15434

15435
    if (conn->secretDriver != NULL && conn->secretDriver->secretGetXMLDesc != NULL) {
15436 15437
        char *ret;

15438
        ret = conn->secretDriver->secretGetXMLDesc(secret, flags);
15439 15440 15441 15442 15443
        if (ret == NULL)
            goto error;
        return ret;
    }

15444
    virReportUnsupportedError();
15445 15446

error:
15447
    virDispatchError(conn);
15448 15449 15450
    return NULL;
}

15451

15452 15453 15454 15455 15456
/**
 * virSecretSetValue:
 * @secret: A virSecret secret
 * @value: Value of the secret
 * @value_size: Size of the value
15457
 * @flags: extra flags; not used yet, so callers should always pass 0
15458 15459 15460 15461 15462 15463 15464 15465 15466 15467 15468
 *
 * Sets the value of a secret.
 *
 * Returns 0 on success, -1 on failure.
 */
int
virSecretSetValue(virSecretPtr secret, const unsigned char *value,
                  size_t value_size, unsigned int flags)
{
    virConnectPtr conn;

15469
    VIR_DEBUG("secret=%p, value=%p, value_size=%zu, flags=%x", secret, value,
15470 15471 15472 15473
              value_size, flags);

    virResetLastError();

15474
    virCheckSecretReturn(secret, -1);
15475
    conn = secret->conn;
15476

15477
    virCheckReadOnlyGoto(conn->flags, error);
15478
    virCheckNonNullArgGoto(value, error);
15479

15480
    if (conn->secretDriver != NULL && conn->secretDriver->secretSetValue != NULL) {
15481 15482
        int ret;

15483
        ret = conn->secretDriver->secretSetValue(secret, value, value_size, flags);
15484 15485 15486 15487 15488
        if (ret < 0)
            goto error;
        return ret;
    }

15489
    virReportUnsupportedError();
15490 15491

error:
15492
    virDispatchError(conn);
15493 15494 15495
    return -1;
}

15496

15497 15498 15499 15500
/**
 * virSecretGetValue:
 * @secret: A virSecret connection
 * @value_size: Place for storing size of the secret value
15501
 * @flags: extra flags; not used yet, so callers should always pass 0
15502 15503 15504 15505 15506 15507 15508 15509 15510 15511 15512
 *
 * Fetches the value of a secret.
 *
 * Returns the secret value on success, NULL on failure.  The caller must
 * free() the secret value.
 */
unsigned char *
virSecretGetValue(virSecretPtr secret, size_t *value_size, unsigned int flags)
{
    virConnectPtr conn;

15513
    VIR_DEBUG("secret=%p, value_size=%p, flags=%x", secret, value_size, flags);
15514 15515 15516

    virResetLastError();

15517
    virCheckSecretReturn(secret, NULL);
15518
    conn = secret->conn;
15519

15520
    virCheckReadOnlyGoto(conn->flags, error);
15521
    virCheckNonNullArgGoto(value_size, error);
15522

15523
    if (conn->secretDriver != NULL && conn->secretDriver->secretGetValue != NULL) {
15524 15525
        unsigned char *ret;

15526
        ret = conn->secretDriver->secretGetValue(secret, value_size, flags, 0);
15527 15528 15529 15530 15531
        if (ret == NULL)
            goto error;
        return ret;
    }

15532
    virReportUnsupportedError();
15533 15534

error:
15535
    virDispatchError(conn);
15536 15537 15538
    return NULL;
}

15539

15540 15541 15542 15543 15544 15545 15546 15547 15548 15549 15550 15551 15552 15553 15554 15555 15556 15557
/**
 * virSecretUndefine:
 * @secret: A virSecret secret
 *
 * Deletes the specified secret.  This does not free the associated
 * virSecretPtr object.
 *
 * Returns 0 on success, -1 on failure.
 */
int
virSecretUndefine(virSecretPtr secret)
{
    virConnectPtr conn;

    VIR_DEBUG("secret=%p", secret);

    virResetLastError();

15558
    virCheckSecretReturn(secret, -1);
15559
    conn = secret->conn;
15560

15561
    virCheckReadOnlyGoto(conn->flags, error);
15562

15563
    if (conn->secretDriver != NULL && conn->secretDriver->secretUndefine != NULL) {
15564 15565
        int ret;

15566
        ret = conn->secretDriver->secretUndefine(secret);
15567 15568 15569 15570 15571
        if (ret < 0)
            goto error;
        return ret;
    }

15572
    virReportUnsupportedError();
15573 15574

error:
15575
    virDispatchError(conn);
15576 15577 15578
    return -1;
}

15579

15580 15581 15582 15583 15584 15585 15586 15587 15588 15589 15590 15591 15592 15593 15594 15595 15596 15597 15598
/**
 * virSecretRef:
 * @secret: the secret to hold a reference on
 *
 * Increment the reference count on the secret. For each additional call to
 * this method, there shall be a corresponding call to virSecretFree to release
 * the reference count, once the caller no longer needs the reference to this
 * object.
 *
 * This method is typically useful for applications where multiple threads are
 * using a connection, and it is required that the connection remain open until
 * all threads have finished using it. ie, each new thread using a secret would
 * increment the reference count.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virSecretRef(virSecretPtr secret)
{
15599 15600 15601
    VIR_DEBUG("secret=%p refs=%d", secret,
              secret ? secret->object.u.s.refs : 0);

15602 15603
    virResetLastError();

15604 15605
    virCheckSecretReturn(secret, -1);

15606
    virObjectRef(secret);
15607 15608 15609
    return 0;
}

15610

15611 15612 15613 15614 15615 15616
/**
 * virSecretFree:
 * @secret: pointer to a secret
 *
 * Release the secret handle. The underlying secret continues to exist.
 *
15617
 * Returns 0 on success, or -1 on error
15618 15619 15620 15621
 */
int
virSecretFree(virSecretPtr secret)
{
15622
    VIR_DEBUG("secret=%p", secret);
15623 15624 15625

    virResetLastError();

15626 15627
    virCheckSecretReturn(secret, -1);

15628
    virObjectUnref(secret);
15629 15630
    return 0;
}
15631 15632 15633 15634 15635


/**
 * virStreamNew:
 * @conn: pointer to the connection
15636
 * @flags: bitwise-OR of virStreamFlags
15637 15638 15639 15640 15641 15642 15643 15644 15645 15646 15647 15648 15649 15650 15651 15652 15653 15654 15655 15656 15657
 *
 * Creates a new stream object which can be used to perform
 * streamed I/O with other public API function.
 *
 * When no longer needed, a stream object must be released
 * with virStreamFree. If a data stream has been used,
 * then the application must call virStreamFinish or
 * virStreamAbort before free'ing to, in order to notify
 * the driver of termination.
 *
 * If a non-blocking data stream is required passed
 * VIR_STREAM_NONBLOCK for flags, otherwise pass 0.
 *
 * Returns the new stream, or NULL upon error
 */
virStreamPtr
virStreamNew(virConnectPtr conn,
             unsigned int flags)
{
    virStreamPtr st;

15658
    VIR_DEBUG("conn=%p, flags=%x", conn, flags);
15659 15660 15661

    virResetLastError();

15662
    virCheckConnectReturn(conn, NULL);
15663 15664 15665 15666

    st = virGetStream(conn);
    if (st)
        st->flags = flags;
15667 15668
    else
        virDispatchError(conn);
15669 15670 15671 15672 15673 15674 15675 15676 15677 15678 15679 15680 15681 15682 15683 15684 15685 15686 15687

    return st;
}


/**
 * virStreamRef:
 * @stream: pointer to the stream
 *
 * Increment the reference count on the stream. For each
 * additional call to this method, there shall be a corresponding
 * call to virStreamFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * Returns 0 in case of success, -1 in case of failure
 */
int
virStreamRef(virStreamPtr stream)
{
15688 15689 15690
    VIR_DEBUG("stream=%p refs=%d", stream,
              stream ? stream->object.u.s.refs : 0);

15691 15692
    virResetLastError();

15693 15694
    virCheckStreamReturn(stream, -1);

15695
    virObjectRef(stream);
15696 15697 15698 15699 15700 15701 15702 15703 15704 15705 15706 15707 15708
    return 0;
}


/**
 * virStreamSend:
 * @stream: pointer to the stream object
 * @data: buffer to write to stream
 * @nbytes: size of @data buffer
 *
 * Write a series of bytes to the stream. This method may
 * block the calling application for an arbitrary amount
 * of time. Once an application has finished sending data
15709
 * it should call virStreamFinish to wait for successful
15710
 * confirmation from the driver, or detect any error.
15711 15712
 *
 * This method may not be used if a stream source has been
15713
 * registered.
15714 15715 15716 15717 15718
 *
 * Errors are not guaranteed to be reported synchronously
 * with the call, but may instead be delayed until a
 * subsequent call.
 *
D
Dan Kenigsberg 已提交
15719
 * An example using this with a hypothetical file upload
15720 15721
 * API looks like
 *
15722
 *     virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
15723
 *     int fd = open("demo.iso", O_RDONLY);
15724 15725 15726 15727 15728 15729 15730
 *
 *     virConnectUploadFile(conn, "demo.iso", st);
 *
 *     while (1) {
 *          char buf[1024];
 *          int got = read(fd, buf, 1024);
 *          if (got < 0) {
15731
 *             virStreamAbort(st);
15732 15733 15734 15735 15736
 *             break;
 *          }
 *          if (got == 0) {
 *             virStreamFinish(st);
 *             break;
15737
 *          }
15738 15739
 *          int offset = 0;
 *          while (offset < got) {
E
Eric Blake 已提交
15740
 *             int sent = virStreamSend(st, buf+offset, got-offset);
15741 15742 15743 15744 15745 15746 15747 15748 15749 15750 15751 15752
 *             if (sent < 0) {
 *                virStreamAbort(st);
 *                goto done;
 *             }
 *             offset += sent;
 *          }
 *      }
 *      if (virStreamFinish(st) < 0)
 *         ... report an error ....
 *    done:
 *      virStreamFree(st);
 *      close(fd);
15753 15754 15755 15756 15757 15758 15759 15760 15761 15762 15763
 *
 * Returns the number of bytes written, which may be less
 * than requested.
 *
 * Returns -1 upon error, at which time the stream will
 * be marked as aborted, and the caller should now release
 * the stream with virStreamFree.
 *
 * Returns -2 if the outgoing transmit buffers are full &
 * the stream is marked as non-blocking.
 */
15764 15765 15766 15767
int
virStreamSend(virStreamPtr stream,
              const char *data,
              size_t nbytes)
15768
{
15769
    VIR_DEBUG("stream=%p, data=%p, nbytes=%zi", stream, data, nbytes);
15770 15771 15772

    virResetLastError();

15773
    virCheckStreamReturn(stream, -1);
15774
    virCheckNonNullArgGoto(data, error);
15775

15776 15777 15778 15779 15780 15781 15782 15783 15784 15785 15786
    if (stream->driver &&
        stream->driver->streamSend) {
        int ret;
        ret = (stream->driver->streamSend)(stream, data, nbytes);
        if (ret == -2)
            return -2;
        if (ret < 0)
            goto error;
        return ret;
    }

15787
    virReportUnsupportedError();
15788 15789

error:
15790
    virDispatchError(stream->conn);
15791 15792 15793 15794 15795 15796 15797
    return -1;
}


/**
 * virStreamRecv:
 * @stream: pointer to the stream object
15798
 * @data: buffer to read into from stream
15799 15800
 * @nbytes: size of @data buffer
 *
15801
 * Reads a series of bytes from the stream. This method may
15802 15803 15804 15805 15806 15807 15808
 * block the calling application for an arbitrary amount
 * of time.
 *
 * Errors are not guaranteed to be reported synchronously
 * with the call, but may instead be delayed until a
 * subsequent call.
 *
D
Dan Kenigsberg 已提交
15809
 * An example using this with a hypothetical file download
15810 15811
 * API looks like
 *
15812
 *     virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
15813
 *     int fd = open("demo.iso", O_WRONLY, 0600);
15814 15815 15816 15817 15818 15819 15820 15821 15822 15823 15824 15825 15826 15827
 *
 *     virConnectDownloadFile(conn, "demo.iso", st);
 *
 *     while (1) {
 *         char buf[1024];
 *         int got = virStreamRecv(st, buf, 1024);
 *         if (got < 0)
 *            break;
 *         if (got == 0) {
 *            virStreamFinish(st);
 *            break;
 *         }
 *         int offset = 0;
 *         while (offset < got) {
E
Eric Blake 已提交
15828
 *            int sent = write(fd, buf + offset, got - offset);
15829 15830 15831 15832 15833 15834 15835 15836 15837 15838 15839 15840
 *            if (sent < 0) {
 *               virStreamAbort(st);
 *               goto done;
 *            }
 *            offset += sent;
 *         }
 *     }
 *     if (virStreamFinish(st) < 0)
 *        ... report an error ....
 *   done:
 *     virStreamFree(st);
 *     close(fd);
15841 15842 15843 15844 15845 15846 15847 15848 15849 15850 15851 15852 15853 15854 15855 15856
 *
 *
 * Returns the number of bytes read, which may be less
 * than requested.
 *
 * Returns 0 when the end of the stream is reached, at
 * which time the caller should invoke virStreamFinish()
 * to get confirmation of stream completion.
 *
 * Returns -1 upon error, at which time the stream will
 * be marked as aborted, and the caller should now release
 * the stream with virStreamFree.
 *
 * Returns -2 if there is no data pending to be read & the
 * stream is marked as non-blocking.
 */
15857 15858 15859 15860
int
virStreamRecv(virStreamPtr stream,
              char *data,
              size_t nbytes)
15861
{
15862
    VIR_DEBUG("stream=%p, data=%p, nbytes=%zi", stream, data, nbytes);
15863 15864 15865

    virResetLastError();

15866
    virCheckStreamReturn(stream, -1);
15867
    virCheckNonNullArgGoto(data, error);
15868

15869 15870 15871 15872 15873 15874 15875 15876 15877 15878 15879
    if (stream->driver &&
        stream->driver->streamRecv) {
        int ret;
        ret = (stream->driver->streamRecv)(stream, data, nbytes);
        if (ret == -2)
            return -2;
        if (ret < 0)
            goto error;
        return ret;
    }

15880
    virReportUnsupportedError();
15881 15882

error:
15883
    virDispatchError(stream->conn);
15884 15885 15886 15887 15888 15889 15890 15891 15892 15893 15894 15895
    return -1;
}


/**
 * virStreamSendAll:
 * @stream: pointer to the stream object
 * @handler: source callback for reading data from application
 * @opaque: application defined data
 *
 * Send the entire data stream, reading the data from the
 * requested data source. This is simply a convenient alternative
15896
 * to virStreamSend, for apps that do blocking-I/O.
15897
 *
D
Dan Kenigsberg 已提交
15898
 * An example using this with a hypothetical file upload
15899 15900 15901 15902 15903 15904 15905 15906 15907
 * API looks like
 *
 *   int mysource(virStreamPtr st, char *buf, int nbytes, void *opaque) {
 *       int *fd = opaque;
 *
 *       return read(*fd, buf, nbytes);
 *   }
 *
 *   virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
15908
 *   int fd = open("demo.iso", O_RDONLY);
15909 15910 15911 15912 15913 15914 15915 15916 15917 15918 15919
 *
 *   virConnectUploadFile(conn, st);
 *   if (virStreamSendAll(st, mysource, &fd) < 0) {
 *      ...report an error ...
 *      goto done;
 *   }
 *   if (virStreamFinish(st) < 0)
 *      ...report an error...
 *   virStreamFree(st);
 *   close(fd);
 *
15920
 * Returns 0 if all the data was successfully sent. The caller
15921 15922 15923 15924 15925 15926 15927
 * should invoke virStreamFinish(st) to flush the stream upon
 * success and then virStreamFree
 *
 * Returns -1 upon any error, with virStreamAbort() already
 * having been called,  so the caller need only call
 * virStreamFree()
 */
15928 15929 15930 15931
int
virStreamSendAll(virStreamPtr stream,
                 virStreamSourceFunc handler,
                 void *opaque)
15932 15933 15934 15935
{
    char *bytes = NULL;
    int want = 1024*64;
    int ret = -1;
15936
    VIR_DEBUG("stream=%p, handler=%p, opaque=%p", stream, handler, opaque);
15937 15938 15939

    virResetLastError();

15940
    virCheckStreamReturn(stream, -1);
15941
    virCheckNonNullArgGoto(handler, cleanup);
15942

15943
    if (stream->flags & VIR_STREAM_NONBLOCK) {
15944 15945
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("data sources cannot be used for non-blocking streams"));
15946 15947 15948
        goto cleanup;
    }

15949
    if (VIR_ALLOC_N(bytes, want) < 0)
15950 15951 15952 15953 15954 15955 15956 15957 15958 15959 15960 15961 15962 15963 15964 15965 15966 15967 15968 15969 15970 15971 15972 15973 15974
        goto cleanup;

    for (;;) {
        int got, offset = 0;
        got = (handler)(stream, bytes, want, opaque);
        if (got < 0) {
            virStreamAbort(stream);
            goto cleanup;
        }
        if (got == 0)
            break;
        while (offset < got) {
            int done;
            done = virStreamSend(stream, bytes + offset, got - offset);
            if (done < 0)
                goto cleanup;
            offset += done;
        }
    }
    ret = 0;

cleanup:
    VIR_FREE(bytes);

    if (ret != 0)
15975
        virDispatchError(stream->conn);
15976 15977 15978 15979 15980 15981 15982 15983 15984 15985 15986 15987 15988

    return ret;
}


/**
 * virStreamRecvAll:
 * @stream: pointer to the stream object
 * @handler: sink callback for writing data to application
 * @opaque: application defined data
 *
 * Receive the entire data stream, sending the data to the
 * requested data sink. This is simply a convenient alternative
15989
 * to virStreamRecv, for apps that do blocking-I/O.
15990
 *
D
Dan Kenigsberg 已提交
15991
 * An example using this with a hypothetical file download
15992 15993 15994 15995 15996 15997 15998 15999 16000
 * API looks like
 *
 *   int mysink(virStreamPtr st, const char *buf, int nbytes, void *opaque) {
 *       int *fd = opaque;
 *
 *       return write(*fd, buf, nbytes);
 *   }
 *
 *   virStreamPtr st = virStreamNew(conn, 0);
E
Eric Blake 已提交
16001
 *   int fd = open("demo.iso", O_WRONLY);
16002 16003 16004 16005 16006 16007 16008 16009 16010 16011 16012
 *
 *   virConnectUploadFile(conn, st);
 *   if (virStreamRecvAll(st, mysink, &fd) < 0) {
 *      ...report an error ...
 *      goto done;
 *   }
 *   if (virStreamFinish(st) < 0)
 *      ...report an error...
 *   virStreamFree(st);
 *   close(fd);
 *
16013
 * Returns 0 if all the data was successfully received. The caller
16014 16015 16016 16017 16018 16019 16020
 * should invoke virStreamFinish(st) to flush the stream upon
 * success and then virStreamFree
 *
 * Returns -1 upon any error, with virStreamAbort() already
 * having been called,  so the caller need only call
 * virStreamFree()
 */
16021 16022 16023 16024
int
virStreamRecvAll(virStreamPtr stream,
                 virStreamSinkFunc handler,
                 void *opaque)
16025 16026 16027 16028
{
    char *bytes = NULL;
    int want = 1024*64;
    int ret = -1;
16029
    VIR_DEBUG("stream=%p, handler=%p, opaque=%p", stream, handler, opaque);
16030 16031 16032

    virResetLastError();

16033
    virCheckStreamReturn(stream, -1);
16034
    virCheckNonNullArgGoto(handler, cleanup);
16035

16036
    if (stream->flags & VIR_STREAM_NONBLOCK) {
16037 16038
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("data sinks cannot be used for non-blocking streams"));
16039 16040 16041 16042
        goto cleanup;
    }


16043
    if (VIR_ALLOC_N(bytes, want) < 0)
16044 16045 16046 16047 16048 16049 16050 16051 16052 16053 16054 16055 16056 16057 16058 16059 16060 16061 16062 16063 16064 16065 16066 16067 16068
        goto cleanup;

    for (;;) {
        int got, offset = 0;
        got = virStreamRecv(stream, bytes, want);
        if (got < 0)
            goto cleanup;
        if (got == 0)
            break;
        while (offset < got) {
            int done;
            done = (handler)(stream, bytes + offset, got - offset, opaque);
            if (done < 0) {
                virStreamAbort(stream);
                goto cleanup;
            }
            offset += done;
        }
    }
    ret = 0;

cleanup:
    VIR_FREE(bytes);

    if (ret != 0)
16069
        virDispatchError(stream->conn);
16070 16071 16072 16073 16074 16075

    return ret;
}


/**
M
Matthias Bolte 已提交
16076
 * virStreamEventAddCallback:
16077 16078 16079 16080 16081 16082 16083 16084 16085 16086 16087 16088 16089
 * @stream: pointer to the stream object
 * @events: set of events to monitor
 * @cb: callback to invoke when an event occurs
 * @opaque: application defined data
 * @ff: callback to free @opaque data
 *
 * Register a callback to be notified when a stream
 * becomes writable, or readable. This is most commonly
 * used in conjunction with non-blocking data streams
 * to integrate into an event loop
 *
 * Returns 0 on success, -1 upon error
 */
16090 16091 16092 16093 16094 16095
int
virStreamEventAddCallback(virStreamPtr stream,
                          int events,
                          virStreamEventCallback cb,
                          void *opaque,
                          virFreeCallback ff)
16096
{
16097 16098
    VIR_DEBUG("stream=%p, events=%d, cb=%p, opaque=%p, ff=%p",
              stream, events, cb, opaque, ff);
16099 16100 16101

    virResetLastError();

16102
    virCheckStreamReturn(stream, -1);
16103 16104

    if (stream->driver &&
16105
        stream->driver->streamEventAddCallback) {
16106
        int ret;
16107
        ret = (stream->driver->streamEventAddCallback)(stream, events, cb, opaque, ff);
16108 16109 16110 16111 16112
        if (ret < 0)
            goto error;
        return ret;
    }

16113
    virReportUnsupportedError();
16114 16115

error:
16116
    virDispatchError(stream->conn);
16117 16118 16119 16120 16121
    return -1;
}


/**
M
Matthias Bolte 已提交
16122
 * virStreamEventUpdateCallback:
16123 16124 16125 16126 16127 16128
 * @stream: pointer to the stream object
 * @events: set of events to monitor
 *
 * Changes the set of events to monitor for a stream. This allows
 * for event notification to be changed without having to
 * unregister & register the callback completely. This method
E
Eric Blake 已提交
16129
 * is guaranteed to succeed if a callback is already registered
16130 16131 16132
 *
 * Returns 0 on success, -1 if no callback is registered
 */
16133 16134 16135
int
virStreamEventUpdateCallback(virStreamPtr stream,
                             int events)
16136
{
16137
    VIR_DEBUG("stream=%p, events=%d", stream, events);
16138 16139 16140

    virResetLastError();

16141
    virCheckStreamReturn(stream, -1);
16142 16143

    if (stream->driver &&
16144
        stream->driver->streamEventUpdateCallback) {
16145
        int ret;
16146
        ret = (stream->driver->streamEventUpdateCallback)(stream, events);
16147 16148 16149 16150 16151
        if (ret < 0)
            goto error;
        return ret;
    }

16152
    virReportUnsupportedError();
16153 16154

error:
16155
    virDispatchError(stream->conn);
16156 16157 16158
    return -1;
}

16159

16160
/**
M
Matthias Bolte 已提交
16161
 * virStreamEventRemoveCallback:
16162 16163
 * @stream: pointer to the stream object
 *
D
Dan Kenigsberg 已提交
16164
 * Remove an event callback from the stream
16165 16166 16167
 *
 * Returns 0 on success, -1 on error
 */
16168 16169
int
virStreamEventRemoveCallback(virStreamPtr stream)
16170
{
16171
    VIR_DEBUG("stream=%p", stream);
16172 16173 16174

    virResetLastError();

16175
    virCheckStreamReturn(stream, -1);
16176 16177

    if (stream->driver &&
16178
        stream->driver->streamEventRemoveCallback) {
16179
        int ret;
16180
        ret = (stream->driver->streamEventRemoveCallback)(stream);
16181 16182 16183 16184 16185
        if (ret < 0)
            goto error;
        return ret;
    }

16186
    virReportUnsupportedError();
16187 16188

error:
16189
    virDispatchError(stream->conn);
16190 16191 16192
    return -1;
}

16193

16194 16195 16196 16197
/**
 * virStreamFinish:
 * @stream: pointer to the stream object
 *
16198
 * Indicate that there is no further data to be transmitted
16199 16200 16201 16202 16203 16204 16205 16206 16207 16208
 * on the stream. For output streams this should be called once
 * all data has been written. For input streams this should be
 * called once virStreamRecv returns end-of-file.
 *
 * This method is a synchronization point for all asynchronous
 * errors, so if this returns a success code the application can
 * be sure that all data has been successfully processed.
 *
 * Returns 0 on success, -1 upon error
 */
16209 16210
int
virStreamFinish(virStreamPtr stream)
16211
{
16212
    VIR_DEBUG("stream=%p", stream);
16213 16214 16215

    virResetLastError();

16216
    virCheckStreamReturn(stream, -1);
16217 16218 16219 16220 16221 16222 16223 16224 16225 16226

    if (stream->driver &&
        stream->driver->streamFinish) {
        int ret;
        ret = (stream->driver->streamFinish)(stream);
        if (ret < 0)
            goto error;
        return ret;
    }

16227
    virReportUnsupportedError();
16228 16229

error:
16230
    virDispatchError(stream->conn);
16231 16232 16233
    return -1;
}

16234

16235 16236 16237 16238 16239 16240 16241 16242 16243 16244 16245 16246 16247
/**
 * virStreamAbort:
 * @stream: pointer to the stream object
 *
 * Request that the in progress data transfer be cancelled
 * abnormally before the end of the stream has been reached.
 * For output streams this can be used to inform the driver
 * that the stream is being terminated early. For input
 * streams this can be used to inform the driver that it
 * should stop sending data.
 *
 * Returns 0 on success, -1 upon error
 */
16248 16249
int
virStreamAbort(virStreamPtr stream)
16250
{
16251
    VIR_DEBUG("stream=%p", stream);
16252 16253 16254

    virResetLastError();

16255
    virCheckStreamReturn(stream, -1);
16256

16257 16258 16259 16260 16261 16262
    if (!stream->driver) {
        VIR_DEBUG("aborting unused stream");
        return 0;
    }

    if (stream->driver->streamAbort) {
16263 16264 16265 16266 16267 16268 16269
        int ret;
        ret = (stream->driver->streamAbort)(stream);
        if (ret < 0)
            goto error;
        return ret;
    }

16270
    virReportUnsupportedError();
16271 16272

error:
16273
    virDispatchError(stream->conn);
16274 16275 16276
    return -1;
}

16277

16278 16279 16280 16281 16282 16283 16284
/**
 * virStreamFree:
 * @stream: pointer to the stream object
 *
 * Decrement the reference count on a stream, releasing
 * the stream object if the reference count has hit zero.
 *
D
Dan Kenigsberg 已提交
16285
 * There must not be an active data transfer in progress
16286 16287 16288 16289 16290 16291
 * when releasing the stream. If a stream needs to be
 * disposed of prior to end of stream being reached, then
 * the virStreamAbort function should be called first.
 *
 * Returns 0 upon success, or -1 on error
 */
16292 16293
int
virStreamFree(virStreamPtr stream)
16294
{
16295
    VIR_DEBUG("stream=%p", stream);
16296 16297 16298

    virResetLastError();

16299
    virCheckStreamReturn(stream, -1);
16300 16301 16302

    /* XXX Enforce shutdown before free'ing resources ? */

16303
    virObjectUnref(stream);
16304
    return 0;
16305
}
16306 16307 16308 16309 16310 16311 16312 16313 16314 16315


/**
 * virDomainIsActive:
 * @dom: pointer to the domain object
 *
 * Determine if the domain is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
16316 16317
int
virDomainIsActive(virDomainPtr dom)
16318
{
16319
    VIR_DEBUG("dom=%p", dom);
16320 16321 16322

    virResetLastError();

16323 16324
    virCheckDomainReturn(dom, -1);

16325 16326 16327 16328 16329 16330 16331 16332
    if (dom->conn->driver->domainIsActive) {
        int ret;
        ret = dom->conn->driver->domainIsActive(dom);
        if (ret < 0)
            goto error;
        return ret;
    }

16333
    virReportUnsupportedError();
16334
error:
16335
    virDispatchError(dom->conn);
16336 16337 16338
    return -1;
}

16339

16340 16341 16342 16343 16344 16345 16346 16347 16348
/**
 * virDomainIsPersistent:
 * @dom: pointer to the domain object
 *
 * Determine if the domain has a persistent configuration
 * which means it will still exist after shutting down
 *
 * Returns 1 if persistent, 0 if transient, -1 on error
 */
16349 16350
int
virDomainIsPersistent(virDomainPtr dom)
16351
{
16352
    VIR_DOMAIN_DEBUG(dom);
16353 16354 16355

    virResetLastError();

16356 16357
    virCheckDomainReturn(dom, -1);

16358 16359 16360 16361 16362 16363 16364 16365
    if (dom->conn->driver->domainIsPersistent) {
        int ret;
        ret = dom->conn->driver->domainIsPersistent(dom);
        if (ret < 0)
            goto error;
        return ret;
    }

16366
    virReportUnsupportedError();
16367
error:
16368
    virDispatchError(dom->conn);
16369 16370 16371
    return -1;
}

16372

16373 16374 16375 16376 16377 16378 16379 16380
/**
 * virDomainIsUpdated:
 * @dom: pointer to the domain object
 *
 * Determine if the domain has been updated.
 *
 * Returns 1 if updated, 0 if not, -1 on error
 */
16381 16382
int
virDomainIsUpdated(virDomainPtr dom)
16383
{
16384
    VIR_DOMAIN_DEBUG(dom);
16385 16386 16387

    virResetLastError();

16388 16389
    virCheckDomainReturn(dom, -1);

16390 16391 16392 16393 16394 16395 16396 16397
    if (dom->conn->driver->domainIsUpdated) {
        int ret;
        ret = dom->conn->driver->domainIsUpdated(dom);
        if (ret < 0)
            goto error;
        return ret;
    }

16398
    virReportUnsupportedError();
16399 16400 16401 16402 16403
error:
    virDispatchError(dom->conn);
    return -1;
}

16404

16405 16406 16407 16408 16409 16410 16411 16412
/**
 * virNetworkIsActive:
 * @net: pointer to the network object
 *
 * Determine if the network is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
16413 16414
int
virNetworkIsActive(virNetworkPtr net)
16415
{
16416
    VIR_DEBUG("net=%p", net);
16417 16418 16419

    virResetLastError();

16420 16421
    virCheckNetworkReturn(net, -1);

16422 16423 16424 16425 16426 16427 16428 16429
    if (net->conn->networkDriver->networkIsActive) {
        int ret;
        ret = net->conn->networkDriver->networkIsActive(net);
        if (ret < 0)
            goto error;
        return ret;
    }

16430
    virReportUnsupportedError();
16431
error:
16432
    virDispatchError(net->conn);
16433 16434 16435 16436 16437 16438 16439 16440 16441 16442 16443 16444 16445
    return -1;
}


/**
 * virNetworkIsPersistent:
 * @net: pointer to the network object
 *
 * Determine if the network has a persistent configuration
 * which means it will still exist after shutting down
 *
 * Returns 1 if persistent, 0 if transient, -1 on error
 */
16446 16447
int
virNetworkIsPersistent(virNetworkPtr net)
16448
{
16449
    VIR_DEBUG("net=%p", net);
16450 16451 16452

    virResetLastError();

16453 16454
    virCheckNetworkReturn(net, -1);

16455 16456 16457 16458 16459 16460 16461 16462
    if (net->conn->networkDriver->networkIsPersistent) {
        int ret;
        ret = net->conn->networkDriver->networkIsPersistent(net);
        if (ret < 0)
            goto error;
        return ret;
    }

16463
    virReportUnsupportedError();
16464
error:
16465
    virDispatchError(net->conn);
16466 16467 16468 16469 16470 16471 16472 16473 16474 16475 16476 16477
    return -1;
}


/**
 * virStoragePoolIsActive:
 * @pool: pointer to the storage pool object
 *
 * Determine if the storage pool is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
16478 16479
int
virStoragePoolIsActive(virStoragePoolPtr pool)
16480
{
16481
    VIR_DEBUG("pool=%p", pool);
16482 16483 16484

    virResetLastError();

16485 16486
    virCheckStoragePoolReturn(pool, -1);

16487
    if (pool->conn->storageDriver->storagePoolIsActive) {
16488
        int ret;
16489
        ret = pool->conn->storageDriver->storagePoolIsActive(pool);
16490 16491 16492 16493 16494
        if (ret < 0)
            goto error;
        return ret;
    }

16495
    virReportUnsupportedError();
16496
error:
16497
    virDispatchError(pool->conn);
16498 16499 16500 16501 16502 16503 16504 16505 16506 16507 16508 16509 16510
    return -1;
}


/**
 * virStoragePoolIsPersistent:
 * @pool: pointer to the storage pool object
 *
 * Determine if the storage pool has a persistent configuration
 * which means it will still exist after shutting down
 *
 * Returns 1 if persistent, 0 if transient, -1 on error
 */
16511 16512
int
virStoragePoolIsPersistent(virStoragePoolPtr pool)
16513
{
16514
    VIR_DEBUG("pool=%p", pool);
16515 16516 16517

    virResetLastError();

16518 16519
    virCheckStoragePoolReturn(pool, -1);

16520
    if (pool->conn->storageDriver->storagePoolIsPersistent) {
16521
        int ret;
16522
        ret = pool->conn->storageDriver->storagePoolIsPersistent(pool);
16523 16524 16525 16526 16527
        if (ret < 0)
            goto error;
        return ret;
    }

16528
    virReportUnsupportedError();
16529
error:
16530
    virDispatchError(pool->conn);
16531 16532 16533 16534
    return -1;
}


S
Stefan Berger 已提交
16535 16536 16537 16538 16539 16540 16541 16542 16543 16544 16545
/**
 * virConnectNumOfNWFilters:
 * @conn: pointer to the hypervisor connection
 *
 * Provides the number of nwfilters.
 *
 * Returns the number of nwfilters found or -1 in case of error
 */
int
virConnectNumOfNWFilters(virConnectPtr conn)
{
16546
    VIR_DEBUG("conn=%p", conn);
S
Stefan Berger 已提交
16547 16548 16549

    virResetLastError();

16550
    virCheckConnectReturn(conn, -1);
S
Stefan Berger 已提交
16551

16552
    if (conn->nwfilterDriver && conn->nwfilterDriver->connectNumOfNWFilters) {
S
Stefan Berger 已提交
16553
        int ret;
16554
        ret = conn->nwfilterDriver->connectNumOfNWFilters(conn);
S
Stefan Berger 已提交
16555 16556 16557 16558 16559
        if (ret < 0)
            goto error;
        return ret;
    }

16560
    virReportUnsupportedError();
S
Stefan Berger 已提交
16561 16562 16563 16564 16565 16566

error:
    virDispatchError(conn);
    return -1;
}

16567

16568 16569 16570 16571 16572 16573 16574 16575 16576 16577 16578 16579 16580 16581 16582 16583 16584 16585 16586 16587 16588 16589 16590 16591 16592 16593 16594 16595 16596
/**
 * virConnectListAllNWFilters:
 * @conn: Pointer to the hypervisor connection.
 * @filters: Pointer to a variable to store the array containing the network
 *           filter objects or NULL if the list is not required (just returns
 *           number of network filters).
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Collect the list of network filters, and allocate an array to store those
 * objects.
 *
 * Returns the number of network filters found or -1 and sets @filters to  NULL
 * in case of error.  On success, the array stored into @filters is guaranteed to
 * have an extra allocated element set to NULL but not included in the return count,
 * to make iteration easier.  The caller is responsible for calling
 * virNWFilterFree() on each array element, then calling free() on @filters.
 */
int
virConnectListAllNWFilters(virConnectPtr conn,
                           virNWFilterPtr **filters,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, filters=%p, flags=%x", conn, filters, flags);

    virResetLastError();

    if (filters)
        *filters = NULL;

16597
    virCheckConnectReturn(conn, -1);
16598 16599

    if (conn->nwfilterDriver &&
16600
        conn->nwfilterDriver->connectListAllNWFilters) {
16601
        int ret;
16602
        ret = conn->nwfilterDriver->connectListAllNWFilters(conn, filters, flags);
16603 16604 16605 16606 16607
        if (ret < 0)
            goto error;
        return ret;
    }

16608
    virReportUnsupportedError();
16609 16610 16611 16612 16613

error:
    virDispatchError(conn);
    return -1;
}
S
Stefan Berger 已提交
16614

16615

S
Stefan Berger 已提交
16616 16617 16618 16619 16620 16621 16622 16623 16624 16625 16626 16627 16628
/**
 * virConnectListNWFilters:
 * @conn: pointer to the hypervisor connection
 * @names: array to collect the list of names of network filters
 * @maxnames: size of @names
 *
 * Collect the list of network filters, and store their names in @names
 *
 * Returns the number of network filters found or -1 in case of error
 */
int
virConnectListNWFilters(virConnectPtr conn, char **const names, int maxnames)
{
16629
    VIR_DEBUG("conn=%p, names=%p, maxnames=%d", conn, names, maxnames);
S
Stefan Berger 已提交
16630 16631 16632

    virResetLastError();

16633
    virCheckConnectReturn(conn, -1);
16634 16635
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(maxnames, error);
S
Stefan Berger 已提交
16636

16637
    if (conn->nwfilterDriver && conn->nwfilterDriver->connectListNWFilters) {
S
Stefan Berger 已提交
16638
        int ret;
16639
        ret = conn->nwfilterDriver->connectListNWFilters(conn, names, maxnames);
S
Stefan Berger 已提交
16640 16641 16642 16643 16644
        if (ret < 0)
            goto error;
        return ret;
    }

16645
    virReportUnsupportedError();
S
Stefan Berger 已提交
16646 16647 16648 16649 16650 16651 16652 16653 16654 16655 16656 16657 16658 16659 16660 16661 16662 16663 16664 16665

error:
    virDispatchError(conn);
    return -1;
}


/**
 * virNWFilterLookupByName:
 * @conn: pointer to the hypervisor connection
 * @name: name for the network filter
 *
 * Try to lookup a network filter on the given hypervisor based on its name.
 *
 * Returns a new nwfilter object or NULL in case of failure.  If the
 * network filter cannot be found, then VIR_ERR_NO_NWFILTER error is raised.
 */
virNWFilterPtr
virNWFilterLookupByName(virConnectPtr conn, const char *name)
{
16666
    VIR_DEBUG("conn=%p, name=%s", conn, name);
S
Stefan Berger 已提交
16667 16668 16669

    virResetLastError();

16670
    virCheckConnectReturn(conn, NULL);
16671
    virCheckNonNullArgGoto(name, error);
S
Stefan Berger 已提交
16672 16673 16674

    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterLookupByName) {
        virNWFilterPtr ret;
16675
        ret = conn->nwfilterDriver->nwfilterLookupByName(conn, name);
S
Stefan Berger 已提交
16676 16677 16678 16679 16680
        if (!ret)
            goto error;
        return ret;
    }

16681
    virReportUnsupportedError();
S
Stefan Berger 已提交
16682 16683 16684 16685 16686 16687

error:
    virDispatchError(conn);
    return NULL;
}

16688

S
Stefan Berger 已提交
16689 16690 16691 16692 16693 16694 16695 16696 16697 16698 16699 16700 16701
/**
 * virNWFilterLookupByUUID:
 * @conn: pointer to the hypervisor connection
 * @uuid: the raw UUID for the network filter
 *
 * Try to lookup a network filter on the given hypervisor based on its UUID.
 *
 * Returns a new nwfilter object or NULL in case of failure.  If the
 * nwfdilter cannot be found, then VIR_ERR_NO_NWFILTER error is raised.
 */
virNWFilterPtr
virNWFilterLookupByUUID(virConnectPtr conn, const unsigned char *uuid)
{
16702
    VIR_UUID_DEBUG(conn, uuid);
S
Stefan Berger 已提交
16703 16704 16705

    virResetLastError();

16706
    virCheckConnectReturn(conn, NULL);
16707
    virCheckNonNullArgGoto(uuid, error);
S
Stefan Berger 已提交
16708 16709 16710

    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterLookupByUUID){
        virNWFilterPtr ret;
16711
        ret = conn->nwfilterDriver->nwfilterLookupByUUID(conn, uuid);
S
Stefan Berger 已提交
16712 16713 16714 16715 16716
        if (!ret)
            goto error;
        return ret;
    }

16717
    virReportUnsupportedError();
S
Stefan Berger 已提交
16718 16719 16720 16721 16722 16723

error:
    virDispatchError(conn);
    return NULL;
}

16724

S
Stefan Berger 已提交
16725
/**
16726
 * virNWFilterLookupByUUIDString:
S
Stefan Berger 已提交
16727 16728 16729 16730 16731 16732 16733 16734 16735 16736 16737 16738
 * @conn: pointer to the hypervisor connection
 * @uuidstr: the string UUID for the nwfilter
 *
 * Try to lookup an nwfilter on the given hypervisor based on its UUID.
 *
 * Returns a new nwfilter object or NULL in case of failure.  If the
 * nwfilter cannot be found, then VIR_ERR_NO_NWFILTER error is raised.
 */
virNWFilterPtr
virNWFilterLookupByUUIDString(virConnectPtr conn, const char *uuidstr)
{
    unsigned char uuid[VIR_UUID_BUFLEN];
16739
    VIR_DEBUG("conn=%p, uuidstr=%s", conn, NULLSTR(uuidstr));
S
Stefan Berger 已提交
16740 16741 16742

    virResetLastError();

16743
    virCheckConnectReturn(conn, NULL);
16744
    virCheckNonNullArgGoto(uuidstr, error);
S
Stefan Berger 已提交
16745 16746

    if (virUUIDParse(uuidstr, uuid) < 0) {
16747 16748 16749
        virReportInvalidArg(uuidstr,
                            _("uuidstr in %s must be a valid UUID"),
                            __FUNCTION__);
S
Stefan Berger 已提交
16750 16751 16752 16753 16754 16755 16756 16757 16758 16759
        goto error;
    }

    return virNWFilterLookupByUUID(conn, &uuid[0]);

error:
    virDispatchError(conn);
    return NULL;
}

16760

S
Stefan Berger 已提交
16761 16762 16763 16764 16765 16766 16767 16768 16769 16770 16771 16772
/**
 * virNWFilterFree:
 * @nwfilter: a nwfilter object
 *
 * Free the nwfilter object. The running instance is kept alive.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNWFilterFree(virNWFilterPtr nwfilter)
{
16773
    VIR_DEBUG("nwfilter=%p", nwfilter);
S
Stefan Berger 已提交
16774 16775 16776

    virResetLastError();

16777
    virCheckNWFilterReturn(nwfilter, -1);
16778 16779

    virObjectUnref(nwfilter);
S
Stefan Berger 已提交
16780 16781 16782
    return 0;
}

16783

S
Stefan Berger 已提交
16784 16785 16786 16787 16788 16789 16790 16791 16792 16793 16794 16795
/**
 * virNWFilterGetName:
 * @nwfilter: a nwfilter object
 *
 * Get the public name for the network filter
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * its lifetime will be the same as the nwfilter object.
 */
const char *
virNWFilterGetName(virNWFilterPtr nwfilter)
{
16796
    VIR_DEBUG("nwfilter=%p", nwfilter);
S
Stefan Berger 已提交
16797 16798 16799

    virResetLastError();

16800 16801
    virCheckNWFilterReturn(nwfilter, NULL);

16802
    return nwfilter->name;
S
Stefan Berger 已提交
16803 16804
}

16805

S
Stefan Berger 已提交
16806 16807 16808 16809 16810 16811 16812 16813 16814 16815 16816 16817
/**
 * virNWFilterGetUUID:
 * @nwfilter: a nwfilter object
 * @uuid: pointer to a VIR_UUID_BUFLEN bytes array
 *
 * Get the UUID for a network filter
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNWFilterGetUUID(virNWFilterPtr nwfilter, unsigned char *uuid)
{
16818
    VIR_DEBUG("nwfilter=%p, uuid=%p", nwfilter, uuid);
S
Stefan Berger 已提交
16819 16820 16821

    virResetLastError();

16822
    virCheckNWFilterReturn(nwfilter, -1);
16823
    virCheckNonNullArgGoto(uuid, error);
S
Stefan Berger 已提交
16824 16825 16826 16827 16828 16829 16830 16831 16832 16833

    memcpy(uuid, &nwfilter->uuid[0], VIR_UUID_BUFLEN);

    return 0;

error:
    virDispatchError(nwfilter->conn);
    return -1;
}

16834

S
Stefan Berger 已提交
16835 16836 16837 16838 16839 16840 16841 16842 16843 16844 16845 16846 16847
/**
 * virNWFilterGetUUIDString:
 * @nwfilter: a nwfilter object
 * @buf: pointer to a VIR_UUID_STRING_BUFLEN bytes array
 *
 * Get the UUID for a network filter as string. For more information about
 * UUID see RFC4122.
 *
 * Returns -1 in case of error, 0 in case of success
 */
int
virNWFilterGetUUIDString(virNWFilterPtr nwfilter, char *buf)
{
16848
    VIR_DEBUG("nwfilter=%p, buf=%p", nwfilter, buf);
S
Stefan Berger 已提交
16849 16850 16851

    virResetLastError();

16852
    virCheckNWFilterReturn(nwfilter, -1);
16853
    virCheckNonNullArgGoto(buf, error);
S
Stefan Berger 已提交
16854

E
Eric Blake 已提交
16855
    virUUIDFormat(nwfilter->uuid, buf);
S
Stefan Berger 已提交
16856 16857 16858 16859 16860 16861 16862 16863 16864 16865 16866 16867 16868 16869 16870 16871 16872 16873 16874 16875 16876
    return 0;

error:
    virDispatchError(nwfilter->conn);
    return -1;
}


/**
 * virNWFilterDefineXML:
 * @conn: pointer to the hypervisor connection
 * @xmlDesc: an XML description of the nwfilter
 *
 * Define a new network filter, based on an XML description
 * similar to the one returned by virNWFilterGetXMLDesc()
 *
 * Returns a new nwfilter object or NULL in case of failure
 */
virNWFilterPtr
virNWFilterDefineXML(virConnectPtr conn, const char *xmlDesc)
{
16877
    VIR_DEBUG("conn=%p, xmlDesc=%s", conn, xmlDesc);
S
Stefan Berger 已提交
16878 16879 16880

    virResetLastError();

16881
    virCheckConnectReturn(conn, NULL);
16882
    virCheckNonNullArgGoto(xmlDesc, error);
16883
    virCheckReadOnlyGoto(conn->flags, error);
S
Stefan Berger 已提交
16884

16885
    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterDefineXML) {
S
Stefan Berger 已提交
16886
        virNWFilterPtr ret;
16887
        ret = conn->nwfilterDriver->nwfilterDefineXML(conn, xmlDesc);
S
Stefan Berger 已提交
16888 16889 16890 16891 16892
        if (!ret)
            goto error;
        return ret;
    }

16893
    virReportUnsupportedError();
S
Stefan Berger 已提交
16894 16895 16896 16897 16898 16899 16900 16901 16902 16903 16904 16905 16906 16907 16908 16909 16910 16911 16912 16913 16914

error:
    virDispatchError(conn);
    return NULL;
}


/**
 * virNWFilterUndefine:
 * @nwfilter: a nwfilter object
 *
 * Undefine the nwfilter object. This call will not succeed if
 * a running VM is referencing the filter. This does not free the
 * associated virNWFilterPtr object.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virNWFilterUndefine(virNWFilterPtr nwfilter)
{
    virConnectPtr conn;
16915
    VIR_DEBUG("nwfilter=%p", nwfilter);
S
Stefan Berger 已提交
16916 16917 16918

    virResetLastError();

16919
    virCheckNWFilterReturn(nwfilter, -1);
S
Stefan Berger 已提交
16920
    conn = nwfilter->conn;
16921

16922
    virCheckReadOnlyGoto(conn->flags, error);
S
Stefan Berger 已提交
16923

16924
    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterUndefine) {
S
Stefan Berger 已提交
16925
        int ret;
16926
        ret = conn->nwfilterDriver->nwfilterUndefine(nwfilter);
S
Stefan Berger 已提交
16927 16928 16929 16930 16931
        if (ret < 0)
            goto error;
        return ret;
    }

16932
    virReportUnsupportedError();
S
Stefan Berger 已提交
16933 16934 16935 16936 16937 16938 16939 16940 16941 16942

error:
    virDispatchError(nwfilter->conn);
    return -1;
}


/**
 * virNWFilterGetXMLDesc:
 * @nwfilter: a nwfilter object
16943
 * @flags: extra flags; not used yet, so callers should always pass 0
S
Stefan Berger 已提交
16944 16945 16946 16947 16948 16949 16950 16951
 *
 * Provide an XML description of the network filter. The description may be
 * reused later to redefine the network filter with virNWFilterCreateXML().
 *
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
16952
virNWFilterGetXMLDesc(virNWFilterPtr nwfilter, unsigned int flags)
S
Stefan Berger 已提交
16953 16954
{
    virConnectPtr conn;
16955
    VIR_DEBUG("nwfilter=%p, flags=%x", nwfilter, flags);
S
Stefan Berger 已提交
16956 16957 16958

    virResetLastError();

16959
    virCheckNWFilterReturn(nwfilter, NULL);
S
Stefan Berger 已提交
16960 16961
    conn = nwfilter->conn;

16962
    if (conn->nwfilterDriver && conn->nwfilterDriver->nwfilterGetXMLDesc) {
S
Stefan Berger 已提交
16963
        char *ret;
16964
        ret = conn->nwfilterDriver->nwfilterGetXMLDesc(nwfilter, flags);
S
Stefan Berger 已提交
16965 16966 16967 16968 16969
        if (!ret)
            goto error;
        return ret;
    }

16970
    virReportUnsupportedError();
S
Stefan Berger 已提交
16971 16972 16973 16974 16975 16976 16977 16978 16979 16980 16981 16982 16983 16984 16985 16986 16987 16988 16989 16990 16991 16992 16993 16994 16995 16996 16997

error:
    virDispatchError(nwfilter->conn);
    return NULL;
}


/**
 * virNWFilterRef:
 * @nwfilter: the nwfilter to hold a reference on
 *
 * Increment the reference count on the nwfilter. For each
 * additional call to this method, there shall be a corresponding
 * call to virNWFilterFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection remain open until all threads have finished using
 * it. ie, each new thread using an nwfilter would increment
 * the reference count.
 *
 * Returns 0 in case of success, -1 in case of failure.
 */
int
virNWFilterRef(virNWFilterPtr nwfilter)
{
16998 16999 17000
    VIR_DEBUG("nwfilter=%p refs=%d", nwfilter,
              nwfilter ? nwfilter->object.u.s.refs : 0);

17001 17002
    virResetLastError();

17003 17004
    virCheckNWFilterReturn(nwfilter, -1);

17005
    virObjectRef(nwfilter);
S
Stefan Berger 已提交
17006 17007 17008 17009
    return 0;
}


17010 17011 17012 17013 17014 17015 17016 17017
/**
 * virInterfaceIsActive:
 * @iface: pointer to the interface object
 *
 * Determine if the interface is currently running
 *
 * Returns 1 if running, 0 if inactive, -1 on error
 */
17018 17019
int
virInterfaceIsActive(virInterfacePtr iface)
17020
{
17021
    VIR_DEBUG("iface=%p", iface);
17022 17023 17024

    virResetLastError();

17025 17026
    virCheckInterfaceReturn(iface, -1);

17027 17028 17029 17030 17031 17032 17033 17034
    if (iface->conn->interfaceDriver->interfaceIsActive) {
        int ret;
        ret = iface->conn->interfaceDriver->interfaceIsActive(iface);
        if (ret < 0)
            goto error;
        return ret;
    }

17035
    virReportUnsupportedError();
17036
error:
17037
    virDispatchError(iface->conn);
17038 17039 17040 17041 17042 17043 17044 17045 17046 17047 17048 17049
    return -1;
}


/**
 * virConnectIsEncrypted:
 * @conn: pointer to the connection object
 *
 * Determine if the connection to the hypervisor is encrypted
 *
 * Returns 1 if encrypted, 0 if not encrypted, -1 on error
 */
17050 17051
int
virConnectIsEncrypted(virConnectPtr conn)
17052
{
17053
    VIR_DEBUG("conn=%p", conn);
17054 17055 17056

    virResetLastError();

17057
    virCheckConnectReturn(conn, -1);
17058
    if (conn->driver->connectIsEncrypted) {
17059
        int ret;
17060
        ret = conn->driver->connectIsEncrypted(conn);
17061 17062 17063 17064 17065
        if (ret < 0)
            goto error;
        return ret;
    }

17066
    virReportUnsupportedError();
17067
error:
17068
    virDispatchError(conn);
17069 17070 17071
    return -1;
}

17072

17073 17074 17075 17076 17077 17078 17079 17080 17081 17082
/**
 * virConnectIsSecure:
 * @conn: pointer to the connection object
 *
 * Determine if the connection to the hypervisor is secure
 *
 * A connection will be classed as secure if it is either
 * encrypted, or running over a channel which is not exposed
 * to eavesdropping (eg a UNIX domain socket, or pipe)
 *
C
Claudio Bley 已提交
17083
 * Returns 1 if secure, 0 if not secure, -1 on error
17084
 */
17085 17086
int
virConnectIsSecure(virConnectPtr conn)
17087
{
17088
    VIR_DEBUG("conn=%p", conn);
17089 17090 17091

    virResetLastError();

17092
    virCheckConnectReturn(conn, -1);
17093
    if (conn->driver->connectIsSecure) {
17094
        int ret;
17095
        ret = conn->driver->connectIsSecure(conn);
17096 17097 17098 17099 17100
        if (ret < 0)
            goto error;
        return ret;
    }

17101
    virReportUnsupportedError();
17102
error:
17103
    virDispatchError(conn);
17104 17105
    return -1;
}
J
Jiri Denemark 已提交
17106 17107 17108 17109 17110


/**
 * virConnectCompareCPU:
 * @conn: virConnect connection
17111
 * @xmlDesc: XML describing the CPU to compare with host CPU
17112
 * @flags: extra flags; not used yet, so callers should always pass 0
17113 17114
 *
 * Compares the given CPU description with the host CPU
J
Jiri Denemark 已提交
17115 17116 17117 17118 17119 17120 17121 17122
 *
 * Returns comparison result according to enum virCPUCompareResult
 */
int
virConnectCompareCPU(virConnectPtr conn,
                     const char *xmlDesc,
                     unsigned int flags)
{
17123
    VIR_DEBUG("conn=%p, xmlDesc=%s, flags=%x", conn, xmlDesc, flags);
J
Jiri Denemark 已提交
17124 17125 17126

    virResetLastError();

17127
    virCheckConnectReturn(conn, VIR_CPU_COMPARE_ERROR);
17128
    virCheckNonNullArgGoto(xmlDesc, error);
J
Jiri Denemark 已提交
17129

17130
    if (conn->driver->connectCompareCPU) {
J
Jiri Denemark 已提交
17131 17132
        int ret;

17133
        ret = conn->driver->connectCompareCPU(conn, xmlDesc, flags);
J
Jiri Denemark 已提交
17134 17135 17136 17137 17138
        if (ret == VIR_CPU_COMPARE_ERROR)
            goto error;
        return ret;
    }

17139
    virReportUnsupportedError();
J
Jiri Denemark 已提交
17140 17141

error:
17142
    virDispatchError(conn);
J
Jiri Denemark 已提交
17143 17144
    return VIR_CPU_COMPARE_ERROR;
}
17145 17146


17147 17148 17149 17150 17151 17152 17153 17154 17155 17156 17157 17158 17159 17160 17161 17162 17163 17164 17165 17166 17167 17168 17169 17170 17171 17172
/**
 * virConnectGetCPUModelNames:
 *
 * @conn: virConnect connection
 * @arch: Architecture
 * @models: Pointer to a variable to store the NULL-terminated array of the
 *          CPU models supported for the specified architecture.  Each element
 *          and the array itself must be freed by the caller with free.  Pass
 *          NULL if only the list length is needed.
 * @flags: extra flags; not used yet, so callers should always pass 0.
 *
 * Get the list of supported CPU models for a specific architecture.
 *
 * Returns -1 on error, number of elements in @models on success.
 */
int
virConnectGetCPUModelNames(virConnectPtr conn, const char *arch, char ***models,
                           unsigned int flags)
{
    VIR_DEBUG("conn=%p, arch=%s, models=%p, flags=%x",
              conn, arch, models, flags);
    virResetLastError();

    if (models)
        *models = NULL;

17173
    virCheckConnectReturn(conn, -1);
17174
    virCheckNonNullArgGoto(arch, error);
17175 17176 17177 17178 17179 17180 17181 17182 17183 17184 17185

    if (conn->driver->connectGetCPUModelNames) {
        int ret;

        ret = conn->driver->connectGetCPUModelNames(conn, arch, models, flags);
        if (ret < 0)
            goto error;

        return ret;
    }

17186
    virReportUnsupportedError();
17187 17188 17189 17190 17191 17192 17193

error:
    virDispatchError(conn);
    return -1;
}


17194 17195 17196 17197 17198 17199
/**
 * virConnectBaselineCPU:
 *
 * @conn: virConnect connection
 * @xmlCPUs: array of XML descriptions of host CPUs
 * @ncpus: number of CPUs in xmlCPUs
17200
 * @flags: bitwise-OR of virConnectBaselineCPUFlags
17201 17202 17203 17204
 *
 * Computes the most feature-rich CPU which is compatible with all given
 * host CPUs.
 *
17205 17206 17207 17208 17209
 * If @flags includes VIR_CONNECT_BASELINE_CPU_EXPAND_FEATURES then libvirt
 * will explicitly list all CPU features that are part of the host CPU,
 * without this flag features that are part of the CPU model will not be
 * listed.
 *
17210 17211 17212 17213 17214 17215 17216 17217
 * Returns XML description of the computed CPU or NULL on error.
 */
char *
virConnectBaselineCPU(virConnectPtr conn,
                      const char **xmlCPUs,
                      unsigned int ncpus,
                      unsigned int flags)
{
17218
    size_t i;
17219

17220
    VIR_DEBUG("conn=%p, xmlCPUs=%p, ncpus=%u, flags=%x",
17221 17222 17223
              conn, xmlCPUs, ncpus, flags);
    if (xmlCPUs) {
        for (i = 0; i < ncpus; i++)
17224
            VIR_DEBUG("xmlCPUs[%zu]=%s", i, NULLSTR(xmlCPUs[i]));
17225 17226 17227 17228
    }

    virResetLastError();

17229
    virCheckConnectReturn(conn, NULL);
17230
    virCheckNonNullArgGoto(xmlCPUs, error);
17231

17232
    if (conn->driver->connectBaselineCPU) {
17233 17234
        char *cpu;

17235
        cpu = conn->driver->connectBaselineCPU(conn, xmlCPUs, ncpus, flags);
17236 17237 17238 17239 17240
        if (!cpu)
            goto error;
        return cpu;
    }

17241
    virReportUnsupportedError();
17242 17243 17244 17245 17246

error:
    virDispatchError(conn);
    return NULL;
}
17247 17248 17249 17250 17251 17252 17253 17254 17255 17256


/**
 * virDomainGetJobInfo:
 * @domain: a domain object
 * @info: pointer to a virDomainJobInfo structure allocated by the user
 *
 * Extract information about progress of a background job on a domain.
 * Will return an error if the domain is not active.
 *
E
Eric Blake 已提交
17257 17258 17259
 * This function returns a limited amount of information in comparison
 * to virDomainGetJobStats().
 *
17260 17261 17262 17263 17264 17265
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetJobInfo(virDomainPtr domain, virDomainJobInfoPtr info)
{
    virConnectPtr conn;
17266 17267

    VIR_DOMAIN_DEBUG(domain, "info=%p", info);
17268 17269 17270

    virResetLastError();

17271 17272 17273
    if (info)
        memset(info, 0, sizeof(*info));

17274
    virCheckDomainReturn(domain, -1);
17275
    virCheckNonNullArgGoto(info, error);
17276 17277 17278 17279 17280

    conn = domain->conn;

    if (conn->driver->domainGetJobInfo) {
        int ret;
17281
        ret = conn->driver->domainGetJobInfo(domain, info);
17282 17283 17284 17285 17286
        if (ret < 0)
            goto error;
        return ret;
    }

17287
    virReportUnsupportedError();
17288 17289 17290 17291

error:
    virDispatchError(domain->conn);
    return -1;
17292 17293 17294 17295 17296 17297 17298 17299 17300 17301 17302 17303 17304 17305 17306 17307 17308 17309 17310 17311 17312 17313 17314 17315 17316 17317 17318 17319 17320 17321 17322 17323 17324 17325 17326
}


/**
 * virDomainGetJobStats:
 * @domain: a domain object
 * @type: where to store the job type (one of virDomainJobType)
 * @params: where to store job statistics
 * @nparams: number of items in @params
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Extract information about progress of a background job on a domain.
 * Will return an error if the domain is not active. The function returns
 * a superset of progress information provided by virDomainGetJobInfo.
 * Possible fields returned in @params are defined by VIR_DOMAIN_JOB_*
 * macros and new fields will likely be introduced in the future so callers
 * may receive fields that they do not understand in case they talk to a
 * newer server.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainGetJobStats(virDomainPtr domain,
                     int *type,
                     virTypedParameterPtr *params,
                     int *nparams,
                     unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "type=%p, params=%p, nparams=%p, flags=%x",
                     type, params, nparams, flags);

    virResetLastError();

17327
    virCheckDomainReturn(domain, -1);
17328 17329 17330 17331 17332 17333 17334 17335 17336 17337 17338 17339 17340 17341 17342
    virCheckNonNullArgGoto(type, error);
    virCheckNonNullArgGoto(params, error);
    virCheckNonNullArgGoto(nparams, error);

    conn = domain->conn;

    if (conn->driver->domainGetJobStats) {
        int ret;
        ret = conn->driver->domainGetJobStats(domain, type, params,
                                              nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

17343
    virReportUnsupportedError();
17344 17345 17346 17347

error:
    virDispatchError(domain->conn);
    return -1;
17348
}
17349 17350 17351 17352 17353 17354 17355


/**
 * virDomainAbortJob:
 * @domain: a domain object
 *
 * Requests that the current background job be aborted at the
M
Michal Privoznik 已提交
17356
 * soonest opportunity.
17357 17358 17359 17360 17361 17362 17363 17364
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainAbortJob(virDomainPtr domain)
{
    virConnectPtr conn;

17365
    VIR_DOMAIN_DEBUG(domain);
17366 17367 17368

    virResetLastError();

17369
    virCheckDomainReturn(domain, -1);
17370
    conn = domain->conn;
17371

17372
    virCheckReadOnlyGoto(conn->flags, error);
17373 17374 17375 17376 17377 17378 17379 17380 17381

    if (conn->driver->domainAbortJob) {
        int ret;
        ret = conn->driver->domainAbortJob(domain);
        if (ret < 0)
            goto error;
        return ret;
    }

17382
    virReportUnsupportedError();
17383 17384 17385 17386 17387

error:
    virDispatchError(conn);
    return -1;
}
17388 17389 17390 17391 17392 17393


/**
 * virDomainMigrateSetMaxDowntime:
 * @domain: a domain object
 * @downtime: maximum tolerable downtime for live migration, in milliseconds
17394
 * @flags: extra flags; not used yet, so callers should always pass 0
17395 17396 17397 17398 17399 17400 17401 17402 17403 17404 17405 17406 17407 17408
 *
 * Sets maximum tolerable time for which the domain is allowed to be paused
 * at the end of live migration. It's supposed to be called while the domain is
 * being live-migrated as a reaction to migration progress.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateSetMaxDowntime(virDomainPtr domain,
                               unsigned long long downtime,
                               unsigned int flags)
{
    virConnectPtr conn;

17409
    VIR_DOMAIN_DEBUG(domain, "downtime=%llu, flags=%x", downtime, flags);
17410 17411 17412

    virResetLastError();

17413
    virCheckDomainReturn(domain, -1);
17414
    conn = domain->conn;
17415

17416
    virCheckReadOnlyGoto(conn->flags, error);
17417 17418 17419 17420 17421 17422 17423

    if (conn->driver->domainMigrateSetMaxDowntime) {
        if (conn->driver->domainMigrateSetMaxDowntime(domain, downtime, flags) < 0)
            goto error;
        return 0;
    }

17424
    virReportUnsupportedError();
17425 17426 17427 17428 17429
error:
    virDispatchError(conn);
    return -1;
}

17430

17431 17432 17433 17434 17435 17436 17437 17438 17439 17440 17441 17442 17443 17444 17445 17446 17447 17448 17449 17450 17451 17452
/**
 * virDomainMigrateGetCompressionCache:
 * @domain: a domain object
 * @cacheSize: return value of current size of the cache (in bytes)
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Gets current size of the cache (in bytes) used for compressing repeatedly
 * transferred memory pages during live migration.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateGetCompressionCache(virDomainPtr domain,
                                    unsigned long long *cacheSize,
                                    unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cacheSize=%p, flags=%x", cacheSize, flags);

    virResetLastError();

17453
    virCheckDomainReturn(domain, -1);
17454 17455 17456 17457 17458 17459 17460 17461 17462 17463 17464
    conn = domain->conn;

    virCheckNonNullArgGoto(cacheSize, error);

    if (conn->driver->domainMigrateGetCompressionCache) {
        if (conn->driver->domainMigrateGetCompressionCache(domain, cacheSize,
                                                           flags) < 0)
            goto error;
        return 0;
    }

17465
    virReportUnsupportedError();
17466 17467 17468 17469 17470
error:
    virDispatchError(conn);
    return -1;
}

17471

17472 17473 17474 17475 17476 17477 17478 17479 17480 17481 17482 17483 17484 17485 17486 17487 17488 17489 17490 17491 17492 17493 17494 17495 17496
/**
 * virDomainMigrateSetCompressionCache:
 * @domain: a domain object
 * @cacheSize: size of the cache (in bytes) used for compression
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Sets size of the cache (in bytes) used for compressing repeatedly
 * transferred memory pages during live migration. It's supposed to be called
 * while the domain is being live-migrated as a reaction to migration progress
 * and increasing number of compression cache misses obtained from
 * virDomainGetJobStats.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateSetCompressionCache(virDomainPtr domain,
                                    unsigned long long cacheSize,
                                    unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "cacheSize=%llu, flags=%x", cacheSize, flags);

    virResetLastError();

17497
    virCheckDomainReturn(domain, -1);
17498
    conn = domain->conn;
17499

17500
    virCheckReadOnlyGoto(conn->flags, error);
17501 17502 17503 17504 17505 17506 17507 17508

    if (conn->driver->domainMigrateSetCompressionCache) {
        if (conn->driver->domainMigrateSetCompressionCache(domain, cacheSize,
                                                           flags) < 0)
            goto error;
        return 0;
    }

17509
    virReportUnsupportedError();
17510 17511 17512 17513 17514
error:
    virDispatchError(conn);
    return -1;
}

17515

17516 17517 17518
/**
 * virDomainMigrateSetMaxSpeed:
 * @domain: a domain object
17519
 * @bandwidth: migration bandwidth limit in MiB/s
17520
 * @flags: extra flags; not used yet, so callers should always pass 0
17521
 *
17522
 * The maximum bandwidth (in MiB/s) that will be used to do migration
17523 17524 17525 17526 17527 17528 17529 17530 17531 17532 17533 17534
 * can be specified with the bandwidth parameter. Not all hypervisors
 * will support a bandwidth cap
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateSetMaxSpeed(virDomainPtr domain,
                            unsigned long bandwidth,
                            unsigned int flags)
{
    virConnectPtr conn;

17535
    VIR_DOMAIN_DEBUG(domain, "bandwidth=%lu, flags=%x", bandwidth, flags);
17536 17537 17538

    virResetLastError();

17539
    virCheckDomainReturn(domain, -1);
17540
    conn = domain->conn;
17541

17542
    virCheckReadOnlyGoto(conn->flags, error);
17543 17544 17545 17546 17547 17548 17549

    if (conn->driver->domainMigrateSetMaxSpeed) {
        if (conn->driver->domainMigrateSetMaxSpeed(domain, bandwidth, flags) < 0)
            goto error;
        return 0;
    }

17550
    virReportUnsupportedError();
17551 17552 17553 17554 17555
error:
    virDispatchError(conn);
    return -1;
}

17556

17557 17558 17559
/**
 * virDomainMigrateGetMaxSpeed:
 * @domain: a domain object
17560
 * @bandwidth: return value of current migration bandwidth limit in MiB/s
17561
 * @flags: extra flags; not used yet, so callers should always pass 0
17562
 *
17563
 * Get the current maximum bandwidth (in MiB/s) that will be used if the
17564 17565 17566 17567 17568 17569 17570 17571 17572 17573 17574 17575 17576 17577 17578
 * domain is migrated.  Not all hypervisors will support a bandwidth limit.
 *
 * Returns 0 in case of success, -1 otherwise.
 */
int
virDomainMigrateGetMaxSpeed(virDomainPtr domain,
                            unsigned long *bandwidth,
                            unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "bandwidth = %p, flags=%x", bandwidth, flags);

    virResetLastError();

17579
    virCheckDomainReturn(domain, -1);
17580 17581
    conn = domain->conn;

17582
    virCheckNonNullArgGoto(bandwidth, error);
17583
    virCheckReadOnlyGoto(conn->flags, error);
17584 17585 17586 17587 17588 17589 17590

    if (conn->driver->domainMigrateGetMaxSpeed) {
        if (conn->driver->domainMigrateGetMaxSpeed(domain, bandwidth, flags) < 0)
            goto error;
        return 0;
    }

17591
    virReportUnsupportedError();
17592 17593 17594 17595 17596
error:
    virDispatchError(conn);
    return -1;
}

17597

17598 17599 17600 17601 17602 17603 17604 17605 17606 17607
/**
 * virConnectDomainEventRegisterAny:
 * @conn: pointer to the connection
 * @dom: pointer to the domain
 * @eventID: the event type to receive
 * @cb: callback to the function handling domain events
 * @opaque: opaque data to pass on to the callback
 * @freecb: optional function to deallocate opaque when not used anymore
 *
 * Adds a callback to receive notifications of arbitrary domain events
E
Eric Blake 已提交
17608 17609 17610
 * occurring on a domain.  This function requires that an event loop
 * has been previously registered with virEventRegisterImpl() or
 * virEventRegisterDefaultImpl().
17611
 *
17612
 * If @dom is NULL, then events will be monitored for any domain. If @dom
E
Eric Blake 已提交
17613
 * is non-NULL, then only the specific domain will be monitored.
17614 17615
 *
 * Most types of event have a callback providing a custom set of parameters
17616
 * for the event. When registering an event, it is thus necessary to use
17617 17618 17619 17620 17621
 * the VIR_DOMAIN_EVENT_CALLBACK() macro to cast the supplied function pointer
 * to match the signature of this method.
 *
 * The virDomainPtr object handle passed into the callback upon delivery
 * of an event is only valid for the duration of execution of the callback.
17622
 * If the callback wishes to keep the domain object after the callback returns,
17623
 * it shall take a reference to it, by calling virDomainRef().
17624
 * The reference can be released once the object is no longer required
17625
 * by calling virDomainFree().
17626 17627 17628
 *
 * The return value from this method is a positive integer identifier
 * for the callback. To unregister a callback, this callback ID should
17629
 * be passed to the virConnectDomainEventDeregisterAny() method.
17630
 *
E
Eric Blake 已提交
17631
 * Returns a callback identifier on success, -1 on failure.
17632 17633 17634 17635 17636 17637 17638 17639 17640
 */
int
virConnectDomainEventRegisterAny(virConnectPtr conn,
                                 virDomainPtr dom,
                                 int eventID,
                                 virConnectDomainEventGenericCallback cb,
                                 void *opaque,
                                 virFreeCallback freecb)
{
17641 17642 17643
    VIR_DOMAIN_DEBUG(dom, "conn=%p, eventID=%d, cb=%p, opaque=%p, freecb=%p",
                     conn, eventID, cb, opaque, freecb);

17644 17645
    virResetLastError();

17646
    virCheckConnectReturn(conn, -1);
17647 17648 17649 17650 17651 17652 17653 17654
    if (dom) {
        virCheckDomainGoto(dom, error);
        if (dom->conn != conn) {
            virReportInvalidArg(dom,
                                _("domain '%s' in %s must match connection"),
                                dom->name, __FUNCTION__);
            goto error;
        }
17655
    }
17656 17657 17658 17659 17660 17661
    virCheckNonNullArgGoto(cb, error);
    virCheckNonNegativeArgGoto(eventID, error);
    if (eventID >= VIR_DOMAIN_EVENT_ID_LAST) {
        virReportInvalidArg(eventID,
                            _("eventID in %s must be less than %d"),
                            __FUNCTION__, VIR_DOMAIN_EVENT_ID_LAST);
17662 17663 17664
        goto error;
    }

17665
    if (conn->driver && conn->driver->connectDomainEventRegisterAny) {
17666
        int ret;
17667
        ret = conn->driver->connectDomainEventRegisterAny(conn, dom, eventID, cb, opaque, freecb);
17668 17669 17670 17671 17672
        if (ret < 0)
            goto error;
        return ret;
    }

17673
    virReportUnsupportedError();
17674 17675 17676 17677
error:
    virDispatchError(conn);
    return -1;
}
17678

17679

17680 17681 17682 17683 17684 17685
/**
 * virConnectDomainEventDeregisterAny:
 * @conn: pointer to the connection
 * @callbackID: the callback identifier
 *
 * Removes an event callback. The callbackID parameter should be the
17686
 * value obtained from a previous virConnectDomainEventRegisterAny() method.
17687
 *
17688 17689 17690
 * Returns 0 on success, -1 on failure.  Older versions of some hypervisors
 * sometimes returned a positive number on success, but without any reliable
 * semantics on what that number represents. */
17691 17692 17693 17694
int
virConnectDomainEventDeregisterAny(virConnectPtr conn,
                                   int callbackID)
{
17695
    VIR_DEBUG("conn=%p, callbackID=%d", conn, callbackID);
17696 17697 17698

    virResetLastError();

17699
    virCheckConnectReturn(conn, -1);
17700 17701
    virCheckNonNegativeArgGoto(callbackID, error);

17702
    if (conn->driver && conn->driver->connectDomainEventDeregisterAny) {
17703
        int ret;
17704
        ret = conn->driver->connectDomainEventDeregisterAny(conn, callbackID);
17705 17706 17707 17708 17709
        if (ret < 0)
            goto error;
        return ret;
    }

17710
    virReportUnsupportedError();
17711 17712 17713 17714
error:
    virDispatchError(conn);
    return -1;
}
17715

17716

17717 17718 17719 17720 17721 17722 17723 17724 17725 17726
/**
 * virConnectNetworkEventRegisterAny:
 * @conn: pointer to the connection
 * @net: pointer to the network
 * @eventID: the event type to receive
 * @cb: callback to the function handling network events
 * @opaque: opaque data to pass on to the callback
 * @freecb: optional function to deallocate opaque when not used anymore
 *
 * Adds a callback to receive notifications of arbitrary network events
E
Eric Blake 已提交
17727 17728 17729
 * occurring on a network.  This function requires that an event loop
 * has been previously registered with virEventRegisterImpl() or
 * virEventRegisterDefaultImpl().
17730
 *
17731
 * If @net is NULL, then events will be monitored for any network. If @net
E
Eric Blake 已提交
17732
 * is non-NULL, then only the specific network will be monitored.
17733 17734 17735 17736 17737 17738 17739 17740 17741
 *
 * Most types of event have a callback providing a custom set of parameters
 * for the event. When registering an event, it is thus necessary to use
 * the VIR_NETWORK_EVENT_CALLBACK() macro to cast the supplied function pointer
 * to match the signature of this method.
 *
 * The virNetworkPtr object handle passed into the callback upon delivery
 * of an event is only valid for the duration of execution of the callback.
 * If the callback wishes to keep the network object after the callback
17742
 * returns, it shall take a reference to it, by calling virNetworkRef().
17743
 * The reference can be released once the object is no longer required
17744
 * by calling virNetworkFree().
17745 17746 17747
 *
 * The return value from this method is a positive integer identifier
 * for the callback. To unregister a callback, this callback ID should
17748
 * be passed to the virConnectNetworkEventDeregisterAny() method.
17749
 *
E
Eric Blake 已提交
17750
 * Returns a callback identifier on success, -1 on failure.
17751 17752 17753 17754 17755 17756 17757 17758 17759 17760 17761 17762 17763 17764
 */
int
virConnectNetworkEventRegisterAny(virConnectPtr conn,
                                  virNetworkPtr net,
                                  int eventID,
                                  virConnectNetworkEventGenericCallback cb,
                                  void *opaque,
                                  virFreeCallback freecb)
{
    VIR_DEBUG("conn=%p, eventID=%d, cb=%p, opaque=%p, freecb=%p",
              conn, eventID, cb, opaque, freecb);

    virResetLastError();

17765
    virCheckConnectReturn(conn, -1);
17766 17767 17768 17769 17770 17771 17772 17773
    if (net) {
        virCheckNetworkGoto(net, error);
        if (net->conn != conn) {
            virReportInvalidArg(net,
                                _("network '%s' in %s must match connection"),
                                net->name, __FUNCTION__);
            goto error;
        }
17774 17775 17776 17777 17778 17779 17780 17781 17782 17783 17784
    }
    virCheckNonNullArgGoto(cb, error);
    virCheckNonNegativeArgGoto(eventID, error);

    if (eventID >= VIR_NETWORK_EVENT_ID_LAST) {
        virReportInvalidArg(eventID,
                            _("eventID in %s must be less than %d"),
                            __FUNCTION__, VIR_NETWORK_EVENT_ID_LAST);
        goto error;
    }

17785
    if (conn->networkDriver && conn->networkDriver->connectNetworkEventRegisterAny) {
17786 17787 17788 17789 17790 17791 17792 17793 17794 17795
        int ret;
        ret = conn->networkDriver->connectNetworkEventRegisterAny(conn, net,
                                                                  eventID,
                                                                  cb, opaque,
                                                                  freecb);
        if (ret < 0)
            goto error;
        return ret;
    }

17796
    virReportUnsupportedError();
17797 17798 17799 17800 17801
error:
    virDispatchError(conn);
    return -1;
}

17802

17803 17804 17805 17806 17807 17808
/**
 * virConnectNetworkEventDeregisterAny:
 * @conn: pointer to the connection
 * @callbackID: the callback identifier
 *
 * Removes an event callback. The callbackID parameter should be the
17809
 * value obtained from a previous virConnectNetworkEventRegisterAny() method.
17810 17811 17812 17813 17814 17815 17816 17817 17818 17819 17820
 *
 * Returns 0 on success, -1 on failure
 */
int
virConnectNetworkEventDeregisterAny(virConnectPtr conn,
                                    int callbackID)
{
    VIR_DEBUG("conn=%p, callbackID=%d", conn, callbackID);

    virResetLastError();

17821
    virCheckConnectReturn(conn, -1);
17822 17823
    virCheckNonNegativeArgGoto(callbackID, error);

17824 17825
    if (conn->networkDriver &&
        conn->networkDriver->connectNetworkEventDeregisterAny) {
17826 17827 17828 17829 17830 17831 17832 17833
        int ret;
        ret = conn->networkDriver->connectNetworkEventDeregisterAny(conn,
                                                                    callbackID);
        if (ret < 0)
            goto error;
        return ret;
    }

17834
    virReportUnsupportedError();
17835 17836 17837 17838 17839
error:
    virDispatchError(conn);
    return -1;
}

17840

17841 17842 17843
/**
 * virDomainManagedSave:
 * @dom: pointer to the domain
17844
 * @flags: bitwise-OR of virDomainSaveRestoreFlags
17845 17846 17847 17848 17849 17850 17851 17852
 *
 * This method will suspend a domain and save its memory contents to
 * a file on disk. After the call, if successful, the domain is not
 * listed as running anymore.
 * The difference from virDomainSave() is that libvirt is keeping track of
 * the saved state itself, and will reuse it once the domain is being
 * restarted (automatically or via an explicit libvirt call).
 * As a result any running domain is sure to not have a managed saved image.
17853 17854 17855
 * This also implies that managed save only works on persistent domains,
 * since the domain must still exist in order to use virDomainCreate() to
 * restart it.
17856
 *
17857 17858 17859 17860 17861
 * If @flags includes VIR_DOMAIN_SAVE_BYPASS_CACHE, then libvirt will
 * attempt to bypass the file system cache while creating the file, or
 * fail if it cannot do so for the given system; this can allow less
 * pressure on file system cache, but also risks slowing saves to NFS.
 *
17862 17863 17864 17865 17866 17867
 * Normally, the managed saved state will remember whether the domain
 * was running or paused, and start will resume to the same state.
 * Specifying VIR_DOMAIN_SAVE_RUNNING or VIR_DOMAIN_SAVE_PAUSED in
 * @flags will override the default saved into the file.  These two
 * flags are mutually exclusive.
 *
17868 17869
 * Returns 0 in case of success or -1 in case of failure
 */
17870 17871
int
virDomainManagedSave(virDomainPtr dom, unsigned int flags)
17872 17873 17874
{
    virConnectPtr conn;

17875
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);
17876 17877 17878

    virResetLastError();

17879
    virCheckDomainReturn(dom, -1);
17880
    conn = dom->conn;
17881

17882
    virCheckReadOnlyGoto(conn->flags, error);
17883

17884
    if ((flags & VIR_DOMAIN_SAVE_RUNNING) && (flags & VIR_DOMAIN_SAVE_PAUSED)) {
17885
        virReportInvalidArg(flags,
17886 17887
                            _("running and paused flags in %s are mutually "
                              "exclusive"),
17888
                            __FUNCTION__);
17889 17890 17891
        goto error;
    }

17892 17893 17894 17895 17896 17897 17898 17899 17900
    if (conn->driver->domainManagedSave) {
        int ret;

        ret = conn->driver->domainManagedSave(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

17901
    virReportUnsupportedError();
17902 17903 17904 17905 17906 17907

error:
    virDispatchError(conn);
    return -1;
}

17908

17909 17910 17911
/**
 * virDomainHasManagedSaveImage:
 * @dom: pointer to the domain
17912
 * @flags: extra flags; not used yet, so callers should always pass 0
17913 17914 17915 17916 17917 17918 17919 17920
 *
 * Check if a domain has a managed save image as created by
 * virDomainManagedSave(). Note that any running domain should not have
 * such an image, as it should have been removed on restart.
 *
 * Returns 0 if no image is present, 1 if an image is present, and
 *         -1 in case of error
 */
17921 17922
int
virDomainHasManagedSaveImage(virDomainPtr dom, unsigned int flags)
17923 17924 17925
{
    virConnectPtr conn;

17926
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);
17927 17928 17929

    virResetLastError();

17930
    virCheckDomainReturn(dom, -1);
17931 17932 17933 17934 17935 17936 17937 17938 17939 17940 17941
    conn = dom->conn;

    if (conn->driver->domainHasManagedSaveImage) {
        int ret;

        ret = conn->driver->domainHasManagedSaveImage(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

17942
    virReportUnsupportedError();
17943 17944 17945 17946 17947 17948

error:
    virDispatchError(conn);
    return -1;
}

17949

17950 17951 17952
/**
 * virDomainManagedSaveRemove:
 * @dom: pointer to the domain
17953
 * @flags: extra flags; not used yet, so callers should always pass 0
17954
 *
D
Daniel Veillard 已提交
17955
 * Remove any managed save image for this domain.
17956 17957 17958
 *
 * Returns 0 in case of success, and -1 in case of error
 */
17959 17960
int
virDomainManagedSaveRemove(virDomainPtr dom, unsigned int flags)
17961 17962 17963
{
    virConnectPtr conn;

17964
    VIR_DOMAIN_DEBUG(dom, "flags=%x", flags);
17965 17966 17967

    virResetLastError();

17968
    virCheckDomainReturn(dom, -1);
17969
    conn = dom->conn;
17970

17971
    virCheckReadOnlyGoto(conn->flags, error);
17972 17973 17974 17975 17976 17977 17978 17979 17980 17981

    if (conn->driver->domainManagedSaveRemove) {
        int ret;

        ret = conn->driver->domainManagedSaveRemove(dom, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

17982
    virReportUnsupportedError();
17983 17984 17985 17986 17987

error:
    virDispatchError(conn);
    return -1;
}
C
Chris Lalancette 已提交
17988

17989

17990 17991 17992 17993 17994 17995 17996 17997 17998 17999 18000 18001 18002 18003 18004 18005
/**
 * virDomainSnapshotGetName:
 * @snapshot: a snapshot object
 *
 * Get the public name for that snapshot
 *
 * Returns a pointer to the name or NULL, the string need not be deallocated
 * as its lifetime will be the same as the snapshot object.
 */
const char *
virDomainSnapshotGetName(virDomainSnapshotPtr snapshot)
{
    VIR_DEBUG("snapshot=%p", snapshot);

    virResetLastError();

18006 18007
    virCheckDomainSnapshotReturn(snapshot, NULL);

18008 18009 18010
    return snapshot->name;
}

18011

18012 18013 18014 18015
/**
 * virDomainSnapshotGetDomain:
 * @snapshot: a snapshot object
 *
18016 18017 18018 18019 18020 18021
 * Provides the domain pointer associated with a snapshot.  The
 * reference counter on the domain is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do not use this
 * function.  Instead, store the domain and the snapshot object together.
18022 18023 18024 18025 18026 18027 18028 18029 18030 18031
 *
 * Returns the domain or NULL.
 */
virDomainPtr
virDomainSnapshotGetDomain(virDomainSnapshotPtr snapshot)
{
    VIR_DEBUG("snapshot=%p", snapshot);

    virResetLastError();

18032 18033
    virCheckDomainSnapshotReturn(snapshot, NULL);

18034 18035 18036
    return snapshot->domain;
}

18037

18038 18039 18040 18041
/**
 * virDomainSnapshotGetConnect:
 * @snapshot: a snapshot object
 *
18042 18043 18044 18045 18046 18047
 * Provides the connection pointer associated with a snapshot.  The
 * reference counter on the connection is not increased by this
 * call.
 *
 * WARNING: When writing libvirt bindings in other languages, do not use this
 * function.  Instead, store the connection and the snapshot object together.
18048 18049 18050 18051 18052 18053 18054 18055 18056 18057
 *
 * Returns the connection or NULL.
 */
virConnectPtr
virDomainSnapshotGetConnect(virDomainSnapshotPtr snapshot)
{
    VIR_DEBUG("snapshot=%p", snapshot);

    virResetLastError();

18058 18059
    virCheckDomainSnapshotReturn(snapshot, NULL);

18060 18061 18062
    return snapshot->domain->conn;
}

18063

C
Chris Lalancette 已提交
18064 18065 18066 18067
/**
 * virDomainSnapshotCreateXML:
 * @domain: a domain object
 * @xmlDesc: string containing an XML description of the domain
18068
 * @flags: bitwise-OR of virDomainSnapshotCreateFlags
C
Chris Lalancette 已提交
18069 18070 18071 18072
 *
 * Creates a new snapshot of a domain based on the snapshot xml
 * contained in xmlDesc.
 *
18073 18074 18075 18076 18077 18078 18079 18080 18081 18082 18083 18084 18085 18086 18087 18088 18089 18090 18091 18092 18093 18094 18095 18096 18097 18098 18099 18100 18101 18102 18103 18104 18105 18106 18107
 * If @flags is 0, the domain can be active, in which case the
 * snapshot will be a system checkpoint (both disk state and runtime
 * VM state such as RAM contents), where reverting to the snapshot is
 * the same as resuming from hibernation (TCP connections may have
 * timed out, but everything else picks up where it left off); or
 * the domain can be inactive, in which case the snapshot includes
 * just the disk state prior to booting.  The newly created snapshot
 * becomes current (see virDomainSnapshotCurrent()), and is a child
 * of any previous current snapshot.
 *
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE, then this
 * is a request to reinstate snapshot metadata that was previously
 * discarded, rather than creating a new snapshot.  This can be used
 * to recreate a snapshot hierarchy on a destination, then remove it
 * on the source, in order to allow migration (since migration
 * normally fails if snapshot metadata still remains on the source
 * machine).  When redefining snapshot metadata, the current snapshot
 * will not be altered unless the VIR_DOMAIN_SNAPSHOT_CREATE_CURRENT
 * flag is also present.  It is an error to request the
 * VIR_DOMAIN_SNAPSHOT_CREATE_CURRENT flag without
 * VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE.  On some hypervisors,
 * redefining an existing snapshot can be used to alter host-specific
 * portions of the domain XML to be used during revert (such as
 * backing filenames associated with disk devices), but must not alter
 * guest-visible layout.  When redefining a snapshot name that does
 * not exist, the hypervisor may validate that reverting to the
 * snapshot appears to be possible (for example, disk images have
 * snapshot contents by the requested name).  Not all hypervisors
 * support these flags.
 *
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_NO_METADATA, then the
 * domain's disk images are modified according to @xmlDesc, but then
 * the just-created snapshot has its metadata deleted.  This flag is
 * incompatible with VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE.
 *
18108 18109 18110 18111 18112 18113
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_HALT, then the domain
 * will be inactive after the snapshot completes, regardless of whether
 * it was active before; otherwise, a running domain will still be
 * running after the snapshot.  This flag is invalid on transient domains,
 * and is incompatible with VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE.
 *
18114 18115 18116 18117 18118 18119
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_LIVE, then the domain
 * is not paused while creating the snapshot. This increases the size
 * of the memory dump file, but reduces downtime of the guest while
 * taking the snapshot. Some hypervisors only support this flag during
 * external checkpoints.
 *
18120 18121 18122 18123 18124 18125
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_DISK_ONLY, then the
 * snapshot will be limited to the disks described in @xmlDesc, and no
 * VM state will be saved.  For an active guest, the disk image may be
 * inconsistent (as if power had been pulled), and specifying this
 * with the VIR_DOMAIN_SNAPSHOT_CREATE_HALT flag risks data loss.
 *
18126 18127 18128 18129 18130 18131
 * If @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_QUIESCE, then the
 * libvirt will attempt to use guest agent to freeze and thaw all
 * file systems in use within domain OS. However, if the guest agent
 * is not present, an error is thrown. Moreover, this flag requires
 * VIR_DOMAIN_SNAPSHOT_CREATE_DISK_ONLY to be passed as well.
 *
18132
 * By default, if the snapshot involves external files, and any of the
18133 18134 18135 18136 18137 18138 18139
 * destination files already exist as a non-empty regular file, the
 * snapshot is rejected to avoid losing contents of those files.
 * However, if @flags includes VIR_DOMAIN_SNAPSHOT_CREATE_REUSE_EXT,
 * then the destination files must already exist and contain content
 * identical to the source files (this allows a management app to
 * pre-create files with relative backing file names, rather than the
 * default of creating with absolute backing file names).
18140 18141
 *
 * Be aware that although libvirt prefers to report errors up front with
E
Eric Blake 已提交
18142 18143 18144 18145 18146 18147 18148 18149 18150 18151 18152 18153 18154
 * no other effect, some hypervisors have certain types of failures where
 * the overall command can easily fail even though the guest configuration
 * was partially altered (for example, if a disk snapshot request for two
 * disks fails on the second disk, but the first disk alteration cannot be
 * rolled back).  If this API call fails, it is therefore normally
 * necessary to follow up with virDomainGetXMLDesc() and check each disk
 * to determine if any partial changes occurred.  However, if @flags
 * contains VIR_DOMAIN_SNAPSHOT_CREATE_ATOMIC, then libvirt guarantees
 * that this command will not alter any disks unless the entire set of
 * changes can be done atomically, making failure recovery simpler (note
 * that it is still possible to fail after disks have changed, but only
 * in the much rarer cases of running out of memory or disk space).
 *
E
Eric Blake 已提交
18155 18156 18157 18158
 * Some hypervisors may prevent this operation if there is a current
 * block copy operation; in that case, use virDomainBlockJobAbort()
 * to stop the block copy first.
 *
E
Eric Blake 已提交
18159
 * Returns an (opaque) virDomainSnapshotPtr on success, NULL on failure.
C
Chris Lalancette 已提交
18160 18161 18162 18163 18164 18165 18166 18167
 */
virDomainSnapshotPtr
virDomainSnapshotCreateXML(virDomainPtr domain,
                           const char *xmlDesc,
                           unsigned int flags)
{
    virConnectPtr conn;

18168
    VIR_DOMAIN_DEBUG(domain, "xmlDesc=%s, flags=%x", xmlDesc, flags);
C
Chris Lalancette 已提交
18169 18170 18171

    virResetLastError();

18172
    virCheckDomainReturn(domain, NULL);
C
Chris Lalancette 已提交
18173
    conn = domain->conn;
18174

18175
    virCheckNonNullArgGoto(xmlDesc, error);
18176
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
18177

18178 18179
    if ((flags & VIR_DOMAIN_SNAPSHOT_CREATE_CURRENT) &&
        !(flags & VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE)) {
18180
        virReportInvalidArg(flags,
18181 18182
                            _("use of 'current' flag in %s requires "
                              "'redefine' flag"),
18183
                            __FUNCTION__);
18184 18185 18186 18187
        goto error;
    }
    if ((flags & VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE) &&
        (flags & VIR_DOMAIN_SNAPSHOT_CREATE_NO_METADATA)) {
18188
        virReportInvalidArg(flags,
18189 18190
                            _("'redefine' and 'no metadata' flags in %s are "
                              "mutually exclusive"),
18191
                            __FUNCTION__);
18192 18193
        goto error;
    }
18194 18195
    if ((flags & VIR_DOMAIN_SNAPSHOT_CREATE_REDEFINE) &&
        (flags & VIR_DOMAIN_SNAPSHOT_CREATE_HALT)) {
18196
        virReportInvalidArg(flags,
18197 18198
                            _("'redefine' and 'halt' flags in %s are mutually "
                              "exclusive"),
18199
                            __FUNCTION__);
18200 18201
        goto error;
    }
18202

C
Chris Lalancette 已提交
18203 18204 18205 18206 18207 18208 18209 18210
    if (conn->driver->domainSnapshotCreateXML) {
        virDomainSnapshotPtr ret;
        ret = conn->driver->domainSnapshotCreateXML(domain, xmlDesc, flags);
        if (!ret)
            goto error;
        return ret;
    }

18211
    virReportUnsupportedError();
C
Chris Lalancette 已提交
18212 18213 18214 18215 18216
error:
    virDispatchError(conn);
    return NULL;
}

18217

C
Chris Lalancette 已提交
18218 18219 18220
/**
 * virDomainSnapshotGetXMLDesc:
 * @snapshot: a domain snapshot object
18221
 * @flags: bitwise-OR of subset of virDomainXMLFlags
C
Chris Lalancette 已提交
18222 18223 18224
 *
 * Provide an XML description of the domain snapshot.
 *
18225 18226 18227 18228 18229
 * No security-sensitive data will be included unless @flags contains
 * VIR_DOMAIN_XML_SECURE; this flag is rejected on read-only
 * connections.  For this API, @flags should not contain either
 * VIR_DOMAIN_XML_INACTIVE or VIR_DOMAIN_XML_UPDATE_CPU.
 *
C
Chris Lalancette 已提交
18230 18231 18232 18233 18234 18235 18236 18237
 * Returns a 0 terminated UTF-8 encoded XML instance, or NULL in case of error.
 *         the caller must free() the returned value.
 */
char *
virDomainSnapshotGetXMLDesc(virDomainSnapshotPtr snapshot,
                            unsigned int flags)
{
    virConnectPtr conn;
18238
    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);
C
Chris Lalancette 已提交
18239 18240 18241

    virResetLastError();

18242
    virCheckDomainSnapshotReturn(snapshot, NULL);
C
Chris Lalancette 已提交
18243 18244 18245
    conn = snapshot->domain->conn;

    if ((conn->flags & VIR_CONNECT_RO) && (flags & VIR_DOMAIN_XML_SECURE)) {
18246 18247
        virReportError(VIR_ERR_OPERATION_DENIED, "%s",
                       _("virDomainSnapshotGetXMLDesc with secure flag"));
C
Chris Lalancette 已提交
18248 18249 18250
        goto error;
    }

18251
    if (conn->driver->domainSnapshotGetXMLDesc) {
C
Chris Lalancette 已提交
18252
        char *ret;
18253
        ret = conn->driver->domainSnapshotGetXMLDesc(snapshot, flags);
C
Chris Lalancette 已提交
18254 18255 18256 18257 18258
        if (!ret)
            goto error;
        return ret;
    }

18259
    virReportUnsupportedError();
C
Chris Lalancette 已提交
18260 18261 18262 18263 18264
error:
    virDispatchError(conn);
    return NULL;
}

18265

C
Chris Lalancette 已提交
18266 18267 18268
/**
 * virDomainSnapshotNum:
 * @domain: a domain object
18269
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
18270 18271
 *
 * Provides the number of domain snapshots for this domain.
C
Chris Lalancette 已提交
18272
 *
18273 18274 18275 18276 18277 18278 18279 18280 18281 18282 18283 18284 18285 18286 18287 18288
 * By default, this command covers all snapshots; it is also possible to
 * limit things to just snapshots with no parents, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_ROOTS.  Additional filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
C
Chris Lalancette 已提交
18289
 *
18290 18291 18292 18293
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
18294
 *
18295 18296 18297 18298 18299 18300 18301 18302 18303 18304
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18305
 * Returns the number of domain snapshots found or -1 in case of error.
C
Chris Lalancette 已提交
18306 18307 18308 18309 18310
 */
int
virDomainSnapshotNum(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;
18311

E
Eric Blake 已提交
18312
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
C
Chris Lalancette 已提交
18313 18314 18315

    virResetLastError();

18316
    virCheckDomainReturn(domain, -1);
C
Chris Lalancette 已提交
18317 18318 18319 18320 18321 18322 18323 18324 18325

    conn = domain->conn;
    if (conn->driver->domainSnapshotNum) {
        int ret = conn->driver->domainSnapshotNum(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18326
    virReportUnsupportedError();
C
Chris Lalancette 已提交
18327 18328 18329 18330 18331
error:
    virDispatchError(conn);
    return -1;
}

18332

C
Chris Lalancette 已提交
18333 18334 18335 18336 18337
/**
 * virDomainSnapshotListNames:
 * @domain: a domain object
 * @names: array to collect the list of names of snapshots
 * @nameslen: size of @names
18338
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
C
Chris Lalancette 已提交
18339 18340
 *
 * Collect the list of domain snapshots for the given domain, and store
18341 18342
 * their names in @names.  The value to use for @nameslen can be determined
 * by virDomainSnapshotNum() with the same @flags.
18343
 *
18344 18345 18346 18347 18348 18349 18350 18351 18352 18353 18354 18355 18356 18357 18358 18359
 * By default, this command covers all snapshots; it is also possible to
 * limit things to just snapshots with no parents, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_ROOTS.  Additional filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
18360
 *
18361 18362 18363 18364
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
C
Chris Lalancette 已提交
18365
 *
18366 18367 18368 18369 18370 18371 18372 18373 18374 18375
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18376 18377 18378 18379 18380 18381
 * Note that this command is inherently racy: another connection can
 * define a new snapshot between a call to virDomainSnapshotNum() and
 * this call.  You are only guaranteed that all currently defined
 * snapshots were listed if the return is less than @nameslen.  Likewise,
 * you should be prepared for virDomainSnapshotLookupByName() to fail when
 * converting a name from this call into a snapshot object, if another
18382 18383 18384 18385
 * connection deletes the snapshot in the meantime.  For more control over
 * the results, see virDomainListAllSnapshots().
 *
 * Returns the number of domain snapshots found or -1 in case of error.
J
John Ferlan 已提交
18386
 * The caller is responsible to call free() for each member of the array.
C
Chris Lalancette 已提交
18387 18388 18389 18390 18391 18392 18393
 */
int
virDomainSnapshotListNames(virDomainPtr domain, char **names, int nameslen,
                           unsigned int flags)
{
    virConnectPtr conn;

18394
    VIR_DOMAIN_DEBUG(domain, "names=%p, nameslen=%d, flags=%x",
18395
                     names, nameslen, flags);
C
Chris Lalancette 已提交
18396 18397 18398

    virResetLastError();

18399
    virCheckDomainReturn(domain, -1);
C
Chris Lalancette 已提交
18400 18401
    conn = domain->conn;

18402 18403
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(nameslen, error);
C
Chris Lalancette 已提交
18404 18405 18406 18407 18408 18409 18410 18411 18412

    if (conn->driver->domainSnapshotListNames) {
        int ret = conn->driver->domainSnapshotListNames(domain, names,
                                                        nameslen, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18413
    virReportUnsupportedError();
C
Chris Lalancette 已提交
18414 18415 18416 18417 18418
error:
    virDispatchError(conn);
    return -1;
}

18419

18420 18421 18422 18423 18424 18425 18426 18427 18428 18429 18430 18431 18432 18433 18434 18435 18436 18437 18438 18439 18440 18441 18442 18443 18444 18445 18446 18447 18448 18449 18450 18451 18452 18453
/**
 * virDomainListAllSnapshots:
 * @domain: a domain object
 * @snaps: pointer to variable to store the array containing snapshot objects,
 *         or NULL if the list is not required (just returns number of
 *         snapshots)
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
 *
 * Collect the list of domain snapshots for the given domain, and allocate
 * an array to store those objects.  This API solves the race inherent in
 * virDomainSnapshotListNames().
 *
 * By default, this command covers all snapshots; it is also possible to
 * limit things to just snapshots with no parents, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_ROOTS.  Additional filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
 *
18454 18455 18456 18457 18458 18459 18460 18461 18462 18463
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18464 18465 18466 18467 18468 18469 18470 18471 18472 18473 18474 18475 18476 18477 18478 18479 18480 18481 18482 18483
 * Returns the number of domain snapshots found or -1 and sets @snaps to
 * NULL in case of error.  On success, the array stored into @snaps is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virDomainSnapshotFree() on each array element, then calling
 * free() on @snaps.
 */
int
virDomainListAllSnapshots(virDomainPtr domain, virDomainSnapshotPtr **snaps,
                          unsigned int flags)
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain, "snaps=%p, flags=%x", snaps, flags);

    virResetLastError();

    if (snaps)
        *snaps = NULL;

18484
    virCheckDomainReturn(domain, -1);
18485 18486 18487 18488 18489 18490 18491 18492 18493
    conn = domain->conn;

    if (conn->driver->domainListAllSnapshots) {
        int ret = conn->driver->domainListAllSnapshots(domain, snaps, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18494
    virReportUnsupportedError();
18495 18496 18497 18498 18499
error:
    virDispatchError(conn);
    return -1;
}

18500

18501 18502 18503
/**
 * virDomainSnapshotNumChildren:
 * @snapshot: a domain snapshot object
18504
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
18505 18506 18507
 *
 * Provides the number of child snapshots for this domain snapshot.
 *
18508 18509 18510 18511 18512 18513 18514 18515 18516 18517 18518 18519
 * By default, this command covers only direct children; it is also possible
 * to expand things to cover all descendants, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_DESCENDANTS.  Also, some filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
18520
 *
18521 18522 18523
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
18524
 *
18525 18526 18527 18528
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
18529
 *
18530 18531 18532 18533 18534 18535 18536 18537 18538 18539
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18540 18541 18542 18543 18544 18545 18546 18547 18548 18549 18550
 * Returns the number of domain snapshots found or -1 in case of error.
 */
int
virDomainSnapshotNumChildren(virDomainSnapshotPtr snapshot, unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

18551
    virCheckDomainSnapshotReturn(snapshot, -1);
18552
    conn = snapshot->domain->conn;
18553

18554 18555 18556 18557 18558 18559 18560
    if (conn->driver->domainSnapshotNumChildren) {
        int ret = conn->driver->domainSnapshotNumChildren(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18561
    virReportUnsupportedError();
18562 18563 18564 18565 18566
error:
    virDispatchError(conn);
    return -1;
}

18567

18568 18569 18570 18571 18572
/**
 * virDomainSnapshotListChildrenNames:
 * @snapshot: a domain snapshot object
 * @names: array to collect the list of names of snapshots
 * @nameslen: size of @names
18573
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
18574 18575
 *
 * Collect the list of domain snapshots that are children of the given
18576 18577 18578
 * snapshot, and store their names in @names.  The value to use for
 * @nameslen can be determined by virDomainSnapshotNumChildren() with
 * the same @flags.
18579
 *
18580 18581 18582 18583 18584 18585 18586 18587 18588 18589 18590 18591
 * By default, this command covers only direct children; it is also possible
 * to expand things to cover all descendants, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_DESCENDANTS.  Also, some filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
18592
 *
18593 18594 18595
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
18596
 *
18597 18598 18599 18600
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
18601
 *
18602 18603 18604 18605 18606 18607 18608 18609 18610 18611
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18612
 * Returns the number of domain snapshots found or -1 in case of error.
18613 18614 18615 18616 18617 18618
 * Note that this command is inherently racy: another connection can
 * define a new snapshot between a call to virDomainSnapshotNumChildren()
 * and this call.  You are only guaranteed that all currently defined
 * snapshots were listed if the return is less than @nameslen.  Likewise,
 * you should be prepared for virDomainSnapshotLookupByName() to fail when
 * converting a name from this call into a snapshot object, if another
18619 18620 18621 18622
 * connection deletes the snapshot in the meantime.  For more control over
 * the results, see virDomainSnapshotListAllChildren().
 *
 * Returns the number of domain snapshots found or -1 in case of error.
J
John Ferlan 已提交
18623
 * The caller is responsible to call free() for each member of the array.
18624 18625 18626 18627 18628 18629 18630 18631 18632 18633 18634 18635 18636
 */
int
virDomainSnapshotListChildrenNames(virDomainSnapshotPtr snapshot,
                                   char **names, int nameslen,
                                   unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, names=%p, nameslen=%d, flags=%x",
              snapshot, names, nameslen, flags);

    virResetLastError();

18637
    virCheckDomainSnapshotReturn(snapshot, -1);
18638 18639
    conn = snapshot->domain->conn;

18640 18641
    virCheckNonNullArgGoto(names, error);
    virCheckNonNegativeArgGoto(nameslen, error);
18642 18643 18644 18645 18646 18647

    if (conn->driver->domainSnapshotListChildrenNames) {
        int ret = conn->driver->domainSnapshotListChildrenNames(snapshot,
                                                                names,
                                                                nameslen,
                                                                flags);
18648 18649 18650 18651 18652
        if (ret < 0)
            goto error;
        return ret;
    }

18653
    virReportUnsupportedError();
18654 18655 18656 18657 18658
error:
    virDispatchError(conn);
    return -1;
}

18659

18660 18661 18662 18663 18664 18665 18666 18667 18668 18669 18670 18671 18672 18673 18674 18675 18676 18677 18678 18679 18680 18681 18682 18683 18684 18685 18686 18687 18688 18689 18690 18691 18692 18693
/**
 * virDomainSnapshotListAllChildren:
 * @snapshot: a domain snapshot object
 * @snaps: pointer to variable to store the array containing snapshot objects,
 *         or NULL if the list is not required (just returns number of
 *         snapshots)
 * @flags: bitwise-OR of supported virDomainSnapshotListFlags
 *
 * Collect the list of domain snapshots that are children of the given
 * snapshot, and allocate an array to store those objects.  This API solves
 * the race inherent in virDomainSnapshotListChildrenNames().
 *
 * By default, this command covers only direct children; it is also possible
 * to expand things to cover all descendants, when @flags includes
 * VIR_DOMAIN_SNAPSHOT_LIST_DESCENDANTS.  Also, some filters are provided in
 * groups, where each group contains bits that describe mutually exclusive
 * attributes of a snapshot, and where all bits within a group describe
 * all possible snapshots.  Some hypervisors might reject explicit bits
 * from a group where the hypervisor cannot make a distinction.  For a
 * group supported by a given hypervisor, the behavior when no bits of a
 * group are set is identical to the behavior when all bits in that group
 * are set.  When setting bits from more than one group, it is possible to
 * select an impossible combination, in that case a hypervisor may return
 * either 0 or an error.
 *
 * The first group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_LEAVES and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_LEAVES, to filter based on snapshots that
 * have no further children (a leaf snapshot).
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_METADATA and
 * VIR_DOMAIN_SNAPSHOT_LIST_NO_METADATA, for filtering snapshots based on
 * whether they have metadata that would prevent the removal of the last
 * reference to a domain.
 *
18694 18695 18696 18697 18698 18699 18700 18701 18702 18703
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INACTIVE,
 * VIR_DOMAIN_SNAPSHOT_LIST_ACTIVE, and VIR_DOMAIN_SNAPSHOT_LIST_DISK_ONLY,
 * for filtering snapshots based on what domain state is tracked by the
 * snapshot.
 *
 * The next group of @flags is VIR_DOMAIN_SNAPSHOT_LIST_INTERNAL and
 * VIR_DOMAIN_SNAPSHOT_LIST_EXTERNAL, for filtering snapshots based on
 * whether the snapshot is stored inside the disk images or as
 * additional files.
 *
18704 18705 18706 18707 18708 18709 18710 18711 18712 18713 18714 18715 18716 18717 18718 18719 18720 18721 18722 18723 18724
 * Returns the number of domain snapshots found or -1 and sets @snaps to
 * NULL in case of error.  On success, the array stored into @snaps is
 * guaranteed to have an extra allocated element set to NULL but not included
 * in the return count, to make iteration easier.  The caller is responsible
 * for calling virDomainSnapshotFree() on each array element, then calling
 * free() on @snaps.
 */
int
virDomainSnapshotListAllChildren(virDomainSnapshotPtr snapshot,
                                 virDomainSnapshotPtr **snaps,
                                 unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, snaps=%p, flags=%x", snapshot, snaps, flags);

    virResetLastError();

    if (snaps)
        *snaps = NULL;

18725
    virCheckDomainSnapshotReturn(snapshot, -1);
18726 18727 18728 18729 18730
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotListAllChildren) {
        int ret = conn->driver->domainSnapshotListAllChildren(snapshot, snaps,
                                                              flags);
18731 18732 18733 18734 18735
        if (ret < 0)
            goto error;
        return ret;
    }

18736
    virReportUnsupportedError();
18737 18738 18739 18740 18741
error:
    virDispatchError(conn);
    return -1;
}

18742

C
Chris Lalancette 已提交
18743 18744 18745 18746
/**
 * virDomainSnapshotLookupByName:
 * @domain: a domain object
 * @name: name for the domain snapshot
18747
 * @flags: extra flags; not used yet, so callers should always pass 0
C
Chris Lalancette 已提交
18748 18749 18750 18751 18752 18753 18754 18755 18756 18757 18758 18759 18760
 *
 * Try to lookup a domain snapshot based on its name.
 *
 * Returns a domain snapshot object or NULL in case of failure.  If the
 * domain snapshot cannot be found, then the VIR_ERR_NO_DOMAIN_SNAPSHOT
 * error is raised.
 */
virDomainSnapshotPtr
virDomainSnapshotLookupByName(virDomainPtr domain,
                              const char *name,
                              unsigned int flags)
{
    virConnectPtr conn;
18761

18762
    VIR_DOMAIN_DEBUG(domain, "name=%s, flags=%x", name, flags);
C
Chris Lalancette 已提交
18763 18764 18765

    virResetLastError();

18766
    virCheckDomainReturn(domain, NULL);
C
Chris Lalancette 已提交
18767 18768
    conn = domain->conn;

18769
    virCheckNonNullArgGoto(name, error);
C
Chris Lalancette 已提交
18770 18771 18772 18773 18774 18775 18776 18777 18778

    if (conn->driver->domainSnapshotLookupByName) {
        virDomainSnapshotPtr dom;
        dom = conn->driver->domainSnapshotLookupByName(domain, name, flags);
        if (!dom)
            goto error;
        return dom;
    }

18779
    virReportUnsupportedError();
C
Chris Lalancette 已提交
18780 18781 18782 18783 18784
error:
    virDispatchError(conn);
    return NULL;
}

18785

C
Chris Lalancette 已提交
18786 18787 18788
/**
 * virDomainHasCurrentSnapshot:
 * @domain: pointer to the domain object
18789
 * @flags: extra flags; not used yet, so callers should always pass 0
C
Chris Lalancette 已提交
18790 18791 18792 18793 18794 18795 18796 18797 18798
 *
 * Determine if the domain has a current snapshot.
 *
 * Returns 1 if such snapshot exists, 0 if it doesn't, -1 on error.
 */
int
virDomainHasCurrentSnapshot(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;
18799

18800
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
C
Chris Lalancette 已提交
18801 18802 18803

    virResetLastError();

18804
    virCheckDomainReturn(domain, -1);
C
Chris Lalancette 已提交
18805 18806 18807 18808 18809 18810 18811 18812 18813
    conn = domain->conn;

    if (conn->driver->domainHasCurrentSnapshot) {
        int ret = conn->driver->domainHasCurrentSnapshot(domain, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18814
    virReportUnsupportedError();
C
Chris Lalancette 已提交
18815 18816 18817 18818 18819
error:
    virDispatchError(conn);
    return -1;
}

18820

C
Chris Lalancette 已提交
18821 18822 18823
/**
 * virDomainSnapshotCurrent:
 * @domain: a domain object
18824
 * @flags: extra flags; not used yet, so callers should always pass 0
C
Chris Lalancette 已提交
18825 18826 18827 18828 18829 18830 18831 18832 18833 18834 18835 18836
 *
 * Get the current snapshot for a domain, if any.
 *
 * Returns a domain snapshot object or NULL in case of failure.  If the
 * current domain snapshot cannot be found, then the VIR_ERR_NO_DOMAIN_SNAPSHOT
 * error is raised.
 */
virDomainSnapshotPtr
virDomainSnapshotCurrent(virDomainPtr domain,
                         unsigned int flags)
{
    virConnectPtr conn;
18837

18838
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
C
Chris Lalancette 已提交
18839 18840 18841

    virResetLastError();

18842
    virCheckDomainReturn(domain, NULL);
C
Chris Lalancette 已提交
18843 18844 18845 18846 18847 18848 18849 18850 18851 18852
    conn = domain->conn;

    if (conn->driver->domainSnapshotCurrent) {
        virDomainSnapshotPtr snap;
        snap = conn->driver->domainSnapshotCurrent(domain, flags);
        if (!snap)
            goto error;
        return snap;
    }

18853
    virReportUnsupportedError();
C
Chris Lalancette 已提交
18854 18855 18856 18857 18858
error:
    virDispatchError(conn);
    return NULL;
}

18859

18860 18861 18862
/**
 * virDomainSnapshotGetParent:
 * @snapshot: a snapshot object
18863
 * @flags: extra flags; not used yet, so callers should always pass 0
18864 18865 18866 18867 18868 18869 18870 18871 18872 18873 18874 18875 18876 18877 18878 18879 18880
 *
 * Get the parent snapshot for @snapshot, if any.
 *
 * Returns a domain snapshot object or NULL in case of failure.  If the
 * given snapshot is a root (no parent), then the VIR_ERR_NO_DOMAIN_SNAPSHOT
 * error is raised.
 */
virDomainSnapshotPtr
virDomainSnapshotGetParent(virDomainSnapshotPtr snapshot,
                           unsigned int flags)
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

18881
    virCheckDomainSnapshotReturn(snapshot, NULL);
18882 18883 18884 18885 18886 18887 18888 18889 18890 18891
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotGetParent) {
        virDomainSnapshotPtr snap;
        snap = conn->driver->domainSnapshotGetParent(snapshot, flags);
        if (!snap)
            goto error;
        return snap;
    }

18892
    virReportUnsupportedError();
18893 18894 18895 18896 18897
error:
    virDispatchError(conn);
    return NULL;
}

18898

E
Eric Blake 已提交
18899 18900 18901 18902 18903 18904 18905 18906 18907 18908
/**
 * virDomainSnapshotIsCurrent:
 * @snapshot: a snapshot object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Determine if the given snapshot is the domain's current snapshot.  See
 * also virDomainHasCurrentSnapshot().
 *
 * Returns 1 if current, 0 if not current, or -1 on error.
 */
18909 18910 18911
int
virDomainSnapshotIsCurrent(virDomainSnapshotPtr snapshot,
                           unsigned int flags)
E
Eric Blake 已提交
18912 18913 18914 18915 18916 18917 18918
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

18919
    virCheckDomainSnapshotReturn(snapshot, -1);
E
Eric Blake 已提交
18920 18921 18922 18923 18924 18925 18926 18927 18928 18929
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotIsCurrent) {
        int ret;
        ret = conn->driver->domainSnapshotIsCurrent(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18930
    virReportUnsupportedError();
E
Eric Blake 已提交
18931 18932 18933 18934 18935
error:
    virDispatchError(conn);
    return -1;
}

18936

E
Eric Blake 已提交
18937 18938 18939 18940 18941 18942 18943 18944 18945 18946 18947
/**
 * virDomainSnapshotHasMetadata:
 * @snapshot: a snapshot object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Determine if the given snapshot is associated with libvirt metadata
 * that would prevent the deletion of the domain.
 *
 * Returns 1 if the snapshot has metadata, 0 if the snapshot exists without
 * help from libvirt, or -1 on error.
 */
18948 18949 18950
int
virDomainSnapshotHasMetadata(virDomainSnapshotPtr snapshot,
                             unsigned int flags)
E
Eric Blake 已提交
18951 18952 18953 18954 18955 18956 18957
{
    virConnectPtr conn;

    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);

    virResetLastError();

18958
    virCheckDomainSnapshotReturn(snapshot, -1);
E
Eric Blake 已提交
18959 18960 18961 18962 18963 18964 18965 18966 18967 18968
    conn = snapshot->domain->conn;

    if (conn->driver->domainSnapshotHasMetadata) {
        int ret;
        ret = conn->driver->domainSnapshotHasMetadata(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

18969
    virReportUnsupportedError();
E
Eric Blake 已提交
18970 18971 18972 18973 18974
error:
    virDispatchError(conn);
    return -1;
}

18975

C
Chris Lalancette 已提交
18976
/**
18977
 * virDomainRevertToSnapshot:
C
Chris Lalancette 已提交
18978
 * @snapshot: a domain snapshot object
18979
 * @flags: bitwise-OR of virDomainSnapshotRevertFlags
C
Chris Lalancette 已提交
18980 18981 18982
 *
 * Revert the domain to a given snapshot.
 *
18983 18984 18985 18986 18987 18988 18989 18990 18991 18992 18993 18994
 * Normally, the domain will revert to the same state the domain was
 * in while the snapshot was taken (whether inactive, running, or
 * paused), except that disk snapshots default to reverting to
 * inactive state.  Including VIR_DOMAIN_SNAPSHOT_REVERT_RUNNING in
 * @flags overrides the snapshot state to guarantee a running domain
 * after the revert; or including VIR_DOMAIN_SNAPSHOT_REVERT_PAUSED in
 * @flags guarantees a paused domain after the revert.  These two
 * flags are mutually exclusive.  While a persistent domain does not
 * need either flag, it is not possible to revert a transient domain
 * into an inactive state, so transient domains require the use of one
 * of these two flags.
 *
E
Eric Blake 已提交
18995 18996 18997 18998 18999 19000 19001 19002 19003 19004 19005 19006 19007 19008 19009 19010 19011 19012 19013 19014 19015 19016
 * Reverting to any snapshot discards all configuration changes made since
 * the last snapshot.  Additionally, reverting to a snapshot from a running
 * domain is a form of data loss, since it discards whatever is in the
 * guest's RAM at the time.  Since the very nature of keeping snapshots
 * implies the intent to roll back state, no additional confirmation is
 * normally required for these lossy effects.
 *
 * However, there are two particular situations where reverting will
 * be refused by default, and where @flags must include
 * VIR_DOMAIN_SNAPSHOT_REVERT_FORCE to acknowledge the risks.  1) Any
 * attempt to revert to a snapshot that lacks the metadata to perform
 * ABI compatibility checks (generally the case for snapshots that
 * lack a full <domain> when listed by virDomainSnapshotGetXMLDesc(),
 * such as those created prior to libvirt 0.9.5).  2) Any attempt to
 * revert a running domain to an active state that requires starting a
 * new hypervisor instance rather than reusing the existing hypervisor
 * (since this would terminate all connections to the domain, such as
 * such as VNC or Spice graphics) - this condition arises from active
 * snapshots that are provably ABI incomaptible, as well as from
 * inactive snapshots with a @flags request to start the domain after
 * the revert.
 *
C
Chris Lalancette 已提交
19017 19018 19019 19020 19021 19022 19023 19024
 * Returns 0 if the creation is successful, -1 on error.
 */
int
virDomainRevertToSnapshot(virDomainSnapshotPtr snapshot,
                          unsigned int flags)
{
    virConnectPtr conn;

19025
    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);
C
Chris Lalancette 已提交
19026 19027 19028

    virResetLastError();

19029
    virCheckDomainSnapshotReturn(snapshot, -1);
C
Chris Lalancette 已提交
19030
    conn = snapshot->domain->conn;
19031

19032
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
19033

19034 19035
    if ((flags & VIR_DOMAIN_SNAPSHOT_REVERT_RUNNING) &&
        (flags & VIR_DOMAIN_SNAPSHOT_REVERT_PAUSED)) {
19036
        virReportInvalidArg(flags,
19037 19038
                            _("running and paused flags in %s are mutually "
                              "exclusive"),
19039
                            __FUNCTION__);
19040 19041 19042
        goto error;
    }

C
Chris Lalancette 已提交
19043 19044 19045 19046 19047 19048 19049
    if (conn->driver->domainRevertToSnapshot) {
        int ret = conn->driver->domainRevertToSnapshot(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19050
    virReportUnsupportedError();
C
Chris Lalancette 已提交
19051 19052 19053 19054 19055
error:
    virDispatchError(conn);
    return -1;
}

19056

C
Chris Lalancette 已提交
19057
/**
19058
 * virDomainSnapshotDelete:
C
Chris Lalancette 已提交
19059
 * @snapshot: a domain snapshot object
19060
 * @flags: bitwise-OR of supported virDomainSnapshotDeleteFlags
C
Chris Lalancette 已提交
19061 19062 19063
 *
 * Delete the snapshot.
 *
19064 19065 19066 19067 19068 19069 19070 19071 19072 19073 19074 19075 19076
 * If @flags is 0, then just this snapshot is deleted, and changes
 * from this snapshot are automatically merged into children
 * snapshots.  If @flags includes VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN,
 * then this snapshot and any descendant snapshots are deleted.  If
 * @flags includes VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN_ONLY, then any
 * descendant snapshots are deleted, but this snapshot remains.  These
 * two flags are mutually exclusive.
 *
 * If @flags includes VIR_DOMAIN_SNAPSHOT_DELETE_METADATA_ONLY, then
 * any snapshot metadata tracked by libvirt is removed while keeping
 * the snapshot contents intact; if a hypervisor does not require any
 * libvirt metadata to track snapshots, then this flag is silently
 * ignored.
C
Chris Lalancette 已提交
19077
 *
19078 19079
 * Returns 0 if the selected snapshot(s) were successfully deleted,
 * -1 on error.
C
Chris Lalancette 已提交
19080 19081 19082 19083 19084 19085 19086
 */
int
virDomainSnapshotDelete(virDomainSnapshotPtr snapshot,
                        unsigned int flags)
{
    virConnectPtr conn;

19087
    VIR_DEBUG("snapshot=%p, flags=%x", snapshot, flags);
C
Chris Lalancette 已提交
19088 19089 19090

    virResetLastError();

19091
    virCheckDomainSnapshotReturn(snapshot, -1);
C
Chris Lalancette 已提交
19092
    conn = snapshot->domain->conn;
19093

19094
    virCheckReadOnlyGoto(conn->flags, error);
C
Chris Lalancette 已提交
19095

19096 19097
    if ((flags & VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN) &&
        (flags & VIR_DOMAIN_SNAPSHOT_DELETE_CHILDREN_ONLY)) {
19098 19099 19100 19101
        virReportInvalidArg(flags,
                            _("children and children_only flags in %s are "
                              "mutually exclusive"),
                            __FUNCTION__);
19102 19103 19104
        goto error;
    }

C
Chris Lalancette 已提交
19105 19106 19107 19108 19109 19110 19111
    if (conn->driver->domainSnapshotDelete) {
        int ret = conn->driver->domainSnapshotDelete(snapshot, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19112
    virReportUnsupportedError();
C
Chris Lalancette 已提交
19113 19114 19115 19116 19117
error:
    virDispatchError(conn);
    return -1;
}

19118

19119 19120 19121 19122 19123 19124 19125 19126 19127 19128 19129 19130 19131 19132 19133 19134 19135 19136 19137 19138
/**
 * virDomainSnapshotRef:
 * @snapshot: the snapshot to hold a reference on
 *
 * Increment the reference count on the snapshot. For each
 * additional call to this method, there shall be a corresponding
 * call to virDomainSnapshotFree to release the reference count, once
 * the caller no longer needs the reference to this object.
 *
 * This method is typically useful for applications where multiple
 * threads are using a connection, and it is required that the
 * connection and domain remain open until all threads have finished
 * using the snapshot. ie, each new thread using a snapshot would
 * increment the reference count.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSnapshotRef(virDomainSnapshotPtr snapshot)
{
19139 19140 19141
    VIR_DEBUG("snapshot=%p, refs=%d", snapshot,
              snapshot ? snapshot->object.u.s.refs : 0);

19142 19143
    virResetLastError();

19144 19145
    virCheckDomainSnapshotReturn(snapshot, -1);

19146
    virObjectRef(snapshot);
19147 19148 19149
    return 0;
}

19150

C
Chris Lalancette 已提交
19151 19152 19153 19154 19155 19156 19157 19158 19159 19160 19161 19162
/**
 * virDomainSnapshotFree:
 * @snapshot: a domain snapshot object
 *
 * Free the domain snapshot object.  The snapshot itself is not modified.
 * The data structure is freed and should not be used thereafter.
 *
 * Returns 0 in case of success and -1 in case of failure.
 */
int
virDomainSnapshotFree(virDomainSnapshotPtr snapshot)
{
19163
    VIR_DEBUG("snapshot=%p", snapshot);
C
Chris Lalancette 已提交
19164 19165 19166

    virResetLastError();

19167 19168
    virCheckDomainSnapshotReturn(snapshot, -1);

19169
    virObjectUnref(snapshot);
C
Chris Lalancette 已提交
19170 19171
    return 0;
}
19172

19173

19174 19175 19176
/**
 * virDomainOpenConsole:
 * @dom: a domain object
19177
 * @dev_name: the console, serial or parallel port device alias, or NULL
19178
 * @st: a stream to associate with the console
19179
 * @flags: bitwise-OR of virDomainConsoleFlags
19180 19181 19182
 *
 * This opens the backend associated with a console, serial or
 * parallel port device on a guest, if the backend is supported.
19183
 * If the @dev_name is omitted, then the first console or serial
19184 19185 19186 19187
 * device is opened. The console is associated with the passed
 * in @st stream, which should have been opened in non-blocking
 * mode for bi-directional I/O.
 *
19188 19189 19190 19191 19192 19193 19194 19195 19196 19197 19198 19199 19200 19201 19202
 * By default, when @flags is 0, the open will fail if libvirt
 * detects that the console is already in use by another client;
 * passing VIR_DOMAIN_CONSOLE_FORCE will cause libvirt to forcefully
 * remove the other client prior to opening this console.
 *
 * If flag VIR_DOMAIN_CONSOLE_SAFE the console is opened only in the
 * case where the hypervisor driver supports safe (mutually exclusive)
 * console handling.
 *
 * Older servers did not support either flag, and also did not forbid
 * simultaneous clients on a console, with potentially confusing results.
 * When passing @flags of 0 in order to support a wider range of server
 * versions, it is up to the client to ensure mutual exclusion.
 *
 * Returns 0 if the console was opened, -1 on error
19203
 */
19204 19205 19206 19207 19208
int
virDomainOpenConsole(virDomainPtr dom,
                     const char *dev_name,
                     virStreamPtr st,
                     unsigned int flags)
19209 19210
{
    virConnectPtr conn;
19211

19212 19213
    VIR_DOMAIN_DEBUG(dom, "dev_name=%s, st=%p, flags=%x",
                     NULLSTR(dev_name), st, flags);
19214 19215 19216

    virResetLastError();

19217
    virCheckDomainReturn(dom, -1);
19218
    conn = dom->conn;
19219

19220
    virCheckStreamGoto(st, error);
19221
    virCheckReadOnlyGoto(conn->flags, error);
19222

19223 19224 19225 19226 19227 19228 19229
    if (conn != st->conn) {
        virReportInvalidArg(st,
                            _("stream in %s must match connection of domain '%s'"),
                            __FUNCTION__, dom->name);
        goto error;
    }

19230 19231
    if (conn->driver->domainOpenConsole) {
        int ret;
19232
        ret = conn->driver->domainOpenConsole(dom, dev_name, st, flags);
19233 19234 19235 19236 19237
        if (ret < 0)
            goto error;
        return ret;
    }

19238
    virReportUnsupportedError();
19239 19240 19241 19242 19243

error:
    virDispatchError(conn);
    return -1;
}
19244

19245

19246 19247 19248 19249 19250 19251 19252 19253 19254 19255 19256 19257 19258 19259 19260 19261 19262 19263 19264 19265 19266 19267
/**
 * virDomainOpenChannel:
 * @dom: a domain object
 * @name: the channel name, or NULL
 * @st: a stream to associate with the channel
 * @flags: bitwise-OR of virDomainChannelFlags
 *
 * This opens the host interface associated with a channel device on a
 * guest, if the host interface is supported.  If @name is given, it
 * can match either the device alias (e.g. "channel0"), or the virtio
 * target name (e.g. "org.qemu.guest_agent.0").  If @name is omitted,
 * then the first channel is opened. The channel is associated with
 * the passed in @st stream, which should have been opened in
 * non-blocking mode for bi-directional I/O.
 *
 * By default, when @flags is 0, the open will fail if libvirt detects
 * that the channel is already in use by another client; passing
 * VIR_DOMAIN_CHANNEL_FORCE will cause libvirt to forcefully remove the
 * other client prior to opening this channel.
 *
 * Returns 0 if the channel was opened, -1 on error
 */
19268 19269 19270 19271 19272
int
virDomainOpenChannel(virDomainPtr dom,
                     const char *name,
                     virStreamPtr st,
                     unsigned int flags)
19273 19274 19275 19276 19277 19278 19279 19280
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "name=%s, st=%p, flags=%x",
                     NULLSTR(name), st, flags);

    virResetLastError();

19281
    virCheckDomainReturn(dom, -1);
19282
    conn = dom->conn;
19283

19284
    virCheckStreamGoto(st, error);
19285
    virCheckReadOnlyGoto(conn->flags, error);
19286

19287 19288 19289 19290 19291 19292 19293
    if (conn != st->conn) {
        virReportInvalidArg(st,
                            _("stream in %s must match connection of domain '%s'"),
                            __FUNCTION__, dom->name);
        goto error;
    }

19294 19295 19296 19297 19298 19299 19300 19301
    if (conn->driver->domainOpenChannel) {
        int ret;
        ret = conn->driver->domainOpenChannel(dom, name, st, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19302
    virReportUnsupportedError();
19303 19304 19305 19306 19307 19308

error:
    virDispatchError(conn);
    return -1;
}

19309

19310 19311 19312
/**
 * virDomainBlockJobAbort:
 * @dom: pointer to domain object
19313
 * @disk: path to the block device, or device shorthand
19314
 * @flags: bitwise-OR of virDomainBlockJobAbortFlags
19315 19316 19317
 *
 * Cancel the active block job on the given disk.
 *
19318
 * The @disk parameter is either an unambiguous source name of the
19319 19320 19321 19322 19323 19324
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
E
Eric Blake 已提交
19325 19326
 * If the current block job for @disk is VIR_DOMAIN_BLOCK_JOB_TYPE_PULL, then
 * by default, this function performs a synchronous operation and the caller
19327 19328 19329 19330 19331 19332 19333 19334
 * may assume that the operation has completed when 0 is returned.  However,
 * BlockJob operations may take a long time to cancel, and during this time
 * further domain interactions may be unresponsive.  To avoid this problem,
 * pass VIR_DOMAIN_BLOCK_JOB_ABORT_ASYNC in the @flags argument to enable
 * asynchronous behavior, returning as soon as possible.  When the job has
 * been canceled, a BlockJob event will be emitted, with status
 * VIR_DOMAIN_BLOCK_JOB_CANCELED (even if the ABORT_ASYNC flag was not
 * used); it is also possible to poll virDomainBlockJobInfo() to see if
E
Eric Blake 已提交
19335 19336 19337 19338 19339 19340 19341 19342 19343 19344 19345 19346
 * the job cancellation is still pending.  This type of job can be restarted
 * to pick up from where it left off.
 *
 * If the current block job for @disk is VIR_DOMAIN_BLOCK_JOB_TYPE_COPY, then
 * the default is to abort the mirroring and revert to the source disk;
 * adding @flags of VIR_DOMAIN_BLOCK_JOB_ABORT_PIVOT causes this call to
 * fail with VIR_ERR_BLOCK_COPY_ACTIVE if the copy is not fully populated,
 * otherwise it will swap the disk over to the copy to end the mirroring.  An
 * event will be issued when the job is ended, and it is possible to use
 * VIR_DOMAIN_BLOCK_JOB_ABORT_ASYNC to control whether this command waits
 * for the completion of the job.  Restarting this job requires starting
 * over from the beginning of the first phase.
19347
 *
19348 19349
 * Returns -1 in case of failure, 0 when successful.
 */
19350 19351 19352
int
virDomainBlockJobAbort(virDomainPtr dom, const char *disk,
                       unsigned int flags)
19353 19354 19355
{
    virConnectPtr conn;

19356
    VIR_DOMAIN_DEBUG(dom, "disk=%s, flags=%x", disk, flags);
19357 19358 19359

    virResetLastError();

19360
    virCheckDomainReturn(dom, -1);
19361 19362
    conn = dom->conn;

19363
    virCheckReadOnlyGoto(conn->flags, error);
19364
    virCheckNonNullArgGoto(disk, error);
19365 19366 19367

    if (conn->driver->domainBlockJobAbort) {
        int ret;
19368
        ret = conn->driver->domainBlockJobAbort(dom, disk, flags);
19369 19370 19371 19372 19373
        if (ret < 0)
            goto error;
        return ret;
    }

19374
    virReportUnsupportedError();
19375 19376 19377 19378 19379 19380

error:
    virDispatchError(dom->conn);
    return -1;
}

19381

19382 19383 19384
/**
 * virDomainGetBlockJobInfo:
 * @dom: pointer to domain object
19385
 * @disk: path to the block device, or device shorthand
19386
 * @info: pointer to a virDomainBlockJobInfo structure
19387
 * @flags: extra flags; not used yet, so callers should always pass 0
19388 19389 19390 19391
 *
 * Request block job information for the given disk.  If an operation is active
 * @info will be updated with the current progress.
 *
19392
 * The @disk parameter is either an unambiguous source name of the
19393 19394 19395 19396 19397 19398
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19399 19400
 * Returns -1 in case of failure, 0 when nothing found, 1 when info was found.
 */
19401 19402 19403
int
virDomainGetBlockJobInfo(virDomainPtr dom, const char *disk,
                         virDomainBlockJobInfoPtr info, unsigned int flags)
19404 19405 19406
{
    virConnectPtr conn;

19407
    VIR_DOMAIN_DEBUG(dom, "disk=%s, info=%p, flags=%x", disk, info, flags);
19408 19409 19410

    virResetLastError();

19411 19412 19413
    if (info)
        memset(info, 0, sizeof(*info));

19414
    virCheckDomainReturn(dom, -1);
19415 19416
    conn = dom->conn;

19417 19418
    virCheckNonNullArgGoto(disk, error);
    virCheckNonNullArgGoto(info, error);
19419 19420 19421

    if (conn->driver->domainGetBlockJobInfo) {
        int ret;
19422
        ret = conn->driver->domainGetBlockJobInfo(dom, disk, info, flags);
19423 19424 19425 19426 19427
        if (ret < 0)
            goto error;
        return ret;
    }

19428
    virReportUnsupportedError();
19429 19430 19431 19432 19433 19434

error:
    virDispatchError(dom->conn);
    return -1;
}

19435

19436 19437 19438
/**
 * virDomainBlockJobSetSpeed:
 * @dom: pointer to domain object
19439
 * @disk: path to the block device, or device shorthand
19440
 * @bandwidth: specify bandwidth limit in MiB/s
19441
 * @flags: extra flags; not used yet, so callers should always pass 0
19442 19443 19444 19445
 *
 * Set the maximimum allowable bandwidth that a block job may consume.  If
 * bandwidth is 0, the limit will revert to the hypervisor default.
 *
19446
 * The @disk parameter is either an unambiguous source name of the
19447 19448 19449 19450 19451 19452
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19453 19454
 * Returns -1 in case of failure, 0 when successful.
 */
19455 19456 19457
int
virDomainBlockJobSetSpeed(virDomainPtr dom, const char *disk,
                          unsigned long bandwidth, unsigned int flags)
19458 19459 19460
{
    virConnectPtr conn;

19461
    VIR_DOMAIN_DEBUG(dom, "disk=%s, bandwidth=%lu, flags=%x",
19462
                     disk, bandwidth, flags);
19463 19464 19465

    virResetLastError();

19466
    virCheckDomainReturn(dom, -1);
19467 19468
    conn = dom->conn;

19469
    virCheckReadOnlyGoto(conn->flags, error);
19470
    virCheckNonNullArgGoto(disk, error);
19471 19472 19473

    if (conn->driver->domainBlockJobSetSpeed) {
        int ret;
19474
        ret = conn->driver->domainBlockJobSetSpeed(dom, disk, bandwidth, flags);
19475 19476 19477 19478 19479
        if (ret < 0)
            goto error;
        return ret;
    }

19480
    virReportUnsupportedError();
19481 19482 19483 19484 19485 19486

error:
    virDispatchError(dom->conn);
    return -1;
}

19487

19488 19489 19490
/**
 * virDomainBlockPull:
 * @dom: pointer to domain object
19491
 * @disk: path to the block device, or device shorthand
19492
 * @bandwidth: (optional) specify copy bandwidth limit in MiB/s
19493
 * @flags: extra flags; not used yet, so callers should always pass 0
19494 19495 19496 19497 19498 19499
 *
 * Populate a disk image with data from its backing image.  Once all data from
 * its backing image has been pulled, the disk no longer depends on a backing
 * image.  This function pulls data for the entire device in the background.
 * Progress of the operation can be checked with virDomainGetBlockJobInfo() and
 * the operation can be aborted with virDomainBlockJobAbort().  When finished,
E
Eric Blake 已提交
19500 19501
 * an asynchronous event is raised to indicate the final status.  To move
 * data in the opposite direction, see virDomainBlockCommit().
19502
 *
19503
 * The @disk parameter is either an unambiguous source name of the
19504 19505 19506 19507 19508 19509
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or (since 0.9.5) the device target shorthand
 * (the <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19510
 * The maximum bandwidth (in MiB/s) that will be used to do the copy can be
19511 19512
 * specified with the bandwidth parameter.  If set to 0, libvirt will choose a
 * suitable default.  Some hypervisors do not support this feature and will
19513 19514 19515
 * return an error if bandwidth is not 0; in this case, it might still be
 * possible for a later call to virDomainBlockJobSetSpeed() to succeed.
 * The actual speed can be determined with virDomainGetBlockJobInfo().
19516
 *
19517 19518
 * This is shorthand for virDomainBlockRebase() with a NULL base.
 *
19519 19520
 * Returns 0 if the operation has started, -1 on failure.
 */
19521 19522 19523
int
virDomainBlockPull(virDomainPtr dom, const char *disk,
                   unsigned long bandwidth, unsigned int flags)
19524 19525 19526
{
    virConnectPtr conn;

19527
    VIR_DOMAIN_DEBUG(dom, "disk=%s, bandwidth=%lu, flags=%x",
19528
                     disk, bandwidth, flags);
19529 19530 19531

    virResetLastError();

19532
    virCheckDomainReturn(dom, -1);
19533 19534
    conn = dom->conn;

19535
    virCheckReadOnlyGoto(conn->flags, error);
19536
    virCheckNonNullArgGoto(disk, error);
19537 19538 19539

    if (conn->driver->domainBlockPull) {
        int ret;
19540
        ret = conn->driver->domainBlockPull(dom, disk, bandwidth, flags);
19541 19542 19543 19544 19545
        if (ret < 0)
            goto error;
        return ret;
    }

19546
    virReportUnsupportedError();
19547 19548 19549 19550 19551

error:
    virDispatchError(dom->conn);
    return -1;
}
19552 19553


19554 19555 19556 19557 19558
/**
 * virDomainBlockRebase:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
 * @base: path to backing file to keep, or NULL for no backing file
19559
 * @bandwidth: (optional) specify copy bandwidth limit in MiB/s
E
Eric Blake 已提交
19560
 * @flags: bitwise-OR of virDomainBlockRebaseFlags
19561 19562
 *
 * Populate a disk image with data from its backing image chain, and
E
Eric Blake 已提交
19563 19564 19565 19566
 * setting the backing image to @base, or alternatively copy an entire
 * backing chain to a new file @base.
 *
 * When @flags is 0, this starts a pull, where @base must be the absolute
19567 19568 19569 19570 19571
 * path of one of the backing images further up the chain, or NULL to
 * convert the disk image so that it has no backing image.  Once all
 * data from its backing image chain has been pulled, the disk no
 * longer depends on those intermediate backing images.  This function
 * pulls data for the entire device in the background.  Progress of
E
Eric Blake 已提交
19572 19573 19574 19575 19576 19577 19578 19579 19580 19581 19582 19583 19584 19585 19586 19587 19588 19589 19590 19591 19592 19593 19594 19595 19596 19597 19598 19599 19600 19601 19602 19603
 * the operation can be checked with virDomainGetBlockJobInfo() with a
 * job type of VIR_DOMAIN_BLOCK_JOB_TYPE_PULL, and the operation can be
 * aborted with virDomainBlockJobAbort().  When finished, an asynchronous
 * event is raised to indicate the final status, and the job no longer
 * exists.  If the job is aborted, a new one can be started later to
 * resume from the same point.
 *
 * When @flags includes VIR_DOMAIN_BLOCK_REBASE_COPY, this starts a copy,
 * where @base must be the name of a new file to copy the chain to.  By
 * default, the copy will pull the entire source chain into the destination
 * file, but if @flags also contains VIR_DOMAIN_BLOCK_REBASE_SHALLOW, then
 * only the top of the source chain will be copied (the source and
 * destination have a common backing file).  By default, @base will be
 * created with the same file format as the source, but this can be altered
 * by adding VIR_DOMAIN_BLOCK_REBASE_COPY_RAW to force the copy to be raw
 * (does not make sense with the shallow flag unless the source is also raw),
 * or by using VIR_DOMAIN_BLOCK_REBASE_REUSE_EXT to reuse an existing file
 * with initial contents identical to the backing file of the source (this
 * allows a management app to pre-create files with relative backing file
 * names, rather than the default of absolute backing file names; as a
 * security precaution, you should generally only use reuse_ext with the
 * shallow flag and a non-raw destination file).
 *
 * A copy job has two parts; in the first phase, the @bandwidth parameter
 * affects how fast the source is pulled into the destination, and the job
 * can only be canceled by reverting to the source file; progress in this
 * phase can be tracked via the virDomainBlockJobInfo() command, with a
 * job type of VIR_DOMAIN_BLOCK_JOB_TYPE_COPY.  The job transitions to the
 * second phase when the job info states cur == end, and remains alive to
 * mirror all further changes to both source and destination.  The user
 * must call virDomainBlockJobAbort() to end the mirroring while choosing
 * whether to revert to source or pivot to the destination.  An event is
19604 19605 19606 19607
 * issued when the job ends, and depending on the hypervisor, an event may
 * also be issued when the job transitions from pulling to mirroring.  If
 * the job is aborted, a new job will have to start over from the beginning
 * of the first phase.
E
Eric Blake 已提交
19608 19609 19610 19611
 *
 * Some hypervisors will restrict certain actions, such as virDomainSave()
 * or virDomainDetachDevice(), while a copy job is active; they may
 * also restrict a copy job to transient domains.
19612 19613 19614 19615 19616 19617 19618 19619
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the
 * <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
19620
 * The maximum bandwidth (in MiB/s) that will be used to do the copy can be
19621 19622
 * specified with the bandwidth parameter.  If set to 0, libvirt will choose a
 * suitable default.  Some hypervisors do not support this feature and will
19623 19624 19625
 * return an error if bandwidth is not 0; in this case, it might still be
 * possible for a later call to virDomainBlockJobSetSpeed() to succeed.
 * The actual speed can be determined with virDomainGetBlockJobInfo().
19626
 *
E
Eric Blake 已提交
19627 19628
 * When @base is NULL and @flags is 0, this is identical to
 * virDomainBlockPull().
19629 19630 19631
 *
 * Returns 0 if the operation has started, -1 on failure.
 */
19632 19633 19634 19635
int
virDomainBlockRebase(virDomainPtr dom, const char *disk,
                     const char *base, unsigned long bandwidth,
                     unsigned int flags)
19636 19637 19638
{
    virConnectPtr conn;

E
Eric Blake 已提交
19639
    VIR_DOMAIN_DEBUG(dom, "disk=%s, base=%s, bandwidth=%lu, flags=%x",
19640 19641 19642 19643
                     disk, NULLSTR(base), bandwidth, flags);

    virResetLastError();

19644
    virCheckDomainReturn(dom, -1);
19645 19646
    conn = dom->conn;

19647
    virCheckReadOnlyGoto(conn->flags, error);
19648
    virCheckNonNullArgGoto(disk, error);
19649

E
Eric Blake 已提交
19650
    if (flags & VIR_DOMAIN_BLOCK_REBASE_COPY) {
19651
        virCheckNonNullArgGoto(base, error);
E
Eric Blake 已提交
19652 19653 19654
    } else if (flags & (VIR_DOMAIN_BLOCK_REBASE_SHALLOW |
                        VIR_DOMAIN_BLOCK_REBASE_REUSE_EXT |
                        VIR_DOMAIN_BLOCK_REBASE_COPY_RAW)) {
19655 19656 19657
        virReportInvalidArg(flags,
                            _("use of flags in %s requires a copy job"),
                            __FUNCTION__);
E
Eric Blake 已提交
19658 19659 19660
        goto error;
    }

19661 19662 19663 19664 19665 19666 19667 19668 19669
    if (conn->driver->domainBlockRebase) {
        int ret;
        ret = conn->driver->domainBlockRebase(dom, disk, base, bandwidth,
                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19670
    virReportUnsupportedError();
19671 19672 19673 19674 19675 19676 19677

error:
    virDispatchError(dom->conn);
    return -1;
}


E
Eric Blake 已提交
19678 19679 19680 19681 19682 19683 19684 19685 19686 19687 19688 19689 19690 19691 19692 19693 19694 19695 19696 19697 19698 19699 19700 19701 19702 19703 19704 19705 19706 19707 19708 19709 19710 19711 19712 19713 19714 19715 19716 19717 19718 19719 19720 19721 19722 19723 19724 19725 19726 19727 19728 19729 19730 19731 19732 19733 19734 19735 19736 19737 19738 19739 19740 19741 19742
/**
 * virDomainBlockCommit:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
 * @base: path to backing file to merge into, or NULL for default
 * @top: path to file within backing chain that contains data to be merged,
 *       or NULL to merge all possible data
 * @bandwidth: (optional) specify commit bandwidth limit in MiB/s
 * @flags: bitwise-OR of virDomainBlockCommitFlags
 *
 * Commit changes that were made to temporary top-level files within a disk
 * image backing file chain into a lower-level base file.  In other words,
 * take all the difference between @base and @top, and update @base to contain
 * that difference; after the commit, any portion of the chain that previously
 * depended on @top will now depend on @base, and all files after @base up
 * to and including @top will now be invalidated.  A typical use of this
 * command is to reduce the length of a backing file chain after taking an
 * external disk snapshot.  To move data in the opposite direction, see
 * virDomainBlockPull().
 *
 * This command starts a long-running commit block job, whose status may
 * be tracked by virDomainBlockJobInfo() with a job type of
 * VIR_DOMAIN_BLOCK_JOB_TYPE_COMMIT, and the operation can be aborted with
 * virDomainBlockJobAbort().  When finished, an asynchronous event is
 * raised to indicate the final status, and the job no longer exists.  If
 * the job is aborted, it is up to the hypervisor whether starting a new
 * job will resume from the same point, or start over.
 *
 * Be aware that this command may invalidate files even if it is aborted;
 * the user is cautioned against relying on the contents of invalidated
 * intermediate files such as @top without manually rebasing those files
 * to use a backing file of a read-only copy of @base prior to the point
 * where the commit operation was started (although such a rebase cannot
 * be safely done until the commit has successfully completed).  However,
 * the domain itself will not have any issues; the active layer remains
 * valid throughout the entire commit operation.  As a convenience,
 * if @flags contains VIR_DOMAIN_BLOCK_COMMIT_DELETE, this command will
 * unlink all files that were invalidated, after the commit successfully
 * completes.
 *
 * By default, if @base is NULL, the commit target will be the bottom of
 * the backing chain; if @flags contains VIR_DOMAIN_BLOCK_COMMIT_SHALLOW,
 * then the immediate backing file of @top will be used instead.  If @top
 * is NULL, the active image at the top of the chain will be used.  Some
 * hypervisors place restrictions on how much can be committed, and might
 * fail if @base is not the immediate backing file of @top, or if @top is
 * the active layer in use by a running domain, or if @top is not the
 * top-most file; restrictions may differ for online vs. offline domains.
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the
 * <target dev='...'/> sub-element, such as "xvda").  Valid names
 * can be found by calling virDomainGetXMLDesc() and inspecting
 * elements within //domain/devices/disk.
 *
 * The maximum bandwidth (in MiB/s) that will be used to do the commit can be
 * specified with the bandwidth parameter.  If set to 0, libvirt will choose a
 * suitable default.  Some hypervisors do not support this feature and will
 * return an error if bandwidth is not 0; in this case, it might still be
 * possible for a later call to virDomainBlockJobSetSpeed() to succeed.
 * The actual speed can be determined with virDomainGetBlockJobInfo().
 *
 * Returns 0 if the operation has started, -1 on failure.
 */
19743 19744 19745 19746
int
virDomainBlockCommit(virDomainPtr dom, const char *disk,
                     const char *base, const char *top,
                     unsigned long bandwidth, unsigned int flags)
E
Eric Blake 已提交
19747 19748 19749 19750 19751 19752 19753 19754
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(dom, "disk=%s, base=%s, top=%s, bandwidth=%lu, flags=%x",
                     disk, NULLSTR(base), NULLSTR(top), bandwidth, flags);

    virResetLastError();

19755
    virCheckDomainReturn(dom, -1);
E
Eric Blake 已提交
19756 19757
    conn = dom->conn;

19758
    virCheckReadOnlyGoto(conn->flags, error);
E
Eric Blake 已提交
19759 19760 19761 19762 19763 19764 19765 19766 19767 19768 19769
    virCheckNonNullArgGoto(disk, error);

    if (conn->driver->domainBlockCommit) {
        int ret;
        ret = conn->driver->domainBlockCommit(dom, disk, base, top, bandwidth,
                                              flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19770
    virReportUnsupportedError();
E
Eric Blake 已提交
19771 19772 19773 19774 19775 19776 19777

error:
    virDispatchError(dom->conn);
    return -1;
}


19778 19779 19780 19781 19782
/**
 * virDomainOpenGraphics:
 * @dom: pointer to domain object
 * @idx: index of graphics config to open
 * @fd: file descriptor to attach graphics to
19783
 * @flags: bitwise-OR of virDomainOpenGraphicsFlags
19784 19785 19786 19787 19788 19789 19790 19791 19792 19793 19794 19795 19796 19797 19798 19799 19800 19801
 *
 * This will attempt to connect the file descriptor @fd, to
 * the graphics backend of @dom. If @dom has multiple graphics
 * backends configured, then @idx will determine which one is
 * opened, starting from @idx 0.
 *
 * To disable any authentication, pass the VIR_DOMAIN_OPEN_GRAPHICS_SKIPAUTH
 * constant for @flags.
 *
 * The caller should use an anonymous socketpair to open
 * @fd before invocation.
 *
 * This method can only be used when connected to a local
 * libvirt hypervisor, over a UNIX domain socket. Attempts
 * to use this method over a TCP connection will always fail
 *
 * Returns 0 on success, -1 on failure
 */
19802 19803 19804 19805 19806
int
virDomainOpenGraphics(virDomainPtr dom,
                      unsigned int idx,
                      int fd,
                      unsigned int flags)
19807 19808 19809 19810 19811 19812 19813
{
    struct stat sb;
    VIR_DOMAIN_DEBUG(dom, "idx=%u, fd=%d, flags=%x",
                     idx, fd, flags);

    virResetLastError();

19814
    virCheckDomainReturn(dom, -1);
19815
    virCheckNonNegativeArgGoto(fd, error);
19816 19817 19818 19819 19820 19821 19822 19823

    if (fstat(fd, &sb) < 0) {
        virReportSystemError(errno,
                             _("Unable to access file descriptor %d"), fd);
        goto error;
    }

    if (!S_ISSOCK(sb.st_mode)) {
19824 19825 19826
        virReportInvalidArg(fd,
                          _("fd %d in %s must be a socket"),
                            fd, __FUNCTION__);
19827 19828 19829
        goto error;
    }

19830
    virCheckReadOnlyGoto(dom->conn->flags, error);
19831 19832 19833

    if (!VIR_DRV_SUPPORTS_FEATURE(dom->conn->driver, dom->conn,
                                  VIR_DRV_FEATURE_FD_PASSING)) {
19834 19835
        virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, "%s",
                       _("fd passing is not supported by this connection"));
19836 19837 19838 19839 19840 19841 19842 19843 19844 19845 19846
        goto error;
    }

    if (dom->conn->driver->domainOpenGraphics) {
        int ret;
        ret = dom->conn->driver->domainOpenGraphics(dom, idx, fd, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

19847
    virReportUnsupportedError();
19848 19849 19850 19851 19852

error:
    virDispatchError(dom->conn);
    return -1;
}
J
Jiri Denemark 已提交
19853 19854 19855 19856 19857 19858 19859 19860


/**
 * virConnectSetKeepAlive:
 * @conn: pointer to a hypervisor connection
 * @interval: number of seconds of inactivity before a keepalive message is sent
 * @count: number of messages that can be sent in a row
 *
E
Eric Blake 已提交
19861
 * Start sending keepalive messages after @interval seconds of inactivity and
J
Jiri Denemark 已提交
19862
 * consider the connection to be broken when no response is received after
E
Eric Blake 已提交
19863 19864 19865 19866 19867 19868 19869 19870 19871 19872
 * @count keepalive messages sent in a row.  In other words, sending count + 1
 * keepalive message results in closing the connection.  When @interval is
 * <= 0, no keepalive messages will be sent.  When @count is 0, the connection
 * will be automatically closed after @interval seconds of inactivity without
 * sending any keepalive messages.
 *
 * Note: The client has to implement and run an event loop with
 * virEventRegisterImpl() or virEventRegisterDefaultImpl() to be able to
 * use keepalive messages.  Failure to do so may result in connections
 * being closed unexpectedly.
J
Jiri Denemark 已提交
19873
 *
19874 19875 19876 19877
 * Note: This API function controls only keepalive messages sent by the client.
 * If the server is configured to use keepalive you still need to run the event
 * loop to respond to them, even if you disable keepalives by this function.
 *
J
Jiri Denemark 已提交
19878 19879 19880
 * Returns -1 on error, 0 on success, 1 when remote party doesn't support
 * keepalive messages.
 */
19881 19882 19883 19884
int
virConnectSetKeepAlive(virConnectPtr conn,
                       int interval,
                       unsigned int count)
J
Jiri Denemark 已提交
19885 19886 19887 19888 19889 19890 19891
{
    int ret = -1;

    VIR_DEBUG("conn=%p, interval=%d, count=%u", conn, interval, count);

    virResetLastError();

19892
    virCheckConnectReturn(conn, -1);
J
Jiri Denemark 已提交
19893

19894 19895
    if (conn->driver->connectSetKeepAlive) {
        ret = conn->driver->connectSetKeepAlive(conn, interval, count);
J
Jiri Denemark 已提交
19896 19897 19898 19899 19900
        if (ret < 0)
            goto error;
        return ret;
    }

19901
    virReportUnsupportedError();
J
Jiri Denemark 已提交
19902 19903 19904 19905 19906

error:
    virDispatchError(conn);
    return -1;
}
J
Jiri Denemark 已提交
19907

19908

J
Jiri Denemark 已提交
19909 19910 19911 19912 19913 19914 19915 19916 19917 19918 19919
/**
 * virConnectIsAlive:
 * @conn: pointer to the connection object
 *
 * Determine if the connection to the hypervisor is still alive
 *
 * A connection will be classed as alive if it is either local, or running
 * over a channel (TCP or UNIX socket) which is not closed.
 *
 * Returns 1 if alive, 0 if dead, -1 on error
 */
19920 19921
int
virConnectIsAlive(virConnectPtr conn)
J
Jiri Denemark 已提交
19922 19923 19924 19925 19926
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

19927
    virCheckConnectReturn(conn, -1);
19928
    if (conn->driver->connectIsAlive) {
J
Jiri Denemark 已提交
19929
        int ret;
19930
        ret = conn->driver->connectIsAlive(conn);
J
Jiri Denemark 已提交
19931 19932 19933 19934 19935
        if (ret < 0)
            goto error;
        return ret;
    }

19936
    virReportUnsupportedError();
J
Jiri Denemark 已提交
19937 19938 19939 19940
error:
    virDispatchError(conn);
    return -1;
}
19941 19942


19943 19944 19945 19946 19947 19948 19949 19950 19951 19952 19953 19954 19955 19956 19957 19958 19959 19960 19961 19962 19963 19964 19965
/**
 * virConnectRegisterCloseCallback:
 * @conn: pointer to connection object
 * @cb: callback to invoke upon close
 * @opaque: user data to pass to @cb
 * @freecb: callback to free @opaque
 *
 * Registers a callback to be invoked when the connection
 * is closed. This callback is invoked when there is any
 * condition that causes the socket connection to the
 * hypervisor to be closed.
 *
 * This function is only applicable to hypervisor drivers
 * which maintain a persistent open connection. Drivers
 * which open a new connection for every operation will
 * not invoke this.
 *
 * The @freecb must not invoke any other libvirt public
 * APIs, since it is not called from a re-entrant safe
 * context.
 *
 * Returns 0 on success, -1 on error
 */
19966 19967 19968 19969 19970
int
virConnectRegisterCloseCallback(virConnectPtr conn,
                                virConnectCloseFunc cb,
                                void *opaque,
                                virFreeCallback freecb)
19971 19972 19973 19974 19975
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

19976
    virCheckConnectReturn(conn, -1);
19977

19978 19979
    virObjectRef(conn);

19980
    virMutexLock(&conn->lock);
19981
    virObjectLock(conn->closeCallback);
19982 19983 19984

    virCheckNonNullArgGoto(cb, error);

19985
    if (conn->closeCallback->callback) {
19986 19987
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("A close callback is already registered"));
19988 19989 19990
        goto error;
    }

19991
    conn->closeCallback->conn = conn;
19992 19993 19994
    conn->closeCallback->callback = cb;
    conn->closeCallback->opaque = opaque;
    conn->closeCallback->freeCallback = freecb;
19995

19996
    virObjectUnlock(conn->closeCallback);
19997 19998 19999 20000 20001
    virMutexUnlock(&conn->lock);

    return 0;

error:
20002
    virObjectUnlock(conn->closeCallback);
20003
    virMutexUnlock(&conn->lock);
20004
    virDispatchError(conn);
20005
    virObjectUnref(conn);
20006 20007 20008
    return -1;
}

20009

20010 20011 20012 20013 20014 20015 20016 20017 20018 20019 20020 20021 20022
/**
 * virConnectUnregisterCloseCallback:
 * @conn: pointer to connection object
 * @cb: pointer to the current registered callback
 *
 * Unregisters the callback previously set with the
 * virConnectRegisterCloseCallback method. The callback
 * will no longer receive notifications when the connection
 * closes. If a virFreeCallback was provided at time of
 * registration, it will be invoked
 *
 * Returns 0 on success, -1 on error
 */
20023 20024 20025
int
virConnectUnregisterCloseCallback(virConnectPtr conn,
                                  virConnectCloseFunc cb)
20026 20027 20028 20029 20030
{
    VIR_DEBUG("conn=%p", conn);

    virResetLastError();

20031
    virCheckConnectReturn(conn, -1);
20032 20033

    virMutexLock(&conn->lock);
20034
    virObjectLock(conn->closeCallback);
20035 20036 20037

    virCheckNonNullArgGoto(cb, error);

20038
    if (conn->closeCallback->callback != cb) {
20039 20040
        virReportError(VIR_ERR_OPERATION_INVALID, "%s",
                       _("A different callback was requested"));
20041 20042 20043
        goto error;
    }

20044 20045 20046 20047
    conn->closeCallback->callback = NULL;
    if (conn->closeCallback->freeCallback)
        conn->closeCallback->freeCallback(conn->closeCallback->opaque);
    conn->closeCallback->freeCallback = NULL;
20048

20049
    virObjectUnref(conn);
20050 20051
    virObjectUnlock(conn->closeCallback);
    virMutexUnlock(&conn->lock);
20052

20053 20054 20055
    return 0;

error:
20056
    virObjectUnlock(conn->closeCallback);
20057
    virMutexUnlock(&conn->lock);
20058
    virDispatchError(conn);
20059 20060 20061
    return -1;
}

20062

20063 20064 20065 20066 20067 20068 20069
/**
 * virDomainSetBlockIoTune:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
 * @params: Pointer to blkio parameter objects
 * @nparams: Number of blkio parameters (this value can be the same or
 *           less than the number of parameters supported)
20070
 * @flags: bitwise-OR of virDomainModificationImpact
20071 20072 20073 20074 20075 20076 20077 20078 20079 20080 20081 20082
 *
 * Change all or a subset of the per-device block IO tunables.
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the <target
 * dev='...'/> sub-element, such as "xvda").  Valid names can be found
 * by calling virDomainGetXMLDesc() and inspecting elements
 * within //domain/devices/disk.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
20083 20084 20085 20086 20087 20088
int
virDomainSetBlockIoTune(virDomainPtr dom,
                        const char *disk,
                        virTypedParameterPtr params,
                        int nparams,
                        unsigned int flags)
20089 20090 20091
{
    virConnectPtr conn;

20092
    VIR_DOMAIN_DEBUG(dom, "disk=%s, params=%p, nparams=%d, flags=%x",
20093
                     disk, params, nparams, flags);
20094
    VIR_TYPED_PARAMS_DEBUG(params, nparams);
20095 20096 20097

    virResetLastError();

20098 20099
    virCheckDomainReturn(dom, -1);
    conn = dom->conn;
20100

20101
    virCheckReadOnlyGoto(conn->flags, error);
20102 20103 20104
    virCheckNonNullArgGoto(disk, error);
    virCheckPositiveArgGoto(nparams, error);
    virCheckNonNullArgGoto(params, error);
20105

20106
    if (virTypedParameterValidateSet(dom->conn, params, nparams) < 0)
20107
        goto error;
20108 20109 20110 20111 20112 20113 20114 20115 20116

    if (conn->driver->domainSetBlockIoTune) {
        int ret;
        ret = conn->driver->domainSetBlockIoTune(dom, disk, params, nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20117
    virReportUnsupportedError();
20118 20119 20120 20121 20122 20123

error:
    virDispatchError(dom->conn);
    return -1;
}

20124

20125 20126 20127 20128 20129 20130 20131
/**
 * virDomainGetBlockIoTune:
 * @dom: pointer to domain object
 * @disk: path to the block device, or device shorthand
 * @params: Pointer to blkio parameter object
 *          (return value, allocated by the caller)
 * @nparams: Pointer to number of blkio parameters
20132
 * @flags: bitwise-OR of virDomainModificationImpact and virTypedParameterFlags
20133 20134 20135 20136 20137 20138 20139 20140 20141 20142 20143 20144 20145 20146 20147 20148 20149 20150 20151 20152 20153 20154 20155 20156 20157
 *
 * Get all block IO tunable parameters for a given device.  On input,
 * @nparams gives the size of the @params array; on output, @nparams
 * gives how many slots were filled with parameter information, which
 * might be less but will not exceed the input value.
 *
 * As a special case, calling with @params as NULL and @nparams as 0
 * on input will cause @nparams on output to contain the number of
 * parameters supported by the hypervisor, either for the given @disk
 * (note that block devices of different types might support different
 * parameters), or if @disk is NULL, for all possible disks. The
 * caller should then allocate @params array,
 * i.e. (sizeof(@virTypedParameter) * @nparams) bytes and call the API
 * again.  See virDomainGetMemoryParameters() for more details.
 *
 * The @disk parameter is either an unambiguous source name of the
 * block device (the <source file='...'/> sub-element, such as
 * "/path/to/image"), or the device target shorthand (the <target
 * dev='...'/> sub-element, such as "xvda").  Valid names can be found
 * by calling virDomainGetXMLDesc() and inspecting elements
 * within //domain/devices/disk.  This parameter cannot be NULL
 * unless @nparams is 0 on input.
 *
 * Returns -1 in case of error, 0 in case of success.
 */
20158 20159 20160 20161 20162 20163
int
virDomainGetBlockIoTune(virDomainPtr dom,
                        const char *disk,
                        virTypedParameterPtr params,
                        int *nparams,
                        unsigned int flags)
20164 20165 20166
{
    virConnectPtr conn;

20167
    VIR_DOMAIN_DEBUG(dom, "disk=%s, params=%p, nparams=%d, flags=%x",
20168 20169 20170 20171
                     NULLSTR(disk), params, (nparams) ? *nparams : -1, flags);

    virResetLastError();

20172
    virCheckDomainReturn(dom, -1);
20173

20174 20175 20176 20177 20178
    virCheckNonNullArgGoto(nparams, error);
    virCheckNonNegativeArgGoto(*nparams, error);
    if (*nparams != 0) {
        virCheckNonNullArgGoto(params, error);
        virCheckNonNullArgGoto(disk, error);
20179 20180 20181 20182 20183 20184 20185 20186 20187
    }

    if (VIR_DRV_SUPPORTS_FEATURE(dom->conn->driver, dom->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;

    /* At most one of these two flags should be set.  */
    if ((flags & VIR_DOMAIN_AFFECT_LIVE) &&
        (flags & VIR_DOMAIN_AFFECT_CONFIG)) {
20188
        virReportInvalidArg(flags,
20189 20190
                            _("flags 'affect live' and 'affect config' in %s "
                              "are mutually exclusive"),
20191
                            __FUNCTION__);
20192 20193 20194 20195 20196 20197 20198 20199 20200 20201 20202 20203
        goto error;
    }
    conn = dom->conn;

    if (conn->driver->domainGetBlockIoTune) {
        int ret;
        ret = conn->driver->domainGetBlockIoTune(dom, disk, params, nparams, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20204
    virReportUnsupportedError();
20205 20206 20207 20208 20209

error:
    virDispatchError(dom->conn);
    return -1;
}
20210

20211

20212 20213 20214 20215 20216 20217 20218
/**
 * virDomainGetCPUStats:
 * @domain: domain to query
 * @params: array to populate on output
 * @nparams: number of parameters per cpu
 * @start_cpu: which cpu to start with, or -1 for summary
 * @ncpus: how many cpus to query
20219
 * @flags: bitwise-OR of virTypedParameterFlags
20220 20221 20222 20223 20224 20225 20226 20227 20228 20229 20230 20231 20232 20233
 *
 * Get statistics relating to CPU usage attributable to a single
 * domain (in contrast to the statistics returned by
 * virNodeGetCPUStats() for all processes on the host).  @dom
 * must be running (an inactive domain has no attributable cpu
 * usage).  On input, @params must contain at least @nparams * @ncpus
 * entries, allocated by the caller.
 *
 * If @start_cpu is -1, then @ncpus must be 1, and the returned
 * results reflect the statistics attributable to the entire
 * domain (such as user and system time for the process as a
 * whole).  Otherwise, @start_cpu represents which cpu to start
 * with, and @ncpus represents how many consecutive processors to
 * query, with statistics attributable per processor (such as
20234 20235 20236
 * per-cpu usage).  If @ncpus is larger than the number of cpus
 * available to query, then the trailing part of the array will
 * be unpopulated.
20237 20238 20239 20240 20241 20242 20243 20244 20245 20246 20247 20248 20249 20250 20251 20252 20253 20254 20255 20256 20257 20258 20259 20260 20261 20262 20263 20264 20265 20266
 *
 * The remote driver imposes a limit of 128 @ncpus and 16 @nparams;
 * the number of parameters per cpu should not exceed 16, but if you
 * have a host with more than 128 CPUs, your program should split
 * the request into multiple calls.
 *
 * As special cases, if @params is NULL and @nparams is 0 and
 * @ncpus is 1, and the return value will be how many
 * statistics are available for the given @start_cpu.  This number
 * may be different for @start_cpu of -1 than for any non-negative
 * value, but will be the same for all non-negative @start_cpu.
 * Likewise, if @params is NULL and @nparams is 0 and @ncpus is 0,
 * the number of cpus available to query is returned.  From the
 * host perspective, this would typically match the cpus member
 * of virNodeGetInfo(), but might be less due to host cpu hotplug.
 *
 * For now, @flags is unused, and the statistics all relate to the
 * usage from the host perspective.  It is possible that a future
 * version will support a flag that queries the cpu usage from the
 * guest's perspective, where the maximum cpu to query would be
 * related to virDomainGetVcpusFlags() rather than virNodeGetInfo().
 * An individual guest vcpu cannot be reliably mapped back to a
 * specific host cpu unless a single-processor vcpu pinning was used,
 * but when @start_cpu is -1, any difference in usage between a host
 * and guest perspective would serve as a measure of hypervisor overhead.
 *
 * Typical use sequence is below.
 *
 * getting total stats: set start_cpu as -1, ncpus 1
 * virDomainGetCPUStats(dom, NULL, 0, -1, 1, 0) => nparams
20267
 * params = calloc(nparams, sizeof(virTypedParameter))
20268 20269 20270 20271 20272
 * virDomainGetCPUStats(dom, params, nparams, -1, 1, 0) => total stats.
 *
 * getting per-cpu stats:
 * virDomainGetCPUStats(dom, NULL, 0, 0, 0, 0) => ncpus
 * virDomainGetCPUStats(dom, NULL, 0, 0, 1, 0) => nparams
20273
 * params = calloc(ncpus * nparams, sizeof(virTypedParameter))
20274 20275 20276 20277 20278 20279 20280
 * virDomainGetCPUStats(dom, params, nparams, 0, ncpus, 0) => per-cpu stats
 *
 * Returns -1 on failure, or the number of statistics that were
 * populated per cpu on success (this will be less than the total
 * number of populated @params, unless @ncpus was 1; and may be
 * less than @nparams).  The populated parameters start at each
 * stride of @nparams, which means the results may be discontiguous;
20281 20282 20283 20284
 * any unpopulated parameters will be zeroed on success (this includes
 * skipped elements if @nparams is too large, and tail elements if
 * @ncpus is too large).  The caller is responsible for freeing any
 * returned string parameters.
20285
 */
20286 20287 20288 20289 20290 20291 20292
int
virDomainGetCPUStats(virDomainPtr domain,
                     virTypedParameterPtr params,
                     unsigned int nparams,
                     int start_cpu,
                     unsigned int ncpus,
                     unsigned int flags)
20293 20294 20295 20296 20297 20298 20299 20300
{
    virConnectPtr conn;

    VIR_DOMAIN_DEBUG(domain,
                     "params=%p, nparams=%d, start_cpu=%d, ncpus=%u, flags=%x",
                     params, nparams, start_cpu, ncpus, flags);
    virResetLastError();

20301
    virCheckDomainReturn(domain, -1);
20302
    conn = domain->conn;
20303

20304 20305 20306 20307 20308
    /* Special cases:
     * start_cpu must be non-negative, or else -1
     * if start_cpu is -1, ncpus must be 1
     * params == NULL must match nparams == 0
     * ncpus must be non-zero unless params == NULL
20309
     * nparams * ncpus must not overflow (RPC may restrict it even more)
20310
     */
20311 20312 20313 20314 20315 20316 20317 20318 20319
    if (start_cpu == -1) {
        if (ncpus != 1) {
            virReportInvalidArg(start_cpu,
                                _("ncpus in %s must be 1 when start_cpu is -1"),
                                __FUNCTION__);
            goto error;
        }
    } else {
        virCheckNonNegativeArgGoto(start_cpu, error);
20320
    }
20321 20322 20323 20324 20325 20326 20327
    if (nparams)
        virCheckNonNullArgGoto(params, error);
    else
        virCheckNullArgGoto(params, error);
    if (ncpus == 0)
        virCheckNullArgGoto(params, error);

E
Eric Blake 已提交
20328
    if (nparams && ncpus > UINT_MAX / nparams) {
20329 20330
        virReportError(VIR_ERR_OVERFLOW, _("input too large: %u * %u"),
                       nparams, ncpus);
E
Eric Blake 已提交
20331 20332
        goto error;
    }
20333 20334 20335
    if (VIR_DRV_SUPPORTS_FEATURE(domain->conn->driver, domain->conn,
                                 VIR_DRV_FEATURE_TYPED_PARAM_STRING))
        flags |= VIR_TYPED_PARAM_STRING_OKAY;
20336 20337 20338 20339 20340 20341 20342 20343 20344 20345 20346

    if (conn->driver->domainGetCPUStats) {
        int ret;

        ret = conn->driver->domainGetCPUStats(domain, params, nparams,
                                              start_cpu, ncpus, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20347
    virReportUnsupportedError();
20348 20349 20350 20351 20352

error:
    virDispatchError(domain->conn);
    return -1;
}
20353

20354

20355 20356 20357 20358 20359 20360 20361 20362 20363 20364 20365 20366 20367 20368 20369 20370 20371 20372 20373 20374 20375 20376 20377 20378 20379 20380 20381 20382 20383 20384 20385 20386 20387 20388 20389 20390 20391 20392 20393
/**
 * virDomainGetDiskErrors:
 * @dom: a domain object
 * @errors: array to populate on output
 * @maxerrors: size of @errors array
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * The function populates @errors array with all disks that encountered an
 * I/O error.  Disks with no error will not be returned in the @errors array.
 * Each disk is identified by its target (the dev attribute of target
 * subelement in domain XML), such as "vda", and accompanied with the error
 * that was seen on it.  The caller is also responsible for calling free()
 * on each disk name returned.
 *
 * In a special case when @errors is NULL and @maxerrors is 0, the function
 * returns preferred size of @errors that the caller should use to get all
 * disk errors.
 *
 * Since calling virDomainGetDiskErrors(dom, NULL, 0, 0) to get preferred size
 * of @errors array and getting the errors are two separate operations, new
 * disks may be hotplugged to the domain and new errors may be encountered
 * between the two calls.  Thus, this function may not return all disk errors
 * because the supplied array is not large enough.  Such errors may, however,
 * be detected by listening to domain events.
 *
 * Returns number of disks with errors filled in the @errors array or -1 on
 * error.
 */
int
virDomainGetDiskErrors(virDomainPtr dom,
                       virDomainDiskErrorPtr errors,
                       unsigned int maxerrors,
                       unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "errors=%p, maxerrors=%u, flags=%x",
                     errors, maxerrors, flags);

    virResetLastError();

20394
    virCheckDomainReturn(dom, -1);
20395

20396 20397 20398 20399
    if (maxerrors)
        virCheckNonNullArgGoto(errors, error);
    else
        virCheckNullArgGoto(errors, error);
20400 20401 20402 20403 20404 20405 20406 20407 20408

    if (dom->conn->driver->domainGetDiskErrors) {
        int ret = dom->conn->driver->domainGetDiskErrors(dom, errors,
                                                         maxerrors, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20409
    virReportUnsupportedError();
20410 20411 20412 20413 20414

error:
    virDispatchError(dom->conn);
    return -1;
}
G
Guido Günther 已提交
20415

20416

G
Guido Günther 已提交
20417 20418 20419 20420 20421 20422 20423 20424 20425 20426 20427 20428 20429 20430 20431 20432 20433 20434
/**
 * virDomainGetHostname:
 * @domain: a domain object
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Get the hostname for that domain.
 *
 * Dependent on hypervisor used, this may require a guest agent to be
 * available.
 *
 * Returns the hostname which must be freed by the caller, or
 * NULL if there was an error.
 */
char *
virDomainGetHostname(virDomainPtr domain, unsigned int flags)
{
    virConnectPtr conn;

20435
    VIR_DOMAIN_DEBUG(domain, "flags=%x", flags);
G
Guido Günther 已提交
20436 20437 20438

    virResetLastError();

20439
    virCheckDomainReturn(domain, NULL);
G
Guido Günther 已提交
20440 20441 20442 20443
    conn = domain->conn;

    if (conn->driver->domainGetHostname) {
        char *ret;
20444
        ret = conn->driver->domainGetHostname(domain, flags);
G
Guido Günther 已提交
20445 20446 20447 20448 20449
        if (!ret)
            goto error;
        return ret;
    }

20450
    virReportUnsupportedError();
G
Guido Günther 已提交
20451 20452 20453 20454 20455

error:
    virDispatchError(domain->conn);
    return NULL;
}
20456

20457

20458 20459 20460 20461 20462 20463 20464 20465 20466 20467 20468 20469 20470 20471 20472 20473 20474 20475 20476 20477 20478 20479 20480 20481 20482 20483 20484 20485 20486 20487 20488
/**
 * virNodeGetCPUMap:
 * @conn: pointer to the hypervisor connection
 * @cpumap: optional pointer to a bit map of real CPUs on the host node
 *      (in 8-bit bytes) (OUT)
 *      In case of success each bit set to 1 means that corresponding
 *      CPU is online.
 *      Bytes are stored in little-endian order: CPU0-7, 8-15...
 *      In each byte, lowest CPU number is least significant bit.
 *      The bit map is allocated by virNodeGetCPUMap and needs
 *      to be released using free() by the caller.
 * @online: optional number of online CPUs in cpumap (OUT)
 *      Contains the number of online CPUs if the call was successful.
 * @flags: extra flags; not used yet, so callers should always pass 0
 *
 * Get CPU map of host node CPUs.
 *
 * Returns number of CPUs present on the host node,
 * or -1 if there was an error.
 */
int
virNodeGetCPUMap(virConnectPtr conn,
                 unsigned char **cpumap,
                 unsigned int *online,
                 unsigned int flags)
{
    VIR_DEBUG("conn=%p, cpumap=%p, online=%p, flags=%x",
              conn, cpumap, online, flags);

    virResetLastError();

20489
    virCheckConnectReturn(conn, -1);
20490 20491 20492 20493 20494 20495 20496 20497

    if (conn->driver->nodeGetCPUMap) {
        int ret = conn->driver->nodeGetCPUMap(conn, cpumap, online, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20498
    virReportUnsupportedError();
20499 20500 20501 20502 20503

error:
    virDispatchError(conn);
    return -1;
}
20504

20505

20506 20507 20508
/**
 * virDomainFSTrim:
 * @dom: a domain object
20509
 * @mountPoint: which mount point to trim
20510 20511 20512 20513 20514 20515
 * @minimum: Minimum contiguous free range to discard in bytes
 * @flags: extra flags, not used yet, so callers should always pass 0
 *
 * Calls FITRIM within the guest (hence guest agent may be
 * required depending on hypervisor used). Either call it on each
 * mounted filesystem (@mountPoint is NULL) or just on specified
20516
 * @mountPoint. @minimum hints that free ranges smaller than this
20517 20518 20519 20520
 * may be ignored (this is a hint and the guest may not respect
 * it).  By increasing this value, the fstrim operation will
 * complete more quickly for filesystems with badly fragmented
 * free space, although not all blocks will be discarded.
20521
 * If @minimum is not zero, the command may fail.
20522 20523 20524 20525 20526 20527 20528 20529 20530 20531 20532 20533 20534 20535
 *
 * Returns 0 on success, -1 otherwise.
 */
int
virDomainFSTrim(virDomainPtr dom,
                const char *mountPoint,
                unsigned long long minimum,
                unsigned int flags)
{
    VIR_DOMAIN_DEBUG(dom, "mountPoint=%s, minimum=%llu, flags=%x",
                     mountPoint, minimum, flags);

    virResetLastError();

20536
    virCheckDomainReturn(dom, -1);
20537
    virCheckReadOnlyGoto(dom->conn->flags, error);
20538 20539 20540 20541 20542 20543 20544 20545 20546

    if (dom->conn->driver->domainFSTrim) {
        int ret = dom->conn->driver->domainFSTrim(dom, mountPoint,
                                                  minimum, flags);
        if (ret < 0)
            goto error;
        return ret;
    }

20547
    virReportUnsupportedError();
20548 20549 20550 20551 20552

error:
    virDispatchError(dom->conn);
    return -1;
}