qemu_conf.c 45.4 KB
Newer Older
D
Daniel P. Berrange 已提交
1
/*
2
 * qemu_conf.c: QEMU configuration management
D
Daniel P. Berrange 已提交
3
 *
4
 * Copyright (C) 2006-2013 Red Hat, Inc.
D
Daniel P. Berrange 已提交
5 6 7 8 9 10 11 12 13 14 15 16 17
 * Copyright (C) 2006 Daniel P. Berrange
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with this library.  If not, see
O
Osier Yang 已提交
19
 * <http://www.gnu.org/licenses/>.
D
Daniel P. Berrange 已提交
20 21 22 23
 *
 * Author: Daniel P. Berrange <berrange@redhat.com>
 */

24
#include <config.h>
25

D
Daniel P. Berrange 已提交
26 27 28 29
#include <string.h>
#include <limits.h>
#include <sys/types.h>
#include <sys/stat.h>
30
#include <stdlib.h>
D
Daniel P. Berrange 已提交
31 32 33
#include <unistd.h>
#include <errno.h>
#include <fcntl.h>
34
#include <sys/wait.h>
35
#include <arpa/inet.h>
D
Daniel P. Berrange 已提交
36

37
#include "virerror.h"
38
#include "qemu_conf.h"
39
#include "qemu_command.h"
40
#include "qemu_capabilities.h"
41
#include "qemu_bridge_filter.h"
42
#include "viruuid.h"
43
#include "virbuffer.h"
44
#include "virconf.h"
45
#include "viralloc.h"
46
#include "datatypes.h"
47
#include "virxml.h"
48
#include "nodeinfo.h"
49
#include "virlog.h"
50
#include "cpu/cpu.h"
51
#include "domain_nwfilter.h"
E
Eric Blake 已提交
52
#include "virfile.h"
53
#include "virstring.h"
54
#include "viratomic.h"
55
#include "storage_conf.h"
56
#include "configmake.h"
57

58 59
#define VIR_FROM_THIS VIR_FROM_QEMU

60 61 62 63 64
static virClassPtr virQEMUDriverConfigClass;
static void virQEMUDriverConfigDispose(void *obj);

static int virQEMUConfigOnceInit(void)
{
65 66 67 68
    virQEMUDriverConfigClass = virClassNew(virClassForObject(),
                                           "virQEMUDriverConfig",
                                           sizeof(virQEMUDriverConfig),
                                           virQEMUDriverConfigDispose);
69

70
    if (!virQEMUDriverConfigClass)
71 72 73
        return -1;
    else
        return 0;
74 75 76 77 78
}

VIR_ONCE_GLOBAL_INIT(virQEMUConfig)


79 80
static void
qemuDriverLock(virQEMUDriverPtr driver)
81 82 83
{
    virMutexLock(&driver->lock);
}
84 85
static void
qemuDriverUnlock(virQEMUDriverPtr driver)
86 87 88 89
{
    virMutexUnlock(&driver->lock);
}

90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107
void qemuDomainCmdlineDefFree(qemuDomainCmdlineDefPtr def)
{
    size_t i;

    if (!def)
        return;

    for (i = 0; i < def->num_args; i++)
        VIR_FREE(def->args[i]);
    for (i = 0; i < def->num_env; i++) {
        VIR_FREE(def->env_name[i]);
        VIR_FREE(def->env_value[i]);
    }
    VIR_FREE(def->args);
    VIR_FREE(def->env_name);
    VIR_FREE(def->env_value);
    VIR_FREE(def);
}
108

109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127
virQEMUDriverConfigPtr virQEMUDriverConfigNew(bool privileged)
{
    virQEMUDriverConfigPtr cfg;

    if (virQEMUConfigInitialize() < 0)
        return NULL;

    if (!(cfg = virObjectNew(virQEMUDriverConfigClass)))
        return NULL;

    cfg->privileged = privileged;
    cfg->uri = privileged ? "qemu:///system" : "qemu:///session";

    if (privileged) {
        if (virGetUserID(QEMU_USER, &cfg->user) < 0)
            goto error;
        if (virGetGroupID(QEMU_GROUP, &cfg->group) < 0)
            goto error;
    } else {
128 129
        cfg->user = (uid_t)-1;
        cfg->group = (gid_t)-1;
130 131 132
    }
    cfg->dynamicOwnership = privileged;

133
    cfg->cgroupControllers = -1; /* -1 == auto-detect */
134 135 136 137

    if (privileged) {
        if (virAsprintf(&cfg->logDir,
                        "%s/log/libvirt/qemu", LOCALSTATEDIR) < 0)
138
            goto error;
139

140 141
        if (VIR_STRDUP(cfg->configBaseDir, SYSCONFDIR "/libvirt") < 0)
            goto error;
D
Daniel P. Berrange 已提交
142

143 144
        if (virAsprintf(&cfg->stateDir,
                      "%s/run/libvirt/qemu", LOCALSTATEDIR) < 0)
145
            goto error;
146 147 148

        if (virAsprintf(&cfg->libDir,
                      "%s/lib/libvirt/qemu", LOCALSTATEDIR) < 0)
149
            goto error;
150 151 152

        if (virAsprintf(&cfg->cacheDir,
                      "%s/cache/libvirt/qemu", LOCALSTATEDIR) < 0)
153
            goto error;
154 155
        if (virAsprintf(&cfg->saveDir,
                      "%s/lib/libvirt/qemu/save", LOCALSTATEDIR) < 0)
156
            goto error;
157 158
        if (virAsprintf(&cfg->snapshotDir,
                        "%s/lib/libvirt/qemu/snapshot", LOCALSTATEDIR) < 0)
159
            goto error;
160 161
        if (virAsprintf(&cfg->autoDumpPath,
                        "%s/lib/libvirt/qemu/dump", LOCALSTATEDIR) < 0)
162
            goto error;
163 164 165 166 167 168 169 170 171 172 173
    } else {
        char *rundir;
        char *cachedir;

        cachedir = virGetUserCacheDirectory();
        if (!cachedir)
            goto error;

        if (virAsprintf(&cfg->logDir,
                        "%s/qemu/log", cachedir) < 0) {
            VIR_FREE(cachedir);
174
            goto error;
175 176 177
        }
        if (virAsprintf(&cfg->cacheDir, "%s/qemu/cache", cachedir) < 0) {
            VIR_FREE(cachedir);
178
            goto error;
179 180
        }
        VIR_FREE(cachedir);
181

182 183 184 185 186
        rundir = virGetUserRuntimeDirectory();
        if (!rundir)
            goto error;
        if (virAsprintf(&cfg->stateDir, "%s/qemu/run", rundir) < 0) {
            VIR_FREE(rundir);
187
            goto error;
188 189 190 191 192 193 194
        }
        VIR_FREE(rundir);

        if (!(cfg->configBaseDir = virGetUserConfigDirectory()))
            goto error;

        if (virAsprintf(&cfg->libDir, "%s/qemu/lib", cfg->configBaseDir) < 0)
195
            goto error;
196
        if (virAsprintf(&cfg->saveDir, "%s/qemu/save", cfg->configBaseDir) < 0)
197
            goto error;
198
        if (virAsprintf(&cfg->snapshotDir, "%s/qemu/snapshot", cfg->configBaseDir) < 0)
199
            goto error;
200
        if (virAsprintf(&cfg->autoDumpPath, "%s/qemu/dump", cfg->configBaseDir) < 0)
201
            goto error;
202 203 204
    }

    if (virAsprintf(&cfg->configDir, "%s/qemu", cfg->configBaseDir) < 0)
205
        goto error;
206
    if (virAsprintf(&cfg->autostartDir, "%s/qemu/autostart", cfg->configBaseDir) < 0)
207
        goto error;
208 209


210 211
    if (VIR_STRDUP(cfg->vncListen, "127.0.0.1") < 0)
        goto error;
212

213 214
    if (VIR_STRDUP(cfg->vncTLSx509certdir, SYSCONFDIR "/pki/libvirt-vnc") < 0)
        goto error;
D
Daniel P. Berrange 已提交
215

216 217
    if (VIR_STRDUP(cfg->spiceListen, "127.0.0.1") < 0)
        goto error;
218

E
Eric Blake 已提交
219 220
    if (VIR_STRDUP(cfg->spiceTLSx509certdir,
                   SYSCONFDIR "/pki/libvirt-spice") < 0)
221
        goto error;
222

223 224 225
    cfg->remotePortMin = QEMU_REMOTE_PORT_MIN;
    cfg->remotePortMax = QEMU_REMOTE_PORT_MAX;

226 227 228
    cfg->webSocketPortMin = QEMU_WEBSOCKET_PORT_MIN;
    cfg->webSocketPortMax = QEMU_WEBSOCKET_PORT_MAX;

229 230 231
    cfg->migrationPortMin = QEMU_MIGRATION_PORT_MIN;
    cfg->migrationPortMax = QEMU_MIGRATION_PORT_MAX;

232
#if defined HAVE_MNTENT_H && defined HAVE_GETMNTENT_R
233 234 235
    /* For privileged driver, try and find hugepage mount automatically.
     * Non-privileged driver requires admin to create a dir for the
     * user, chown it, and then let user configure it manually */
236 237
    if (privileged &&
        !(cfg->hugetlbfsMount = virFileFindMountPoint("hugetlbfs"))) {
238
        if (errno != ENOENT) {
239
            virReportSystemError(errno, "%s",
240
                                 _("unable to find hugetlbfs mountpoint"));
241
            goto error;
242 243 244
        }
    }
#endif
245 246
    if (VIR_STRDUP(cfg->bridgeHelperName, "/usr/libexec/qemu-bridge-helper") < 0)
        goto error;
247

248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290
    cfg->clearEmulatorCapabilities = true;

    cfg->securityDefaultConfined = true;
    cfg->securityRequireConfined = false;

    cfg->keepAliveInterval = 5;
    cfg->keepAliveCount = 5;
    cfg->seccompSandbox = -1;

    return cfg;

error:
    virObjectUnref(cfg);
    return NULL;
}


static void virQEMUDriverConfigDispose(void *obj)
{
    virQEMUDriverConfigPtr cfg = obj;


    virStringFreeList(cfg->cgroupDeviceACL);

    VIR_FREE(cfg->configBaseDir);
    VIR_FREE(cfg->configDir);
    VIR_FREE(cfg->autostartDir);
    VIR_FREE(cfg->logDir);
    VIR_FREE(cfg->stateDir);

    VIR_FREE(cfg->libDir);
    VIR_FREE(cfg->cacheDir);
    VIR_FREE(cfg->saveDir);
    VIR_FREE(cfg->snapshotDir);

    VIR_FREE(cfg->vncTLSx509certdir);
    VIR_FREE(cfg->vncListen);
    VIR_FREE(cfg->vncPassword);
    VIR_FREE(cfg->vncSASLdir);

    VIR_FREE(cfg->spiceTLSx509certdir);
    VIR_FREE(cfg->spiceListen);
    VIR_FREE(cfg->spicePassword);
291
    VIR_FREE(cfg->spiceSASLdir);
292 293 294

    VIR_FREE(cfg->hugetlbfsMount);
    VIR_FREE(cfg->hugepagePath);
295
    VIR_FREE(cfg->bridgeHelperName);
296 297 298 299 300 301 302 303 304 305

    VIR_FREE(cfg->saveImageFormat);
    VIR_FREE(cfg->dumpImageFormat);
    VIR_FREE(cfg->autoDumpPath);

    virStringFreeList(cfg->securityDriverNames);

    VIR_FREE(cfg->lockManagerName);
}

306

307 308 309 310 311 312
int virQEMUDriverConfigLoadFile(virQEMUDriverConfigPtr cfg,
                                const char *filename)
{
    virConfPtr conf = NULL;
    virConfValuePtr p;
    int ret = -1;
313
    size_t i;
314

D
Daniel P. Berrange 已提交
315 316 317
    /* Just check the file is readable before opening it, otherwise
     * libvirt emits an error.
     */
318
    if (access(filename, R_OK) == -1) {
319
        VIR_INFO("Could not read qemu config file %s", filename);
320
        return 0;
321
    }
D
Daniel P. Berrange 已提交
322

323 324
    if (!(conf = virConfReadFile(filename, 0)))
        goto cleanup;
D
Daniel P. Berrange 已提交
325

326 327 328 329 330
#define CHECK_TYPE(name,typ)                          \
    if (p && p->type != (typ)) {                      \
        virReportError(VIR_ERR_INTERNAL_ERROR,        \
                       "%s: %s: expected type " #typ, \
                       filename, (name));             \
331
        goto cleanup;                                 \
332 333 334 335 336 337 338 339
    }

#define GET_VALUE_LONG(NAME, VAR)     \
    p = virConfGetValue(conf, NAME);  \
    CHECK_TYPE(NAME, VIR_CONF_LONG);  \
    if (p)                            \
        VAR = p->l;

340 341 342 343 344 345
#define GET_VALUE_BOOL(NAME, VAR)     \
    p = virConfGetValue(conf, NAME);  \
    CHECK_TYPE(NAME, VIR_CONF_LONG);  \
    if (p)                            \
        VAR = p->l != 0;

346 347 348 349 350
#define GET_VALUE_STR(NAME, VAR)           \
    p = virConfGetValue(conf, NAME);       \
    CHECK_TYPE(NAME, VIR_CONF_STRING);     \
    if (p && p->str) {                     \
        VIR_FREE(VAR);                     \
351 352
        if (VIR_STRDUP(VAR, p->str) < 0)   \
            goto cleanup;                  \
353 354
    }

355 356 357 358 359 360 361 362 363
    GET_VALUE_BOOL("vnc_auto_unix_socket", cfg->vncAutoUnixSocket);
    GET_VALUE_BOOL("vnc_tls", cfg->vncTLS);
    GET_VALUE_BOOL("vnc_tls_x509_verify", cfg->vncTLSx509verify);
    GET_VALUE_STR("vnc_tls_x509_cert_dir", cfg->vncTLSx509certdir);
    GET_VALUE_STR("vnc_listen", cfg->vncListen);
    GET_VALUE_STR("vnc_password", cfg->vncPassword);
    GET_VALUE_BOOL("vnc_sasl", cfg->vncSASL);
    GET_VALUE_STR("vnc_sasl_dir", cfg->vncSASLdir);
    GET_VALUE_BOOL("vnc_allow_host_audio", cfg->vncAllowHostAudio);
364
    GET_VALUE_BOOL("nographics_allow_host_audio", cfg->nogfxAllowHostAudio);
365

366
    p = virConfGetValue(conf, "security_driver");
367 368 369 370
    if (p && p->type == VIR_CONF_LIST) {
        size_t len;
        virConfValuePtr pp;

J
Ján Tomko 已提交
371
        /* Calc length and check items */
372 373
        for (len = 0, pp = p->list; pp; len++, pp = pp->next) {
            if (pp->type != VIR_CONF_STRING) {
374 375 376
                virReportError(VIR_ERR_CONF_SYNTAX, "%s",
                               _("security_driver must be a list of strings"));
                goto cleanup;
377 378 379
            }
        }

380
        if (VIR_ALLOC_N(cfg->securityDriverNames, len + 1) < 0)
381
            goto cleanup;
382 383

        for (i = 0, pp = p->list; pp; i++, pp = pp->next) {
384 385
            if (VIR_STRDUP(cfg->securityDriverNames[i], pp->str) < 0)
                goto cleanup;
386
        }
387
        cfg->securityDriverNames[len] = NULL;
388
    } else {
389
        CHECK_TYPE("security_driver", VIR_CONF_STRING);
390
        if (p && p->str) {
391
            if (VIR_ALLOC_N(cfg->securityDriverNames, 2) < 0)
392
                goto cleanup;
393 394
            if (VIR_STRDUP(cfg->securityDriverNames[0], p->str) < 0)
                goto cleanup;
395

396
            cfg->securityDriverNames[1] = NULL;
397
        }
398 399
    }

400 401
    GET_VALUE_BOOL("security_default_confined", cfg->securityDefaultConfined);
    GET_VALUE_BOOL("security_require_confined", cfg->securityRequireConfined);
402

403 404
    GET_VALUE_BOOL("spice_tls", cfg->spiceTLS);
    GET_VALUE_STR("spice_tls_x509_cert_dir", cfg->spiceTLSx509certdir);
405 406
    GET_VALUE_BOOL("spice_sasl", cfg->spiceSASL);
    GET_VALUE_STR("spice_sasl_dir", cfg->spiceSASLdir);
407 408
    GET_VALUE_STR("spice_listen", cfg->spiceListen);
    GET_VALUE_STR("spice_password", cfg->spicePassword);
409 410


411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439
    GET_VALUE_LONG("remote_websocket_port_min", cfg->webSocketPortMin);
    if (cfg->webSocketPortMin < QEMU_WEBSOCKET_PORT_MIN) {
        /* if the port is too low, we can't get the display name
         * to tell to vnc (usually subtract 5700, e.g. localhost:1
         * for port 5701) */
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("%s: remote_websocket_port_min: port must be greater "
                         "than or equal to %d"),
                        filename, QEMU_WEBSOCKET_PORT_MIN);
        goto cleanup;
    }

    GET_VALUE_LONG("remote_websocket_port_max", cfg->webSocketPortMax);
    if (cfg->webSocketPortMax > QEMU_WEBSOCKET_PORT_MAX ||
        cfg->webSocketPortMax < cfg->webSocketPortMin) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: remote_websocket_port_max: port must be between "
                          "the minimal port and %d"),
                       filename, QEMU_WEBSOCKET_PORT_MAX);
        goto cleanup;
    }

    if (cfg->webSocketPortMin > cfg->webSocketPortMax) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: remote_websocket_port_min: min port must not be "
                          "greater than max port"), filename);
        goto cleanup;
    }

440 441
    GET_VALUE_LONG("remote_display_port_min", cfg->remotePortMin);
    if (cfg->remotePortMin < QEMU_REMOTE_PORT_MIN) {
442 443 444 445 446 447 448
        /* if the port is too low, we can't get the display name
         * to tell to vnc (usually subtract 5900, e.g. localhost:1
         * for port 5901) */
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("%s: remote_display_port_min: port must be greater "
                         "than or equal to %d"),
                        filename, QEMU_REMOTE_PORT_MIN);
449
        goto cleanup;
450 451
    }

452 453 454
    GET_VALUE_LONG("remote_display_port_max", cfg->remotePortMax);
    if (cfg->remotePortMax > QEMU_REMOTE_PORT_MAX ||
        cfg->remotePortMax < cfg->remotePortMin) {
455 456 457 458
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: remote_display_port_max: port must be between "
                          "the minimal port and %d"),
                       filename, QEMU_REMOTE_PORT_MAX);
459
        goto cleanup;
460 461
    }

462
    if (cfg->remotePortMin > cfg->remotePortMax) {
463
        virReportError(VIR_ERR_INTERNAL_ERROR,
464 465
                        _("%s: remote_display_port_min: min port must not be "
                          "greater than max port"), filename);
466
        goto cleanup;
467 468
    }

469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486
    GET_VALUE_LONG("migration_port_min", cfg->migrationPortMin);
    if (cfg->migrationPortMin <= 0) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("%s: migration_port_min: port must be greater than 0"),
                        filename);
        goto cleanup;
    }

    GET_VALUE_LONG("migration_port_max", cfg->migrationPortMax);
    if (cfg->migrationPortMax > 65535 ||
        cfg->migrationPortMax < cfg->migrationPortMin) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                        _("%s: migration_port_max: port must be between "
                          "the minimal port %d and 65535"),
                       filename, cfg->migrationPortMin);
        goto cleanup;
    }

487 488
    p = virConfGetValue(conf, "user");
    CHECK_TYPE("user", VIR_CONF_STRING);
489 490
    if (p && p->str &&
        virGetUserID(p->str, &cfg->user) < 0)
491
        goto cleanup;
492

493 494
    p = virConfGetValue(conf, "group");
    CHECK_TYPE("group", VIR_CONF_STRING);
495 496
    if (p && p->str &&
        virGetGroupID(p->str, &cfg->group) < 0)
497
        goto cleanup;
498

499
    GET_VALUE_BOOL("dynamic_ownership", cfg->dynamicOwnership);
500

501 502
    p = virConfGetValue(conf, "cgroup_controllers");
    CHECK_TYPE("cgroup_controllers", VIR_CONF_LIST);
503
    if (p) {
504
        cfg->cgroupControllers = 0;
505 506 507 508
        virConfValuePtr pp;
        for (i = 0, pp = p->list; pp; ++i, pp = pp->next) {
            int ctl;
            if (pp->type != VIR_CONF_STRING) {
509 510 511 512
                virReportError(VIR_ERR_CONF_SYNTAX, "%s",
                               _("cgroup_controllers must be a "
                                 "list of strings"));
                goto cleanup;
513
            }
514 515 516 517 518

            if ((ctl = virCgroupControllerTypeFromString(pp->str)) < 0) {
                virReportError(VIR_ERR_CONF_SYNTAX,
                               _("Unknown cgroup controller '%s'"), pp->str);
                goto cleanup;
519
            }
520
            cfg->cgroupControllers |= (1 << ctl);
521 522 523
        }
    }

524 525
    p = virConfGetValue(conf, "cgroup_device_acl");
    CHECK_TYPE("cgroup_device_acl", VIR_CONF_LIST);
526 527 528 529 530
    if (p) {
        int len = 0;
        virConfValuePtr pp;
        for (pp = p->list; pp; pp = pp->next)
            len++;
531
        if (VIR_ALLOC_N(cfg->cgroupDeviceACL, 1+len) < 0)
532
            goto cleanup;
533

534 535
        for (i = 0, pp = p->list; pp; ++i, pp = pp->next) {
            if (pp->type != VIR_CONF_STRING) {
536 537 538 539
                virReportError(VIR_ERR_CONF_SYNTAX, "%s",
                               _("cgroup_device_acl must be a "
                                 "list of strings"));
                goto cleanup;
540
            }
541 542
            if (VIR_STRDUP(cfg->cgroupDeviceACL[i], pp->str) < 0)
                goto cleanup;
543
        }
544
        cfg->cgroupDeviceACL[i] = NULL;
545 546
    }

547 548
    GET_VALUE_STR("save_image_format", cfg->saveImageFormat);
    GET_VALUE_STR("dump_image_format", cfg->dumpImageFormat);
549 550
    GET_VALUE_STR("snapshot_image_format", cfg->snapshotImageFormat);

551 552 553
    GET_VALUE_STR("auto_dump_path", cfg->autoDumpPath);
    GET_VALUE_BOOL("auto_dump_bypass_cache", cfg->autoDumpBypassCache);
    GET_VALUE_BOOL("auto_start_bypass_cache", cfg->autoStartBypassCache);
554

555
    GET_VALUE_STR("hugetlbfs_mount", cfg->hugetlbfsMount);
556
    GET_VALUE_STR("bridge_helper", cfg->bridgeHelperName);
557

558 559 560 561 562 563 564 565
    GET_VALUE_BOOL("mac_filter", cfg->macFilter);

    GET_VALUE_BOOL("relaxed_acs_check", cfg->relaxedACS);
    GET_VALUE_BOOL("clear_emulator_capabilities", cfg->clearEmulatorCapabilities);
    GET_VALUE_BOOL("allow_disk_format_probing", cfg->allowDiskFormatProbing);
    GET_VALUE_BOOL("set_process_name", cfg->setProcessName);
    GET_VALUE_LONG("max_processes", cfg->maxProcesses);
    GET_VALUE_LONG("max_files", cfg->maxFiles);
566

567 568 569 570 571 572 573 574
    GET_VALUE_STR("lock_manager", cfg->lockManagerName);

    GET_VALUE_LONG("max_queued", cfg->maxQueuedJobs);

    GET_VALUE_LONG("keepalive_interval", cfg->keepAliveInterval);
    GET_VALUE_LONG("keepalive_count", cfg->keepAliveCount);

    GET_VALUE_LONG("seccomp_sandbox", cfg->seccompSandbox);
575

576 577
    GET_VALUE_STR("migration_address", cfg->migrationAddress);

578 579 580
    ret = 0;

cleanup:
581
    virConfFree(conf);
582
    return ret;
D
Daniel P. Berrange 已提交
583
}
584
#undef GET_VALUE_BOOL
585 586
#undef GET_VALUE_LONG
#undef GET_VALUE_STRING
587

588 589
virQEMUDriverConfigPtr virQEMUDriverGetConfig(virQEMUDriverPtr driver)
{
590 591 592 593 594
    virQEMUDriverConfigPtr conf;
    qemuDriverLock(driver);
    conf = virObjectRef(driver->config);
    qemuDriverUnlock(driver);
    return conf;
595 596
}

597
virDomainXMLOptionPtr
598
virQEMUDriverCreateXMLConf(virQEMUDriverPtr driver)
599
{
600
    virQEMUDriverDomainDefParserConfig.priv = driver;
601
    return virDomainXMLOptionNew(&virQEMUDriverDomainDefParserConfig,
602 603
                                 &virQEMUDriverPrivateDataCallbacks,
                                 &virQEMUDriverDomainXMLNamespace);
604 605
}

606 607 608

virCapsPtr virQEMUDriverCreateCapabilities(virQEMUDriverPtr driver)
{
609
    size_t i, j;
610 611 612
    virCapsPtr caps;
    virSecurityManagerPtr *sec_managers = NULL;
    /* Security driver data */
613
    const char *doi, *model, *lbl, *type;
614
    virQEMUDriverConfigPtr cfg = virQEMUDriverGetConfig(driver);
615 616
    const int virtTypes[] = {VIR_DOMAIN_VIRT_KVM,
                             VIR_DOMAIN_VIRT_QEMU,};
617 618

    /* Basic host arch / guest machine capabilities */
619
    if (!(caps = virQEMUCapsInit(driver->qemuCapsCache)))
620
        goto error;
621 622 623 624

    if (virGetHostUUID(caps->host.host_uuid)) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       "%s", _("cannot get the host uuid"));
625
        goto error;
626 627 628
    }

    /* access sec drivers and create a sec model for each one */
629 630
    if (!(sec_managers = virSecurityManagerGetNested(driver->securityManager)))
        goto error;
631 632 633 634 635 636 637

    /* calculate length */
    for (i = 0; sec_managers[i]; i++)
        ;
    caps->host.nsecModels = i;

    if (VIR_ALLOC_N(caps->host.secModels, caps->host.nsecModels) < 0)
638
        goto error;
639 640

    for (i = 0; sec_managers[i]; i++) {
641
        virCapsHostSecModelPtr sm = &caps->host.secModels[i];
642 643
        doi = virSecurityManagerGetDOI(sec_managers[i]);
        model = virSecurityManagerGetModel(sec_managers[i]);
644 645
        if (VIR_STRDUP(sm->model, model) < 0 ||
            VIR_STRDUP(sm->doi, doi) < 0)
646
            goto error;
647 648 649 650 651 652 653 654 655

        for (j = 0; j < ARRAY_CARDINALITY(virtTypes); j++) {
            lbl = virSecurityManagerGetBaseLabel(sec_managers[i], virtTypes[j]);
            type = virDomainVirtTypeToString(virtTypes[j]);
            if (lbl &&
                virCapabilitiesHostSecModelAddBaseLabel(sm, type, lbl) < 0)
                goto error;
        }

656 657 658 659 660 661 662 663
        VIR_DEBUG("Initialized caps for security driver \"%s\" with "
                  "DOI \"%s\"", model, doi);
    }
    VIR_FREE(sec_managers);

    virObjectUnref(cfg);
    return caps;

664
error:
665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685
    VIR_FREE(sec_managers);
    virObjectUnref(caps);
    virObjectUnref(cfg);
    return NULL;
}


/**
 * virQEMUDriverGetCapabilities:
 *
 * Get a reference to the virCapsPtr instance for the
 * driver. If @refresh is true, the capabilities will be
 * rebuilt first
 *
 * The caller must release the reference with virObjetUnref
 *
 * Returns: a reference to a virCapsPtr instance or NULL
 */
virCapsPtr virQEMUDriverGetCapabilities(virQEMUDriverPtr driver,
                                        bool refresh)
{
686
    virCapsPtr ret = NULL;
687 688 689 690 691
    if (refresh) {
        virCapsPtr caps = NULL;
        if ((caps = virQEMUDriverCreateCapabilities(driver)) == NULL)
            return NULL;

692
        qemuDriverLock(driver);
693 694
        virObjectUnref(driver->caps);
        driver->caps = caps;
695 696
    } else {
        qemuDriverLock(driver);
697 698
    }

699 700 701
    ret = virObjectRef(driver->caps);
    qemuDriverUnlock(driver);
    return ret;
702 703
}

704
struct _qemuSharedDeviceEntry {
705 706 707 708
    size_t ref;
    char **domains; /* array of domain names */
};

709
/* Construct the hash key for sharedDevices as "major:minor" */
710
char *
711
qemuGetSharedDeviceKey(const char *device_path)
712 713 714 715 716
{
    int maj, min;
    char *key = NULL;
    int rc;

717
    if ((rc = virGetDeviceID(device_path, &maj, &min)) < 0) {
718 719
        virReportSystemError(-rc,
                             _("Unable to get minor number of device '%s'"),
720
                             device_path);
721 722 723
        return NULL;
    }

724
    if (virAsprintf(&key, "%d:%d", maj, min) < 0)
725 726 727 728 729
        return NULL;

    return key;
}

730
/* Check if a shared device's setting conflicts with the conf
731 732
 * used by other domain(s). Currently only checks the sgio
 * setting. Note that this should only be called for disk with
733
 * block source if the device type is disk.
734 735 736 737
 *
 * Returns 0 if no conflicts, otherwise returns -1.
 */
static int
738 739
qemuCheckSharedDevice(virHashTablePtr sharedDevices,
                      virDomainDeviceDefPtr dev)
740
{
741 742
    virDomainDiskDefPtr disk = NULL;
    virDomainHostdevDefPtr hostdev = NULL;
743 744
    char *sysfs_path = NULL;
    char *key = NULL;
745 746 747
    char *hostdev_name = NULL;
    char *hostdev_path = NULL;
    char *device_path = NULL;
748
    int val;
749 750
    int ret = 0;

751 752 753 754 755 756 757 758 759 760 761 762 763
    if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
        disk = dev->data.disk;

        /* The only conflicts between shared disk we care about now
         * is sgio setting, which is only valid for device='lun'.
         */
        if (disk->device != VIR_DOMAIN_DISK_DEVICE_LUN)
            return 0;

        device_path = disk->src;
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
        hostdev = dev->data.hostdev;

764 765
        if (!(hostdev_name = virSCSIDeviceGetDevName(NULL,
                                                     hostdev->source.subsys.u.scsi.adapter,
766 767 768 769 770
                                                     hostdev->source.subsys.u.scsi.bus,
                                                     hostdev->source.subsys.u.scsi.target,
                                                     hostdev->source.subsys.u.scsi.unit)))
            goto cleanup;

771
        if (virAsprintf(&hostdev_path, "/dev/%s", hostdev_name) < 0)
772 773 774 775
            goto cleanup;

        device_path = hostdev_path;
    } else {
776
        return 0;
777
    }
778

779
    if (!(sysfs_path = virGetUnprivSGIOSysfsPath(device_path, NULL))) {
780 781 782 783 784 785 786 787 788 789
        ret = -1;
        goto cleanup;
    }

    /* It can't be conflict if unpriv_sgio is not supported
     * by kernel.
     */
    if (!virFileExists(sysfs_path))
        goto cleanup;

790
    if (!(key = qemuGetSharedDeviceKey(device_path))) {
791 792 793 794 795 796 797
        ret = -1;
        goto cleanup;
    }

    /* It can't be conflict if no other domain is
     * is sharing it.
     */
798
    if (!(virHashLookup(sharedDevices, key)))
799 800
        goto cleanup;

801
    if (virGetDeviceUnprivSGIO(device_path, NULL, &val) < 0) {
802 803 804 805 806
        ret = -1;
        goto cleanup;
    }

    if ((val == 0 &&
807 808
         (disk->sgio == VIR_DOMAIN_DEVICE_SGIO_FILTERED ||
          disk->sgio == VIR_DOMAIN_DEVICE_SGIO_DEFAULT)) ||
809
        (val == 1 &&
810
         disk->sgio == VIR_DOMAIN_DEVICE_SGIO_UNFILTERED))
811 812
        goto cleanup;

813 814 815 816 817 818 819 820 821 822 823 824
    if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
        if (disk->type == VIR_DOMAIN_DISK_TYPE_VOLUME) {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("sgio of shared disk 'pool=%s' 'volume=%s' conflicts "
                             "with other active domains"),
                           disk->srcpool->pool,
                           disk->srcpool->volume);
        } else {
            virReportError(VIR_ERR_OPERATION_INVALID,
                           _("sgio of shared disk '%s' conflicts with other "
                             "active domains"), disk->src);
        }
825 826
    } else {
        virReportError(VIR_ERR_OPERATION_INVALID,
827 828 829 830 831 832
                       _("sgio of shared scsi host device '%s-%d-%d-%d' conflicts "
                          "with other active domains"),
                       hostdev->source.subsys.u.scsi.adapter,
                       hostdev->source.subsys.u.scsi.bus,
                       hostdev->source.subsys.u.scsi.target,
                       hostdev->source.subsys.u.scsi.unit);
833 834
    }

835 836
    ret = -1;
cleanup:
837 838
    VIR_FREE(hostdev_name);
    VIR_FREE(hostdev_path);
839 840 841 842
    VIR_FREE(sysfs_path);
    VIR_FREE(key);
    return ret;
}
843
bool
844 845 846
qemuSharedDeviceEntryDomainExists(qemuSharedDeviceEntryPtr entry,
                                  const char *name,
                                  int *idx)
847 848 849 850 851 852 853 854 855 856 857 858 859 860 861
{
    size_t i;

    for (i = 0; i < entry->ref; i++) {
        if (STREQ(entry->domains[i], name)) {
            if (idx)
                *idx = i;
            return true;
        }
    }

    return false;
}

void
862
qemuSharedDeviceEntryFree(void *payload, const void *name ATTRIBUTE_UNUSED)
863
{
864
    qemuSharedDeviceEntryPtr entry = payload;
865 866
    size_t i;

867 868 869
    if (!entry)
        return;

870 871 872 873 874 875 876
    for (i = 0; i < entry->ref; i++) {
        VIR_FREE(entry->domains[i]);
    }
    VIR_FREE(entry->domains);
    VIR_FREE(entry);
}

877
static qemuSharedDeviceEntryPtr
E
Eric Blake 已提交
878
qemuSharedDeviceEntryCopy(const qemuSharedDeviceEntry *entry)
879
{
880
    qemuSharedDeviceEntryPtr ret = NULL;
881 882
    size_t i;

883
    if (VIR_ALLOC(ret) < 0)
884 885
        return NULL;

886
    if (VIR_ALLOC_N(ret->domains, entry->ref) < 0)
887 888 889
        goto cleanup;

    for (i = 0; i < entry->ref; i++) {
890
        if (VIR_STRDUP(ret->domains[i], entry->domains[i]) < 0)
891 892 893 894 895 896 897
            goto cleanup;
        ret->ref++;
    }

    return ret;

cleanup:
898
    qemuSharedDeviceEntryFree(ret, NULL);
899 900 901
    return NULL;
}

902
/* qemuAddSharedDevice:
903
 * @driver: Pointer to qemu driver struct
904
 * @dev: The device def
905 906 907
 * @name: The domain name
 *
 * Increase ref count and add the domain name into the list which
908
 * records all the domains that use the shared device if the entry
909
 * already exists, otherwise add a new entry.
910 911
 */
int
912 913 914
qemuAddSharedDevice(virQEMUDriverPtr driver,
                    virDomainDeviceDefPtr dev,
                    const char *name)
915
{
916 917
    qemuSharedDeviceEntry *entry = NULL;
    qemuSharedDeviceEntry *new_entry = NULL;
918 919 920 921
    virDomainDiskDefPtr disk = NULL;
    virDomainHostdevDefPtr hostdev = NULL;
    char *dev_name = NULL;
    char *dev_path = NULL;
922
    char *key = NULL;
923
    int ret = -1;
924

925 926 927
    /* Currently the only conflicts we have to care about for
     * the shared disk and shared host device is "sgio" setting,
     * which is only valid for block disk and scsi host device.
928
     */
929 930 931
    if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
        disk = dev->data.disk;

932
        if (!disk->shared || !virDomainDiskSourceIsBlockType(disk))
933 934 935 936 937 938 939 940 941
            return 0;
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
        hostdev = dev->data.hostdev;

        if (!hostdev->shareable ||
            !(hostdev->mode == VIR_DOMAIN_HOSTDEV_MODE_SUBSYS &&
              hostdev->source.subsys.type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI))
            return 0;
    } else {
942
        return 0;
943
    }
944

945
    qemuDriverLock(driver);
946 947
    if (qemuCheckSharedDevice(driver->sharedDevices, dev) < 0)
        goto cleanup;
948

949
    if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
950 951 952
        if (!(key = qemuGetSharedDeviceKey(disk->src)))
            goto cleanup;
    } else {
953 954
        if (!(dev_name = virSCSIDeviceGetDevName(NULL,
                                                 hostdev->source.subsys.u.scsi.adapter,
955 956 957 958 959
                                                 hostdev->source.subsys.u.scsi.bus,
                                                 hostdev->source.subsys.u.scsi.target,
                                                 hostdev->source.subsys.u.scsi.unit)))
            goto cleanup;

960
        if (virAsprintf(&dev_path, "/dev/%s", dev_name) < 0)
961 962 963 964 965
            goto cleanup;

        if (!(key = qemuGetSharedDeviceKey(dev_path)))
            goto cleanup;
    }
966

967
    if ((entry = virHashLookup(driver->sharedDevices, key))) {
968 969
        /* Nothing to do if the shared scsi host device is already
         * recorded in the table.
970
         */
971
        if (qemuSharedDeviceEntryDomainExists(entry, name, NULL)) {
972 973 974 975
            ret = 0;
            goto cleanup;
        }

976
        if (!(new_entry = qemuSharedDeviceEntryCopy(entry)))
977 978
            goto cleanup;

979 980
        if (VIR_EXPAND_N(new_entry->domains, new_entry->ref, 1) < 0 ||
            VIR_STRDUP(new_entry->domains[new_entry->ref - 1], name) < 0) {
981
            qemuSharedDeviceEntryFree(new_entry, NULL);
982 983 984
            goto cleanup;
        }

985 986
        if (virHashUpdateEntry(driver->sharedDevices, key, new_entry) < 0) {
            qemuSharedDeviceEntryFree(new_entry, NULL);
987 988
            goto cleanup;
        }
989
    } else {
990 991 992
        if (VIR_ALLOC(entry) < 0 ||
            VIR_ALLOC_N(entry->domains, 1) < 0 ||
            VIR_STRDUP(entry->domains[0], name) < 0) {
993
            qemuSharedDeviceEntryFree(entry, NULL);
994 995 996 997 998
            goto cleanup;
        }

        entry->ref = 1;

999
        if (virHashAddEntry(driver->sharedDevices, key, entry))
1000
            goto cleanup;
1001 1002
    }

1003 1004
    ret = 0;
cleanup:
1005
    qemuDriverUnlock(driver);
1006 1007
    VIR_FREE(dev_name);
    VIR_FREE(dev_path);
1008
    VIR_FREE(key);
1009
    return ret;
1010 1011
}

1012
/* qemuRemoveSharedDevice:
1013
 * @driver: Pointer to qemu driver struct
1014
 * @device: The device def
1015 1016 1017
 * @name: The domain name
 *
 * Decrease ref count and remove the domain name from the list which
1018 1019
 * records all the domains that use the shared device if ref is not
 * 1, otherwise remove the entry.
1020 1021
 */
int
1022 1023 1024
qemuRemoveSharedDevice(virQEMUDriverPtr driver,
                       virDomainDeviceDefPtr dev,
                       const char *name)
1025
{
1026 1027
    qemuSharedDeviceEntryPtr entry = NULL;
    qemuSharedDeviceEntryPtr new_entry = NULL;
1028 1029
    virDomainDiskDefPtr disk = NULL;
    virDomainHostdevDefPtr hostdev = NULL;
1030
    char *key = NULL;
1031 1032
    char *dev_name = NULL;
    char *dev_path = NULL;
1033
    int ret = -1;
1034
    int idx;
1035

1036 1037 1038
    if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
        disk = dev->data.disk;

1039
        if (!disk->shared || !virDomainDiskSourceIsBlockType(disk))
1040 1041 1042 1043 1044 1045 1046 1047 1048
            return 0;
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
        hostdev = dev->data.hostdev;

        if (!hostdev->shareable ||
            !(hostdev->mode == VIR_DOMAIN_HOSTDEV_MODE_SUBSYS &&
              hostdev->source.subsys.type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI))
            return 0;
    } else {
1049
        return 0;
1050
    }
1051

1052
    qemuDriverLock(driver);
1053 1054 1055 1056 1057

    if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
        if (!(key = qemuGetSharedDeviceKey(disk->src)))
            goto cleanup;
    } else {
1058 1059
        if (!(dev_name = virSCSIDeviceGetDevName(NULL,
                                                 hostdev->source.subsys.u.scsi.adapter,
1060 1061 1062 1063 1064
                                                 hostdev->source.subsys.u.scsi.bus,
                                                 hostdev->source.subsys.u.scsi.target,
                                                 hostdev->source.subsys.u.scsi.unit)))
            goto cleanup;

1065
        if (virAsprintf(&dev_path, "/dev/%s", dev_name) < 0)
1066 1067 1068 1069 1070
            goto cleanup;

        if (!(key = qemuGetSharedDeviceKey(dev_path)))
            goto cleanup;
    }
1071

1072
    if (!(entry = virHashLookup(driver->sharedDevices, key)))
1073
        goto cleanup;
1074

1075 1076 1077
    /* Nothing to do if the shared disk is not recored in
     * the table.
     */
1078
    if (!qemuSharedDeviceEntryDomainExists(entry, name, &idx)) {
1079 1080 1081 1082 1083
        ret = 0;
        goto cleanup;
    }

    if (entry->ref != 1) {
1084
        if (!(new_entry = qemuSharedDeviceEntryCopy(entry)))
1085 1086 1087 1088 1089 1090 1091 1092 1093
            goto cleanup;

        if (idx != new_entry->ref - 1)
            memmove(&new_entry->domains[idx],
                    &new_entry->domains[idx + 1],
                    sizeof(*new_entry->domains) * (new_entry->ref - idx - 1));

        VIR_SHRINK_N(new_entry->domains, new_entry->ref, 1);

1094 1095
        if (virHashUpdateEntry(driver->sharedDevices, key, new_entry) < 0){
            qemuSharedDeviceEntryFree(new_entry, NULL);
1096
            goto cleanup;
1097
        }
1098
    } else {
1099
        if (virHashRemoveEntry(driver->sharedDevices, key) < 0)
1100
            goto cleanup;
1101 1102
    }

1103 1104
    ret = 0;
cleanup:
1105
    qemuDriverUnlock(driver);
1106 1107
    VIR_FREE(dev_name);
    VIR_FREE(dev_path);
1108
    VIR_FREE(key);
1109
    return ret;
1110
}
1111

1112
int
1113
qemuSetUnprivSGIO(virDomainDeviceDefPtr dev)
1114
{
1115 1116
    virDomainDiskDefPtr disk = NULL;
    virDomainHostdevDefPtr hostdev = NULL;
1117
    char *sysfs_path = NULL;
1118 1119 1120
    char *path = NULL;
    char *hostdev_name = NULL;
    char *hostdev_path = NULL;
1121 1122 1123 1124 1125 1126
    int val = -1;
    int ret = 0;

    /* "sgio" is only valid for block disk; cdrom
     * and floopy disk can have empty source.
     */
1127 1128 1129
    if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
        disk = dev->data.disk;

1130
        if (disk->device != VIR_DOMAIN_DISK_DEVICE_LUN ||
1131
            !virDomainDiskSourceIsBlockType(disk))
1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142
            return 0;

        path = disk->src;
    } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
        hostdev = dev->data.hostdev;

        if (!hostdev->shareable ||
            !(hostdev->mode == VIR_DOMAIN_HOSTDEV_MODE_SUBSYS &&
              hostdev->source.subsys.type == VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_SCSI))
            return 0;

1143 1144
        if (!(hostdev_name = virSCSIDeviceGetDevName(NULL,
                                                     hostdev->source.subsys.u.scsi.adapter,
1145 1146 1147 1148 1149
                                                     hostdev->source.subsys.u.scsi.bus,
                                                     hostdev->source.subsys.u.scsi.target,
                                                     hostdev->source.subsys.u.scsi.unit)))
            goto cleanup;

1150
        if (virAsprintf(&hostdev_path, "/dev/%s", hostdev_name) < 0)
1151 1152 1153 1154
            goto cleanup;

        path = hostdev_path;
    } else {
1155
        return 0;
1156
    }
1157

1158 1159 1160 1161 1162
    sysfs_path = virGetUnprivSGIOSysfsPath(path, NULL);
    if (sysfs_path == NULL) {
        ret = -1;
        goto cleanup;
    }
1163 1164

    /* By default, filter the SG_IO commands, i.e. set unpriv_sgio to 0.  */
1165 1166 1167 1168 1169 1170

    if (dev->type == VIR_DOMAIN_DEVICE_DISK)
        val = (disk->sgio == VIR_DOMAIN_DEVICE_SGIO_UNFILTERED);
    else
        val = (hostdev->source.subsys.u.scsi.sgio ==
               VIR_DOMAIN_DEVICE_SGIO_UNFILTERED);
1171 1172 1173 1174 1175 1176

    /* Do not do anything if unpriv_sgio is not supported by the kernel and the
     * whitelist is enabled.  But if requesting unfiltered access, always call
     * virSetDeviceUnprivSGIO, to report an error for unsupported unpriv_sgio.
     */
    if ((virFileExists(sysfs_path) || val == 1) &&
1177
        virSetDeviceUnprivSGIO(path, NULL, val) < 0)
1178 1179
        ret = -1;

1180
cleanup:
1181
    VIR_FREE(sysfs_path);
1182 1183
    VIR_FREE(hostdev_name);
    VIR_FREE(hostdev_path);
1184 1185
    return ret;
}
1186

1187 1188 1189 1190
int qemuDriverAllocateID(virQEMUDriverPtr driver)
{
    return virAtomicIntInc(&driver->nextvmid);
}
1191

1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252
static int
qemuAddISCSIPoolSourceHost(virDomainDiskDefPtr def,
                           virStoragePoolDefPtr pooldef)
{
    int ret = -1;
    char **tokens = NULL;

    /* Only support one host */
    if (pooldef->source.nhost != 1) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED, "%s",
                       _("Expected exactly 1 host for the storage pool"));
        goto cleanup;
    }

    /* iscsi pool only supports one host */
    def->nhosts = 1;

    if (VIR_ALLOC_N(def->hosts, def->nhosts) < 0)
        goto cleanup;

    if (VIR_STRDUP(def->hosts[0].name, pooldef->source.hosts[0].name) < 0)
        goto cleanup;

    if (virAsprintf(&def->hosts[0].port, "%d",
                    pooldef->source.hosts[0].port ?
                    pooldef->source.hosts[0].port :
                    3260) < 0)
        goto cleanup;

    /* iscsi volume has name like "unit:0:0:1" */
    if (!(tokens = virStringSplit(def->srcpool->volume, ":", 0)))
        goto cleanup;

    if (virStringListLength(tokens) != 4) {
        virReportError(VIR_ERR_INTERNAL_ERROR,
                       _("unexpected iscsi volume name '%s'"),
                       def->srcpool->volume);
        goto cleanup;
    }

    /* iscsi pool has only one source device path */
    if (virAsprintf(&def->src, "%s/%s",
                    pooldef->source.devices[0].path,
                    tokens[3]) < 0)
        goto cleanup;

    /* Storage pool have not supported these 2 attributes yet,
     * use the defaults.
     */
    def->hosts[0].transport = VIR_DOMAIN_DISK_PROTO_TRANS_TCP;
    def->hosts[0].socket = NULL;

    def->protocol = VIR_DOMAIN_DISK_PROTOCOL_ISCSI;

    ret = 0;

cleanup:
    virStringFreeList(tokens);
    return ret;
}

1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304
static int
qemuTranslateDiskSourcePoolAuth(virDomainDiskDefPtr def,
                                virStoragePoolDefPtr pooldef)
{
    int ret = -1;

    /* Only necessary when authentication set */
    if (pooldef->source.authType == VIR_STORAGE_POOL_AUTH_NONE) {
        ret = 0;
        goto cleanup;
    }

    /* Copy the authentication information from the storage pool
     * into the virDomainDiskDef
     */
    if (pooldef->source.authType == VIR_STORAGE_POOL_AUTH_CHAP) {
        if (VIR_STRDUP(def->auth.username,
                       pooldef->source.auth.chap.username) < 0)
            goto cleanup;
        if (pooldef->source.auth.chap.secret.uuidUsable) {
            def->auth.secretType = VIR_DOMAIN_DISK_SECRET_TYPE_UUID;
            memcpy(def->auth.secret.uuid,
                   pooldef->source.auth.chap.secret.uuid,
                   VIR_UUID_BUFLEN);
        } else {
            if (VIR_STRDUP(def->auth.secret.usage,
                           pooldef->source.auth.chap.secret.usage) < 0)
                goto cleanup;
            def->auth.secretType = VIR_DOMAIN_DISK_SECRET_TYPE_USAGE;
        }
    } else if (pooldef->source.authType == VIR_STORAGE_POOL_AUTH_CEPHX) {
        if (VIR_STRDUP(def->auth.username,
                       pooldef->source.auth.cephx.username) < 0)
            goto cleanup;
        if (pooldef->source.auth.cephx.secret.uuidUsable) {
            def->auth.secretType = VIR_DOMAIN_DISK_SECRET_TYPE_UUID;
            memcpy(def->auth.secret.uuid,
                   pooldef->source.auth.cephx.secret.uuid,
                   VIR_UUID_BUFLEN);
        } else {
            if (VIR_STRDUP(def->auth.secret.usage,
                           pooldef->source.auth.cephx.secret.usage) < 0)
                goto cleanup;
            def->auth.secretType = VIR_DOMAIN_DISK_SECRET_TYPE_USAGE;
        }
    }
    ret = 0;

cleanup:
    return ret;
}

1305

1306 1307 1308 1309
int
qemuTranslateDiskSourcePool(virConnectPtr conn,
                            virDomainDiskDefPtr def)
{
1310
    virStoragePoolDefPtr pooldef = NULL;
1311 1312
    virStoragePoolPtr pool = NULL;
    virStorageVolPtr vol = NULL;
1313
    char *poolxml = NULL;
1314 1315
    virStorageVolInfo info;
    int ret = -1;
1316
    virErrorPtr savedError = NULL;
1317 1318 1319 1320 1321 1322 1323 1324 1325 1326

    if (def->type != VIR_DOMAIN_DISK_TYPE_VOLUME)
        return 0;

    if (!def->srcpool)
        return 0;

    if (!(pool = virStoragePoolLookupByName(conn, def->srcpool->pool)))
        return -1;

1327 1328 1329 1330 1331 1332 1333 1334
    if (virStoragePoolIsActive(pool) != 1) {
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("storage pool '%s' containing volume '%s' "
                         "is not active"),
                       def->srcpool->pool, def->srcpool->volume);
        goto cleanup;
    }

1335 1336 1337 1338 1339 1340
    if (!(vol = virStorageVolLookupByName(pool, def->srcpool->volume)))
        goto cleanup;

    if (virStorageVolGetInfo(vol, &info) < 0)
        goto cleanup;

1341 1342 1343 1344 1345 1346 1347 1348 1349 1350
    if (!(poolxml = virStoragePoolGetXMLDesc(pool, 0)))
        goto cleanup;

    if (!(pooldef = virStoragePoolDefParseString(poolxml)))
        goto cleanup;

    def->srcpool->pooltype = pooldef->type;
    def->srcpool->voltype = info.type;

    if (def->srcpool->mode && pooldef->type != VIR_STORAGE_POOL_ISCSI) {
1351
        virReportError(VIR_ERR_XML_ERROR, "%s",
1352 1353
                       _("disk source mode is only valid when "
                         "storage pool is of iscsi type"));
1354 1355 1356
        goto cleanup;
    }

1357 1358 1359 1360
    VIR_FREE(def->src);
    virDomainDiskHostDefFree(def->nhosts, def->hosts);
    virDomainDiskAuthClear(def);

1361 1362 1363 1364 1365 1366 1367
    switch ((enum virStoragePoolType) pooldef->type) {
    case VIR_STORAGE_POOL_DIR:
    case VIR_STORAGE_POOL_FS:
    case VIR_STORAGE_POOL_NETFS:
    case VIR_STORAGE_POOL_LOGICAL:
    case VIR_STORAGE_POOL_DISK:
    case VIR_STORAGE_POOL_SCSI:
1368 1369
        if (!(def->src = virStorageVolGetPath(vol)))
            goto cleanup;
1370 1371 1372 1373 1374

        if (def->startupPolicy && info.type != VIR_STORAGE_VOL_FILE) {
            virReportError(VIR_ERR_XML_ERROR, "%s",
                           _("'startupPolicy' is only valid for "
                             "'file' type volume"));
1375
            goto cleanup;
1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390
        }


        switch (info.type) {
        case VIR_STORAGE_VOL_FILE:
            def->srcpool->actualtype = VIR_DOMAIN_DISK_TYPE_FILE;
            break;

        case VIR_STORAGE_VOL_DIR:
            def->srcpool->actualtype = VIR_DOMAIN_DISK_TYPE_DIR;
            break;

        case VIR_STORAGE_VOL_BLOCK:
            def->srcpool->actualtype = VIR_DOMAIN_DISK_TYPE_BLOCK;
            break;
1391

1392 1393 1394 1395 1396 1397 1398
        case VIR_STORAGE_VOL_NETWORK:
        case VIR_STORAGE_VOL_NETDIR:
            virReportError(VIR_ERR_INTERNAL_ERROR,
                           _("unexpected storage volume type '%s' "
                             "for storage pool type '%s'"),
                           virStorageVolTypeToString(info.type),
                           virStoragePoolTypeToString(pooldef->type));
1399
            goto cleanup;
1400 1401 1402
        }

        break;
1403

1404 1405
    case VIR_STORAGE_POOL_ISCSI:
        if (def->startupPolicy) {
1406
            virReportError(VIR_ERR_XML_ERROR, "%s",
1407 1408
                           _("'startupPolicy' is only valid for "
                             "'file' type volume"));
1409 1410 1411
            goto cleanup;
        }

1412
       switch (def->srcpool->mode) {
1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434
       case VIR_DOMAIN_DISK_SOURCE_POOL_MODE_DEFAULT:
       case VIR_DOMAIN_DISK_SOURCE_POOL_MODE_LAST:
           def->srcpool->mode = VIR_DOMAIN_DISK_SOURCE_POOL_MODE_HOST;
           /* fallthrough */
       case VIR_DOMAIN_DISK_SOURCE_POOL_MODE_HOST:
           def->srcpool->actualtype = VIR_DOMAIN_DISK_TYPE_BLOCK;
           if (!(def->src = virStorageVolGetPath(vol)))
               goto cleanup;
           break;

       case VIR_DOMAIN_DISK_SOURCE_POOL_MODE_DIRECT:
           def->srcpool->actualtype = VIR_DOMAIN_DISK_TYPE_NETWORK;
           def->protocol = VIR_DOMAIN_DISK_PROTOCOL_ISCSI;

           if (qemuTranslateDiskSourcePoolAuth(def, pooldef) < 0)
               goto cleanup;

           if (qemuAddISCSIPoolSourceHost(def, pooldef) < 0)
               goto cleanup;
           break;
       }
       break;
1435 1436 1437 1438 1439 1440 1441 1442 1443 1444

    case VIR_STORAGE_POOL_MPATH:
    case VIR_STORAGE_POOL_RBD:
    case VIR_STORAGE_POOL_SHEEPDOG:
    case VIR_STORAGE_POOL_GLUSTER:
    case VIR_STORAGE_POOL_LAST:
        virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
                       _("using '%s' pools for backing 'volume' disks "
                         "isn't yet supported"),
                       virStoragePoolTypeToString(pooldef->type));
1445 1446 1447 1448 1449
        goto cleanup;
    }

    ret = 0;
cleanup:
1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460
    if (ret < 0)
        savedError = virSaveLastError();
    if (pool)
        virStoragePoolFree(pool);
    if (vol)
        virStorageVolFree(vol);
    if (savedError) {
        virSetError(savedError);
        virFreeError(savedError);
    }

1461 1462
    VIR_FREE(poolxml);
    virStoragePoolDefFree(pooldef);
1463 1464
    return ret;
}
1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484


int
qemuSnapshotDiskGetActualType(virDomainSnapshotDiskDefPtr def)
{
    return def->type;
}


int
qemuTranslateSnapshotDiskSourcePool(virConnectPtr conn ATTRIBUTE_UNUSED,
                                    virDomainSnapshotDiskDefPtr def)
{
    if (def->type != VIR_DOMAIN_DISK_TYPE_VOLUME)
        return 0;

    virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
                   _("Snapshots are not yet supported with 'pool' volumes"));
    return -1;
}